All computer s need security against objectionable files to ensure that all content that may be harmful is kept away from the system. Preventive measures will not only ensure that your system is free from viruses but also stop all unauthorized users with an intention of bringing about any harm (Rosenman, 2009). Therefore, the technician has a sole responsibility of ensuring that they carry out frequent checkups using appropriate tools to verify and remove unwanted files from computers. Many objectionable files are frequently in the form of cookies or hidden files hence hard to be located and identified and nearly impossible to be deleted. This therefore calls for special tools which can easily find these files; a good example of tools that is commonly used is ContentCleanupTM? that not only solves the problem but also helps improve the performance of machine by freeing up helpful disk space on the hard drive.
Installation of anti-virus software is one of the best ways of dealing with objectionable files. This has however to be from a renown and a reputable company. It has to be updated and used regularly to ensure effective working. Other than just scanning for viruses a good technician has to install an on access scanner and have it configured so that it can automatically begin whenever the system is booted. This will offer extra protection because it will check for viruses and other objectionable files every time one accesses executable files (Mckay, 2010). The technician has also to scan any new programs or other files that may be carrying objectionable files for viruses before running or opening them. This has to be done for all materials regardless of their sources because there are commercially distributed disks and CD-ROMS that spread virus infections.
This is an undertaking that computer technicians have to perform most of the times when the computers are full of objectionable content to a point of slowing down in operations and even crushing. This is one way of getting rid of all unwanted content from the system because it will erase all the data from the hard drive being formatted. However, it has to be emphasized that before formatting, one should first back up all the important data.
As discussed earlier, the internet is a major source of objectionable files and it is very important that technicians dealing with computers that are connected on internet put adequate measures to make sure that they minimize if not completely protect their systems from malicious files generated over the internet (Leaman, 2009). Objectionable content on the internet is very dangerous and can easily get into the hands of children. For this reason, parents have to work hand in hand with the technicians in striking a balance in protecting children on internet while at the same time allowing them to discover the digital world. To deal with this, there must be internet content filtering that will protect them from obscene websites, materials, predators and other objectionable content and chat rooms.
Legal action can be taken against all those who spread objectionable content on the web. Although it is hard to identify all those who spread malicious data on the internet or through some other means, they can be discovered using their IP addresses. Toady, there are many people whose legal actions have been taken against for spreading objectionable files like pornographic materials. For instance in America some two collectors of child sexual abuse images were jailed in 2009 and efforts to track them down have been increasing day by day. Computer programmers who process objectionable publications also face the law for spreading them. Any technician should therefore exercise refrain from such behavior (Leaman, 2009).
All the above measures can only work if the technician is very careful to avoid the influx of unwanted files in the system. Technicians have to be or advice their clients to exercise extreme caution when it comes to accepting any files from different sources or getting programs and other files throughout on-line chat sessions (Mana Media, 2004). This is one of the common ways in which objectionable contents find there way into computer systems. Incase of any family member using the computer especially young ones, they have to be warned not to accept any malicious or any form of files unknown to them.
Regular backups have also to be exercised as part of being careful. This is because some objectionable files normally erase or corrupt files on computer hard drives. The only way a technician of or any computer user can recover lost data is through recent backups. If it is not possible to backup the whole system, then it is advisable to at least backup files which are very important and difficult to be replaced (Barry, 2010).
It also calls upon the technician to be ethical enough and morally upright especially when handling machines that are frequently used by children. They should ensure that there is no any adult content in the system or incase any exists; they have to be hidden or stored with passwords to deny them access (Melvin, 2010).
Objectionable files are almost inevitable in computer systems as sometimes they get in to the system without the attention of the technician or the computer user. Sometimes they appear in the systems as hidden files and very difficult to be identified and cleared. Viruses and other objectionable files get into computer systems using various means like exchange of infected materials like CD-ROMS or from the internet. Whenever one visits websites, most of the unwanted images, pictures and other contents get downloaded on the computer. This is very harmful because they end up corrupting and deleting other important files other than slowing down the whole computer system. Pornographic content is also not good for children and therefore measures have to be taken to protect all computers against all forms of objectionable content. Technicians can detect and deal with this through various ways including: frequent computer checkups, installation of anti-virus, formatting the machines, using various tools for internet filtering, seeking legal actions against those who circulate the materials and above all being extra careful in all the operations.