Question A
Anti-Virus
In terms of security and convenience, Anti-virus offers the following aspects; running a computer without an antivirus that is either not installed or activated tends to be convenient to the user. In this regard, it appears to the user that he need not have to part with extra charges that come along the process of installing antivirus software. However, this benefit that users objectively rely upon does not last forever. The convenience, in most cases, is short lived. This is because In the case of virus attack on a computer or a laptop, it is obvious that it will result to loss of data. Information lost, especially in the event that the lost information was relevant to businesses, will heavily impact on the overall existence of a phenomenon that would have been secure had proper actions been taken by installing anti-virus software program (Huscar ). A mere appellation by the vague conveniences that come along side running a hardware device in the absence of software will have proved that it was not worth the cost paid.
Advantages of running Anti-Virus in an insecure mode
An insecure mode allows multiple users for the same program hence the charges that come along it are minimized. Cost sharing instances can be the resultant phenomena under discussion.
Running an Antivirus in an unsecure mode makes it quick for operations that come along the use of software. One does not have to log in and supply the hardware of the respective gadget with information. It is, however, time-consuming (Syngress).
Risks of running Anti –Virus in an insecure mode
Running an Anti-virus in an insecure mode creates a platform that increases virus attack risk and makes it plausible for the exchange of viruses between systems that are in proximity. This is possible in unsecured and open Anti-Virus systems because the computers can exchange information.
Similarly, running an Anti-Virus is insecure mode subject the anti-virus to a position that reduces its responsive effect in as far as it is functioning is concerned.
How to Change Settings of an Anti-Virus from insecure to secure mode
In order to convert an Antivirus software from an insecure mode to a mode that is secure and well functional requires several procedures. Firstly, In case your preference of an Antivirus is, for example Norton, purchase an authentic disk from a recognized and vilified shop .Secondly, switch on your computer then insert the disk in the machine. Once the computer, laptop detects the disk, go to the main menu of your computer or gadget under upgrading. Click on the icon that represents my computer. On clicking on this icon, the file will open displays the existence of an external source of information .Lastly, Copy the disk contents to the laptop or computer. Alternatively, you can go straight ahead to install the program by providing the key which entitles you to the secured use of the antivirus as opposed to group and open use of the program
Initially, my software was in an insecure mode. However, I have converted it to secure mode. I prefer that my laptop be in a secure mode all the time. The main reason for my preference is unlike previously when my laptop was in an insecure mode, my laptop operations and processing speed has been faster and more efficient than before.
Question B
Home wireless Access
As it regards security and convenience, home wireless access offers conveniences that may make the user overlook and disregard the essence of having a proper security system. Convenience is grounded along the justifications of; it is not cumbersome (Wireless Home Networking For Dummies). In this regard, security is not considered as a determinant factor in this case.
Advantages of having an Insecure Home wireless
An insecure wireless facilitates the use of internet with ease without unnecessary procedurals taking center state. In this event, time is well secured and guarded against any eventful venom of wasting it.
Insecure Home wireless is convenient since relatives and other relatives visiting can be able to use the internet as long as they were in the vicinities of the home. As a result, visitors and those people who object to getting to use services in relation to Wireless access can feel appreciated. In the long run, family and kinship ties are significantly improved and increased.
Risks of Running Home Wireless Access
It denies companies that are specialized in ensuring that their patent rights are regarded and given due appreciations because some people may just decide to use software bought by other people in a manner that violates moral obligations in the legitimate expectations of companies
Another risk associated with the use of Home wireless Access is that, it is likely to lead to a slowed discretion of services that are under emblements of Home Wireless Access. If the entire household finds it prudent to utilize the internet resource, sharing the limited resources depletes and decreases the importance of the envisioned sole purpose of the software.
Home Wireless Access from an insecure to secure mode
In order to change Home wireless Access from an insecure state to secure and more privatized position, the following process is needed; In the event that you are using a computer, search for an icon that has features that have networks. After pressing the identified icon, follow commands that are displayed in the window .All you need to do is apply your eyes, there are no circumstances that call for professionalism in the field under discussion. Make sure that you eventually select on the prompt that entails privatized networks .Thereafter, you can now set a password and a user name. In this case, the networks will be secured and limited only to a small number of users that are authentically recognized (Shwach).
Question C
Utilitarianism presupposes that something that is of thought offers best conveniences for the goodness of the society is the most desirable one in case one is faced with a challenging instance on what to do. In the context of the Anti-Virus, the instance of security and privacy is ethical. In this regard, directions from ethics dictate that, things that are deemed to offer a great assistance to the community as opposed to the creation of turmoil as circumstances should be encouraged and perpetuated The choice of the manufacturer of this system was that which was on the lines of insecure approaches. As it regards the concept of utilitarian, As my verdict , I place on board a recommendation which directs that, the managers of the company should pay due regard towards the diversification of their services to a secured position that salvages people
Works Cited
Huscar , Tony. Computer viruses and anti-virus warfare. New York: Ellis Horwood, 2009.
Shwach, Edie. Mobile Wireless Communications. New York: Cambridge University Press, 2010.
Syngress. Configuring Symantec AntiVirus Enterprise Edition. New York: Syngress, 2009.
Wireless Home Networking For Dummies. New York: John Wiley & Sons, 2010.
.