IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Tape virtualization guidelines

29 June 2010 By Saran

mainframes

Greg Schulz of Computerworld shared some guidelines of tape virtualization. Tape virtualization is one of the popular topics when it come to storage. Some of the said advantages of making virtual tape libraries would include improvement of the performance of the back up, archiving and other related processes and smooth transition (from tape-based to disk-based).

Here are the ten points he raised in his article:

1. Integration of VTL in your business continuity, conditions of your site/location.
2. Storage devices to be attached to the VTL.
3. Projected storage capacity needed in the future.
4. Backup, archiving, etc. software supported.
5. Support of differencing or single-instance repository capabilities.
6. Determine if you are looking for a turnkey solution.
7. Resiliency and redundancy needed.
8. Security level needed.
9. Tape device and library emulation for your environment.
10. Necessary changes to your current setup.

The questions he raised in his article really make you consider your needs and the conditions of your system. All these questions will help you evaluate if you would use virtualization. You cannot just decide right away if you will use VTL because it could affect your system in a major way.

It is always good to look at the possibilities before arriving at some decisions like this one. It is best to do a full study before you spend on it. One of the important things you also have to consider would be the people who would be in charge of this project in your company. Who will be the ones in charge of the study and the follow up in case you do push through with it. Your data will be at stake so it is better to be safe than sorry.

Filed Under: Backups, Physical Security, Storage, Tips Tagged With: Backups, Physical Security, Storage, Tips

Sharing your computer and keeping your files intact

18 June 2010 By Saran

computer sharing

Living at home means that you have to share your computer with other people. In some companies, people also share workstations in case that they have different work shifts. In any case, it is important for you to make sure that your files are safe. Especially those that you use for work and those that contain confidential information.

Here are some tips for you:

  • Make sure you are using a password that is not easy to guess.
    If people know you well enough, they could probably figure out what password you will use. People tend to use passwords based on words, names and dates that important to them. Examples are pets‘ names and anniversaries. If you do this, chances are those who know you will be able to log in your computer using your account. Try changing your passwords every so often and make sure that they will be easy for you to remember but difficult to guess. Think of some cipher for it.
  • Set permissions on your files and directories.
    You could set that your files and directories will only be accessible to you. Do a chmod on them. Then again, whoever has root access will be able to get through. Maybe it would be easy for you to do this if you are the one with root access.
  • Protect your files with passwords.
    Although not everyone agrees with this, some people do this for their own sake. They feel better to have password protected files. A drawback, of course, is that if it has a difficult password to remember, you might as well have deleted your files.
  • Log out of your account or profile.
    If you have set your file permissions that you are the only one who can view, edit and execute the files, it will be pointless if you don’t log out. When you are the one who is still logged on, you leave your entire session open for intrusion.

Hopefully these tips have helped you deal with some of your dilemmas with regards to sharing your computer with other users.

Filed Under: General, IT Security Basics, Privacy & Anonymity, Real-World Issues, Tips Tagged With: computers, General, IT Security Basics, omputers, people, Privacy-&-Anonymity, Real-World Issues, security, Tips

Data Recovery and Restoration

20 January 2007 By Saran

Most databases are usually backed-up at certain scheduled times, largely due to avoid possible data corruption stemming from system crashes. It is best to back-up regularly and store them in another external storage data, usually in the from of back-up tapes or compact discs, so that historical data can be rolled back towards the actual time where the data had been stored.

Periodical Data Back Ups

Ideally, people who are not in business would not resort to a data backup regularly. The degree of importance of certain documents may not be as essential compared to that of business entities. The importance of archiving pertinent documents would not usually be realized unless they really find themselves on the spot.

It is true that people will only heed warnings once they have actually occurred. But to people who have already been through this process would agree that it provides more discomfort and problems rather than being at ease when such unforeseen events would take place.

[tags]back-ups, data recovery, data restoration[/tags]

Filed Under: Backups, Real-World Issues, Tips Tagged With: back-ups, Backups, data-recovery, data-restoration, Real-World Issues, Tips

Unveiling Operating System Secrets

16 January 2007 By Saran

The complete commands and processes to which a computer operates cannot be covered in a day nor will be remembered in one sitting. Ideally, only the important things for consideration such as that of user friendly commands to allow proper interface between the computer and the user behind the keyboard will always be the only know-how that would remain.

Computer Secrets

Computer operating systems such as Linux and Windows offer a wide variety of benefits for people, especially in maximizing the capabilities of a computer and the installed software. Speed and reliability are among the important aspects that computer owner will always want and to be able to perform them, proper identification and references would need to be researched on.

It is a given that most people would not spend time studying all the aspects of a computer system. However, there will be instances when such accidental discoveries from exploring the computer operating system and its resources would ignite interest and push a person into further exploring information surrounding the issue and perhaps look at other benefits that operating systems provide but are not given much attention.

[tags]windows, linux, secrets, system hints, system resources[/tags]

Filed Under: Cryptography, IT Security Basics, Operating Systems, Programming, Tips Tagged With: Cryptography, IT Security Basics, linux, Operating Systems, Programming, secrets, system-hints, system-resources, Tips, windows

Hiding Identities Online

12 January 2007 By Saran

For bloggers and writers, using pen names has been a normal scenario, some of which who would want to keep their identities apart for privacy reasons. While some would not care and would want to gain the due recognition for their work, it entirely depends on what the blog or composition is all about.

Hiding your Identity

Privacy over the Internet is only normal. Who would want to be cited for something which may become a means of ruining their reputation online? Risky is the right term for most people, but upon voicing opinions, making a stand and living by what you believe in despite what critics may eventually say is something that people would want to be known for.

For sure, this may draw varied criticisms and comments, but the bottom line of it all is that it depends on how daring a person can get and up to what extent he is willing to push himself.

[tags]privacy online, identities, pen names[/tags]

Filed Under: Privacy & Anonymity, Tips Tagged With: identities, pen-names, Privacy-&-Anonymity, privacy-online, Tips

MajorGeek.com: A Download Site for Computer Care

8 January 2007 By Saran

Major Geek

Day-in and Day-out, people surf the web for possible downloads in the form of drivers, security stand alone cleaners, and free programs that will help them in their specific needs. One drawback is the potent threats and reliability of such sites since everyone is aware that such malicious Spyware or Trojans may be present in these programs which are usually compressed in zip files prior to free downloading.

Majorgeeks.com is one site that contains a lot of the helpful tools to aid computer users in their everyday issues and improvements for their overall operating system and performance. One notable thing that most users are aware about is that of intrusions in their system from the usual cookies and attachments that people get from the Internet. With the mischief going around, no one really knows how safe their computer is and what files are needed and not on their hard drives.

Filed Under: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips Tagged With: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security