Essential Windows Maintenance Tools and Cybersecurity Threats
Classified in Technology
Written on in
English with a size of 3.81 KB
Windows Storage Unit Maintenance Tools
Windows provides three primary tools for maintaining storage units:
- Error Checking (Check Disk)
- Defragmentation (Disk Optimizer)
- Security Copy (Backup)
Error Checking Utility
This utility scans and repairs potential disk shortcomings. It can perform two types of tests:
- Logical Level: Checks for cross-linked errors in object names and file structure.
- Physical Level: Identifies and attempts to repair bad sectors.
Defragmentation Utility
This utility reorganizes the data on the disk, moving information so that all data belonging to a single file is stored in contiguous sectors. This improves access speed and overall disk performance.
Security Copy (Backup)
This utility allows users to create backups of information for security purposes, protecting data against loss or corruption.
Understanding Windows System Restore
Windows includes a disaster recovery system called System Restore. This system functions by creating periodic restore points, or points created automatically when new programs are installed.
In the event of a system failure, System Restore allows the user to revert the system to one of these previously created restore points.
Accessing System Restore
To activate and use this service, you must start the System Restore application, typically found via the menu path: Home / Accessories / System Tools.
The application is very simple to handle thanks to its built-in wizard. Upon starting, the wizard offers the option to create a new restore point or restore your system to a previous state.
Protecting Your Computer: Security Threats
Windows operating systems have historically been subject to malicious attacks by viruses, Trojans, and spyware. This is partly because Windows is used by approximately 90% of computer users worldwide, and partly due to inherent vulnerabilities.
Operating systems based on GNU/Linux, for example, are currently less affected by these attacks. The reasons for this include:
- The inherent security of the operating system kernel.
- The restriction that users can typically only write data within their personal folders.
- It is a less commonly used operating system, making it less attractive to creators of viruses and Trojans.
Key Cybersecurity Definitions
Spyware and Phishing
Spyware (or tracking software) consists of tiny files or applications designed to surreptitiously send data from the system where they are installed, using the network connection to transmit information to an external party, often an Internet advertising company. These actions are carried out without the user's knowledge.
Phishing is a type of scam designed to steal your identity. The objective is to obtain sensitive information—such as credit card numbers, passwords, account details, or other personal data—by deception. This type of fraud is usually received via email or pop-up windows.
Trojans and Viruses
A Trojan (named after the Trojan horse) is malicious software that presents itself to the user as a legitimate, apparently harmless program, but causes damage when executed.
A Virus is malware that seeks to alter the normal operation of the computer without the user's permission or knowledge.
Antivirus and Firewall
Antivirus Software: Examples include Panda, AVG, and Avast.
A Firewall is a component of a system or network designed to block unauthorized access while allowing authorized communications.