• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Protection and Maintainance Report

Extracts from this document...

Introduction

To: bigboss From: nmsmith Subject: Utility Softwares Dear Big Boss I hope you have received the machine in good working order. Now that you have the machines, there are several pieces of 'Utility Software' that should be installed on your machine in order to assist with the smooth running and protection of the machine. There are four main categories for this Protection Virus To protect the computer from malicious software that can break the machine. Firewall To prevent hackers and malicious programs making internet connections for bad purposes. Clean-up tools These provide no protection; however they remove unnecessary files and registry entries. They can also remove spy ware sometimes. Disk Formatting These tools are useful only when formatting the disk drive. This doesn't normally need to be done, unless there is a severe problem with the OS. There are several programs that fit in each category, and there are advantages and disadvantages to each application. These can include Cost, Resource Footprint and usability. ...read more.

Middle

10/10 2. Inbound Protection Only 4/10 3. Minimal Interface- set and forget style (with occasional alerts) 4/10 4. LOW power foot print 9/10 Total Score 27/40 The windows firewall is an effective and quite protective measure for securing a windows machine although it only has INBOUND protection, so if a virus is transmitting bad data, the WINDOWS firewall will not protect you. ZoneAlarm Firewall 1. The Free Version is FREE (although a pro version can be bought) 10/10 2. Inbound + Outbound Protection Alerts for each program 9/10 3. Complicated, but comprehensive interface (STOP BUTTON) 6/10 4. HIGH power footprint 4/10 Total Score 29/40 Zone Alarm- Firewall Specialists for a long time. Will protect both ways and will request permissions for every program it does not recognise. I highly recommend this software as it provides strong and reliable protection. Clean Up Tools Registry Doctor 1. This software costs money (�17.50) 3/10 2. This software fixes registry errors, backs up the system, and adjusts the registry for speed. ...read more.

Conclusion

Windows formatting tool 1. This software is free with windows. 8/10 2. The software will perform a high level software format. 5/10 3. You can only format a drive that windows isn't using. 3/10 4. You can format a drive to any FS type provided the disk supports it. 7/10 Total Score 23/40 Windows formatting tool isn't very powerful, is noisy if formatting a hard drive, and is very slow. Although if doing a quick format it will be a bit quicker. You can use your OS, but incredibly slowly. Conclusion Based on the above statistics I would recommend this software: * NOD32 Anti Virus * Zone-Alarm PRO Firewall * QuickSys Reg De-Frag * DBAN - Boot and Nuke I have done my best to always provide a free alternative, but it will not always be the best option. You should make your own decision based, on the facts above, and the software manufacturer's website. I put my faith into EVERY product I have mentioned. I hope this email will help you to decide what you need to use to make the computer you will shortly be receiving, the best machine for miles around!. Best Regards Nick ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Smart Card System

    Log In Authentication Once the smart card has been verified, this feature will be appeared. In this feature, it allows the user to enter his or her user name, password and the domain of the user. After that, the system will verify all the data entered by the user.

  2. Ways of Promoting a Website

    and facts are on view and in turn will possibly result in my website getting repeat business. Is your Site Fully Functional? It is always important to determine whether the websites links are functioning correctly, especially when you consider the layout of mine.

  1. Hardware and Software

    Xara Xtreme is a fast yet powerful vector-based drawing and illustration program for Windows. 2. Includes a Picture Editor where you can crop, rotate, enhance and sharpen bitmap-based photos. 3. Suitable for Web graphics, illustration, technical drawing, animation, cartooning, and compositions.

  2. You need to discuss the advantages and disadvantages of someone in your

    is where the computer temporarily stores data on its way to or from the processor. Named for its role, random access memory allows you to perform random acts, such as launching an application or making changes to a file, with the speed you demand.

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    The type of data retrieved by these programs includes, the users internet surfing habits, online purchases and even keystrokes such as passwords. The programs may even change the computers setting and functionality. Anti-spyware software seeks to block and remove such programs.

  2. Firewall Protection

    When they get instructions from the remote program, they act accordingly, and thus let the user of the remote program to execute commands on the victim's computer. To name a few famous RATs, the most common are Netbus, Back-Orifice, and SubSeven (which is also known as Backdoor-G).

  1. Flexible Architectures in Communication Security Application

    each application of the cipher kernel, the number of rounds executed within the cipher kernel, the author of the algorithm, and popular applications that use the cipher. Cipher algorithms typically have three operational parameters: key size, block size, and number of rounds.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The organisation is not a large-scale operation and at present the client owns just one apartment but is looking to expand into the property rental market which is set to grow in Bulgaria and additional residencies will be required to meet demands.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work