Cyber Warfare

Written by Richard Lowe

Continued from page 1

Have you defined a DMZ? - If you manage a network for a company, you should reexamine your firewall strategy to ensure that you have a proper DMZ. What is a DMZ? To simplify it a bit, it's a way to protect your application servers even if your web servers are compromised. You have your core application systems behind a firewall. Onrepparttar outside of that firewall you place your web servers. Then to protect them you put another firewall.

Is your virus protection adequate? - If you haven't installed antivirus software by this time, shame on you. It does not matter whether you run a network of ten thousand computers or a cheap home system, you'd better have this basic application not only installed, but regularly updating.

Is your system patched properly? - All vendors release software with bugs. It isrepparttar 132119 responsibility of all system managers to periodically review operating system and applications patches and releases and update them as needed. Remember, evenrepparttar 132120 Apache web server is ridiculously insecure if not properly patched.

Are you educated on security? - If you haven't already, look around and find some books, classes or information about security. Become educated as fast as you can. Once you understand security, then propose, plan and implement what you have learned.

Do you perform background checks on IT related positions? - All new hires into IT should have thorough background checks before they are hired. You should also checkrepparttar 132121 backgrounds of all of your IT consultants. It's best to know who you are hiring before you hire.

Is your user community educated about security? - Perhaps one ofrepparttar 132122 best tasks you can perform is to educate your users on good security practices. Emphasizerepparttar 132123 reasons why security is important and how it protects your users. I usually stress that security penetrations are a direct threat to their employment. Spend some time explaining and demonstrating how social engineering works - this isrepparttar 132124 number one way break-ins occur.

Do you have a working disaster plan? - To be perfectly prepared, ensure that you have a working, tested, debugged disaster plan ready at all times. That way if for some reason your primary systems are rendered useless you can still have a running company.

Is your security plan confidential? - The less information you have available to evil-doersrepparttar 132125 better. Keep any information about how your systems are secured confidential - treat it on a need-to-know basis.

Remember this important fact. As of September 11threpparttar 132126 United States and all ofrepparttar 132127 free nations are in a war. And when your country is in a state of war you had better be prepared to be attacked. It'srepparttar 132128 only sane thing to do.

Richard Lowe Jr. is the webmaster of Internet Tips And Secrets at - Visit our website any time to read over 1,000 complete FREE articles about how to improve your internet profits, enjoyment and knowledge.

Backing Up Your Stuff Part 3: Software

Written by Richard Lowe

Continued from page 1

- I created a similar profile for my desktop themes, ICQ skins, wallpaper and screen savers.

- I created an automatic profile to perform a disk-to-disk backup of all of my data very few hours. Second Copy only copies those files that have changed sincerepparttar last run. This gives me a very up-to-date backup in case I have a system failure.

InSync - Another great product is called InSync (again, this is not an affiliate link and we will make no money if you purchaserepparttar 132116 product). This is similar to Second Copy, although with not as many options. InSync is great for making copies of directories or entire disks very quickly. Like Second Copy, it is very inexpensive - around twenty dollars.

Backup Exec - If you choose to use tape as your backup media, then you are stuck with Backup Exec or a similar product. I have used Backup Exec in both my work (to back up over 100 servers) and at home, and to tell yourepparttar 132117 truth I have found it to be lacking in numerous regards. The product will dorepparttar 132118 job, but it tends to be fickle and full of bugs. Add to thatrepparttar 132119 problems associated with tape drives (bad media, no random access) and you've got a backup scheme which isrepparttar 132120 bare minimum.

Whatever comes withrepparttar 132121 hardware - Virtually all backup hardware will come with some software which performs backups. If you are strapped for cash, you can use this software. It will performrepparttar 132122 job, although perhaps not as well as you would like.

Recommendations - Personally, I use both Second Copy and InSync. Second Copy is better for backing up things like my Outlook Stationary, Desktop themes and ICQ skins. InSync is great for making mass copies of large directories and entire disks (it is faster than Second Copy but not as flexible.)

Richard Lowe Jr. is the webmaster of Internet Tips And Secrets. This website includes over 1,000 free articles to improve your internet profits, enjoyment and knowledge. Web Site Address: Weekly newsletter: Daily Tips:

    <Back to Page 1 © 2005
Terms of Use