SlideShare a Scribd company logo
1 of 68
Open Source Software
Its Free!
What's the difference?
Open Source
•   Free
•   Open licensing agreement
•   No user restrictions
•   Freely distribute
•   Enhance the software coding
Shareware
• Proprietary software
• Trial basis
• Functionality is limited
• ―Trial Version‖
• Software stops after trial
  period
• No support or updates
Shareware
• No help menus
• May request
  donations
• Software is
  copyrighted
• Example of
  shareware is
  WinZip
Freeware
• Fully functional software
• Available for unlimited period
  of time
• Distributed without monetary
  benefits
• May be proprietary software
• Author can withhold some
  rights like copying distributing
  or using to create other
  software
Freeware
• Restricted use license
• i.e. personal use, academic
  use, commercial use,
  individual use, non-profit use
• Example of freeware is Adobe
  PDF
Why talk about Browsers
   • The internet browser is your window to the
     web
   • The better your browser the more you will
     see and experience
   • Up to date browsers are equipped with latest
     features and technology
Why talk about Browsers
  • Safety is always a concern when using
    browsers
  • Newest features include:
    ▫ Tabbed browsing
    ▫ RSS feeds and voice interaction
    ▫ More customizable
Top Ten Browsers
Firefox - Addons
Google Chrome
Internet Explorer 8
• Most targeted by hackers
• However, Active X controls no
  longer run by default
• Phishing filter warns users
  visiting malicious site
Internet Explorer 8
• SmartScreen filter – address
  bar and window turns red
• IE8 notifies you when you are
  about to download from a site
  known to distribute malware
InPrivate

  • Inprivate browsing
    leaves no traces of
    session
  • No cookies, cached
    files, browser
    history, or other
    incriminating
    evidence
Opera
  • Opera is fast.
  • From the way pages load, to
    the handy ways you can
    perform common actions
    more quickly, this browser
    has been built for speed.
  • When using slow
    connections such as
    crowded WiFi or dial-up,
    turning on Opera Turbo can
    more than double webpage-
    loading speed.
  • With Opera, you will spend
    less time waiting and more
    time enjoying the Web.
Apple Safari 5
Safari 5
 • Safari is designed to emphasize
   the browsing, not the browser.
 • The browser frame is a single
   pixel wide.
 • You see a scroll bar only when
   needed.
 • And if you choose, you can hide
   almost the entire interface,
   removing virtually every
   distraction from the browser
   window.
Safari 5

 • The first browser to deliver the
   ―real‖ Internet to a mobile device,
   Safari renders pages on iPad,
   iPhone, and iPod touch just as
   you see them on your computer.
 • But this is more than just a
   scaled-down mobile version of
   the original.
 • It takes advantage of the
   technologies built into these
   Multi-Touch devices.
 • The page shifts and reformats to
   fill the window when you turn
   your device on its side.
Malware
Malware
  • Means malicious software
  • Is designed to infiltrate a
    computer system without
    the owner's informed
    consent.
  • The expression is a general
    term used by computer
    professionals to mean a
    variety of forms of hostile,
    intrusive, or annoying
    software or program code.
Malware
          • The term "computer
            virus" is sometimes
            used as a catch-all
            phrase to include all
            types of malware,
            including true viruses.
          • Software is considered
            to be malware based on
            the perceived intent of
            the creator rather than
            any particular features.
Malware
  • Includes computer
    viruses, worms, trojan
    horses, spyware,
    dishonest adware,
    crimeware, most rootkits,
    and other malicious and
    unwanted software.
  • Is used as a vehicle for
    organized Internet crime
  • On March 29, 2010,
    Symantec Corporation
    named Shaoxing, China as
    the world's malware
    capital.
U. S. Cyber Command
• USCYBERCOM plans,
  coordinates, integrates,
  synchronizes and conducts
  activities to: direct the
  operations and defense of
  specified Department of
  Defense information networks
  and; prepare to, and when
  directed, conduct full
  spectrum military cyberspace
  operations in order to enable
  actions in all domains, ensure
  US/Allied freedom of action in
  cyberspace and deny the same
  to our adversaries.
Malware Removal Tools
What is Ccleaner?
  • It removes unused files from
    your system - allowing
    Windows to run faster and
    freeing up valuable hard disk
    space.
  • It also cleans traces of your
    online activities such as your
    Internet history.
  • It contains a fully featured
    registry cleaner.
  • It’s fast and contains NO
    Spyware or Adware!
How to Use CCLeaner
  • Run the
    Program and
    click on the
    Analyze button
    and you'll get a
    summary of
    what can be
    cleaned.
How to Use CCLeaner
  • By checking and
    unchecking the
    cleanings rules in
    the Windows and
    Applications tabs,
    you can specify
    exactly what you
    want to be
    analyzed.
How to Use CCLeaner
  • The Registry
    Cleaner will
    show you
    problems it
    finds and can
    fix in your
    registry.
How to Use CCLeaner
  • The Uninstall
    Tool will show
    you all the
    applications
    installed on
    your PC and
    allow you to
    uninstall any
    you no longer
    use.
How to Use CCLeaner
  • The Startup
    Tool shows
    you what
    programs are
    run when you
    turn on your
    computer.
How to Use CCLeaner
 • The System
   Restore tool
   allows you to
   view and
   delete any of
   the System
   Restore points
   that Windows
   creates for
   your PC.
Antivirus Suites
• Most antivirus suites are a pay
  for software
• Most offer ―free‖ versions
• Not all antivirus software are
  alike
• You are your best security. If it
  looks fishy it probably is.
Free antivirus
  • The following are
    what is known as
    ―free‖ antivirus
    software suites
  • These are limited in
    their function unless
    noted
  • These are the top
    ones rated by
    professionals
Leading Antivirus Software
Avast - Features
Avira
AVG - Features
Microsoft Security Essentials
  • Microsoft Security
    Essentials provides real-
    time protection for your
    home PC that guards
    against viruses, spyware,
    and other malicious
    software.
  • Microsoft Security
    Essentials is a free*
    download from Microsoft
    that is simple to install,
    easy to use, and always
    kept up to date so you can
    be assured your PC is
    protected by the latest
    technology.
Microsoft Security Essentials

  • It’s easy to tell if your PC is
    secure — when you’re green,
    you’re good. It’s that simple.
  • Microsoft Security Essentials
    runs quietly and efficiently in
    the background so that you are
    free to use your Windows-
    based PC the way you want—
    without interruptions or long
    computer wait times.
Open Office
Open Office
• OpenOffice.org 3 is the leading
  open-source office software
  suite for word processing,
  spreadsheets, presentations,
  graphics, databases and more.
• It is available in many languages
  and works on all common
  computers.
• It stores all your data in an
  international open standard
  format and can also read and
  write files from other common
  office software packages.
• It can be downloaded and used
  completely free of charge for any
  purpose.
Writer
Calculator
Impress
Draw
Base
Google Docs
Google Docs
• Create documents, spreadsheets and presentations online
• From scratch or start from a template.
  ▫   bulleted lists,
  ▫   sorting by columns,
  ▫   adding tables,
  ▫   images,
  ▫   comments,
  ▫   formulas,
  ▫   changing fonts and more. And it's free.
• Google Docs accepts most popular file formats, including
  DOC, XLS, ODT, ODS, RTF, CSV, PPT, etc. So go ahead and
  upload your existing files.
• Just click the toolbar buttons to bold, underline, indent,
  change font or number format, change cell background color
  and so on.
GIMP
GNU Image Manipulation
Program
GIMP
Blender
Blender
• Blender is afree
  open source 3D
  content creation
  suite, available
  for all major
  operating
  systems under
  the GNU General
  Public License.
Open Source Software
Open Source Software

More Related Content

What's hot

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus workschinmay kelkar
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology EducationSummerpair77
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trendsAthena Catindig
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_wargames12
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Tom Eston
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2OriginalGSM
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentationquestar
 
Docking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesDocking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesNCC Group
 

What's hot (20)

anti_virus
anti_virusanti_virus
anti_virus
 
Task 2a
Task 2aTask 2a
Task 2a
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Anti virus and current trends
Anti virus and current trendsAnti virus and current trends
Anti virus and current trends
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Unit 1 introduction to computers
Unit 1  introduction to computersUnit 1  introduction to computers
Unit 1 introduction to computers
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Operating system
Operating systemOperating system
Operating system
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
Lecture 2: Linux basics
Lecture 2: Linux basics Lecture 2: Linux basics
Lecture 2: Linux basics
 
Kaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical PresentationKaspersky Anti-Virus for Macintosh - Technical Presentation
Kaspersky Anti-Virus for Macintosh - Technical Presentation
 
Docking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slidesDocking stations andy_davis_ncc_group_slides
Docking stations andy_davis_ncc_group_slides
 
Lecture 19
Lecture 19Lecture 19
Lecture 19
 

Viewers also liked

open source and copyright
open source and copyrightopen source and copyright
open source and copyrightguest29e2eb
 
Tech Tools for Teachers on a Tight Budget
Tech Tools for Teachers on a Tight BudgetTech Tools for Teachers on a Tight Budget
Tech Tools for Teachers on a Tight BudgetAndy Jeter
 
20 learning styles srate-2013
20  learning styles srate-201320  learning styles srate-2013
20 learning styles srate-2013Joe Jerles
 
open source solution for e-governance
open source solution for e-governanceopen source solution for e-governance
open source solution for e-governancevikram singh
 
Open Source N Egovernance
Open Source N EgovernanceOpen Source N Egovernance
Open Source N EgovernanceSUD_CHOKSI
 
AeroSports Inc Hot Air Balloon Advertising
AeroSports Inc Hot Air Balloon AdvertisingAeroSports Inc Hot Air Balloon Advertising
AeroSports Inc Hot Air Balloon Advertisingmtreacy
 

Viewers also liked (6)

open source and copyright
open source and copyrightopen source and copyright
open source and copyright
 
Tech Tools for Teachers on a Tight Budget
Tech Tools for Teachers on a Tight BudgetTech Tools for Teachers on a Tight Budget
Tech Tools for Teachers on a Tight Budget
 
20 learning styles srate-2013
20  learning styles srate-201320  learning styles srate-2013
20 learning styles srate-2013
 
open source solution for e-governance
open source solution for e-governanceopen source solution for e-governance
open source solution for e-governance
 
Open Source N Egovernance
Open Source N EgovernanceOpen Source N Egovernance
Open Source N Egovernance
 
AeroSports Inc Hot Air Balloon Advertising
AeroSports Inc Hot Air Balloon AdvertisingAeroSports Inc Hot Air Balloon Advertising
AeroSports Inc Hot Air Balloon Advertising
 

Similar to Open Source Software

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software Ankit Sangwan
 
software final presentation.pptx
software final presentation.pptxsoftware final presentation.pptx
software final presentation.pptxRafaelPurano
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusAdeel Rasheed
 
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar Mohsin Ali
 
Parts of Computer (software)
Parts of Computer (software)Parts of Computer (software)
Parts of Computer (software)Mac Mac
 
Programs you need!
Programs you need!Programs you need!
Programs you need!dshinkfield
 
Automated tools for penetration testing
Automated tools for penetration testingAutomated tools for penetration testing
Automated tools for penetration testingdevanshdubey7
 
Programs you need!
Programs you need!Programs you need!
Programs you need!clcewing
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptKrishanPalSingh39
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptxReshmaBV2
 

Similar to Open Source Software (20)

Software
SoftwareSoftware
Software
 
Introduction To Computing.pptx
Introduction To Computing.pptxIntroduction To Computing.pptx
Introduction To Computing.pptx
 
B) Computer Basics
B) Computer BasicsB) Computer Basics
B) Computer Basics
 
Categories of softwares
Categories of softwaresCategories of softwares
Categories of softwares
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
A presentation on system software
A presentation on system software A presentation on system software
A presentation on system software
 
software final presentation.pptx
software final presentation.pptxsoftware final presentation.pptx
software final presentation.pptx
 
ict act 1.pptx
ict act 1.pptxict act 1.pptx
ict act 1.pptx
 
ICT Skills.pdf
ICT Skills.pdfICT Skills.pdf
ICT Skills.pdf
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar Softwares open source shareware commercial Proprietary  By Mohsin Iftikhar
Softwares open source shareware commercial Proprietary By Mohsin Iftikhar
 
Internet security
Internet securityInternet security
Internet security
 
Parts of Computer (software)
Parts of Computer (software)Parts of Computer (software)
Parts of Computer (software)
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
 
Automated tools for penetration testing
Automated tools for penetration testingAutomated tools for penetration testing
Automated tools for penetration testing
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
 
fdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.pptfdocuments.in_unit-2-foc.ppt
fdocuments.in_unit-2-foc.ppt
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
Anti virus
Anti virusAnti virus
Anti virus
 

Open Source Software

  • 3. Open Source • Free • Open licensing agreement • No user restrictions • Freely distribute • Enhance the software coding
  • 4. Shareware • Proprietary software • Trial basis • Functionality is limited • ―Trial Version‖ • Software stops after trial period • No support or updates
  • 5. Shareware • No help menus • May request donations • Software is copyrighted • Example of shareware is WinZip
  • 6. Freeware • Fully functional software • Available for unlimited period of time • Distributed without monetary benefits • May be proprietary software • Author can withhold some rights like copying distributing or using to create other software
  • 7. Freeware • Restricted use license • i.e. personal use, academic use, commercial use, individual use, non-profit use • Example of freeware is Adobe PDF
  • 8.
  • 9. Why talk about Browsers • The internet browser is your window to the web • The better your browser the more you will see and experience • Up to date browsers are equipped with latest features and technology
  • 10. Why talk about Browsers • Safety is always a concern when using browsers • Newest features include: ▫ Tabbed browsing ▫ RSS feeds and voice interaction ▫ More customizable
  • 12.
  • 14.
  • 16.
  • 17. Internet Explorer 8 • Most targeted by hackers • However, Active X controls no longer run by default • Phishing filter warns users visiting malicious site
  • 18. Internet Explorer 8 • SmartScreen filter – address bar and window turns red • IE8 notifies you when you are about to download from a site known to distribute malware
  • 19. InPrivate • Inprivate browsing leaves no traces of session • No cookies, cached files, browser history, or other incriminating evidence
  • 20.
  • 21. Opera • Opera is fast. • From the way pages load, to the handy ways you can perform common actions more quickly, this browser has been built for speed. • When using slow connections such as crowded WiFi or dial-up, turning on Opera Turbo can more than double webpage- loading speed. • With Opera, you will spend less time waiting and more time enjoying the Web.
  • 23. Safari 5 • Safari is designed to emphasize the browsing, not the browser. • The browser frame is a single pixel wide. • You see a scroll bar only when needed. • And if you choose, you can hide almost the entire interface, removing virtually every distraction from the browser window.
  • 24. Safari 5 • The first browser to deliver the ―real‖ Internet to a mobile device, Safari renders pages on iPad, iPhone, and iPod touch just as you see them on your computer. • But this is more than just a scaled-down mobile version of the original. • It takes advantage of the technologies built into these Multi-Touch devices. • The page shifts and reformats to fill the window when you turn your device on its side.
  • 26. Malware • Means malicious software • Is designed to infiltrate a computer system without the owner's informed consent. • The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
  • 27. Malware • The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. • Software is considered to be malware based on the perceived intent of the creator rather than any particular features.
  • 28. Malware • Includes computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software. • Is used as a vehicle for organized Internet crime • On March 29, 2010, Symantec Corporation named Shaoxing, China as the world's malware capital.
  • 29. U. S. Cyber Command • USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
  • 31.
  • 32. What is Ccleaner? • It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. • It also cleans traces of your online activities such as your Internet history. • It contains a fully featured registry cleaner. • It’s fast and contains NO Spyware or Adware!
  • 33. How to Use CCLeaner • Run the Program and click on the Analyze button and you'll get a summary of what can be cleaned.
  • 34. How to Use CCLeaner • By checking and unchecking the cleanings rules in the Windows and Applications tabs, you can specify exactly what you want to be analyzed.
  • 35. How to Use CCLeaner • The Registry Cleaner will show you problems it finds and can fix in your registry.
  • 36. How to Use CCLeaner • The Uninstall Tool will show you all the applications installed on your PC and allow you to uninstall any you no longer use.
  • 37. How to Use CCLeaner • The Startup Tool shows you what programs are run when you turn on your computer.
  • 38. How to Use CCLeaner • The System Restore tool allows you to view and delete any of the System Restore points that Windows creates for your PC.
  • 39.
  • 40. Antivirus Suites • Most antivirus suites are a pay for software • Most offer ―free‖ versions • Not all antivirus software are alike • You are your best security. If it looks fishy it probably is.
  • 41. Free antivirus • The following are what is known as ―free‖ antivirus software suites • These are limited in their function unless noted • These are the top ones rated by professionals
  • 43.
  • 45.
  • 46. Avira
  • 47.
  • 49.
  • 50. Microsoft Security Essentials • Microsoft Security Essentials provides real- time protection for your home PC that guards against viruses, spyware, and other malicious software. • Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and always kept up to date so you can be assured your PC is protected by the latest technology.
  • 51. Microsoft Security Essentials • It’s easy to tell if your PC is secure — when you’re green, you’re good. It’s that simple. • Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows- based PC the way you want— without interruptions or long computer wait times.
  • 52.
  • 54. Open Office • OpenOffice.org 3 is the leading open-source office software suite for word processing, spreadsheets, presentations, graphics, databases and more. • It is available in many languages and works on all common computers. • It stores all your data in an international open standard format and can also read and write files from other common office software packages. • It can be downloaded and used completely free of charge for any purpose.
  • 55.
  • 59. Draw
  • 60. Base
  • 62. Google Docs • Create documents, spreadsheets and presentations online • From scratch or start from a template. ▫ bulleted lists, ▫ sorting by columns, ▫ adding tables, ▫ images, ▫ comments, ▫ formulas, ▫ changing fonts and more. And it's free. • Google Docs accepts most popular file formats, including DOC, XLS, ODT, ODS, RTF, CSV, PPT, etc. So go ahead and upload your existing files. • Just click the toolbar buttons to bold, underline, indent, change font or number format, change cell background color and so on.
  • 64. GIMP
  • 66. Blender • Blender is afree open source 3D content creation suite, available for all major operating systems under the GNU General Public License.