SlideShare a Scribd company logo
1 of 6
Preventive Maintenance on Operating Systems.
- Create a System Repair Disk
- Create Automatic Backups
- Monitor Computer Performance
- Task Manager
- Performance Monitor
- Reliability Monitor
- Hard Disk Maintenance
- Disk Cleanup
- Disk Defragmenter
- Check Disk
- System Startup Maintenance
- Msconfig
Software and Windows Updates
- Windows Update Terms
- Hotfix
- Service Pack (SP)
- Third Party Software Update and Drivers
- Microsoft Update
- Firmware Update
Malware
Malware is a malicious software or code, designed to
damage computer or data.
- Protection
- Keep anti-malware software up to date
- Anti-malware protection on host server or gateway
- Implementation of restricted user policies
- Stay informed and up to date
- Symptoms
- Slow Computer
- Turned off firewalls and antivirus software
- Corrupted or changed files
- Firewall alerts and system errors
- System failure or blackouts
- Different or suspicious system behavior
- Treatment
Antivirus Software
Antivirus Software is developed software
to detect and remove computer viruses.
- Scanning
- Integrity Checking
- Heuristic Virus Checking
- Interception
Spyware and Adware
Spyware is a technology that gathering information
about person or organization from the computer
WITHOUT users knowledge.
- Spybot
Adware are programs designed to display
advertisement while user is browsing internet.
Adware collects data WITH users consent.
- Lavasoft
Sources Cited
Campbell.edu
Preventative Maintenance - Campbell University
Campbell.edu,. 'Preventative Maintenance - Campbell University'. N. p., 2014. Web. 11 Dec. 2014.
Windows.microsoft.com
Windows - Microsoft Windows, windows.microsoft.com,. 'Windows - Microsoft Windows'. N. p., 2014. Web.
11 Dec.
Mishra, A.
SCCM Administration and Automation: What's difference between Security Patch, HotFix and Service Pack?
Mishra, Atul. 'SCCM Administration And Automation: What's Difference Between Security Patch, Hotfix And
Service Pack?'. Systemcentersupport.blogspot.com. N. p., 2010. Web. 11 Dec. 2014.
Csun.edu
Computer Virus -Anti Virus Software- Csun.edu,. 'Computer Virus -Anti Virus Software-'. N. p., 2014. Web. 11
Whatis.techtarget.com
Whatis.techtarget.com,. 'What Is Learning Guide: Spyware? - Definition From Whatis.Com'. N. p., 2014. Web.
11 Dec.
Kaspersky Lab United States
Kaspersky Personal & Family Security Software
Kaspersky Lab United States,. 'Kaspersky Personal & Family Security Software'. N. p., 2014. Web. 11 Dec.
2014.
Testout.com
Sections: 9.1.6 Windows Utilities Facts, 5.10.3 Disk Optimization Facts, 9.7 Updates.
Testout.com,. ' Online IT Certification And Certification Training | Testout | Labsim '. N. p., 2014. Web. 11
Dec. 2014.
Pictures.
Freepik
Download millions of FREE vectors, photos and PSD
Freepik,. 'Download Millions Of FREE Vectors, Photos And PSD'. N. p., 2014. Web. 11 Dec. 2014.

More Related Content

What's hot

MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review ChecklistEberly Wilson
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxInfosec
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk
 
ASPEN - NEXT GENERATION SIEM
ASPEN - NEXT GENERATION SIEMASPEN - NEXT GENERATION SIEM
ASPEN - NEXT GENERATION SIEMFlorin Hoinarescu
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101Srinivasan Vanamali
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring SystemGirish Naik
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Splunk Architecture overview
Splunk Architecture overviewSplunk Architecture overview
Splunk Architecture overviewAlex Fok
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWSylvain Martinez
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Unix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | EdurekaUnix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | EdurekaEdureka!
 

What's hot (20)

MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Network Architecture Review Checklist
Network Architecture Review ChecklistNetwork Architecture Review Checklist
Network Architecture Review Checklist
 
Firewall audit
Firewall auditFirewall audit
Firewall audit
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Join the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptxJoin the hunt: Threat hunting for proactive cyber defense.pptx
Join the hunt: Threat hunting for proactive cyber defense.pptx
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
ASPEN - NEXT GENERATION SIEM
ASPEN - NEXT GENERATION SIEMASPEN - NEXT GENERATION SIEM
ASPEN - NEXT GENERATION SIEM
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
Security monitoring and auditing
Security monitoring and auditingSecurity monitoring and auditing
Security monitoring and auditing
 
Security audit
Security auditSecurity audit
Security audit
 
Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Splunk Architecture overview
Splunk Architecture overviewSplunk Architecture overview
Splunk Architecture overview
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Unix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | EdurekaUnix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | Edureka
 
Continuous monitoring with OSSIM
Continuous monitoring with OSSIMContinuous monitoring with OSSIM
Continuous monitoring with OSSIM
 

Viewers also liked

PROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEM
PROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEMPROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEM
PROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEMAB MAKASANA
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Preventive Software Maintenance: The Past, the Present, the Future
Preventive Software Maintenance: The Past, the Present, the FuturePreventive Software Maintenance: The Past, the Present, the Future
Preventive Software Maintenance: The Past, the Present, the FutureNikolaos Tsantalis
 
Penyelenggaraan cartaalir
Penyelenggaraan cartaalirPenyelenggaraan cartaalir
Penyelenggaraan cartaalirIs Wan
 
Kertas cadangan/ paperwork
Kertas cadangan/ paperworkKertas cadangan/ paperwork
Kertas cadangan/ paperworkNor Kamaruddin
 
Bab 1 garis panduan pengurusan makmal komputer sekolah
Bab 1 garis panduan pengurusan makmal komputer sekolahBab 1 garis panduan pengurusan makmal komputer sekolah
Bab 1 garis panduan pengurusan makmal komputer sekolahKMPOINT
 
Masonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive MaintenanceMasonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive MaintenanceAlyssa Natano
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishFelipe Luis Garcia C
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshootingChristian Macatangay
 
Preventive Maintenance Presentation
Preventive Maintenance PresentationPreventive Maintenance Presentation
Preventive Maintenance Presentationimhoffm
 
Preventive maintenance final
Preventive maintenance finalPreventive maintenance final
Preventive maintenance finalgarfield Tulloch
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 

Viewers also liked (16)

PROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEM
PROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEMPROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEM
PROCEDURE FOR MAINTENANCE OF SEWAGE SYSTEM
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Preventive Software Maintenance: The Past, the Present, the Future
Preventive Software Maintenance: The Past, the Present, the FuturePreventive Software Maintenance: The Past, the Present, the Future
Preventive Software Maintenance: The Past, the Present, the Future
 
Penyelenggaraan cartaalir
Penyelenggaraan cartaalirPenyelenggaraan cartaalir
Penyelenggaraan cartaalir
 
Hsp ict t4
Hsp ict t4Hsp ict t4
Hsp ict t4
 
Kertas cadangan/ paperwork
Kertas cadangan/ paperworkKertas cadangan/ paperwork
Kertas cadangan/ paperwork
 
Bab 1 garis panduan pengurusan makmal komputer sekolah
Bab 1 garis panduan pengurusan makmal komputer sekolahBab 1 garis panduan pengurusan makmal komputer sekolah
Bab 1 garis panduan pengurusan makmal komputer sekolah
 
Preventive maintenance
Preventive maintenancePreventive maintenance
Preventive maintenance
 
Masonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive MaintenanceMasonry: Tools and Preventive Maintenance
Masonry: Tools and Preventive Maintenance
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshooting
 
Types of Virus & Anti-virus
Types of Virus & Anti-virusTypes of Virus & Anti-virus
Types of Virus & Anti-virus
 
Sewerage System
Sewerage SystemSewerage System
Sewerage System
 
Preventive Maintenance Presentation
Preventive Maintenance PresentationPreventive Maintenance Presentation
Preventive Maintenance Presentation
 
Preventive maintenance final
Preventive maintenance finalPreventive maintenance final
Preventive maintenance final
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 

Similar to Preventive Maintenance on Operating Systems

Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Doryan Mathos
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskLumension
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallBev Robb
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)Doryan Mathos
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 

Similar to Preventive Maintenance on Operating Systems (20)

Antivirus Comparative junio 2014
Antivirus Comparative junio 2014Antivirus Comparative junio 2014
Antivirus Comparative junio 2014
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 
Avc prot 2013a_en
Avc prot 2013a_enAvc prot 2013a_en
Avc prot 2013a_en
 
Avc prot 2012b_en
Avc prot 2012b_enAvc prot 2012b_en
Avc prot 2012b_en
 
Lecture10.pptx
Lecture10.pptxLecture10.pptx
Lecture10.pptx
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town Hall
 
Avc per 201304_en
Avc per 201304_enAvc per 201304_en
Avc per 201304_en
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)AV Comparatives 2013 (Comparación de Antivirus)
AV Comparatives 2013 (Comparación de Antivirus)
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 

Preventive Maintenance on Operating Systems

  • 1. Preventive Maintenance on Operating Systems. - Create a System Repair Disk - Create Automatic Backups - Monitor Computer Performance - Task Manager - Performance Monitor - Reliability Monitor - Hard Disk Maintenance - Disk Cleanup - Disk Defragmenter - Check Disk - System Startup Maintenance - Msconfig
  • 2. Software and Windows Updates - Windows Update Terms - Hotfix - Service Pack (SP) - Third Party Software Update and Drivers - Microsoft Update - Firmware Update
  • 3. Malware Malware is a malicious software or code, designed to damage computer or data. - Protection - Keep anti-malware software up to date - Anti-malware protection on host server or gateway - Implementation of restricted user policies - Stay informed and up to date - Symptoms - Slow Computer - Turned off firewalls and antivirus software - Corrupted or changed files - Firewall alerts and system errors - System failure or blackouts - Different or suspicious system behavior - Treatment
  • 4. Antivirus Software Antivirus Software is developed software to detect and remove computer viruses. - Scanning - Integrity Checking - Heuristic Virus Checking - Interception
  • 5. Spyware and Adware Spyware is a technology that gathering information about person or organization from the computer WITHOUT users knowledge. - Spybot Adware are programs designed to display advertisement while user is browsing internet. Adware collects data WITH users consent. - Lavasoft
  • 6. Sources Cited Campbell.edu Preventative Maintenance - Campbell University Campbell.edu,. 'Preventative Maintenance - Campbell University'. N. p., 2014. Web. 11 Dec. 2014. Windows.microsoft.com Windows - Microsoft Windows, windows.microsoft.com,. 'Windows - Microsoft Windows'. N. p., 2014. Web. 11 Dec. Mishra, A. SCCM Administration and Automation: What's difference between Security Patch, HotFix and Service Pack? Mishra, Atul. 'SCCM Administration And Automation: What's Difference Between Security Patch, Hotfix And Service Pack?'. Systemcentersupport.blogspot.com. N. p., 2010. Web. 11 Dec. 2014. Csun.edu Computer Virus -Anti Virus Software- Csun.edu,. 'Computer Virus -Anti Virus Software-'. N. p., 2014. Web. 11 Whatis.techtarget.com Whatis.techtarget.com,. 'What Is Learning Guide: Spyware? - Definition From Whatis.Com'. N. p., 2014. Web. 11 Dec. Kaspersky Lab United States Kaspersky Personal & Family Security Software Kaspersky Lab United States,. 'Kaspersky Personal & Family Security Software'. N. p., 2014. Web. 11 Dec. 2014. Testout.com Sections: 9.1.6 Windows Utilities Facts, 5.10.3 Disk Optimization Facts, 9.7 Updates. Testout.com,. ' Online IT Certification And Certification Training | Testout | Labsim '. N. p., 2014. Web. 11 Dec. 2014. Pictures. Freepik Download millions of FREE vectors, photos and PSD Freepik,. 'Download Millions Of FREE Vectors, Photos And PSD'. N. p., 2014. Web. 11 Dec. 2014.

Editor's Notes

  1. Preventive Maintenance on Operating Systems. Performing preventive maintenance on the computer is very important for preventing hardware and software failures as well as the loss of data. Overall computer maintenance can be split between hardware and software maintenance. As a part of this presentation, we will focus on the software maintenance of Operating Systems. Windows is the most common operating system installed in computer systems across the world. That is why it is good practice to learn and keep certain habits in order to keep Win OS running without any common errors. The best practices to prevent any future problems are: --- Create a System Repair Disk Go to Start button, click Control Panel, click Backup and Restore, click Create a system repair disc and follow the wizard instructions to create System Repair Disc. In case of System failure, Repair Disk will help you get Windows Up and running. --- Create Automatic Backups Go to Start button, click Control Panel, click Backup and Restore, click Set up backup, and follow the wizard to create Automatic Backups of your system. Backup is a copy of the file, from which original file can be restored in case of disk or memory failure or damage. --- Monitor Computer Performance. Available tools for this task are (Task Manager, Performance Monitor and Reliability Monitor) Task Manager: Use for the current state of the system and running applications. Under the performance tab, general performance can be monitored via processor and memory modules statistics. Performance Monitor: Includes real time data displayed in a graph with customizable counters and statistics display. Reliability Monitor: This is the overall system stability index and shows software changes or failures. --- Hard Disk Maintenance. Keep the system clean and avoid downloading and installing un-necessary applications. Disk Cleanup: Safely remove temporary, old or unnecessary files and logs. Disk Defragmenter: Used for optimizing the performance of the hard disk by defragmenting files from the different locations on the hard disk and putting them into a single location Check Disk: Can mark and recognize bad sectors on the disk so that they are no longer in use. It also gathers lost clusters on the hard disk, connects cross-linked files and corrects their cluster associations. --- System Startup Maintenance. Prevent unnecessary applications from starting automatically Msconfig: Configure Startup preferences, system components, customize Windows setup components and enable or disable startup utilities and programs.
  2. Software and Windows Updates Windows Updates is a service developed by Microsoft Corporation, which allow administrators of the computer to manage patches and hotfixes released for Microsoft Windows Operating Systems. Windows Update automatically downloads and installs updates if settings allow it to do so. Hotfix: Update released to fix very specific issues. Small patches designed to address specific issue. Every hotfix includes a number, which refers to the Microsoft Knowledge Base, where it is explained what the given hotfix is released to fix. Hotfix is applied automatically and applied immediately. Service Pack or SP: A more complex update, which includes all released patches, hotfixes and maintenance releases, until the date of the service pack release. This is available in a single installable package form. Installing the service pack is less error-prone than individually installing several patches or hotfixes. A service pack might include additional functionality to the OS. Every service pack is numbered with SP + the number of service pack (ex: SP1, SP2). Microsoft Update Don’t get confused with Microsoft Updates. The Microsoft Updates service is a different type of update service for additional Microsoft products, example: Microsoft Office. This service is disabled by default. Third Party Software Update and drivers Non-Microsoft applications must be update separately. Windows Update doesn’t include updates for this type of application or software. Keep your additional driver up to date. Windows updates only provide updates for driver files registered with Microsoft. Non-registered drivers must be updated manually from the website of the manufacturer. Firmware Update Firmware is the basic software embedded in a hardware device. Any update must be downloaded directly from the website of the manufacturer if available. While installing firmware update, administrator have to make sure that computer won’t be disconnected from the power supply. Aborted process of installation can cause serious harm to the hardware.
  3. Malware Malware is a malicious software or code that is designed to damage a computer or data WITHOUT the user’s knowledge or approval. To protect the computer against malware, it is necessary to install anti-malware software. There is wide variety of software solutions offered. Packages can include: spyware protection, adware or even spam protection or “shields.” Protection Some basic steps on how to keep the computer clean and running are: - Keep anti-malware software up to date - Implement anti-malware protection on an individual host to scan files before they are downloaded on the end computer - Implement policies to restrict downloading or opening of suspicious files Keep yourself informed about newest security breaches and their causes Symptoms Common symptoms to look for if the computer contains malicious software are: - Slow computer - Turned off firewall, antivirus system - Corrupted or changed files or their names Firewall alerts, system errors System failure or blackout Any suspicious “behavior” of the system, different from standard Treatment If scans detect malware, recovery can take place. The corrupted and infected files or software can be repaired, deleted or put into quarantine. Some programs can’t be removed while running. In this case, the malware can be removed after a scan is performed and before the operating system loads. This scan must be processed and planned by the user in setting up the anti-malware software.
  4. Security and System vulnerability Security Center in Windows Vista and 7 can check the current security status of the computer by checking the status of antivirus, firewall or if automatic updates are up and running. As a part of overall operation system protection, Microsoft Windows include Advance Security Utility, where The Windows Firewall can be configured. Windows Firewall can manage and filter traffic based on parameters. Source IP address, destination IP address, port number and ICMP protocol are the main features of Windows Firewall. Antivirus Software Antivirus Software is developed software to detect and remove computer viruses. Viruses are malicious codes designed to take over or damage a computer. Viruses need a trigger or some form of action by the user to keep spreading around the network and other computers. Antivirus software needs to be installed as an addition to any Windows operation system to ensure protection for the computer against viruses. Some extra functions of antivirus software vary by the manufacturer. The main functions of antivirus software are: Scanning The scanner included in the antivirus software will scan all files on the hard drive and the memory and search for unique code (virus). This unique code is compared with the database of known viruses and, if a match is found, the antivirus software switches an alarm and notifies the user about the issue. Integrity Checking Checks if the file was changed due to virus activity or corruption as the file will no longer match the recorded integrity information. Most integrity checkers can detect other damage or corrupted data and restore them. Heuristic Virus Checking The developer of the antivirus software will set the rules to recognize differences between virus and regular applications. This method is favored because it doesn’t require regular downloads of the virus database. However, it is not very efficient because different viruses can obey these rules and pass the anti-virus check. Interception This function detects virus-like behavior and warns the user about it. Antivirus software can be effective only if it is kept up to date and regular scans of the system are scheduled and completed.
  5. Spyware and Adware Spyware is a technology that gathers information about a person or organization from the computer WITHOUT the users’ knowledge. Spyware doesn’t actually harm or take over the computer. It is simply collecting information and sending the data over to a preconfigured server or other data collecting device. Spybot is a spyware and adware removal software. The main function of Spybot is to search and destroy more specific types of malware like: keylogers, trojans, trackersware etc… The basic version of the program is freeware for personal users. The paid version is for commercial use. Adware are programs designed to display advertisements while the user is browsing internet. This functionality is mostly unwanted and very disturbing. Opposite of Spyware, Adware collects data WITH users consent. Lavasoft is a software development company that produces one of the most effective Anti-adware software named Ad-Aware. This set of tools will help to clean and prevent the computer from being infected by common Adware programs. Ad-Aware Free Antivirus+ is under freeware license for personal users. The other three paid products of Lavasoft from the family of Ad-Aware software are for personal and commercial: Ad-Aware Personal Security, Ad-Aware Pro Security and Ad-Aware Total Security with added functions. It take some effort and knowledge to keep computer system up and running. This effort is necessary to prevent important data loss or damage. Marek Majtan December 11, 2014 For CIS111M Class Frederick Community College
  6. Sources Cited Campbell.edu Preventative Maintenance - Campbell University Campbell.edu,. 'Preventative Maintenance - Campbell University'. N. p., 2014. Web. 11 Dec. 2014. Windows.microsoft.com Windows - Microsoft Windows, windows.microsoft.com,. 'Windows - Microsoft Windows'. N. p., 2014. Web. 11 Dec. Mishra, A. SCCM Administration and Automation: What's difference between Security Patch, HotFix and Service Pack? Mishra, Atul. 'SCCM Administration And Automation: What's Difference Between Security Patch, Hotfix And Service Pack?'. Systemcentersupport.blogspot.com. N. p., 2010. Web. 11 Dec. 2014. Csun.edu Computer Virus -Anti Virus Software- Csun.edu,. 'Computer Virus -Anti Virus Software-'. N. p., 2014. Web. 11 Dec. Whatis.techtarget.com Whatis.techtarget.com,. 'What Is Learning Guide: Spyware? - Definition From Whatis.Com'. N. p., 2014. Web. 11 Dec. Kaspersky Lab United States Kaspersky Personal & Family Security Software Kaspersky Lab United States,. 'Kaspersky Personal & Family Security Software'. N. p., 2014. Web. 11 Dec. 2014. Testout.com Sections: 9.1.6 Windows Utilities Facts, 5.10.3 Disk Optimization Facts, 9.7 Updates. Testout.com,. ' Online IT Certification And Certification Training | Testout | Labsim '. N. p., 2014. Web. 11 Dec. 2014. Pictures. Freepik Download millions of FREE vectors, photos and PSD Freepik,. 'Download Millions Of FREE Vectors, Photos And PSD'. N. p., 2014. Web. 11 Dec. 2014.