Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Chapter 24 Troubleshooting and Maintenance Fundamentals.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
What is it, how does it work, and why is it important?
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 24 Troubleshooting and Maintenance Fundamentals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 10 Supporting Hard Drives.
Chapter Fourteen Windows XP Professional Fault Tolerance.
D. Beecroft Fremont High School VIRUSES.
Chapter 13 Troubleshooting and Maintenance Fundamentals.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
COMPUTER VIRUS.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
W elcome to our Presentation. Presentation Topic Virus.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 24 Troubleshooting and Maintenance Fundamentals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Chapter Objectives In this chapter, you will learn:
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Troubleshooting and Maintenance Fundamentals
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

Understanding and Troubleshooting Your PC

Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn: –About maintaining your PC, including how to make backups –How to protect against viruses, Trojan horses, and worms –About approaches for troubleshooting a PC

Chapter 12: Maintenance and Troubleshooting Fundamentals3 Maintaining Your PC

Chapter 12: Maintenance and Troubleshooting Fundamentals4 Performing Routine Maintenance Tasks  Organize the hard drive root directory –Organizing the files and folders on your hard drive makes it easier to find files and can help you back up and recover files more easily –Keep all of your documents and other files in your My Documents folder –Do not store files on the desktop –Keep application software files and their data in separate directories –The root directory of the hard drive should contain only folders and system startup files or initialization files for software

Chapter 12: Maintenance and Troubleshooting Fundamentals5 Performing Routine Maintenance Tasks  Create rescue disks  Document all setup changes, problems, and solutions  Record setup data  Take practical precautions to protect software and data –Backup the system state and create a restore point before installing a new software package –Do not store data files in the same directory as the software –Enable settings to hide protected files from the user –Back up original software –Back up data on the hard drive

Chapter 12: Maintenance and Troubleshooting Fundamentals6 Backup Approaches  A full backup backs up all data from the hard drive or a directory or folder of the hard drive  An incremental backup backs up only files that have changed or been created since the last backup  Differential backups backs up files that have changed or been created since the last full backup

Chapter 12: Maintenance and Troubleshooting Fundamentals7 Creating a Backup Plan and Schedule

Chapter 12: Maintenance and Troubleshooting Fundamentals8 Creating a Backup Plan and Schedule

Chapter 12: Maintenance and Troubleshooting Fundamentals9 Disk Cloning Software  Disk cloning is the creation of a complete image or copy of a computer’s hard drive, usually used to deploy a new operating system with application software on multiple computers in a corporate network or educational computer lab –Norton Ghost –Drive Image –ImageCast

Chapter 12: Maintenance and Troubleshooting Fundamentals10 Creating a Preventative Maintenance Plan

Chapter 12: Maintenance and Troubleshooting Fundamentals11 Protecting against Viruses, Trojan Horses, and Worms  A malicious logic program is any program that acts without a user’s knowledge, deliberately changes the computer’s operations, and does varying degrees of damage to data and software  Antivirus software protects a computer against infection by identifying and removing any malicious logic programs in memory, in storage, or on files coming in as attachments

Chapter 12: Maintenance and Troubleshooting Fundamentals12 Computer Viruses  A computer virus is a program designed to infect a computer and replicate itself by attaching itself to other programs  The payload is the destructive event or prank the virus was created to deliver  All viruses have three characteristics: –Has an incubation period –Performs an unwanted function –Replicates itself

Chapter 12: Maintenance and Troubleshooting Fundamentals13 Types of Viruses  A file virus inserts virus code into program files or executable files  A macro virus uses the macro language of an application to hide virus code  A boot sector virus replaces the boot program used to start the computer system with a modified, infected version of the boot program  Master Boot Record (MBR) viruses attack disks in the same manner as boot sector viruses –MBR viruses typically save a legitimate copy of the master boot record in a different location on the hard disk

Chapter 12: Maintenance and Troubleshooting Fundamentals14 Types of Viruses  A multipartite virus has characteristics of a boot sector virus and a file virus  A logic bomb is a program that is activated when a certain condition is detected  A time bomb is a type of logic bomb that is activated on a particular date

Chapter 12: Maintenance and Troubleshooting Fundamentals15 How Viruses Hide  Antivirus software detects a known virus by looking for distinguishing characteristics called a virus signature, which is a known pattern of virus code  A polymorphic virus changes its distinguishing characteristics as it replicates  An encrypting virus can transform itself into a nonreplicating program to avoid destruction by antivirus program  A stealth virus actively conceals itself

Chapter 12: Maintenance and Troubleshooting Fundamentals16 How a Virus Replicates

Chapter 12: Maintenance and Troubleshooting Fundamentals17 Trojan Horses  A Trojan horse is a destructive program disguised as a real application, such as a screen saver  Trojan horses can delete files, capture information from your system, or open up a back door that allows a hacker to control your computer remotely –AOL4FREE

Chapter 12: Maintenance and Troubleshooting Fundamentals18 Worms  A worm is a malicious logic program that replicates by creating copies of itself, either on one computer or any number of computers on a network  Eventually, no memory or disk space remains because the worm is using up all system resources  Worms on the Internet routinely perform port scanning

Chapter 12: Maintenance and Troubleshooting Fundamentals19 Worms

Chapter 12: Maintenance and Troubleshooting Fundamentals20 Hoaxes  A virus hoax is an message that spreads a false virus warning, usually in chain letter fashion, from person to person  Before ignoring a virus warning, you should check with reputable references to determine if a virus warning is legitimate or a hoax

Chapter 12: Maintenance and Troubleshooting Fundamentals21 Hoaxes

Chapter 12: Maintenance and Troubleshooting Fundamentals22 Protecting against Computer Viruses

Chapter 12: Maintenance and Troubleshooting Fundamentals23 Using Antivirus Software  Install an antivirus program on your computer and update it frequently  Perform routine system scans on your computer  Most antivirus programs contain an auto- update feature that regularly prompts users to download the new virus signature or definition files

Chapter 12: Maintenance and Troubleshooting Fundamentals24 Handling an Infection  Run a virus scan using your antivirus software to detect and delete the malicious logic program  If the antivirus program cannot remove the infection, it often quarantines the infected file  Using a recovery disk, the antivirus program can attempt to repair damaged files  In extreme cases, you may need to reformat the hard disk to remove a virus

Chapter 12: Maintenance and Troubleshooting Fundamentals25 Troubleshooting Tools: Building a PC Toolkit

Chapter 12: Maintenance and Troubleshooting Fundamentals26 Troubleshooting Tools: Building a PC Toolkit  Other tools that are helpful to have in a PC toolkit include: –Antistatic bags –Needle-nose pliers –Flashlight –AC outlet ground tester and multimeter –Small cups, bags, or plastic containers –Pen and paper –Utility software

Chapter 12: Maintenance and Troubleshooting Fundamentals27 Utility and Diagnostic Software  Utility software is a program that performs a specific task, usually related to managing system resources or identifying a problem with a PC  Diagnostic software generally is used to identify hardware problems

Chapter 12: Maintenance and Troubleshooting Fundamentals28 Utility and Diagnostic Software

Chapter 12: Maintenance and Troubleshooting Fundamentals29 Utility and Diagnostic Software

Chapter 12: Maintenance and Troubleshooting Fundamentals30 Approaches for Troubleshooting a PC: Fundamental Rules  Make backups before making changes  Follow the important safety precautions  Approach the problem systematically  Isolate the problem

Chapter 12: Maintenance and Troubleshooting Fundamentals31 Approaches for Troubleshooting a PC: Fundamental Rules  Do not assume the worst  Check simple things first  Become a researcher  Know your starting point

Chapter 12: Maintenance and Troubleshooting Fundamentals32 Approaches for Troubleshooting a PC: Fundamental Rules  Establish your priorities  Do not rush  Write things down  Take a break

Chapter 12: Maintenance and Troubleshooting Fundamentals33 Gathering Information: Investigating the Problem  What operating system is installed?  What physical components are installed?  What is the nature of the problem?  Can you duplicate the problem?

Chapter 12: Maintenance and Troubleshooting Fundamentals34 Gathering Information: Isolating the Problem  Consider the possibilities  Eliminate simple things first  Eliminate the unnecessary  Trade good for suspected bad  Trade suspected bad for good

Chapter 12: Maintenance and Troubleshooting Fundamentals35 Gathering Information: Intermittent Problems  The trick in diagnosing problems that come and go is to look for patterns or clues as to when the problems occur  If you cannot reproduce the problem, keep a log of when the problems occur and exactly what messages appear –Take a screen capture

Chapter 12: Maintenance and Troubleshooting Fundamentals36 Chapter Summary  In this chapter, you learned: –About maintaining your PC, including how to make backups –How to protect against viruses, Trojan horses, and worms –About approaches for troubleshooting a PC

Understanding and Troubleshooting Your PC Chapter 12 Complete