Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 14

Chapter 19

Virus, Disaster Recovery and Maintenance plan

A+ Certification for PC Technician


Preventive Maintenance
What is Preventive Maintenance (PM)? Save Time?
Performing proactive maintenance in Saves time in dealing with system
order to prevent system problems failures and data loss because PM
procedures are quite simple compared
to troubleshooting and repair
Why is PM important? procedures. Example Scandisk
It saves money, saves time, helps
safeguard Data and improves Safeguard Data?
performance Data on the hard disk is more important
than the hardware that houses it. Take
steps to protect this data.
Save Money?
Avoiding problems with your PC will save
Improve Performances?
you money in the long run, compared
Some parts of the system will actually
with laying out cash for new components
degrade in performance over time, and
or repair jobs. preventive maintenance will help to
improve the speed of your system in
these respects. Example Disk
Defragmentation

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 2
PM Tasks
What are the items that need PM? Cleaning Keyboard?
External components including the May need a small electric vacuum
monitor, keyboard, and mouse. Internal cleaner, compressed air, or paintbrush
components include the fans, floppy and to remove dust, dirt, and debris. To
tape drives, circuit boards, and remove products such as oil and soda
expansion slots. spots, use a volatile liquid, like rubbing
alcohol on a lint-free cloth
Cleaning Monitor?
Do not use standard glass cleaner. Use Cleaning Mouse?
an anti-static cleaner that has been Likely reason for a mouse stops
made especially for electronic tracking correctly or sticks is dirt.
equipment. Standard window cleaner Clean the ball with the cleaning solution
may strip off the special charged or warm water and dry it off. Remove
coating that is applied to the outside of any lint or dust from the rollers inside
the monitor. Spray the cleaning product the mouse housing
on a lint-free cloth, then wipe the LCD
or CRT with the cloth.

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 3
PM Tasks
Cleaning Internal Components? Cleaning Contacts ?
Dust and dirt tend to build inside the Ensure a reliable connection between
computer case after a while. If left devices that are attached to the
unchecked, dust can accumulate and motherboard.
cause your system to overheat and/or
crash.
What to clean on Motherbaord?
Clean the slot connectors, power supply
How to clean the internal components? connectors, and keyboard connector.
Unplug the system and clean it
routinely. You should use compressed
How to clean Expansion card?
air or a vacuum for this purpose. One
critical PM procedure is checking the For the expansion cards, clean the edge
power supply for 5 and 12 VDC. connectors that plug into slots on the
motherboard as well as any other
connectors, such as external ones
mounted on the expansion card’s
bracket. Use a contact cleaner to clean
the I/O card’s edge connector contacts

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 4
Computer Infestations
What are the main categories of forest What is a Trojan Horse?
infect?
A program in which malicious or harmful
Virus, Worm, Trojan and Hoax code is contained inside apparently
harmless program or data. In this way it
What is a Virus? can get control and do its chosen form of
Designed to spread itself by first damage, such as ruining the file allocation
infecting executable files or the system table on your hard disk. Eg Troj_wipedisk
areas of hard and floppy disks and then
making copies of itself. Operates
without the knowledge or desire of the What is Hoax?
computer user. Needs a Host Program. Not a virus. A message or warning about
non-existent virus. Eg Good times
What is a worm? “A deadly new computer virus that actually
Self-replicating virus that does not causes home computers to explode in a
alter files but resides in active memory hellish blast of glass fragments and flame
and duplicates itself. Worms use parts has injured at least 47 people since
of an operating system that are August 15, horrifying authorities who say
automatic and usually invisible to the millions of people are risking injury,
user. Does not need a Host.
blindness or death every time they sit
down to work at their PC!”

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 5
Type of Virus
What is Boot Sector Virus? What is file infector?
Attack the boot program that is stored Directly attack and modify program
on every bootable floppy disk or hard files, which are usually .EXE or .COM
disk. files.

How it works? How is it activated?


The code is executed by the system When the program is run, the virus
when the PC is started up. By installing executes and does whatever it wants to
themselves here they guarantee that do. Usually it loads itself into memory
their code will be executed whenever and waits for a trigger to find and
the system is started up, giving them infect other program files.
full control over the system to do what
they wish.
How is file infector spread?
These viruses are commonly spread
How does boot sector virus normally through infected floppy disks, over
spread? networks, and over the Internet.
They are spread most commonly
through infected bootable floppy

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 6
Type of Virus
What is a Macro Virus? What is Multipartite Virus?
Make use of the built-in programming Infect both boot sectors and files
languages in popular programs such as
Microsoft Word and Microsoft Excel
What is a Virus Hoaxes?
A rumor or warning about a virus that is
What are macro? spread from well-meaning person to
These are programs allow users to well-meaning person, telling them not to
create programs that automate tasks. download a program or take other
action, or they will get a virus. But the
virus does not exist, and in fact it is
How this virus works?
the virus warning.
As the macro languages have become
more powerful, virus writers have
created malevolent macros that, when
opened unwittingly, duplicate
themselves into other documents and
spread just like a conventional virus
would.

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 7
How Virus Spread
How can I get computer virus?
Can get infected through:
 Trading floppy disks containing
program files
 Connecting the PC to unprotected
network
 Buying software from unreliable
source
 Downloading programs from the
Internet
 Using floppy drive from unknown
source
 Use shared network program
 Reading e-mail that automatically
executes a word process to read
attached file

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 8
Anti-Virus Software
What are common Antivirus software? What are the “virus” that antivirus
1. F-secure Antivirus software cannot prevents?
2. Norton Antivirus 1. Trojan horse
3. Mcafee VirusScan 2. Hoax
4. PC-cillin
5. InocuLAN Antivirus What should you do when you suspect
that the file contain a virus?
What does antivirus program consists? Run a scan of the file to detect and
delete the virus
1. Program
2. Virus Profile (virus signature)

Why needs to update the program?


Patches and Virus Signature file (DAT).
VS must be updated periodically.

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 9
Backup
Why the need to backup? How to perform a Differential Backup?
There are many different risks to your Backup the files that have been
data: hard disk crash, software failure, changed since the last full backup
file system corruption virus infection,
theft, sabotage and natural disaster. How to perform a Incremental Backup?
Data backup ensure you can recover
Only the files that have changed since
from these situations. the last backup (Full or Incremental)
are selected. That is, those with
What are the 3 ways to select files for Archive bit that had been turned on.
Backup?
Full, Differential and Incremental What are the media used for backup?
Tape, Super disk (120MB), Zip drive
How to perform a Full Backup? (1GB), Jaz drive (2GB), CD-RW (640MB)
All the files on the hard disk are
selected for backup. The simplest type
of backup, and yields the most complete
backup image, but it takes the most
time and media space to do.

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 10
Scheduling a Backup Job
How to use DOS command to backup What is that purposed of scheduling a
small number of documents/data? backup?
Create a batch file eg. bckupdoc.bat Run automatically without user
interaction.
How to create the batch file?
For example, to copy the files from How to schedule a task?
c:\itbasic to a diskette (A: ) 1. My Computer
1. Start Notepad 2. Scheduled Tasks
2. Type XCOPY C:\ITBASIC\*.DOC A: 3. Add Schedule Task
3. Save as C:\BCKUPDOC.BAT 4. Browse to find the file
4. Create a shortcut on the Desktop BCKUPDOC.BAT
5. Specified Time and Day

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 11
Backup
What are the common software used?
Backup utility eg Microsoft Backup
Disk cloning and disk imaging software
eg Norton Ghost

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 12
RAID
What is RAID?
Redundant array of Independent disks

What is the purpose of RAID?


Use by high-end, high cost file server
or workstation to protect data. Two
copies of data are written, each to a
different hard disk.
(only 3 will be discussed here)

What is RAID 0?
Disk stripping. Increases the logical What is RAID 1?
drive capacity by treating 2 or more Disk mirroring. Protect data by writing
disk as a single disk. Support by data twice, once to each of two disks.
Windows NT and Windows 2K. Should either disk fails, the data is
safe on the other disk. Fault tolerance.
Disadvantage?
Data is lost if 1 disk fails. No fault What is RAID 1 duplexing?
tolerance. When each disk has its own disk
controller card.

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 13
RAID
What happens when 1 disk fails?
Data on the disk is generated on the
new disk with information from the
others.

What happens when 2 disks fails?


Data lost.

What is RAID 5?
Disk stripping with Parity. Requires at
least 3 disk, excluding the System/Boot
disk.

How RAID 5 works?


Example, 5 disks RAID 5. Data is
divided into 4 parts and written 4 disks
with parity written to the 5th disk.

Chapter 19 – Virus, Disaster Recovery and Maintenance


Ver 1.0 10 April 2001 Plan Slide 14

You might also like