Free software that may be useful for this course:
Software that current full time UofT students can purchase for discounted prices:
-
In Google, click "Advanced Search" and try in out.
Note the topic-specific search engines at the bottom of the screen.
-
In the Advanced Search page, click "Advanced Search Tips" to open the Advanced Search Help Center.
Click "Basics of Search" and read the explanations.
Most browsers have an advanced search feature and some guidance on how to use it.
Save yourself time and get better search results by reading the instructions...
and then actually following them!
-
On the main Wikipedia page, click "About Wikipedia".
- Then scroll down to the table of contents and click "Making the best use of WIkipedia"
For Microsoft products, you will find:
- explanations and descriptions
- tutorials you can follow
- webcasts discussing the products
- videos demonstrating how to use the products
Look for these in addition to the links provided below.
- Malware -- software that infiltrates a system without the owner's informed consent.
- Computer Virus -- program that can copy itself and infect a computer.
- Computer Worm -- program that is self-replicating. Uses network to send copies of itself.
- Trojan Horse -- program that installs malicious software while under the guise of doing something else.
- Backdoor -- program which allow unauthorized remote access to a computer.
- Rootkit -- programs intended to conceal running processes, files, or system data from the OS.
- Malicious Internet Bots -- bots are software robots that automatically run programs.
- Denial-of-service attack -- an attempt to make a computer resource unavailable to its intended users. One common method is by saturating a host on a network with external communications requests.
- Zombie computer -- a computer on the Internet that has been compromised. It is usually one of several computers in a botnet, which is used to perform malicious tasks under remote direction.
- Spam (electronic) -- unsolicited bulk e-mail.
- Social engineering -- collection of techniques used to manipulate people into performing actions or divulging confidential information.
- Identity Theft -- computers can be used to collect personal info which may be used to steal a person's identiy (e.g., spoofing, phishing, pharming, vishing).
- Spoofing -- program successfully masquerades as another by falsifying data and thereby gaining advantage.
- Phishing -- fake e-mail messages and fradulent web sites are designed to fool recipients into divulging personal info.
- Pharming -- an attack that redirects a web site's traffice to another, bogus web site.
- Vishing -- Voice over IP (VoIP) used to gain access to private personal and financial info from the public for the purpose of financial reward.
- Spy Software
- Spyware -- software that intercepts or takes partial control over the user's interaction with the computer.
- Packet sniffer -- software/hardware that can intercept and log traffic passing over a digital network.
- Keystroke logging -- software used to capture user's keystrokes. Used by private parties to spy on user's computer usage.
- Adware -- softwre which automatically plays, displays, or downloads advertising material to a computer.
|