Documente Academic
Documente Profesional
Documente Cultură
Elk Cloner (1985), the first personal computer virus on the Apple IIe which
was created by ninth graders.
The Internet Worm (1985), written by someone at Cornell University who
brought the Internet
Pakistani Brain (1988), this is the first virus that infects IBM PC. Written by
two brothers from Pakistan and was covered extensively by the media.
Jerusalem Family (1990), about fifty different strains of the virus is
believed to have originated from the University of Jerusalem.
Stoned (1989), is a virus that is widely known in the first decade of the
virus. Stoned is the boot sector / infector. Mbr reboot that will count the
number of the original infection and displays the phrase 'your computer is
now stoned'.
Mutation Engine Dark Anger (1990), was actually written in 1988, but was
first used in the early nineties in viruses like Pogue danCoffeeshop.
Micheangelo (1992), a variant of the Stoned, with a destructive payload.
World Concept (1995), macro viruses in Microsoft Word first. Word Concept
will issue a phrase, 'That's enough to PROVE my point' and is present in
the second era of computer viruses.
Cih / Chernobyl (1998), is the most destructive virus ever. Occurred on the
26th of each month (depending on which version is involved), remove the
hard drive, and eliminate the flash ROM BIOS of the computer user.
Melissa (1999), the first major virus that spreads via email, at the
beginning of the era of Internet viruses.
Lovebug (2001), the most popular e-mail worm ever.
Code Red (2001), named for a high-caffeine drinks, the virus is not spread
through the network email or web page.
Nimda (2000), a virus dubbed 'Swiss Army Knife', used as buffer overflows,
email, network share, and ten other methods to get into the network
Bagel Netsky (2004) the virus is designed to show a fake competition, or
battle each other.
Botnets (2004), infected computers that can be repeated in the network to
run the spam, infect new people, and steal data.
Zotob (2005), this worm only affects unpatched Windows 2000 systems,
but managed to take some major media sites, including CNN and the New
York Times.
Rootkit (2005), they have become one of the most popular means of
stealth in malicious code. It is used to make other malware invisible to the
operating system.
Storm Worm (2007), viruses go through thousands of iterations eventually
creating the largest botnet in the world. At one time it was believed that
more than fifteen million infected machines at the same time, and under
the control of the criminal world.
Italian Job (2007), more than malware. Italian Job is a coordinated attack
using a packaging tool kit known as MPack.
Top 10 dangerous malware:
April, 2013
1. Troj/Invo-Zip
2. W32/Netsky
3. Mal/EncPk-EI
4. Troj/Pushdo-Gen
5. Troj/Agent-HFU
6. Mal/Iframe-E
7. Troj/Mdrop-BTV
8. Troj/Mdrop-BUF
9. Troj/Agent-HFZ
10.Troj/Agent-HGT
www.pcclinicsite.com
June, 2013
September, 2013
11.Troj/Mdrop-DKE
12.Troj/Sasfis-O
13.Troj/Keygen-FU
14.Troj/Zbot-AOY
15.Troj/Zbot-AOW
16.W32/Womble-E
17.Troj/VB-FGD
18.Troj/FakeAV-DFF
19.Troj/SWFLdr-W
20.W32/RorpiaMemA
www.pcclinicsite.com
21.Troj/Invo-Zip
22.W32/Netsky
23.Mal/EncPk-EI
24.Troj/PushdoGen
25.Troj/Agent-HFU
26.Troj/Mdrop-BTV
27.Mal/Iframe-E
28.Troj/Mdrop-BUF
29.Troj/Agent-HFZ
30.Troj/Agent-HGT
Source: Sophos
RAD is especially well suited (although not limited to) developing software
that is driven by user interface requirements. Graphical user interface
builders are often called rapid application development tools. Other
approaches to rapid development include Agile methods and the spiral
model.
ECRM
CRM focuses on providing and maintaining quality services for customers by
effectively communicating and delivering products, services and solutions to
address customer problems.
It includes:
1. Call Handling
2. Sales Tracking
3. Transaction Support
The link between customer satisfaction and the ROI (Return on investment) is the
profit for a company as shown in the following figure.
Customer
Satisfaction
Customer
Commitment
Customer
Tracking and Analyzing Data
Retention
2. Personalization
3. Contact Centers
Tracking and Analyze data:
1. Log file Analysis
Profit
2. Data Mining
3. Customer Registration
4. Cookies (A small text file (up to 4KB) created by a Web site that is stored
in the user's computer either temporarily for that session only or
permanently on the hard disk (persistent cookie). Cookies provide a way
for the Web site to recognize you and keep track of your preferences.)
Contact Centers: Frequently Asked Questions (FAQs), E-mail, Online Text
Chatting, Speech Synthesis and Recognition, Voice Communications.
Phases of CRM:
Customer acquisition management is the set of methodologies and systems to
manage customer prospects and inquiries generated by a variety of marketing
techniques. ... Customer Acquisition Management can be considered the
connectivity between advertising and customer relationship management
Definition: Enhancement
A change or the process of change, brought about, to improve a product or
service and to increase its value, is known as enhancement. A variety of
enhancements can be used in business to increase the efficiency and
effectiveness of different processes and functionalities.
Here, we will focus on some of the important enhancements, commonly used in
the industry.
Enhancing customer experience:
Better the customer experience, more is the customers loyalty towards a brand.
Enhancing the experience of existing customers is preferred to finding new
customers, because of the cost-effectiveness and profitability factors. Some
strategies employed for the enhancement of customers experience are:
Organize delivery schedule to deliver the products on time, as per the
requirements of the customers
Problems should be identified and resolved as quick as possible
Building relationships, on a personal level, with the key customers
Using technology, wherever possible, to improve the service quality offered to
the customers
Giving adequate customer service training to the staff on a regular basis
Use social media as:
Relationship
Marketing
Discrete transactions
Continuing transactions
Short-term emphasis
Long-term emphasis
Acquisition focus
Retention focus
Share of market
Share of mind
Adv of in house:If successful it can fulfill the exact demand, Greater control over
the system, Secured
Disadv of in house: Requires expertise, Requires proper hardware, software,
networking components and also adequate office space, Time consuming
Levels of outsourcing:
Appointing a company to develop the entire system
Buying a pre-packaged solution
Outsourcing the front-end application
Outsourcing the database
Using the ISP for connecting to internet
E-mail handling and response
Electronic payment system
Adv of out sourcing:
No need of in-house expertise
Reduced risk of failure
Savings in terms of time and money
Dis adv:
Loss of control
Poor service level agreement
Conflict between management
Server: A server is a host on the internet that manages network resources and
fulfills requests from clients. There are many types of servers1. Web servers
2. E-mail servers
3. Database servers
4. File servers
5. Print servers
DNS (Domain Name System): It serves as the e-commerce stores virtual location
on the web such as http:// www.philanthropy.com
Stores all of the website content on its servers, which process all of the
information trafficked to and from the website
Shared Server Hosting: Many websites are placed on the same server.
It is the cheapest alternative for small businesses.
E-commerce Hosting
Functionality
Reliability and Bandwidth
Security
Backup and disaster recovery
Cost
The Seven Design Elements of Customer Interface
The 7C framework: Context , Content , Community
,Customization,Communication,Connection,Commerce
Context: Sites layout and design,Content: Text, picture, sound and
video,Community: User- to - user communication,Customization: Ability to
tailor the website,Communication: Two way communication between site and
user,Connection: How the site is linked to other sites,Commerce: Capabilities
to enable commercial transactions.
Web content development tips: Stay fresh,Be relevant and unique.Make it
easy to find.Serve a smorgasbord of content.Deliver content everywhere.
SDLC:
Whats important in application development?
Three key components of an IS application are
The Data
The way Data Flows
The Processing Logic to manipulate data and produce information
for decision making
Systems Development Life Cycle (SDLC):
Traditional methodology for developing, maintaining, and replacing
information systems
Phases in SDLC include
Planning
Analysis
Design
Implementation
Maintenance