Chapter 4: File Computer, Management, Internet, Virus Chapter 4:1: File Management, Virus Protection, and Backup Protection, Web, and E-Mail and Backup Basics 1 Chapter 4 Preview After this chapter, you should be able to: – – – – Create valid names for files and folders Use file management features Describe how a computer physically stores files Explain viruses, boot sector viruses, macro viruses, Trojan horses, worms, and Denial of Service attacks – Describe how antivirus software is used – Understand backup and restore plans – Compare backup devices Chapter 4: File Management, Virus Protection, and Backup 2 Chapter 4 Outline • Section A – File Basics • Section B – File Management • Section C – Computer Viruses • Section D – Data Backup Chapter 4: File Management, Virus Protection, and Backup 3 Chapter 4 File Management, Virus Protection, and Backup Section A: File Basics Computer Concepts 8th Edition Parsons/Oja File names, Extensions, and Formats: What are the rules for naming files? • Every file has a name, and might also have a file extension • You must provide a valid file name that adheres to rules or file-naming conventions Chapter 4: File Management, Virus Protection, and Backup Page 176 5 What are the rules for naming a file? Chapter 4: File Management, Virus Protection, and Backup Page 176 6 Why are certain characters and words not allowed in a filename? • Certain characters have significance to an operating system • DOS and Windows use the “:” – C: (representing hard drive), A: (representing floppy drive) • Reserved words are words that are used as commands or special identifiers and cannot be used as file names Chapter 4: File Management, Virus Protection, and Backup Page 177 7 Are file extensions important? • File extension further describes the file contents • Separated by the file name with a dot • Readme.txt, Newsletter.doc – Related to the file format • Most software programs have a native file format that is used to store files Chapter 4: File Management, Virus Protection, and Backup Page 177 8 Are file extensions important? Chapter 4: File Management, Virus Protection, and Backup Page 177 9 File Locations, Folders, and Paths: How do I designate a file’s location? • You first specify where the file will be stored – A: for floppy disk drive – C: for hard drive – D through Z for additional storage • CD, Zip and DVD drive letters are not standardized Chapter 4: File Management, Virus Protection, and Backup Page 178 10 What’s the purpose of folders? • An operating system maintains a list of files called a directory for each disk, CD-ROM or DVD • Root directory – Main directory of a disk – Provides a useful list of files • Folders - smaller lists within directories • A folder is separated from a drive letter and a filename by a backslash (\) Chapter 4: File Management, Virus Protection, and Backup Page 178 11 File Sizes and Dates Chapter 4: File Management, Virus Protection, and Backup Page 179 12 What’s the significance of a file’s size? • A file contains data, stored as a group of bits • The more bits, the larger the file • File size is usually measured in bytes, kilobytes, or megabytes Chapter 4: File Management, Virus Protection, and Backup Page 179 13 Is the file date important? • Your computer keeps track of the date that a file was created or last modified • The file date is useful if you have created several versions of a file and want to make sure that you know which version is the most recent Chapter 4: File Management, Virus Protection, and Backup Page 179 14 Chapter 4 File Management, Virus Protection, and Backup Section B: File Management Computer Concepts 8th Edition Parsons/Oja Application-Based File Management: How does a software application help me manage files? • Applications provide a way for opening and saving files from/to specific folders on a designated storage device • An application may also provide additional file management capabilities – Deleting and renaming files Chapter 4: File Management, Virus Protection, and Backup Page 180 16 What’s the difference between the Save option and the Save As option? Chapter 4: File Management, Virus Protection, and Backup Page 181 17 What other options are available in the Save As dialog box? • You can use it to rename a file, delete a file, or create a folder Chapter 4: File Management, Virus Protection, and Backup Page 181 18 File Management Utilities: How does the operating system help me manage files? • File management utilities – Provided by your computer operating system – Helps you locate, rename, move, copy, delete files and discover file properties Chapter 4: File Management, Virus Protection, and Backup Page 182 19 File Management Metaphors: How can a file management utility help me visualize my computer’s file storage? • A storage metaphor helps you visualize and mentally organize the files on your disks and other storage devices • These metaphors are also called logical storage models Chapter 4: File Management, Virus Protection, and Backup Page 183 20 What storage metaphors are typically used for personal computers? • Storage metaphor is like a filing cabinet • Another is the tree storage metaphor Chapter 4: File Management, Virus Protection, and Backup Page 183 21 Windows Explorer: How do I use a file management utility? • Windows Explorer is an example of a file management utility Chapter 4: File Management, Virus Protection, and Backup Page 184 22 Can I work with more than one file or folder at a time? • Select the files or folders – Hold down Ctrl key, and click each item – Click first, then hold Shift key and click on last item • Select the operation to be carried out (rename, copy, delete, or move) Chapter 4: File Management, Virus Protection, and Backup Page 184 23 What can I do with the folders and files that are listed in Windows Explorer? • Rename – change the name of a file or folder • Copy – copy a file from your hard disk to a floppy disk • Move – move a file from one folder to another • Delete – delete a file when you no longer need it Chapter 4: File Management, Virus Protection, and Backup Page 184 24 File Management Tips • • • • • Use descriptive names Maintain file extensions Group similar files Organize your folders from top down Consider using the My Document default directory • Do not mix data files and program files Chapter 4: File Management, Virus Protection, and Backup Page 185 25 File Management Tips • • • • • • No files in the root directory Access files from the hard disk Follow copyright rules Delete files you no longer need Be aware of storage locations Back up Chapter 4: File Management, Virus Protection, and Backup Page 186 26 Physical File Storage: Is data stored in specific places on a disk? • The physical storage model describes what actually happens on the disks and in the circuits • A storage medium must be formatted • Formatting creates the equivalent of electronic storage bins by dividing a disk into tracks, and then further dividing each track into sectors Chapter 4: File Management, Virus Protection, and Backup Page 186 27 Is data stored in specific places on a disk? Chapter 4: File Management, Virus Protection, and Backup Page 186 28 How does a disk get formatted? • Formatting utilities are supplied by operating system or by companies that manufacture the drives Chapter 4: File Management, Virus Protection, and Backup Page 187 29 How does the operating system keep track of a file’s location? • The OS uses a file system to keep track of the names and locations of files that reside on a storage medium – Mac OS – Hierarchical File System (HFS) – Linux – Ext2fs – Windows NT, 2000, XP – NTFS • Master File Table – Windows 95, 98, ME - FAT32 – Windows 3.1 - FAT16 Chapter 4: File Management, Virus Protection, and Backup Page 187 30 How does the operating system keep track of a file’s location? • To speed up the process, sectors are grouped into clusters • File allocation table (FAT) - an operating system file that maintains a list of files and their physical location on the disk – Like a table of contents – A damaged FAT results in losing data Chapter 4: File Management, Virus Protection, and Backup Page 187 31 How does the operating system keep track of a file’s location? Chapter 4: File Management, Virus Protection, and Backup Page 188 32 What happens when a file is deleted? • The OS simply changes the status of the file’s clusters to “empty” and removes the filename from the index file • It doesn’t remove the data, just the references to it • Special file shredder software can be used to overwrite “empty” sectors with random 1s and 0s Chapter 4: File Management, Virus Protection, and Backup Page 188 33 Can deleted files be undeleted? • Deleted files are moved to the Recycle Bin • Helps to protect against accidental erasures • Files that appear in the directory listing for the Recycle Bin folder can be undeleted Chapter 4: File Management, Virus Protection, and Backup Page 189 34 How does a disk become fragmented? • As computer files are added/deleted, parts of files tend to become scattered all over the disk • These fragmented files are stored in noncontiguous clusters – Slows drive performance • Defragmentation utility – rearranges the files on a disk so that they are stored in contiguous clusters Chapter 4: File Management, Virus Protection, and Backup Page 189 35 How does a disk become fragmented? Chapter 4: File Management, Virus Protection, and Backup Page 189 36 Chapter 4 File Management, Virus Protection, and Backup Section C: Computer Viruses Computer Concepts 8th Edition Parsons/Oja Viruses, Trojan Horses, and Worms: What is a computer virus? • A program that attaches itself to a file, reproduces itself, and spreads to other files • A virus can perform a trigger event: – Corrupt and/or destroy data – Display an irritating message • Key characteristic is their ability to “lurk” in a computer for days or months quietly replicating themselves Chapter 4: File Management, Virus Protection, and Backup Page 191 38 What is a computer virus? • File virus - a virus that attaches itself to an application program • Boot sector virus - infects the system files that your computer uses every time you turn it on • Macro virus - infects a set of instructions called a “macro” – Macro - a miniature program that usually contains legitimate instructions to automate document and worksheet production Chapter 4: File Management, Virus Protection, and Backup Page 192 39 How is a Trojan horse different from a virus? • Appears to perform one function while actually doing something else – Not a virus, but may carry a virus – Does not replicate itself • Another type of Trojan horse looks like a login screen • PictureNote Trojan – arrives as e-mail named picture.exe and then tries to steal login and email passwords Chapter 4: File Management, Virus Protection, and Backup Page 192 40 What’s a worm? • A program designed to enter a computer system through security holes – Usually through a network from computer to computer – Does not need to be attached to a document to reproduce • Mass-mailing worms – Klez, Netsky, MyDoom, and Bagle – Spoofed addresses Chapter 4: File Management, Virus Protection, and Backup Page 193 41 What are the symptoms of a malicious code attack? • • • • • • • Network traffic jam Denial of Service Browser reconfiguration Delete and modify files Access confidential information Performance degradation Disable antivirus and firewall software Chapter 4: File Management, Virus Protection, and Backup Page 195 42 Antivirus Software: How can I avoid viruses and worms? • Antivirus software is a set of utility programs that looks for and eradicates viruses, Trojan horses, and worms Chapter 4: File Management, Virus Protection, and Backup Page 196 43 How does antivirus software work? • Hackers have created viruses that can insert themselves into unused portions of a program • To counterattack the work of hackers, antivirus software designers created software with a checksum - a number calculated by combining binary values of all bytes in a file – Compares checksum each time you run a program Chapter 4: File Management, Virus Protection, and Backup Page 196 44 How does antivirus software work? • Checks for a virus signature – A unique series of bytes used to identify a known virus Chapter 4: File Management, Virus Protection, and Backup Page 197 45 When should I use antivirus software? • “All the time” • Most antivirus software allows you to specify what to check and when to check it Chapter 4: File Management, Virus Protection, and Backup Page 197 46 How often should I get an update? • New viruses and variations of old viruses are unleashed just about everyday • Check Web site of antivirus software publisher for periodic updates • Some software periodically reminds you to check for updates Chapter 4: File Management, Virus Protection, and Backup Page 197 47 How reliable is antivirus software? • Antivirus software is pretty reliable, but viruses try to get around detection – Multi-partite viruses – Polymorphic viruses – Stealth viruses • Antivirus software is not 100% reliable, but protection is worth the risk Chapter 4: File Management, Virus Protection, and Backup Page 197 48 Virus Hoaxes: What’s a virus hoax? • Some viruses don’t really exists • A virus hoax arrives as an e-mail message containing dire warnings about a supposedly new virus that is on the loose – Recommends a strategy – Recommends forwarding the email – Says no one has a fix for it yet • Many cases it is a fake Chapter 4: File Management, Virus Protection, and Backup Page 197 49 What’s a virus hoax? Chapter 4: File Management, Virus Protection, and Backup Page 198 50 What should I do about virus hoaxes? • Don’t panic • You can ignore a virus hoax • You can validate the hoax by going to a reliable Web site that lists hoaxes and viruses Chapter 4: File Management, Virus Protection, and Backup Page 198 51 Chapter 4 File Management, Virus Protection, and Backup Section D: Data Backup Computer Concepts 8th Edition Parsons/Oja Backup and Restore Procedures: How do I make a backup? • Data backup - a copy of a file or the contents of a disk drive • Provides the best all-round security for your data • A backup is usually stored on a different storage medium from the original files • The exact steps that you follow depend on your backup equipment, the software you use to make backups, and your personal backup plan Chapter 4: File Management, Virus Protection, and Backup Page 199 53 How do I make a backup? Chapter 4: File Management, Virus Protection, and Backup Page 199 53 54 How do I restore data? • You restore data by copying files from a backup to the original storage medium or its replacement Chapter 4: File Management, Virus Protection, and Backup Page 200 55 What’s the best backup plan? Chapter 4: File Management, Virus Protection, and Backup Page 200 56 What about backing up the Windows Registry? • It is always open, so some backup software won’t back it up • If possible, make a backup • Update backup every time you install new software or hardware Chapter 4: File Management, Virus Protection, and Backup Page 201 57 How do I avoid backing up files that contain viruses? • Use and update frequently antivirus software • Scan and remove viruses before making backup Chapter 4: File Management, Virus Protection, and Backup Page 202 58 How often should I back up my data? • Backup your data depending upon how much data you can afford to lose • Under normal use, once-a-week should be good enough Chapter 4: File Management, Virus Protection, and Backup Page 202 59 Where should I store my backups? • Store backups in a safe place • Store backups in a different location Chapter 4: File Management, Virus Protection, and Backup Page 202 60 How do I choose a backup device? Chapter 4: File Management, Virus Protection, and Backup Page 202 61 What are the limitations of CDs and DVDs? • Writing process is slow • Restoring a crashed computer is cumbersome • Writable optical technologies provide good storage capacity and blank disks are fairly inexpensive Chapter 4: File Management, Virus Protection, and Backup Page 203 62 Can I use floppy disks and Zip disks to back up my data? • Floppy disks are inexpensive, contain 1.44 MB space, and are good for several documents • Zip disks with 100 MB and 250 MB capacity is sufficient for documents and digital graphics • Several 750 MB Zip disks might be sufficient for backing up all of your data files Chapter 4: File Management, Virus Protection, and Backup Page 203 63 Can I store backup files on a network server? • If connected, you can store your files onto the network • Get permission first • Store your data in a passwordprotected, non-shared folder (remember networks are shared) • Make sure the server is backed up on a regular basis Chapter 4: File Management, Virus Protection, and Backup Page 204 64 Can I back up to a second hard disk? • Good backup option • Disadvantage: susceptible to same dangers of first drive Chapter 4: File Management, Virus Protection, and Backup Page 204 65 What about using a tape drive for backups? • Tape backup – Used in business – Data is copied to magnetic tape – Tape drive can be internal or external – Stored digital format Chapter 4: File Management, Virus Protection, and Backup Page 204 66 Where can I get backup software? • Backup software is provided with many backup devices, particularly tape drives • Microsoft Backup • Useful features include – Ability to restore all of your programs and data files without manually reinstalling Windows or any other applications – An option to schedule unattended backups – Support for a variety of backup devices Chapter 4: File Management, Virus Protection, and Backup Page 204 67 How do I use backup software? • Full backup - copy of all files on a disk; safe but can take a long time – Computer cannot be used during backup – Backup device requires equal capacity • Differential backup - copy of all files that have changed since the last full backup – Takes less time but more complex – Requires one full backup and then you will make differential backups at regular intervals Chapter 4: File Management, Virus Protection, and Backup Page 205 68 How do I use backup software? • Incremental backup - copy of all files that have changed since the last backup – Not necessary since the last full backup, but since any previous backup – Takes the least time but is most complex to restore – Requires good record keeping • Label correctly Chapter 4: File Management, Virus Protection, and Backup Page 205 69 How do I use backup software? Chapter 4: File Management, Virus Protection, and Backup Page 205 70 What is a boot disk? • A floppy disk or CD that contains the OS files needed to boot your computer without using hard drive • Most manufacturers include a recovery CD for restoring your system to original setup • The Windows XP Backup utility creates a set of Automated System Recovery disks Chapter 4: File Management, Virus Protection, and Backup Page 206 71 What is a boot disk? Chapter 4: File Management, Virus Protection, and Backup Page 206 72 Conclusion You should now be able to: – – – – Create valid names for files and folders Use file management features Describe how a computer physically stores files Explain viruses, boot sector viruses, macro viruses, Trojan horses, worms, and Denial of Service attacks – Describe how antivirus software is used – Understand backup and restore plans – Compare backup devices Chapter 4: File Management, Virus Protection, and Backup 73