Every user is responsible for protecting against loss of the data on his or her computer. Data loss or corruption may occur in a number of ways. The storage media (e.g., your computer's hard disk) may degrade or become damaged, and may fail over time. Data may also be altered or destroyed by viruses, electrical surges, software errors, hardware malfunctions, network transmission errors, misuse of the computer, or other factors. There are a number of things you can do to help protect your data:Hard drives and other storage media are sensitive electrical components and can fail for various reasons. HDs may stop working, and data may become inaccessible, due to failure of an internal component. HDs can also fail because of mishandling, such as jarring or moving the drive when the disk is still spinning.
Evaluate the data you are storing on your computer, and protect important data by copying it regularly to a CD, network storage or other recovery system. Establishing a backup and storage procedure can help minimize the time required to reconstruct data that is lost or damaged. It is important to maintain a backup copy of your important data off-site, whether it is on a remote server or on removable media stored in a remote location, so that catastrophic damage does not cause the loss of both the original data and the backup copy.Be careful about sharing computer programs and system disks, downloading executable software from public-access Internet sites, or opening e-mail attachments. Scan them for viruses first. Ensure your personal computer is running dependable virus detection software that will: (a) scan for (and help you remove) viruses that may reside in files on your storage media; and (b) monitor the operation of your computer for virus-like activity (either specific behavior of known viruses or generally suspicious activity). There are many AntiVirus programs available today that can perform these tasks. Your personal computer may have come with one pre-loaded. You should visit the software vendor's Web site frequently to update the virus definitions file used by your AntiVirus software to help protect data from the latest known viruses.
Protect your data by using passwords, data encryption, and physical security.
Passwords can be enabled in both hardware and software. Your personal computer can be configured to require a Power On Password (stored in your computer's CMOS) before anyone can boot up your computer. Click here for instructions on setting the power on password on your personal computer.
You may also be able to configure your hard drive to require a second password before the hard drive will operate. Click here for instructions on setting the hard drive password on your personal computer. In addition, many operating systems can be configured to require a third password before it loads to your system. Many personal computers also offer the Embedded Security Subsystem, a combined hardware/software solution that helps protect sensitive keys, identity information and confidential data.
Passwords are a good start, but a determined hacker may be able to defeat them. You should consider encrypting important data stored on your computer to protect it from unwanted access or corruption. You should also consider encrypting important data during transmission over a network.
Also, what would you do if someone simply walked off with your entire computer? There are a variety of locking devices available to secure computers to fixed objects, and you should consider using one to protect your data from theft.
To help protect your data and your computer from a power surge, you should consider using a dependable, highly rated surge protector for power connections and modem/network cables. You should also consider using an uninterruptible power supply because a power loss or a momentary reduction in power may cause the loss or corruption of unsaved data.Errors may occur when transferring files over a network or from one storage medium to another. Such errors are often identified by the computer and reported to the user, enabling you to attempt the transfer again.
You should use the file comparison functions included in many operating systems and application programs to confirm that important data has been transferred completely and accurately. For example, certain versions of the Microsoft Windows operating system may enable you to use a "FC" command at the MSDOS prompt to compare two files and display the differences between them. If it detects a difference between the two data files, you can re-attempt the copy or transmission. Information regarding use of the "FC" command may be found at the Microsoft web site. Third party file comparison utilities may also be available.
When retrieving important data files from a remote source (e.g., from the Internet), you should consider downloading two copies of each file. Store each copy in a different location (a hard drive and a floppy disk, for example, or two different folders on a hard drive). The files may then be compared using the methods discussed above. If they are not identical, you can download a third copy and repeat the comparison.
Lenovo will update this document periodically so please bookmark this Web site and refer to it from time to time for the latest information about your Lenovo product. The information included in this document supplements, but does not replace, the information included with your Lenovo product. You should follow and retain the information included with your Lenovo product unless it is expressly modified by these pages. The information included in this document does not alter the terms of your Lenovo agreement or the Statement of Limited Warranty.