Information Technology Reference
In-Depth Information
Security Utilities
Computer viruses and spyware from the Internet and other sources can be a nuisance—and
sometimes can completely disable a computer. Antivirus and antispyware software can be
installed to constantly monitor and protect the computer. If a virus or spyware is found, often
times it can be removed. This software runs continuously in the background to keep new
viruses and spyware from entering the system. To keep current and make sure that the soft-
ware checks for the latest threats, it can be easily updated over the Internet. It is also a good
idea to protect computer systems with firewall software. Firewall software filters incoming
and outgoing packets making sure that hackers or their tools are not attacking the system.
Some software assists in keeping private data from being accessed from a computer system,
in order to protect you from scams and fraud. Symantec, McAfee, and Microsoft are the most
popular providers of security software.
File-Compression Utilities
File-compression programs can reduce the amount of disk space required to store a file or
reduce the time it takes to transfer a file over the Internet. A popular program on Windows
PCs is WinZip ( www.winzip.com ), which generates zip files, which are collections of one or
more compressed files. A zip file has a .zip extension, and its contents can be easily unzipped
to their original size. Windows Vista includes utilities for compressing and uncompressing
files. MP3 (Motion Pictures Experts Group-Layer 3) is a popular file-compression format used
to store, transfer, and play music and audio files, such as podcasts—audio programs that can
be downloaded from the Internet. MP3 can compress files ten times smaller than the original
file with near-CD-quality sound. Software, such as iTunes from Apple, can be used to store,
organize, and play MP3 music files.
Spam and Pop-Up Blocker Utilities
Getting unwanted e-mail (spam) and having annoying and unwanted ads pop up on your
screen while you are on the Web can be a frustrating waste of time. You can install a number
of utility programs to help block unwanted e-mail spam and pop-up ads. Most Internet
service providers and Web-based e-mail systems provide a spam-blocking service, and Web
browsers such as Internet Explorer and Firefox include pop-up blocking utilities.
Network and Internet Utilities
A broad range of network- and systems-management utility software is available to monitor
hardware and network performance and trigger an alert when a Web server is crashing or a
network problem occurs. Although these general management features are helpful, what is
needed is a way to pinpoint the cause of the problem. Topaz from Mercury Interactive is an
example of software called an advanced Web-performance monitoring utility . It is designed to
sound an alarm when it detects problems and let network administrators isolate the most
likely causes of the problems. Its Auto RCA (root-cause analysis) module uses statistical anal-
ysis with built-in rules to measure system and Web performance. Actual performance data
is compared with the rules, and the results can help pinpoint where trouble originated—in
the application software, database, server, network, or the security features.
Server and Mainframe Utilities
Some utilities enhance the performance of servers and mainframe computers. IBM has cre-
ated systems-management software that allows a support person to monitor the growing
number of desktop computers in a business attached to a server or mainframe computer.
With this software, the support people can sit at their personal computers and check or
diagnose problems, such as a hard disk failure on a network computer. The support people
can even repair individual systems anywhere on the organization's network, often without
having to leave their desks. The direct benefit is to the system manager, but the business also
gains from having a smoothly functioning information system. Utility programs can meet
the needs of a single user, workgroup, or enterprise, as listed in Table 4.3. These programs
perform useful tasks—from tracking jobs to monitoring system integrity.
 
Search WWH ::




Custom Search