Академический Документы
Профессиональный Документы
Культура Документы
A power supply unit (or PSU) converts mains AC to low-voltage regulated DC power for the
internal components of a computer.Modern personal computer universally use switched-mode
power supplies.
Some power supplies have a manual switch for selecting input voltage, while others
automatically adapt to the mains voltage. The desktop computer power supply changes
alternating current from a wall socket to low-voltage direct current to operate the processor and
peripheral devices. Several direct-current voltages are required, and they must be regulated with
some accuracy to provide stable operation of the computer.
Most modern desktop personal computer power supplies conform to the ATX specification, SMPS is a power supply that uses a switching regulator to control and stabilize the output
which includes form factor and voltage tolerances. While an ATX power supply is connected to voltage by switching the load current on and off. Switching power supplies have high efficiency
the mains supply, it always provides a 5 Volt standby (5VSB) voltage so that the standby and are widely used in a variety of electronic equipment, including computers and other
functions on the computer and certain peripherals are powered.ATX power supplies are turned sensitive equipment requiring stable and efficient power supply.
on and off by a signal from the motherboard. They also provide a signal to the motherboard to Advantages of switched-mode power supplies:
Problem Possible Cause Solution
Higher efficiency of 68% to 90%
Regulated and reliable outputs regardless of variations in input supply voltage
Small size and lighter
Disadvantages:
Generates electromagnetic interference
Complex circuit design Press the ON button once to turn on
Expensive compared to linear supplies The UPS will not turn on The unit has not been the UPS. Please note that the LCD
Uninterruptible power supply (UPS) or there is no output turned on. screen may be lit even though the
It is a power supply that contains a battery that keeps it running once power is lost. It also UPS is OFF.
has the capability to help reduce the impact of power surges. It keeps systems running until
power is restored within a short space of time, or make the transition between a primary power
source that has failed to a secondary power source (for example, a generator) that will keep The UPS is not Be sure that the power cable is
things running for longer. connected to utility securely connected to the unit and to
The functions of UPS of a computer are power. the utility power supply.
1. Providing backup power supply while mains fails so that electronics especially
critical electronics like servers, PC, routers, switches etc won’t shut down and lose
data. Reduce the load to the UPS,
2. Providing clean power sources. Online UPS can eliminate spikes, noise, surges The input circuit
disconnect nonessential equipment
caused by mains and output pure sine wave power to loads. breaker has tripped.
and reset the circuit breaker.
3. Most UPS can be remotely monitored. Advanced UPS are built with intelligent
management functions which can auto shut down (not like the shutdown by power-
off) PC.
During normal operation, you may find your UPS not functioning as expected. This may be due Check the utility power supply to the
The unit shows very
to a malfunction, configuration issue, or the install environment. UPS by plugging in a table lamp. If
low or no input
the light is very dim, check the
utility voltage
utility voltage.
The battery
Be sure that all battery connections
connector plug is not
are secure.
securely connected.
Keyboard Symptoms
Typical symptoms associated with keyboard failures include the following:
➤ No characters appear onscreen when entered from the keyboard.
➤ Some keys work, whereas others do not work.
➤ A Keyboard Error—Keyboard Test Failure error appears.
Contact APC Support for further
➤ A KB/Interface Error—Keyboard Test Failure error appears.
Possible Internal assistance. Take care to note the
Fault LED illuminates ➤ An error code of six short beeps is produced during bootup (BIOS dependent).
Fault exact fault message on the LCD
➤ The wrong characters are displayed. An IBM-compatible 301 error code appears.
Display
➤ An Unplugged Keyboard error appears.
➤ A key is stuck.
Boot from your installation disc. Insert the installation disc into your optical; drive, and reboot Wait for the installation to complete. Depending on the speed of your computer, this can take
your computer. Normally a computer boots from the hard drive first, so you will need to adjust up to an hour to finish. Most installations are hands-off at this point. Your computer may reboot
some settings in your BIOS in order to boot from the disc drive. You can enter the BIOS by several times during the installation process.
hitting the designated Setup key during the boot process. The key will be displayed on the same
screen as your manufacturer’s logo. Create your Windows login. Once your Windows installation is complete, you will need to
Common Setup keys include F2, F10, F12, and Del/Delete. create a username. You can also choose to create a password, though this is not necessary. After
Once you are in the Setup menu, navigate to the Boot section. Set your DVD/CD drive as creating your login info, you will be asked for your product key.
the first boot device. If you are installing from a USB drive, make sure that the drive is In Windows 8, you will be asked to customize the colors first. After that, you can choose to
inserted and then select it as the first boot device. either log in with a Microsoft account or use a more traditional Windows username.
Once you’ve selected the correct drive, save your changes and exit Setup. Your computer
will reboot. Install your drivers and programs. Once the installation is complete, you will be taken to your
new desktop. From here, you can begin installing your programs and make sure that your drivers
Try your Linux distribution before installing. Most Linux distributions come with a copy that are installed and up to date. Make sure to install an antivirus program if you are going to be
can be loaded directly from the installation disc. This will allow you to “test drive” your new connecting to the internet.
operating system before you commit to the installation process. Once you are ready to install,
click the Installation program on the desktop. Installing Specific Operating System
This is only possible with Linux distributions. Windows does not allow you to test out the Below Links provide you guidelines for installing different OS.
operating system before you install. Install Windows 7 -https://www.wikihow.com/Install-Windows-7-(Beginners)
Install Windows 8. - https://www.wikihow.com/Install-Windows-8
Wait for the Setup program to load. No matter which operating system you choose, the setup Install Ubuntu.- https://www.wikihow.com/Install-Ubuntu-Linux
program will need to copy some files to your computer before it can continue. This can take Install Linux Mint.- https://www.wikihow.com/Install-Linux-Mint
several minutes, depending on the speed of your computer’s hardware. Install Fedora.- https://www.wikihow.com/Install-Fedora
You will most likely need to choose some basic options, such as language and keyboard Install Mac OS X.- https://www.wikihow.com/Install-OS-X-Mountain-Lion
layout.
Repairing Operating System
Enter your product key. If you are installing Windows 8, you will need to enter your product Every OS has its own methods for repairing. Below we will discuss the method to repair a
key before you can begin the installation. Older Windows versions will ask for the product key windows operating system installation.
after installation is complete. Linux users will not need a product key unless it is a purchased
If there are problems with computer, repairing an existing installation of Windows is needed.
version such as Red Hat.
Startup Repair can’t correct hardware failures. Below are the steps to be followed to repair
windows OS.
Choose your installation type. Windows will give you the option of Upgrading or performing a
Custom installation. Even if you are upgrading an older version of Windows, it is highly 1. Choose Start→Turn Off Computer→Restart to restart your computer and watch the screen
recommended that you choose Custom and start from scratch. This will minimize problems that carefully.
may arise later from combining old settings and new ones.
You should see a message to press a function key (F2 probably) or another key combination to
If you are installing Linux, you will be given the option to install alongside your existing
enter the BIOS (Basic Input Output System) screen.
operating system (Windows), or to erase the disk and install Linux by itself. Choose the
option that best meets your needs. If you choose to install alongside Windows, you will be 2. Press the designated key or key combination.
given the option to choose how much hard disk space you want to designate for Linux. You have only a few seconds to press this key to interrupt the startup process and enter the BIOS
screen.
Format your partitions. If you are installing Windows, you will need to choose which hard
drive partition you want to install it on. Deleting partitions will wipe the data on the partition 3. Look for an option called First Boot Device, Boot Sequence, or something similar; press the
and return the space to the Unallocated section. Select the unallocated space and create a new arrow keys on your keyboard to select this field and then press Enter.
partition. You may have to select Advanced Options or another submenu to find it.
If you are installing Linux, the partition needs to be formatted in the Ext4 format.
4. In the resulting screen, select CDROM/DVD and then press the Esc key until you return to the The utility scans your installation of Windows to determine which files need to be repaired or
main BIOS screen. Follow the onscreen instructions to save your new settings and exit BIOS replaced.
setup. 8. Follow any onscreen instructions.
Your computer will restart from the CD/DVD drive. If you’re asked whether you want to replace a current version of a file with an older version,
click No. If the installation process finds a newer version of a file on your computer, it means
5. Insert the Windows installation CD into the drive and restart your computer. that you’ve upgraded the file from an online source; you should keep the newer file.
If you’re prompted to press any key to start the Windows installation from the CD/DVD drive, 9. Wait to see what the utility reports:
do so. o Successful repair: If the problem with your Windows installation is relatively minor,
Windows XP users: You see a different startup screen than Windows Vista and 7 users. Choose Startup Repair may be able to bring it back to health without erasing your software
Install Windows XP and then press F8 to accept the Windows XP licensing agreement. Then and personal files.
choose the operating systems you’d like to repair, press the R key on your keyboard, and then o Failure to repair: If Startup Repair can’t cure your PC’s illness, it displays a report
follow the onscreen instructions. that provides some details on the problem. Make full notes and discuss the issue with
the manufacturer’s support department or a repair technician.
Things that can go wrong when you upgrade your operating system
#1: Insufficient hardware
#2: Setup errors and freezes
#3: Driver problems
#4: Activation error
#5: Application incompatibilities
#6: Wrong OS edition
#7: Data loss
#8: Performance problems
#9: Permissions/access problems
#10: Interface problems/learning curve
https://www.techrepublic.com/blog/10-things/10-things-that-can-go-wrong-when-you-upgrade-
6. (Windows Vista and 7 users only) Select language settings and click Next. In the next screen, your-operating-system/
click Repair Your Computer. In the next screen, select the operating system or version of
Windows that you want to repair and click Next. Upgrade a Computer's Operating System
If the maker of your computer preinstalled the recovery software on your hard drive, check the In the rapidly changing world of both computer technology and consumer expectations,
Web site for directions on how to proceed. You may be asked to press one of the function keys operating systems evolve rapidly. When a new version of the operating system for your
as the system restarts to go to a hidden partition. computer becomes available there are lines waiting to get it and install it on their machines. This
7. In the System Recovery Options window, select Startup Repair. deals with upgrading a Windows operating system and some of the pitfalls that can exist or arise
in this process.
Preparing PC Maintenance Strategies
Step 1:- Perform a back-up of all your important data to some media other than your hard disk. Hardware maintenance is the testing and cleaning of equipment. Software maintenance is the
If the installation crashes or has a problem during the upgrade process, you run the updating of application programs in order to meet changing information requirements, such as
risk of losing some or all of your data. adding new functions and changing data formats. It also includes fixing bugs and adapting the
Step 2:- Defragment the computer's hard disks. Compress all files until there are no fragmented software to new hardware devices.
files on your drives. During the installation of a new operating system there are Simple things like downloading files, clicking on harmful sites by accident, and allowing dust to
many files that will be written to the hard disk and it is best to have them copied into settle on the keyboard can build up to the computer slowing down and possibly being unusable.
files on your hard disk that are continuous and not fragmented. However, by running anti-malware programs, deleting files as needed, and cleaning out the dust
Step 3:- Make a new folder for the new operating system to be installed into. Normally the on a computer, can all prolong the lifespan of computer for years of extra effective use. Whether
upgrade will be placed in the current windows directory. It is best to install into a they're tasks that should be done every day, once a month, once a year, or only when needed,
different directory so that some files that are currently on your system are preserved below is a list of maintenance tasks to perform to get the most out use of computer.
until you are sure that everything works correctly. An alternate to this is to copy the
entire contents of your current windows directory into a new directory that you can Daily:
store copies of the files in, until you are sure things are running properly on your Try to back up data at least once per day
new operating system. Run a malware scan to stay on top of virus prevention.
Check for updates every day so you don't miss any crucial upgrades, nor will you have to
Performing the Upgrade spend hours installing dozens at a time if you procrastinate it.
Step 1:- Reboot your computer after completing the operations in step 1. Beginning the upgrade If you use your computer for many hours at a time during the day, then plan to restart it at
process is best done with a fresh system. Rebooting the computer will restore it to a least once. This way, temporary files won't build up and slow down use over time.
known state and begin the upgrade with a system that has only a limited number of
Never shut down by using the power button – always use the option from the start menu.
computer processes currently running.
Never leave your computer on overnight.
Step 2:- Place the upgrade disk in the CD drive and it will auto-run to begin the installation.
There will be information that you need to enter during the start of this process.
Monthly:
Have your CD serial number available. Answer all questions that are asked by the
Use the defragmentation tool to keep your PC running fast and efficiently.
installation program and accept all the default values that the program offers unless
you know exactly what you are doing. The default values are best for most Scan your hard drive for errors to make sure there are no physical problems occurring. This
inexperienced users. doesn't check for viruses or malware, but more so physical and logical problems.
Step 3:- Reboot your computer a final time once the installation of the upgrade has completed. Clean out your disk drive every few weeks. Similar to defragmentation, these are small
Again, this is the best method of starting from a known point in case you experience pieces of trash that quietly accumulate over time.
problems with your system. Physically clean your computer by using compressed air to blow out dust and small pieces
of dirt. These small particles build up over time and can lead to computers physically
After the Upgrade overheating and other mechanical problems.
Step 1:- Reboot the computer and perform a disk defragmentation on the hard drives. Before
files begin to clutter things up again, make sure that the hard disk is in order. This Yearly:
will provide most of the free space your hard disk has available for new programs Backup your hard drive as an image, so if your PC ever crashes you won't have to reinstall
and files from scratch. This should be done twice a year, just to be safe.
Step 2:- Go through the programs that you have on your system and make sure that they all Do a thorough cleaning of the computer. This goes beyond simply using compressed air
open and operate without errors. Upgrading an operating system on your computer and actually opening it up to get rid of all of the smaller bits and pieces of dirt stuck in
can cause problems with your current software. If you experience problems, check there.
the manufacturer's website for patches and fixes to problems with certain operating
systems. As Needed:
Step 3:- Restore all your backed up files and data in case some were lost or changed during the Uninstall programs that you don't use anymore to free up space.
installation of the upgrade. Practice safe browsing by not downloading files from or spending time on sites you aren't
familiar with or may be untrustworthy since this is how people generally get malware.
Change passwords frequently as a general preventative measure against hackers.
8.5 PC Maintenance and Troubleshooting Strategies
PC Maintenance and Troubleshooting can be done by regular Maintenance and Troubleshooting Additional Maintenance Tips:
of different hardware and software components. By performing regular PC Maintenance and Get a good surge protector for plugging your computer into the wall.
Troubleshooting we can extend the life span of PC. Make sure your computer is plugged in properly and set up in a safe way. No wires should
be loose and hanging around near any open heat sources.
PC Troubleshooting Strategies
Troubleshooting is the process for identifying and fixing problems. Computer troubleshooting
may involve hardware or software and can sometimes involve both at the same time. The basic
process of troubleshooting is to check the most general possible problems first, and then
gradually check for more specific problems.
Check your cables and power cords to make sure they are connected properly.
Memory - do you have enough memory? Various files and applications can quickly
overtake your memory. 8.6 Maintaining and Optimizing Operating System Performance
Check printer - make sure you send a document to the correct printer and look for printer Maintaining operating system is the practice of keeping operating system in a good
jams. Check that the printer has paper and ink. state of repair and Optimizing OS is the process of modifying OS to make it work
more efficiently by enhancing OS capabilities to the extent that all components operate
Strategies for fixing a software problem at better level. The following steps can be taken to maintain and optimize the
performance of operating system.
Make sure the software is installed correctly. Like in hardware, restarting the program
might just fix the glitch.
Maintaining Operating System Performance:
Make sure your software is updated.
Experiencing slow downs? Try to make a habit of clearing your cache and cookies, and stay
current with your software updates. PC cleaning tools: Cleaning your PC of all the files like cache, temporary files, logs,
Remember that sometimes you might encounter a problem you can't fix. To prevent and fragments, etc. ensures that your PC stays fast and junk free. These
permanent loss, make sure you back up your data. Try saving it online (cloud storage), in files can take up a lot of space if not treated in time and may also cause
flash drives, or even as attachments in an email to yourself. software errors and system slow down.
What if you try all these ideas and still encounter issues? Many companies like Microsoft
have a list of frequently asked questions (FAQs) and tips. Save your instructions and Defragmentation tools: If you are using a hard disk drive (HDD) for storage and not a
manuals - these are a great reference for your troubleshooting questions. Try a search solid state drive (SSD), then a defragmentation tool will put all the data in
engine to see if other people have probably encountered the same problem. sequence to make it easier for the hard drive to quickly access it. Since in
hard drives, data is written in random fragments that are scattered every
time you access a file.
Automatic driver updaters: Keeping your hardware drivers updated is the best
way to ensure your connected devices work properly without any loss in
performance.
Uninstaller apps: Apart from the data in the main directory, programs also create Update computer hard disk drivers
registry entries and other files in the system for different purposes. The Using Parallel Processing
built-in uninstaller only uninstalls a program from its main directory. Reducing CPU Time by Modifying Program Compilation Optimization
Uninstaller app will delete all the connected data and ensure nothing is Reducing CPU Time by Using More Memory or Reducing I/O
left behind. Disable programs that run on startup
Set Energy Settings to High Performance
Virus and Malware removal programs: Malware and viruses are always developing Disable shadows, animations and visual effects
and a new virus threat arises every day. Antivirus software is there to fight
Remove Malware, Spyware, and Adware
them and ensure OS stays safe.
Uninstall Unused Programs
CPU and GPU temperature monitoring tools: PC overheating is a really serious Run Error Checking
issue and it can lead to data corruption and even permanent damage to OS Make sure OS is up to date
as well as PC components. CPU and GPU are the main heating
components and keeping a tab on their temperature will help keep them Method2: Improve performance of OS with PC Optimization Software
cool when needed. Want to use easier method to improve computer performance, choose and download
Disk space analysis tools: Understanding what is on PC will help to keep PC clean professional optimization software.
and free from useless data. Disk space analysis tools scan PC and show all
data in an easy to use manner. https://coggle.it/diagram/WsIfS8GZi5VNYe7T/t/maintaining-and-optimizing-
operating-systems
Hard drive health monitoring tools: Hard drives have limited life and they can be
easily damaged or get corrupted over time. There is a need to keep a tab on
hard drive’s health to save data and be prepared for the inevitable.
System Information Tools: It provide all the information about your PC software and
8.7 Troubleshooting Operating System and Applications Startup Problems
hardware components. Such as speed and type of CPU, GPU, RAM, Motherboard, and
hard drive, etc. Troubleshooting Operating System
The troubleshooting process helps resolve problems with the operating system. Use the
All-in-one Utilities: There are some really cool all-in-one utilities that offer multiple troubleshooting steps as a guideline to help you diagnose and repair problems.
PC utility software in a single package to automatically optimize performance and fix The first step in the troubleshooting process is to identify the problem. Figure 1 shows a list of
problems. open-ended and closed-ended questions to ask the customer.
Step 1: Identify the Problem
Optimizing Operating System Performance Open-ended What operating system is installed on the computer?
Questions What programs have been installed recently?
Optimization of OS helps in better and faster performance of OS. The performance is What updates or service packs have been installed?
achieved by following below methods: What error messages have you received?
What were you doing when the problem was discovered?
Method 1: Optimize Your Computer Performance Manually Closed-ended Does anyone else have this problem?
Choose a good SSD instead of the old internal HDD Questions Have you changed your password recently?
Have you made any changes to your computer?
Partition your computer internal hard disk reasonably
Does anyone else have access to your computer?
Troubleshoot PC internal hard disk to fix all possible problems Has this problem happened before?
Clean up your computer hard disk completely After you have talked to the customer, you can establish a theory of probable cause. Figure 2
o Remove all duplicate and trash files. shows a list of some common probable causes for operating system problems.
o Remove all temporary files Step 2: Establish a Theory of Probable Cause
o Remove unnecessary large files and applications Common causes of Corrupted or missing system files
operating system problems Incorrect device driver
Defragment your PC regularly
Failed update or service pack installation Verify Reboot the computer.
Corrupted registry Solution and Access all drives and shared resources.
Failing or faulty hard drive Full System Check event logs to ensure there are no new warnings or errors.
Incorrect password Functionality Check Device Manager to ensure there are no warnings or errors.
Virus infection Make sure applications run properly.
Spyware Make sure the Internet can be accessed.
After you have developed some theories about what is wrong, test your theories to determine the Check Task Manager to ensure that there are no unidentified programs
cause of the problem. Figure 3 shows a list of quick procedures that can determine the exact running.
cause of the problem or even correct the problem. If a quick procedure corrects the problem, you In the final step of the troubleshooting process, you must document your findings, actions, and
can go to step 5 to verify full system functionality. If a quick procedure does not correct the outcomes. Figure 6 shows a list of the tasks required to document the problem and the solution.
problem, you might need to research the problem further to establish the exact cause. Step 6: Document Findings, Actions and Outcomes
Step 3: Test the Theory to Determine Cause Document Findings Discuss the solution implemented with the customer.
Common steps to determine Reboot the computer. Have the customer verify the problem has been solved.
cause Examine the event logs. Provide the customer with all paperwork.
Run sfc /scannow. Document the steps taken to solve the problem in the work order
Roll back or reinstall the device driver. and the technician's journal.
Uninstall recent updates or service packs. Document any components used in the repair.
Run system restore. Document the time spent to resolve the problem.
Run CHKDSK.
Log in as a different user.
Boot to the last known good configuration. Troubleshooting Applications Startup Problems
Run a virus scan. The next time you have a application problem, try these troubleshooting tips in the order they're
Run a spyware scan. listed below. Carefully document the steps you take. That way, if a tech support call becomes
After you have determined the exact cause of the problem, establish a plan of action to resolve necessary, at least you'll have a good idea of what isn't causing the problem.
the problem and implement the solution. Figure 4 shows some sources you can use to gather 1. Free up RAM by closing other open programs.
additional information to resolve an issue. 2. Restart the Application software
Step 4: Establish a Plan of Action to Resolve the Problem and Implement the Solution 3. Shut down and restart your computer.
If no solution is achieved in the previous Helpdesk Repair Logs 4. Use the Internet to find help
step, further research is needed to Other Technicians 5. Undo any recent hardware or software changes.
implement the solution Manufacturer FAQs 6. Uninstall the software, and then reinstall it.
Technical Websites 7. Look for software patches.
Newsgroups
8. Scan for viruses and malware.
Computer Manuals
9. Check for a firewall conflict.
Device Manuals
Online Forums
10. Boot up in Safe Mode.
Internet Search 11. Defragment your hard drive.
After you have corrected the problem, verify full functionality and, if applicable, implement
preventive measures. Figure 5 shows a list of the steps to verify the solution. Conclusion
If the tips listed above haven't solved your software problem, it may be time to call tech support.
Step 5: Verify Full System Functionality and, If Applicable, Implement Preventive
At minimum, you'll be able to help them narrow down the problem by describing the
Measures
troubleshooting steps you've already taken on your own.
8.8 Troubleshooting Hardware Problems Removing, repairing and replacing faulty RAM, hard disk or
Hardware troubleshooting processes primarily aim to resolve computer video/graphic card.
hardware problems using a systematic approach. The process starts by first Cleaning dusts from RAM and Video carts slot/ports and from cooling
identifying the problem and finding different issues that can cause such a fan.
problem and eventually leading to implementing a solution or alternative. Tightening cable and jumpers on motherboard and/or components.
Hardware troubleshooting is generally done on hardware equipment Software related hardware problems such as device driver update or
installed within a computer, server, laptop or related device. installation.
Some processes within hardware troubleshooting include:
8.9 Connecting to and Setting up a Network using Operating System
Connect to a wired Network WPA2 (also called 802.11i standard)- latest and best
Steps encryption standard
Install network adapter Methods 2: Disable SSID broadcasting
Connect network cable to Ethernet RJ-45 port and network port o SSID(Service Set Identifier) = name
(wall jack, router, switch) o Not considered a strong security method because software
o Verify lights can be used to discover an SSID that is not broadcasted
Windows assumes dynamic IP address Method 3: Filter MAC addresses
o Automatically configures the network connection o Only computer with registered MAC addresses are allowed
Verify Internet connectivity to connect
Two keys to troubleshooting will be device Manager and Network and o Considered a weak security measure and does not use
sharing center encryption
o Verify device manager recognizes adapter without errors. o To find out the MAC address of a computer use the
If error occurs, try updating NIC drivers ipconfig/ all command
o If adapter has no errors, open network and sharing center
A red X indicates a problem 8.13 Virus Detection and Protection (Background of viruses, Virus
Click X to start windows Network Diagnostic scanning and Antivirus software)
o After windows has resolved the problem
Should see a clear path from the computer to the A computer virus is a type of malware that is designed to spread from
internet computer to computer and perform harmful activities such as corrupting and
Connect to a Wireless Network disrupting systems or destroying data.
Wireless networks type Computer virus types
o Wireless networks are created using access points A list of well-known computer virus types:
Memory Resident Virus - stays in memory after it executes and after
o Access point can provide either unsecured public hotspots
its host program is terminated. In contrast, non-memory-resident viruses
or secured private hotspots only are activated when an infected application runs.
If network is unsecured, verify that windows has configured the Overwriting Virus - will copy its own code over the host computer
network as a public network system's file data, which destroys the original program.
o For some hotspots, a home page appears and you must enter Direct Action Virus - is considered to be “non-resident” and functions
a code or agree to the terms of use by selecting one or more files to infect each time the code is executed.
o Make sure you are using a password protected windows The primary intentions of this virus is copying itself and to spread
user account. infection whenever the code is executed.
Boot Sector Virus - infects computer systems by copying code either to
Method used by access point to secure wireless network: the boot sector on a floppy disk or the partition table on a hard drive.
Method 1: Requiring a security key and using data encryption During startup, the virus is loaded into memory. Once in memory, the
o Three main protocols for encryption virus will infect any non-infected disks accessed by the system.
WEP(Wired Equivalent Privacy) – no longer Cluster Virus - associates itself with the execution of programs by
considered secure because key used for encryption modifying directory table entries to ensure the virus itself will start
is static when any program on the computer system is started. If infected by this
WPA(Wi-Fi Protected Access)- also called TKIP virus it will look like every program on your PC is infected; however,
and is stronger than WEP because encryptions keys this virus is only in one place on the system.
are constantly changing
Macro Virus - is written in a macro language and infects Microsoft Microsoft recommends that you disable SMB1 on Windows for security
Word or similar applications (e.g., word processors and spreadsheet reasons.
applications) and causes a sequence of actions to be performed
automatically when the application is started or something else triggers Antivirus software
it. It's recommended to always use an antivirus program on your PC – even
when antivirus software can't protect your computer against all viruses.
Computer virus symptoms (signs) It's better to have some protection than no protection at all.
A few computer virus symptoms are: You should only use one antivirus program on your computer.
Computer and/or internet suddenly slower The free antivirus programs are:
Computer behaves weird Bitdefender Antivirus Free
PC freezes and crashes a lot Kaspersky Free Antivirus
Unusual error messages appear Kaspersky Security Cloud Free etc
Files have been automatically deleted or added If you need more functions (e.g., multi-layer ransomware protection) and
Unwanted advertisements appear settings, then you can try a paid antivirus program.
Emails have been sent from your account to your contacts Most antivirus companies offer the option to download and try their paid
Sudden hardware problems (e.g., display acting weird) antivirus programs for free for 30 days.
Antivirus software and/or its shields are turned off automatically The paid antivirus programs are:
PC automatically restarts (reboots) by itself Bitdefender Antivirus
Kaspersky Antivirus etc
Computer virus prevention tips Free second opinion virus scanners
Keep your operating system and software always up-to-date
It's also recommended to use second opinion virus scanners to get more
Use a firewall
complete detection coverage, because some programs may detect viruses
Use antivirus software
that others might miss.
Don't ignore security warnings from Windows or your antivirus
The free second opinion virus scanners are:
software Malwarebytes
Don't install and use pirated software
Kaspersky Virus Removal Tool
If you don't use Java, then remove or disable it
Kaspersky TDSSKiller
Don't click on OK, Yes or Run when a pop-up window appears and ask
ESET Online Scanner
you to install unknown software. Here's one example: “Your windows You can use these scanners to scan your PC periodically (e.g., once a week)
computer could be at risk! Install this repair tool to protect and clean or when you think your PC is infected. You can use virus scanners alongside
your system by clicking Secure Now as soon as possible” Don't fall for your current antivirus software. This way you get the chance to use other
this trick! antivirus software on your PC without any problems.
Before you want to install free software (freeware) first check if its
reliable by reading reviews about it
Computer virus detection and removal
Always download software from the official link or from a trusted
website Step 1: Delete temporary files
Don't click on a link (in emails or web pages) if you don't trust it. Deleting your temporary files can speed up the scanning process and also free up
Use a secure and safe web browser like Google Chrome or Mozilla disk space. You don't need to install any extra software, because Windows has a
Firefox and keep it updated built-in tool called “Disk Cleanup”.
When installing software, always pay attention and always read 1. Open Windows Disk Cleanup.
everything clearly before clicking Next, OK, Install, Continue, etc. Three ways to open this tool:
Go to the Windows search bar and search for cleanup and click on Disk Malwarebytes will now scan your computer for viruses and other types of malware.
Cleanup when it appears. This process can take up to 15 minutes.
Press the [Windows] + [R] key on your keyboard, enter cleanmgr.exe, and then When the scan is completed it will show you the results of the scan.
click on OK. 3. If something is found, you click on Remove Selected.
Open Windows Explorer or File Explorer (Windows 10), right-click on Malwarebytes may ask you to restart your PC.
the (C:) drive, choose Properties and then click on Disk Cleanup(located in
the General tab). Step 4: Kaspersky Virus Removal Tool
2. Select the Windows drive (when asked for and if not already selected). You can download Kaspersky Virus Removal Tool here.
(C :) is the default installation location for Windows. 1. Start Kaspersky Virus Removal Tool.
3. Click on OK. 2. Accept the End User License Agreement.
The tool will now calculate how much disk space you will be able to free on your 3. Click on Change parameters.
system drive. 4. Select System drive and click on OK.
4. Select the type of files you want to delete. 5. Click on Start scan.
5. Click on OK. Kaspersky will now scan your computer for viruses and other types of malware.
6. Click on Delete Files. This process can take up to 40 minutes.
When the scan is completed it will show you the results of the scan.
Step 2: Full system scan with your antivirus software 6. If something is found, you click on Continue.
First, update your antivirus software and then run a full system scan with the
program. Step 5: ESET Online Scanner
You can download ESET Online Scanner here.
Step 3: Malwarebytes Click on SCAN NOW to download this tool.
Download Malwarebytes 1. Start ESET Online Scanner.
When you install Malwarebytes it will automatically enable a two-week trial 2. Accept the Terms of Use.
version of the premium version, but if you don't want the two-week trial, then you 3. Choose between:
can easily disable it in the settings. Enable detection of potentially unwanted applications
Disable detection of potentially unwanted applications
Enable the “Scan for rootkits” option 4. Click on Scan.
You will only have to change the following setting once. ESET will now scan your computer for viruses and other types of malware. This
1. Start Malwarebytes. process can take up to 40 minutes.
2. Click on Settings (located on the left). When the scan is completed it will show you the results of the scan.
3. Click on Protection (located at the top). 5. If something is found, you choose one of the following options:
4. Go to Scan Options. Select the threats you want to delete and click on Clean selected.
5. Enable Scan for rootkits. Click on Clean all.
6. Now you will have the Delete application's data on close option
Scan for Malware (optional).
1. Open Malwarebytes. 7. Click on Finish.
2. Click on Scan Now.
Disaster Recovery (Risk of data, Backup methods devices and media, failures. Disaster recovery helps in designing strategies that can restore hardware,
Backup scheduling, Recovery of data) applications and data quickly for business continuity.
Disaster recovery can be considered as a subset of business continuity. In order to design a
Disaster Recovery proper disaster recovery strategy, risk assessment and business impact analysis need to be
Disaster recovery in information technology is part of security planning and is developed in completed. These steps help in identifying the information technology services that can
conjunction with a business continuity plan. Disaster recovery is a set of policies and support the critical business activities of the organization. Again, these steps would also help
procedures which focus on protecting an organization from any significant effects in case of a in bringing the recovery point objectives and recovery time objectives. Disaster recovery
negative event, which may include cyberattacks, natural disasters or building or device measures can be classified mainly into three types:
Preventive measures Differential backup
Corrective measures With a differential backup, only the changed or new data since the last full backup will be
Detective measures backed up. This means of course that an initial full backup is required first so that the
software knows which documents are new or changed. When restoring such a backup both
Preventive measures aim at preventing an event from occurring. Corrective measures are for
the “base” backup and the differential backup files need to be restored.
correcting a system in case of a negative event or disaster. Detective measures focus on
Pros:
detecting and discovering negative events.
A regular differential backup requires much less space than a full backup.
A good disaster recovery plan helps in achieving business continuity even in case of disasters
Cons:
and negative events. The security management team of most organizations has regular checks
Restoring such a backup is slower than a full backup.
and exercises in order to assure good disaster recovery measures are followed by individual
Managing them is harder as two files are required.
department and the organization as a whole.
Incremental backup
An incremental backup also just backs up new or changed documents, but it bases these
Risk of data changes on the previous incremental backup as opposed to the initial full backup. Only the
Data risk is the potential for a loss related to your data. The term applies to failures in the first ever incremental backup is based on the initial “base” backup.
storage, use, transmission, management and security of data. The following are common Pros:
types of data risk. A regular differential backup requires much less space than a full backup or differential
Compliance risk is the potential for losses and legal penalties due to failure to comply with backup.
laws or regulations. Cons:
A data breach is the download or viewing of data by someone who isn't authorized to access Restoring such a backup is slower than a full backup or differential backup.
it. Managing them is more complex as all the files from a backup “chain” are required for a
Data loss is the inability to obtain data that you once possessed. restoration.
Data rot is a general tendency for data to become corrupt with time.
Deanonymization is the potential of identifying people in data that has been anonymized.
Data is anonymized to protect individual privacy when releasing information for purposes Backup devices and media
such as value added services, disclosure, research and peer review. Data are back-up for future use and to backup data there are different types of devices used
Regulatory risk is the potential for losses due to a change in laws and regulations. by institutions. Some of the popular backup devices that are used currently are listed below:
Dark data is data that an organization collects but doesn't use. It is common for USB stick: USB flash drives are basically miniature hard drives connected to computer using
organizations to have more dark data than regular data. The primary drivers of this are a USB port. The drives price depends on their capacity.
inexpensive data storage and sensors. External hard drive: An external hard drive is perfect when used as backup storage media. It
Data corruption is when data becomes physically or logically damaged due to errors in has the lowest cost per gigabyte when compared to the other backup devices
writing, reading, storage, transmission or processing. Network attached storage: It can be used as a multimedia server, and can function as an
Data remanences are residual representations of data that remain after deleting files or email or lightweight database server. NAS offers data redundancy, meaning it will generate a
reformatting data storage devices. It is common for operating systems to logically delete files backup of your backups
leaving them physically present on a storage device. Cloud storage: It is popular among businesses these days, due to its benefits such as allowing
Data sovereignty is the idea that data is controlled by the laws and practices of the nation users to access data anywhere on smartphone devices, as well as enabling to work
where it is located. In some cases, nations pass laws requiring certain data to be controlled with the most current hardware and up-to-date software.
and/or physically stored domestically.
Privacy is the right to live aspects of your life unobserved and unrecorded. It is a freedom In computer technologies, a backup storage device is used to make copies of data that is
that is commonly valued by people across cultural boundaries. actively in use. Backup machines provide redundancy of data residing on primary storage.
Should the storage medium, such as a hard disk drive, fail or become corrupted, the original
data is recovered from copies on the backup hardware.
Methods for data backups The media used for backup storage are:-
Full Backup
With a full backup, all data is backed up to a target drive or disk with each backup. This
means that all documents and files are stored in one file, which makes working with the
backups and managing them simple.
Pros:
Creating such a backup is quicker than a differential or incremental backup.
Managing them is easier as only one file needs to be restored.
Cons:
A regular full backup requires much more space than a differential or incremental backup.
Remote backup appliances: A remote backup appliance backs up data that sits outside a has been deleted and possibly overwritten, where data recovery involves specific
corporate data center. manipulation of the bits recorded on a drive.
Virtual server backup: Virtual server backup is a software-based version of physical backup
hardware. Certain key data recovery techniques that apply to disk failures and other scenarios are
Physical disk backup devices: Disk, disk-to-tape storage: Enterprises use backup storage sometimes called in-place repair and read-only data recovery. The first type of approach uses
devices to provide redundant copies of data that an organization considers critical utilities and other resources to try to fix disk errors. A read-only approach creates a copy of a
to sustained business operations. drive, where data can be extracted. In another approach, professionals may try to physically
Local backup for primary storage: Local backup places data copies on external HDDs or repair a failed disk with replacement parts.
tape systems, typically housed in or near an on-premises data center. The data is
transmitted over a secure high-bandwidth network connection or the A key to understanding data recovery is to look at the difference between older magnetic
corporate intranet. drive mediums and new solid-state drives, which record data in different ways.
Integrated backup storage appliances: An integrated device is a file server equipped with
HDDs and the vendor's proprietary backup software 8.10 Operating System Resources on a Network and Security Strategies
Cloud backup storage: Public, private and hybrid: Cloud backup transmits data copies via a Operating System Resources on a Network also known as Shared resources on a
network to a remote location. The backup storage is hosted on servers owned by Network, refer to computer data, information, or hardware devices that can be easily
third-party cloud service providers, accessed from a remote computer through a local area network (LAN) or enterprise
NAS devices: NAS device come with massive HDD storage capacity and often are intranet. Successful shared resource access allows users to operate as if the shared resource
earmarked for archiving, backup and shared storage, particularly in midsize were on their own computer. The most frequently used shared network environment objects
organizations or those seeking to decrease their reliance on tape. are files, data, multimedia and hardware resources like printers, fax machines and scanners.
Portable backup storage devices, storage at the edge: Several types of removable Shared LAN points are used by a variety of system resources, such as hard drives, printers,
media are associated with backup storage devices, including cartridge-encrypted scanners and network cards.
tape drives, optical media and USB drives. File and printer sharing occur via two network communication mechanisms: peer-to-peer
(P2P) sharing and the client-server network model.
Backup scheduling Sharing network resources requires abiding by certain constraints, as follows:
Security: Organizations present ongoing opportunities for unauthorized shared
Backup scheduling is one of the most important features in data backup software. It allows resources. Security mechanisms should be implemented to provide efficient
completely eliminating manual backups (with all filtering, compressing, transferring to the parameters.
storage, and other). Compatibility: Various client-server operating systems may be installed, but the
The main features of backup scheduling are as follows: client must have a compatible OS or application to access shared resources.
Automation of all tasks. By scheduling backup tasks you can automate all backups and Otherwise, the client may encounter issues that create communication delays and
make them run without supervision. requires troubleshooting.
Flexible schedule configuration. For each type of data you can specify their own backup Mapping: Any shared OS hardware drive, file or resource may be accessed via
schedules and perform them on any time frame, from minute to monthly intervals. For mapping, which requires a shared destination address and naming conventions.
example, you may want to backup databases two times a day. File Transfer Protocol (FTP) and File Sharing: FTP is not affected by shared
E-mail notifications. Once you’ve established a backup schedule, you can forget about resources because the Internet is FTP’s backbone. File sharing is an LAN concept.
manual checking and control results of all backup procedures through e-mail notifications.
On the other hand, OS programs managing the key resources are giving
Run backups as Windows/other service. The utility can run as service under operating
systems, which allows launching tasks without loading the interface, and even without user relatively simple names depending on the resource they manage:
logged on. Key Resource OS Program
Processors Processor Scheduling
Recovery of data Storage Memory management
Data recovery refers to the salvaging or securing of data from failed or compromised I/O devices I/O management
hardware systems. In data forensics and espionage, the term refers to techniques for obtaining Data File management
"hard to get" data, usually during hardware or system failures, or when system data has been
erased. A Network Operating System runs on a server and provides the server the capability to
In the general data recovery category, a few different types of techniques are applied to manage data, users, groups, security, applications, and other networking functions. The
specific scenarios. Hardware data recovery techniques work on situations where a system primary purpose of the network operating system is to allow shared file and printer access
failure prevents easy access to a hard drive. With more sophisticated hardware, this problem among multiple computers in a network, typically a local area network (LAN), a private
is easily solved. Another type of data recovery technique applies to disk level failure, where network or to other networks.
more elaborate approaches may be required. Other types of data recovery pertain to data that
Examples of network operating systems include Microsoft Windows Server 2003, Microsoft printer. Some applications only print to the default Windows printer. Is your printer set
Windows Server 2008, UNIX, Linux, Mac OS X, Novell NetWare, and BSD as the default?
Operating system security is the process of ensuring OS integrity, confidentiality and Problems with the Operating System or printer driver can be indicated if you cannot
availability. And the methods and techniques with ensures OS integrity, confidentiality and print from a system prompt, but can print a test page by pressing a button on the printer.
availability are Operating system security Strategies Check online for a newer driver, or a driver compatible with your OS. Try deleting the
printer from Windows list of printers, then installing service to it again?
OS security refers to specified steps or measures used to protect the OS from threats, viruses, Connectivity problems, such as a bad cable or port, can also be indicated if print jobs
worms, malware or remote hacker intrusions. OS security encompasses all preventive-control do not come out, but you can print a test page on the printer by pressing a button on it.
techniques, which safeguard any computer assets capable of being stolen, edited or deleted if Try swapping out printer cables with one that is known to be good. Try checking the
OS security is compromised. state of the port: is it in the right mode for your printer? EPP? ECP? Bi-directional?
OS security encompasses many different techniques and Strategies which ensure safety from Problems with the printer itself are indicated if none of the above is possible. This
threats and attacks. OS security allows different applications and programs to perform category includes being out of ink or toner, paper jams, wrong paper, too much heat or
required tasks and stop unauthorized interference. humidity, and other problems.
OS security may be approached in many ways, including adherence to the following:
Performing regular OS patch updates In Ink jet printer’s dots of ink are sprayed onto a sheet of paper. There is no fusing
Installing updated antivirus engines and software necessary, as the ink generally dries quickly. Some ink jet printers use only one color of ink,
Scrutinizing all incoming and outgoing network traffic through a firewall while others use multiple tones to create color output. Typically, color ink jet printers use
Creating secure accounts with required privileges only (i.e., user management) the CMYK system of printing, mixing separate amounts of Cyan, Magenta, Yellow, and
Black ink to make other colors.
Some ink jet printers do not have a separate black ink supply, but simulate black by
8.11 Supporting Printers combining other colors. This sort of printer is known for lower quality output.
A printer is an external output device that takes data from a computer and generates output in The size of the dots of ink can vary greatly from one model of printer to another. Smaller
the form of graphics / text on a paper. dots give greater resolution. If a printer has the ability to vary the size of the dots, this can
There are different types of printer and different ways a printer can connect to and make the output much smoother.
communicate with a computer. The standard media connections are: parallel, serial, USB, Servicing an ink jet printer is often accomplished by using software to align the output of the
FireWire, network cable, and SCSI. Some printers are also accessible by infrared, WiFi, or print head, to blow out a clog in one or more jets, or to simply inform the device that an ink
Bluetooth wireless connections. The Printer driver should be installed to the device that gives cartridge has been replaced. Older models required manual cleaning of the print head.
command to printer. If printer used in network with same OS then install driver in one PC It is important not to leave an ink jet printer turned on indefinitely. This will reduce the life of
and share it. If other computers will run other operating systems, install other drivers for the the print head and dry out the ink supply. It is also important to use the correct type
printer by clicking Additional Drivers. of paper to avoid smears, poor print quality, and other problems.
Common symptoms
A short list of troubleshooting ideas for shared printers.
Here are the common symptoms which can indicate some problems;
Is the printer online? It is surprising how many people expect a device to work that has VGA mode
not been turned on, or has not be set to "on line" mode. The new model monitors are not at all expected to be set as VGA as its default video running
Is the network printer configured correctly on the PC? This means, have you installed mode. But they cannot be configured in a way that it never supports a VGA format video. So
the correct driver, are you sending print job in the right language, for the right size paper, the configuration should be checked by one, before complaining that the video is not
etc.? supported by the device. There has to be some place in the control panel where the video
supporting formats are to be chosen. One should go there and check, whether VGA format
Is the correct network printer selected? Many users will send a print job and not be support is enabled there or not. If not checked in there, one should check that in and recheck,
aware that they sent it to the wrong printer. whether the video is viewable or not. If that resolves the problem, the trouble shooting for
that issue cones to an end there. If not, then one is needed to then problems elsewhere.
Is there enough hard disk space available on the PC? When preparing a print job to send,
a workstation must compose it as a temporary file. If the workstation does not have No image on screen
enough room for the file, the print job will either fail or be incomplete. Another common problem we face many a times is the blank screen or no display at all, or
one may find the screen showing he command, no video to display. Very simple thing to
Can you print successfully from another application? If so, the problem is likely related check out there is to see the power chord of the device and whether power is reaching the
to your installation of the problem application. It is possible that the application cannot output device it not. For the command shown, no video to display, one should check on the
print to this sort of printer. data cable. Most of such cases are solved there effectively, but if not, then one can look after
another common problematic area. Not only that, but many a time it happens that he video
cards are having incomplete videos. This also may cause a no display at the video screen.
Can you print successfully from the host PC using the identical application? This applies
Generally videos are downloaded or copied from somewhere, and it happens sometimes that
to shared printers. It is not really diagnostic unless the two workstations are alike in all
the download was not completed or some strings have gone missing due to a pause break
ways.
during the downloading process. Again, during a file being copied or moved to some other
devices, some parts have not begun copied properly due to a common problem of hardware
Can you print to a file and then send the file to the host PC to successfully print? If this acceleration. So, that must be checked by a try to play the videos at some other devices.
works, then the problem is with data transmission. If this does not work, then the
problem is with the application or print driver on the remote PC. Overheat shutdown
Many a times, one can see that the entire display goes off, while a video is about to play. This
For DOS applications, you may need to exit the application before printing occurs. thing starts a thought in one's mind that the video is a bad format or badly configured or may
be corrupted. But another thing that may be happening to make the system shut down almost
never comes to mind. The thing is the temperature. The system has a capacity to bear the
8.12 Video Display Problems (Video Modes, Resolution, Color, Size) temperature. But if it crosses the limit, then it is sure to go off. Sometimes, what happens is
Video mode is the mode that a video adapter is currently running. For example, in graphics the system is running for a long time and it is already at its limited point of temperature. So,
mode, the video card or display device is capable of displaying graphics. However, whenever the high pixel video is allowed to play, then the temperature limited is exceeded
in text mode, the display only displays text. Each mode is capable of different maximum and that excess temperature make the system shut down.
resolution and maximum colors.
Resolution is a measure used to describe the sharpness and clarity of an image or picture Dead pixels
and is often used as a metric for judging the quality of monitors, printers, digital images and
a various other hardware and software technologies.
Thus a video may face problems, due to many reasons. The reason may be about the system
configuration, or may be due to setting problem, or may be due to the device incompatibility.
Once the exact reason is identified, then troubleshooting becomes much easier.