Computer software anal.

Posted: August 13th, 2013

Name

Instructor

Course

Date

Computer Software Analysis

Post 1

P2P networking formally refers to peer-to-peer networking. P2P technology provides personal computers with a software architecture that permits the computers to interconnect and enable communication directly with different computers. Because of the peer-to-peer connection, computer users, also referred to as peers, are able to share connections, data files and processing power in a network. Additionally, P2P networking allows peers to share files and resources directly through the Internet with other computers. However, it is evident that P2P networks have been used by certain users to exchange illegal content. In this way, Internet P2P networks require regulation to ascertain that they are utilized for legal activities. This is because a wide variety of the content shared on the networks is illegal. For instance, illegal content such as child pornography, personal identification data such as social security numbers, drivers’ licenses, debit/credit card numbers, and copyrighted material such as movies, games and music, can be shared through P2P networks. Thus, regulation is important since most of the materials circulated generate social and financial losses. For instance, advances in P2P networking such as operator de-intermediation increase the rate of child pornography sharing and facilitate crimes like pedophilia and child kidnapping. Thus, if a P2P network set for legitimate use has been used for illegal activities, the organization that set up the network should be responsible. This is because the organization was tasked in ensuring that the network is free from accessing illegal content or content that is not related. Additionally, the organization could have employed software that is used specifically for blocking illegal content. Thus, the organization, by allowing illegal use of the P2P network, displays incompetence and lack of expertise based on network topology.

Post 1b

Peer-to-peer (P2P) networking has advanced to become a trendy and accepted pastime for a considerable number of Internet users globally. As the world turns into a global village because of the interconnections between users, one cannot ignore the implication of P2P networking in file sharing in this contemporary age. On a simple note, P2P networking involves sharing records and other valid files. Through the P2P network, materials such as movies and music can be shared. Though legal content is exchanged through these networks between users, it is also true that illegal content is transmitted between users through P2P networking. This raises the question on whether Internet P2P networks should be regulated. In response to this, Internet P2P networks require no regulation. This is because it is illogical and cannot mitigate the use of the networks for legal activities. Alternatively, illegal content is shared through phones but regulation cannot occur based on the boundary between monitoring and regulation. Thus, networks should regulate themselves and attempt on lessening the quantity of unlawful activity that takes place. If the network is utilized for illegal purposes, then the copyright owners should possess the freedom to track the users who share or apportion their materials illegally. Additionally, in the event that a P2P network set up by an organization for legal use is used illegally, then the organization should not be held liable. This is because it is virtually impossible to secure illegal material such as copyrighted material in a P2P network. This is because most material shared through P2P networks is illegal. Thus, it would be useless to hold the organization liable due to illegal access since the configuration used in the P2P network facilitates illegal use.

Post 2

Judging by the considerable number of results that arise from searching Internet Scams, it is important to access one site that provides information on such swindles. One of the sites that I visited was Scambusters.org. The address of the website is <http://www.scambusters.org/>. The site is considerably informative considering the miniature degree to which Internet scams are addressed regardless of the dynamic advancements encircling technology globally. The title of the discussion on the website attracted me at first. The heading which read, “Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?” captured my attention. This is because the website sought to provide information on the aspect of Internet scams on facilitating identity theft. Another feature of the website was based on its alluring introduction. The introduction is a rhetorical question aimed at persuading the user to ponder on the Internet swindles such as spam and junk mail that one usually encounters on the Internet and within their e-mail in-box. However, regardless of the website informing computer and Internet users on the negative effect of Internet scams, I could not help noticing the large amounts of insignificant advertisements that were plastered on both sides of the website. Such advertisements did not even relate to the subject matter and similarly possessed the same structure of Internet scams, spam, and junk mail that I usually notice whenever I access the Internet or view my e-mail account. In addition, the website does not provide comprehensive information on Internet scams. This is because much of the site is occupied by spam advertisements that are related and unrelated to the searched website. In this way, instead of discussing Internet scams, the website encourages the scams by extrapolating the advertisements.

Post 2b

Internet hoaxes comprise malicious programs and subliminal messages that are used in order to attempt on defrauding or swindling computer users. Usually, hoaxes are malicious and instruct computer users on deleting a record that is important to the operating system by asserting that the file is a malicious program such as a virus. Additionally, Internet hoaxes take the form of scams, which persuade the respective user to send confidential information or money. In order to gain information on Internet hoaxes, I looked for it using the Google search engine and the results were autonomous. However, I decided to peer into the Homeland Security Website, which is accessible through <http://www.dhs.gov/internet-hoaxes/>. My foremost impression of the website was based on its formal and official introduction. Unlike other websites, the Homeland Security Website did not possess commercials, sample pod casts or infomercials that are usually prevalent. Instead, the Website was particularly formal and did not advertise nor possess content that was unrelated to its subject matter. Secondly, the introduction of the website was formal. The introduction, which was “Internet Hoaxes”, was precise and did not highlight or display attractive outlines that were inconsequential and insignificant to the type of information that the website was relaying. Additionally, the contents based on Internet hoaxes were arranged in a formal and official manner unlike most websites. In this way, one could tell the difference between a government website and a peer website. Moreover, the information provided by the website relating to Internet hoaxes was accessible and helpful. This is because the website concentrated on providing unbiased and direct information relating to Internet hoaxes by using real-time examples of cases that involved the effect and implication of Internet scams in the contemporary era.

 

Post 3

Indeed, the development of software in the computer era has facilitated beneficial assistance in the performance of operations that require the involvement of a computer. It is evident that software provides computer users and individuals alike to achieve and carry out numerous activities with computers in order to satisfy the different and respective objectives. However, it is also evident that the use of software in the modern computer age initiates formidable ethical concerns involving software usage. Ethical concerns can be illustrated, for instance, if I was tasked with a project and the project required a software application that was costly to purchase, I would opt to use a copy of the software that my friend obtained from her dad at work. It is ethical because the software is unobtainable due to its exorbitant price. Additionally, if I do not use the software to conduct my project, then I will not fulfill the stated objective of the project and thus affect the results that I was to achieve from performing the project negatively. Alternatively, my answer would not change even if I were to borrow the software, install it, and then uninstall it from the computer after completing my project. This is because uninstalling it would be unwise considering that I may require the software for further usage depending on the flexibility of the software in performing the specified task. However, other means exist that can be used to complete the project without borrowing my friend’s software. One such means is using my friend’s computer since that will not require me to borrow and install the software on my computer. Instead, I will work on a schedule with my friend based on usage of the computer in order to avoid collision on time allocated to conduct the project. That way, I can carry out my project, finish it, and at the same time avoid installing the software on my computer.

 

Post 3b

The use of software has been encompassed by allegations of unethical use in order to facilitate assistance to the end user. To an extent, usage of software without considering the medium of acquisition of the software or the source of the software has induced piracy of software. Nowadays, softwares are pirated by malicious vendors in order to gain financial compensations or even personal satisfaction due to the unavailability of the softwares in the market. Because of this, I consider that it is illegal to use software that is illegally acquired without purchasing it from the legalized vendor. In the event that a new software application is costly and that I am supposed to conduct my school project using the software application, which I do not possess, then I will opt not to borrow nor use the software. Additionally, one of the main reasons that would coerce me not to take advantage of the software is the fact that the software required is taken from an organization and availed to individuals that are not part of the organization. This is illegal because it is software privacy. It is evident that the software is owned privately by the organization. Furthermore, purchasing the software indicates that the organization possesses a part of the copyrighted rights for the software and is therefore entitled to the benefits that come with the application such as usage and warranty. Hence, since the software is copyrighted, it would be illegal to install it on my computer. Additionally, even if I were to use the software to perform my project and then uninstall the software from my computer, I would not use it since it would be advocating for software privacy regardless of uninstalling the software because I have already used the application. One of the ways that can be employed in performing the project without borrowing the application is through cyber cafes. I can carry out the project in cyber cafes that own the software.

 

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00