SlideShare a Scribd company logo
1
1PROTECTING YOUR
COMPUTER
Presented by
Muhammad Zameer Athar
Roll no:3022
Bs(IT)Evening
University of Education Lahore
(Okara Campus)
Overview 2
 The Basics of protection:
 Placement of your computer
 Powering your computer
 Heat, your computer’s worst enemy
 Caring for your computer & Physical damage
 Protecting your computer against:
 Data Loss
 Viruses
 Hackers
 Spam
 Theft
Placement of your Computer 3
 Your computer is composed of many sensitive parts. In placing your computer
you should avoid locations that would put your computer at risk of:
 Falling or Tipping over
 Having things fall on them
 Having things spill on them
 Being exposed to moisture
 Being exposed to excessive dust
Your computer’s hard drive is extremely sensitive to shock, this includes any
bumps, thuds or large vibrations that your computer may experience. Large, or
even small repeated shocks can lead to data loss or complete hard disk failure.
In addition moisture damages the electrical components inside of your computer
and can lead to short circuits and component failure.
Hard Drives are EXTREMELY 4
Sensitive!
Powering your computer 5
 A clean, steady power source is essential to stable computer
operation. Your computer’s power supply has specific operating
voltages that it must maintain in order for your computer to operate.
 Power surges or spikes are deadly to unprotected computers (and
all electronics) because they supply electrical components with
voltages that are too high, literally frying them.
 To protect your computer against power surges and to ensure that
your computer has a clean and steady power source:
 Plug your computer into a surge protector or UPS
Belkin (ww.Belkin.com) and APC (www.APC.com) make
excellent ones that you can purchase from the bookstore.
 If possible avoid plugging your computer into an outlet with other
large equipment such as air conditioners, refrigerators, or high
wattage lights.
Heat: Your computer’s worst 6
enemy
 As computer get faster, their components get hotter. Some
hard drives and processors produce enough heat to burn you if
you were to touch them. And that much heat is just as bad for a
computer as it is for you.
Computers use fans to cool their components. These fans
draw in the cooler outside air and circulate it throughout the
case. But along with the cooler air comes dust. Dust is
notorious for getting into the fan’s ball bearings, and once the
dust mixes with the lubricants it forms a near solid and causes
the fan to stop spinning.
Heat: Your computer’s enemy 7
enemy
Once the fan stops spinning your computer’s components
begin to over-heat. Eventually your computer will lock up as it
reaches a temperature that is beyond its operating range, and if it is
not shut down and continues to heat permanent damage will be
done to your hardware. The computer’s hard disk and processor
are the components that are most vulnerable to over-heating.
 To protect your computer from over-heating:
 Periodically vacuum or blow out your desktop computer
 Periodically clean any dust filters or install them if none exist
 Whenever possible place your computer in a cool room
 Set your computer’s hard drive to turn off after a specified period of
inactivity
 Turn off your computer, or set it to go to stand-by mode when it is not in
use
Heat: Your computer’s worst 8
enemy
Cleaning Your Computer 9
 Many people don’t clean their computer simply because they don’t know
how. However, failure to clean your computer is the cause for most
hardware failures. Here are a few ways to keep your computer clean:
 Keep the room that your computer is in clean because any dirt and dust that
accumulates in the room will eventually make its way inside your computer.
 Desktops: Unplug your computer and remove the side panel, then use a can
of compressed air to blow out your computer. A small vacuum will also work
for this. Also blow out your keyboard and any other visible dust.
 Laptops: Locate the air vents on your laptop, these are generally on the side
towards the rear, and use a can of compressed air to blow out the inside of
your laptop. You can also blow out the keyboard
 To clean your monitor or LCD flat panel, turn it off, then use a soft damp
cloth to wipe it clean (special CRT or LCD cleaners are also available), then
use another soft dry cloth to dry the screen. Turn it back on and you’re
done.
Note: compressed air can be purchased at the campus bookstore, or anywhere computer
supplies are sold.
Cleaning Your Computer 10
Protecting against Data Loss 11
 You’ve all known someone that has “lost everything!” Data loss is
one of a computer users worst nightmare's, and can be prevented,
or at least made tolerable by taking a few steps. To avoid losing
your valuable data:
 Keep your computer clean and cool by following the previous steps.
This will ensure that it won’t over-heat, Which is one of the leading
causes of hard disk failure.
 Keep backups, there are a variety of cheap backup mediums today.
CDR’s or DVD-R’s are one of the most cost effective methods of backing
up large amounts of data. Zip drives & Jazz drives are also popular
methods of backing up data onto disks.
 Save your work often. Or better yet set the Autosave feature in
Microsoft Word to 2 or 3 minutes. This can be found under
ToolsOptionsSave for PC and under EditPreferencesSave for
Macs.
Protecting against data loss 12
Protecting Against Viruses 13
 Computer viruses are no longer something you hear about but no
one ever gets. They are real and can circle the globe in a matter
of hours. To help prevent your computer against Viruses
infection:
 Run a reliable anti-virus program. Norton Antivirus &
MacAfee Antivirus are excellent programs. Stanford Provides
the latest versions of Norton for free download on the
essential software download page (ess.stanford.edu)
 Configure your Antivirus program to scan for viruses at least
once a week. This will require you to create a new scheduled
scan and will differ slightly for each Antivirus program.
 Configure your Antivirus program to automatically download
the latest virus definitions.
 Delete, and do not open any emails or attachments from
unknown sources.
Protecting Against Hackers 14
 Unfortunately hacking has become a real concern in today’s society.
Last year at least 4 students on campus had their hard disks
erased after at the hands of hackers. To protect your computer
against hackers here are a few things you can do:
 Set a good password on your computer (one that is not easily
guessable)
 Disable any networking features that you are not using, such as:
file & print sharing
 Keep your OS up to date: http://windowsupdate.microsoft.com
 Run a personal firewall such as:
 Black Ice (http://blackice.iss.net/index.php)
 Lockdown 2000 (http://www.lockdowncorp.com)
 Zone Alarm (http://www.zonealarm.com)
 Outpost Firewall (http://www.outpostfirewall.com)
OS Updates 15
Firewalls 16
Protecting Against Spam 17
 Junk email, we all get it, but how do you stop it… Well the
answer is you don’t. Once you’re on a list, its virtually
impossible to get yourself off. But you can prevent yourself
from getting on the list in the first place. Here’s how:
 Delete spam as soon as you receive it, don’t reply to the message in an
attempt to get yourself removed. When you reply it lets them know that
there is a real person on the other end and that their advertisement is
reaching people.
 Set your cookie security level. For PC’s run IE 6 and set your cookie
privacy to medium high
 Do not install shareware, nothing in this world is truly free, shareware is
loaded with spyware that tracks your internet usage and sends you
targeted advertising!
 Download and install a spyware removal tool such as:
 Spy Sweeper 3.0 (http://ess.stanford.edu)
 AdAware (http://www.lavasoftusa.com)
Spyware Removal Tools 18
Protecting Against Theft 19
 There’s no point in taking all of the above steps if you don’t have
a computer to implement them on. Here are a few tips to ensure
that your computer, stays remains YOUR computer:
 Always lock your door, especially during parties or times when large groups
of non-Murray residents are present. Laptops are easy prey for someone
poking their head in your room.
 At the airport, never take your eye off of you baggage as it goes through the
X-ray machine. Laptop bags are easy to spot, and its easy for someone to
“mistakenly” pick up your laptop while your busy emptying your pockets of all
of your change…
 Purchase a security cable for you laptop or flat panel display. Virtually all
laptops manufactured in the last 4 or 5 years include a security port that is
compatible with a security cable. Cables can be purchased from Fry’s
electronics or online for about $15-30
 Belkin (http://www.belkin.com)
 Kensington (http://kensington.com/)

More Related Content

What's hot

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
Buffalo Seminary
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or Laptop
SOBXTECH
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
Mukul Kumar
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
BikashPayeng
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
amiable_indian
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
PEC
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Sarhad Baez
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
HayWhitfield72
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Sowmya
SowmyaSowmya
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
Khalil Jubran
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
mariagoel7
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Adeel Younas
 
Computer Security
Computer SecurityComputer Security
Computer Security
secrettub
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
Abrish06
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
Hybrid IT Solutions
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
nicamos
 

What's hot (20)

Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Protecting Your PC or Laptop
Protecting Your PC or LaptopProtecting Your PC or Laptop
Protecting Your PC or Laptop
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
avast 7.0.1474 license key
avast 7.0.1474 license keyavast 7.0.1474 license key
avast 7.0.1474 license key
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Sowmya
SowmyaSowmya
Sowmya
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Internet PC Security by Khalil Jubran Mindspring Networks
Internet PC Security  by Khalil Jubran  Mindspring Networks  Internet PC Security  by Khalil Jubran  Mindspring Networks
Internet PC Security by Khalil Jubran Mindspring Networks
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
Malware
MalwareMalware
Malware
 
10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security10 ways to_increase_your_computer_security
10 ways to_increase_your_computer_security
 
Computer security
Computer securityComputer security
Computer security
 
Vocabulary link: Computer Science
Vocabulary  link: Computer ScienceVocabulary  link: Computer Science
Vocabulary link: Computer Science
 

Viewers also liked

Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
norzaini
 
Introduction to Reading Comprehension
Introduction to Reading ComprehensionIntroduction to Reading Comprehension
Introduction to Reading Comprehension
missfifit
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and ports
Melchor Balolong
 
Lesson 3 Basic Parts Of The Computer
Lesson 3   Basic Parts Of The ComputerLesson 3   Basic Parts Of The Computer
Lesson 3 Basic Parts Of The Computer
guevarra_2000
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
mite6025.hku
 
Simple present tense
Simple present tenseSimple present tense
Simple present tense
iraidahj
 
Internal pc components v2
Internal pc components v2Internal pc components v2
Internal pc components v2
tomrussso
 
Internal parts
Internal partsInternal parts
Internal parts
sankarsrivatsa
 
Future tense.
Future tense.Future tense.
Future tense.
China Gaete Moreno
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
OriginalGSM
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
OriginalGSM
 
Future tense
Future tenseFuture tense
Future tense
English TVTC
 
computer Hardware components
computer  Hardware componentscomputer  Hardware components
computer Hardware components
Thea Vstr
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1
Coky Fauzi Alfi
 
Internal PC Components explained
Internal PC Components explainedInternal PC Components explained
Internal PC Components explained
tomrussso
 
Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)
smkhan
 
Future tense
Future tenseFuture tense
Future tense
Asra Qadeer
 
Future tense
Future tenseFuture tense
Future tense
guerina3
 
Computers7 Ch4 2
Computers7 Ch4 2Computers7 Ch4 2
Computers7 Ch4 2
miuitprofessor
 
Components of a PC
Components of a PCComponents of a PC
Components of a PC
avilab
 

Viewers also liked (20)

Protecting Your Computer
Protecting Your ComputerProtecting Your Computer
Protecting Your Computer
 
Introduction to Reading Comprehension
Introduction to Reading ComprehensionIntroduction to Reading Comprehension
Introduction to Reading Comprehension
 
02 computer parts and ports
02 computer parts  and ports02 computer parts  and ports
02 computer parts and ports
 
Lesson 3 Basic Parts Of The Computer
Lesson 3   Basic Parts Of The ComputerLesson 3   Basic Parts Of The Computer
Lesson 3 Basic Parts Of The Computer
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Simple present tense
Simple present tenseSimple present tense
Simple present tense
 
Internal pc components v2
Internal pc components v2Internal pc components v2
Internal pc components v2
 
Internal parts
Internal partsInternal parts
Internal parts
 
Future tense.
Future tense.Future tense.
Future tense.
 
Building a computer in virtual desktop.
Building a computer in virtual desktop.Building a computer in virtual desktop.
Building a computer in virtual desktop.
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
 
Future tense
Future tenseFuture tense
Future tense
 
computer Hardware components
computer  Hardware componentscomputer  Hardware components
computer Hardware components
 
Computer Hardware-Part 1
Computer Hardware-Part 1Computer Hardware-Part 1
Computer Hardware-Part 1
 
Internal PC Components explained
Internal PC Components explainedInternal PC Components explained
Internal PC Components explained
 
Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)Memory(RAM ROM FLASH MEMORY)
Memory(RAM ROM FLASH MEMORY)
 
Future tense
Future tenseFuture tense
Future tense
 
Future tense
Future tenseFuture tense
Future tense
 
Computers7 Ch4 2
Computers7 Ch4 2Computers7 Ch4 2
Computers7 Ch4 2
 
Components of a PC
Components of a PCComponents of a PC
Components of a PC
 

Similar to Protecting Your Computer

HOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCEHOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCE
PrinceFullyL
 
Grade 8 COMPUTER
Grade 8 COMPUTERGrade 8 COMPUTER
Grade 8 COMPUTER
Joel Linquico
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Celia Bandelier
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computers
Jean Ulpindo
 
Preventive maintenance guide
Preventive maintenance guidePreventive maintenance guide
Preventive maintenance guide
Is Wan
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tips
ar-rifke.com
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
lorbz
 
It280-Final Project
It280-Final ProjectIt280-Final Project
It280-Final Project
Jason Buening
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
Rob Clement
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
ChandniK7
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
Leah Gonzales
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
Khan Yousafzai
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
heidirobison
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
Cyber Security Infotech
 
Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...
  Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...  Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...
Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...
manualsheet
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
Christine Domingo
 
The complete-guide-to-home-computer-maintenance
The complete-guide-to-home-computer-maintenanceThe complete-guide-to-home-computer-maintenance
The complete-guide-to-home-computer-maintenance
eyob eshetu
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
Danladi Gambo
 
Pcmaintenance2
Pcmaintenance2Pcmaintenance2
Pcmaintenance2
Saifuladli Yusoff
 

Similar to Protecting Your Computer (20)

HOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCEHOME COMPUTER MAINTENANCE
HOME COMPUTER MAINTENANCE
 
Grade 8 COMPUTER
Grade 8 COMPUTERGrade 8 COMPUTER
Grade 8 COMPUTER
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Taking care of your computers
Taking care of your computersTaking care of your computers
Taking care of your computers
 
Preventive maintenance guide
Preventive maintenance guidePreventive maintenance guide
Preventive maintenance guide
 
3 summer computer tips
3 summer computer tips3 summer computer tips
3 summer computer tips
 
lesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handoutslesson 3; inspect and test the configured cs and network handouts
lesson 3; inspect and test the configured cs and network handouts
 
It280-Final Project
It280-Final ProjectIt280-Final Project
It280-Final Project
 
Keep Your Computers Safe And Secure
Keep Your Computers Safe And SecureKeep Your Computers Safe And Secure
Keep Your Computers Safe And Secure
 
Basic Computer Skills.pptx
Basic Computer Skills.pptxBasic Computer Skills.pptx
Basic Computer Skills.pptx
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Basic computer and RAM troubleshooting
Basic computer and RAM troubleshootingBasic computer and RAM troubleshooting
Basic computer and RAM troubleshooting
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Trouble shooting a computer
Trouble shooting a computerTrouble shooting a computer
Trouble shooting a computer
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...
  Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...  Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...
Acer Aspire Switch 10 Laptop - SW5-015-12KL manual PDF download (English) /...
 
Computer Problems
Computer ProblemsComputer Problems
Computer Problems
 
The complete-guide-to-home-computer-maintenance
The complete-guide-to-home-computer-maintenanceThe complete-guide-to-home-computer-maintenance
The complete-guide-to-home-computer-maintenance
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Pcmaintenance2
Pcmaintenance2Pcmaintenance2
Pcmaintenance2
 

More from university of education,Lahore

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
university of education,Lahore
 
Steganography
SteganographySteganography
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
university of education,Lahore
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
university of education,Lahore
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
university of education,Lahore
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
university of education,Lahore
 
ePayment Methods
ePayment MethodsePayment Methods
SEO
SEOSEO
A Star Search
A Star SearchA Star Search
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
university of education,Lahore
 
Uml Diagrams
Uml DiagramsUml Diagrams
eDras Max
eDras MaxeDras Max
RAD Model
RAD ModelRAD Model
Microsoft Project
Microsoft ProjectMicrosoft Project
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
university of education,Lahore
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
university of education,Lahore
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
university of education,Lahore
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
university of education,Lahore
 

More from university of education,Lahore (20)

Activites and Time Planning
 Activites and Time Planning Activites and Time Planning
Activites and Time Planning
 
Steganography
SteganographySteganography
Steganography
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
Activites and Time Planning
Activites and Time PlanningActivites and Time Planning
Activites and Time Planning
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Network Security Terminologies
Network Security TerminologiesNetwork Security Terminologies
Network Security Terminologies
 
Project Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk ManagementProject Scheduling, Planning and Risk Management
Project Scheduling, Planning and Risk Management
 
Software Testing and Debugging
Software Testing and DebuggingSoftware Testing and Debugging
Software Testing and Debugging
 
ePayment Methods
ePayment MethodsePayment Methods
ePayment Methods
 
SEO
SEOSEO
SEO
 
A Star Search
A Star SearchA Star Search
A Star Search
 
Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Uml Diagrams
Uml DiagramsUml Diagrams
Uml Diagrams
 
eDras Max
eDras MaxeDras Max
eDras Max
 
RAD Model
RAD ModelRAD Model
RAD Model
 
Microsoft Project
Microsoft ProjectMicrosoft Project
Microsoft Project
 
Itertaive Process Development
Itertaive Process DevelopmentItertaive Process Development
Itertaive Process Development
 
Computer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab AwanComputer Aided Software Engineering Nayab Awan
Computer Aided Software Engineering Nayab Awan
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
system level requirements gathering and analysis
system level requirements gathering and analysissystem level requirements gathering and analysis
system level requirements gathering and analysis
 

Recently uploaded

MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 

Recently uploaded (20)

MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 

Protecting Your Computer

  • 1. 1 1PROTECTING YOUR COMPUTER Presented by Muhammad Zameer Athar Roll no:3022 Bs(IT)Evening University of Education Lahore (Okara Campus)
  • 2. Overview 2  The Basics of protection:  Placement of your computer  Powering your computer  Heat, your computer’s worst enemy  Caring for your computer & Physical damage  Protecting your computer against:  Data Loss  Viruses  Hackers  Spam  Theft
  • 3. Placement of your Computer 3  Your computer is composed of many sensitive parts. In placing your computer you should avoid locations that would put your computer at risk of:  Falling or Tipping over  Having things fall on them  Having things spill on them  Being exposed to moisture  Being exposed to excessive dust Your computer’s hard drive is extremely sensitive to shock, this includes any bumps, thuds or large vibrations that your computer may experience. Large, or even small repeated shocks can lead to data loss or complete hard disk failure. In addition moisture damages the electrical components inside of your computer and can lead to short circuits and component failure.
  • 4. Hard Drives are EXTREMELY 4 Sensitive!
  • 5. Powering your computer 5  A clean, steady power source is essential to stable computer operation. Your computer’s power supply has specific operating voltages that it must maintain in order for your computer to operate.  Power surges or spikes are deadly to unprotected computers (and all electronics) because they supply electrical components with voltages that are too high, literally frying them.  To protect your computer against power surges and to ensure that your computer has a clean and steady power source:  Plug your computer into a surge protector or UPS Belkin (ww.Belkin.com) and APC (www.APC.com) make excellent ones that you can purchase from the bookstore.  If possible avoid plugging your computer into an outlet with other large equipment such as air conditioners, refrigerators, or high wattage lights.
  • 6. Heat: Your computer’s worst 6 enemy  As computer get faster, their components get hotter. Some hard drives and processors produce enough heat to burn you if you were to touch them. And that much heat is just as bad for a computer as it is for you. Computers use fans to cool their components. These fans draw in the cooler outside air and circulate it throughout the case. But along with the cooler air comes dust. Dust is notorious for getting into the fan’s ball bearings, and once the dust mixes with the lubricants it forms a near solid and causes the fan to stop spinning.
  • 7. Heat: Your computer’s enemy 7 enemy Once the fan stops spinning your computer’s components begin to over-heat. Eventually your computer will lock up as it reaches a temperature that is beyond its operating range, and if it is not shut down and continues to heat permanent damage will be done to your hardware. The computer’s hard disk and processor are the components that are most vulnerable to over-heating.  To protect your computer from over-heating:  Periodically vacuum or blow out your desktop computer  Periodically clean any dust filters or install them if none exist  Whenever possible place your computer in a cool room  Set your computer’s hard drive to turn off after a specified period of inactivity  Turn off your computer, or set it to go to stand-by mode when it is not in use
  • 8. Heat: Your computer’s worst 8 enemy
  • 9. Cleaning Your Computer 9  Many people don’t clean their computer simply because they don’t know how. However, failure to clean your computer is the cause for most hardware failures. Here are a few ways to keep your computer clean:  Keep the room that your computer is in clean because any dirt and dust that accumulates in the room will eventually make its way inside your computer.  Desktops: Unplug your computer and remove the side panel, then use a can of compressed air to blow out your computer. A small vacuum will also work for this. Also blow out your keyboard and any other visible dust.  Laptops: Locate the air vents on your laptop, these are generally on the side towards the rear, and use a can of compressed air to blow out the inside of your laptop. You can also blow out the keyboard  To clean your monitor or LCD flat panel, turn it off, then use a soft damp cloth to wipe it clean (special CRT or LCD cleaners are also available), then use another soft dry cloth to dry the screen. Turn it back on and you’re done. Note: compressed air can be purchased at the campus bookstore, or anywhere computer supplies are sold.
  • 11. Protecting against Data Loss 11  You’ve all known someone that has “lost everything!” Data loss is one of a computer users worst nightmare's, and can be prevented, or at least made tolerable by taking a few steps. To avoid losing your valuable data:  Keep your computer clean and cool by following the previous steps. This will ensure that it won’t over-heat, Which is one of the leading causes of hard disk failure.  Keep backups, there are a variety of cheap backup mediums today. CDR’s or DVD-R’s are one of the most cost effective methods of backing up large amounts of data. Zip drives & Jazz drives are also popular methods of backing up data onto disks.  Save your work often. Or better yet set the Autosave feature in Microsoft Word to 2 or 3 minutes. This can be found under ToolsOptionsSave for PC and under EditPreferencesSave for Macs.
  • 13. Protecting Against Viruses 13  Computer viruses are no longer something you hear about but no one ever gets. They are real and can circle the globe in a matter of hours. To help prevent your computer against Viruses infection:  Run a reliable anti-virus program. Norton Antivirus & MacAfee Antivirus are excellent programs. Stanford Provides the latest versions of Norton for free download on the essential software download page (ess.stanford.edu)  Configure your Antivirus program to scan for viruses at least once a week. This will require you to create a new scheduled scan and will differ slightly for each Antivirus program.  Configure your Antivirus program to automatically download the latest virus definitions.  Delete, and do not open any emails or attachments from unknown sources.
  • 14. Protecting Against Hackers 14  Unfortunately hacking has become a real concern in today’s society. Last year at least 4 students on campus had their hard disks erased after at the hands of hackers. To protect your computer against hackers here are a few things you can do:  Set a good password on your computer (one that is not easily guessable)  Disable any networking features that you are not using, such as: file & print sharing  Keep your OS up to date: http://windowsupdate.microsoft.com  Run a personal firewall such as:  Black Ice (http://blackice.iss.net/index.php)  Lockdown 2000 (http://www.lockdowncorp.com)  Zone Alarm (http://www.zonealarm.com)  Outpost Firewall (http://www.outpostfirewall.com)
  • 17. Protecting Against Spam 17  Junk email, we all get it, but how do you stop it… Well the answer is you don’t. Once you’re on a list, its virtually impossible to get yourself off. But you can prevent yourself from getting on the list in the first place. Here’s how:  Delete spam as soon as you receive it, don’t reply to the message in an attempt to get yourself removed. When you reply it lets them know that there is a real person on the other end and that their advertisement is reaching people.  Set your cookie security level. For PC’s run IE 6 and set your cookie privacy to medium high  Do not install shareware, nothing in this world is truly free, shareware is loaded with spyware that tracks your internet usage and sends you targeted advertising!  Download and install a spyware removal tool such as:  Spy Sweeper 3.0 (http://ess.stanford.edu)  AdAware (http://www.lavasoftusa.com)
  • 19. Protecting Against Theft 19  There’s no point in taking all of the above steps if you don’t have a computer to implement them on. Here are a few tips to ensure that your computer, stays remains YOUR computer:  Always lock your door, especially during parties or times when large groups of non-Murray residents are present. Laptops are easy prey for someone poking their head in your room.  At the airport, never take your eye off of you baggage as it goes through the X-ray machine. Laptop bags are easy to spot, and its easy for someone to “mistakenly” pick up your laptop while your busy emptying your pockets of all of your change…  Purchase a security cable for you laptop or flat panel display. Virtually all laptops manufactured in the last 4 or 5 years include a security port that is compatible with a security cable. Cables can be purchased from Fry’s electronics or online for about $15-30  Belkin (http://www.belkin.com)  Kensington (http://kensington.com/)