Upload
fazrul-rosli
View
226
Download
0
Embed Size (px)
Citation preview
7/31/2019 Implementing Hard Drive
1/43
ImplementingHard Drive
7/31/2019 Implementing Hard Drive
2/43
Managing Hard Drives
Use Windows utilities to protect, optimize, andmaintain hard drives
Defrag and Windows Disk Defragmenter
ScanDisk
Disk Cleanup
Disk compression
Disk caching
Making backups Access utilities from command prompt or
Windows desktop
7/31/2019 Implementing Hard Drive
3/43
Defrag Command and Windows DiskDefragmenter
Detects and repairs fragmentation, which canslow down access time and complicate
recovery of a corrupted file
Defragment hard drive once a month
7/31/2019 Implementing Hard Drive
4/43
ScanDisk
Designed to replace Chkdsk command
Repairs cross-linked and lost clusters
Checks FAT for problems with long filenamesand the directory tree
Scans the disk for bad sectors
Repairs problems with structure of a harddrive that has been compressed using
Windows DriveSpace or DoubleSpace
7/31/2019 Implementing Hard Drive
5/43
Cross-Lined and Lost Clusters
7/31/2019 Implementing Hard Drive
6/43
ScanDisk Results
7/31/2019 Implementing Hard Drive
7/43
ScanDisk in MS-DOS Mode
7/31/2019 Implementing Hard Drive
8/43
Disk Cleanup
7/31/2019 Implementing Hard Drive
9/43
Disk Compression Methods
Store data on hard drive in one big file
Manage writing of data and programs to that file
Rewrite data in files in mathematically codedformat that uses less space
7/31/2019 Implementing Hard Drive
10/43
Disk Compression
Disk compression in Windows XP andWindows 2000
Use the NTFS file system
Disk compression in Windows 9x
Use DriveSpace utility on a FAT 16 file system
7/31/2019 Implementing Hard Drive
11/43
Disk Cache
Temporary storage area in RAM for databeing read from or written to a hard drive
Speeds up access time to the drive
7/31/2019 Implementing Hard Drive
12/43
Disk Caching
7/31/2019 Implementing Hard Drive
13/43
Disk Caching (continued)
Hardware cache versus software cache
How disk caching methods have changed
DOS
DOS with Windows 3.x
Windows 9x
Windows NT/2000/XP
7/31/2019 Implementing Hard Drive
14/43
Making Backups
Child, parent, grandparent method
Full, incremental, and differential backups Scheduling backups
Backup software
Disk cloning software
Planning for disaster recovery
7/31/2019 Implementing Hard Drive
15/43
Child, Parent, Grandparent Method
F ll I t l d Diff ti l
7/31/2019 Implementing Hard Drive
16/43
Full, Incremental, and DifferentialBackups
Full Backs up all data from hard drive
Incremental
Backs up only files that have changed or beencreated since last backup
Differential
Backs up files that have changed or been createdsince the last fullbackup
7/31/2019 Implementing Hard Drive
17/43
Scheduling Backups
7/31/2019 Implementing Hard Drive
18/43
Scheduling Backups (continued)
7/31/2019 Implementing Hard Drive
19/43
Scheduling Backups (continued)
7/31/2019 Implementing Hard Drive
20/43
Backup Software
Comes with most tape drives
Third-party software also available
Backup utilities are provided with Windows
NT/2000/XP and Windows 9x
7/31/2019 Implementing Hard Drive
21/43
Windows 2000/XP Backup Utility
Can perform immediate backup from Backup
tab
Can schedule repeated backups
7/31/2019 Implementing Hard Drive
22/43
Disk Cloning Software
Replicates hard drive to a different computer or to another driveon the same computer
Examples
Drive Image by PowerQuest
ImageCast by Innovative Software
Norton Ghost by Symantec Corp
7/31/2019 Implementing Hard Drive
23/43
Planning for Disaster Recovery
Verify your recovery plan
Keep a record of regular backups
Folders or drives backed up
Date of the backup
Type of backup
Label identifying the tape, disk, or other media
Viruses and Other Computer
7/31/2019 Implementing Hard Drive
24/43
Viruses and Other ComputerInfestations
Virus Has an incubation period Is contagious; replicates by attaching to other
programs; infected program must be executed for a
virus to run
Is destructive
Worm Spreads copies of itself without a host program,overloading the network as it replicates
Does damage by its presence
Best defense is a firewall
Trojan horse
Does not need a host program to work Substitutes itself for a legitimate program
Most cannot replicate
Logic bomb Dormant code added to software; triggered at a
predetermined time or by a predetermined event
Understanding Computer
7/31/2019 Implementing Hard Drive
25/43
Understanding ComputerInfestations
Where viruses hide Boot sector viruses
File viruses
Multipartite viruses
Cloaking techniques Polymorphic viruses
Encrypting viruses
Stealth viruses Potential damage ranges from minor to major
7/31/2019 Implementing Hard Drive
26/43
How Infestations Spread
User activities can increase susceptibility
Virus replicates
A Trojan horse gets into your computer
A worm gets into your computer
7/31/2019 Implementing Hard Drive
27/43
How a Virus Replicates
How a Worm Gets into Your
7/31/2019 Implementing Hard Drive
28/43
How a Worm Gets into YourComputer
7/31/2019 Implementing Hard Drive
29/43
Virus Hoaxes
E-mail warnings about a nonexistent virus
Overload network traffic
Check Web sites that specialize in debunking
virus hoaxes
Protecting Against Computer
7/31/2019 Implementing Hard Drive
30/43
Protecting Against ComputerInfestations
Make backups
Use antivirus software regularly
Keep Windows current with updates and
patches
Implement a firewall
P t ti A i t C t
7/31/2019 Implementing Hard Drive
31/43
Protecting Against ComputerInfestations (continued)
Be aware of virus symptoms
Know what to do when you suspect a virus
infestation
Run antivirus software
Check Web site of AV software manufacturer
Use antivirus software
Capabilities to Look for When
7/31/2019 Implementing Hard Drive
32/43
Capabilities to Look for WhenSelecting Antivirus Software
Download software upgrades and virus definitionsfrom the Internet
Automatically execute at startup
Detect macros in word-processing documents
Automatically monitor files being downloaded fromthe Internet
Send virus alerts to your e-mail address
Scan both automatically and manually
General Troubleshooting
7/31/2019 Implementing Hard Drive
33/43
General TroubleshootingGuidelines
Make backups and keep them current
Run antivirus software regularly
Defragment files and scan the hard drive
occasionally
Dont smoke around your hard drive
Dont leave the PC turned off for weeks ormonths at at time
General Troubleshooting
7/31/2019 Implementing Hard Drive
34/43
General TroubleshootingGuidelines (continued)
High humidity can be dangerous for hard
drives
Be gentle with a hard drive
Take precautions when moving a hard drive
or changing CMOS setup
Resolving Common Hard Drive
7/31/2019 Implementing Hard Drive
35/43
Resolving Common Hard DriveProblems
Categories of problems Caused by hardware or software?
Prevent hard drive from booting or preventdata from being accessed?
Gather basic information from user; diagnoseand address the problems
Focus on the main priority
Use available resources (documentation,manufacturers Web site, technical support)
Troubleshooting Hard Drives with
7/31/2019 Implementing Hard Drive
36/43
Troubleshooting Hard Drives withThird-Party Software
Norton Utilities
SpinRite
PartitionMagic
7/31/2019 Implementing Hard Drive
37/43
Hardware Problems
Hard drive not found
Invalid drive or drive specification
Damaged boot record
Damaged FAT or root directory or bad
sectors
Cannot boot from the hard drive
Drive retrieves and saves data slowly
Software Problems with Hard
7/31/2019 Implementing Hard Drive
38/43
Software Problems with HardDrives
Corrupted OS files Corrupted partition table, boot record, or root
directory, making all data on the hard drive
inaccessible Corrupted area of the FAT that points to the
data, datas directory table, or sector
markings where data is located Corrupted data
Resolving Hard Drive and Data
7/31/2019 Implementing Hard Drive
39/43
Resolving Hard Drive and DataAccess Problems
Partition table
Boot record
FAT and root directory
System files
Data and program files
7/31/2019 Implementing Hard Drive
40/43
Data and Program File Corruption
Options for restoring a data file that is notbacked up
OS system tools and commands
Third-party software
Professional data recovery service
Data and Program File Corruption
7/31/2019 Implementing Hard Drive
41/43
Data and Program File Corruption(continued)
Recovering data when portions of a damagedfile are still intact
Create a new file on another disk
Use Copy command
Edit new file to replace missing data
Data and Program File Corruption
7/31/2019 Implementing Hard Drive
42/43
Data and Program File Corruption(continued)
Potential problems with files and file system
Corrupted file header
Lost clusters
Erased file
7/31/2019 Implementing Hard Drive
43/43
Getting Technical Support
Before you call, have available:
Drive model and description
Manufacturer and model of computer
Exact wording of error message
Description of the problem
Hardware and software configuration for the
system