On or Off?

by | May 18, 2015 | Uncategorized

Is it better for my computer to leave it on or shut it off when I’m not using it?

To my way of thinking, there are four main reasons to be concerned about leaving a computer on all day and night. They are: electricity cost, data security, damage from power spikes, and thermal/environmental issues. All of these can be causes of damage to your computer or files. All of these may require you call us for data recovery.

Electricity cost: According to the SETI@home program, it costs less than a dollar a day to actively run a computer for 24 hours. Most computers sold in the past few years have an energy-saving feature that puts the computer “to sleep” after a while. My unscientific estimate is that leaving a modern computer on all day and turning it off at night probably costs about 35 cents.

Data Security: If you have a dial-up modem, there’s little to worry about, as long as your modem disconnects after your session is over. If it doesn’t, you can set it to do that. If you have a cable modem, DSL (or other broadband), you should have a firewall. It’s better still to get a router that lets you turn access off and on with a switch. Turning off the router or turning off the computer makes your data safe from hackers.

Power Spike Damage: You’ll find that experts disagree on the subject, but here’s my rule of thumb: turn your computer on when you first use it, and turn it off at the end of the day. There are some exceptions. If you’re only planning to use it once during the day, then turn it off right after you use it. It’s a good idea to shut down the computer before using power tools, air conditioning, washer, dryer, laser beam, or light saber. If you’re expecting a brownout or a thunderstorm (not common occurrences on the Central Coast!), you should shut down the computer as well. If a power surge crashes your computer, we can usually recover the data. There are things that you can try as well.

Get a UPS: No, not the shipper, but an Uninterruptible Power Supply. Power spikes can damage your computer, and worse, your data. A UPS has several outlets for you to plug your computer’s power cord into and the power is supplied by a battery inside the UPS. The UPS is hooked up to a wall outlet, so the battery is continually recharged. This keeps voltage spikes from affecting your computer. It also gives you a few minutes to shut the computer off. Otherwise a power loss may do it for you and damage your computer and its data.

Can’t I just get a surge protector? Surge protectors don’t stop all the power spikes or variations, and they don’t help at all in a brownout or blackout. A UPS can be had for as little as forty dollars. Get a UPS and practice safe computing!

Environmental/Thermal Issues: One of the biggest sources of failure for disk drives is heat. The inside of your computer is hotter than the room that it’s in. When we are away from the computer, or from the house or office, we are not likely to be monitoring the temperature inside. A very popular brand of disk drive is not supposed to be operating at a temperature over 95 degrees Fahrenheit.

One sure fire way to have the drive not operating at such temperatures is to have it off when you are not around. It is likely that many head crashes result from too-hot conditions. We have recovered hundreds of disk drives with crashed heads, but they account for the most difficult and expensive data recoveries. Nonetheless, the odds are not bad for recovering data from drives with crashed heads. If this has happened to you, drop us a line.

Subscribe to our free and informative weekly forensics newsletter!

 

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Pin It on Pinterest

Share This