Gbackup ....... Your online backup solution

Monday, January 21, 2008

Benefits of using GBackup Software in your Business

Secure and reliable

Unlike conventional backup methods, your critical data is encrypted (128-bit!), compressed, and then uploaded to a REMOTE server hosted by you via Secure Sockets Layer (SSL) with enhanced security. Everything is run automatically with no human intervention required. This eliminates all possibilities of negligence induced problems. This robust design guarantees an extremely high rate of successful restoration.

Best fit your business need

GBackup Software comes with all essential backup features for business users. Everything required to back up your business data is now bundled inside, thus making Gbackup the only backup software you need.

Easy to manage

Installation of Gbackup is easy to follow with an intuitive wizard guided user interface. After simple configuration, backup will be done automatically without human intervention. Restoration can be done in just "A-Click". Anyone with basic computer skills will be able to manage it effortlessly.

Limited cost, unlimited protection

Once GBackup Software is deployed in your company, your invaluable data are protected from fire, vandalism, terrorist attacks, war and natural disasters, etc. While the cost of Gbackup is limited, the value of critical business data it protects and the potential benefits you can derive from these data are enormous and unlimited.

Use with confidence

Gbackup is part of an internationally proven solution with more than 500,000 installations worldwide. With such a huge installation base, you can be sure that all possible problems have been identified and corrected already. Therefore, you can use it with peace of mind.

First Vista Service Pack Announced

For many of us who've bravely entered the bug-filled world of Microsoft Vista, news of first the first Vista service pack couldn't have come at a better time.

The Mail & Guadian reports ...

Microsoft says it will release a major package of updates and fixes for the Windows Vista operating system in the first half of 2008.

The company says a "beta" test version of Service Pack 1 (SP1) will be released "in a few weeks to a moderate-sized audience". The SP1 beta includes updates Microsoft has already made to the operating system it started selling to consumers at the end of January.

The service pack fixes some common problems that cause computers to crash or freeze, Microsoft says, including compatibility problems with some newer graphics cards, external monitors and printer drivers.

Microsoft says it also fixed some problems users had with putting their PCs to sleep and waking them up again. SP1 is also expected to improve battery performance, increase the speed of copying files and help Internet Explorer run faster on Vista.

The Redmond, Washington-based software maker says SP1 also brings several security improvements.

Microsoft expects to release Service Pack 3 for Windows XP, Vista's predecessor, in the first half of 2008 as well, but in a statement added that it "should not significantly change the Windows XP experience".

In the past, some of Microsoft's business clients used the release of a service pack as a sign that a new operating system was stable enough to install. Analysts have said Vista seems more reliable out of the box than past versions of Windows, and that businesses need not wait for the service pack. -- Sapa-AP

Goodbye HDD and Hello SDD!

Samsung’s new Solid State Drives are essentially big bundles of flash memory—up to 64GB—that replace traditional hard drives. Laptops using SSDs are lighter, faster and quieter than those with conventional drives. As price comes down and capacities increase, all computers may give up spinning disks for SSDs.

From Popular Mechanics

Friday, January 18, 2008

Online backup makes good common sense

Small businesses often struggle with data backup and recovery for a variety of reasons. For example lack of knowhow or budget.That is until now That was because finding an affordable, easy-to-use system that didn't require constant monitoring came under the heading of Mission Impossible.

But with so many options out there, how do you know which solution to choose?

Easy as pie

The best part about online backup is that the hosted service makes it the appropriate choice for small businesses, whereas enterprise-level companies would most likely buy the software and host it on their own servers. A small business owner would never have to worry about storage space.

Hosted storage solutions work on a simple basic premise. You sign up online, select a service plan, download our software and begin the initial full backup. Automated storage is a critical requirement for SMBs. Small business owners need to focus on their business, not on IT chores.

Of course the other half of the data storage coin is recovering your data in the event of a system crash or natural disaster. With online recovery, you simply
use any Web browser, and select the files that you want to recover.

It's easy and it's versatile and more importantly for SMEs it's inexpensive. Get started on Gbackup for as little as R68.40 per month incl VAT.

Thanks to Small business computing for additional information

Watch out! Malicious code infects PC users

Web shops are the number one victims hit by the attack

This worrying report comes from BBC News, it looks like it's getting harder to defend systems against these types of attacks.

Thousands of small web shops have been unwittingly poisoned with malicious code that infects PC users who visit.

Security experts said the sophisticated attack had succeeded on a larger scale than many other similar attacks.

Once installed on a Windows machine the malicious code steals passwords, browser data as well as login names for bank accounts and online games.

The attack is proving hard to defend against for both sites being hit and PC users who are caught out.

Big hitter

Security researchers at ScanSafe, Finjan and Secure Works separately discovered the nest of poisoned websites. Estimates of how many sites have been enrolled into the attack vary. ScanSafe said it knew of about 230 but Secure Works and Finjan believe the total could be as high as 10,000.

Yuval Ben-Itzhak, chief technology officer of Finjan, said it had been following the attack since early December when it noticed an increase in the number of attacks using poisoned websites.

"It's safe to say that there are thousands of these out there," he said. He added that it was hard to get an accurate picture of just how many had been hit because security firms had limited resources to scan all potential targets.

Writing on the ScanSafe blog Mary Landesman said many of the poisoned sites were small "mom and pop" web shops rather than large web retailers. Despite this, she wrote, many had large numbers of visitors because they did well in web searches for particular products and services.

Sites enrolled by the ongoing attack include trade papers, travel firms, ad brokers, estate agents, butchers, hotel booking sites and car spare specialists.

Although all the websites that have become poisoned hosts use the same server and remote administration software, researchers have struggled to spot all the ways they are being compromised.

"We know some of the methods," said Mr Ben-Itzhak, "they are trying to exploit known vulnerabilities in open source content management software that the sites are using."

Spotting the attack code on a site was very difficult, he said, because every time a new user visited the code got a new, random five character name. If a visitor returned the malicious code identified them and did not launch a second attack.

Open Windows

Simon Heron, managing director of security firm Network Box, said: "It looks like the rootkit type technique that we have been worried about for the last two or three years. It's very clever."

A rootkit hides itself deep inside an operating system in an attempt to avoid detection.

Mr Heron said the code injected on the websites scanned the machine of any visiting Windows user to see if any one of 13 separate vulnerabilities were present.

It looked for vulnerabilities in browsers, instant messaging programs, document readers and media players, he said.

The code installs a small trojan through any one of these loopholes then lies dormant until a user types in data that it is interested in - such as login names for online banks or games such as World of Warcraft.

As yet the trojan installed on a PC is not recognised by many widely used anti-virus programs.

Philippe Courtot, founder and head of security firm Qualys, said small web shops and companies were increasingly becoming a target for criminally-minded hackers.

"Small businesses do not have the money to protect themselves," he said.

He added that hosting firms who owned and ran the servers on which these firms place their websites, viewed security as something extra they had to do rather than build it in.

"Hosting companies, for them today, adding security is a cost," he said.

Thursday, January 17, 2008

Defend yourself in style, iTaser

How about one, for Valentines Day? This report comes from Popular Mechanics

What do you get when you mix a dangerous weapon with an MP3 player? Well, it's not quite a humanitarian crisis so much as a case of gadget convergence straight out of The Onion. I mean, seriously, this thing's called the iTaser.

Alas, Taser International has just released a stylish new stun gun holster that has a built-in 1GB MP3 player. After all, just because you're afraid of muggers doesn't mean you can't make yourself more vulnerable by listening to music in poorly-lit parking lots. Users are presumably encouraged to pair it with the new, leopard-print lady Taser (pictured above at the Taser booth at CES)—and to include Billy Idol's "Shock To The System" on their playlists.

Basic factors for a Disaster Recovery plan

From W. Curtis Preston's book Unix Backup & Recovery.

There are six main steps to designing any good disaster recovery plan. These steps concentrate on how the CIO or CTO can enable the IT department to properly execute each step.

1. Define (un)acceptable loss. How does the CEO/CIO decide how much to budget for a disaster recovery project? By first deciding how much it will cost if they don't have one.

2. Backup everything. Do you know how much of your data is not being backed up and why?

3. Organize everything. Your company has everything on tape. Can you find the tape you need when disaster strikes?

4. Protect against disasters. Most people only think about natural disasters when creating a disaster recovery plan. There are nine other types of disasters and you have to protect against all of them. Learn what types of disasters strike your area and how your company can protect against them.

5. Document what you have done. Learn innovative ways that your company can document its disaster recovery plan that ensures that this documentation is available after a disaster.

6. Test, test, test. Most disaster recovery plans fail because they are not tested. Learn how other companies are testing their disaster recovery plans. There are ways to do this that won't swallow the entire IT budget!