Home Random Page



First: A Back Up Plan

The backup plan for your computer should emphasize backing up your data files and do so automatically and frequently. Programs can be repurchased if necessary and reinstalled, but data may be impossible to replace.

A plan that you do not actually use is not a plan at all, so make this as automatic as possible. There are a number of free or inexpensive services that automatically synchronize a backup over the Internet.

If you make copies on CD/DVD or tape or an external drive, you must store those backups somewhere besides in the same room as the computer that you are backing up or even the same building. The same event could wipe out the computer and the backup!

Write protect This keeps your files from being overwritten with new ones. Removable media including USB drives: Look for a tiny write-protect switch on the device. Hard disks and devices without a switch:
  • Make files Read-Only and/or Hidden to keep them from being overwritten accidentally. This is done by changing the file attributes using whatever system you have for managing files.
  • Assign a password to each file, which can be done with some programs and some USB drives.
  • Encrypt the files. This will require special software and remembering the decryption key.
Backup Copies Make multiple copies of important data often and store them in different physical locations. How many copies depends on how hard the data will be to replace and how distraught you will be if it is lost. Kinds of copies:
  • on the same drive but in a different folder
  • on a removable drive
  • on a CD or DVD
  • in online storage like Sky Drive or DropBox or Google Drive
  • included in your normal backup plan
For truly important data, you want to store a physical copy in another physical location. Online drives will usually synchronize the files that you save to a local folder for that service. The more important the files are, the more copies in more places you need.
Anti-malware Use a set of programs that continuously look for an attack by a virus, trojan, or worm . Computer viruses/trojans/worms are sneaky computer programs that can erase your data and even your whole system. Many are merely annoying and are created as practical jokes. But there are a number of very damaging malware programs out there, plus others that are out to steal your passwords or use your computer to damage or annoy others. Your computer gets one of these nasties by downloading an infected file from the Internet (sometimes without your knowledge!) or your office network, or by first using a removable disk in an infected computer and then accessing a file on that removable disk with your own computer. This makes it difficult to keep them from spreading. Once you have disinfected your computer, it can get re-infected from a removable disk that was used between the time you were infected with the malware and when you disinfected it. A number of nasty viruses hide for quite a while before doing their nasty things. So you can infect a lot of your own backups and other disks and spread the infection, all unknowingly, to others. Run an anti-malware program that actively looks for infections all the time. Don't wait until you have symptoms. A lot of damage can be done before you figure out that you have a problem.

Date: 2015-01-11; view: 965

<== previous page | next page ==>
Storage: Accessing Data | Storage: Summary
doclecture.net - lectures - 2014-2023 year. Copyright infringement or personal data (0.013 sec.)