User manual

Table Of Contents
Installing, running, and upgrading anti-virus software | 201
1 Disruption, theft, or damage to network infrastructure such as servers,
networks, data storage, or data backup storage. Damage can be caused by
password crackers or by other types of malicious sabotage and destruction.
Most incidents originate from within the organization.
1 Disruption or damage to the organization infrastructure such as building
fires, environmental or biological hazards, floods, and so on.
1 Disruption or damage to the public infrastructure, including electrical
power, telecommunications (voice and data), transportation grids
(roadways, buses, trains) caused by environmental conditions, or severe
weather such as tornadoes or floods.
FileMaker Pro provides two mechanisms for handling databases that might be
damaged: consistency checks and file recovery. Consistency checks occur
automatically, if needed, when the file is opened. You can also choose to verify
the consistency of a file that you suspect is damaged. You can also have
FileMaker Pro attempt to recover a damaged file. For more information about
checking consistency and recovering files, see Help.
Important In the event of a server failure, such as an unexpected loss of power,
hard drive failure, or software failure, use the backup files. Any system failure
causing FileMaker Server to shut down inappropriately can result in corrupted files
if cached data was not written to disk and the files were not closed properly. Even
if the files re-open and go through a consistency check or recovery (initiated by
either FileMaker
Pro or you), corruption might be buried in the file. File recovery
cannot guarantee that problems have been fixed.
Installing, running, and upgrading anti-virus software
Because most computers have internet access, they are vulnerable to viruses
being transmitted through email attachments. Make sure all employees run
anti-virus checking software regularly, and that they are aware of typical virus
warning signs. Employees should scan all files before copying or downloading
them to their computer, and they should never open unsolicited attachments,
even if they’re from someone they know.
While anti-virus software is essential in protecting your systems and data,
some caution should be observed in how they are used on computers that host
FileMaker
Pro databases.
φμπ10_υσερσ_γυιδε.βοοκ Παγε 201 Μονδαψ, Αυγυστ 25, 2008 3:59 ΠΜ