Go Premium for a chance to win a PS4. Enter to Win

x

Software-Other

37K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.

Share tech news, updates, or what's on your mind.

Sign up to Post

Is there any downloadable software for Windows or for other devices connected to our network (such as cell phones)that would detect devices that are sending out SPAM.  Our internet provider has suspended our outbound email services until they know that we've fixed the problem.  I'd like to test all devices on the network to find out the source of the spamming.  Any ideas?  
0
 
LVL 26

Expert Comment

by:Fred Marshall
My first thought would be to set up the following if you don't already have it:

- Create a mirror port on your most central switch - or the equivalent on your firewall.  Connect this to a workstation or laptop for monitoring.
- Install Wireshark on the monitoring computer.
Monitor the traffic on the outgoing port of the switch or the incoming port (LAN) on the firewall.
This should determine the IP addresses that are generating traffic of the sort you are interested in.
Perhaps off-hours logging would be the most revealing.
I've run logs like this with round-robin log file creation for days on end.
0
 
LVL 14

Expert Comment

by:Ben Personick (Previously QCubed)
Setup an SMTP server (such as the free one included in windows under IIS) to act as a relay.

Point all of your actual applications that sdnd mail to this relay.

block all devices (except the IP pf the mail relay) from having port 25 ourbound.

Now you can be pretty muxh assured that anything else which is sending email is blocked, and you can review the smtp logs of all devices which de relay through your local smtp relay server, allowing tou to troubleshoot connectivity and locate any abusive systems.
0
Free Tool: Site Down Detector
LVL 11
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Open source cloud
Foss is a very good open source cloud support software like other software openstack,cloudstack,euckaly plus,synnefo,openqrm,openshift,cloudfoundry, docker.FOSS is more realiable and easy to install.
0
I see this over and over and over in here:  "Windows 10 forces me to update and my decade old legacy software won't work with the newest updates"

I wonder if these poor souls can connect the dots.

They turned off Windows 7 Updates to keep their legacy software running, and then they complained to Microsoft that their machine was hacked. It was hacked because security updates were turned off.

Microsoft's response:  "We have had enough!  New systems will update like it or not"

Is this any surprise to anyone?
1
 
LVL 51

Expert Comment

by:Jackie Man
Pull off the access to the Internet is the only way to keep legacy application working...
0
Cyber News Rundown: Edition 11/10/17

CyberNewsRundown.jpg
UK-Based Cryptocurrency Hit By Cyberattack

Prior to the official launch of Electroneum, a UK-based cryptocurrency that uses smartphones for its mining process, was targeted by a DDoS attack that shut down both the website and the app for several days. The attack effectively blocked all users from accessing their accounts, as the entire network was forced offline, to ensure the safety of investors’ funds.

Canadian University Held for Ransom

In the past week, officials have been working with affected students to secure their personal information after hackers breached the university’s systems and gained access to student records. The university has since taken its email system offline, as the hackers were spreading the leaked information throughout the email lists. Along with the data circulation, the hackers also demanded the university pay a large ransom of roughly 23,000 USD within 48 hours, though officials are still uncertain when the breach itself occurred.

WaterMiner Cryptocurrency Mod for GTA 5

As more cryptocurrency miners are embedded in software, one Russian hacker has gone a step further by exploiting a mod for the popular game Grand Theft Auto 5. The exploit silently uses a computer’s power to mine digital currency and, with the help of a modified version of the XMRig miner, can hide itself if it suspects monitoring software is active.

More on the Webroot blog here.
0
3
What can you benefit from moving Program files from C drive to D drive?

Can you simply move a program file from C: to D: ? In Windows, programs aren’t single files. Often, they’re not even found in a single folder, but rather in dozens of places on the hard drive. The file locations are referenced troughout Windows, which means that moving any of them would cause the program to fail. A simple file-move operation will be unsuccessful. Or will you manually uninstalling them and reinstalling to the D drive? Obviously, it’s not a good way especailly when there are a lot of applications installed on C drive.

Then, what is the best way? I think a third-party data migration software can make things much easier. Such programs are usually capable of dragging and dropping the program files from C drive to D drive safely and quickly. Here, EaseUS Todo PCTrans is recommended for its easy-to-use feature. It can help you transfer data and application to new PC/OS in simple steps in Windows XP/Vista/ 7/8/8.1/10 & Server 2003/2008/2012. All programs files like Facebook, Photoshop, Movie Maker, installed games, etc. that you downloaded from website and regarded as third-party software are supported.

Capture.JPG
ToDo PCTrans
0
 

Expert Comment

by:lpii
I would uninstall and reinstall the programs.  As you said, files are stored in different locations on the C drive, but there are registry entries that are created in every program's installation as well that point to those files and directories.  There maybe software that analyzes the software completely to move it, but if you have the software, I would uninstall and reinstall and pick your D drive and you won't have to worry about the software missing anything.

The advantage of installing on a different drive is if you are running out of room on your C drive, which can cause a slow down in your PCs operation.  If you have the room on the C, I would leave them on C, unless you are trying to organize your drives by having an app drive.

Most transfer software that I have used has been to transfer a complete drive to a new drive, not selected programs.  The transfer software images the disk and transfers it to the new drive (usually done because I've purchased a larger drive for my C drive).
0
 
LVL 15

Expert Comment

by:William Fulks
This reads more like an article than a question. Did you post it in the wrong category?
0
Looking for some feedback regarding whether or not to upgrade to the iPhone 8.
Pro: Financially, under Verizon's new billing system, it's only ~$2 more/month for the iPhone 8 compared to the iPhone 7 and as fast as they release new phones, it makes sense to get a newer version, if possible, so that the machine will work well with software releases.
Con: The new charging method of the iPhone 8 worries me. Wonder if the glass backing will make this phone more susceptible to breaks.

I've done some research (like this article) but curious for opinions one way or another to help me in this purchase conundrum.
0
 
LVL 1

Administrative Comment

by:Erin Wooddell
iPhone 6, Verizon. I'm about 9 months overdue for my 2-year upgrade.
0
 
LVL 3

Expert Comment

by:famousnametaken
Verizon's 'upgrades' are not what they used to be.  All you're being enticed to do is to is get a new phone and pay them monthly on their Edge plan.  That's fine.  I don't like two year agreements anyway.  And the phone trade in can be lucrative if you don't mind having an added monthly payment to your bill.
Go to Verizon's website and login to your account.  You should be able to get a nice trade in value for that phone towards an 8.  

I watched the Apple keynote a while back about the iPhone 8.

Start at 55:55
https://www.apple.com/apple-events/september-2017/

'Most durable glass phone in a smart phone ever'
'water and dust resistant'
'better retina display'
'new speakers'
and on and on.

Sounds like a great phone to have and I would be interested in getting one when I have enough money haha.

iPhone X imo won't be worth getting unless you're adamant about using their facial recognition AR heh.  Its so weird to me they went from 8 to 10.  *shrug*
0
Let’s learn something new is the term known Error Database. What is this KEDB? And how it is connected to software testing world?

The key to progress lies in climbing the stairs step by step, instead of a single jump skyward. Approaching slowly and carefully expects knowledge to be stored, utilized and enhanced. In Information Technology Infrastructure Library one such tool that enables associations to make this progress is the Known Error Database.

What is a Known Error Database Tool?

A known error database is a database that portrays the majority of the known issues inside the general frameworks. It depicts the circumstances in which these issues show up, and when conceivable, it offers a workaround that will get the client around the issue and back to profitable work. The configuration management system is part of known error database.

This database also turns out to be a part of the general Problem Management Database, where IT can go to distinguish and organize issues that need perpetual resolutions. Workarounds are just impermanent fixes with the goal that work can precede until the point when issues are definitely settled.

The ITIL known error database must incorporate screenshots of the issues, and additionally the content of error messages, and portrays the issue from the perspective of the client.

Advantages of a Known Error Database

IT groups inside undertakings build up a known error database format as it offers …
0
A weird Windows 10 issue I have not seen before.

Yesterday morning I started as normal but there was no internet. Bah Humbug!  I use my Rocket Stick to get morning email and head to a client. 4:00 pm there was still no internet.

I got home, reset the modem and internet came back. That was about 7:00 pm. I restarted everything: Modem again, router, wireless, printer and both computers.

The printer worked on my Desktop but my laptop said "out of paper" No, it was not. Standard troubleshooting steps did not resolve the issue. So I did a Driver Repair (Programs and Features). I have done this before.

Now here is the weird issue:  Restart (have to) and the display turned upside down!. No tablet controls would fix this. The only fix I could beyond what I did was to restore to the prior point. I did this (20 minutes) and that fixed the display. I spent some time updating software that got lost in the restore and all is well.

But I have not seen anything like this before. New territory.
0
 
LVL 15

Expert Comment

by:William Fulks
I'd check to see if your tablet installed any new Windows Update or vendor updates overnight. Might have picked up something buggy that screwed with your drivers.
0
 
LVL 99

Author Comment

by:John Hurst
I think the Printer repair step went wrong.

The laptop was fine; repair printer - weird problem; roll back and fine.

I don't know why the repair went bad but all was well before and all is well now.  

Thanks.
0
Today is the last day you'll be able to download Office 2007 SP's, Access 2007 Database Engine, Access 2007 Run time, and other software related to Office 2007 from Microsoft.

Make sure you download what you need to support your software.   Original post with some Microsoft Access links is here:

https://www.experts-exchange.com/posts/3107/MS-Access-2007-Users-Developers-IMPORTANT-NOTE.html

  You'll also want to download the Service Packs (SP's).
2
Free Tool: Port Scanner
LVL 11
Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Does anyone have a recommendation for dashboard software.  I need to be able to switch between active IE windows preferably not tabs. I tried Dashboard rotator but it stops the plugin from working.
0
Hi,
Every week, I need to run 7-8 reports from external software for same week period for almost 8 branches, is there any VBA codes which can help me to automate the process, where it saves all reports automatically from external software on network directory just by adjusting dates? Your help will be appreciated.
0
 
LVL 25

Expert Comment

by:Brian B
You have entered this as a post, but it looks like it is a question. To get the best response from the Experts, you should probably re-submit this as a question using the "ask a question" button at the top of the screen, or this link: https://www.experts-exchange.com/askQuestion.jsp

Please see here for further details: http://support.experts-exchange.com/customer/portal/articles/756544-how-to-succeed-at-ee-as-an-asker
0
 
LVL 25

Expert Comment

by:Brian B
0
Cyber News Rundown: 10/13/17

CyberNewsRundown.jpg
Rigzone Founder Caught Stealing Data

Over the last few months, officials have been piecing together the case against Rigzone founder, David Kent. After selling the Rigzone domain several years ago, Kent used several backdoors he’d implemented to access account information for over 700,000 customers, which he then attempted to sell back to Rigzone. By setting up several dummy accounts, Rigzone staff determined the specific IP address Kent used and apprehend him.

Criminals Hack Eastern Europe Bank for Millions

In the last year, banks in several Eastern European countries have seen a drastic rise in fraudulent charges at ATMs that have allowed hackers to make off with nearly $40 million dollars. Attackers start by manipulating the banks overdraft protection and setting up proxies to allow accomplices in other countries withdraw massive quantities of money from separate accounts. In addition to spoofing the overdraft system, the attackers also installed remote access software on bank computers to enable further intrusion to the institution’s systems.

More on our blog here.
2
MS Access 2007 Users/Developers - *** IMPORTANT NOTE ***

  This is a heads up that the following Access components available as standalone downloads are moving past extended support in the near future and along with other Office 2007 products, will not be available for download after that time.

  If you have any software that depends on the 2007 (32bit) database engine or the 2007 run time, you'll want to download these as soon as possible so you have them.  

•      Access 2007 runtime  - https://www.microsoft.com/en-us/download/details.aspx?id=4438
•      Office Data Connectivity Components (ACE) - https://www.microsoft.com/en-us/download/details.aspx?id=23734&40ddd5bd-f9e7-49a6-3526-f86656931a02=True&a03ffa40-ca8b-4f73-0358-c191d75a7468=True&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
•      ADE - https://www.microsoft.com/en-us/download/details.aspx?id=24569 (includes the packaging wizard, source code control, and the save as template functionality)
 
4
What’s the first thing you install—or uninstall—on a new system?
Install - Chrome
Uninstall - Nothing.  I don't buy pre-loaded software machines; I install my own OS.
5
 
LVL 99

Expert Comment

by:John Hurst
I do not have any issue at all with Windows 10 Pro preinstalled OEM by Lenovo. BIG HUGE waste of time to blow it away and spend a day redoing it for nothing.

Latterly only one piece of Lenovo software bit the dust (Lenovo Solution Center) which was replaced with a better piece of software. Voluntary (optional) Lenovo software need not be installed and I do not.
1
 
LVL 11

Expert Comment

by:Maclean
It is a personal preference really in the end. It does not bug some as much as others,
One might have plenty of resources and decide that it has little to no impact on their experience.
So whether it is a waste of time depends on what one wants from their system.
Personally I prefer max performance and security. The fewer 3rd party apps or vendor apps, the better.

Lenovo is not as bad as some other firms with their own apps but has also been tapped by for example Duo due to big security vulnerabilities in software allowing hackers to bypass protection software and take over control.
Being security focused this translates into my person preferences.

In the end a full system rebuild takes me between 1.5-2 hours average including patches & configuring things plus transferring data where applicable. (Talking SSD. SATA takes more time indeed)
e.g. if I buy HP, Dell, Lenovo OEM I would first need to upgrade to Creator update, then remove optional SW, Trials, Games and more.
That update process itself takes me as long as simply having the ISO already and doing it from scratch.
That was where my point of view comes from :)
1
Just a heads-up for you Sage Users who still have an SBS.

The latest version of Sage (v24) will no longer install onto SBS2008 or SBS2011.  This is because Sage have used .Net version 4.6.1 which is not compatible with Exchange Server 2007 / 2010.

In the past, Sage has said that installing previous versions of Sage onto SBS have been unsupported but the way around this was to install the software using the InstallV.exe installer.  Sage has now removed this installed from the installer files.
2
 

Expert Comment

by:juleswilko
Sounds like a B.S. excuse from Sage.
I can only imagine the number of businesses they have shafted.
Roll on other products not Sage based I guess...
0
 
LVL 22

Author Comment

by:David Atkin
Sage won't really care.  

Clients will be more angry at us IT Engineers than Sage themselves. It will raise questions like 'Our server is only a couple of years old, why isn't it compatible?'

Sage itself is a great piece of Software so they probably won't lose many people over it.  The worst part of it is that they've made clients Sage data more liable to risk because they won't be stored on a server that's getting backed up.  Yes, I know that you should do Sage Backups via the Sage Software but in reality, a hell of a lot of customers just don't bother.
0
Subject of the week | What sparked your initial interest in the tech industry?
My interest in tech is easily traced back to computer games. My dad brought home an Atari 800 one day and it was the coolest thing ever! Even though I was no doubt terrible at the games I played on it, the whole thing was so much fun that it instilled a life-long love of computers. I remember things like some sort of Frogger knock-off called Preppie (was about a golfer trying to cross the street to retrieve his golf ball), the racing game Pole Position, trying to race through Oregon Trail during my elementary school's 50 minute computer class (we didn't have any drives to save our game to, so the time crunch became the real challenge!) and then adventure games like King's Quest and Space Quest.

Later on, when I got a TI-82 graphing calculator, my initial love of computer games carried through and I'd make simple little programs for things like dice rolling, a text adventure game with a rudimentary combat system, and yes, even useful things for class like a quadratic equation solver.

But it was really those early video game experiences that made me want to work with computers.
4
 
LVL 50

Expert Comment

by:dbrunton
Genealogy.  I needed something to record the family history, data etc so I needed a computer.

Was at university so did the computing course and all they had were Macintosh 512K and Macintosh Pluses.  At the same time a friend worked in the computer business and sold me a clone XT 10 MHz 640K RAM 20 Mb hard drive that was um accidentally loaded with all sorts of software.  Turned on this XT and this C:\ > stared back at me.  And I stared back at that.

Next day at university bought a big thick book on DOS.  During lectures and note taking I read that book.  Went home and started typing in commands.  And found Leisure Suit Larry (I knew it was there).  18 hours later ...
2
3
Scrum is not a procedure or a method for building items; rather, it is an agile testing framework inside which you can utilize different procedures and strategies. Scrum agile testing framework clarifies the relative adequacy of your product advancement and management practices so you can boost up.

The Scrum framework comprises of Scrum Teams and their related parts, artifacts, events, and principles. Every part inside the agile scrum fills a particular need and is basic to Scrum’s prosperity an
Scrum is a test automation framework for agile development and testing inside which individuals can address complex versatile issues, while beneficially and inventively conveying results of the most noteworthy conceivable value.

The Scrum framework comprises of Scrum Teams and their related parts, artifacts, events, and principles. Every part inside the agile scrum fills a particular need and is basic to Scrum’s prosperity and utilization.
The standards of Scrum tie together the artifacts, parts, and events, administering the connections and collaboration between them.

Scrum Testing Roles:


Scrum has three parts: Product Owner, Scrum Master, and Team.
Product Owner: The Product Owner should be a man with vision, specialist, and accessibility. The Product Owner is in charge of constantly conveying the vision and needs to the advancement team.
It’s occasionally hard for Product Owners to strike the correct adjust of association. Since scrum agile testing framework esteems self-association among teams, a Product Owner must battle the desire to small scale oversee. In the meantime, Product Owners must be accessible to answer inquiries from the team.

Scrum Master:
0
 

Expert Comment

by:bruno_boccara
thank you all I found
in Option the7 and blog
0
Technology Partners: We Want Your Opinion!
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

2
CyberNewsRundown.jpg
Cyber News Rundown: Edition 9/15/17

German Voting Software Raises Concerns

With German elections only a couple weeks away, researchers have been working to determine how secure the voting systems really are. Per a recent study, the software being used contains multiple vulnerabilities that could lead to devastating results if the election is compromised. Meanwhile, the software creator maintains there is nothing wrong with the system and any tampering would only lead to confusion, rather than truly affecting the vote’s outcome.

Upgraded Android OS Slows Tide of Overlay Attacks

While overlay attacks are nothing new to Android™ users, the Toast window is a surprisingly fresh take on this technique. Google has already patched the issue being exploited, but many users unintentionally fell victim and gave permissions to a malicious app using the Toast window overlay on a legitimate page to spoof the users input. This type of attack can range from simply installing an annoying piece of malware on the device, all the way up to locking the device down and demanding a ransom.
2
OST to PST Converter - Convert OST to PST with Ease supported with MS Outlook up to 2007


Click Here to Download Free OST to PST Converter

OST to PST - Convert OST to PST with A Reliable OST to PST Software -  OST2PSTYou cannot convert an OST file to a PST directly, There is security in place that ties the Exchange mailbox OST file, and MAPI profile together. You can Convert OST to PST file easily by use Third Party

check-saving-process.gifFreeware Download OST to PST converter to convert your OST files into PST format easily and flawlessly.

If you are wondering why would you need to migrate from OST to PST, imagine you are working in a company where you are using Outlook with an Exchange server. Now in case you plan to leave the organization, you won't be able to access the data contained in the OST file and the reason is very simple. The OST  (offline storage table) files can only be accessed by the same computer and with the same email profile which was configured earlier with the Microsoft Exchange server. And if you are no longer the part of exchange server you cannot open/access the Outlook file. The only thing you can do is that you can recover your mailbox data by converting OST file into PST format. Once the OST files are converted into PST format the MS Outlook can open the files with ease.

 

1
 
LVL 16

Expert Comment

by:Ajit Singh
You can convert OST to PST by using:

Import and Export
Drag and Drop
Archive

Detailed way to Convert OST to PST file manually: http://expert-advice.org/2016/11/convert-ost-file-to-pst-file-manually/

Few more OST to PST conversion tools out there you can check:

https://www.nucleustechnologies.com/convert-ost-to-pst.html
http://www.osttopstconverter.recoveryfix.com/
http://www.ost2.com/

Thanks,
0
 

Expert Comment

by:Justin Morris
The OST to PST converter software enables data recovery from the corrupted OST files into outlook personal files. This recovery software is helpful in recovery and you have lost all hopes to recover information. It converts all types of corrupt files of MS office email clients. It can thoroughly scans the offline contents of OST file and converts the same into the PST file. This has interactive GUI feature which repairs the OST files and helps you to select the one you need to convert into PST file.The trial version is free of cost which enables you to know the features of the tool which helps you in perfect OST to PST Converter.

It has some incredible features.

- Supports Google Sign-In/Sign-Up
- Repairs Corrupted OST files
- Ultra-fast export of mails from OST to PST
- Allow Saving of OST files in different Format
- It convert OST email into EML, MSG, PST and HTML formats.
- OST to PST software successfully supported all version of MS Outlook platform.

Get more info: https://www.edbmails.com
0
Many are looking to uninstall Kaspersky Lab software from their computers, amidst recent plans by the Department of Homeland Security to "remove and discontinue present and future use of the products."

While Kaspersky’s instructions for this may paint the process as straight-forward, we’ve often seen issues in uninstalling Kaspersky anti-virus, for example:

If you do plan to uninstall Kaspersky and run into any issues, don’t hesitate to Ask your question in the Anti-Virus Apps topic.

And as always, make sure you have an antivirus and malware protection system installed, like Webroot or Immunet.
7
 
LVL 18

Expert Comment

by:Lucas Bishop
Yeah @Nicholas. Generally you'd expect the accusations to have some evidence to back them up. Will be interesting to see what emerges from this and how Kaspersky's business is able to handle the fallout.
1
 
LVL 66

Expert Comment

by:Jim Horn
That matches up with the hard sell tactics Micro Center used on me when I bought my last laptop in an effort to upsell me on Kaspersky's anti-virus software.
0
Now Top 3 Download Free OST to PST Converter Software

The article lists the top 3 Download free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST file to PST after their exchange server is no longer available or some other critical issue with exchange server environment or import-export function also failed to fix the issue.

You can get about this article Please click on this link: http://www.products.gaelinfotech.com/osttopst/
The free OST to PST Converter software converts ost files to pst for 25 items per folder without any ask a question. The software assists you to repair the damaged/corrupt OST file and some severe OST file corruption. Here are some of the helpful features of the software:

Gael OST Recovery Software free download available on this link:

https://gallery.technet.microsoft.com/office/Convert-OST-file-into-PST-eb0634f3/file/179208/1/ost-to-pst-converter.exe


check-saving-process.gif

0
 
LVL 16

Expert Comment

by:Ajit Singh
You can also convert OST to PST by using:

- Import and Export
- Drag and Drop
- Archive

Detailed way to Convert OST to PST file manually: http://expert-advice.org/2016/11/convert-ost-file-to-pst-file-manually/

Few more OST to PST conversion tools out there you can check:

https://www.nucleustechnologies.com/convert-ost-to-pst.html
http://www.osttopstconverter.recoveryfix.com/
http://www.ost2.com/

Thanks,
0
 

Expert Comment

by:Maryta yllors
Thanks OST to PST Converter Tool to repair corrupt ost file and then convert ost emails to pst file. Now i can access these emails with Outlook Emails client.It save Converted Emails in PST, MSG, EML, RTF, HTML, and PDF formats.It support all versions of MS Outlook and Exchange Server.

Official website: http://www.osttopstconverter-tool.com/

24*7 hours support and life time free updates
30 Days MoneyBack Guarantee
0
Does anyone know how to lock down a local businesses free wifi connection from being able to do file-sharing? Thought there might be a software product or router setup technique to do it... thank  you!!
0
 
LVL 25

Expert Comment

by:Brian B
Your router/firewall should have some sort of filtering/blocking capability. However to get a better answer, I'd suggest you ask this as a question (you put it as a post) in the networking category. https://www.experts-exchange.com/askQuestion.jsp
2
 
LVL 25

Expert Comment

by:Brian B
2

Software-Other

37K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.