Computers
Businesses and individuals alike have all grown to rely on computers. The reliance is never more apparent than when something happens to the horrid little box that makes our lives easier. We expect computers to react a certain way, in certain situations. It nearly always comes as a surprise when the beloved little box, know as a computer, refuses to boot up. Probably even more shocking, is the dawning that we've neglected to backup or prepare for the unforeseen disaster that has just been thrust upon us.
Regardless of the number of times you have experienced the dread of being unable to access the information trapped in the god-awful computerized contraption, we are always invariably unprepared.
The reality of it is that computers, not only contain moving parts, but they like other machines, they are prone to failure at some point in their lives. Not only can hardware failures occur, but viruses can also corrupt data making it impossible to retrieve. Regardless of the litany of words used to bully the box into behaving, the truth is that the only offence is a good defense.
So how do you prepare for a computer tragedy?
Prepare for the Worst
In structuring an offense it's important to realize the power of reinforcements: backups are invaluable and will save countless hours of shameless degradation. Be sure that you backup data and files on a regular basis, there are a number of tools that will automate the process.
It is critical that you check the backup log to ensure that a backup was completed properly. I cannot begin to describe the devastation felt when it is realized that though there was a backup process in place, the backup never actually occurred. Realizing this during a restore is likely to push any computer lover over the edge. It is a good idea to store a weekly back up off site. This is especially helpful, if an unforeseen fire or a natural disaster strikes.
Protection is critical!
Build A Wall
If the computer has Internet access, either a hardware or software firewall (or combination there of) must be used. The firewall creates a barrier between a computer and the world. Without a firewall, Internet worms are capable of exploiting security holes and are able to create what are referred to as 'back doors'. These back doors can then be used to gain access to personal information stored on the computer, including password files, and financial information.
Trust No One
If you are an avid Internet surfer or downloader be sure to scan any downloads prior to opening or installing. Up to date anti-virus software should be used to ensure, that computers do not become infected with malicious viruses that will ruin your life. Scan any email attachments prior to opening regardless of whom they are from. Files that end with .scr, .pif and .exe can contain viruses that will wreak havoc with your data and emotional well being.
Preparedness goes a long way, and a little foresight will ensure that, while a computer might be an inconvenience, you will not be defeated.
Preparation Resources
Anti-virus Software -http://www.military-software.com/anti-virus-software.htm
Firewalls - http://www.monitoring-software.net/intrusion-detection-software.htm
About The Author
Sharon Housley manages marketing for NotePage, Inc. http://www.notepage.net a company specializing in alphanumeric paging, SMS and wireless messaging software solutions. Other sites and additional articles can be found at http://www.softwaremarketingresource.com , and http://www.small-business-software.net
I do a holiday letter every year and send them... Read More
Simone is exasperated. She has to work on her university... Read More
Buying a receiver is one of the most important decisions... Read More
It seems like fast never quite rates fast enough.No matter... Read More
Understanding digital camera prices makes finding the best camera value... Read More
No matter how fast your processor and regardless of how... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
So I'll start from the very beginning.One day I was... Read More
The technological horizon has always got something new to offer,... Read More
ComputersBusinesses and individuals alike have all grown to rely on... Read More
In the first part of this home lab tutorial, CCNA... Read More
Digital cameras ratings are great tools for deciding which camera... Read More
First things first, what is Firefox? Well, it's a browser.... Read More
Get started creating web pages using text files and HTML... Read More
I have a p3 500MHz PC with 128MB RAM, 10.2... Read More
Passwords have a strange dual nature. The stronger and safer... Read More
Music lovers have been carrying around radios and other bulky... Read More
File permissions are one of the strengths that the Unix... Read More
Since the DOS days, batch files have been one of... Read More
Everywhere you look today people are listening to personal audio... Read More
Having two operating systems is not as difficult as many... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
So you got yourself a digital camcorder. If you want... Read More
Upgrading your processor will always speed up your computer, but... Read More
Computers are supposed to speed up our productivity?to help us... Read More
You have your television and home theater receiver; you just... Read More
The DNS (Domain Name System) servers are what your computer... Read More
For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More
Heading off on vacation soon?Then perhaps you're tempted to take... Read More
GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More
System File Checker is a great utility that is typically... Read More
Ad Blocking is getting to be a common sport on... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
Tech support tells me to type 'regedt32' as opposed to... Read More
All over the world, people carry with them walkmans and... Read More
1. Let your PC boot up completely before opening any... Read More
I recently got an e-mail asking about virtual memory. The... Read More
Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More
The following practice, if done regularly, may help you to... Read More
System File Checker is a great utility that is typically... Read More
When I first started studying for my CCNP, some of... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
It's hard enough as it is these days to get... Read More
File permissions are one of the strengths that the Unix... Read More
IF WE say that it was mainly because of the... Read More
Nothing is worse than having to negotiate all kinds of... Read More
MMC and SDFlash memory is available in so many formats... Read More
In the early days, Personal Digital Assistants (PDAs) were not... Read More
In the 1950's and 1960's Polaroid's instant cameras were all... Read More
Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More
How can you compare mp3 players to be sure you're... Read More
Surf the 'Net for about 10 minutes and chances rate... Read More
The DNS (Domain Name System) servers are what your computer... Read More
Projectors have come a long way in the past few... Read More
So you've got some spyware, ad-ware, or viruses on your... Read More
Perhaps not yet, but the handwriting might be on the... Read More
We've all seen them, you've been browsing a website and... Read More
Unless you place your faith in internal search engine software... Read More
Enhanced Definition Television ? also known as EDTV ? is... Read More
Flash mp3 players come with an exciting array of features,... Read More
Good Morning Mr. Sampson. Please type in you Personal Identification... Read More
There are soooo many choices. With all the styles and... Read More
Everywhere you look today people are listening to personal audio... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
I met an entrepreneur who hole heartedly disagree with an... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
Personal Technology |