I feel really bad about this response, because there's nothing
constructive I can offer Tom -- for this time. But it does seem the
right occasion to remind everybody what they should be doing unless
they use their PC as a gameboy or jukebox.
And I don't want to come across as "That's obvious" or "Don't do dumb
things." I started in the computer business 50 years ago, and I have
violated just about every one of the rules below at one time or
another. And I came to regret most of those violations. In the 1980s,
I developed system software for one of the major computer
manufacturers; the department voted me "most likely to crash a hard
drive", and the first couple were not properly backed up. You'd think
I'd learn the first time, but it took two or three.
There were two types of violations in the case at hand: failure to
protect the computer and failure to keep backups of the data.
COMPUTER PROTECTION:
(1) Use a good virus protection program. (I use AVG Free. With this
quality of free software, there's no excuse not to.) And be sure to
(a) keep its virus database up to date and (b) scan your computer
often. Immediately before every scan, do an update of the virus
database. I make sure to do it every second day at least, and usually
every day. Viruses are an "arms race"; you need to have protection
against the latest bomb before it reaches your computer.
(1a) Same for malware. (AdAware and SpyBot are good programs here.) I
don't run these scanners nearly as often -- maybe every week or two.
And again, always update to the latest threat data before you run the scan.
(2) Use a firewall. It can be a hardware firewall (advisable if you
have several computers sharing your Internet connection) or software
on your computer. Even Microsoft's built-in firewall is not too bad
if you're not doing anything fancy. But if you're hosting your own
web site on the computer, or even a file or print server, you need a
better firewall than MS provides.
(2a) Keep the firewall administered as tightly as you can. When
caught between convenience and protection, it is often painful to opt
for protection -- but usually worthwhile.
DATA BACKUP:
(3) OK, here's one I have not violated since day 1. Every time I
install a program, I put the install disk someplace safe. Not a
DIFFERENT place for each -- that's a good way to lose it. I have all
the install disks together. (My new computer, less than two months
old, does not have a floppy drive. So my last act on the old computer
was to read every floppy I had onto a CD-ROM. I found install disks
from the '80s, many of which don't even work on Windows 7. But I
didn't lose them.)
(4) Back up the data that is on the computer! This is obvious, but so
many people don't know how. So here are some guidelines I learned the hard way:
___ Separate out your data and preference information (configuration)
from the installed programs themselves. Back up the data and
configuration. Count on installing the programs from those disks you
saved in step #3.
___ These days a lot of your programs will have their installs
downloaded from the Internet rather than a disk. In my [backed up]
data area, I have a folder that is JUST installs for such programs.
Usually you will prefer to get a download of the latest and greatest
version if you ever have to restore. But some of those programs will
not be available on the 'net years from now. So have a copy of the
install. (Yes, I have been burned by this on several occasions.)
___ For Windows users (most of us): Be sure your backups include ALL
your data. I had some bad experiences in the last few months with
Western Digital backup software, and almost as bad with Microsoft's
own. Part of that is due to the fact that my folder structure is NOT
separated into a top-level distinction of documents, pictures, music,
and video. For instance, I have documents, pictures, and videos
having to do with golf, and I want them together in a "Golf"
top-level folder. WD's backup software misses my "Golf" folder
altogether, and MS's requires that I tell it specifically about every
folder outside their four "libraries".
___ The last thing you want is to have your backup data corrupted by
viruses. So, before you connect your backup device to start the
backup, disconnect from the Internet and do a final scan of the computer.
I wound up designing my own backup procedures. They work great. I did
two restores from backup before I got the new computer right, so the
procedures have been put to the test. And they went like clockwork.
Here's the essence of what I do:
*** I bought USB drive that I use for backup. It is ONLY connected to
the computer during a backup or restore. If you leave it connected
all the time, you will expose it to some of the things that could
kill your primary drive. (Like viruses or damaging power surges. I
actually lost a hard drive to the latter ten years ago.)
*** For reasons given above, I wrote my own backup program. Don't be
intimidated. It's just a batch script where the only line that
actually does anything is an XCOPY command with lots of flags. It
actually runs faster than Microsoft's own, and faster than the
Western Digital backup software that came with the USB drive; it also
gives a better idea of what is going on. (I appended the code at the
end of this note, in case anybody wants to copy it.)
*** When you do a backup, it is best to turn off all programs but
backup, and disconnect the computer from the network. Then run your
virus (and malware?) scans before you actually connect the USB drive
and take the backup. Again, the last thing you want is to corrupt
your backup data with a virus.
I have left myself open to one type of disaster I hope I don't
encounter. All these backups are stored just a few feet from my
computer. So a fire in the house could destroy both. If I had learned
proper paranoia, I would have them in a fireproof box in the basement
-- or, even better, a safe deposit box at the bank. The last one
requires too much effort on my part to do a backup; running to the
bank every time is overkill. But it might not be overkill if I have a
business that depends on the data, and that I would still want to
pursue after a fire.
As I said, I have been burned by ignoring almost every rule here,
over the years.
I wish y'all good luck, and I hope Tom gets the software he needs.
Cheers!
DaveT
______________________________________
As promised, here are the scripts I use for backup and restore. Don't
be scared by it. ALL THE WORK IS DONE BY ONE LINE, the "xcopy" line.
The rest just sets up the source and destination locations and
prompts for the user's approval. I worked for a few weeks where the
whole script was JUST the xcopy line.
My backup script:
@echo off
set bkpsource="c:\users\davet"
set bkptarget="j:\image"
echo Backup %bkpsource% to %bkptarget%?
set /p resp="y or n: "
if /i A%resp% NEQ Ay goto end
@echo on
xcopy %bkpsource% %bkptarget% /D /E /C /R /H /I /K /Y
:end
@echo off
set /p resp="Done"
_________________________________
And the matching restore script:
@echo off
set rsttarget=c:\users\davet
set rstsource=j:\image
if A%1 == A goto check2go
REM If there is a cmd-line parameter, then just restore one folder
REM Select directory to restore from backup
set rsttarget=%rsttarget%\%1
set rstsource=%rstsource%\%1
:check2go
echo Restore %rstsource% to %rsttarget%?
set /p resp="y or n: "
if /i A%resp% NEQ Ay goto end
@echo on
xcopy %rstsource% %rsttarget% /D /E /C /R /H /I /K /Y
:end
@echo off
set /p resp="Done"
--
Shoptalk ** Sponsored by the new Aldila Voodoo.
Learn more at http://aldilavoodoo.com/