Chapter 32: Essential Software


Computer hardware by itself doesn't allow you to do much, but when coupled with the proper software, the system can run businesses, control your finances, and provide endless entertainment.

There are several categories of software; some are essential for maintaining a safe, functioning computer environment, others are productivity based, and others are simply fun.

The software that you include on your computer system depends on your budget and how you want to use the computer. This chapter provides a guide to some software to consider when setting up, buying, or updating a system.

Software for Accessing the Internet

The software for connecting your computer to the Internet is meant to be used in conjunction with an access account. So, there are actually two key decisions that you need to make in order to access the Internet. The first question deals with selecting an Internet service provider (ISP), and the second question deals with the software that you use to surf the Web.

An ISP is a company that has powerful dedicated computers (called servers) connected directly to the Internet. These servers provide features such as e-mail and hosting Web content, but before you can access these functions, you need to be connected to the Internet, and you need to pay the ISP in order to establish a connection.

CROSS-REF 

You can learn more about the details of locating an ISP and connecting to the Internet in Chapter 46.

Selecting a Web browser

Once you have access through an ISP, you can turn your attention to the software that you need to browse the Internet. The main piece of software used to view Web pages on the Internet is a Web browser. There are several different Web browser choices available, and all of them are free to download and use. The real cost of the Internet is the monthly fee for getting access to the ISP servers. The most popular available Web browsers include the following:

  • Microsoft Internet Explorer: Built into Windows, this browser is the most popular among Windows users.

  • Netscape Navigator: Owned by AOL, this browser includes special features for AOL users. You can download Netscape from http://www.browser.netscape.com.

  • Opera: This Web browser is available for all systems and can be used on cell phones and PDAs also. You can download the latest Opera Web browser at http://www.opera.com.

  • Mozilla Firefox: The Firefox Web browser provides security and the ability to add on new features. You can download Firefox for free at http://www.mozilla.com.

It's true that Internet Explorer is by far the most popular Web browser, but if you are having trouble with Internet Explorer or just don't like some of its features, you can always switch without any trouble.

On all Web browsers, users can enter a Web address (also known as a URL, which stands for Uniform Resource Locator) in the address bar at the top of the browser window. Entering a URL causes the browser to download and display the Web pages located at that address. Browsers also include Forward and Back buttons for navigating between recently visited pages.

The Favorites feature lets you save your favorite Web pages to a list that can be easily revisited. If you don't know an exact URL for the topic you want to research or the item you want to find, Web browsers also let you search the Web for sites by entering specific key words in the address bar. If there's a particular site that you want to access frequently, such as your e-mail package or an online shopping catalog, you can save its URL to a Favorites list. This list provides easy access by keeping the URLs of your favorite sites at your fingertips. Figure 32.1 shows Internet Explorer, where you can select these features from a toolbar at the top of the browser window.

image from book
Figure 32.1: Microsoft Internet Explorer includes a range of common browser features, making it easy to move around the Web.

Choosing an e-mail package

After you're connected to the Internet, you are able to send and receive e-mail using a separate e-mail package, or client. This piece of software may be one of the most used on your computer.

Windows includes Microsoft Outlook Express, but other e-mail clients are also available, including the following:

  • Microsoft Outlook: Bundled with the Microsoft Office suite, Outlook includes a wide range of features including content and time management, a rules-based engine, and features to organize and archive e-mail content.

  • Microsoft Outlook Express: Built into Windows, the Outlook Express e-mail client is a simplified version of Microsoft Outlook.

  • Netscape Communicator: Owned by AOL, this e-mail client includes special features for AOL users. Netscape's e-mail client is included as part of the Netscape browser; you can download it from http://www.browser.netscape.com.

  • Eudora: This e-mail client provides specialized customization features that make it a favorite of many users. You can learn more about Eudora at http://www.eudora.com.

  • Novell GroupWise: This e-mail package includes a robust e-mail client along with many scheduling and collaboration tools.

  • Lotus Notes: Used by large corporations around the world, Lotus Notes includes a suite of contact and communication tools.

  • Firefox e-mail: An e-mail client integrated with the Firefox Web browser.

Of all the e-mail client features, finding an e-mail client that is easy to use is one of the most important features to look for. It is also important to have an e-mail client that is secure and reliable. Figure 32.2 shows Microsoft Outlook Express, a relatively simple and easy-to-use e-mail client.

image from book
Figure 32.2: Microsoft Outlook Express is simple and easy to use.

CROSS-REF 

You can learn more about how to use an e-mail client in Chapter 46.

E-mail clients both send and receive e-mails. They also include an Address Book that makes it easy to select and recall the e-mail addresses of frequent contacts.

The more complex e-mail clients offer e-mail along with several integrated features for scheduling and planning your time. For example, Microsoft Outlook includes a Calendar feature, Tasks list, journal, and Contact list. All of these features are integrated to work hand-in-hand with the e-mail client, as shown in Figure 32.3. For example, the Calendar feature lets you add in important dates such as birthdays and anniversaries, and Windows notifies you on these dates with a reminder.

image from book
Figure 32.3: Microsoft Outlook includes calendaring, scheduling, and collaboration features.

A common collaboration feature available in most e-mail clients is instant messaging. This feature opens a text window where you can connect to other users that are online at the same. The text that you type and send is instantly relayed to the connected user and their response can be immediately returned.

One feature that is becoming more important is the e-mail client's ability to handle spam. Spam is any unsolicited message sent to your e-mail client. These e-mails, in addition to being annoying, can be a security risk. E-mail clients handle spam by searching for specific text phrases and routing these e-mails to a quarantined folder where they can be isolated and deleted. Most of the higher-end e-mail clients include these features.

Note 

Most e-mail servers have a limit on the size of attachment that can be sent via an e-mail. If the e-mail size is too large, the server typically sends a response to the sender's e-mail detailing the problem.

E-mails can include attached files. To attach a file to be sent with an e-mail, simply select the Insert image from book File menu or click the Attach File button (the actual command depends on the e-mail client that you're using). This opens a window where you can browse for the file that you want to send. The attached e-mail is listed at the top of the new e-mail.

If the attached file is one that Windows recognizes, then the icon for the application that opens the attachment is displayed along with the attachment's file name. If the file is one that Windows recognizes, you can double-click to open it using the identified application or you could right click on the file name and select an option to save the file.

Caution 

Attached files can be a risk if you don't know the source of the attachment. The best practice is to never open an e-mail attachment unless you know the sender and the file he or she is sending. If a harmful e-mail is sent to you and you delete it without opening any of its attachments, it can't do your system any harm.

Some e-mail attachments, such as pictures, can be embedded within the e-mail. Embedded files don't require a separate application to open and view them; you can view them from within the e-mail client.

Using Web mail

When an e-mail client is installed, it is typically placed and configured for the local machine only (the exception is for network installations). So if you're on a business trip and stop at an Internet café to check your e-mail, you won't have the same e-mail client available. Most ISPs include a Web mail client that works within a Web Browser. You can access Web e-mail clients by simply entering the ISP's Web address and logging into the client.

Once logged in, you can check for and send new e-mails. Checking e-mails using a Web browser makes the e-mails visible, but doesn't download them to the local computer. This way, when you get back home, the e-mails are still available for downloading to your personal computer's e-mail client.

Using firewall, antivirus, and other security software

When your computer is connected to the Internet, others connected to the Internet have access to your computer and data unless you've installed and configured software to protect your data. To help keep your computer and data safe, you need to install some software that makes it difficult for other users to get access to your files.

Enabling Windows Firewall

A firewall is a piece of software (or hardware in some cases) that monitors all programs running on a computer and prevents any outside programs from running on the local system. The latest version of Windows includes a firewall, or you could install a separate firewall package that has additional features.

To see the Windows Firewall settings, open the Control Panel and double-click the Windows Firewall option. This opens the Windows Firewall dialog box, shown in Figure 32.4, where you can enable and configure the firewall application.

image from book
Figure 32.4: The Windows Firewall dialog box lets you enable the firewall for your system.

To enable the Windows Firewall, simply select On. If the Don't allow exceptions option is enabled, every time you run a program a warning dialog box appears stating that the application is blocked from running. The warning dialog box includes an option to allow the program to run, but it can be annoying to see this warning every time you run a program.

The Exceptions panel of the Windows Firewall dialog box, shown in Figure 32.5, includes a list of local programs allowed to run without any warning. To add a program to the Exceptions list, click the Add Program button and select the program that you want to run.

image from book
Figure 32.5: The Exceptions tab of the Windows Firewall dialog box lets you identify programs that can run without any warning.

If you need to communicate with a single computer on the Internet or over the Internet (such as when playing a network game), you can open up a port to that specific computer using the Add Port button. This button opens the Add a Port dialog box, where you can name the connection and identify a port number. A port number is like an address to where the external program or computer can connect. If you're playing a network game, the game tells you which port it is looking to connect to.

Caution 

Many malicious computer users scan for open ports on your system as a way to get access. If you open a port, be sure to close it back up when you're finished or unwanted visitors could access your system.

Although enabling Windows Firewall is a good start, computer hackers are always looking for new ways to penetrate current security solutions. The Windows development team is active in identifying and blocking these security holes. The new security blocks are delivered as updates after they have been developed and tested. In order to keep your computer and data safe, you should regularly install these new updates.

CROSS-REF 

Information on finding and installing updates is covered in Chapter 31.

Protecting against virus threats

A computer virus is a small program intended to harm the data on a computer. Some viruses are created as pranks, but others are intended to destroy all the data on your system. Antivirus software can detect and eliminate potentially dangerous viruses and are necessary to keep a system safe.

There are different types of viruses, but they are typically categorized by their purpose and the way they propagate. Of all the various types of viruses, the more common viruses include the following:

  • Virus: Any program that attaches itself to other files or to the computer's framework (boot sector) to avoid detection and replicates itself to insure its survival.

  • Worm: A program that copies itself and spreads throughout the computer and to other computers using Internet and network connections or e-mail.

  • Trojan Horse: A file disguised as a valid file that acts harmfully when opened. Trojan horses often come through e-mail as attachments.

  • Hoax: An e-mail that instructs you to delete a dangerous file from your system, but the file that you are deleting is actually a needed system file.

  • Phishing e-mail: Another dangerous e-mail type states that there is a problem with your bank account or credit card account and asks you to log in, but the login is to a different site where the sender can steal your bank login information or credit card information, thereby getting access to your account.

Note 

The short list above is not a complete list of the possible threats to your system. New types of viruses are developed and launched all the time. To be safe, keep your security programs up-to-date and be skeptical of any unknown e-mails.

Although Windows includes a rudimentary antivirus offering, you want to purchase and install a full antivirus package. When looking for an antivirus package, look for one that has regular updates using the Internet. This insures that your system remains safe from new viruses that appear all the time.

Note 

Just as with all types of software, some antivirus packages are excellent and others are essentially junk. If you're concerned about the quality of the software package you are considering, look for reviews and ratings on various Web sites to find a quality package that fits your particular needs.

Another feature to look for is an antivirus package that can integrate with your e-mail client, providing security from viruses and spam coming through as e-mails.

The following list of antivirus software vendors includes offerings that are up-to-date and easy to integrate.

  • Symantec: One of the most popular antivirus packages is Norton Antivirus created by Symantec. You can learn about this package at http://www.symantec.com.

  • Grisoft: Makers of the popular AVG antivirus package. You can find more information about their products at http://www.grisoft.com.

  • McAfee: McAfee offers a suite of antivirus offerings, including an online antivirus solution that works by simply logging onto their site. Visit http://www.mcafee.com to learn more.

  • Computer Associates: CA's Antivirus suite offers protection from multiple virus attacks. You can learn more about CA's antivirus software at http://www.ca.com.

Note 

The above list is by no means comprehensive. Many Internet sites include lists of available antivirus software vendors.

Antivirus software such as Grisoft's AVG package, shown in Figure 32.6, includes control centers where you can search for new updates, scan the entire system, or configure the protection features.

image from book
Figure 32.6: Antivirus features are typically controlled using a command center interface.

CROSS-REF 

You can learn more about using antivirus software in Chapter 48.

Pop-up blocker

Another piece of security software that has become necessary is a pop-up blocker. This software prevents annoying advertisement Web pages from launching. Although there is nothing wrong with a single Web page being loaded to show some product that you may be interested in, some Web sites go way overboard, causing these Web page ads to launch faster than you can close them, bringing the system to a standstill.

Pop-up blockers can be installed as separate applications, or you can install them as a Web browser add-on. The latest version of Internet Explorer includes an integrated pop-up blocker. You can enable this feature using the Tools image from book Pop-up Blocker image from book Turn On Pop-up Blocker menu.

You can access the Pop-up Blocker Settings dialog box, shown in Figure 32.7, using the Tools image from book Pop-up Blocker image from book Pop-up Blocker Settings menu command in Internet Explorer. Using the Settings dialog box, you can set the Filter Level to Low, Medium, or High. The Settings dialog box also lets you enter Web sites where pop-ups are allowed.

image from book
Figure 32.7: The Pop-up Blocker Settings dialog box lets you specify Web sites where pop-ups are allowed.

Tip 

If the Filter Level is set to High, you can temporarily disable it by holding down the Ctrl key.

Adobe Reader and Flash

The Web is a text-based tool that displays information in its limiting format, but there are other data formats that display a more richly designed format. Two such products are Adobe Portable Document Format (PDF) and Adobe Flash.

Both of these formats require that you install a special piece of software within the browser before you can view them, the Adobe Reader opens PDF files and Flash files are viewed with the Flash player. Downloading and installing these viewers is as easy as clicking on a link; the Web browser doesn't even need to be restarted to work. You can download Adobe Reader and Flash Player for free from the Adobe site at http://www.adobe.com.

Viewing PDF files

Adobe Reader produces documents using the PDF format. You can view PDF files on a Web page or transmit them using e-mail, but you can only view them when using a freely available, specialized reader that can open and view these files.

Once you install Adobe Reader, you can open and view PDF files using the stand-alone reader, shown in Figure 32.8, or within a Web browser. You can search, print and zoom PDF files as needed. The key benefit of PDF files is that their formatting is retained just as the designers intended; once a PDF is created, it is a read-only document. Other viewers cannot alter it.

image from book
Figure 32.8: The Adobe Reader can view PDF files as a stand-alone application or within the Web browser.

Note 

Many software manuals are sent out as PDF files.

To create PDF files, you need to purchase a separate application, Adobe Acrobat, which can save documents using this format. Other Adobe products including Photoshop, Illustrator, and InDesign can also save files as PDFs. Microsoft Office can export documents with special add-on software installed.

Viewing Flash files

Another rich format type is Flash. Flash files are vector-based graphics, which create images using mathematically based lines and shapes instead of rows and columns of pixels, and can include interactivity. Flash provides a simple way to create animated sequences and video that can play on Web sites. Many Web sites use Flash content to spice up their site with games, animation, video, and interactive elements, as shown in Figure 32.9.

image from book
Figure 32.9: Flash files can add animation, video, and interactivity to Web pages.

Flash files, like PDF files, need a special piece of software installed in order to display and view Flash files. Although the Flash Player is free, you need to purchase the Flash Professional product in order to create Flash files.




PC User's Bible
PC Users Bible
ISBN: 0470088974
EAN: 2147483647
Year: 2007
Pages: 372

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net