Recovery cards and their utilization in student’s laboratory

Slides:



Advertisements
Similar presentations
8 April Doors Network Configuration Parameters (Single Site Mode)
Advertisements

Support for Windows 7 Chapter 2 Securing and Troubleshooting Windows 7.
5-9/12/2005 CPE How to format your computer and re-install Windows XP.
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
1 Module 2 Installing Windows NT. 2  Overview Preparing for Installation Installing Windows NT Performing a Server-based Installation Troubleshooting.
Accessing Windows 7 Recovery Tutorial 2015 QTutorials 2015 QTutorials Start Close.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Ch 11 Managing System Reliability and Availability 1.
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
Configuring the MagicInfo Pro Display
Module 13: Configuring Availability of Network Resources and Content.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Tutorial 11 Installing, Updating, and Configuring Software
File Recovery and Forensics
Chapter Fourteen Windows XP Professional Fault Tolerance.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 14 Managing and Troubleshooting Windows 2000.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
10/1/2015 Chapter 2 Installing Windows XP Professional.
Installing Ricoh Printers There are two basic steps: 1. Acquire the drivers. 2. Use the Windows Add Printer Wizard to install the drivers within the operating.
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Configuring Data Protection Chapter 12 powered by dj.
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
Training on Basic Software Hardware Installation
Microsoft Windows XP Professional MCSE Exam
Understanding Backup and Recovery Methods Lesson 8.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
CMPF124 Personal Productivity with Information Technology Chapter 2 – Part 3 Introduction To Windows Operating Systems Windows Accessories CMPF 112 : COMPUTING.
 Contents 1.Introduction about operating system. 2. Minimum requirement for Windows 7 operating system. 3. Procedure to install Window 7 operating system.
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
From: Jörg Bänder Damian Borth Yong Soo Deutschle.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
5/14/2003Sprint TekNet IP Train the Trainer1 Open TekNet Software If working at a client station, enter the IP address of the server and mark page as a.
VMware Recovery Software RECOVER DATA FROM CORRUPT VMDK FILE.
© N. Ganesan, Ph.D., All rights reserved. Windows Server Installation Nanda Ganesan, Ph.D.
1 Remote Installation Service Windows 2003 Server Prof. Abdul Hameed.
Tech Level Cyber Security Lesson 7
SmartCenter for Pointsec - MI
Lesson 22: Configuring System Recovery
Chapter Objectives In this chapter, you will learn:
Discovering Computers 2012: Chapter 8
Guide to Linux Installation and Administration, 2e
Operating System Review
Basic Computer Maintenance
Windows Operating Systems (Cont.)
CONFIGURING HARDWARE DEVICE & START UP PROCESS
How to Recover HP Desktop PCs BIOS?
Operating System Review
Radoslaw Jedynak, PhD Poland, Technical University of Radom
COMP1321 Digital Infrastructures
Modern PC operating systems
Creating and Managing Folders
University of Warith AL-Anbiya’a
Windows Operating System
WINDOW 7 INSTALLATION Prepared By:- Mr. Pawan Kumar
Presentation transcript:

Recovery cards and their utilization in student’s laboratory Radoslaw Jedynak, PhD Poland, Technical University of Radom Faculty of Teacher Training Department of Mathematics jedynakr@pr.radom.pl

Basic Information The recovery card is a computer device which uses a small quantity of place on the hard disc to protect the computer against unwanted or uncontrolled changes. The recovery card is a powerful instant recovery system technology for: - school computer laboratories, - cyber cafes, - libraries, - companies, - etc.

Utilization of recovery cards It can protect our computers from: • file corruption; • unwanted modification; • accidental or intentional damage to the hard drives; • viruses; • hacking; • unwanted software installation; • formatting and deleting the hard disks

Examples of recovery cards Goliath 2 HD Protector http://www.goliath.pl/ Recovery Card Maintenance http://arkomp.eu/ BulwarkPRO Recovery Products http://www.divaco.com.my/

http://www.goliath.pl/

Principle of card working When the user changes a file or saves a file, the recovery card keeps the original file unchanged and saves the changes in a copy of this file. When the user accessed the file, the recovery card presents the modified copy. The file appears to be modified, but the original one is hidden and remains untouched. The recovery card only creates a copy of the modified part of the data, for example a few percents. For this copy the empty space of the hard disk is used. These saved changes are compressed and recorded in a special dynamic buffer of the hard disk.

Card installation First the driver of the recovery card must be installed. We could choose different type of install. There are Default, Office and Home, Cyber cafe and School, Diskless System, ezCopy Source PC and Ghost Source PC and Custom installation style. The driver must be installed with the item “ezControl Client” picked up into the student computer. The computers with installed “ezControl Client” will be controlled remotely by ezControl console. This special program must be installed into the teacher computer.

Driver installation

Configuration of card parameters After installation the recovery card shows a menu on the next slide when the computer is started. This menu appears before the operating system is started. The choices provided are to continue in: -"Protected Mode" is the working mode, which protects data on a specified area of the hard disk. -"Open Mode" is the working mode, which does not protect any data, which is useful for system installation and administration. -“Configuration" is to set some working parameters of the recovery card “Save Changes" makes all the changes made to files on the hard disk in protected mode permanent.

Hotkeys Menu screen

Configuration of card parameters If we select “Set Parameters” we can see the screen shown on next slide. There are many configuration items of card to set. We can set “Recovery Interval” from every 1-99 boot, every 1/2 day, every 1-99 days and every week or manual recovery. If we mark in the field of “protect CMOS”, it means the data of CMOS is protected. If we mark in the field of “protect BIOS”, the BIOS will be protected, otherwise, not protected. If we mark in the field of “boot from HD only”, it means the computer has to boot from hard disk. If we choose “Booting Display” as none, there will not show up Hot Keys Menu during booting up and the system will enter directly into operating system. If we choose Booting Display as hotkeys menu, the Hotkeys menu will appear when booting our computer with the countdown timer from 15 seconds to 1 second.

Set Parameters Menu screen

Program for management of recovery cards – ezControl EzControl is a LAN based administration tool for the management of recovery cards and the client computers on which they are installed.

The program offers two main categories of management functions: I. Remote management functions: Power Management; Change Computer Name and TCP/IP Properties; Distribute Files; Remote Commands; II. PC-recovery card settings: View Recovery Card Status; Set Parameters; Enter Protected Mode; Enter Open Mode; Save; Recover; Uninstall;

EzControl basic operation screen EzControl allows the administrators to view the current boot up mode of all computers and other system information, including: Computer Name, O/S version, IP address, MAC address and etc.

Some functions for remote management the chosen computer

Chosen options of ezControl program One of the most interesting functions offered by the program is power management. This item offers 3 functions: • Wakeup On LAN (remote power on); • Reboot; • Power Off. If we choose one of these commands we can wakeup all selected PCs at the same time, reboot or power off. In first case we must properly setup the client's CMOS.

Function “Change Computer Name and TCP/IP Properties” for chosen computer If we choose function “Change Computer Name and TCP/IP Properties” we can change the computer name and TCP/IP properties

Function “Distribute Files” for chosen computer With function “Distribute Files” we can copy files from one computer to another. The source folder must be shared, or just exist in every selected destination PC. All destination PCs must have permission to access the source folder. The destination folder must be in local PC.

Function “Remote Commands” for chosen computer Remote Command is a very interesting function . For demonstration purposes, it is possible to send simple commands to execute all executable files in the Windows system root of the remote PCs, i.e. cmd, regedit, notepad, etc.

Function “Set Parameters” for chosen computer With PC-recover card settings options we can change mode remotely from protected to open and reverse. For example if we enter protected mode all selected Pc’s will enter protected mode at the next boot.

Conclusion The recovery cards make it impossible to introduce the permanent changes by users in the computer systems without the agreement of the computer administrator. One of more popular cards of this type, in Poland, is Goliath 2 HD Protector (the product of computer firm “Moria” from Cracow). Cards from this family are used in the computer laboratory by the author of this lecture. One of the unique possibilities they possess is the function of their management through the net. They can control all computers equipped with these cards and connected to the LAN

Thank you for your attention