Maintaining Your Computer...and saving yourself from technological catastrophe SLIS-LITA Spring 2009.

Slides:



Advertisements
Similar presentations
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Advertisements

1 Back Up Your Computer. 2 Back up your files  Avoid losing photos, files, data  Schedule backups – store backups away from home in case of fire, flood,
Putting It All Together 1.  Maintaining a Hard Drive Ch 4 Lab  Hardware cleaning tips ▪ Microsoft Tips Microsoft Tips ▪ Computer Hope Tips Computer.
How to Keep Your PC Running Like New Bryan Nowak.
SECURITY CHECK Protecting Your System and Yourself Source:
Everything your business needs to know but probably doesn’t.
Michael Henderson. Objectives for chapter  To show the importance of computer maintenance computing.  Identify problems that can occur if harware is.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Computer File Management One of the most important aspects of our job is information maintenance.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
SIR Area 2 Computers & Technology Dean Steichen.  “A well maintained PC will run at peak performance for years” (IOLO Technologies).  You can easily.
1 Back Up Your Files. 2 Back up your files Avoid losing photos, important files, data Schedule backups – store backups away from home/school in case of.
Windows Tutorial 9 Maintaining Hardware and Software
September 2007 General Security Basics Your Responsibilities for Safe Computing.
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Chapter 7 Installing and Using Windows XP Professional.
© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Keeping your computer current and trouble free Aaron Robertson.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Maintaining Your Computer...and saving yourself from technological catastrophe SLIS-LITA Spring 2009.
INFO1 – Practical problem solving in the digital world
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
ADVANTAGES & DISADVANTAGES OF INTERNET STORAGE Advantage: Easy Access  Online storage websites are important to people who travel and don't always have.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
PC Maintenance How to keep your computer healthy.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Computer Maintenance Tools for a healthy PC. Introduction Routine Computer Maintnance –Hardware –Software PC Buying Guide –Hardware –Operating Systems.
Backing up, Updates, and New Installs… Oh My!. How often do you hear… “Everybody needs to make sure and back up their files.” But what does that really.
 Networked Storage  Files stored on:  Original device  Third Party Data Hosting Servers  Secondary devices  w/ granted permission.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Basic Computer Maintenance Clean and Cool Deleting Temporary Files Scandisk Backup Your Data How to run scandisk? Click on Start-Programs-Accessories-
Backup. What to back up? Pictures Documents (include s if using Off Line Program) Video’s Music System Image – Programs – Registry – Operating System.
HalFILE 2.1 Network Protection & Disaster Recovery.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
FIT03.05 Explain features of network maintenance.
Computers Sue Kayton April Keep the computer physically clean Don’t install programs you don’t need Watch out for viruses! Turn off the computer.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Networking Network Classification, by there: 3 Security And Communications software.
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 1.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
WHAT IS CLOUD COMPUTING? Pierce County Library System.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Basic Guide to Computer Backups Eric Moore Computer Users Group of Greeley September 13, 2008.
How To Make The Backup Of AVG Antivirus 2017 Definitions.
Slide Template for Module 4 Data Storage, Backup, and Security
Basic Guide to Computer Backups
The importance of computer backups
Common Methods Used to Commit Computer Crimes
People used to install software on their computers
Ways to protect yourself against hackers
Dell Latitude E5570 Laptop Heather L Horvath.
Section 15.1 Section 15.2 Identify Webmastering tasks
Unit 2 Computer Systems HND in Computing and Systems Development
Tips to Fix the Issue of Norton 360 Slow Downs Computer.
Backing Up Files File Maintenance Unit.
It’s in the Clouds? An Overview of Cloud Services
Windows Tutorial 9 Maintaining Hardware and Software
Online software and backups
Presentation transcript:

Maintaining Your Computer...and saving yourself from technological catastrophe SLIS-LITA Spring 2009

Overview Security Consciousness Backup Strategies Network Security Hardware

Security Consciousness Your computer is vulnerable photo from Flickr

Backup Strategies How important is your data?

Backup Strategies What’s your current backup strategy?

Backup Strategies It’s easy. Don't shut down without backing up your work.

Backup Strategies

Save As with a different filename every hour at least e.g. compare & contrast-1.doc compare & contrast-2.doc compare & contrast-3.doc

Full vs. Limited Backups Full = entire hard drive / device Limited Backups: backup the essentials – what do you absolutely need? Backup Strategies

CD-R or DVD±R

Backup Strategies Invest in an external hard drive Often they come with free automatic backup software.

Backup Strategies Invest in an external hard drive Are they worth the money? $90 for 320 GB drive 8 hours working on a paper x $10 per hour $80

Backup Strategies Invest in an external hard drive … but an external hard drive does not necessarily protect from natural disasters or theft

Backup Strategies Use free online resources:WebDAV But remember that networks are not up 100% of the time. But remember that networks are not up 100% of the time.

Visit my.wisc.edu  My Webspace Upload a file into a folder. If you need a file, you may download: Backup Strategies

Verify your backup at least 1 x month Make a date for it on your Wisc Calendar

Backup Strategies Remember the Buddhist principle: the transient nature of the composite or as the Beatles sang back in the 1960s: all things must pass away

Backup Strategies Choose a backup strategy and use it. Don't shut down your computer without first backing up your work. Back it up again! Save Wisely (multiple filenames)‏ Verify your backups 1 x month. Think: what’s the worst case scenario?

Network Security  Get an antivirus program  Update it  Use it  Firewall  Updates for your operating system  Update/patch essential software You've heard this before...

Network Security Update/patch essential software:  Microsoft Office(Microsoft update)‏  Adobe Reader(adobe.com)‏  Adobe Flash plug-in  Adobe Shockwave  QuickTime / iTunes (apple.com/quicktime)‏  Mozilla Firefox  Other browser software

Hardware Maintenance Defragment your hard drive Dust

Maintaining Your Computer Both computers and cars need regular maintenance.