Download - 10 implementing hard drive
![Page 1: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/1.jpg)
Implementing Implementing Hard DriveHard Drive
![Page 2: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/2.jpg)
You Will Learn…You Will Learn…
About supporting hard drives and About supporting hard drives and making backupsmaking backups
About viruses and other computer About viruses and other computer infestations, and how to protect infestations, and how to protect against themagainst them
How to troubleshoot hard drivesHow to troubleshoot hard drives
![Page 3: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/3.jpg)
Managing Hard DrivesManaging Hard Drives
Use Windows utilities to protect, Use Windows utilities to protect, optimize, and maintain hard drivesoptimize, and maintain hard drives– Defrag and Windows Disk DefragmenterDefrag and Windows Disk Defragmenter– ScanDiskScanDisk– Disk CleanupDisk Cleanup– Disk compressionDisk compression– Disk cachingDisk caching– Making backupsMaking backups
Access utilities from command Access utilities from command prompt or Windows desktopprompt or Windows desktop
![Page 4: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/4.jpg)
Defrag Command and Defrag Command and Windows Disk Windows Disk DefragmenterDefragmenter
Detects and repairs Detects and repairs fragmentation, which can slow fragmentation, which can slow down access time and complicate down access time and complicate recovery of a corrupted filerecovery of a corrupted file
Defragment hard drive once a Defragment hard drive once a monthmonth
![Page 5: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/5.jpg)
ScanDiskScanDisk
Designed to replace Chkdsk commandDesigned to replace Chkdsk command
Repairs cross-linked and lost clustersRepairs cross-linked and lost clusters
Checks FAT for problems with long Checks FAT for problems with long filenames and the directory treefilenames and the directory tree
Scans the disk for bad sectorsScans the disk for bad sectors
Repairs problems with structure of a Repairs problems with structure of a hard drive that has been compressed hard drive that has been compressed using Windows DriveSpace or using Windows DriveSpace or DoubleSpaceDoubleSpace
![Page 6: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/6.jpg)
Cross-Lined and Lost Cross-Lined and Lost ClustersClusters
![Page 7: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/7.jpg)
ScanDisk ResultsScanDisk Results
![Page 8: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/8.jpg)
ScanDisk in MS-DOS ScanDisk in MS-DOS ModeMode
![Page 9: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/9.jpg)
Disk CleanupDisk Cleanup
![Page 10: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/10.jpg)
Disk Compression Disk Compression MethodsMethods Store data on hard drive in one big Store data on hard drive in one big
filefile
– Manage writing of data and programs Manage writing of data and programs to that fileto that file
Rewrite data in files in Rewrite data in files in mathematically coded format that mathematically coded format that uses less spaceuses less space
![Page 11: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/11.jpg)
Disk CompressionDisk Compression
Disk compression in Windows XP Disk compression in Windows XP and Windows 2000and Windows 2000
– Use the NTFS file systemUse the NTFS file system
Disk compression in Windows 9xDisk compression in Windows 9x
– Use DriveSpace utility on a FAT 16 Use DriveSpace utility on a FAT 16 file systemfile system
![Page 12: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/12.jpg)
Disk CacheDisk Cache
Temporary storage area in RAM Temporary storage area in RAM for data being read from or for data being read from or written to a hard drivewritten to a hard drive
Speeds up access time to the Speeds up access time to the drivedrive
![Page 13: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/13.jpg)
Disk CachingDisk Caching
![Page 14: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/14.jpg)
Disk Caching (Disk Caching (continuedcontinued))
Hardware cache versus software cacheHardware cache versus software cache
How disk caching methods have changedHow disk caching methods have changed
– DOSDOS
– DOS with Windows 3.xDOS with Windows 3.x
– Windows 9xWindows 9x
– Windows NT/2000/XPWindows NT/2000/XP
![Page 15: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/15.jpg)
Making BackupsMaking Backups
Child, parent, grandparent methodChild, parent, grandparent method
Full, incremental, and differential Full, incremental, and differential backupsbackups
Scheduling backupsScheduling backups
Backup softwareBackup software
Disk cloning softwareDisk cloning software
Planning for disaster recoveryPlanning for disaster recovery
![Page 16: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/16.jpg)
Child, Parent, Child, Parent, Grandparent MethodGrandparent Method
![Page 17: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/17.jpg)
Full, Incremental, and Full, Incremental, and Differential BackupsDifferential Backups FullFull
– Backs up all data from hard driveBacks up all data from hard drive
IncrementalIncremental
– Backs up only files that have changed or Backs up only files that have changed or been created since last backupbeen created since last backup
DifferentialDifferential
– Backs up files that have changed or been Backs up files that have changed or been created since the last created since the last fullfull backup backup
![Page 18: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/18.jpg)
Scheduling BackupsScheduling Backups
![Page 19: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/19.jpg)
Scheduling Backups Scheduling Backups ((continuedcontinued))
![Page 20: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/20.jpg)
Scheduling Backups Scheduling Backups ((continuedcontinued))
![Page 21: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/21.jpg)
Backup SoftwareBackup Software
Comes with most tape drivesComes with most tape drives
Third-party software also Third-party software also availableavailable
Backup utilities are provided with Backup utilities are provided with Windows NT/2000/XP and Windows NT/2000/XP and Windows 9xWindows 9x
![Page 22: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/22.jpg)
Windows 2000/XP Windows 2000/XP Backup UtilityBackup Utility
Can perform immediate backup Can perform immediate backup from Backup tabfrom Backup tab
Can schedule repeated backupsCan schedule repeated backups
![Page 23: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/23.jpg)
Disk Cloning SoftwareDisk Cloning Software
Replicates hard drive to a different computer Replicates hard drive to a different computer or to another drive on the same computeror to another drive on the same computer
ExamplesExamples
– Drive Image by PowerQuestDrive Image by PowerQuest
– ImageCast by Innovative SoftwareImageCast by Innovative Software
– Norton Ghost by Symantec CorpNorton Ghost by Symantec Corp
![Page 24: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/24.jpg)
Planning for Disaster Planning for Disaster RecoveryRecovery Verify your recovery planVerify your recovery plan
Keep a record of regular backupsKeep a record of regular backups
– Folders or drives backed upFolders or drives backed up
– Date of the backupDate of the backup
– Type of backupType of backup
– Label identifying the tape, disk, or other Label identifying the tape, disk, or other mediamedia
![Page 25: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/25.jpg)
Viruses and Other Viruses and Other Computer InfestationsComputer Infestations
VirusVirus Has an incubation periodHas an incubation period Is contagious; replicates by attaching to other Is contagious; replicates by attaching to other
programs; infected program must be executed programs; infected program must be executed for a virus to runfor a virus to run
Is destructiveIs destructive
WormWorm Spreads copies of itself without a host Spreads copies of itself without a host program, overloading the network as it program, overloading the network as it replicatesreplicates
Does damage by its presenceDoes damage by its presence Best defense is a firewallBest defense is a firewall
Trojan horseTrojan horse Does not need a host program to workDoes not need a host program to work Substitutes itself for a legitimate programSubstitutes itself for a legitimate program Most cannot replicateMost cannot replicate
Logic bombLogic bomb Dormant code added to software; triggered at Dormant code added to software; triggered at a predetermined time or by a predetermined a predetermined time or by a predetermined eventevent
![Page 26: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/26.jpg)
Understanding Understanding Computer InfestationsComputer Infestations Where viruses hideWhere viruses hide
– Boot sector virusesBoot sector viruses– File virusesFile viruses– Multipartite virusesMultipartite viruses
Cloaking techniquesCloaking techniques– Polymorphic virusesPolymorphic viruses– Encrypting virusesEncrypting viruses– Stealth virusesStealth viruses
Potential damage ranges from minor to Potential damage ranges from minor to majormajor
![Page 27: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/27.jpg)
How Infestations How Infestations SpreadSpread User activities can increase User activities can increase
susceptibilitysusceptibility
Virus replicatesVirus replicates
A Trojan horse gets into your A Trojan horse gets into your computercomputer
A worm gets into your computerA worm gets into your computer
![Page 28: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/28.jpg)
How a Virus ReplicatesHow a Virus Replicates
![Page 29: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/29.jpg)
How a Worm Gets into How a Worm Gets into Your Computer Your Computer
![Page 30: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/30.jpg)
Virus HoaxesVirus Hoaxes
E-mail warnings about a E-mail warnings about a nonexistent virusnonexistent virus
Overload network trafficOverload network traffic
Check Web sites that specialize in Check Web sites that specialize in debunking virus hoaxesdebunking virus hoaxes
![Page 31: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/31.jpg)
Protecting Against Protecting Against Computer InfestationsComputer Infestations
Make backupsMake backups
Use antivirus software regularlyUse antivirus software regularly
Keep Windows current with Keep Windows current with updates and patchesupdates and patches
Implement a firewallImplement a firewall
![Page 32: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/32.jpg)
Protecting Against Protecting Against Computer Infestations Computer Infestations ((continuedcontinued))
Be aware of virus symptomsBe aware of virus symptoms
Know what to do when you suspect a Know what to do when you suspect a virus infestationvirus infestation
– Run antivirus softwareRun antivirus software
– Check Web site of AV software Check Web site of AV software manufacturermanufacturer
Use antivirus softwareUse antivirus software
![Page 33: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/33.jpg)
Capabilities to Look for Capabilities to Look for When Selecting Antivirus When Selecting Antivirus SoftwareSoftware
Download software upgrades and virus Download software upgrades and virus definitions from the Internetdefinitions from the Internet
Automatically execute at startupAutomatically execute at startup Detect macros in word-processing Detect macros in word-processing
documentsdocuments Automatically monitor files being Automatically monitor files being
downloaded from the Internetdownloaded from the Internet Send virus alerts to your e-mail addressSend virus alerts to your e-mail address Scan both automatically and manuallyScan both automatically and manually
![Page 34: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/34.jpg)
General General Troubleshooting Troubleshooting GuidelinesGuidelines Make backups and keep them currentMake backups and keep them current
Run antivirus software regularlyRun antivirus software regularly
Defragment files and scan the hard Defragment files and scan the hard drive occasionallydrive occasionally
Don’t smoke around your hard driveDon’t smoke around your hard drive
Don’t leave the PC turned off for Don’t leave the PC turned off for weeks or months at at timeweeks or months at at time
![Page 35: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/35.jpg)
General General Troubleshooting Troubleshooting Guidelines (Guidelines (continuedcontinued)) High humidity can be dangerous High humidity can be dangerous
for hard drivesfor hard drives
Be gentle with a hard driveBe gentle with a hard drive
Take precautions when moving a Take precautions when moving a hard drive or changing CMOS hard drive or changing CMOS setupsetup
![Page 36: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/36.jpg)
Resolving Common Resolving Common Hard Drive ProblemsHard Drive Problems Categories of problemsCategories of problems
– Caused by hardware or software?Caused by hardware or software?– Prevent hard drive from booting or prevent Prevent hard drive from booting or prevent
data from being accessed?data from being accessed? Gather basic information from user; diagnose Gather basic information from user; diagnose
and address the problemsand address the problems Focus on the main priorityFocus on the main priority Use available resources (documentation, Use available resources (documentation,
manufacturer’s Web site, technical support)manufacturer’s Web site, technical support)
![Page 37: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/37.jpg)
Troubleshooting Hard Troubleshooting Hard Drives with Third-Party Drives with Third-Party SoftwareSoftware Norton UtilitiesNorton Utilities
SpinRiteSpinRite
PartitionMagicPartitionMagic
![Page 38: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/38.jpg)
Hardware ProblemsHardware Problems
Hard drive not foundHard drive not found
Invalid drive or drive specificationInvalid drive or drive specification
Damaged boot recordDamaged boot record
Damaged FAT or root directory or bad Damaged FAT or root directory or bad sectorssectors
Cannot boot from the hard driveCannot boot from the hard drive
Drive retrieves and saves data slowlyDrive retrieves and saves data slowly
![Page 39: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/39.jpg)
Software Problems Software Problems with Hard Driveswith Hard Drives Corrupted OS filesCorrupted OS files
Corrupted partition table, boot record, Corrupted partition table, boot record, or root directory, making all data on or root directory, making all data on the hard drive inaccessiblethe hard drive inaccessible
Corrupted area of the FAT that points Corrupted area of the FAT that points to the data, data’s directory table, or to the data, data’s directory table, or sector markings where data is locatedsector markings where data is located
Corrupted dataCorrupted data
![Page 40: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/40.jpg)
Resolving Hard Drive Resolving Hard Drive and Data Access and Data Access ProblemsProblems Partition tablePartition table
Boot recordBoot record
FAT and root directoryFAT and root directory
System filesSystem files
Data and program filesData and program files
![Page 41: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/41.jpg)
Data and Program File Data and Program File CorruptionCorruption
Options for restoring a data file Options for restoring a data file that is not backed upthat is not backed up
– OS system tools and commandsOS system tools and commands
– Third-party softwareThird-party software
– Professional data recovery serviceProfessional data recovery service
![Page 42: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/42.jpg)
Data and Program File Data and Program File Corruption (Corruption (continuedcontinued))
Recovering data when portions of Recovering data when portions of a damaged file are still intacta damaged file are still intact
– Create a new file on another diskCreate a new file on another disk
– Use Copy commandUse Copy command
– Edit new file to replace missing dataEdit new file to replace missing data
![Page 43: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/43.jpg)
Data and Program File Data and Program File Corruption (Corruption (continuedcontinued))
Potential problems with files and Potential problems with files and file systemfile system
– Corrupted file headerCorrupted file header
– Lost clustersLost clusters
– Erased fileErased file
![Page 44: 10 implementing hard drive](https://reader035.vdocuments.site/reader035/viewer/2022062319/558419f3d8b42a40018b4efa/html5/thumbnails/44.jpg)
Getting Technical Getting Technical SupportSupport Before you call, have available:Before you call, have available:
– Drive model and descriptionDrive model and description
– Manufacturer and model of computerManufacturer and model of computer
– Exact wording of error messageExact wording of error message
– Description of the problemDescription of the problem
– Hardware and software configuration for Hardware and software configuration for the systemthe system