Previous Table of Contents Next


Passwords are used as part of menu programs. A popular menu program is Direct Access by Symantec. Neither CMOS nor menu programs track who uses the computer or what programs they use. These programs are simple, and once a hacker is past the password, there is access to the computer. They can also be bypassed by using a boot or startup disk.

A password can be applied to certain documents. These passwords are only useful within the program in which they were created. Other software programs can access them.

For complete protection, high-end security programs can prevent almost anyone from accessing a computer. Some programs that offer complete PC protection are Symantec’s Disk Lock, Watch Dog, Fischer International, and Security Guardian. These programs have password and program usage tracking that is usually found on large corporate computers. They even have the capability of preventing boot disk starts. Security Guardian tracks users in Windows 3.0 or newer versions and locks up the computer when not in use after a few minutes. Neither of these features are currently available in Watch Dog.

Windows ’95

Windows ’95 comes with no antivirus or security programs. Proper antivirus protection is available through such Windows ’95 programs as Norton Antivirus and Mac Afee. Other programs have difficulty being recognized by Windows ’95.There are no security programs specifically designed for Windows ’95. Current software will only prevent access to the computer, but not within windows.

GENERAL BACKUPS

In the instances of power surges and viruses, adequate precautions need to be taken to protect users’ most valuable commodity — creativity. Computer software programs for accounting, word processing, and contact managers are only shells to put the information in. That information or data input is different and unique in each instance. When it is lost, the inspiration involved in creating it is also lost. The data can always be reentered, but it will not be done in the same way, with the same concentration or enthusiasm. More likely it will be stressful, frustrating, tiring, time-consuming, and expensive for the user.

Before doing a backup to disk or tape, a disk-scanning defragmentation utility should be used to ensure the integrity of the hard drive and files. Fragmented files and bad sections of the hard drive will hinder backup performance and may prevent data recovery later.

External Drives

External drives, tape or disk, come with their own software. These tape drives connect to the parallel port of the computer, thus making them portable. The cost for these drives is 35% higher than that of internal drives. Syquest and Iomega have developed external small computer system interface (SCSI) drives with a storage capacity of 100M bytes or more per cartridge (available from Syquest) and disk (available from Iomega).

The Syquest EZ drives transfer the data almost as fast as a regular internal drive. The drives only come with a 25-serial male-to-SCSI cable, which is not useful for notebook computers. An extra 25-pin parallel-to-SCSI cable will need to be purchased from either Syquest or Adaptec for notebook and desktop computer use.

Although the Syquest EZ drives have a storage capacity of 135M bytes or more, the Iomega Zip drives store only 100M bytes of data — but use floptical technology. Floptical drives use laser optics to read and write data. The disks are re-writable but do not suffer from magnetic disturbances. Data transfer for the Zip drive is slower than the EZ drive, but comes with a 25-pin parallel-to-SCSI cable.

PC and network versions of such programs as Norton Utilities, PC Tools (both by Symantic), and Fast Back will back up to disk or internal tape drives and may be adequate.

Data Recovery Centers

IBM Corp. has data recovery centers in the U.S. and Canada that allow organizations to restore data lost in either a man-made or natural disaster. Equipment and support is available around the clock. However, use of these facilities is expensive.

Tips for Users

Whether the information is being backed up to disk, tape, optical disc, an external drive, a network, or another computer, the method should be consistent. This helps avoid any confusion when data recovery is needed.

A program should be developed for the user to perform on a regular basis. First-time users should do backups daily for three weeks to get into the routine of knowing what to do and where the backup data is in case of emergencies.

Users should be discouraged from compressing their hard drives. Compressed drives have slower read-write times and a higher instance of data loss. Backup time increases when a hard drive is compressed. There many even be problems doing a backup with a compressed drive, especially on an external tape drive.

With the size of hard drives increasing and the prices decreasing, there should be no need to compress a drive. Iomega has developed an internal tape drive that will backup to 3.2G bytes of data per tape. Traditionally, only SCSI internal tape drives had this capability. A SCSI drive transfers data at faster rates than IDE drives.

BACKING UP PDAS

Notebooks are usually backed up to disk or tape with standard backup programs. PDAs are completely different.

Uploading or downloading from a PDAs to or from a PC notebook is not as easy as the manufacturer says. Most PDAs upload data in text format only, which must then be imported into another program. Downloading follows the reverse procedure — convert to text, export, and download. This is not bad for word processors or spreadsheets, but is difficult for contact managers.

Contact managers are database programs that PDAs cannot recognize. When converting from a text file to a database file, the data fields are not recognized in the same way. The same is true for converting a database file to a text file. The two devices do not speak the same language.

Data Transfers

A contact manager is used to store names, telephone numbers, notes, letters, and appointments. While on the road, users should be able to enter information into their PDA and then connect with the office to update the information on their computer there. Instead of one file merging and updating the other, the incoming file overwrites the existing file. Without the merging or “hot sinking” of data, the advantage of having a contact manager on a PDAs is wasted.

This problem is, however, being changed slowly. Apple’s Newton and Hewlett-Packard’s Omni Go 100 are PDAs that are a step toward merged data transfers.


Previous Table of Contents Next

Copyright © CRC Press LLC