Here they are:
Master Technician Technology Services
PC Maintenance: What Tasks When?
Daily: Backup of your data. You don't want to lose yesterday's work anymore than you want to lose last week's, so your documents, pictures, and application data are backed up daily.
Get a service plan with Master Technician Technology Services
for the balance of these Tasks.
Weekly Master Technician Technology Services
: Scan for malware. Your real-time antivirus program isn't perfect; something evil could slip by it. So to be on the safe side, get a second opinion every week by having Master Technician scan with our security program(S).
We use at least 2 to 5.
Monthly: Master Technician Technology Services
will Defrag your hard drive. Over time, your files become fragmented--with any single file split over multiple physical parts of the drive. Fragmentation can slow your PC and render lost files less retrievable.
Monthly: Master Technician Technology Services will
scan your hard drive for errors. We are not looking for viruses or worms here, but physical and logical problems with the disk that could render parts of it unreadable.
Master Technician will Schedule disk check (Vista or Win7) or Yes (XP). Then, the next time you plan to leave your computer for a few hours (for instance, to sleep), reboot. Windows will take a considerable amount of time
(ballpark guestimate: one hour for each 100GB of drive space)
before it's ready for regular use.
Twice a Year: Master Technician Technology Services
Backups your hard drive as an image. While not as important as a recent backup of your data (see Daily)
an image backup of your entire drive can be a life-saver should your hard drive crash or Windows become hopelessly corrupt. A good image backup means never having to reinstall Windows from scratch.
In computing, file system fragmentation, sometimes called file system aging, is the tendency of a file system to lay out the contents of files non-contiguously to allow in-place modification of their contents. It is a special case of data fragmentation. File system fragmentation increases disk head movement or seek time, which are known to hinder throughput. In addition, file systems cannot sustain unlimited fragmentation. The correction to existing fragmentation is to reorganize files and free space back into contiguous areas, a process called defragmentation.
Visualization of fragmentation and then of defragmentation
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup.
Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss can be a common experience of computer users; a 2008 survey found that 66% of respondents had lost files on their home PC. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Though backups represent a simple form of disaster recovery, and should be part of any disaster recovery plan, backups by themselves should not be considered a complete disaster recovery plan. One reason for this is that not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server by simply restoring data from a backup.
Since a backup system contains at least one copy of all data considered worth saving, the data storage requirements can be significant. Organizing this storage space and managing the backup process can be a complicated undertaking. A data repository model may be used to provide structure to the storage. Nowadays, there are many different types of data storage devices that are useful for making backups. There are also many different ways in which these devices can be arranged to provide geographic redundancy, data security, and portability.
This pie chart shows that in 2011, 70 percent of malware infections
were by trojan horses, 17 percent were from viruses, 8 percent
from worms, with the remaining percentages divided among
adware, backdoor, spyware, and other exploits.
Malware by categories on 16 March 2011.
Many early infectious programs, including the first
Internet Worm, were written as experiments or pranks.
Today, malware is used by both black hat hackers and
governments, to steal personal, financial, or business information.
Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords. Left unguarded, personal and networked computers can be at considerable risk against these threats. (These are most frequently defended against by various types of firewall, anti-virus software, and network hardware).
Since the rise of widespread broadband Internet access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for illicit purposes. Infected "zombie computers" are used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion.
Programs designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues are called spyware. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer applications.
Ransomware affects an infected computer in some way, and demands payment to reverse the damage. For example, programs such as CryptoLocker encrypt files securely, and only decrypt them on payment of a substantial sum of money.
Some malware is used to generate money by click fraud, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.
Malware is usually used for criminal purposes, but can be used for sabotage, often without direct benefit to the perpetrators. One example of sabotage was Stuxnet, used to destroy very specific industrial equipment. There have been politically motivated attacks that have spread over and shut down large computer networks, including massive deletion of files and corruption of master boot records, described as "computer killing". Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as Shamoon or W32.Disttrack) and Saudi Aramco (August 2012).
Preliminary results from Symantec published in 2008 suggested that "the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software applications." According to F-Secure, "As much malware [was] produced in 2007 as in the previous 20 years altogether." Malware's most common pathway from criminals to users is through the Internet: primarily by e-mail and the World Wide Web.
The prevalence of malware as a vehicle for Internet crime, along with the challenge of anti-malware software to keep up with the continuous stream of new malware, has seen the adoption of a new mindset for individuals and businesses using the Internet. With the amount of malware currently being distributed, some percentage of computers are currently assumed to be infected. For businesses, especially those that sell mainly over the Internet, this means they need to find a way to operate despite security concerns. The result is a greater emphasis on back-office protection designed to protect against advanced malware operating on customers' computers. A 2013 Webroot study shows that 64% of companies allow remote access to servers for 25% to 100% of their workforce and that companies with more than 25% of their employees accessing servers remotely have higher rates of malware threats.
On 29 March 2010, Symantec Corporation named Shaoxing, China, as the world's malware capital. A 2011 study from the University of California, Berkeley, and the Madrid Institute for Advanced Studies published an article in Software Development Technologies, examining how entrepreneurial hackers are helping enable the spread of malware by offering access to computers for a price. Microsoft reported in May 2011 that one in every 14 downloads from the Internet may now contain malware code. Social media, and Facebook in particular, are seeing a rise in the number of tactics used to spread malware to computers.
A 2014 study found that malware is being increasingly aimed at mobile devices such as smartphones as they increase in popularity.
In computing, data recovery is a process of salvaging inaccessible data
from corrupted or damaged secondary storage, removable media or
files, when the data they store cannot be accessed in a normal way.
The data is most often salvaged from storage media such as internal
or external hard disk drives (HDDs), solid-state drives (SSDs),
USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems,
and other electronic devices. Recovery may be required due to
physical damage to the storage device or logical damage to the
file system that prevents it from being mounted by the host
operating system (OS).
The most common data recovery scenario involves an operating system failure, malfunction of a storage device, accidental damage or deletion, etc. (typically, on a single-drive, single-partition, single-OS system), in which case the goal is simply to copy all wanted files to another drive. This can be easily accomplished using a Live CD, many of which provide a means to mount the system drive and backup drives or removable media, and to move the files from the system drive to the backup media with a file manager or optical disc authoring software. Such cases can often be mitigated by disk partitioning and consistently storing valuable data files (or copies of them) on a different partition from the replaceable OS system files.
Another scenario involves a drive-level failure, such as a compromised file system or drive partition, or a hard disk drive failure. In any of these cases, the data cannot be easily read
A disassembled and labeled 1997 HDD lying atop a mirror
An overview of how HDDs work
Your Browsers History and Bookmarks if selected in your plan we can save your extensions and plugins as well
Your emails from all accounts
Your calandar and reminders
Your Videos and TV shows.
Your Documents and files and threads associated with them
Your notepad files
Your contacts from all locations.
Your Notes etc. Snippits. Text files etc.
Your Sounds for windows Themes which are almost never in the Theme directories
Your Theme packs downloaded and purchased
Extended Plan Extended Plan Extended Plan
Extended Plan Extended Plan Extended Plan
Your Software not on CD or DVD includes all downloaded software and keys, serials