it applications theory slideshows by mark kelly [email protected] vceit.com virtual team file...
TRANSCRIPT
![Page 2: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/2.jpg)
Managing & Transmitting files
• Encryption• Access hierarchy• Backups• Virus scanners• Classifying and naming files• Directory/folder/site structures• Version control
![Page 3: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/3.jpg)
Managing FilesUse a file manager like Windows Explorer.
Preferably a better file manager.
File:
•Opening•Copying•Moving•Renaming•Deleting•Categorising•Viewing•Archiving
etc
![Page 4: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/4.jpg)
A better file manager – File Commander
![Page 5: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/5.jpg)
And other tools
There are many utilities which help manage particular types of files, or carry out specialised actions…
![Page 6: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/6.jpg)
Managing Picture Files
Picture:
•Previews•Resizing•Reformat•Sort•Create webpage•Contact sheet•File Info
![Page 7: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/7.jpg)
Mass File Renaming
Instantly renames thousands of files with great flexibility. Saves HOURS of labour when working with large numbers of files.
![Page 8: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/8.jpg)
Thumbnailed web photo galleries
Converts any number of photos into pages full of small thumbnailed images linked to the large pictures.
![Page 9: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/9.jpg)
Find where disk space is used/wasted
![Page 10: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/10.jpg)
Searching for filesFind files matching given criteria (e.g. name, file type, contents)
anywhere on a computer or network.
![Page 11: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/11.jpg)
Search & Replace over many filesSome text editors let you carry out a search and replace over many files at once. Far easier than making the same edit on 1200 files individually!
![Page 12: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/12.jpg)
Transmitting Files
• Files can be sent using the normal web HTTP protocol but it’s not the best way.
• File Transfer Protocol (FTP) is the standard way of transferring files over the internet – especially big files and large numbers of files.
• FTP client is like a 2-pane file manager with your local files in one pane and the remote files on the webserver in the other pane.
![Page 13: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/13.jpg)
Filezilla – an open source FTP client
![Page 14: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/14.jpg)
Commercial file-sharing services
![Page 15: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/15.jpg)
Commercial file-sharing services
![Page 16: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/16.jpg)
Email attachments
• Easy to send• Limited by size of recipient’s mailbox or ISP
restrictions
![Page 17: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/17.jpg)
Don’t recommend
• Snail mail• Couriers
We need ICT solutions!
![Page 18: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/18.jpg)
Data Security
• Virtual teams often work with confidential or secret data
• All data needs to be protected against loss or damage
• Sensitive information needs protection against theft
![Page 19: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/19.jpg)
Passwords
• Passwords can be applied to:– Individual computers– Network access– Website access– FTP access– Opening documents– Changing documents
A password-protected database
![Page 20: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/20.jpg)
Biometric ID• Passwords are weak protection• Easily forgotten, discovered, guessed• Biometric ID measures a unique physical
attribute of an individual, e.g.– Fingerprint– Iris pattern (the coloured bit of the eye)– Retinal pattern (the blood vessels at the back of
the eye)
• Can’t be copied, faked, stolen as passwords and swipe cards can
![Page 21: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/21.jpg)
Encryption
• Makes information unreadable for unauthorised people
• Public Key encryption does not have an unlocking key - the weak point of all previous encryption systems
• Public key encryption (look up RSA, PGP, SSL) is very, VERY hard to break
• Even if an encrypted document is stolen or copied, it is worthless to the thief
![Page 22: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/22.jpg)
Encryption• SSL (Secure Socket Layer) encrypts web traffic• Is active when the padlock in your browser
snaps shut• Messages between web servers (e.g. banks)
and visitors are encrypted by the sender and decrypted by the recipient
• Secure sites sometimes identifiable by a HTTPS:// prefix
![Page 23: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/23.jpg)
Access hierarchy• Different users get different levels of access to
data• Level of access based on what they need to
get their work done• Prevents unskilled, stupid or
evil people deliberately, carelessly or accidentally destroying data
![Page 24: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/24.jpg)
Safe Disposal• ‘Deleted’ files are easily recovered• To be safe, unwanted files should be wiped• Military-grade wiping involves overwriting data at
least 7 times with rubbish data• Computers being disposed of should have their
hard disks reformatted.• But reformatting can be reversed!• Some organisers shred used hard disks to be sure.
The disks are physically pulverised.
![Page 25: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/25.jpg)
Hard disk destruction
http://www.youtube.com/watch?v=8qImGK8bHjEhttp://www.youtube.com/watch?v=sQYPCPB1g3o
Hours of crushing fun…
![Page 26: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/26.jpg)
Access hierarchy• Databases, for example, can assign rights such
as:– See some data, but not all– See all data, but not add/delete/change change it– Add data but not delete any– Add and delete data but not change any
programming or presentation layouts– Access all areas
![Page 27: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/27.jpg)
Access Privileges in Filemaker
![Page 28: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/28.jpg)
Backups
• Backup = copying data so it can be restored if the original is lost or damaged
• Must be done regularly (daily!)• Must be stored offsite• Procedure must be tested
and documented
![Page 29: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/29.jpg)
Backup types
• Full = copy absolutely everything: new and old data and programs
• Incremental (partial, differential) = copy only files that are new or have been changed since the last full backup.
![Page 30: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/30.jpg)
Typical Scheme
• Weekly full backups• Daily incremental backups• To restore data, reload the latest full backup
and then add on all the incremental backups made since then.
• Look up “grandfather-father-son” scheme, a variety of “rotation backup”
![Page 31: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/31.jpg)
Backup Media
• “Media” = what the data is saved to• Tape = large capacity, slow, wears out,
expensive. Very common• Removable hard disk = fast, large capacity,
cheap.• CD/DVD = relatively low capacity, easily
damaged. Non-magnetic, so not hurt by electromagnetic fields as are tapes, HDDs.
![Page 32: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/32.jpg)
Backup Media
• Selection criteria:–Read/write speed–Capacity–Lifetime of recorded data–Durability of media
![Page 33: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/33.jpg)
Archiving
• Copy obsolete data to secondary storage (e.g. DVD) and delete the original data.
• Backing up = copy data, keep the original.
![Page 34: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/34.jpg)
Virus scanners
• Must have up-to-date virus definitions• Must be running all the time• Must be accurate:
– false-positives – wrongly believes a virus exists – false-negatives – fails to identify a virus
• Even market-leading products are imperfect• Some free products (e.g. Avira) outperformed
Symantec & McAfee in a test in 2009.
![Page 35: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/35.jpg)
Other scanners
• Malware – spyware, adware. Either does bad things (e.g. monitoring users’ actions) or is badly programmed and badly affects the stability of computers.
![Page 36: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/36.jpg)
Other scannersTrojan Horses – bad software installed by users
who think it’s innocent. Payloads:– Keylogger: records passwords, credit card info,
bank account logins & sends them to hackers.– Spamming agent: your computer acts as a zombie
sending spam on behalf of the hacker– Distributed Denial Of Service (DDOS)
attack: your computer is taken over and joins a concerted attack on a server chosen by the hacker.
![Page 37: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/37.jpg)
Firewalls• Closes unused internet communication ports• Your computer has 65535 of them, but you
only use about 3.• Hackers can gain entry to a PC through
unguarded ports• Firewalls close the unused ports• Open ports are watched to ensure only
authorised programs use them (preventing Trojans sending spam or DDOS attacks)
![Page 38: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/38.jpg)
Software Firewalls• Can be software or hardware firewalls• Software: Windows Firewall, Zone Alarm• Needs training when first installed. You teach
it which programs are allowed to connect to the internet
![Page 39: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/39.jpg)
Hardware firewalls• Routers – on all Local Area Networks, and in
nearly all home/office cable/ADSL modems• Can use Stateful Packet Inspection (SPI) to
examine inside data packets to see if they’re harmful.
• Protect against incoming bad data, but not outgoing bad data. If you’re already infected by a Trojan, a router won’t stop your PC sending spam, keylogs etc
![Page 40: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/40.jpg)
PLEASE NOTE
• A firewall (hardware or software) will not stop viruses!
• A firewall will not stop viruses!
• A firewall will not stop viruses!
• A firewall will not stop viruses!• A firewall will NOT stop viruses!• I’m glad we got that clear
![Page 41: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/41.jpg)
Classifying and naming files• Random file naming leads to confusion, time
wasting and difficulty finding information• Store all documents in one location, not
sprinkled around the computer and network!• Other team members might need to access
your documents, so they need to be able to find them simply by filename.
• With thousands of files, a ramshackle pile of careless filenames will become unmanageable.
![Page 42: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/42.jpg)
![Page 43: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/43.jpg)
File naming
• All team members must use the same sort of software – preferably the same version (e.g. MS Word 2007)
![Page 44: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/44.jpg)
Filenaming• Use a regular pattern in your filenames• E.g. all invoices begin with INV- with customer
surname+initials-date-your initials– INV-smithjs-20081228-KEL.xls
• Note the date code above: year (2008) month (12) day (28) so they sort nicely
• All team members must agree to and cooperate with the file naming scheme
![Page 45: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/45.jpg)
Directory/folder/site structures
• Logical directory structure and naming is vital on networks and web/FTP servers
• Should be hierarchical. E.g. website for team on the corporate site…– corporate.com (organisation’s site)– Corporate.com/vt (virtual team’s directory)– Corporate.com/vt/calendars (all calendars stored here)– Corporate.com/vt/calendars/fred.cal (fred’s calendar)
![Page 46: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/46.jpg)
Directory/folder/site structures
• Where would the team store minutes of their meetings?– Corporate.com/vt/minutes– Corporate.com/vt/minutes/2009– Corporate.com/vt/minutes/2009/hardware_team– Corporate.com/vt/minutes/2009/hardware_team/minutes_20091231.htm
![Page 47: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/47.jpg)
Valid alternative…– Corporate.com/vt/minutes– Corporate.com/vt/minutes/hardware_team– Corporate.com/vt/minutes/hardware_team/2009– Corporate.com/vt/minutes/hardware_team/2009/minutes_20091231.htm
•Both are organised and hierarchical•Different organisation of team/year importance.•Decision may depend on whether they will need to search more by team or date. •Naming schemes should complement the way the team will work.
TIP: Avoid the temptation to abbreviate too much: e.g. a path likeCorporate.com/vt/min/hw/09/m091231.htm
could easily become unintelligible.
![Page 48: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/48.jpg)
Version control
• Keeps tracks of documents as they are being developed
• Avoids confusion about which is the latest version
• Simple to achieve…
![Page 49: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/49.jpg)
Version Control
• Never re-save a document with the same name
• Can never recover the overwritten version• First save as document-v1.doc• Edit it, save as document-v2.doc• Re-edit. Save as document-v3.doc
![Page 50: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/50.jpg)
Software Versioning
• E.g FredSoft 7.1.2• Major version: 7• Minor version: 1• Subversion: 2
![Page 51: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/51.jpg)
Version Control
• Easy to keep track of which is newest• Especially if you have copies on your PC,
network, home PC, website and smartphone!• Also, can revert to a previous version if you
discover you’ve ruined the document.• All team members must comply with the
versioning scheme.• Can delete old versions when all is finished.
![Page 52: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/52.jpg)
Version Control System
• Automates version numbering of team documents
• Keeps track of when documents are copied, edited, saved etc
• Major software often has inbuilt versioning features (e.g. Word, wiki software)
![Page 53: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/53.jpg)
Version control
• See TRACK CHANGES in MS Word.• Tracks all changes made to a document.• Can undo changes made by someone else.
![Page 54: IT Applications Theory Slideshows By Mark Kelly mark@vceit.com Vceit.com Virtual Team File Management](https://reader036.vdocuments.us/reader036/viewer/2022062407/56649e555503460f94b4be43/html5/thumbnails/54.jpg)
By Mark [email protected]
These slideshows may be freely used, modified or distributed by teachers and students anywhere on the planet (but not elsewhere).
They may NOT be sold. They must NOT be redistributed if you modify them.
IT APPLICATIONSSLIDESHOWS