The Threats of Hacking: Part 1
Before we begin, we must ask ourselves the question: what is hacking? Hacking is the intrusion, by a person or an organization, of a computer system with the aim of obtaining protected and...
Protecting Your Data From The Threats of Hacking: Part 2
In the tough world of IT, there are still actions which can save your data from hacking and viruses. Use common sense It is the first tool to prevent against hackers. First, beware of suspicious...
Encryption - What Would it Take to Crack It?
Due to the recent rise in ransomware attacks, encryption has become an important issue. The history of the encoding information began about 4,000 years ago. Egyptian scribes used special hieroglyphs...
RAID History and Introduction
Redundant Array of Independent (originally Inexpensive) Disks (RAID) storage has revolutionized enterprise data storage technology, building in the peace of mind of redundancy (from RAID 1 & above)...
Ontrack PowerControls Update: Features from the Latest Release
Ontrack’s development team has been hard at work creating the latest version of the Ontrack PowerControls™ product suite with the goal of providing a better user experience for customers. Here’s what...
RAID Configurations and Data Recovery
Ontrack and RAID data recovery Ontrack offers data recovery services for all major RAID architectures. This includes, RAID levels 0, 00, 1, 10, 1E, 1E0, 2, 3, 4, 5, 50, 5E, 5EE, 6 and 60. We also...