FocusStor, launches a new data backup & recovery software

Written by Marc Bulot

Continued from page 1
FocusStor uses 448-Bit AES (Advanced Encryption Standard) and 112-Bit Triple DES encryption with SSL (Secure Socket Layer) technology to ensure that data is secure. Data is transmitted and stored in encrypted format, so no one can accessrepparttar data without a personalized encryption key not even FocusStor can access client's data. We use reliable servers and storage machines at two mirrored data centers, protected by a high level of security. FocusStor backs up data overrepparttar 135985 Internet nightly, automatically, security, quickly and all for a very low monthly fee. FocusStor is designed for companies with remote offices, as well as small and mid-sized businesses, that have primarily relied on in-house tape or disk backups to protect their data. FocusStor guarantees recovery of all business-critical data and enables companies to return operations torepparttar 135986 state they were in immediately prior to a data-loss event.


FocusStor Online Data Backup & Recovery Toll Free: 800-285-3084 Fax: 514-392-2501 Website: Email:

FocusStor, Online Data Backup & Recovery (, the leading Canadian provider of disk-based backup and recovery solutions for small businesses since 1985

The Essentials of Wireless Security

Written by Daniel Robson

Continued from page 1

Of course this is a very worst-case example, and as such very unlikely. Even in today’s climate of moral decrepitude this sort of occurrence would, we hope, be extraordinarily rare. But hopefully it will help drive homerepparttar point that securing your network should be taken very seriously indeed. But what can you do to protect yourself? I would recommend that all wireless networks should make use ofrepparttar 135826 WEP (Wired Equivalent Privacy) encryption option which comes as standard with almost all routers and base stations. Although turned off by default this feature is absolutely essential. Utilising either 64-bit encryption, which creates a 64bit encryption based on a 40-bit key with a 24-bit initialisation vector, or 128-bit encryption which makes use of a 104-bit key with a 24-bit initialisation vector, a secure password is created. This password should only be given to known and trusted wireless devices, blocking access to any interloper. This, although not secure against dedicated crackers, provides a more than adequate protection to dissuaderepparttar 135827 nosy orrepparttar 135828 vast majority of war-drivers.

Too few people enable this basic protection, or are even aware it exists. However in some regards protecting your network can be as essential as your childhood inoculation against tetanus. So please, take just a few minutes of your time to configure your WEP encryption, and to help protect yourself. For a more in-depth technical overview ofrepparttar 135829 points covered in this article you can visit, a very useful, if slightly esoteric, overview of various security concerns overrepparttar 135830 standard 802.11 wireless specification.

Daniel Robson runs where among other things he hands out his freeware, other peoples freeware, and his views on a myriad of different topics.

    <Back to Page 1 © 2005
Terms of Use