Northern Computer

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 12 December 2011

Data Recovery

Posted on 15:19 by Unknown
There is nothing worse than the feeling you get in your gut when your computer screen goes black and shuts down. When you start your computer back up the black screen comes up and with white writing flashes ERROR across the monitor. Suddenly you panic and you realize all of the pictures, the music, videos or important documents you may have on the hard drive may no longer exist. Before you decide to throw your now overpriced boat anchor off the top floor of your business or home there is the last line of defense: Data Recovery.

Data recovery comes in a two forms: physical data recovery and software based data recovery. Hardware data recovery is the physical components and structures of the hard drive (or storage device) that has decided to break down and stop functioning. This could be replacement of circuit boards, head replacement, motor replacement or physically moving the platter into a whole new brick (hard drive case). This cannot be done by most users or even end users. They drives are usually sent away to data recovery companies that have clean rooms and specialize in this category of recovery. If a user attempted to open up the hard drive and replace these parts by his/her self even the slightest speck of dust or impurity could have catastrophic damage to the already weakened drive. Also note that attempting this without the help of said companies can also void the warranty you may have on the hard drive itself.
Sometimes you get lucky and the hard disc itself is still readable but not by normal methods. That data can usually be accessed by putting the drive into another computer with a working OS (slaving the drive into a machine) and transferring the data onto a portable drive. This is the best case scenario. Other methods would be to run data recovery software to repair partition tables or file system damage. These methods can be run by end users (computer techs) as it requires no physical equipment. Note that these may sound simple enough but the software requires constant attention due to errors and the recovery process itself can take days to finish. This depends on how badly the software side is damaged.

It is even possible to recover files after the hard drive has been overwritten. This is difficult as the drive itself has for the most part been “erased.” This doesn’t mean that ALL the data can be recovered when the drive has been erased and then written over. It’s like someone taking the Mona Lisa, painting over it with white primer and then letting a small child finger paint for days all over the “blank” canvas. It may be possible to scrap the paint off and get the image underneath, but the chances of it being visible are slim.
Now you ask, what could cause hard drive issues? No before you say it, the universe did not do this to you. It is not trying to give you the proverbial middle finger and make your day even worse. Hard drives physically break down over time. Like anything hard drives are not perfect. Because of all the moving parts things will eventually break down. The motor may go if you leave the disc spinning all the time or the circuit board may eventually become fried. Another issue may be power surges or failure that can cause both physical and software based damage.

How do you avoid the happiness vampire that is data lose? Simply become more proactive. Backup your important files onto a flash drive or portable hard drive every week. That way if your drive was to fail you can still have access to these files. Another option could be Northern Computers Online Backup Solution. I use this myself to back up photos of family and friends that I don’t want to lose. It’s simple to use. Once the software is installed and you have selected the folders and files you want backed up, they are transmitted to an offsite, secure location.

- Keenan F, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in computer, data, Recovery | No comments

Website Security

Posted on 15:12 by Unknown
Browsing the internet can be a very dangerous place. Every day you hear about groups or people who somehow manage to get individuals personal information. It makes you wonder how secure your web browsing can be. It makes you ask questions when you are checking bank accounts or ordering online. “How secure is this?”

What is meant by "secure"?

Anytime you view a website information is sent from your computer to the web server and from the web server to your computer. The transmission of this information is normally sent in "plain text", meaning anyone would be able to read it should they see it. Now consider this: Each piece of information transmitted traverses many computers (servers) to reach its destination.
Windows Users, to see just how many machines your information traverses, follow these steps:

1) On your computer, click Start, then Run
2) Type "cmd" and click "OK" (or press Enter)
3) Type this in exactly: tracert www.northerncomputer.ca
4) Press Enter
Each listing in the window is a different computer/router/switch (a "node" in networking terms). Each "node" represents a point at which any data you send might be recorded!

So what’s so special about this you ask? Consider this the next time you type in a password or your credit card number. If your connection isn’t secure your credit card information and password are being transmitted in plain text. The solution? Simple, a secure browsing session or connection to the host server/computer.
SSL uses a complex system of key exchanges between your browser and the server you are communicating with in order to encrypt the data before transmitting it across the web. A web page with an active SSL session is what we mean when we say a web page is "secure".

So the next time you are browsing a website, check out the prefix of the website. Is your bank site secure? Is the order window displaying your credit card for the world?

How can I tell if a web page is secured?


There are two general indications of a secured web page:
1) Check the web page URL

Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https" - note the "s" at the end.
2) Check for the "Lock" icon

There is a de facto standard among web browsers to display a "lock" icon somewhere in the window of the browser (NOT in the web page display area!) For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window:

As another example, Mozilla's FireFox Web Browser displays the lock icon in the lower-left corner:


THE LOCK ICON IS NOT JUST A PICTURE! Click (or double-click) on it to see details of the site's security. This is important to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser! Therefore it is necessary to test the functionality built into this lock icon. Furthermore, it is very important to KNOW YOUR BROWSER! Check your browser's help file or contact the makers of your browser software if you are unsure how to use this functionality.
- Keenan F, Network Support Technician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Internet, security, Tips | No comments

Automatic Disk Cleanup

Posted on 15:03 by Unknown
Do you keep running out of space on your hard drive? Does your system seem sluggish lately? Perhaps what you need is to put your computer to work for you when you're not using it. The article here shows you how to setup a routine to automatically "cleanup" your computer so it keeps functioning well......

Click here to download the pdf file.

    - Harry M, Network Support Techinician

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Backup, computer, Hard Drive, hardware, Service and Repair | No comments

Wednesday, 7 December 2011

What is a Small Business Server and Do I Need One?

Posted on 14:29 by Unknown
Every business uses computers and as your business grows, your business adds on new desktops, laptops, POS (Point Of Sale) systems, smart phones, tablets… Soon you have information everywhere that is only accessible on each separate device.
If this sounds familiar, it may be time for a server – a computer that delivers information and software to other computers that are linked by a network. A network of computers connected to a server is more efficient than employees working on individual non networked computers. If you have 5 or more employees, you need to consider investing in a network server. Below are a few of the reasons to invest in a server.

  • Expensive hardware such as printers and scanners can be shared by users on the network.
  • Data is stored centrally, allowing employees to easily find, share and modify data from their workstations/PCs.
  • Security levels and password protection settings can be created in order to access information. Accounts for individuals and groups can be set up with rights assigned to the data stored on the server. For example, the sales staff could be set up so that they do not have access to employee personal records. 
  • Increased reliability. A server differs from a regular PC because it can be equipped with redundant power supplies and multiple hard drives that work in a RAID configuration. To simplify, this means that if one of the server’s hard drives fail, it can operate on the other drives for a period of time until the failed drive is replaced. Also, if an employee’s work station fails, they can move to a new work station and continue working.
  • Multiple operating systems can be loaded onto one server, using virtualization technology, allowing for less power consumption and much faster recovery in the event of a disaster. 
  • Simpler backup.  Since all data is centrally stored on one system, rather than multiple systems, backup is greatly simplified.
  • Resources can be freed up on all of your other computers. Since data and programs are not necessarily stored on each individual computer/work station, local hard drive space is freed up. 
  • Make your work force more mobile. With the use of a remote server, employees that work from home or on the road, can access files on the server.

So what does a server cost? Many variables come into play, when determining what will work best for your network. A review of the systems that you have in place with one of our technology consultants will help to determine what is best for your situation. 

Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Backup, data, Networking, server, software server | No comments

Protecting Vital Company Information - Security Audit

Posted on 14:20 by Unknown
In today's world people want easy access to their business information. Some of this information will be considered sensitive therefore it is important to properly secure access to only those that should have access.

A security audit is really the final step in the implementation of your security defenses. Prior to this you undertake a risk analysis. Then you develop a security policy to define what you are going to defend and how you are going to defend it.
Various protective steps will be put into place to prevent unauthorized access. Perhaps access requires establishing a VPN connection beforehand. Almost certainly access will require a username & password and various policies will need to be in place as well. For instance, a requirement that passwords meet certain complexity rules or that all information on laptops be encrypted with password protection. A good security audit should find any gaps in your existing defenses.

Many people opt to have external security consultants perform the audit. If you are a small company you might not be able to afford security consultants and you also might not have the in-house expertise to do a sophisticated audit on your own. This however does not mean that you can or should do nothing. The exercise of understanding what you are securing and how you are trying to secure it is worthwhile on its own.

If in preparing for an audit you realize that vital company information is held on laptop computers then this will lead to questions like what happens if the laptop is lost or stolen? How easy can someone access the information on this laptop? We all know or should know that 100% security is impossible. There will always be risks. However often low cost simple security steps will significantly improve your security.

So how would you go about a simple security audit?
Security List

Begin by creating a list of items that potentially need securing. This list should include things like servers, desktop computers, laptops, routers, other networking equipment, printers, data (sales, customer & employee information), smart phones, PDAs, VoIP phones, VoIP or regular phone call recordings and records, email and so forth.
Threat List

Using your security list determine what is sensitive as well as how an unauthorized individual might access the sensitive data. This will constitute your threat list. Look at things like do all computers have passwords? Who knows the passwords? How strong are the passwords? Do passwords need to be changed periodically? Are laptops taken offsite? How easily could computers be removed from the physical premises? Do you have a list of the equipment? Are you creating backups of sensitive data? How are things being backed up, where are the backups kept, and who conducts the backups? How is access being controlled? Can information be accessed from outside the company premises?
Prioritize Threat List

After determining what threats exist you should prioritize the list. Look at the probability of unauthorized access coupled with the potential harm.
Security Threat Response Plan

Starting at the top of this list think about how you might reduce the risk of each item. This will become your security threat response plan. Remember lots of low cost simple steps exist that will improve your security. Stronger passwords, improved physical security (lock the server in a wiring closet), ensuring all computers are patched with security updates regularly, limiting web access, ensuring antivirus products are being used and are updated properly, implementing encryption of data with password protection, etc. If you do not have a backup of sensitive data you will need to devise a backup policy and plan as well. This should include some form of offsite storage for obvious reasons. Now that you have your security response plan you need to implement it.
Implement Security Threat Response Plan

After implementation you will periodically do a security audit, which essentially, is running through the whole process again. Each time you go through the process you will likely unearth new risks as well as cost effective ways of reducing risks.


Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Read More
Posted in Backup, data, security | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • What the Heck's in Your Computer - Part 1: The Motherboard
    c The motherboard, also known as the main logic board, has been at the heart of every micro computer since its invention. Its function is si...
  • The Impact of Tablets – 5 Ways Businesses Are Using Them
    From just a few short years ago, tablets have gone from being non-existent to becoming a common device that is being adopted by many busines...
  • Power Protection for Your Computer Hardware - Surge Protectors and UPS'
    It's been said that there are two types of computer users: those who have lost data because of a power problem, and those who are going ...
  • Torture Tests of the Lenovo All-in-One PC
    200 test units, 10 torture tests, 20,000 hours of testing-Lenovo ThinkCentre All-In-One desktops are built tough. Northern Computer - Your T...
  • Office Ergonomics - Keyboard Setup & Usage
    The last area in your work station setup (see our articles on mouse and monitor ergonomics) that can cause injury from improper usage is the...
  • Hey Kelowna - Backup – Disaster Recovery – Are you prepared?
    We all know that we should back up our important data, but maybe we don't know what files we should back up on our systems or we don’t k...
  • Northern Computer and Nidana Networks have Merged
    and News Announcement As Northern Computer continues to grow, we are excited to announce our merger with Nidana Networks. This merger allows...
  • Should I Make the Switch to Windows 7?
    Windows 7 has now been out for a couple of years and yet there are still people who are hesitant to upgrade to it. For the most part this is...
  • 5 Reasons to Consider an All-in-One PC
    If you aren’t already feeling overwhelmed by the consumer devices available on the market today, AIO (All-in-One) PCs are striving for a pie...
  • 7 Reasons why it’s Time to give up on Windows XP Once And For All
    Although businesses have been getting rid of Windows XP for at least the last 3 years, the fact remains that as of March 2013, nearly 39% of...

Categories

  • advertising
  • antivirus
  • application
  • Backup
  • battery
  • Cloud
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Office Ergonomics
  • PC
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ►  2013 (23)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (3)
    • ►  February (3)
    • ►  January (5)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ▼  2011 (56)
    • ▼  December (5)
      • Data Recovery
      • Website Security
      • Automatic Disk Cleanup
      • What is a Small Business Server and Do I Need One?
      • Protecting Vital Company Information - Security Audit
    • ►  November (8)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (7)
    • ►  June (6)
    • ►  May (3)
    • ►  April (8)
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile