44
Implementing Implementing Hard Drive Hard Drive

10 implementing hard drive

Embed Size (px)

DESCRIPTION

Comtia A+ note

Citation preview

Page 1: 10 implementing hard drive

Implementing Implementing Hard DriveHard Drive

Page 2: 10 implementing hard drive

You Will Learn…You Will Learn…

About supporting hard drives and About supporting hard drives and making backupsmaking backups

About viruses and other computer About viruses and other computer infestations, and how to protect infestations, and how to protect against themagainst them

How to troubleshoot hard drivesHow to troubleshoot hard drives

Page 3: 10 implementing hard drive

Managing Hard DrivesManaging Hard Drives

Use Windows utilities to protect, Use Windows utilities to protect, optimize, and maintain hard drivesoptimize, and maintain hard drives– Defrag and Windows Disk DefragmenterDefrag and Windows Disk Defragmenter– ScanDiskScanDisk– Disk CleanupDisk Cleanup– Disk compressionDisk compression– Disk cachingDisk caching– Making backupsMaking backups

Access utilities from command Access utilities from command prompt or Windows desktopprompt or Windows desktop

Page 4: 10 implementing hard drive

Defrag Command and Defrag Command and Windows Disk Windows Disk DefragmenterDefragmenter

Detects and repairs Detects and repairs fragmentation, which can slow fragmentation, which can slow down access time and complicate down access time and complicate recovery of a corrupted filerecovery of a corrupted file

Defragment hard drive once a Defragment hard drive once a monthmonth

Page 5: 10 implementing hard drive

ScanDiskScanDisk

Designed to replace Chkdsk commandDesigned to replace Chkdsk command

Repairs cross-linked and lost clustersRepairs cross-linked and lost clusters

Checks FAT for problems with long Checks FAT for problems with long filenames and the directory treefilenames and the directory tree

Scans the disk for bad sectorsScans the disk for bad sectors

Repairs problems with structure of a Repairs problems with structure of a hard drive that has been compressed hard drive that has been compressed using Windows DriveSpace or using Windows DriveSpace or DoubleSpaceDoubleSpace

Page 6: 10 implementing hard drive

Cross-Lined and Lost Cross-Lined and Lost ClustersClusters

Page 7: 10 implementing hard drive

ScanDisk ResultsScanDisk Results

Page 8: 10 implementing hard drive

ScanDisk in MS-DOS ScanDisk in MS-DOS ModeMode

Page 9: 10 implementing hard drive

Disk CleanupDisk Cleanup

Page 10: 10 implementing hard drive

Disk Compression Disk Compression MethodsMethods Store data on hard drive in one big Store data on hard drive in one big

filefile

– Manage writing of data and programs Manage writing of data and programs to that fileto that file

Rewrite data in files in Rewrite data in files in mathematically coded format that mathematically coded format that uses less spaceuses less space

Page 11: 10 implementing hard drive

Disk CompressionDisk Compression

Disk compression in Windows XP Disk compression in Windows XP and Windows 2000and Windows 2000

– Use the NTFS file systemUse the NTFS file system

Disk compression in Windows 9xDisk compression in Windows 9x

– Use DriveSpace utility on a FAT 16 Use DriveSpace utility on a FAT 16 file systemfile system

Page 12: 10 implementing hard drive

Disk CacheDisk Cache

Temporary storage area in RAM Temporary storage area in RAM for data being read from or for data being read from or written to a hard drivewritten to a hard drive

Speeds up access time to the Speeds up access time to the drivedrive

Page 13: 10 implementing hard drive

Disk CachingDisk Caching

Page 14: 10 implementing hard drive

Disk Caching (Disk Caching (continuedcontinued))

Hardware cache versus software cacheHardware cache versus software cache

How disk caching methods have changedHow disk caching methods have changed

– DOSDOS

– DOS with Windows 3.xDOS with Windows 3.x

– Windows 9xWindows 9x

– Windows NT/2000/XPWindows NT/2000/XP

Page 15: 10 implementing hard drive

Making BackupsMaking Backups

Child, parent, grandparent methodChild, parent, grandparent method

Full, incremental, and differential Full, incremental, and differential backupsbackups

Scheduling backupsScheduling backups

Backup softwareBackup software

Disk cloning softwareDisk cloning software

Planning for disaster recoveryPlanning for disaster recovery

Page 16: 10 implementing hard drive

Child, Parent, Child, Parent, Grandparent MethodGrandparent Method

Page 17: 10 implementing hard drive

Full, Incremental, and Full, Incremental, and Differential BackupsDifferential Backups FullFull

– Backs up all data from hard driveBacks up all data from hard drive

IncrementalIncremental

– Backs up only files that have changed or Backs up only files that have changed or been created since last backupbeen created since last backup

DifferentialDifferential

– Backs up files that have changed or been Backs up files that have changed or been created since the last created since the last fullfull backup backup

Page 18: 10 implementing hard drive

Scheduling BackupsScheduling Backups

Page 19: 10 implementing hard drive

Scheduling Backups Scheduling Backups ((continuedcontinued))

Page 20: 10 implementing hard drive

Scheduling Backups Scheduling Backups ((continuedcontinued))

Page 21: 10 implementing hard drive

Backup SoftwareBackup Software

Comes with most tape drivesComes with most tape drives

Third-party software also Third-party software also availableavailable

Backup utilities are provided with Backup utilities are provided with Windows NT/2000/XP and Windows NT/2000/XP and Windows 9xWindows 9x

Page 22: 10 implementing hard drive

Windows 2000/XP Windows 2000/XP Backup UtilityBackup Utility

Can perform immediate backup Can perform immediate backup from Backup tabfrom Backup tab

Can schedule repeated backupsCan schedule repeated backups

Page 23: 10 implementing hard drive

Disk Cloning SoftwareDisk Cloning Software

Replicates hard drive to a different computer Replicates hard drive to a different computer or to another drive on the same computeror to another drive on the same computer

ExamplesExamples

– Drive Image by PowerQuestDrive Image by PowerQuest

– ImageCast by Innovative SoftwareImageCast by Innovative Software

– Norton Ghost by Symantec CorpNorton Ghost by Symantec Corp

Page 24: 10 implementing hard drive

Planning for Disaster Planning for Disaster RecoveryRecovery Verify your recovery planVerify your recovery plan

Keep a record of regular backupsKeep a record of regular backups

– Folders or drives backed upFolders or drives backed up

– Date of the backupDate of the backup

– Type of backupType of backup

– Label identifying the tape, disk, or other Label identifying the tape, disk, or other mediamedia

Page 25: 10 implementing hard drive

Viruses and Other Viruses and Other Computer InfestationsComputer Infestations

VirusVirus Has an incubation periodHas an incubation period Is contagious; replicates by attaching to other Is contagious; replicates by attaching to other

programs; infected program must be executed programs; infected program must be executed for a virus to runfor a virus to run

Is destructiveIs destructive

WormWorm Spreads copies of itself without a host Spreads copies of itself without a host program, overloading the network as it program, overloading the network as it replicatesreplicates

Does damage by its presenceDoes damage by its presence Best defense is a firewallBest defense is a firewall

Trojan horseTrojan horse Does not need a host program to workDoes not need a host program to work Substitutes itself for a legitimate programSubstitutes itself for a legitimate program Most cannot replicateMost cannot replicate

Logic bombLogic bomb Dormant code added to software; triggered at Dormant code added to software; triggered at a predetermined time or by a predetermined a predetermined time or by a predetermined eventevent

Page 26: 10 implementing hard drive

Understanding Understanding Computer InfestationsComputer Infestations Where viruses hideWhere viruses hide

– Boot sector virusesBoot sector viruses– File virusesFile viruses– Multipartite virusesMultipartite viruses

Cloaking techniquesCloaking techniques– Polymorphic virusesPolymorphic viruses– Encrypting virusesEncrypting viruses– Stealth virusesStealth viruses

Potential damage ranges from minor to Potential damage ranges from minor to majormajor

Page 27: 10 implementing hard drive

How Infestations How Infestations SpreadSpread User activities can increase User activities can increase

susceptibilitysusceptibility

Virus replicatesVirus replicates

A Trojan horse gets into your A Trojan horse gets into your computercomputer

A worm gets into your computerA worm gets into your computer

Page 28: 10 implementing hard drive

How a Virus ReplicatesHow a Virus Replicates

Page 29: 10 implementing hard drive

How a Worm Gets into How a Worm Gets into Your Computer Your Computer

Page 30: 10 implementing hard drive

Virus HoaxesVirus Hoaxes

E-mail warnings about a E-mail warnings about a nonexistent virusnonexistent virus

Overload network trafficOverload network traffic

Check Web sites that specialize in Check Web sites that specialize in debunking virus hoaxesdebunking virus hoaxes

Page 31: 10 implementing hard drive

Protecting Against Protecting Against Computer InfestationsComputer Infestations

Make backupsMake backups

Use antivirus software regularlyUse antivirus software regularly

Keep Windows current with Keep Windows current with updates and patchesupdates and patches

Implement a firewallImplement a firewall

Page 32: 10 implementing hard drive

Protecting Against Protecting Against Computer Infestations Computer Infestations ((continuedcontinued))

Be aware of virus symptomsBe aware of virus symptoms

Know what to do when you suspect a Know what to do when you suspect a virus infestationvirus infestation

– Run antivirus softwareRun antivirus software

– Check Web site of AV software Check Web site of AV software manufacturermanufacturer

Use antivirus softwareUse antivirus software

Page 33: 10 implementing hard drive

Capabilities to Look for Capabilities to Look for When Selecting Antivirus When Selecting Antivirus SoftwareSoftware

Download software upgrades and virus Download software upgrades and virus definitions from the Internetdefinitions from the Internet

Automatically execute at startupAutomatically execute at startup Detect macros in word-processing Detect macros in word-processing

documentsdocuments Automatically monitor files being Automatically monitor files being

downloaded from the Internetdownloaded from the Internet Send virus alerts to your e-mail addressSend virus alerts to your e-mail address Scan both automatically and manuallyScan both automatically and manually

Page 34: 10 implementing hard drive

General General Troubleshooting Troubleshooting GuidelinesGuidelines Make backups and keep them currentMake backups and keep them current

Run antivirus software regularlyRun antivirus software regularly

Defragment files and scan the hard Defragment files and scan the hard drive occasionallydrive occasionally

Don’t smoke around your hard driveDon’t smoke around your hard drive

Don’t leave the PC turned off for Don’t leave the PC turned off for weeks or months at at timeweeks or months at at time

Page 35: 10 implementing hard drive

General General Troubleshooting Troubleshooting Guidelines (Guidelines (continuedcontinued)) High humidity can be dangerous High humidity can be dangerous

for hard drivesfor hard drives

Be gentle with a hard driveBe gentle with a hard drive

Take precautions when moving a Take precautions when moving a hard drive or changing CMOS hard drive or changing CMOS setupsetup

Page 36: 10 implementing hard drive

Resolving Common Resolving Common Hard Drive ProblemsHard Drive Problems Categories of problemsCategories of problems

– Caused by hardware or software?Caused by hardware or software?– Prevent hard drive from booting or prevent Prevent hard drive from booting or prevent

data from being accessed?data from being accessed? Gather basic information from user; diagnose Gather basic information from user; diagnose

and address the problemsand address the problems Focus on the main priorityFocus on the main priority Use available resources (documentation, Use available resources (documentation,

manufacturer’s Web site, technical support)manufacturer’s Web site, technical support)

Page 37: 10 implementing hard drive

Troubleshooting Hard Troubleshooting Hard Drives with Third-Party Drives with Third-Party SoftwareSoftware Norton UtilitiesNorton Utilities

SpinRiteSpinRite

PartitionMagicPartitionMagic

Page 38: 10 implementing hard drive

Hardware ProblemsHardware Problems

Hard drive not foundHard drive not found

Invalid drive or drive specificationInvalid drive or drive specification

Damaged boot recordDamaged boot record

Damaged FAT or root directory or bad Damaged FAT or root directory or bad sectorssectors

Cannot boot from the hard driveCannot boot from the hard drive

Drive retrieves and saves data slowlyDrive retrieves and saves data slowly

Page 39: 10 implementing hard drive

Software Problems Software Problems with Hard Driveswith Hard Drives Corrupted OS filesCorrupted OS files

Corrupted partition table, boot record, Corrupted partition table, boot record, or root directory, making all data on or root directory, making all data on the hard drive inaccessiblethe hard drive inaccessible

Corrupted area of the FAT that points Corrupted area of the FAT that points to the data, data’s directory table, or to the data, data’s directory table, or sector markings where data is locatedsector markings where data is located

Corrupted dataCorrupted data

Page 40: 10 implementing hard drive

Resolving Hard Drive Resolving Hard Drive and Data Access and Data Access ProblemsProblems Partition tablePartition table

Boot recordBoot record

FAT and root directoryFAT and root directory

System filesSystem files

Data and program filesData and program files

Page 41: 10 implementing hard drive

Data and Program File Data and Program File CorruptionCorruption

Options for restoring a data file Options for restoring a data file that is not backed upthat is not backed up

– OS system tools and commandsOS system tools and commands

– Third-party softwareThird-party software

– Professional data recovery serviceProfessional data recovery service

Page 42: 10 implementing hard drive

Data and Program File Data and Program File Corruption (Corruption (continuedcontinued))

Recovering data when portions of Recovering data when portions of a damaged file are still intacta damaged file are still intact

– Create a new file on another diskCreate a new file on another disk

– Use Copy commandUse Copy command

– Edit new file to replace missing dataEdit new file to replace missing data

Page 43: 10 implementing hard drive

Data and Program File Data and Program File Corruption (Corruption (continuedcontinued))

Potential problems with files and Potential problems with files and file systemfile system

– Corrupted file headerCorrupted file header

– Lost clustersLost clusters

– Erased fileErased file

Page 44: 10 implementing hard drive

Getting Technical Getting Technical SupportSupport Before you call, have available:Before you call, have available:

– Drive model and descriptionDrive model and description

– Manufacturer and model of computerManufacturer and model of computer

– Exact wording of error messageExact wording of error message

– Description of the problemDescription of the problem

– Hardware and software configuration for Hardware and software configuration for the systemthe system