<ul><li>A powerful tool that allows all keystrokes to be recorded. </li></ul><ul><li>Can be used to determine sources of errors in information systems or measure employee productivity. </li></ul><ul><li>Can be built into hardware as well as software based </li></ul>
<ul><li>Authentication software aims to allow for a secure system. This could be through the use of a login system or software in conjunction with a biometric device. An emerging new software is keystroke dynamics, which disallows users even when entering correct login details if the pattern in keystroke pressing is not the same as that of the creators. </li></ul><ul><li>See www.biopassword.com and click demo </li></ul>
<ul><li>System monitoring software is designed to allow a computer user to monitor there system. </li></ul>
<ul><li>Software which controls network traffic to and from a computer, permitting or denying communications based on settings. </li></ul><ul><li>Common features include: alerting users of outgoing connections, allow users to control which programs can connect to Internet and monitor and control all incoming and outgoing Internet traffic. </li></ul><ul><li>Sometimes due to software nature in that it can waste system resources or that it may be compromised by malicious software which is running on the same system as the firewall software. </li></ul>
<ul><li>Malware relates to software which purpose is to damage a computer system without the owner’s consent. </li></ul><ul><li>Anti-malware software has the purpose of scanning for and quarantining/removing this unwanted software from a computer system. </li></ul>
<ul><li>Spyware is software that discretely collects information to do with a system user. This information is usually related to targeted advertising using the Internet. This could include pages visited on the Internet or something similar. </li></ul>
<ul><li>Anti-virus software aims to keep a computer system free from viruses and the effects they can cause. Modern anti-virus software includes real-time protection, automatic Internet definition file updates as well as the ability to scan for viruses and quarantine infected files. Anti-virus software often inlcludes protection against spyware, other malware and acts as a firewall. </li></ul>
<ul><li>Encryption software can either have the ability to encrypt a whole drive or a single file or folder. Encryption software encrypts files so that they cannot be view/edited/found. Encryption can take place on a computer in the form of software using a password to protect files or over the Internet in a public/private key system. </li></ul>
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.