Results 1 to 13 of 13

Thread: "cloud" ?

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Registered User
    Join Date: Nov:2015
    Location: Sofia
    Posts: 5

    Question "cloud" ?



    !
    ,

    "cloud" ?

    !



  2. #2
    Registered User
    Join Date: Dec:2003
    Posts: 2,817
    ? !
    Gigabyte DS3P, E4400@9x333, 2x2Gb Super T@1000Mhz, Gigabyte GTX460OC 768Mb

  3. #3
    Registered User tedych's Avatar
    Join Date: Nov:2003
    Location:
    Posts: 17,654
    , "".
    .
    , , , . ().
    . , , , , "" .. .. , .
    , , , VPN, https .. .., cloud.
    , - cloud.

  4. #4
    Registered User
    Join Date: Nov:2015
    Location: Sofia
    Posts: 5
    , , !

    , , , . - , .
    :

    Level 1: local encryption
    Normally, the backup software uses an encryption key to encrypt your data. The keys length ranges from 128 bit (16 ASCII characters) to 448 bit (56 ASCII characters) and provides enough security even for business purposes. In most cases the key itself is invisible to you: you can unlock the key with your personal passphrase which is more memorable and thus, easier to manage. This password will unlock the key and consequently decrypt your data.
    If you let the software manage your keys and passphrases then this will lower the level of security you have because technically employees could use both to see the data that is stored on their servers. They will not see the password itself, though. You must choose a private password that is not stored on the companys servers. That would make it impossible for employees to decrypt the data for you even if you want them to.
    Some online backup services will even allow you to create a custom encryption key which offers the most security but lacks a great deal in convenience. Youll always have to type in the whole key to decrypt your data.

    Level 2: transit encryption
    SSL (or sometimes called TLS) connection

    Level 3: server side encryption
    AES-256 bit. The AES (advanced encryption standard) is a method wildly used in a lot spaces that need extra file security especially government institutions.

    , , , "" ; .
    - , , .

  5. #5
    Registered User tedych's Avatar
    Join Date: Nov:2003
    Location:
    Posts: 17,654
    , , .
    , , .

    encryption , .
    , - , ( , "") .
    , , . , , ( ) - , ( ).
    in and out , ( , ) . . 3rd party .

    - , - , , 40-50 , - "cloud", 24/7, setup - , ( M$ Win , 10). , , .

    .., , cloudfare . , () .
    , , , , - , , "" OS . 10. 7 $.
    , 30- .
    , , , . , , , , "" . , , , , .

  6. #6
    Registered User
    Join Date: Nov:2015
    Location: Sofia
    Posts: 5
    , note taken

    , , .
    - .

    , - sensitive data.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

Copyright © 1999-2011 . .
iskamPC.com | mobility.BG | Bloody's Techblog | | 3D Vision Blog |