• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Protection and Maintainance Report

Extracts from this document...


To: bigboss From: nmsmith Subject: Utility Softwares Dear Big Boss I hope you have received the machine in good working order. Now that you have the machines, there are several pieces of 'Utility Software' that should be installed on your machine in order to assist with the smooth running and protection of the machine. There are four main categories for this Protection Virus To protect the computer from malicious software that can break the machine. Firewall To prevent hackers and malicious programs making internet connections for bad purposes. Clean-up tools These provide no protection; however they remove unnecessary files and registry entries. They can also remove spy ware sometimes. Disk Formatting These tools are useful only when formatting the disk drive. This doesn't normally need to be done, unless there is a severe problem with the OS. There are several programs that fit in each category, and there are advantages and disadvantages to each application. These can include Cost, Resource Footprint and usability. ...read more.


10/10 2. Inbound Protection Only 4/10 3. Minimal Interface- set and forget style (with occasional alerts) 4/10 4. LOW power foot print 9/10 Total Score 27/40 The windows firewall is an effective and quite protective measure for securing a windows machine although it only has INBOUND protection, so if a virus is transmitting bad data, the WINDOWS firewall will not protect you. ZoneAlarm Firewall 1. The Free Version is FREE (although a pro version can be bought) 10/10 2. Inbound + Outbound Protection Alerts for each program 9/10 3. Complicated, but comprehensive interface (STOP BUTTON) 6/10 4. HIGH power footprint 4/10 Total Score 29/40 Zone Alarm- Firewall Specialists for a long time. Will protect both ways and will request permissions for every program it does not recognise. I highly recommend this software as it provides strong and reliable protection. Clean Up Tools Registry Doctor 1. This software costs money (�17.50) 3/10 2. This software fixes registry errors, backs up the system, and adjusts the registry for speed. ...read more.


Windows formatting tool 1. This software is free with windows. 8/10 2. The software will perform a high level software format. 5/10 3. You can only format a drive that windows isn't using. 3/10 4. You can format a drive to any FS type provided the disk supports it. 7/10 Total Score 23/40 Windows formatting tool isn't very powerful, is noisy if formatting a hard drive, and is very slow. Although if doing a quick format it will be a bit quicker. You can use your OS, but incredibly slowly. Conclusion Based on the above statistics I would recommend this software: * NOD32 Anti Virus * Zone-Alarm PRO Firewall * QuickSys Reg De-Frag * DBAN - Boot and Nuke I have done my best to always provide a free alternative, but it will not always be the best option. You should make your own decision based, on the facts above, and the software manufacturer's website. I put my faith into EVERY product I have mentioned. I hope this email will help you to decide what you need to use to make the computer you will shortly be receiving, the best machine for miles around!. Best Regards Nick ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    The type of data retrieved by these programs includes, the users internet surfing habits, online purchases and even keystrokes such as passwords. The programs may even change the computers setting and functionality. Anti-spyware software seeks to block and remove such programs.

  2. Ways of Promoting a Website

    as the site is based on this team Why would they be interested in your site? - They would be interested in my site as it contains up to date photos and information on the club at present and on the present players Is your site fully functional?

  1. Hardware and Software

    ** Microsoft Excel - Perform calculations, analyse information and manage lists in spreadsheets or web pages. ** Microsoft PowerPoint - Create and edit presentations for slide shows, meetings and web pages. ** Microsoft Outlook - Send and receive e-mail, manage schedules, contacts and tasks, and record activities.

  2. Firewall Protection

    When they get instructions from the remote program, they act accordingly, and thus let the user of the remote program to execute commands on the victim's computer. To name a few famous RATs, the most common are Netbus, Back-Orifice, and SubSeven (which is also known as Backdoor-G).

  1. Smart Card System

    On these routers, we should configure access lists for each network protocol configured on the router interfaces. We can configure access lists so that inbound traffic or outbound traffic or both are filtered on an interface. Access lists must be defined on a per-protocol basis.

  2. Flexible Architectures in Communication Security Application

    As shown in Figure 4, the baseline 4-wide superscalar processor model performance (4W) varied dramatically. The worst performance was given by 3DES. 3DES is computationally very complex, and it contains operations (e.g., general permutation) that do not map well to a general-purpose microprocessor.

  1. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The organisation is not a large-scale operation and at present the client owns just one apartment but is looking to expand into the property rental market which is set to grow in Bulgaria and additional residencies will be required to meet demands.

  2. Creating a computer system for Wooten Basset Rugby Club

    1.4 Data Requirements From the interview it has become apparent that I will need to store a considerable amount of data. I have divided this data into the following groups: Players, Fixtures, Rivals, Rival Players, Players-Fixtures and Rival Players-Fixtures. A primary key will be used in every case to uniquely

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work