Our social:

Latest Post

Saturday, 19 October 2013

Files That Can Be Stored In The Cloud Storage




With the virtual disk, you can store files from various extents, in the same way as it does with the physical hd. The difference is that the HD will continue to operate on a virtual platform to which it has remote access from any device with an internet connection. Furthermore, storing files online are completely safe, as there is no risk of losing data due to possible instabilities operating systems or damage to external hardware such as cd, dvd and pen drive.

Possibilities and advantages of saving your files in “cloud data center“

Video Library

Drama, adventure, suspense, horror, comedy, romantic comedy, animations and more varied series. Have your own movie collection and the best possible environment: The virtual hd can be configured on the “cloud”. Using cloud storage services, you can organize all your media files in folders identical to known and daily used by your operating system. Simple and practical.

CD Library

Similarly the video library, compile all music downloads in one place. Stay calm and get your mind free to focus on other more pressing activities. Discographies in mp3 or any other format will be sound and saved online in cloud hd. The library will be always at your fingertips, wherever you are, all your favorite records or those new to hear are separated calmly in a timely manner.

Photo Album

It is not difficult to find beautiful photo albums. However, it is not feasible to carry physical album everywhere and for this, there is a free server and unlimited capacity data storage. Entering your photos into digital albums, photos will never be yellowed with aged appearance or brittle enough to dissolve over long years. The cloud storage will allow unforgettable moments to be always well represented by faithful record of events stored in user memory and virtual memory.

 Library without limits

The regular reader of the great classics of the past, present, and other relics have a contemporary immeasurable space to gather their favorite authors, creating the most diverse collections of books, etc.. Lovers of comics and graphic novels to read and reread rare editions whenever they want and wherever they want.

Games

The advanced games are extremely heavy and consume a lot of CPU resources, memory and hard drive. Therefore, it is increasingly feasible to store a file like this in a conventional hd. Opting to store your games in a virtual disk, it will be convenient to uninstall other games to gain disk space, since the games arcade remain allocated on the server, regardless of the size of each file. That way, you avoid excessive consumption of virtual memory and preserves the common speed processing of your machine – one of the great advantages of storing a file online. Separate any number of games, sorting them by genre, or create custom lists.


source:esds

What will happen with Cloud Computing in the Future?



Every time, analysts, forecasters and experts, forecast the prospects of technology in the coming years. And it is no secret that cloud computing has become the most discussed and the hot topic. Cloud has loudly declared itself in business technology. IT-directors, vendors and analysts as one, trying to have time to determine what is behind it and what leads us. To that end, I have selected some of the predictions which are likely to come true, of course, if this had not already happened. So, the following are the most likely forecast:

1. More Private Cloud Solutions

Such clouds have not completely moved to the site of the customer or consumer, in other words, they are not “on-premises clouds”. But they also are not public. The following years, the tendency was to the formation of an increasing number of private clouds, but driven by someone else, so-called “off-premises clouds”. In addition, such an approach would be cheaper. Only well-protected isolated private clouds can meet all the necessary requirements. The original company’s commitment to its own cloud infrastructure was severely limited and time-consuming with a lot of investment, and while virtual private clouds provide sufficient effective solution for some organizations.

2. Cloud And Mobile Technologies Merge Together

This is an interesting hypothesis. The existence of many projects due to the cloud just need a mobile access to remote data and services. Almost certainly, for each, there is a cloud infrastructure connected to it with a mobile application that can flexibly respond to requests of mobile clients and deal with heavy traffic. By the way, almost every SaaS application currently has a mobile client that is also a proof of the plausibility of this model.

3. New PCs Own Cloud

Experts at Gartner predicts that personal cloud will gradually displace conventional personal computers, taking on the role of content storage, personal information, providing access to services and becoming the center of our virtual life (by the way, they can still retain the name of the personal computer). The emergence and spread of such private custom cloud will entail the creation of entirely new services, trends and interactions that will become the new center of economic relations and activities. Personal clouds should shift the focus from the client devices to the cloud-based services, which, in turn, has to be delivered to a variety of devices.

4. Increasing The Number Of Brokers Of Cloud Services

Gartner predicts that more and more IT-companies will take on the role of internal brokers in cloud services, controlling the redundancy and the use of diverse and always complex cloud services for their internal users and external business partners.

5. The Growing Number Of Specialized Clouds And Community Clouds

One needs only to refer to the cloud infrastructures, created especially for highly specialized areas such as healthcare, core banking, financial markets, retail sales and industry. This kind of clouds will provide each of the areas of specialized protection, processes, and will also meet other special requirements of each industry. The specific requirements of each industry will increasingly be met with community clouds. A striking example can serve the growing demands of the standards of storage and data protection related to health care. Another example – community clouds in the telecommunications industry to ensure compliance with all standards of disaster recovery.

6. Planned A Serious Lack Of Staff And Expertise

IDC warns about an impending shortage of skills and experience that will emerge as the hallmark of innovation, but at the same time, it will limit the introduction of technology in the workplace. Complicating the issue further is the fact that the attraction of cloud computing comes from different lines of business. The inaccessibility of relevant training and experience is also exacerbated by an increase in the needs of different departments in IT. IT-team very soon cease to be a team of system administrators, network managers, developers and database administrators, and will also include the management and service delivery, contract managers, relationship managers (both with clients and with partners) and business analysts.

7. The Disappearance Of The “Cloud” As A Terms

In the end, we stop everything and everyone to call the clouds and begin a more realistic assessment that falls under this concept and what does not. Every company with the word “cloud” in the title will try to change the brand… How many companies with the terms “Internet” and “client / server” in their names you see today? It is ridiculous-sounding names that end in “aaS”, will suffer the same fate. What do you think? How many of these trends are realistic?








source:esds.co.in

Wireless Security Basics



In this lesson, you’ll learn some of the basics of Wi-Fi security. We’ll also share our recommendation on which type you should choose – eliminating the guesswork and helping you keep your network as secure as possible.

WHAT ARE THE TYPES OF WIRELESS SECURITY?


There are several types of wireless security that you’ll come across– here’s a quick rundown on the details.

WEP

Wired Equivalent Privacy, aka WEP, is the grandfather of wireless security types, dating back to 1999 (an eternity in the world of technology!). When a client (like your laptop or iPad) connects to a WEP-protected network, the WEP key is added to some data to create an “initialization vector”, or “IV” for short. For example, a 128-bit hexadecimal key is comprised of 26 characters from the keyboard (totaling 104 bits) combined with a 24-bit IV. When a client goes to connect to an AP, it sends a request to authenticate, which is met with a challenge reply from the AP. The client encrypts the challenge with the key, the AP decrypts it, and if the challenge it receives matches the original one it sent, the AP will authenticate the client.

This may sound secure, but there was room in this scheme for an exploit to be discovered. The risk presents itself when a client sends its request to the access point– the portion containing the IV is transmitted wirelessly in clear-text (not encrypted). In addition, the IV is simple compared to the key, and when there are several clients using the same WEP key on a network, IVs have an increased probability of repeating. In a busy environment, a malicious user wishing to gain access to a network utilizing WEP security can passively eavesdrop and quickly collect IVs. When enough IVs have been collected, the key becomes trivial to decrypt.

Clearly, WEP is not the correct choice for securing your network, and in light of this, other types of wireless security were created.  

WPA

Wi-FI Protected Access (WPA) was ratified by the Wi-Fi Alliance in 2003 as a response to the insecurities that were discovered in WEP. This new security standard, the Temporal Key Integrity Protocol (TKIP), included several enhancements over WEP, including a new message integrity check nicknamed “Michael.”

While Michael offered a great deal of improvement over the old way of securing networks, there was still some worry about some security issues with using a similar (though much stronger) implementation.

WPA2

The concerns about Michael led to WPA2’s introduction in 2004. At the center of WPA2 is its use of a security protocol based on Advanced Encryption Standard (AES), the U.S. Government’s preferred choice of encryption.

As it stands now, the only people who should still be using TKIP on a wireless network are those who are dealing with hardware that is rated for 802.11g only.

WPS

In 2007, a new security method – Wi-Fi Protected Setup (WPS) – began to show up on wireless access points. With this type of security, a user is able to add new devices to their network by simply pushing a button (within administration software or physically on the router) and then typing in an 8-digit PIN number on the client device. The PIN feature acts as a sort of shortcut for entering in a longer WPA (Wi-Fi Protected Access) key. The basic idea behind WPS is that having physical access to the AP to hit a button and reading a sticker would provide a more secure implementation of Wi-Fi authentication. Everything was well and good in the WPS world, until last winter, when a security researcher discovered the Achilles Heel in the implementation. Here’s how it works:

The eighth and final digit of the PIN number is a checksum, which is used to make sure the 7 digits that matter don’t get corrupted. From these 7 digits, we can see that there are 10,000,000 possibilities (since each of the 7 digits can be 0-9, with repeats allowed). This is still a pretty huge amount of possibilities, and alone could arguably still be considered quite safe — but there’s a flaw in the checking process. When a PIN is being examined by the AP, the first 4 digits (10,000 possibilities) are checked separately from the last 3 digits (1,000 possibilities). This translates into a malicious user only needing to make at most 11,000 guesses, which a computer can handle in a matter of hours!

As you can see, if you or someone you know is currently using WPS on an access point, you should disable the feature ASAP.

OUR RECOMMENDATION

If your access point or clients are only capable of using WEP, it’s time for you to look at upgrading your technology, for the sake of increased security– not to mention increased throughput speeds on newer devices.

Right now, the best security for your Wi-Fi network is WPA2 with WPS disabled. Using this security combination provides the most secure Wi-Fi network possible today, and gives you the peace of mind you need to “set it and forget it.”

Besides, do you really want to trust a single button to provide all the security for your network? If WPA2 with WPS disabled ever becomes vulnerable, we’ll be sure and keep you updated on the adjustments you should make to remain secure.

Source: metageek