TITLE

QUICK RESTORE SOFTWARE SUPPORTS SUPER DLTTAPE TECHNOLOGY

PUB. DATE
November 2001
SOURCE
Computer Workstations;Nov2001, p2
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the availability of Quick Restore that protects data on heterogenous networks through Workstation Solutions company. Integration of Super DLTtape support; Background of the company; Contact information.
ACCESSION #
5379940

 

Related Articles

  • VA LINUX SELECTS QUICK RESTORE DATA PROTECTION FOR 9205 NAS.  // UNIX Update;Dec2000, Vol. 11 Issue 12, p6 

    Features the Workstation Solution's Quick Restore data protection for VA Linux 9205 NAS system.

  • Rogue Internet access may be caused by `stolen' IP addresses or hijacked systems. Pace, Mark; Talley, Brooks // InfoWorld;10/11/99, Vol. 21 Issue 41, p84 

    Focuses on the security of personal computers and the nature of Internet Protocol (IP) addresses. Reminder with regards to the use of a screen saver with the password enabled; Suggestions on how to gather evidence and protect an IP address.

  • Take Five: Cisco Patches Vulnerabilities.  // CRN;2/19/2007, Issue 1230, p9 

    The article states that Cisco Systems Inc. has rectified five vulnerabilities affecting its FIX 500 series and ASA 5500 series security appliances. The appliances are susceptible to crashing while inspecting malformed HTTP requests or processing a stream of malformed packets in a TCP-based protocol.

  • Enterprise Security Policy and Standards. Ali Pabrai, Uday O. // Certification Magazine;Jan2003, Vol. 5 Issue 1, p31 

    Presents information on enterprise Transmission Control Protocol/Internet Protocol (TCP/IP) security policy and standards. Sections included in the enterprise security document; Core elements of an enterprise TCP/IP security policy; Considerations when creating the TCP/IP security policy.

  • Encrypt Telnet via IPsec in 10 Steps. Fellinge, Jeff // Windows IT Pro;Nov2005, Vol. 11 Issue 11, p8 

    The article details the steps for encrypting Telnet over an IPsec network. To create Telnet traffic over IPsec, the list of objects to consider are IPsec policy, IPsec security rule, IP filter list and filter action. The use of IPsec in conjuction with Telnet improves the computer security of...

  • Security Model for TCP/IP Protocol Suite. Kumar, M. Anand; Karthikeyan, S. // Journal of Advances in Information Technology;2011, Vol. 2 Issue 2, p87 

    the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today's Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build...

  • Vulnerabilities of Electronics Communication: solution mechanism through script. Singh, Arun Kumar; Samaddar, Shefalika Ghosh; Tewari, Pooja; Misra, Arun K. // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p572 

    World trade and related business ventures are more or less dependent on communication. Information content of communication is to be protected as mis-communication or incorrect information may ruin any business prospect. Communication using Internet or any other electronic communication is...

  • Demystifying Data Transport.  // Security: Solutions for Enterprise Security Leaders;Feb2006, Vol. 43 Issue 2, p46 

    The article reports focuses on Transmission Control Protocol/Internet Protocol (TCP/IP), the most common protocol for transmitting all types of data on computer networks in the U.S. It acts as a carrier for many other protocols. Its use in network security video is the basis for enabling images...

  • Authentication Header.  // Network Dictionary;2007, p50 

    An encyclopedia entry for authentication header (AH) is presented. It is a protocol in the Internet Protocol security (IPsec) suite which is used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays. It provides...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics