TASK 2.
2:
        Internet and World Wide Web: Search engines, Types of search engines,
                             netiquette, cyber hygiene
      Aim: To know and use of search engine
      Requirements: Desired configuration for the above task is:
                                      The configured personal computer system
                                      LAN and internet facility
      Software: Licensed version of windows XP
      Search Engine:
            A search Engine is a software program that searches a particular piece of information ,
      according to the specified criteria .
      We all known amount of information available on the web is huge.
      It is not an easy task to keep track of all the web sites present on the web.
      Most of us are not even aware of the names of the sites available on net. Even if we know the
      names of few sites, it is quite possible that we do not remember them tomorrow.
      Today, there are number of sites that let you specify the criteria of your search and
      immediately you provided with a list of sites matching the criteria.
      In a survey conducted by Nielsen /Net ratings, it was found for that the year 2002, the
      two most popular search engines for navigating the web were – Yahoo and MSN.
      Some other popular search engines are Google, Alta Vista, Look Smart and Nescape
      etc. Some of the search engines are shown below:
Components of a Search Engine:
    There are three components that work together to provide us with the search results.
    They are – the Robot, the Database and Search Form
Robot:
Also known as Spider or Bot, this is a program that automatically navigates the various
hypertext structures on the web. It makes a move like a robot spider and retrieves and lists
the various web pages .
Database :
 A data base is a repository to store and manage the information .Oracle ,Microsoft SQL
server are some of the databases management system that are used to configure and
manage the database.
Search form:
This is an interactive form, which is used by a visitor to make a request for some information.
This mainly consists of textbox and submit button.
CYBER HYGIENE
        A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes. Viruses can also replicate
themselves. All computer viruses are man-made.
        These malicious little programs can create files, move files, erase files, consume your
computer's memory, and cause your computer not to function correctly. Some viruses can
duplicate themselves, attach themselves to programs, and travel across networks. In fact
opening an infected e-mail attachment is the most common way to get a virus.
Categories of computer viruses:
The three broad categories of viruses are
    1. File Infectors
    2. System Infectors
    3. Macro
viruses File
Infectors:
        Some file infector viruses attach themselves to program files while some can infect
any program for which execution is requested. When the program is loaded, the virus is
loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent
as an attachment to an e-mail note.
System Infectors:
        These viruses infect executable code found in certain system areas on a disk. They
attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. A typical
scenario is to receive a diskette from an innocent source that contains a boot disk virus.
Macro viruses:
        These are the most common viruses, and they tend to do the least damage. Macro
viruses infect our Microsoft Word application and typically insert unwanted words or
phrases.
        We all know it's hard enough to get a computer to work well when it is healthy, let
alone when it has been attacked by a virus. Therefore, it is better to prevent an attack than to
try and cure it.
Anti-virus:
        Anti-virus is the name given to software that detects and (where possible) removes
viruses from messages. By removing viruses at the email server, all internal mail clients are
protected AND all customers are protected from receiving viruses too.
        Computer Viruses are written by people who wish to gain control of your system
resources and are continually updated to try and break through any barriers you may
have installed.
GMS Anti-Virus overcomes this issue by providing a "signature file" update service which
ensures that all new variants are caught as soon as possible.
        There are many antivirus programs available that scan incoming files for viruses
before they can cause damage to your computer.
        McAfee http://www.mcafee.com/
        Norton http://www.symantec.com/
        ESET NOD32 http://www.eset.com/
        Quick Heal http://www.quickheal.co.in/
        Kaspersky http://www.kaspersky.com/
        Webroot http://www.webroot.com/
        F-Secure http://www.f-secure.com/
        G Data
        Trend Micro http://us.trendmicro.com/us/home/
        Avast! http://www.avast.com/
        Zone Alarm http://www.zonealarm.com/
        PC Tools Antivirus
        Vipre Antivirus
        K7 Antivirus
        Norman Antivirus
        CA Antivirus
        F-Prot Antivirus
How to install Kaspersky Antivirus:
Step1: First of all, you need to download Kaspersky Antivirus. Make sure to save the setup
file on your computer and then open the file, the following picture will give you an idea about
the setup icon:
            We advise you to close all other applications before continuing
Step2: Open the setup file, now you‘ll see a window that that says "Welcome to
Kaspersky Anti-Virus 2010 Setup Wizard". This wizard will install Kaspersky Anti-
Virus 2010 (9.0.0.463) on your computer. Click on the "Next" button to continue.
       Here, Click Next to continue installation. Click Cancel to exit Setup Wizard
       Select "Custom installation" if you want to change settings during the installation
       (this is recommended for advanced users)
       Step3: Read the license agreement carefully and if you agree with all terms and conditions
       listed, click on the "I agree" button to continue.
                        Step4: Again, a second window tells you to read the following terms of participation in
Kaspersky Security Network. If you agree with all of these terms make sure to check the little box called "I
accept the terms of participation in Kaspersky Security Network " and click on "Install" button.
       Step5: The antivirus will start to install on your computer and it may take a minute or two
       depending on your computer performance (it took approximately 2-3 minutes), in the
       meantime you will probably see a temporary window that says "Installation in progress".
Step6: Finally after the temporary installation window closes you will see a window that asks
you to activate the application. Since we don't have a commercial license yet, we want to test
the application for a full 30 days trial before buying the antivirus. So, choose the second
radio button called "Activate trial license" and then to click on the "Next" button.
Step7: You need to have an available Internet connection since the antivirus will
connect to the license server and ask for a 30 days trial license. In a couple of seconds
you should see a message that says: "Activation procedure completed - Key file is
successfully installed". So you can test now this antivirus for 30 days. To continue
choose "Next".
Step8: The installation is complete, however there is something that you need to do before
scanning your computer or benefit from all features of this antivirus. In the following window
make sure that the box "Start Kaspersky Anti-Virus" is checked and then click on "Finish"
button.
When Kaspersky Antivirus will run for the first time, you will notice a "pop-up" window that
displays a warning message: "Databases are obsolete" - "Update now". You may ignore this
message as we are going to update the antivirus databases right away.
Step9: Here it is, Kaspersky Antivirus running for the first time on your PC. As you can see it
is a large red bar that warns you: "Your computer security is at risk - Databases are obsolete" and
you need to click on the "Fix it now" button or choose to go to "My Update Center" as this is
going to the same place - to the place where you can update your antivirus database
manually.
Step10: Now if you clicked on the "Fix it now" button or (on "My Update Center" you will see
a small link that says: "Start Update" click on "Start Update" ) the Update will start on your
computer and it will end when you will see 100% completed.
Step11: To start a full scan click on the left panel on the second tab
called "Scan My Computer" and you should see a group of tasks. You
need to click on the first one called "Start Full Scan" and the antivirus
is going to start scanning all your files and folders from your computer,
and takes a couple of hours if your hard drive is large and you have a lot
of files and folders.
Step12: if you click on the "Default values" button it will modify them
but I am recommending you to select all of them since it will increase
your protection level, just check the "Select all" box. Again, press on
the "Next" button to continue with our configuration.