FocusStor, launches a new data backup & recovery software

Written by Marc Bulot


Montreal, Canada, April 28, 2005

FocusStor, Online Data Backup & Recovery (,repparttar leading Canadian provider of disk-based backup and recovery solutions for small businesses since 1985, today released their newest offsite storage software. In today's insecure world, cables become unplugged, electronics fail daily, disks stop turning, viruses and hackers burden businesses constantly, and regardless of specific backup procedures, electronic records will continue to be discarded and overwritten. Each year businesses loose billions of dollars due to data loss. The factors used to determinerepparttar 135985 viability and business continuity for an organization that has suffered from a significant system or data loss does not rely strictly onrepparttar 135986 ability to replace hardware or rebuild infrastructure. In most cases continued success relies heavily onrepparttar 135987 ability to quickly and successfully recover business critical data. Considering it's one ofrepparttar 135988 key deciding factors in whether your company will remain in business, shouldn't a company be prepared to makerepparttar 135989 needed data protection decisions up front? Indeed, they should, and that is why FocusStor offers a highly secure data back up technology.

The Essentials of Wireless Security

Written by Daniel Robson

With wireless networks proliferating it is becoming more important than ever that sufficient security measures are put in place. And yet many people, especially those new torepparttar technology or computers in general, are just not aware ofrepparttar 135826 dangers of not properly securing a wireless network.

Typically ‘normal’ users of products such as wireless routers dismiss any security concerns as only really being applicable to commercial concerns. After all, who would be interested in a small local set-up of two, maybe three computers? You may be surprised. There are many horror stories circulating about unsecured wireless networks, and unfortunately there is a grain of truth in most of them. The most common form that a danger to a private network can take is known as variously as ‘War-driving’, ‘war-walking’, ‘war-flying’ or ‘war-chalking.’ This involves an unscrupulous person literally driving, walking or even flying around in an attempt to find an unsecured wireless network. Once one is found a nearby wall is commonly ‘chalked’, indicating to any other passer-byrepparttar 135827 presence of a ripe target. The name itself is taken fromrepparttar 135828 act of ‘war-dialling’, a term coined byrepparttar 135829 film ‘WarGames’, where random telephone numbers were dialled inrepparttar 135830 hope of finding a computer onrepparttar 135831 other end ofrepparttar 135832 line.

If a network is found, thenrepparttar 135833 potentialconsequences can range fromrepparttar 135834 fairly innocuous torepparttar 135835 criminal. Atrepparttar 135836 very lowest level a third-party can connect torepparttar 135837 network and accessrepparttar 135838 Internet connection fromrepparttar 135839 router. Ifrepparttar 135840 legitimate owner ofrepparttar 135841 network is on a capped service this can consume a considerable chunk of their bandwidth, leading to extra charges being levied for resources which they never realised were being used. Of far more consequence are some ofrepparttar 135842 uses to which this stolen bandwidth could be put. In a worst case example a paedophile cruising aroundrepparttar 135843 area could spotrepparttar 135844 chalk marking and connect torepparttar 135845 compromised network. Withoutrepparttar 135846 knowledge ofrepparttar 135847 network owners they could connect to any manner of illegal sites, with no record of their passing traceable to them. Becauserepparttar 135848 trail would stop cold atrepparttar 135849 door ofrepparttar 135850 person who has provided them withrepparttar 135851 free access.

Cont'd on page 2 ==> © 2005
Terms of Use