• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Protection and Maintainance Report

Extracts from this document...


To: bigboss From: nmsmith Subject: Utility Softwares Dear Big Boss I hope you have received the machine in good working order. Now that you have the machines, there are several pieces of 'Utility Software' that should be installed on your machine in order to assist with the smooth running and protection of the machine. There are four main categories for this Protection Virus To protect the computer from malicious software that can break the machine. Firewall To prevent hackers and malicious programs making internet connections for bad purposes. Clean-up tools These provide no protection; however they remove unnecessary files and registry entries. They can also remove spy ware sometimes. Disk Formatting These tools are useful only when formatting the disk drive. This doesn't normally need to be done, unless there is a severe problem with the OS. There are several programs that fit in each category, and there are advantages and disadvantages to each application. These can include Cost, Resource Footprint and usability. ...read more.


10/10 2. Inbound Protection Only 4/10 3. Minimal Interface- set and forget style (with occasional alerts) 4/10 4. LOW power foot print 9/10 Total Score 27/40 The windows firewall is an effective and quite protective measure for securing a windows machine although it only has INBOUND protection, so if a virus is transmitting bad data, the WINDOWS firewall will not protect you. ZoneAlarm Firewall 1. The Free Version is FREE (although a pro version can be bought) 10/10 2. Inbound + Outbound Protection Alerts for each program 9/10 3. Complicated, but comprehensive interface (STOP BUTTON) 6/10 4. HIGH power footprint 4/10 Total Score 29/40 Zone Alarm- Firewall Specialists for a long time. Will protect both ways and will request permissions for every program it does not recognise. I highly recommend this software as it provides strong and reliable protection. Clean Up Tools Registry Doctor 1. This software costs money (�17.50) 3/10 2. This software fixes registry errors, backs up the system, and adjusts the registry for speed. ...read more.


Windows formatting tool 1. This software is free with windows. 8/10 2. The software will perform a high level software format. 5/10 3. You can only format a drive that windows isn't using. 3/10 4. You can format a drive to any FS type provided the disk supports it. 7/10 Total Score 23/40 Windows formatting tool isn't very powerful, is noisy if formatting a hard drive, and is very slow. Although if doing a quick format it will be a bit quicker. You can use your OS, but incredibly slowly. Conclusion Based on the above statistics I would recommend this software: * NOD32 Anti Virus * Zone-Alarm PRO Firewall * QuickSys Reg De-Frag * DBAN - Boot and Nuke I have done my best to always provide a free alternative, but it will not always be the best option. You should make your own decision based, on the facts above, and the software manufacturer's website. I put my faith into EVERY product I have mentioned. I hope this email will help you to decide what you need to use to make the computer you will shortly be receiving, the best machine for miles around!. Best Regards Nick ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Hardware and Software

    There is tool which can make people look thinner than they really are. What it actually does is make a sort of digital pleat in the picture so that anybody under the cursor looks a little bit thinner, but the rest of the picture, including anybody unfortunate enough to be

  2. Smart Card System

    One of the steps in doing this is using the Java header file generator, javah. 5.2.6 Javadoc The programmers fought that it in every way possible. Unfortunately, there is no longer any excuse for not documenting the source code.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The booking process is now completed. Where email and letters are applicable templates are used. Emails will usually include an attachment of a word processed letter. Disadvantages of current system Using a mainly paper based system has many downsides for my client.

  2. Creating a computer system for Wooten Basset Rugby Club

    The letter represents the age group, as this letter only deals with one age group each membership code will have the letter, E. For example, 001E Name - Christian and Surname only Parent - Store parent's name for contact details.

  1. Identify the constituent parts of a total computer system.

    They can also be used with OCR (Optical Character Recognition) software to scan in text. Touch screen A touch screen is a special type of VDU, which has a grid of light beams or fine wires criss-crossing the screen. When the screen is touched (usually to choose an on-screen option), the computer senses where you have pressed.

  2. You need to discuss the advantages and disadvantages of someone in your

    It also has the ability to keep my system well organised in tables and under suitable field names, queries can be run to search for data that satisfies certain criteria that are set by the user.

  1. The Data Protection Act

    compensation and correction and erasure. 4 No organisation rights - The granting of rights is limited to individuals. 5 Registration - A register open to public inspection will contain details concerning data users and computer bureau operators 6 Public & Private Sectors - The registration obligations fall on data users

  2. Flexible Architectures in Communication Security Application

    output[2] = IV[0] = x[0] � key[2]; output[3] = IV[0] = x[1] � key[3]; Figure 3. The Twofish Cipher Kernel. All variables are 32-bit integers. Rotates are indicated by <<< and >>>. Lisa Wu Page 14 4/22/01 a random perturbation of each output bit with probability 50%.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work