A basis disk contains basis volumes like primary partitions, extended partitions, and logical drives, while Dynamic disks are disks that have been initialized for dynamic storage and contains dynamic volumes like simple volumes, spanned volumes, stripped volumes, mirrored volumes, and RAID-5 volumes. (Drew, 2001). Computer data backup can be done on various media depending on the factors favoring that type of medium for a particular organization. This would include the use of zip drives, external hard disk drives, floppy drives, compact disks, DVD drives, network (Internet or online) storage devices, or portable flash disks.The backup plan is dependent on the specifics of a particular use, or users. The media of choice should be secure and reliable for the period that the information will be used. The user should also be able to use or access the media with ease.
There should be both the facilities as well as the expertise on how to access data on a particular media. The use of a DVD drive for example, where there exists no technology for playing the medium, is illogical. Cost is another factor since the medium has to be affordable. The best medium to use therefore would be easy to operate for the users, secure, reliable, and affordable.(Andrei, 2001). It is always safer (the whole purpose of backing up) your data on more than one media so that incase one fails you, a second option can be taken up.
In Windows networking three default logs exist. The application log, security log and a system log. The application log is mainly used by application developers and system administrators. This way it is possible to monitor application activities as well as keeping track and monitoring applications and their interactions with each other. It records application errors, warnings and information events.
It is able to display application errors. Visual Basic and other scripting languages add Application Programming Interface (API) calls to log entries in this default log. The security log is an event log.
System security issues are logged here. This would include logon attempts, creating, opening or deleting files changing specifics on user accounts or changing security settings on a user account. The system log handles Windows system components. The malfunction of drivers and other system components during start up and shutdown.(Khnaser, Syngress, Ruston, Ebrary, 2004). Additional logs would include the call-log and record review logs with extra work or services. Several differences exist between the Encrypting File System (EFS) in the Windows 2000 and Windows 2003. The EFS 2003 version has several new features compared to EFS 2000.
EFS in Windows 2003 has encrypted files marked green so that they are easily distinguishable. Compressed files appear in blue while encrypted files are in green. In the Windows 2003 version you can share encrypted files with other individuals but not groups.The other party must however have an encryption certificate on your computer. Compared with Windows 2000, the EFS in 2003 offers a client-side caching that is used with the offline folders feature. In essence therefore you are able to encrypt offline files.
It enables on to comfortably work on files with a portable computer when not on the network. It also offers Kernel-mode FIPS-compliant cryptography. This enables one to configure clients to be Federal Information Processing Standards (FIPS) compliant. Finally, it is possible to encrypt files even if there is no Data Recovery Agent (DRA).
(Churakin & Peikari, 2004).ReferencesKhnaser N. Elias, Syngress, Ruston, Ebrary, Inc. 2004. MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298): Exam 70-298 Study Guide. Syngress Publishing. PP.
80-92. Khurshndor Andrei. 2001. The Essential Guide to Computer Data Storage: From Floppy to DVD. Prentice-Hall PTR.
PP. 40-47. Peikari Cyrus and Churakin Anton.
2004. Security Warrior. O’Reily Publishing. PP. 70-79. Robb Drew.
2001. Server Disk Management in a Windows Environment. CRC Press. PP. 30-35.