What is Disk Defragmentation? Should We Defrag Computer?

You may have heard that computers need a thing called Defragmentation, we believe that by defragmenting the computer it becomes faster to read data. This is often recommended for those of you who want to improve the performance of your computer. But do you know the meaning of Disk Defragmentation itself? And how often do we need to defrag the storage drive?

As the name suggests, Disk Defragmentation sounds like bringing the shards back together. In the case of computers, this has to do with making scattered and separate data on the hard disk collected in the same place/nearby.

How does the Disk Fragmentation process occur?

Most computer hard disks have a rotating pattern so that the hard disk puts data in different places when writing new data, data blocks are created according to the order in which the commands are given.

When Disk Defragmentation takes place, the data blocks that have been made are collected sequentially again so that in the future the work of reading data will be easier, thus removing the distance between data files on the hard disk so that it speeds up your computer’s work.

Should we defragment the computer manually?

To this day, Disk Defragmentation is believed to be a routine activity that must be carried out so that the computer continues to run normally and well. Fortunately for you users of windows and other modern operating systems such as Windows 8.1, Windows 10, MacOS, etc. Perform this process regularly and periodically automatically. so we don’t have to worry about defragmenting manually anymore.

No need to do Disk Defragmentation when using SSD

If your computer uses an SSD system base, you no longer need to defragment it. Because SSD-based systems don’t use a rotating pattern so it doesn’t take much time to read data from anywhere on the drive. Modern operating systems have their own applications in SSD-based optimization.


Understanding Computer Servers

24/7 online servers

From the above definition it is clear, to create a server you need a server application and a physical computer that is used to run the server application.

A server is designed not to die and must be online continuously 24 hours without stopping.

Big Server Placed in Data Center

Servers are generally stored in a facility/place called a Data Center, inside the data center is equipped with stable electricity that never dies, air conditioning or air conditioning system and a stable internet network because the server must be accessible 24 hours non-stop. and can’t die.


The data center provides physical server rental and rack space rental services that are very much needed by companies that want to create backup servers (disaster recovery), colocation or even main servers.

So you just have to choose whether to rent a physical server or take your physical server to live and be cared for in a data center with guaranteed safe and comfortable facilities :D.

The rental fee depends on the services provided by the data center manager, such as public IP, internet speed, electricity, server manager licenses, etc. which will be used by the server you have.

In this datacenter, all servers are placed, the server owner only pays the rental fee for the server that is entrusted.

Small Servers Don’t Have to be in DataCenter

For a server with a specific purpose, it must be placed in a data center facility, but there are several servers that you can create and place at home, office, school or company.

Servers like this are called local servers/premises servers which are designed and made only for internal use by companies/offices/schools/private via a local network.


10 Ways to maintain privacy on the internet so that your data is safe

1. Use a VPN

Pay attention to the security of the VPN you will use – EKRUT

Virtual private network (VPN) is a popular device that is used as internet censorship in schools and offices.

Basically, these devices move your Internet connection to a different location. So, you are not easily identified to the sites that are tracking you. By combining a VPN with other security protection tools, you can increase your protection.

2. Create a strong password

Change passwords regularly – EKRUT

Passwords are the first line of defense against malicious hackers trying to access your account.

Don’t use easy-to-guess passwords. Use long passwords and mix letters, numbers, and symbols. It’s best to avoid using real names or other information that other people can easily guess.

3. Activate two-factor authentication (2FA)

Don’t give OTP code to other people – EKRUT

Two-factor authentication requires a code outside of a password to log into certain accounts. This can be a code sent to you via text message or email.

This second layer of protection can protect you, should your password be compromised in any way.

4. Apply encryption

Encryption prevents others from monitoring your network and the information you enter on the sites you visit – EKRUT

Encryption is very important to keep your personal data safe on the Internet. Encryption works by scrambling everything you send over the network.

This prevents other parties from monitoring network activity from the information you enter on the sites you visit.

5. Have a backup email

Use backup email to avoid spamming – EKRUT

To protect the privacy of your social media and internet accounts, you also need to use a backup email. Almost every web requires an email address if we want to use their services.

If you visit a trusted site, then security is not a problem. But unfortunately, there are many sites with questionable reputations. By having a backup email, you avoid spamming. So, your activity in the main email will not be disturbed.

6. Select private browsing or incognito mode

The way to maintain privacy on the internet is to use incognito mode when browsing – EKRUT

History and passwords stored in browsers can make you vulnerable to security threats.

Fortunately, modern browsers already have a private browsing mode or an incognito mode. Incognito mode makes Chrome delete all history and cache data when you close the browser window.

7. Use a tracker blocker

Tracker blockers can solve your data leak – EKRUT

Most sites on the internet use some sort of tracking or analytics platform. These trackers allow websites to track their marketing effectiveness and get information about the number of visitors.

Unfortunately, this tracker also collects your data, such as your IP address, location, and device type. Therefore, use a tracker blocker to anticipate it.

8. Block ads

Ad blockers can also speed up the loading of visited sites – EKRUT

An ad blocker is similar to a tracker blocker in that it works by detecting ads on a page and blocking them from loading.

In addition to protecting you from the data collection that these ads can do, ad blockers can speed up loading times on the sites you visit. So, it’s a good idea to use Ad Blocker to protect privacy.

9. Clear cookies periodically

Delete cookies regularly – EKRUT

Cookies are small text files that are stored on your computer. Cookies usually contain a small amount of information related to your web browsing and device.

Sites you visit use cookies to keep you logged in to those sites. On the one hand, cookies do make your browsing activity easier. However, they also actually track your activity!

10. Be careful in giving permission

Don’t give access to just anyone – EKRUT

When downloading an app on your phone, you may be asked to grant certain permissions. Take care when accepting these terms.

Because, this app might request unnecessary access to your camera or microphone. Granting app permissions without being aware of the ones you consent to, can lead to an unintentional breach of privacy.

By knowing these ten ways to protect your privacy on the internet, you can take better care of yourself in cyberspace. Make sure all your data is kept safe and don’t share personal data with anyone.