Which WARE is where?
An Intro to the many "WARES" in I.T.
What is a Ware?
A ware is generally defined as a good or product, when discussing technology however, ware is employed as a suffix and combined with a word to describe a type of a computer product.
Hardware is any physical element of a device. Both external and internal elements qualify, such as monitors, keyboards, hard drives, and microchips. Hardware is considered the receiver, capable of receiving and carrying out instructed tasks but unable to function without direction.
Hardware is a great starting point for a device, however, unless software is installed to instruct the computer to carry out tasks, it is just a centerpiece. Software tells hardware both WHAT to do and HOW to do it. A few examples of software are video games, photo editors, and web browsers.
Good wares rely on each other
While each form of ware has a specified function, hardware and software rely on each other to successfully execute on that function. Hardware without software is simply a lifeless device. On the flip side, software without hardware represents instructions with nothing to give instructions to. Hardware and software ultimately need each other and together can make all kinds of digital endeavors possible.
Malware (The Bad Ware)
Here is where ‘ware’ gets mischievous. Malware is an umbrella term describing any type of software with malicious intent. Malware comes in a variety of different formats, each with its own unique way of infiltrating a device. This type of software can originate from malicious websites, phishing, or shared networks.
How to stay safe from the bad ‘wares’:
→ Use Antivirus Software: Preventative actions are key when dealing with malware, install a preventative software, a digital shield of sorts, to protect your files from harmful ‘wares’.
→ Be Cautious: Always use your best judgment when interacting with the internet; if something seems too good to be true, a non-reputable website is asking you to download a file, or if your device connects to a public network, make sure you exercise caution.
→ Back Up Your Work! Some malware can cause irreversible damage to your device, resulting in lost information and work. Make sure you backup your files frequently.
Scams Target you and your device
Scammers are everywhere, so it is important to always stay vigilant when using the internet. The most effective scams use targeted tactics to scam unsuspecting victims. The most common scams at Binghamton University are Emails about job opportunities, Phone Calls stating an individual’s Social Security Number has been compromised, as well as being contacted via Social media. If you receive or know of a scam message in circulation please report it to email@example.com and CC firstname.lastname@example.org and check out the ITS Phish Tank for an updated list of phishing scams on campus. Stay Safe Bearcats!