6
Mar
2017
|
Occasionally, I have to monitor a running process at a client's end through VisualVM. Enabling JMX, which is used by VisualVM, requires an additional TCP/IP port through the firewall. Most of the time it is an act of congress to get the network folks to o
|
|
26
Jun
2015
|
CryptoLocker is a ransomware trojan that
encrypts data files on infected computers and then asks for money should users wish to restore them.
Email is the most common mechanism of getting this type of virus, whose actual payload is often hidden. For
|
|
28
May
2015
|
With the increasing threat of cyber attacks, theres plenty of opportunity for your data to be compromised. And it is possible to experience data loss. However, if you implement a security plan and backup your data, there is no reason to stress such attack
|
|
28
Mar
2015
|
In this article, we will demonstrate how to maximize the capabilities of your QNAP device and enable it to act as a
private-cloud backup repository using Syncrify.
Although QNAP comes with a nice application allowing you to backup machines on y
|
|
22
Feb
2015
|
Bare Metal Vs File-level Backup
The importance of data in today's corporate world is akin to a heart in a human body. A company's reputation can be
severely damaged if data is lost. Your backup strategy is like an insurance policy - it should inclu
|
|