• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Protection and Maintainance Report

Extracts from this document...

Introduction

To: bigboss From: nmsmith Subject: Utility Softwares Dear Big Boss I hope you have received the machine in good working order. Now that you have the machines, there are several pieces of 'Utility Software' that should be installed on your machine in order to assist with the smooth running and protection of the machine. There are four main categories for this Protection Virus To protect the computer from malicious software that can break the machine. Firewall To prevent hackers and malicious programs making internet connections for bad purposes. Clean-up tools These provide no protection; however they remove unnecessary files and registry entries. They can also remove spy ware sometimes. Disk Formatting These tools are useful only when formatting the disk drive. This doesn't normally need to be done, unless there is a severe problem with the OS. There are several programs that fit in each category, and there are advantages and disadvantages to each application. These can include Cost, Resource Footprint and usability. ...read more.

Middle

10/10 2. Inbound Protection Only 4/10 3. Minimal Interface- set and forget style (with occasional alerts) 4/10 4. LOW power foot print 9/10 Total Score 27/40 The windows firewall is an effective and quite protective measure for securing a windows machine although it only has INBOUND protection, so if a virus is transmitting bad data, the WINDOWS firewall will not protect you. ZoneAlarm Firewall 1. The Free Version is FREE (although a pro version can be bought) 10/10 2. Inbound + Outbound Protection Alerts for each program 9/10 3. Complicated, but comprehensive interface (STOP BUTTON) 6/10 4. HIGH power footprint 4/10 Total Score 29/40 Zone Alarm- Firewall Specialists for a long time. Will protect both ways and will request permissions for every program it does not recognise. I highly recommend this software as it provides strong and reliable protection. Clean Up Tools Registry Doctor 1. This software costs money (�17.50) 3/10 2. This software fixes registry errors, backs up the system, and adjusts the registry for speed. ...read more.

Conclusion

Windows formatting tool 1. This software is free with windows. 8/10 2. The software will perform a high level software format. 5/10 3. You can only format a drive that windows isn't using. 3/10 4. You can format a drive to any FS type provided the disk supports it. 7/10 Total Score 23/40 Windows formatting tool isn't very powerful, is noisy if formatting a hard drive, and is very slow. Although if doing a quick format it will be a bit quicker. You can use your OS, but incredibly slowly. Conclusion Based on the above statistics I would recommend this software: * NOD32 Anti Virus * Zone-Alarm PRO Firewall * QuickSys Reg De-Frag * DBAN - Boot and Nuke I have done my best to always provide a free alternative, but it will not always be the best option. You should make your own decision based, on the facts above, and the software manufacturer's website. I put my faith into EVERY product I have mentioned. I hope this email will help you to decide what you need to use to make the computer you will shortly be receiving, the best machine for miles around!. Best Regards Nick ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    This is easier for the team during the development of the project, especially to know what or how many of sub-form needed to be developed. 7.4 Problems and Solutions Encountered During Prototype a)

  2. Hardware and Software

    ** Microsoft Publisher - Create and edit newsletters, brochures, flyers, and web sites. ** Microsoft Access - Create databases and programs to track and manage information. Word, Excel, PowerPoint, Outlook, Publisher, Access, Project, InfoPath, Visio, and OneNote all work basically as they did before, only it's more easily.

  1. You need to discuss the advantages and disadvantages of someone in your

    " Explain why the PC you have found is suitable for the company and why you chose it above the alternatives. (e.g. What features does your choice have that the others do not?) " Finally explain why the choices you have made are better than the current school system you used to set up your database.

  2. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    The type of data retrieved by these programs includes, the users internet surfing habits, online purchases and even keystrokes such as passwords. The programs may even change the computers setting and functionality. Anti-spyware software seeks to block and remove such programs.

  1. Ways of Promoting a Website

    However, there are features to this which are ultimately considered undesirable to the every day user. It has been found the JavaScript language has aided computer hackers in their attempts to corrupt and miss-use computers, this is a significant problem.

  2. Firewall Protection

    When they get instructions from the remote program, they act accordingly, and thus let the user of the remote program to execute commands on the victim's computer. To name a few famous RATs, the most common are Netbus, Back-Orifice, and SubSeven (which is also known as Backdoor-G).

  1. Flexible Architectures in Communication Security Application

    Candidate Rijndael 128 128 10 Rijmen AES Standard Twofish 128 128 16 Counterpane AES Candidate Table 1. Secret-Key Symmetric Ciphers Analyzed. We analyzed the eight secret-key symmetric ciphers listed in Table 1. The table lists for each algorithm the key size used for the experiments, the block size encrypted by

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The organisation is not a large-scale operation and at present the client owns just one apartment but is looking to expand into the property rental market which is set to grow in Bulgaria and additional residencies will be required to meet demands.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work