WINPROTECT WINDOWS PROTECTION SOFTWARE

Type
Thesis
Category
CCS  [ Browse Items ]
Subject
windows 
Abstract
In our technology today, the use of security software in computer systems is one of the ways by which the users can secure their files through their personal computer. The major problem is how the Administrator can protect or avoid their data from unauthorized users using Windows protection software.
The proponents’ general objective is to develop a security software entitled WinProtect: Windows Protection Software. Specifically, it sought answers to the following questions: 1. To analyze and describe how the existing software Winlock Pro operates. 2. To adapt the capabilities of the existing software “Winlock Pro” in securing the entire computer.: 3. To develop a utility software that would: 3.1. Be able to restrict to certain file and directories. 3.2. Master password for over all security protection. Only the administrator can disable or enable the features of the software through its master password. 3.3. Has a system restriction, wherein control panel, command prompt, task manager, registry editor, etc. and will be disabled according to the choice of command by the administrator during software enable mode. 3.4. Employ a User-friendly environment. The interface of the proposed software easily pictures how the user can use and follow the direction in protecting the whole computer through the software’s security features, by means of graphical tabs and buttons. 3.5. Use the WinProtect, which is freeware software 4. To show that the proposed utility software is technically, operationally and economically feasible for implementation.
In order to come up with a substantial completion of this study, the proponents utilized various methods of research like Descriptive method, Library Research method, Survey Research Method and Creative method. The proponent also used analytical tools like Data Flow Diagram (DFD), Visual Table of Content (VTOC), Input Process Output (IPO), and Program Flow Chart in guiding the proponents during the development of the proposed software.
In conducting the research, data were collected for assumption, testing, from which results and conclusions were derived. To objectively evaluate the study, the proponents used the following data gathering instruments like interview, questionnaires, observation, and evaluation. 
Number of Copies

REVIEWS (0) -

No reviews posted yet.

WRITE A REVIEW

Please login to write a review.