Computers
Businesses and individuals alike have all grown to rely on computers. The reliance is never more apparent than when something happens to the horrid little box that makes our lives easier. We expect computers to react a certain way, in certain situations. It nearly always comes as a surprise when the beloved little box, know as a computer, refuses to boot up. Probably even more shocking, is the dawning that we've neglected to backup or prepare for the unforeseen disaster that has just been thrust upon us.
Regardless of the number of times you have experienced the dread of being unable to access the information trapped in the god-awful computerized contraption, we are always invariably unprepared.
The reality of it is that computers, not only contain moving parts, but they like other machines, they are prone to failure at some point in their lives. Not only can hardware failures occur, but viruses can also corrupt data making it impossible to retrieve. Regardless of the litany of words used to bully the box into behaving, the truth is that the only offence is a good defense.
So how do you prepare for a computer tragedy?
Prepare for the Worst
In structuring an offense it's important to realize the power of reinforcements: backups are invaluable and will save countless hours of shameless degradation. Be sure that you backup data and files on a regular basis, there are a number of tools that will automate the process.
It is critical that you check the backup log to ensure that a backup was completed properly. I cannot begin to describe the devastation felt when it is realized that though there was a backup process in place, the backup never actually occurred. Realizing this during a restore is likely to push any computer lover over the edge. It is a good idea to store a weekly back up off site. This is especially helpful, if an unforeseen fire or a natural disaster strikes.
Protection is critical!
Build A Wall
If the computer has Internet access, either a hardware or software firewall (or combination there of) must be used. The firewall creates a barrier between a computer and the world. Without a firewall, Internet worms are capable of exploiting security holes and are able to create what are referred to as 'back doors'. These back doors can then be used to gain access to personal information stored on the computer, including password files, and financial information.
Trust No One
If you are an avid Internet surfer or downloader be sure to scan any downloads prior to opening or installing. Up to date anti-virus software should be used to ensure, that computers do not become infected with malicious viruses that will ruin your life. Scan any email attachments prior to opening regardless of whom they are from. Files that end with .scr, .pif and .exe can contain viruses that will wreak havoc with your data and emotional well being.
Preparedness goes a long way, and a little foresight will ensure that, while a computer might be an inconvenience, you will not be defeated.
Preparation Resources
Anti-virus Software -http://www.military-software.com/anti-virus-software.htm
Firewalls - http://www.monitoring-software.net/intrusion-detection-software.htm
About The Author
Sharon Housley manages marketing for NotePage, Inc. http://www.notepage.net a company specializing in alphanumeric paging, SMS and wireless messaging software solutions. Other sites and additional articles can be found at http://www.softwaremarketingresource.com , and http://www.small-business-software.net
![]() |
|
![]() |
|
![]() |
|
![]() |
I have always been interested in computers, but in the... Read More
One of the most confusing parts of beginning your Cisco... Read More
Time is money. And when you constantly have to divide... Read More
I've worked my way from the CCNA to the CCIE,... Read More
This article describes the basic properties of color, what the... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
As the web has evolved, so have the methods of... Read More
Cookies, not the kind that Mom makes, but the computer... Read More
Just The Facts, Ma'mPalm pilots are all the rage now.... Read More
Everywhere you look today people are listening to personal audio... Read More
Simone is exasperated. She has to work on her university... Read More
The technological horizon has always got something new to offer,... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
Many computer users are worried about their computer's performance. After... Read More
When you think of a help desk, what do you... Read More
Flash mp3 players come with an exciting array of features,... Read More
Computers are available in different shapes, sizes and weights, due... Read More
Save money. Save 10-15% on utility bills per month. Work... Read More
File Transfer Protocol (FTP) is a protocol that is part... Read More
If you're a computer expert, you'll probably already know about... Read More
Have you ever tried to remove Spyware off your PC... Read More
You probably heard of the new Firefox browser version 1.0... Read More
File permissions are one of the strengths that the Unix... Read More
Heading off on vacation soon?Then perhaps you're tempted to take... Read More
Buying Your PCBuying a PC that's right for you and... Read More
I have a love-hate relationship with my computer.In fact, often... Read More
OK, so you caught a computer virus and your system... Read More
Tip #1 -- Rebates: A rebate is not always a... Read More
In the first part of this home lab tutorial, CCNA... Read More
The battle is heating up for market share, home movie... Read More
With their solid-state technology, compact size, and abundant memory, portable... Read More
How familiar does the following sound? Your computer was working... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
Want to save money while promoting your web-based business? Of... Read More
Having two operating systems is not as difficult as many... Read More
I am going to assume that you are running windows... Read More
Google, in their march to stay ahead of the pack... Read More
1. Before sitting down for coding, you must have formal... Read More
How long do you think DVDs have around? 20 years?... Read More
Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
I'm eighty-one years old and I bought my first computer... Read More
Getting started with video editing is very simple you only... Read More
Choose Not To ConformPalm pilots and pdas are constantly growing... Read More
Buying Your PCBuying a PC that's right for you and... Read More
With a little tweaking and with proper tools, you can... Read More
I have a p3 500MHz PC with 128MB RAM, 10.2... Read More
The basic language of the internet is html. If you... Read More
Youâ??ve studied hard; youâ??ve practiced your configurations; youâ??ve used your... Read More
Maybe you always wanted a feature that hasn't been available... Read More
With their solid-state technology, compact size, and abundant memory, portable... Read More
There have been some questions on anti-skip protection on mp3... Read More
Feeling overwhelmed in selecting a new TV? With all the... Read More
Webmasters usually sit at their computers much longer in a... Read More
No matter how fast your processor and regardless of how... Read More
I have a love-hate relationship with my computer.In fact, often... Read More
There are plenty of articles out there about how to... Read More
Your first step in removing dangerous infections from your computer... Read More
I've worked my way from the CCNA to the CCIE,... Read More
OK, so you caught a computer virus and your system... Read More
Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More
With renting methods such as online DVD rental and pay-per-view,... Read More
Simone is exasperated. She has to work on her university... Read More
This article describes the basic properties of color, what the... Read More
Do you use Windows standard uninstall feature? How do you... Read More
File permissions are one of the strengths that the Unix... Read More
Personal Technology |