Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
пособие(2).doc
Скачиваний:
133
Добавлен:
14.03.2016
Размер:
3.31 Mб
Скачать

1. Read the text and decide if the statements are true (t) or false (f).

1) Avast takes a minimalist approach with an interface that’s extremely straightforward and dead simple to navigate.

2) The “AutoSandbox” automatically isolates suspicious programs from the OS.

3) Running a full system scan with 30GB of data on a solid-state drive took 10 minutes with Windows Defender.

4) Avast clocked seven minutes and nine seconds to scan the same data.

5) You’re unlikely to notice a performance impact with either Windows Defender or Avast installed.

6) Windows Defender is better at detecting zero-day threats and adds a second layer of protection through its automatic sandbox mode.

7) Windows Defender and Avast tied in this bout.

Windows 8 ships with a new version of Windows Defender that’s supposed to offer the same level of protection as Microsoft Security Essentials. Along with other security upgrades, we’re left wondering if there’s any reason to saddle up with a third-party antivirus program. To find out, we compared Windows Defender with Avast, which as we discovered in last month’s antivirus roundup is a formidable ally to have by your side as you romp around the web.

Round 1: Interface

There’s a lot going on in Avast, so much, in fact, that you might not even notice that it doesn’t scan for potentially unwanted programs (PUPs) by default, a setting we recommend enabling as an added ounce of protection (which, as you know, is worth a pound of cure). To get the most out of Avast, there’s an initial time investment required to poke around all the settings and tweak everything just the way you want it. In stark contrast to Avast, Windows Defender takes a minimalist approach with an interface that’s extremely straightforward and dead simple to navigate. There are just four headings to browse – Home, Update, History, and Settings – none of which tries to upsell you on security; Avast does. In this instance, simplicity gets the nod, and so does Windows Defender.

Round 2: Features

Whereas Windows Defender is super simple to navigate, it comes at the expense of an expansive feature-set. There’s very little in the way of fine-grain control, limiting most of what you can do to including/excluding certain file types and locations, and whether or not you want to scan removable drives. You can’t even schedule a scan, at least not through the traditional UI. To do that, you need to open up the Windows Task Scheduler and configure it through there. That’s lame. Avast, on the other hand, offers a much bigger toolbox. The “AutoSandbox” feature alone, which automatically isolates suspicious programs from the OS, wins this category for Avast. There’s also a remote assistance feature for troubleshooting family and friends who are running Avast, plus browser plugins, and more.

Round 3: Scan Speed

Windows Defender uses the same pokey scan engine as Microsoft Security Essentials, and since there’s no easy way to schedule scans, it’s even more problematic. Running a full system scan with 30GB of data on a solid-state drive took 20 minutes with Windows Defender, and subsequent scans took just as long. That’s an indication that Windows Defender doesn’t skip over files that haven’t changed since the last time they were processed. Avast clocked five minutes and nine seconds to scan the same data, and though it also didn’t get any quicker during subsequent scans, it’s still significantly faster than Windows Defender. Plus, you can easily schedule scans in Avast to run during times when you’re not sitting at your PC, such as after-work hours (assuming you leave your PC on 24/7).

Round 4: Performance Impact

Good news for both programs. If you’re rocking a solid-state drive with Windows 8 on a relatively modern machine, you’re unlikely to notice a performance impact with either Windows Defender or Avast installed. We slapped a 120GB Kingston SSDNow V300 drive onto an Asus P6X58D Premium motherboard with an Intel Core i7-930 processor, 4GB of DDR3/1333 RAM, and a Radeon HD 5850 graphics card. Boot times were virtually unaffected, with Avast introducing a startup penalty of just a few seconds. On the flip side, we recorded 4,035 in PCMark 7 with Avast installed versus 4,011 with Windows Defender. If this were a presidential race, it’d be too close to call. Subjectively, surfing the web and opening up programs felt equally snappy regardless of which AV program was running.

Round 5: Protection

Windows Defender needed to pull out a win in this round to keep the race interesting, but it doesn’t have the legs to compete with Avast. Using our own collection of malware, Avast detected twice as many dirty files as Windows Defender, though that might have to do with the way each program counts individual files within an infected archive. In both cases, Malwarebytes detected infections that both Windows Defender and Avast missed. However, Avast is better at detecting zero-day threats and adds a second layer of protection through its automatic sandbox mode, which Windows Defender lacks. Finally, we’re a little wary given that Microsoft’s antimalware engine is having trouble passing certification with AV-Test (www.av-test.org), a well-known independent testing laboratory. All things considered, this crucial round goes to Avast.

And the Winner Is…

Avast wins this bout by taking three of the five categories and tying in another, though it’s not quite as lopsided as it appears. Windows Defender, while not as fully featured as Avast, is capable of blocking common threats, and it doesn’t put a drain on system resources. Avast’s army of defenses is just bigger and better trained to spot danger from more places, like IM clients. It also has a bigger arsenal of weapons.

2. Work in pairs and find out what security program your groupmate’s computer has. Does it function well? If you have different programs, try to persuade your partner to change for yours. Give some reasons.

Text 7

IT ON A SHOESTRING

1. What does the title of the text mean? Choose the right variant:

a) Making bussiness with IT specialists;

b) Creating new IT;

c) Hiring IT staff for little money.

2. Read the text and match the paragraphs (A-F) with the headings. One heading is odd.

1) Networking; 2) Storage & Communications; 3) DIY Security; 4) Do IT Right; 5) Recent developments; 6) All IT Entails; 7) Mobile Devices.

No IT Staff? No Problem

Many small businesses, start­ups, and SOHO operations don't have the cash flow to hire a dedicated staff of IT (informa­tion technology) specialists, or even a single person tasked with handling the more technical aspects of run­ning a business. In this article we'll describe some steps you can take to ensure that your business can com­pete effectively with organizations that do have dedicated staffs.

a) __________ IT is a catch-all phrase that encom­passes email, phone systems, mobile devices, networking and the Inter­net, customer relationship manage­ment (CRM), desktop PCs, security, the software required to keep all of the above operational, and the busi­ness software required to perform any and all business-related functions. No 21st-century organization can func­tion without most of what IT brings to the table. In order to keep up with your competitors, you need IT, and there are numerous third-party prod­ucts and services out there designed to help you meet those needs without actually hiring a dedicated staff.

b) __________ The most valuable assets of most businesses are digital, which makes them vulnerable to cyber theft, dis­gruntled employees with a thumb drive and an axe to grind, or just unwitting employees who are un­aware that their actions are putting the company at risk. Widely avail­able business-centric security suites are characterized by proactive tech­nologies that block Web threats, malicious links, spam, and viruses; thwart hackers and cybercriminals; and prevent data loss. You can find advanced security software that lets non-tech-inclined users tackle the securing of mail servers, PCs, and Macs; cloud-based security solu­tions that effectively outsource the secure management of the digital assets; and security clients that you can install on PCs, Macs, and mo­bile devices to easily manage secu­rity on a device-by-device basis.

c) __________ Have more employees, printers, and servers than can connect to a single consumer-centric router? Then you need something designed to handle the rigors of a small business. But that opens up even more vexingly complex questions, such as: Do you need a router, a switch, or a managed switch? Thankfully, many networking product manufacturers have tools aimed squarely at folks in your same situation—routers, switches, and managed switches that support as few as four wired Ethernet ports and up to as many as you need. Some small-business networking gear also features Wi-Fi with advanced secu­rity and encryption technologies and many even support the ability to tap into 3G/4G cellular networks. Best yet, many of these products are built with ease-of-use and minimal main­tenance in mind.

d) __________ Enterprises have long known about the benefits of mobile devices in the workplace, but even small businesses can benefit from the in­creased productivity that comes with your employees using tablets and smartphones. It's important to develop policies around these de­vices and to take advantage of the multitude of tools that let you retain some control over the apps that are installed and sites that are accessed. Another important consideration is the increased network load you'll experience once your work force is fully unwired.

e) __________ Your organization's email, tele­phony, data sharing, video confer­encing, and instant messaging plat­forms don't necessarily have to be separate systems. Unified communi­cations providers that once catered exclusively to large enterprises now offer pay-as-you-go packages that are ideal for small businesses. Al­most all cloud-based storage service providers now offer tiered plans that let you expand or contract your stor­age needs as needed, so on-site serv­ers are no longer necessary. These outsourced products also benefit from enterprise-grade fail-safes and expert technical assistance, should the need arise.

f) __________ While it may have been unheard of just five years ago, running your busi­ness without a dedicated IT staff is not only possible, but sometimes even preferable for small organizations. Cur­rently, almost any technology available to enterprises also has a pay-as-you-go option that's sure to meet your needs and keep your business going in the right direction.