A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Utility program + driver program Thomas Wat 4D (21)
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Basic Computer Maintenance Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Chapter 6System Software  6.1Introduction of Operating System 6.1Introduction of Operating System 6.1Introduction of Operating System  6.2Functions of.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
Understanding the Boot Process and Command Line
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 10 Supporting Hard Drives.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 14 Managing and Troubleshooting Windows 2000.
Understanding and Troubleshooting Your PC. Chapter 5: Understanding, Installing, and Troubleshooting Disk Drives2 Chapter Objectives  In this chapter,
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Chapter 3 Managing Disk and File Systems. File Storage Basics Windows XP supports two types of storage Basic Dynamic Basic storage system Centers on partitioning.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
14 Step-by-Step Instructions for an Upgrade Installation n Prepare for the installation Verify that all devices and applications are Windows 2000 compatible.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Implementing Hard Drives. Partitioning and Formatting Process.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
CONTENTS What is Virus ? Types of computer viruses.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 Maintaining the Windows O/S. 2 Introduction Virus protection Remove old and unused files Scan hard disk Defragment hard drive Back up and updated recovery.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Chapter 6 Protecting Your Files
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Basic Computer Maintenance
File Management.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives

2 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hands-on Project: Install a Slave Drive

3 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Managing Hard Drives Disk defragmentation ScanDisk Disk Cleanup Disk compression Disk caching Disk cloning Making backups

4 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Fragmentation Desirable A file is placed in contiguous clusters A file is placed in discrete clusters Fragmented Slow down access time Complicate recovery of a corrupted file

5 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Windows Defragmenter

6 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hands-on Project: Defragmenter pp. 360 Start->All Programs->Accessories->System. Tools->Disk Defragmenter Do a fragmentation analysis

7 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Cross-Linked and Lost Clusters

8 A+ Guide to Managing and Maintaining Your PC, Fifth Edition ScanDisk Repairs cross-linked and lost clusters Checks FAT for problems with long filenames and the directory tree Scans the disk for bad sectors Repairs problems with structure of a hard drive that has been compressed using Windows DriveSpace or DoubleSpace

9 A+ Guide to Managing and Maintaining Your PC, Fifth Edition ScanDisk

10 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hands-on Project: ScanDisk pp. 362 Windows Exploer->right –click the drive-> Properties->Tools tab->Check Now under Error-checking->check the two check-boxes

11 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Clean Up Disks Delete temporary files to free up space

12 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Cleanup

13 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hands-on Project pp. 364 Windows Explorer-> right-click the drive- >Properties->General tab->Disk Cleanup

14 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Compression Save hard drive space May loose data May result in longer disk access time

15 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hand-on Project: Compress an NTFS Drive Windows XP/2000 pp. 366 Explorer->Properties- >General->Check “Compress drive to save disk space”

16 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hands-on Project: Compress a File/Folder in Windows XP/2000 pp. 366 Explorer->Properties- >General->Advanced- >Check “compress contents to save disk space”

17 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Cache Temporary storage area in RAM for data being read from or written to a hard drive Speeds up access time to the drive

18 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Caching

19 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hardware Cache Built in the hard drive controllers The BIOS on the controller contains the cache program RAM chips on the controller hold the cached data

20 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Software Cache A software that is loaded into the memory during boot-up Uses system RAM to hold the cached data

21 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hardware Cache vs. Software Cache Advantages: does not use system RAM Disadvantages  Slower  Impractical to update

22 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Caching in Windows Windows NT/2000/XP: automated disk caching Windows 9x: VCACHE

23 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hands-on Project: Enable Disk Cache pp. 367 and Figure 9-9

24 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Backups A backup is an extra copy of a file The backup can be used to recover the original file if it is damaged

25 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Backup Types Full backups: back up all data from hard drive Incremental backups: back up only files that have changed or been created since last backup Differential backups: back up files that have changed or been created since the last full backup

26 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Example Backup Methods Perform a full backup every Friday, and incremental backups Monday through Thursday Perform a full backup every Friday, and differential backups Monday through Thursday Discussion: advantages and disadvantages of each method?

27 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Hands-on Project: Windows 2000/XP Backup pp

28 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Disk Cloning (Disk Imaging) Replicates a hard drive to multiple computers Software for disk cloning  Drive Image by PowerQuest  ImageCast by Innovative Software  Norton Ghost by Symantec Corp

29 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Computer Infestations Any unwanted program transmitted to a computer without the knowledge of the user Are designed to do varying degrees of damage to data and software Do not damage hardware The hard drive may appear to be physically damaged when the boot sector information is destroyed

30 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Computer Infestations Virus Needs a host program Infected program must be executed for a virus to run replicates by attaching to other programs Has an incubation period (does not do damage immediately) Worm Spreads copies of itself without a host program Does damage by overloading the network or the system Best defense is a firewall Trojan horse Substitutes itself for a legitimate program Does not need a host program to work Most cannot replicate Logic bomb Dormant code added to software; triggered at a predetermined time or by a predetermined event

31 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Virus Types Boot sector viruses  The Master Boot Record program  The OS Boot Record program File viruses  Executables (.exe,.com, or.sys)  Word files containing macros (Macro viruses) Multipartite viruses

32 A+ Guide to Managing and Maintaining Your PC, Fifth Edition How a Virus Replicates Non-memory- resident virus Memory- resident virus

33 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Anti-virus Software Looks for distinguishing characteristics (virus signatures) Looks for a program that can replicate itself Monitors the difference between a program’s file sizes

34 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Virus Cloaking Techniques Polymorphic viruses – changes its distinguishing characteristics as it replicates Encrypting viruses – transform itself into a nonreplicating program Stealth viruses  Alters OS to mask the size of the host file  Resets the host file before it is opened

35 A+ Guide to Managing and Maintaining Your PC, Fifth Edition How a Worm Gets into Your Computer

36 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Virus Hoaxes warnings about a nonexistent virus Overload network traffic Check Web sites that specialize in debunking virus hoaxes

37 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Protecting Against Computer Infestations Do not run programs or attachments unless you are sure that they are safe Implement a firewall to protect ports  Open only necessary ports to specific IP addresses Keep Windows current with updates and patches Install and run an anti-virus software

38 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Damaged Partition Table Messages - Invalid drive or drive specification Solutions  A> Fdisk /Mbr  Recovery Console: fixmbr

39 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Damaged OS Boot Record Messages  Invalid media type  Non-DOS disk  Unable to read from Drive C Solutions  Recover from backup  Third-party software

40 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Damaged FAT, Root Directory, or Bad Sectors Messages  Sector not found reading drive C  Bad sector Solutions  Scandisk  Third-party recovery software

41 A+ Guide to Managing and Maintaining Your PC, Fifth Edition Damaged System Files Messages  Non system disk or disk error  Invalid system disk Solutions  Copy systems to the drive by sys C: