Wednesday 2 November 2011

Taking ownership of file

Hello I had an account on a Windows7 Ultimate but deleted it, before deleting it I moved all the files to a new user. Problem is that I cannot do anything to the file even with full administrative permission I tried taking ownership but that doesn't work. Funny thing I can't open the files but I can delete them. doing some research I was reading into security certificates but I don't understand how it all works.

If anyone could help I would be very grateful.

Wednesday 13 July 2011

Two laws or guidelines which the company will have to abide by whilst using the internet

Copyright infringement:
This is when unauthorized or prohibited use of works under copyright, infringing the copyright holder’s exclusive rights, such as the right to reproduce of perform the copyrighted work, or to make derivative works e.g. the Honda Logo

It would be a copyright infringement to modify the picture, without the owner’s permission.

Infringement can harm the owners of intellectual property; for instance, the copying and distribution of music or software, without the creator's permission, could reduce sales of the copyright holder's product.



Data protection act 1998
This is the main piece of legislation that governs the protection of personal data in the UK. Main points:

§  Personal data must be collected fairly and lawfully. The data subject/person should be informed of who the data controller is. (The Institution) who the data controller’s representative is; the purpose or purposes for which the data are intended to be processed; and to whom the data will be disclosed.
§  Appropriate security measures must be taken against unlawful or unauthorised processing of personal data and against accidental loss of, or damage to, personal data. These include both technical measures, e.g. data encryption and the regular backing-up of data files and organisational measures, e.g. staff data protection training
§  Personal data shall not be transferred to a country outside the European Economic Area unless specific exemptions apply (e.g. if the data subject has given consent) this includes the publication of personal data on the internet
§  Personal data must be kept accurate and up to date and shall not be kept for longer than is necessary

The Act aims to give individuals rights with regards to the processing and sharing of personal information. Without legislations such as this people and companies would be free to use take sell our personal information which involves anything from birth dates to medical history.    

Data use notice:
Any web sites that collect personal information should include a Data Use notice. This needs to describe all the purposes for which the information collected via cookies or other covert software.

If any of the information collected is going to be used for promotional, marketing, research or any other secondary purpose, the data usage notice must give individuals the opportunity to agree to it. This means an ‘opt-in’ box needs to be included in the notice.

Precautions to minmise risk to your PC and Yourself

Online Banking
Online banking is safe and convenient as long as you take a number of simple precautions. Please make sure you follow the advice given below:
A. Ignore any e-mail asking for your password or PIN and inform your bank of the same for them to investigate. Neither the police nor your bank will ever contact you to ask you to reveal your online banking or payment card PINs, or your password information.
B. Do not use cyber cafés / shared PCs to access your internet banking site.
C. Use the latest anti-virus and spy ware software regularly. You may install security programmes to protect against hackers, virus attacks or malicious ‘Trojan Horse’ programmes. A suitable firewall installed in a computer to protect your PC and its contents from outsiders on the internet is recommended.
D. Disable the ‘File and Printing Sharing’ feature on your operating system.
E. Log off your PC when not in use.
F. Do not store your ID / PIN in the Internet Explorer Browser.
G. Check your account and transaction history regularly.

Lost files / information - Back up
You should back up your files especially when running a business, you don't wont business information or work being lost. you can use online backing with sites like Mozy. These sites allow you to back up and protect your information and files.

Viruses and Trojans
To minimise the chance of catching one of these nasty programs you should install a good antivirus such as Nortan and regularly update to receive the latest virus definitions. You should also be aware of how you can receive them. You should be careful when reading emails and be cautious about attachments and links on web sites. Remember if something seems too good to be true it probably is!   

Possible threats to system performance

Viruses
A virus is a parasitic program written intentionally to alter the way your computer functions/operates without your permission. Viruses attach and copy them self to programs, files or documents, they remain inactive until the program is run or the file/folder is opened.

Viruses can delete damage files cause changes to the computer system, display messages; they can spread through email, instant massager attachments USBs and so on.

Trojan Horse
These programs appear to serve or provide useful entertainment that encourages you to run them. But these programs are covert and are intended to harm your system, by placing a virus on your system damage or allow the creator/hacker to gain access to your computer. These days you can be enticed into running a Trojan by clicking on a link on a viral web site or in an email.

Trojan horses are not viruses because they do not replicate or spread. Trojans that allow a hacker to gain access to your computer are called Remote Access Trojans RATs.

Lost files information – Back up
It is important to have a back up of your files on either an external hard disk or using online file storage such as humyo.com
This should be done because you can have unexpected experiences such as power failure, hard disk becomes damaged or your PC is stolen and so on.

Online banking
You need to be very careful when internet banking because you don’t want anyone beside from yourself to have any of your details likes passwords. If someone was to gain enough information they would be able to access your accounts and steal your money.  


 
 

Tuesday 8 March 2011

A day as an IT apprentice

You get to work, before 9, not after!! Or as many of you know, you’ll either have the old bag screaming at you or a nice slice of your pay cut off, possibly both if you’re unlucky.
When that inevitable sound of the bell rings at 9, and work has officially started, you really do notice those small sounds i.e. keyboards being typed, paper being shuffled, clicking of the mice, phones ringing ETC, these are the sounds of the office. When you hear these sounds everyday you slowly stop noticing them.
As an apprentice we have seniors or more specifically assessors. Assessors to the apprentice can be seen as a sort of teacher. They sometimes do work shops where you learn Microsoft Office or they give you unit work, to put it simply its course work.          
Today I’m doing unit work; in fact this blog is part of my unit. I am also given the responsibility of front desk reception. Within this responsibility I am required to answer calls, pass on messages and help where I can. And off course assist guests.
At the end of the day I will be cleaning the office that can involve hovering, dusting, taking out the bins, washing the dishes etc which you may think is a little bizarre! And I agree it’s an IT apprenticeship but we also clean.