FocusStor, launches a new data backup & recovery softwareWritten by Marc Bulot
Continued from page 1
FocusStor uses 448-Bit AES (Advanced Encryption Standard) and 112-Bit Triple DES encryption with SSL (Secure Socket Layer) technology to ensure that data is secure. Data is transmitted and stored in encrypted format, so no one can access data without a personalized encryption key not even FocusStor can access client's data. We use reliable servers and storage machines at two mirrored data centers, protected by a high level of security. FocusStor backs up data over Internet nightly, automatically, security, quickly and all for a very low monthly fee. FocusStor is designed for companies with remote offices, as well as small and mid-sized businesses, that have primarily relied on in-house tape or disk backups to protect their data. FocusStor guarantees recovery of all business-critical data and enables companies to return operations to state they were in immediately prior to a data-loss event.
FocusStor Online Data Backup & Recovery Toll Free: 800-285-3084 Fax: 514-392-2501 Website: www.focusstor.net Email: firstname.lastname@example.org
FocusStor, Online Data Backup & Recovery (www.focusstor.net), the leading Canadian provider of disk-based backup and recovery solutions for small businesses since 1985
The Essentials of Wireless SecurityWritten by Daniel Robson
Continued from page 1
Of course this is a very worst-case example, and as such very unlikely. Even in today’s climate of moral decrepitude this sort of occurrence would, we hope, be extraordinarily rare. But hopefully it will help drive home point that securing your network should be taken very seriously indeed. But what can you do to protect yourself? I would recommend that all wireless networks should make use of WEP (Wired Equivalent Privacy) encryption option which comes as standard with almost all routers and base stations. Although turned off by default this feature is absolutely essential. Utilising either 64-bit encryption, which creates a 64bit encryption based on a 40-bit key with a 24-bit initialisation vector, or 128-bit encryption which makes use of a 104-bit key with a 24-bit initialisation vector, a secure password is created. This password should only be given to known and trusted wireless devices, blocking access to any interloper. This, although not secure against dedicated crackers, provides a more than adequate protection to dissuade nosy or vast majority of war-drivers.
Too few people enable this basic protection, or are even aware it exists. However in some regards protecting your network can be as essential as your childhood inoculation against tetanus. So please, take just a few minutes of your time to configure your WEP encryption, and to help protect yourself. For a more in-depth technical overview of points covered in this article you can visit http://www.iss.net/wireless/WLAN_FAQ.php, a very useful, if slightly esoteric, overview of various security concerns over standard 802.11 wireless specification.
Daniel Robson runs www.shock-therapy.org where among other things he hands out his freeware, other peoples freeware, and his views on a myriad of different topics.