Computer Data Backups: Test Now or Cry Later
If you're like most small business owners, your computer data backups are one of those
things that you rarely pay attention to. Computer data backups are kind of like flossing
your teeth and eating low-fat, high-fiber foods� everyone knows what they're supposed to do�
but how many REALLY do these things religiously?!?
Unfortunately when it comes to your computer data backups however, complacency can be very
dangerous. Of course, it's always a good idea to have a local computer service company that
you can rely on for advice on selecting and maintaining your computer data backups. But,
unless you're prepared to put a full-time PC support person on your company's payroll, it's
really important that you get some basic understanding of the major issues with computer
data backups.
So here's a compilation of some really crucial tips on computer data backups that I've put
together, after nearly 15 years of helping small businesses protect their valuable computer
data files.
Test your computer data backups regularly and monitor their log files.
To be effective, computer data backups must be highly automated to ensure that jobs are
launched consistently and correctly, but your computer data backup system also needs to be
watched over diligently to make sure it continues to function reliably.
Unfortunately, monitoring the computer data backup system generally isn't a priority until
something goes wrong. By then it's too late�. Like the article title says, �Test Now or Cry
Later!�
People have a strong tendency with a computer data backup system to set it and forget it.
Automation clearly has many benefits, but a totally hands-off approach can be very dangerous
if no one is overseeing your computer data backup process.
Test and Then Test Again: VERY Important with Computer Data Backup Systems
With any newly installed computer data backup system, don't assume everything works
correctly right out of the box. Even more important, don't take for granted that your backup
system will continue working indefinitely. You need periodically to restore some folders and
files from your backup media to validate that your computer data backup system still works.
If your automated computer data backup routine is configured to include a verify run with
each backup job, testing a sample restore job monthly should be adequate. However, if you
have an extremely low tolerance for risk, you may want to simulate a sample restore job once
a week.
The Hazard of Moving Parts and Open Design with Computer Backup Systems
Why do you need to take these precautions if you're purchasing a reliable, business-class
computer data backup system to start with? Typically, a tape drive or other backup device is
one of the few components in a PC or server that still have moving parts.
As a result, it's more prone to mechanical failure. In addition, because a backup device
generally is open, as opposed to the sealed design of a hard drive, it's easy for the inside
of the computer data backup system device to attract a significant dust buildup in a
relatively short period of time.
Sample Restore Jobs and Cleaning Tape Heads of Computer Data Backup Systems
Testing a tape for a sample restore job is also a great time to clean the heads of the
backup drive if your backup system requires this kind of maintenance.
Restoring a few hundred megabytes (MB) of data to a scratch directory and running a
head-cleaning tape should take no more than 15 to 30 minutes.
When running a test restore job, always restore the data to an alternate server folder path,
so as not to disrupt the use of any shared folders.
Building a Computer System Backup and Restore Procedure Checklist
In times of crisis, the most crucial issue becomes how quickly you can get the data back
onto your system, undamaged. So, as you build your computer data backup system, be sure to
document your test procedures into handy checklists.
This documentation also can be great for cross-training and crucial for avoiding panic
during an emergency. Be sure you have a hard copy of this documentation next to your system
and stored off-site with your backup media.
Watching the Log Files of Your Computer Data Backup System
In addition to running test restore jobs, you must inspect your computer data backup system
log files daily. When the backup system is first installed, take time to get familiar with
the way log files look when everything is working. This way, if something goes awry, you'll
be better prepared to pinpoint the nature of the problem immediately.
As network operating system (NOS) suites and backup software have become more sophisticated,
it's now possible to monitor backup system log files remotely and more proactively. In most
cases, the backup system log files are just plain text (.txt) files.
Many third-party tools and utilities, as well as those included with Microsoft BackOffice
Small Business Server (SBS) and Microsoft BackOffice Server, can automatically e-mail or fax
a backup system log file at a preconfigured time.
Automatically and Remotely Monitoring Tape Backup Log Files
Many computer consultants have their small business clients' log files automatically
e-mailed to them daily, so the consultants proactively can watch out for potential problems
with the computer data backup system.
However, don't think this proactive monitoring is limited to professional consultants. If
your company has one or more branch offices you support from a centralized location, you
also can use a similar method to monitor backup system health in remote locations.
For greater flexibility, you can set up an e-mail alias so the computer data backup system
log file automatically is sent to you, your second-in-command and perhaps an external
computer consultant - so you are all kept in the loop. Also, this way, monitoring continues
even when you're out of the office or on vacation.
The Bottom Line
If your small business depends greatly on its computer systems, backing up your data is not
optional� and it is not something that can be casually brushed to the back burner.
Use the computer data backup tips in the articles to help you become a more IT-aware small
business owner. And remember, when it comes to computer data backups, "Test Now or Cry
Later". The choice is yours.
Copyright MMI-MMVI, PCSupportTips.com. All Worldwide Rights Reserved. {Attention Publishers:
Live hyperlink in author resource box required for copyright compliance}
Joshua Feinberg | www.valuablecontent.com
BlogCatalog
Sunday, August 31, 2008
Computer Data Backups: Test Now or Cry Later
Recent studies show that 9 out of 10 PCs are infected with Spyware
Recent studies show that 9 out of 10 PCs are infected with Spyware
Spy Sweeper named PC Magazine's Best of the Year 2004 for antispyware
The very best AntiSpy program on the market -
Webroot Spy Sweeper. Webroot Spy Sweeper was named best spyware remover 2004 by PC magazine and praised for it's efficiency, speed and userfriendlyness.
Spyware and malware are large problems for Internet users today and can be both annoying and a real threat to you and your computer. There exist a number of different spy and malware of which some are relatively friendly and only spies on your surfing habits, while others like the Trojans can be used to corrupt your hard drive or steal your usernames and passwords. A Trojan can even be used to steal your identity by extracting all necessary information from your computer.
You may think that ad ware might not be that bad, that it is good if the ads are chosen to fit your interests. This might be true if the spy ware didn't have a number of other negative effects, such as an increased amount of pop up ads, unexplained home page changes, strange results when searching the web and the fact that your computer are being slowed down by the spy wares. These are all very common results and symptoms of spyware and ad ware. More unusual problems connected with spyware and Trojans are the corruption of the hard drive, the loss and exposure of private information and login information and in a worst case scenario, the theft of the identity of the owner of an infected computer.
Spyware is a large treat to the security of your online privacy.
There are however steps that you can take to avoid suffering the negative effects that spy- and ad ware can bring, and start protecting you computer and building an Identity Theft Protection. The first of these steps are to get a good antispyware and antiadware program able to remove spyware. There are a number of different spyware removers available and two of the most well known might be Ad Aware and Spybot which are both good programs. The best available program that is designed to remove spyware and adware is however at the moment SpySweeper which was chosen as the best spyware remover 2004 by PC magazine.
Spy Sweeper can scan your computer 30% faster then other available products and successfully remove spyware like CoolWebSearch. Spy Sweeper also uses a system monitor that automatically discovers spy ware and prevents installation of spyware on our computer. Spy sweeper is effective for spyware and adware removal.
The active shield uses System Monitoring to in real time prevent new spy- and adware programs from being installed on your computer. This fact combined with the fact that Spy Sweepers uses a constantly updated database of all available spy- and ad wares means that this adware remover can clean your computer, ridding it of any and all spy- and ad ware. Once it has cleaned your computer it can keep it clean and assure that your computer stays clean from ad- and spy ware.
By keeping your computer free from spyware and adware Spy Sweepers also protects your information and keeps your identity safe. Spy Sweepers prompts you to update it if it has been to long since it was last updated.
If spy sweeper finds a spyware it will immediately quarantine the spyware and disable the spy wares functionality until you can decide whether to delete the file or try to clean the file from spyware elements and return the file to its original place on your hard drive.
If you have a problem with Spy Sweeper despite its highly user friendly and automated design you will have access to an excellent customer support where experts answers any question you might have.
Spy Sweepers deserved the title PC Magazine's Best of the Year 2004 since it can do everything the alternatives can do, but better as well as faster then the alternatives.
Supportcave.com offers new and enhanced Spyware Removal Software. Not only will these programs effectively check and clean your computer from Spyware, once installed they will also shield your computer from future Spyware intrusions and browser hijacks - before the malevolent software even have a chance to enter you PC! Spyware Remover Software is an important function all computer users should rely on to ensure their computer is free from nosey software and their privacy protected.
Jason Frovich | www.valuablecontent.com
Overcoming Small Business Networks Sales Objections
Overcoming Small Business Networks Sales Objections
Do you need help overcoming sales objections?
Do you sell computer networks, or other IT-related products and services to small businesses?
This article provides tips and hints so you can be overcoming the most common sales objections heard when selling networks to small business prospects, customers, and clients.
The problem generally begins when you start talking about a network upgrade. Around the time, many small business prospects, customers and clients will dwell on cost.
These small business prospects, customers and clients often neglect to consider the soft costs of not properly investing in a network? such as lost employee productivity when imprudent corners are cut, downtime when fault-tolerance is an afterthought, and service costs from computer consultants when difficult-to-support or "dead-end" solutions are selected primarily because of their low price tag.
No matter how thorough your initial consultation, IT audit, site survey and network design reports, some unforeseen client objections may pop up just before you get the client's authorization to proceed (generally a signed contract and retainer or deposit check).
Why Overcoming Sales Objections is SO Crucial
Because one relatively minor concern might threaten to derail the entire sale, you need to gain the critical business development skills for overcoming sales objections, with some of the biggest small business network deal-closing obstacles.
Empowered with these strategies for overcoming sales objections, you'll be much less apt to get emotional, defensive or just plain annoyed. You can then stay focused on keeping your eye on the ball and figuring out the best way to solve the prospect's or future client's problems ?and of course, close the sale. Remember, your company isn't in business to solve prospects' problems; only those of paying clients.
Overcoming Sales Objections: Apathy
I hope you get a good night's sleep before this sales objection rears its ugly head. You need a powerful force to overcome apathy.
If small business decision-makers have an apathetic outlook toward the prospect of implementing a network, your decision-makers might take weeks, months, or perhaps even years before feeling a sense of urgency about your proposed network project.
However, once you discover the roots of this apathy, you'll be better able to push (or at least nudge) the approval process along.
Here's a typical example you'll find in the field: The small business owner sees no problem with their existing peer-to-peer network. One or two seemingly innocuous foul-ups, however, can cause the small business owner to see the "light".
With a Microsoft Windows peer-to-peer network, for example, the "server" seems perfectly reliable until the person working on the PC functioning as the server inadvertently hits the reset button with his or her knee.
If you need to be overcoming more of the common sales objections, you must be very adept and recounting these kinds of cautionary tales with the right timing, delivery and empathy.
Using Network Reliability to Overcoming Sales Objections
PC/LAN network reliability can also get called into question when the user of the peer-to-peer server inadvertently performs an unannounced, unscheduled shutdown and restart because a software setup program prompted a reboot.
With peer-to-peer networks, protecting data is usually also an afterthought. If the peer-to-peer server isn't protected with fault tolerant hard drives, a reliable tape backup drive, a server-class UPS, and updated antivirus software, a peer-to-peer server becomes an accident waiting to happen.
So while any of these factors can turn apathy into your opportunity, sometimes a little divine intervention steps in to help you in overcoming sales objections.
One day a lightning storm and blackout pushes your client's "server" over the edge. When power's restored, the server cannot even boot up to its welcome or logon screen. So now, the small business owner is scrambling with the internal guru at 2 a.m. trying to restore the company's corrupted contact management database, which contains 25,000 records and three years of data.
Fear of Catastrophic Data Loss and Overcoming Sales Objections
Situations such as catastrophic data loss, although horrible tragedies for those affected, are great motivators for combating apathy and overcoming sales objections. All of a sudden, the small business owner becomes extremely receptive to your suggestions about your proposed networking solution, which of course features centralized security and data protection.
Discontinued technical support is another powerful counterforce for overcoming apathy-rooted sales objections, especially when you're talking about vertical, industry-specific software, such as niche applications designed for accountants, attorneys, physicians, realtors, auto body shops and restaurants.
After a certain point, the independent software vendor (ISV) selling vertical, industry-specific software draws a line in the sand and stops providing technical support, annual updates, and patches for older versions of their product.
So if your client is an accounting firm that needs updated tax tables (they'd basically be out of business without them), your client is forced to upgrade the tax software, which often in turn forces an upgrade of the server. This results in a call to your firm to upgrade their server (and several related highly lucrative product sales and service opportunities for your firm), all as a result of the "domino effect" from an ISV calling the shots.
With this kind of scenario, you don't even need to do much of the work in overcoming this sales objection. Your prospect's, customer's, or client's vertical ISV has done the ?heavy lifting? so to speak in overcoming sales objections.
So besides fears of unreliable systems and vendor-mandated upgrades, you can also overcome apathy by discussing your prospect's, customer's or client's competition (without naming names, of course). If you work with many small businesses in the same industry, and you're seeing a software or more general technology trend that drastically alters the competitive landscape in your prospect's or client's industry, by all means call this to your prospect's or client's attention, as a means of overcoming sales objections.
The Bottom Line
If you sell and service IT-related products to small businesses, you need to develop your sales skills for overcoming sales objections. This article introduces you to three different major categories of small business IT sales objections and helps you understand simple anecdotal closing strategies for overcoming those sales objections? and most importantly, closing more big-ticket sales.
Copyright MMI-MMVI, ComputerConsultantsSecrets.com, All Worldwide Rights Reserved. {Attention Publishers: Live hyperlink in author resource box required for copyright compliance}
www.valuablecontent.com
Computer Security - The #1 Issue In Personal Computing
Computer Security - The #1 Issue In Personal Computing
The Internet is a wonderful place. Anyone with an Internet connection can stay in touch with family and friends via email. Starting an Internet business is easier than ever and can even lead to the lifestyle of your dreams. And, thanks to eBay, you can even hold a "virtual garage sale" without worrying about the weather or bothering the neighbors.
But the Internet is also a DANGEROUS place to be. In fact, YOU are at RISK right now.
Computer security is the most important issue of being on the Internet. Just consider the following statement - startling I know, but VERY true.
"If you are connected to the Internet and you don't have current anti-virus software, ALL security updates to your Operating system and browser, as well as a firewall properly configured, you have a virus or adware on your computer RIGHT NOW!"
That is what I've been telling clients of my computer repair business recently. Some of them listened and took action. Others didn't and had to learn this important lesson the very hard way.
Let's look at the problem first, then I'm going to give you FIVE ways you can solve that problem today!
First: the facts.
Fact 1. There are three types of programs that are attacking your computer right now: Spyware, Malware, and Adware. All three are programs that get downloaded to your computer as part of a legitimate download, then hang around sending data like your credit card numbers to the villains who write them.
While this article is too short to define each, all three types are a threat. For now let's call them all adware.
Fact 2. In the last 12-18 months I have not seen ONE unprotected computer that doesn't have a virus or adware.
Doing computer repair on a daily basis for a living I see a LOT of computers. Some units have OVER 50 pieces of adware on them. Please understand; these people are just like you and me, not some 14 year old gamer who will download anything. They THOUGHT they were being careful enough, and were shocked when they discovered that they had a problem.
Some of these machines even had anti-virus software, but weren't updated with the latest security patches.
Fact 3. While onsite or phone support service calls used to involve bad hard drives, equipment failure, or adding new devices, about 80% of all service calls now involve virus and adware removal.
Fact 4. It's getting worse. The adware and virus creators are getting smarter, and the software is getting much harder to remove.
Here is what you can do TODAY to solve the problem, a problem you might not have even been aware existed, yet could cost you untold hours of frustration as well as put your financial life at risk.
Step 1. Be aware! Does your computer run slower now than when you bought it? Do some software programs no longer work or "hang up"? Does your browser go to some strange home page? If so, the odds are 99.9% that you ARE infected.
Step 2. Install anti-virus software that automatically updates. There are several good choices out there that fit that criteria, Norton, MacAfee, AVG, PC-cillin are the top brands. The important thing is to make sure that the software is setup to update the virus signatures automatically.
Step 3. Install all security patches for your operating system. Go to the Microsoft site and run a test of your computer and software. It will tell you what updates you need to install and even install them for you.
There is no cost and it is extremely effective against many of the virus and adware out there. Go here to check your system: www.microsoft.com and look on the menu on the left for Windows Update and click on that. Depending on what operating system you have, it will take you to the appropriate update page. Also turn on auto-update if your operating system allows that feature.
Step 4. Install a firewall. A firewall looks at network traffic coming into or going out of your computer. Viruses or adware that may try and infect you is scrutinized and rejected. Windows XP has an included firewall (automatically turned on in the SP2 update) that can help but you may find a 3rd party program like Zone Alert (www.zonelabs.com) to be a better choice.
Step 5. Now that you know the danger, use a generous amount of common sense in reading email and surfing the web. If you get an email attachment from anyone you don't know, don't open it, ever!
If you know the person sending the attachment but it looks questionable, don't open it. You may also want to set your email to open only in text mode, that keeps any html (that can run a program) from doing any harm.
Never, and I mean never, click on a hyperlink in an email to fill out any financial, password, or login data. No legitimate vendor will ever ask you to do this under any circumstances.
When you are surfing the web and a window pops up and asks you to install a program, just say no. If you don't recognize the company or publisher, don't do it. You can go into your browser security section and make changes so that no outside source can make any installations or changes with out prompting you to approve.
Keep current backups of all your important data. We all know to do this, but so few actually do it. No matter the method - just do it!!!! If disaster strikes, your critical data will be safe.
By following these five tips you will have peace of mind knowing that your online experiences, be they playing games or making money or something totally different, are safe as well as enjoyable.
Protect your data, and your peace of mind, by taking action on these five steps today.
John Dow | www.valuablecontent.com
XCACLS, SUNINACL, And Other Permissions Security Recovery Tools
XCACLS, SUNINACL, And Other Permissions Security Recovery Tools
Title
-----
XCACLS And Other Permissions Security Recovery Tools
You Have 50GB Of Data To Move Along With Permissions Security
----------------------------
This article is about several tools that can save a Windows administrators you know what in the event of a large scale permissions security problem.
Here is a fictional scenario we can use to illustrate the use of the XCACLS tool. We need to move or copy 50GB worth of data that is comprised of several thousand directories containing hundreds of thousands of small files from one storage system to another. These systems happen to part of a Windows 2000 Domain and permissions are quite granular in definition. We start the replication of that data using a favorite replication or synchronization tool and walk away for the evening. When we return the next day, everything has copied and all looks well. That is until you try to access the data.
The Data Is Copied, But I Cannot Access It: Permissions Security Problem
--------------------------------------------------
What you did not know, until just now, is that the root directory of the drive that you copied the data to had the wrong permissions assigned to it. In addition, inheritance was configured such that any data that is placed on the drive is over written with the permissions of the root directory. In this case, it was an old account that no longer existed. Believe it or not, that can happen, and system administrators will know what I am talking about. Now you are left with trying to figure out what to do. Do I format the new drive, change the permissions and inheritance on the root directory so they are correct and start all over again? Do I make the changes on the root drive so they have the correct permissions and wait hours upon hours for the permissions to propagate? No, there is another, very fast way of resolving this issue with XCACLS or another tool called SUBINACL.
XCALCS Quickly Resets Permissions On Directories And Files
----------------------------
Becasue I have limited space in this article, I am going to use XCACLS as the tool to correct this problem. However, in complex permissions structures, you will most likely want to use SUBINACL to fix the issue. I will talk about SUBINACL briefly at the end of the article.
XCACLS as a very fast tool that can set, remove, add, and change permissions on files and directories. For intance, the following command replaces all existing access rights and accounts with that of "dmiller" on the file "file.txt" with read-only access: "xcalcs file.txt /Y /T /G domain\dmiller:r". Although that is pretty easy and helpful, what about changing all my directories and files, which I have thousands of, to allow the domain\dmiller account to have full access? To do this in a very fast fashion you could execute the following from the root directory of the drive: "for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domain\dmiller:f". This will go through every directory, subdirectory, and file and replace the current permissions with dmiller having full access to the object. You'll notice I put "" around the %g in the example. This is not required, but if you have directories that have names with spaces in them you will need to have the "".
What Other Ways Can I Use XCACLS To Change Security Permissions
----------------------------------------------------------
To give you a few additional handy examples of how you can use this tool take a look at the follow command prompt methods for replacing, updating and removing accounts and permissions from large numbers of directories and files.
The following command replaces all existing access rights an accounts with that of dmiller with read only access rights:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domain\dmiller:r
The following command does not replace existing account permissions, instead, it adds the account, in the example the local admin account, with read only permissions:
for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /G administrator:r
The following command removes the account "administrator" permissions from all directories, files, and subdirectories: for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /R administrator
This command should update all the directories and their contents to allow Domain Admins full access:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G "Domain Admins:f"
I did a test on my XP Pro workstation and was able to change the permissions on approximately 10000 directories and files in less 1 minute. On one of my servers I was able to achieve a 500% increase in speed. It is blazingly fast.
SUBINACL Is More Complex But Man Can It Really Save The Day
-----------------------------------------------
I cannot go into specifics about this tool in this article but I will tell you what it can do. And again, it does it very very fast. Using the same scenario as above, let's say that you had to fix the permissions on thousands of home directories. With SUBINACL, you can actually go to the original directories and files, use the tool to create what is called a "play file", a text file that contains the right account and permissions from the source files, then use that same file to tell SUBINACL to fix the permissions on the target storage system, the one with the screwed up permissions. It's quite the life saver if you ever find yourself in the type of predicament.
Also check out "CACLS". This command is inherent to Windows XP Professional.
Conclusion
----------
These tools are contained in the Windows 2000 and 2003 server resource tool kit, however several of them also exist native to the Windows XP environment. Check them out if you don't already know about them. Even if you have no use for them right now it may save you hours of hard work and stress in the event of a future permissions problem.
Darren Miller | www.valuablecontent.com
Effective Employee Internet Monitoring
Effective Employee Internet Monitoring
Many business owners find themselves in the position to confront employees about their Internet use. Non-work related activities including online games, Internet shopping, stock trading, Internet radio, streaming media and MP3 downloads represent the new temptations in the workplace.
When an employee connects to the Internet, your company is exposed to these four threats:
Productivity Threats: Just 20 minutes of recreational surfing a day can cost a company with 30 employees over $1000 per week (At $25/hr per employee)
Legal Threats: Employees can sue if you don't provide a work environment free of gender and minority harassment. This means taking reasonable care to block offensive Internet content.
Network Threats: An employee can crash your network just by logging into the wrong website. Other activity like recreational surfing and downloading MP3 files can divert valuable bandwidth from critical business needs.
Security Threats: Viruses enter networks through a variety of sources, such as web-based email, Instant Messenger file transfer, email attachments or through other files directly downloaded from a website.
Companies of all sizes must effectively incorporate email, Instant Messages and web traffic logs into their overall records management strategy. Some companies must do this to comply with industry regulations such as Sarbanes-Oxley, Gramm-Leach-Bliley and HIPAA.
The first step is to choose the types of Internet content that will not be allowed in the workplace. Keep in mind that not all employees will have the same privileges, so it is important the network management solution you choose provides a flexible configuration to suit your needs.
There are two basic types of Internet monitoring solutions: Gateway and desktop solutions. Gateway solutions are software or hardware that act as checkpoint for all Internet traffic on the network. Desktop solutions are installed on the local machine to enforce the Internet policies before the request leaves the machine. Desktop solutions work well on smaller networks and gateway solutions work well on both.
The next step is to create an official company policy specifically for Internet use. It should include all Internet activities and not just those you wish to manage. Keep in mind the document cannot account for every possible scenario on the Internet, so it is important to use broad terms with specific examples. For example, instead of stating ?Political opinions are not to be posted on newsgroups,? you may wish to use ?Messages originating from the company network or other company-owned assets may not contain political opinions.? The second clause is much stronger because it doesn?t specify a message type or delivery system. If you have liability insurance, then be sure to get their approval on all documents. In some cases they will have additional provisions that directly relate to your industry.
The most difficult step will be implementing the new policies. In most cases, some or all users will experience a reduction in Internet privileges. Prepare for a temporary increase in support requests as some users will be prevented from accessing some work-related content. Internet policy configuration is an on-going process that must be routinely maintained.
Soon the complaints from users will cease and production will return back to normal. It is important to keep your filtering software updated and to maintain a history of Internet activity. If the time comes when you must confront an employee about their Internet use, you will have proof of their Internet activity and a detailed comparison to their peers. That is a much stronger case than saying ?I?ve seen you 10 times looking at ?.?
Frank Hughes | www.valuablecontent.com
Three Dimensions to Protect your Computer
Three Dimensions to Protect your Computer
First - Strengthen the defense of your computer
- Install Firewalls
"Firewall" is an isolation technology to separate the internal network and the Internet. The firewall carries out some filtering when two networks communicate. It lets the data/person that you "agree" to enter your network, and also block the data/person you "do not agree" from your network. It can prevent they changes, copy, or destroys your material. To ensure the firewall get into work, you must keep it update.
- Install Anti-virus software
The key on computer virus is not "Kill" is "Prevent". You should install the Anti-virus software and start the real-time monitoring process and keep the software and the virus definition file updated. To guard against the newest virus, you should set the update process in a daily mode. Also, in every week, you should scan the computer completely for the virus.
- Guard against Spyware
Spyware is a program that is installed without the user authorization. It can get the information and send to a third party. Spyware can attached in software, executable image and break into the user computer. They are used to track the computer usage information, record the keyboard hits, or take a screen capture. To get rid from spyware, you can
- raise the security level of your browser
- install software to guard against from spyware
- verify with the official website about the software plan to install
Second - Against from attacks
- Refuse unknown software, emails and attachments
Don't download unknown software. Save all downloaded softwares into one single directory and scan it before install. Don't open any unknown email and its attachments. Many viruses are spread through by using email. Don't open unknown emails, especially those with interesting headline.
- Don't go to hacker and pornographic website
Many virus and spyware are come from these websites. If you browse this website and your computer is not secure enough, you can imagine what will happen next.
- Avoid share folders
Share folder is risky and outsider can surf around your folder freely. When you want to share folder, remember to set a password. If you are no need to share the folder any more, remove the sharing immediately. It is extremely danger to share the whole drive. If someone removes the system file, your machine may be down and cannot start up again.
Last - Keep Checking/Update
- Set different and complicate password
In Internet, there are thousand needs to use password, like e-banking, login account, email. Try to use different password for different operation, this can limit the loss if one of the passwords is broken into by someone. Avoid using meaningful password, like birthday, telephone number. You should use password with letter and number. One more thing is do not choose "Save Password" option.
- Beware of defraud
The number of defraud case in Internet is keep increasing. Build up a fake bank website, send out an email to ask for password. Before take any action, try to verify it is real or not. You can phone to bank hotline to ask, go to the bank to contact directly.
- Backup
Backup is the last step to guard against the attacks. If your computer is hacked, the operating system and softwares can be reinstalled. But the data can only be restored if you frequently make a backup.
Isaac Chu | www.valuablecontent.com