Transcript A+ Guide to Managing and Troubleshooting Software 2e
A+ Guide to Software
Managing, Maintaining and Troubleshooting THIRD EDITION
Chapter 10
Supporting Hard Drives
You Will Learn…
About supporting hard drives and making backups About viruses and other computer infestations, and how to protect against them How to troubleshoot hard drives A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 2
Managing Hard Drives Keeping the drive clean and free from errors Drive compression Disk caching Backups A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 3
Defrag and Windows Defragmenter Clusters that make up a file are stored together in a
chain
Fragmentation
occurs when a single file is placed in several clusters that are not directly next to one another
Defragmentation
fragmentation detects and repairs A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 4
Windows XP Defragmenter A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 5
Using ScanDisk to Correct Cross-Linked and Lost Clusters
Cross-linked cluster
is pointed to by more than one file
Lost cluster (allocation unit)
is a cluster that no file in the FAT points to
Chkdsk /F
can be used to repair Windows 9x ScanDisk repairs these problems and others A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 6
Lost and Cross-Linked Clusters A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 7
Windows XP Drive Properties A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 8
ScanDisk Results A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 9
ScanDisk in MS-DOS Mode A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 10
Disk Cleanup A convenient way to delete temporary files on the hard drive Frees up space Improves performance A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 11
Disk Cleanup (continued) A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 12
Disk Compression Helps meet demand for more space on hard drives to hold software and data Two methods usually used in combination: Store data on a drive in one big file and manage how data and programs are written to that file Rewrite data files in mathematically coded format that uses less space A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 13
Disk Compression in Windows 2000 and Windows XP A file, folder, or an entire volume can be compressed as long as it uses NTFS A file/folder placed on a compressed volume will automatically be compressed A compressed file will be decompressed as it is read Will be recompressed when it is saved back to the compressed volume A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 14
Disk Compression in Windows XP and Windows 2000 (continued) 1.
2.
3.
4.
To compress an NTFS volume: 5.
Open Windows Explorer Right-click the volume to be compressed Select
Properties
from shortcut menu On the
General
tab, check
Compress drive to save disk space
, click
OK
Select whether to compress entire volume, click
OK
A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 15
Compressing an NTFS Volume A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 16
Disk Compression in Windows 9x
DriveSpace
used by Windows 95 and Windows 98 on a FAT16 file system Compressed volume is somewhat unstable A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 17
Disk Caching Temporary storage area in RAM for data being read from or written to a hard drive Speeds up access to hard drive data Two kinds Hardware cache Software cache A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 18
Disk Caching (continued) 1.
The CPU asks for data from hard drive 2.
Hard drive controller reads data from the drive and sends it to the CPU 3.
CPU requests more data, often data that immediately follows previous data 4.
Hard drive controller reads data from the drive and sends it to the CPU A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 19
Disk Caching (continued) A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 20
Hardware Cache or Software Cache Hardware Cache Built right into controller circuit board BIOS on controller contains cache program RAM chips on controller hold the cache Disadvantages • Slower • Upgrading to a faster cache is impractical A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 21
Software Cache Stored on hard drive like other software Usually loaded into memory when computer is booted Uses system RAM to hold the cache Disadvantage RAM is used that might otherwise be used for applications software and its data Advantages Faster because of where data is stored Upgrading to a faster cache is practical A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 22
How Disk Caching Methods Have Changed
DOS
used
buffers
to speed disk access
DOS with Windows 3.x
used
SMARTDrive
, a 16-bit, real-mode software disk cache utility
Windows 9x
uses
VCACHE
, a 32-bit, protected mode, built-in caching program
Windows NT/2000/XP
uses automated caching as an inherited Windows component A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 23
Enabling Disk Caching in Windows XP A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 24
Making Backups A
backup
is an extra copy of data or software that can be used if the original becomes damaged or destroyed Hardware and software needed Traditionally involve backup to tape Full, incremental, and differential backups Scheduled backups A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 25
The Child, Parent, Grandparent Method A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 26
Full, Incremental, and Differential Backups
Full backup
All data from a hard drive
Incremental backup
Only files that have changed or been created since last backup, whether or not it was a full backup
Differential backup
Files that have changed or have been created since last full backup A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 27
Scheduling Backups
Manual
: done by a user sitting at a computer
Automatic
: scheduled to run without user interaction Windows 98 and Windows NT/2000/XP support scheduling any program A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 28
Scheduling Backups (continued) A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 29
Scheduling Backups (continued) A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 30
Scheduling Backups (continued) A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 31
Backup Software Most tape drives come with backup software Third-party backup software Windows backup software A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 32
Windows 2000/XP Backup A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 33
Scheduling a Windows 2000/XP Backup A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 34
Windows 9x Backup Utility Msbackup.exe can be used to back up to removable disks and tape drives Windows 98 supports backup devices that Windows 95 did not Use third-party backup software to back up to drives and tapes not supported by Windows 9x A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 35
Disk Cloning Software
Disk cloning, disk imaging,
or
drive imaging
Replicates a hard drive to a new computer or to another drive on the same computer Examples of software Drive Image by PowerQuest ImageCast by Innovative Software Norton Ghost by Symantec Corp A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 36
Planning for Disaster Recovery Verify that you can use backup tape or disk to successfully recover the data Keep records of backups and recovery procedures, including: Folders or drives backed up Date of backup Type of backup Label identifying tape, disk, or other media A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 37
Viruses and Other Computer Infestations
Infestation
Any unwanted program transmitted to a computer without knowledge of the user Designed to do varying degrees of damage to data and software; does not damage PC hardware Categories of infestations Viruses Trojan horses Worms Logic bombs A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 38
Viruses and Other Computer Infestations (continued)
Virus
(most common) Replicates by attaching itself to other programs Might simply replicate, might do damage immediately, or might do damage in the future
Worm
Spread copies throughout a network without a host program Overloads memory or hard drive space by replicating repeatedly A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 39
Viruses and Other Computer Infestations (continued)
Trojan horse
Does not need a host program Substitutes itself for a legitimate program Usually cannot replicate
Logic bomb
Dormant code added to software Triggered by a predetermined time or event A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 40
Where Viruses Hide 1.
2.
3.
Virus Incubation period Contagious Destructive Types Boot sector virus File viruses (macro viruses) Multipartite viruses A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 41
Boot Sector Virus Hides in the boot sector program Hard drive • Master Boot Record program • OS boot record program Floppy Drive • Boot sector program Usually spread with a boot floppy CMOS often protects against this virus A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 42
File Virus A
File virus
hides in an executable program or in a document macro A
Macro
is a small program contained in a document
Macro viruses
are the most common viruses spread by email Melissa spread around the world in one day A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 43
Multipartite Virus A combination of boot sector virus and a file virus Can hide in either type of program A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 44
Cloaking Techniques
Virus signatures
are the distinguishing characteristics of a virus Antivirus (AV) software detects a virus by its signature Important to update AV software A Virus attempts to hide from AV software Changing its signature Attempting to mask its presence A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 45
Cloaking Techniques (continued) Viruses are classified by three cloaking techniques: Polymorphic virus: changes as it replicates Encrypting virus: transforms into non replicating program, then reverts Stealth virus • Masks the size of the file it infests, or • Substitutes an uninfected file when file is opened A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 46
The Damage an Infestation Can Cause Minor (e.g., altered monitor display) Major (e.g., erasure of files, or even entire hard drive) Infestation damage is called the payload A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 47
Results of a Harmless Virus A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 48
How Infestations Spread Executing email attachments without scanning for viruses Trading floppy disks containing programs Connecting a computer to unprotected network Buying software from unreliable sources Downloading programs from Internet A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 49
How Infestations Spread (continued) Using floppies from unknown sources Using shared network programs Using used, preformatted floppy disks Reading email that automatically runs a word processor to read attachment Not write-protecting original program disks A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 50
How a Virus Replicates A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 51
How a Trojan Horse Gets into Your Computer A Trojan horse is an infestation masquerading as a legitimate program People pass the program around thinking that it’s useful A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 52
How a Worm Gets into Your Computer Most worms come to your computer or network through the Internet Usually through an open port A firewall is the best defense against worms A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 53
Worms Spread Through Open Ports A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 54
Virus Hoaxes Warn about a nonexistent virus Useless traffic overloads email systems Check virus hoax Web sites http://hoaxbusters.ciac.org
http://www.hoaxinfo.com
http://www.hoaxkill.com
http://www.viruslist.com
http://www.vmyths.com
A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 55
Protecting Against Computer Infestations Make regular backups Use antivirus software regularly Keep Windows current with updates and patches Implement a firewall Use wisdom when managing program A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 56
Virus Symptoms A downloaded document contains macros A program takes longer than normal to load The number and length of disk accesses seem excessive for a simple task Many more: see p. 435 A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 57
What to Do When You Suspect a Virus Infestation Run a virus scan program to detect and delete the virus Get latest upgrade of AV software or try another AV program Download recent virus definitions Check Web site of the AV software vendor for information A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 58
Antivirus Software A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 59
Choosing Antivirus Software Can it download new software upgrades and virus definitions from the Internet?
Does it automatically execute at startup?
Can it detect macros in a word processing document as it is loaded?
Does it automatically monitor files being downloaded from Internet, including email?
Does it email you about new viruses and updates?
A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 60
Using Antivirus Software Scan memory and boot sector for viruses each time the PC boots Consider scheduling AV software to run at the same time every day Some AV software can run continuously in the background A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 61
Using Antivirus Software (continued) Set your AV software to scan: Files as they are downloaded from the Internet or a network Documents for macro viruses each time a document is opened by a word processor Both files and boot sectors of hard drives and disks A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 62
Troubleshooting Hard Drives Determine main priority and focus on it Data Software Hardware Resources Documentation Manufacturer’s Web site Technical support from ROM BIOS, hardware, and software manufacturers A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 63
Troubleshooting Hard Drives with Third-Party Software Norton Utilities Easy-to-use tools to prevent damage to hard drive, recover data from damaged hard drive, and improve system performance PartitionMagic Manages partitions on a hard drive more quickly and easily than Fdisk or Disk Management SpinRite Can recover data from a failing hard drive when other software fails A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 64
Software Problems with Hard Drives Root cause is often a virus Corrupted OS files Corrupted partition table, boot record, or root directory, making all hard drive data inaccessible Corruption of area of the FAT that points to the data, data’s directory table, or sector markings where data is located Corrupted data A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 65
Resolving Hard Drive and Data Access Problems Partition table Boot record FAT and root directory System files Data and program files A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 66
Data and Program File Corruption To restore a data file that is not backed up Use OS tools and commands Use third-party software Use a professional data recovery service A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 67
Data and Program File Corruption (continued) If a file has been accidentally erased or the disk is otherwise damaged Don’t write anything to the disk For a floppy, use DOS Diskcopy, Copy Disk in Windows Explorer, or third-party program A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 68
Data and Program File Corruption (continued) Problems with files and the file system Corrupted file header – read the file as a text file to recover the contents Lost clusters – Chkdsk or ScanDisk turn lost clusters into files in the root directory Erased file – look in the Recycle Bin, try the Unerase or Undelete command A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 69
Summary
Supporting hard drives and making backups Viruses and other computer infestations, and how to protect against them Troubleshooting hard drives A+ Guide to Software: Managing, Maintaining and Troubleshooting, Third Edition 70