PC Management

advertisement
PC Management
System Restore
The System Restore feature is built into Windows XP and is used to return your
computer to an earlier state if you have a system failure or other major problem with your
computer. The point of System Restore is to restore your system to a workable state
without you having to reinstall the operating system and lose your data files in the
process.
System Restore takes snapshots of your computer system and saves them as
restore points. These restore points mark configuration places to return to, in the event
of a problem with your computer that might occur after you install an unstable device
driver or an older application. Because the snapshots are taken automatically and are
restored through the System Restore Wizard, System Restore is both effective and userfriendly.
Firewall
A firewall is a dedicated appliance, or software running on a computer, which
inspects network traffic passing through it, and denies or permits passage based on a set
of rules. It is a software or hardware that is normally placed between a protected network
and an unprotected network and acts like a gate to protect assets to ensure that nothing
private goes out and nothing malicious comes in.
A firewall's basic task is to regulate some of the flow of traffic between computer
networks of different trust levels. Typical examples are the Internet which is a zone with
no trust and an internal network which is a zone of higher trust. A zone with an
intermediate trust level, situated between the Internet and a trusted internal network, is
often referred to as a "perimeter network" or Demilitarized zone (DMZ).
Privacy
When sharing a computer, you may want to…



Use Removable Disks or External Drives to Save Data
Use the “Hide” Feature to Mask Sensitive Files and Folders in Your PC
Delete and Double Delete Erased Data
Seven ways of keeping your search history private…







Don't log into search engines or their tools
Keep yourself safe from Google
Regularly change your IP address
Use ixquick
Don't include personal information in your searches
Do sensitive searches from a public hot spot
Avoid using your Internet service provider's search engine
Data Shredding
File and data shredding software like a real world paper shredder, permanently
deletes your files making them unrecoverable for good. Permanent Data Shredding,
Scrubbing & Deletion.
Consider that there are many opportunities for misuse , mishandling,
exposure and even theft of your company’s valuable, confidential and proprietary
information. That sensitive data can be printed onto Paper or magnetically recorded onto
some sort of computer backup storage Tape or Hard Drive. Common sense and legal
obligations require firms today, more than ever before, to protect, control and properly
dispose of employees’ and clients’ private information. Tens of billions of dollars are lost
every year as a result of Identity Fraud. The facts are that more than two thirds of all
Identity Theft is obtained off-line (dumpster diving, for example), where only slightly
more than 10% is from on-line internet schemes.
Antispyware
Spyware is a type of malware that is installed on computers and that collects
information about users without their knowledge. The presence of spyware is typically
hidden from the user. Typically, spyware is secretly installed on the user's personal
computer. Sometimes, however, spywares such as keyloggers are installed by the owner
of a shared, corporate, or public computer on purpose in order to secretly monitor other
users.
While the term spyware suggests software that secretly monitors the user's
computing, the functions of spyware extend well beyond simple monitoring. Spyware
programs can collect various types of personal information, such as Internet surfing
habits and sites that have been visited, but can also interfere with user control of the
computer in other ways, such as installing additional software and redirecting Web
browser activity. Spyware is known to change computer settings, resulting in slow
connection speeds, different home pages, and/or loss of Internet or functionality of other
programs. In an attempt to increase the understanding of spyware, a more formal
classification of its included software types is captured under the term privacy-invasive
software.
Work Cited
Ballew, J. (2003, May 19). Windows XP. Retrieved September 22, 2009, from Windows
XP Restore is easy to use:
http://www.microsoft.com/windowsxp/using/helpandsupport/getstarted/ballew_03may19.
mspx
Firewall. (2009, September 22). Retrieved September 22, 2009, from Wikipedia The free
Encyclopedia: http://en.wikipedia.org/wiki/Firewall
Get Net Wise. (2009, February 25). Retrieved September 22, 2009, from
http://privacy.getnetwise.org/sharing/tips/filesdata/
Top Secret Software. (2009). Retrieved September 22, 2009, from Top Secret SoftwareData Schredding: http://www.topsecretsoftware.com/data-shredding.html
Wikipedia The free Encyclopedia. (2009, September 21). Retrieved September 22, 2009,
from Spyware: http://en.wikipedia.org/wiki/Antispyware#Remedies_and_prevention
Download