티스토리 뷰
Data integrity.
data recovery
network integrity
network recovery
access to computer should be always logged
difference between a restore point and a backup
using software (eg. wireshark, netanalyzer) to track suspicious IP addressing
how to stop pivacy
data integrity scan - software tolerant volume
systems for corruption (hardwre) and the system file check (SFC) scan and repair
system files and DISM (Deployment image servicing and management) to fix things SFC cannot
RAID 0, 1, 5, 10 (Mirroring, Striping, hybrid)
block MAC address to restrict instructions.
'AU Study > TAFE' 카테고리의 다른 글
Difference between Mac and PC (0) | 2017.10.22 |
---|---|
w11 wed afternoon (0) | 2017.10.22 |
tue w11 morning (0) | 2017.10.22 |
git first (0) | 2017.10.22 |
command line inputoutput codecademy (0) | 2017.09.25 |
댓글