Upload
hafizhanif86
View
66
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Comtia A+ note
Citation preview
Implementing Implementing Hard DriveHard Drive
You Will Learn…You Will Learn…
About supporting hard drives and About supporting hard drives and making backupsmaking backups
About viruses and other computer About viruses and other computer infestations, and how to protect infestations, and how to protect against themagainst them
How to troubleshoot hard drivesHow to troubleshoot hard drives
Managing Hard DrivesManaging Hard Drives
Use Windows utilities to protect, Use Windows utilities to protect, optimize, and maintain hard drivesoptimize, and maintain hard drives– Defrag and Windows Disk DefragmenterDefrag and Windows Disk Defragmenter– ScanDiskScanDisk– Disk CleanupDisk Cleanup– Disk compressionDisk compression– Disk cachingDisk caching– Making backupsMaking backups
Access utilities from command Access utilities from command prompt or Windows desktopprompt or Windows desktop
Defrag Command and Defrag Command and Windows Disk Windows Disk DefragmenterDefragmenter
Detects and repairs Detects and repairs fragmentation, which can slow fragmentation, which can slow down access time and complicate down access time and complicate recovery of a corrupted filerecovery of a corrupted file
Defragment hard drive once a Defragment hard drive once a monthmonth
ScanDiskScanDisk
Designed to replace Chkdsk commandDesigned to replace Chkdsk command
Repairs cross-linked and lost clustersRepairs cross-linked and lost clusters
Checks FAT for problems with long Checks FAT for problems with long filenames and the directory treefilenames and the directory tree
Scans the disk for bad sectorsScans the disk for bad sectors
Repairs problems with structure of a Repairs problems with structure of a hard drive that has been compressed hard drive that has been compressed using Windows DriveSpace or using Windows DriveSpace or DoubleSpaceDoubleSpace
Cross-Lined and Lost Cross-Lined and Lost ClustersClusters
ScanDisk ResultsScanDisk Results
ScanDisk in MS-DOS ScanDisk in MS-DOS ModeMode
Disk CleanupDisk Cleanup
Disk Compression Disk Compression MethodsMethods Store data on hard drive in one big Store data on hard drive in one big
filefile
– Manage writing of data and programs Manage writing of data and programs to that fileto that file
Rewrite data in files in Rewrite data in files in mathematically coded format that mathematically coded format that uses less spaceuses less space
Disk CompressionDisk Compression
Disk compression in Windows XP Disk compression in Windows XP and Windows 2000and Windows 2000
– Use the NTFS file systemUse the NTFS file system
Disk compression in Windows 9xDisk compression in Windows 9x
– Use DriveSpace utility on a FAT 16 Use DriveSpace utility on a FAT 16 file systemfile system
Disk CacheDisk Cache
Temporary storage area in RAM Temporary storage area in RAM for data being read from or for data being read from or written to a hard drivewritten to a hard drive
Speeds up access time to the Speeds up access time to the drivedrive
Disk CachingDisk Caching
Disk Caching (Disk Caching (continuedcontinued))
Hardware cache versus software cacheHardware cache versus software cache
How disk caching methods have changedHow disk caching methods have changed
– DOSDOS
– DOS with Windows 3.xDOS with Windows 3.x
– Windows 9xWindows 9x
– Windows NT/2000/XPWindows NT/2000/XP
Making BackupsMaking Backups
Child, parent, grandparent methodChild, parent, grandparent method
Full, incremental, and differential Full, incremental, and differential backupsbackups
Scheduling backupsScheduling backups
Backup softwareBackup software
Disk cloning softwareDisk cloning software
Planning for disaster recoveryPlanning for disaster recovery
Child, Parent, Child, Parent, Grandparent MethodGrandparent Method
Full, Incremental, and Full, Incremental, and Differential BackupsDifferential Backups FullFull
– Backs up all data from hard driveBacks up all data from hard drive
IncrementalIncremental
– Backs up only files that have changed or Backs up only files that have changed or been created since last backupbeen created since last backup
DifferentialDifferential
– Backs up files that have changed or been Backs up files that have changed or been created since the last created since the last fullfull backup backup
Scheduling BackupsScheduling Backups
Scheduling Backups Scheduling Backups ((continuedcontinued))
Scheduling Backups Scheduling Backups ((continuedcontinued))
Backup SoftwareBackup Software
Comes with most tape drivesComes with most tape drives
Third-party software also Third-party software also availableavailable
Backup utilities are provided with Backup utilities are provided with Windows NT/2000/XP and Windows NT/2000/XP and Windows 9xWindows 9x
Windows 2000/XP Windows 2000/XP Backup UtilityBackup Utility
Can perform immediate backup Can perform immediate backup from Backup tabfrom Backup tab
Can schedule repeated backupsCan schedule repeated backups
Disk Cloning SoftwareDisk Cloning Software
Replicates hard drive to a different computer Replicates hard drive to a different computer or to another drive on the same computeror to another drive on the same computer
ExamplesExamples
– Drive Image by PowerQuestDrive Image by PowerQuest
– ImageCast by Innovative SoftwareImageCast by Innovative Software
– Norton Ghost by Symantec CorpNorton Ghost by Symantec Corp
Planning for Disaster Planning for Disaster RecoveryRecovery Verify your recovery planVerify your recovery plan
Keep a record of regular backupsKeep a record of regular backups
– Folders or drives backed upFolders or drives backed up
– Date of the backupDate of the backup
– Type of backupType of backup
– Label identifying the tape, disk, or other Label identifying the tape, disk, or other mediamedia
Viruses and Other Viruses and Other Computer InfestationsComputer Infestations
VirusVirus Has an incubation periodHas an incubation period Is contagious; replicates by attaching to other Is contagious; replicates by attaching to other
programs; infected program must be executed programs; infected program must be executed for a virus to runfor a virus to run
Is destructiveIs destructive
WormWorm Spreads copies of itself without a host Spreads copies of itself without a host program, overloading the network as it program, overloading the network as it replicatesreplicates
Does damage by its presenceDoes damage by its presence Best defense is a firewallBest defense is a firewall
Trojan horseTrojan horse Does not need a host program to workDoes not need a host program to work Substitutes itself for a legitimate programSubstitutes itself for a legitimate program Most cannot replicateMost cannot replicate
Logic bombLogic bomb Dormant code added to software; triggered at Dormant code added to software; triggered at a predetermined time or by a predetermined a predetermined time or by a predetermined eventevent
Understanding Understanding Computer InfestationsComputer Infestations Where viruses hideWhere viruses hide
– Boot sector virusesBoot sector viruses– File virusesFile viruses– Multipartite virusesMultipartite viruses
Cloaking techniquesCloaking techniques– Polymorphic virusesPolymorphic viruses– Encrypting virusesEncrypting viruses– Stealth virusesStealth viruses
Potential damage ranges from minor to Potential damage ranges from minor to majormajor
How Infestations How Infestations SpreadSpread User activities can increase User activities can increase
susceptibilitysusceptibility
Virus replicatesVirus replicates
A Trojan horse gets into your A Trojan horse gets into your computercomputer
A worm gets into your computerA worm gets into your computer
How a Virus ReplicatesHow a Virus Replicates
How a Worm Gets into How a Worm Gets into Your Computer Your Computer
Virus HoaxesVirus Hoaxes
E-mail warnings about a E-mail warnings about a nonexistent virusnonexistent virus
Overload network trafficOverload network traffic
Check Web sites that specialize in Check Web sites that specialize in debunking virus hoaxesdebunking virus hoaxes
Protecting Against Protecting Against Computer InfestationsComputer Infestations
Make backupsMake backups
Use antivirus software regularlyUse antivirus software regularly
Keep Windows current with Keep Windows current with updates and patchesupdates and patches
Implement a firewallImplement a firewall
Protecting Against Protecting Against Computer Infestations Computer Infestations ((continuedcontinued))
Be aware of virus symptomsBe aware of virus symptoms
Know what to do when you suspect a Know what to do when you suspect a virus infestationvirus infestation
– Run antivirus softwareRun antivirus software
– Check Web site of AV software Check Web site of AV software manufacturermanufacturer
Use antivirus softwareUse antivirus software
Capabilities to Look for Capabilities to Look for When Selecting Antivirus When Selecting Antivirus SoftwareSoftware
Download software upgrades and virus Download software upgrades and virus definitions from the Internetdefinitions from the Internet
Automatically execute at startupAutomatically execute at startup Detect macros in word-processing Detect macros in word-processing
documentsdocuments Automatically monitor files being Automatically monitor files being
downloaded from the Internetdownloaded from the Internet Send virus alerts to your e-mail addressSend virus alerts to your e-mail address Scan both automatically and manuallyScan both automatically and manually
General General Troubleshooting Troubleshooting GuidelinesGuidelines Make backups and keep them currentMake backups and keep them current
Run antivirus software regularlyRun antivirus software regularly
Defragment files and scan the hard Defragment files and scan the hard drive occasionallydrive occasionally
Don’t smoke around your hard driveDon’t smoke around your hard drive
Don’t leave the PC turned off for Don’t leave the PC turned off for weeks or months at at timeweeks or months at at time
General General Troubleshooting Troubleshooting Guidelines (Guidelines (continuedcontinued)) High humidity can be dangerous High humidity can be dangerous
for hard drivesfor hard drives
Be gentle with a hard driveBe gentle with a hard drive
Take precautions when moving a Take precautions when moving a hard drive or changing CMOS hard drive or changing CMOS setupsetup
Resolving Common Resolving Common Hard Drive ProblemsHard Drive Problems Categories of problemsCategories of problems
– Caused by hardware or software?Caused by hardware or software?– Prevent hard drive from booting or prevent Prevent hard drive from booting or prevent
data from being accessed?data from being accessed? Gather basic information from user; diagnose Gather basic information from user; diagnose
and address the problemsand address the problems Focus on the main priorityFocus on the main priority Use available resources (documentation, Use available resources (documentation,
manufacturer’s Web site, technical support)manufacturer’s Web site, technical support)
Troubleshooting Hard Troubleshooting Hard Drives with Third-Party Drives with Third-Party SoftwareSoftware Norton UtilitiesNorton Utilities
SpinRiteSpinRite
PartitionMagicPartitionMagic
Hardware ProblemsHardware Problems
Hard drive not foundHard drive not found
Invalid drive or drive specificationInvalid drive or drive specification
Damaged boot recordDamaged boot record
Damaged FAT or root directory or bad Damaged FAT or root directory or bad sectorssectors
Cannot boot from the hard driveCannot boot from the hard drive
Drive retrieves and saves data slowlyDrive retrieves and saves data slowly
Software Problems Software Problems with Hard Driveswith Hard Drives Corrupted OS filesCorrupted OS files
Corrupted partition table, boot record, Corrupted partition table, boot record, or root directory, making all data on or root directory, making all data on the hard drive inaccessiblethe hard drive inaccessible
Corrupted area of the FAT that points Corrupted area of the FAT that points to the data, data’s directory table, or to the data, data’s directory table, or sector markings where data is locatedsector markings where data is located
Corrupted dataCorrupted data
Resolving Hard Drive Resolving Hard Drive and Data Access and Data Access ProblemsProblems Partition tablePartition table
Boot recordBoot record
FAT and root directoryFAT and root directory
System filesSystem files
Data and program filesData and program files
Data and Program File Data and Program File CorruptionCorruption
Options for restoring a data file Options for restoring a data file that is not backed upthat is not backed up
– OS system tools and commandsOS system tools and commands
– Third-party softwareThird-party software
– Professional data recovery serviceProfessional data recovery service
Data and Program File Data and Program File Corruption (Corruption (continuedcontinued))
Recovering data when portions of Recovering data when portions of a damaged file are still intacta damaged file are still intact
– Create a new file on another diskCreate a new file on another disk
– Use Copy commandUse Copy command
– Edit new file to replace missing dataEdit new file to replace missing data
Data and Program File Data and Program File Corruption (Corruption (continuedcontinued))
Potential problems with files and Potential problems with files and file systemfile system
– Corrupted file headerCorrupted file header
– Lost clustersLost clusters
– Erased fileErased file
Getting Technical Getting Technical SupportSupport Before you call, have available:Before you call, have available:
– Drive model and descriptionDrive model and description
– Manufacturer and model of computerManufacturer and model of computer
– Exact wording of error messageExact wording of error message
– Description of the problemDescription of the problem
– Hardware and software configuration for Hardware and software configuration for the systemthe system