Backups of computer systems and computer recovery overview continued

Daily backups are one more thing to do in a busy schedule. But the day you lose that file you need and can't restore, you're going to be a whole lot busier trying to do computer recovery for a small business, home office or even your home computer.

THE ENEMY - Crackers and Hackers Geeks make a distinction between crackers, who break into systems to do damage, and hackers who enjoy taking programs apart just to see how they tick. We'll stick with the more common, though less accurate, term of hacker. (The term 'hacker' originally meant 'someone who makes furniture' with an axe. Crude, but effective - like most computer viruses.)Computer viruses are actually a particular type of computer 'malware' - a general term covering all types of malicious software. The most common types are viruses, worms and Trojan horses.


A Computer virus is usually hidden inside another program such as an installation program delivered via e-mail attachment. (Biological viruses require a host organism to live and reproduce, hence the name.) When the 'host' program is run, the virus program also runs. Once it's in memory the virus is able to do its dirty work, which usually includes infecting other programs.

After the infection stage of the virus, there's a destructive stage. The virus waits for a pre-determined trigger (such as a specific date or a certain number of times the virus has replicated itself) before delivering its 'payload'. Payloads range from simple messages to file deletion commands to destruction of the core operating system and running computer checks can no longer locate files.

When first developed, computer viruses were commonly distributed on floppy disks. With the growth of the Internet downloaded files and e-mail are the preferred delivery mechanisms. E-mail can contain attachments which can be any kind of computer file. Any executable file can be infected with a virus, and shouldn't be run unless you're confident they're virus free.


Worms are similar to viruses in that they're self-replicating. They reproduce themselves across networks without human assistance, such as e-mail sending. A worm, though, doesn't need another executable program to be distributed.

Worms usually affect networks more than individual computers on the network. Their self-replicating behavior can overload network resources, causing slowdowns in data transmission by consuming massive bandwidth normally used to forward normal traffic. Network systems that route Internet traffic are just specialized computer hardware and software. They, too, can be affected by malware.

Worms can also be designed to carry a payload, using a 'backdoor' installation program. A backdoor is a hidden access point to a computer that bypasses the normal login procedure. They're commonly used by spammers to distribute junk e-mail, for example.

Data storage I encourage for anyone that has computer system that contains what they might consider valuable. This can include person data such as documents or pictures that you cannot easily replace. For business this can truly save your business should a major failure or disaster occur. Now I know some of you may have experience a major failure and have been lucky enough to recover the data off the bad hard drive with little cost. However those of that had a major failure and had to pay for hard drive data recovery knows how expensive it can be. Not long ago I had a customer that had to recover about 45 Gig's of data and paid $2000.00 to get all that data back.

There are various ways to run system backup's up user computers and servers for your business one way is to do it yourself and another way is to have an IT professional setup an in house backup system and another way is to service that actually backs up your systems remotely. Of course the most inexpensive way is to buy the necessary equipment and setup the back system on your own however if you cannot figure it out or need help setting up a backup then most likely you will need to hire an IT professional or pay a service to do it for your business. Most likely the most expensive will be the service since you will have to pay a monthly fee and initial setup fees but you will have computer recovery method for a small business or home office and you can consider this for a individual computer at home.

On the links below I will break down and describe the equipment that you can purchase for backing up your computer systems. Also I will include a section on software that you can purchase for systems. I am including a section for Windows XP since it does include a way to back up your computer system manually.


Other related web pages

Backup of computer systems and storage Backup of computer systems and storage equipment

Computer issues and tips part 1 Computer issues and tips that you can have on you PC

Computer issues and tips continued part 2 This section talks about issues with power supplies

Windows related issues

Junk Email what does it harm Junk Email and spam how they can harm you and your computer

Anti Spam software This section is about Anti-spam-Software and how to choice

Preventing PC Errors Preventing PC Errors that can occur in the Windows operating software

Windows Registry 101 Windows Registry 101 - The basics and tips for Windows or Vista Registry

Malicious code / virus overview Malicious code and virus overview

Excel templates Using Excel Templates – Why Reinvent the Wheel?

Backups of computer systems and computer recovery overview continued return to home page