The Threats of Hacking: Part 1
Before we begin, we must ask ourselves the question: what is hacking? Hacking is the intrusion, by a person or an organization, of a computer system with the aim of obtaining protected and...
Protecting Your Data From The Threats of Hacking: Part 2
In the tough world of IT, there are still actions which can save your data from hacking and viruses. Use common sense It is the first tool to prevent against hackers. First, beware of suspicious...
Encryption - What Would it Take to Crack It?
Due to the recent rise in ransomware attacks, encryption has become an important issue. The history of the encoding information began about 4,000 years ago. Egyptian scribes used special hieroglyphs...
RAID History and Introduction
Redundant Array of Independent (originally Inexpensive) Disks (RAID) storage has revolutionized enterprise data storage technology, building in the peace of mind of redundancy (from RAID 1 & above)...
RAID Configurations and Data Recovery
Ontrack and RAID data recovery Ontrack offers data recovery services for all major RAID architectures. This includes, RAID levels 0, 00, 1, 10, 1E, 1E0, 2, 3, 4, 5, 50, 5E, 5EE, 6 and 60. We also...
Need a Data Recovery Service? How to choose the right one.
You were always hoping that you would never need it, maybe you even had a backup (and hopefully it is up to date), but sometimes bad luck just can’t be avoided! Now that you have lost your data and...