Créer mon blog M'identifier

Understand Different Backup Online Storage

Le 7 juillet 2016, 05:34 dans Technologie 0

The medium chosen for backing up data depends on the volume of data, and also the nature of the data.

The most common type of media backup used is CD-R and CD-RW. The first one is cheap but you will use a lot of them for a full backup storage because they hold only 650 MB of data. The second is more expensive but has the ability to be written on again and again. It is a good choice for obtaining backups, and is one of the favourite choices in both domestic and corporate spheres. It is cheap, portable and compatible with several file formats.

External Hard Drives: For larger data storage backup requirements, external hard drives are excellent solutions. Arrays or stacks of hard drives are available for corporate purposes. Several hundreds gigabytes (e.g. 320GB or 500GB) is common size for hard-drives. You can even find 1 TeraBytes hard drives now.

These are the new favourites all over the world. The storage space of flash drives is constantly increasing. The common  huawei storage space of USB device is 4GB, 8GB and 16GB now. And the price of USB device drops rapidly. It does not require a separate software or booting up of the machine to start functioning, and it is very convenient to share the data stored on them.

DVD is a good choice for backing up data. It may not be as cheap as the CD, but offers better quality, and has more space. It can hold around 4GB of data. DVD supposed to be last longer than CD.

Online and Offline Storage Spaces: These are "spaces" provided by professional firms, and are extremely secure for sensitive data online storage. But you need to rely on the provider services. The quality and security are all depends on the services provided by the company.

You can choose your backup medium according to your specific needs, like the backup and storage volumn, frequency, restore process and also your budget.

Isaac Chu is Project Director of Evinco Solutions Limited. Evinco provides innovative business software, include emarketing web solutions, email marketing software, e-catalog publishing software, invoicing software, and electronic cheque writer.

The recently launched online backup service

Le 6 juillet 2016, 08:22 dans Technologie 0

KarlsReviews.com is proud to announce it's in-depth review and expose of GotBackup, the recently launched online backup service. GotBackup is the "new kid on the block" in the competitive, ever-changing field of automatic data backup solutions and cloud storage.

"One click" installation: Easy to use interface Completely unlimited file storage: No limits, no restrictions Backup of folders, drives and even network storage devices (NAS) AES-256 bit military grade encryption (transfer and storage) File versioning (up to 30 backups kept per file) & deleted file recovery Windows or Mac (identical experience on both platforms for seamless use) User controlled bandwidth throttling: Set it to max or dial it back Multiple data centers worldwide: Faster transfers and better data protection 24/7 live support via chat and email

The goal KarlsReviews set for itself was to see how well GotBackup fared against the competition and determine if it lived up to it's claims. The detailed review explores these questions and more.

Click here to read the full, uncut review for the whole story.
The GotBackup online backup service was found to have most of the same features as established industry leaders, and a few unique ones. The more or less "standard" features include:

"I put GotBackup through it's paces on one of our heavily used computers. Installation was fast and easy, and overall, the software performed as expected," said Karl of KarlsReviews. "There were quite a few things I really liked about this particular online backup service -- it is really fast -- and a few I didn't."

Features that were found to be unusual or unique to GotBackup include:
File sync across all devices: Desktop, tablet, cell phone, laptop, etc. Real-time streaming of movies and music from anywhere, to any device Up to five computers or devices on a single plan • Access to files via web, iOS, Android, Windows and even Blackberry

Currently, GotBackup has a $1 one week trial for it's online storage backup service, and stands behind it's service with a 30 day, no-questions-asked, money back guarantee.

Span ports switches are used for other monitoring needs

Le 4 juillet 2016, 08:58 dans Technologie 0

Cyber warfare is unfortunately no longer found only in speculative fiction; it is with us today. Distributed denial-of-service (DDoS) attacks have been launched against the United States, South Korea, Kyrgyzstan, Estonia, and Georgia in recent years, and military and government computer systems around the world are assaulted by intruders daily. Some attacks come from nation-states, but others are perpetrated by transnational and unaligned rogue groups. Those bent on inflicting harm on nations and citizens not only use networks as an attack vector, but also for organizing, recruiting, and publicizing their beliefs and activities.

Terrorism informatics analyzes information from data-at-rest sources such as blogs, social media, and databases. For other types of analyses, it is necessary to examine data in motion, in other words, information as it travels on a network. Access to data-in-motion is often obtained by eavesdropping on the network traffic using Span ports in vlan switches. This paper focuses specifically on the implications of using Span ports in counter-terrorism monitoring applications. It shows that Span ports are particularly ill-suited to this use. Note also that the security vulnerabilities of Span ports in counter-terrorism applications apply equally when Span ports are used for other monitoring needs such as performance or compliance monitoring.

The first issue with Span ports in a counter-terrorism application is that the visibility of network traffic is less than perfect. In counter-terrorism monitoring, a fundamental requirement is that the security device must be able to see every single packet on the wire. An IDS cannot detect a virus if it doesn't see the packets carrying it. Span ports cannot meet this requirement because they drop packets. Spanning is the switch's lowest priority task, and Span traffic is the first thing to go when the switch gets busy. In fact, it is allowable for any port on a switch to drop packets because network protocols are specifically designed to be robust in spite of dropped packets, which are inevitable in a network. But it is not acceptable in a counter-terrorism monitoring application.

Different switches may be more or less prone to drop Span packets depending on their internal architecture, which varies from switch to switch. However, it is unlikely that the performance of the Span port was evaluated as an important criterion when the switching gear was selected. As a counter-terrorism professional, you probably don't want your security strategy to be dependent on a procurement policy that you don't control.

Nevertheless, suppose you do have lan switches with the best possible Spanning performance. Dropped packets may still be an issue depending on how much traffic you need to send through the Span port. If you need to see all of the traffic on a full-duplex 1 Gigabit link, a 1 Gigabit Span port won't do the job. Full duplex link traffic exceeds the 1 Gigabit SPAN port capacity when link utilization goes above 50 percent in both directions. To see all the traffic, you need to dedicate a 10 Gigabit port for Spanning, and now the Span port doesn't seem so inexpensive any more.

Voir la suite ≫