Why You Need An External Hard Drive

Technology is ever changing. Even if you strive to upgrade your smartphone or computer every time a new model or gadget is out, it is still hard to keep up because new updates are released now and then and the options are also endless. Whether you are an Apple or a Windows user, you’d be lost too on all these advances if you are not an expert in the field yourself.

Considering how much data we share on the web or the number of files we have now made digital, it is but imperative we have a plan B in case your computer gets broken, your hard drive fails, or files get accidentally deleted. One of the best options for computer users to make sure their data stays safe no matter what happens is to purchase an external hard drive. You can transfer, save and store a copy of all important documents on it and free your mind from worries of possible data loss when you least expect it the most.

Tax documents, creative projects, family photos, school work – think about all the important things you have saved on your desktop computer. Now think about all of those things vanishing in an instant because your computer crashed. What would you do?

Well, at that point there’s not much you can do (other than hope for the best). Hopefully, you took preventative measures, such as investing in an external hard drive or cloud backup service. You can also make sure that your next desktop computer has a quality hard drive.

Unfortunately, not all hard drives are created equal. Backblaze released a list of hard drive failure rates for 2016. They calculated this rate by dividing the amount of failures by how many drives were studied. Since each drive wasn’t used equally, they also factored in how many days collectively that each device was used.

(Via: http://www.komando.com/happening-now/388789/avoid-these-hard-drives-they-are-most-likely-to-fail)

While they can be your life saver, you don’t just buy the first hard drive you see in the store. With a globally competitive market, there are just too many options to choose from and you may end up wasting lots of money on a brand that won’t live up to your expectations. There is actually a thing now such as “World Backup Day” that is celebrated on the last day of March to raise awareness on backing up data.

To create a backup of your files, simply connect an external hard drive to the computer by plugging it into a USB port. At this point, drag and drop the files you wish to protect or utilize a backup software utility.

A backup is slightly different than simply using external disk storage. With storage, you are able, and expected, to access and modify data regularly. Users interested in freeing up space on their internal HDDs turn to external disk storage as a solution.

A backup, however, is not usually accessed regularly.

Sometimes, depending on the type of program utilized, such as cold storage, files are kept in a read-only state; making it impossible for users to edit them on the backup drive.

The primary purpose of a backup is to provide you with a copy of files in the event of a total system failure, sort of like a library archive. With an external storage drive, you can manually or automatically relocate data to it.

Though backups are performed manually, they’re often left on auto-pilot; with the transfer software running in the background.

The advantage of using software to backup data from a PC lies in scheduling; you can tell the software when to backup, down to the hour and minute. The software takes care of backing up only the files which have experienced recent change, a process called incremental backup.

After the transfer is complete, just disconnect the drive and store it in a safe location. We recommend that files be backed up daily so that copies are up to date.

Even the experts suggest the importance of having a PC backup storage like an external hard drive because it works and delivers its promise of data protection.

Should an external hard disk drive be used for backup? Absolutely yes, it’s an easy and cost-effective way to save all kinds of data.

It offers peace of mind in the event of a system breakdown; ensuring nothing is lost forever. Of course, external hard drives should be used in conjunction with other methods of backup, such as a cloud service.

Which will help ensure all your files are protected, in the event of a cataclysmic occurrence or external drive corruption.

(Via: https://www.cloudwards.net/should-i-use-an-external-hard-drive-for-backup/)

While computer use remains tricky as various gadgets and upgrades are being released constantly, knowing the basic helps a lot so you don’t end up being victims of your own devices. A computer can help in different ways, from having a gateway to the digital world and the Internet to a platform in doing your admin tasks and file keeping. While it works most of the times, there are instances wherein it may fail and take with it all the precious files you have saved on it if you don’t have a back-up plan in place.

In the unfortunate event that both of your hard drives fail, you can try to recover lost data with the help of this: https://www.harddrivefailurerecovery.net/hard-drive-recovery/. While you want to steer away from hard drive recovery, there is a chance you’d have to deal with it in your lifetime so better be prepared for when that day comes. You can visit this link to learn more: https://www.harddrivefailurerecovery.net/. Your data is precious and if hard drive recovery is the answer, then so be it.

The article Why You Need An External Hard Drive Find more on: Hard Drive Recovery Associates

source https://www.harddrivefailurerecovery.net/why-you-need-an-external-hard-drive/

The Aftermath Of War

When we think of war, we can’t help but shudder at all the lives that were lost, people injured, and families displaced because of all the conflict and destruction. Our history teaches us how people and nations suffered because of war. Even today, many countries in the East are at war and the body count keeps on increasing. Innocent people die but there seems to be no end to this dilemma. As of late, more and more people suffer in Syria as the U.S. joined in on the bombings.

However, when you think of it, not only people suffer from the effects of war but the environment too. Former homes, buildings, and other structures become nothing but a big pile of rubble in just one strike, and at times trapping helpless and injured people to their death. War-torn nations look the same, the picture of havoc and destruction that not even nature can stand.

When Donald Trump announced a missile strike against Syrian President Bashar al-Assad’s forces, the justification for such major military action came down to one issue: “the red line”. More than 400,000 people are estimated to have died since civil war broke out in Syria, so why is the use of chemical weapons the “red line” for world leaders? In 2012, Barack Obama issued a warning to Assad not to cross the “red line” in the civil war. The implication of his statement was clear: the use of chemical weapons would be met by military strikes in Syria, such as those launched by the US on Thursday night.

The use of chemicals is a big no-no in any war. It is a clear violation of the rule of war, a line that was crossed by the Syrian government quite recently and earned the ire of other nation’s government.

“You need to protect civilians. Weapons of indiscriminate nature are mostly banned,” she said. Weapons that would cause long-term damage to human health are also prohibited. “In the attack in Idlib, it was a nerve agent that was used to cause damage to the organs of the individual as well as the nerves, so the effects of the weapon itself goes beyond the war conditions by causing long-term damage to human health.” Chemical weapons are also in contravention of humanitarian law because they can cause long-term damage to the environment by contaminating it. “You need to protect the civilian property under International Humanitarian Law,” she said.

(Via: https://inews.co.uk/essentials/news/world/us-airstrikes-syria-chemical-weapons-red-line/)

While some wars must be fought, there are many pointless wars over the years that could have been avoided had everyone been more willing to listen to one another and compromise. And in the event that war can’t be avoided, precautions should be taken so that damage is limited and the body count not that high.

From the standpoint of customary law, environmental protection during wartime may be inferred from the general protection of the civilian population and property based on the fundamental rule expressed in the 1868 Declaration of St. Petersburg that military actions by States should be limited to the objective of weakening the military force of the enemy. In addition, Principle 24 of the UN Declaration on Environment and Development states: “Warfare is inherently destructive of sustainable development. States shall therefore respect international law providing protection for the environment in times of armed conflict and cooperate in its further development, as necessary.”

And then of course, there are the principles embedded in the law of war. The principle of necessity asks whether the potential target, weapon or tactic is necessary in order to achieve a legitimate military advantage. The principle of proportionality asks whether, even if an action is necessary, the expected military advantage outweighs the anticipated collateral damage to civilian objects and non-combatants. The principle of non-discrimination asks whether the chosen weapon or tactic sufficiently discriminates between military and civilian objects or between combatants and non-combatants and the principle of humanity requires that militaries use the minimal force necessary to achieve the enemy’s submission.

(Via: http://www.manilatimes.net/war-and-the-environment/321634/)

There are rules to be observed in war as outrageous as it may seem. The sad thing, though, is that there are those who defy the norm and do unthinkable acts of horror – terrorists. We have witnessed time and again what terrorists are capable of doing, even sacrificing their lives for their cause. And they don’t have any second thoughts doing horrible things even if they kill thousands or wipe out an entire city or town.

Through all these atrocities, the environment is a silent witness to the innate viciousness mankind is capable of doing. As if Mother Nature isn’t badly hurt enough from our abuse and neglect, we add insult to injury and bomb natural landscapes or contaminate natural resources needed by men and animals alike. If we don’t mend our ways, we may lose everything we have now and not just the ideals we are fighting for. Climate change is no longer just a threat but the grim reality of the present.

Although completely out of context, you can visit https://www.harddrivefailurerecovery.net/hard-drive-recovery/ to learn more about hard drive recovery as technology in itself may be a tool to help stop wars and inform the people of not only the dangers of war but the sorry state of our environment today. Moreover, this article: https://www.harddrivefailurerecovery.net/hard-drive-crash-a-sign-of-things-to-come/ is also helpful for those who know so little about hard drives but can’t live without their computers either. Technology may be partly responsible for the degradation of our environment but it can also be an instrument to help us rebuild and salvage whatever we have left now.

The Aftermath Of War Read more on: The Hard Drive Recovery Associates Blog

source https://www.harddrivefailurerecovery.net/the-aftermath-of-war/

What To Expect From Android Smartphones?

Android smartphones are a big market. Unlike that of Apple’s iPhones, different manufacturers come up with their own line of Android-powered smartphones and tablets with features that are at par with that of iPhones and iPads. But if there is something in common between the two, it does not have to do with a standout feature but a major flaw shared by all smartphones (virtually no exception) in general – a short battery life.

The latest operating system – Android O – upgrade will delight many Android smartphone users (if only we can get our hands on it). As of date, it is still off the market and exclusively for developers use only. Android O has a long list of positive selling points aside from the improved and longer-lasting battery life.

Google has rolled out a developer preview of the latest OS, the Android O for your smartphones. The global tech giant, through its blog, has pointed out some great new features for the successor of Android Nougat. There is no surety on what the ‘O’ in Google Android O stands for. While Google has suddenly dropped the Android O into the market, the catch here is that currently, it is available only for developers. There are many new features which Android O has introduced, including battery life, upgraded audio, colourful display and more. As of now, Google’s now smartphone OS can only be used in the most recent devices from the company. The developer’s preview of Android O can be used on smartphones like Nexus 5X, Nexus 6P, Pixel, and Pixel XL phones, the Pixel C tablet, and the Nexus Player Android TV set-top box. But be warned before you download the OS for your regular use smartphone.

(Via: http://www.financialexpress.com/about/google/)

Here are some of the few things to watch out for from the new operating system come May this year (with fingers crossed) when it will likely be released:

Several new features were shown off by Google as part of its Android O Developer Preview, with one of the most eye-catching being a new way to conserve and extend your device’s battery life.

The new “background limits” feature will limit exactly what operations your apps can do whilst running in the background.

This includes cutting down on background services such as location-based updates and what Google calls “implicit broadcasts”, all of which can use up processing power and drain your battery.

Android O will now allow you to monitor and cut down exactly what services are running at any given time, which could prove the difference between your phone dying when you need it most.

Among the other major changes to Android O is a major development in how notifications are displayed.

New “notification channels” will allow apps to bundle together multiple alerts into a package that users can browse easily. 

(Via: http://www.express.co.uk/life-style/science-technology/782094/android-o-google-preview-new-features-release-date)

It also helps to find out that Google does not just sit around while their users suffer from crappy features that they have to deal with day in and day out and the company does its part in improving their service and in protecting the security of their users and their data.

Google’s third annual Android Security report is out for 2016, and according to the company, they’ve managed to ensure that potentially harmful apps (PHA) are down on the Play Store. Over 735 million Android devices from 200+ smartphone manufacturers are running on a security patch from 2016, says Google.

Google’s report also highlights the best way to avoid trojans or malware on your smartphone is by sticking to the official Google Play Store for downloads. There are over 1.4 billion Android users and if you go by the company’s own number of 735 million, just over half of the users are on a device with a 2016 security patch, which is not the best news.

While Google admits they’ve been providing security updates for Android smartphones, there’s still a lot to be done. The company’s report notes, “half of devices in use at the end of 2016 had not received a platform security update in the previous year. We’re working to increase device security updates by streamlining our security update program to make it easier for manufacturers to deploy security patches and releasing A/B updates to make it easier for users to apply those patches.”

(Via: http://indianexpress.com/article/technology/social/google-android-security-report-shows-play-store-apps-got-safer-in-2016-4581724/)

Android users enjoy the diverse options offered by an Android smartphone and market. There is a lot of flexibility as to what apps you can download and its catchy and sweet-sounding OS versions attract the attention of many too. Hopefully, this coming update in the next month or so can iron out many of the issues bothering Android smartphone users today and finally address the battery issue for real.

What To Expect From Android Smartphones? was first published to http://www.harddrivefailurerecovery.net

source https://www.harddrivefailurerecovery.net/what-to-expect-from-android-smartphones/

Trump Announces Serious Wiretapping Allegations

We all value our privacy. If the phone conversations of important people can be wiretapped and their privacy violated – what more for us ordinary citizens with no capability to secure our phone lines or equip our homes with extensive and sophisticated security measures.

President Trump just made allegations that his phone has been wiretapped the month before last year’s election by no other than the former president – Barack Obama. And he claims that it was only recently when he found out about it. Knowing his penchant for publicity and drama, many will likely doubt the credibility of his claims although it is common knowledge that the government has the capacity to wiretap or do other forms of privacy breach to get important information they are after.

President Trump’s claim on Twitter early Saturday that he had “just found out” that “President Obama was tapping my phones in October,” an accusation for which he offered no evidence, has set off another spasm surrounding his young administration. On Sunday, Mr. Trump’s spokesman said the administration was asking Congress to investigate the president’s allegation.

There is ample reason for caution because Mr. Trump has a history of making attention-grabbing and politically explosive claims that have no basis in fact. As things stand, a plausible explanation is that Mr. Trump was merely riffing off a March 3 article on the alt-right website Breitbart.com. It laid out a theory circulating in some conservative circles that President 

So, the question now is if the then U.S. president can indeed order such a thing (wiretapping) to be done on an American citizen?

Not legally. There are two lawful ways that allow government officials to target people in the United States for surveillance and to collect the contents of their phone calls and emails: criminal wiretaps, called “Title III” warrants, and national security wiretaps, called Foreign Intelligence Surveillance Act, or FISA, orders. Both types of wiretapping are ordered by federal judges, after applications from the Justice Department.

In this case, the server issue isn’t technical in nature but has to do more with the people it is serving. We’re quite unsure too how the Trump Tower server has been linked to that of a Russian bank.

What about the computer server registered to Trump Tower?

Several news media outlets have reported that investigators last year were puzzled by data transmissions between a computer server registered to Trump Tower and a computer server associated with a Russian bank. Although Mr. Trump on Twitter talked about his “phones,” in theory a judge might determine that the computer address of the server was a facility being used by a foreign power, Russia, to communicate, and authorize surveillance of it.

Isn’t there a report about an October surveillance court order involving that server?

Yes. The Breitbart story relied heavily on a Nov. 7 article by a British writer on the news and opinion website HeatStreet. It claimed that the Foreign Intelligence Surveillance Court had approved a “warrant” in October in connection with activity between Russian banks and the server, which it said — and Breitbart repeated — was in Trump Tower. It further stated that “it is thought in the intelligence community” that this purported warrant permitted the collection of emails and other communications of Americans connected to the server investigation, which “thus covers Donald Trump.”

(Via: https://www.nytimes.com/2017/03/05/us/politics/trump-phone-tapping-surveillance-issues.html?_r=0)

As expected, winning the presidency did not dampen Trump’s love for social media, especially his Twitter account that is once again back in the spotlight. It has all the elements of a juicy piece of news (gossip?): shady computer server + connivance with Russia = unauthorized surveillance (wiretapping).

None of this involves wiretapping Trump Tower. However, it is possible that Trump picked that up from a Breitbart article that in turn relied on a Heat Street piece that claimed the warrant was issued because of evidence of links between a “private server in Donald Trump’s Trump Tower” and a Russian bank. In fact, the server in question, set up by a marketing company hired by Trump, was physically located in Philadelphia.

Barack Obama’s spokesman responded to Trump’s tweets by saying that “neither President Obama nor any White House official ever ordered surveillance on any U.S. citizen.” Notably, this statement does not deny that someone in the Obama administration ordered surveillance of Trump Tower, simply that the White House did not – which isn’t meaningful, since in a properly functioning executive branch the Justice Department would make that decision on its own without White House interference.

(Via: https://theintercept.com/2017/03/04/if-trump-tower-was-wiretapped-trump-can-declassify-that-right-now/)

So, it is likely that President Trump’s wild imagination conjured up ideas of wiretapping in the infamous Trump Tower when his claims were mostly unfounded and based on hearsay from a pro-Republican website like Breitbart.

Although we do not discredit his claim because it is something the government frequently does when it involves issues of national security (remember the email controversy involving Hillary Clinton), but Twitter is not the likely platform for such announcements for a person of his stature.

The article Trump Announces Serious Wiretapping Allegations Read more on: http://www.harddrivefailurerecovery.net/

source https://www.harddrivefailurerecovery.net/trump-announces-serious-wiretapping-allegations/

What To Expect With Data Warehousing

Data usage has increased drastically over the past few years. It can be attributed to the fact that smartphones and other tech gadgets have become more affordable (thanks to competition) and almost everyone can afford to have one. And as such, data consumption increases leading to data storage and security issues. Furthermore, more people are hooked on social media whether for business or leisure, so most transactions are being done online leading to a surplus of data.

Millions to billions of data used daily require massive data warehouses that will analyze and store data among others. And as cloud computing continues to gain popularity, data warehouses also start to utilize it as they collate and analyze data in aid of the business decision-making process.

Another speaker also noted another set of challenges that arise from trying to store everything in one place. Asset managers should have a clear definition between the middle- and back-office data and the front-office analytical data, which he called “less mission-critical”.

He added that data warehouses should be built to support the business in the future, with capabilities to encompass new products or programmes, and this requires some internal overheads.

While the data in the warehouse should be a “golden source”, the speaker noted that, in the case of a discrepancy, data must be fixed at its source, and not in the warehouse, otherwise the business will end up with inherent quality issues.

He concluded that a data warehouse can provide operational efficiency and flexibility, offering the ability for asset managers to “report off of something that you would inherently want to”.

(Via: http://www.assetservicingtimes.com/assetservicesnews/article.php?article_id=7283)

While it is of little use to most small to medium enterprises, data warehousing is a helpful and necessary aspect of big businesses whose operation has gone global. And this market is seeing impressionable growth and is expected to keep its momentum in the next ten years.

With the increasing need of data management, more enterprises are investing in data warehousing solutions to gain better insights about their business. These solutions integrate and analyse business data using historical and real-time data, enabling executives to make better decisions based on accurate understanding. Data warehousing solutions coupled with business intelligence tools help enterprises implement efficient business analytics. This data can be accessed by users across the organization using ad hoc SQL queries, periodic reports and dashboards. Even though data warehousing is beneficial for the business, but it can be complex to set up and involves investments even after set up to prevent loss of data. Moreover, recent trends involving huge volumes of data are obstructing the performance of data warehouse systems.

(Via: http://www.military-technologies.net/2017/02/28/data-warehousing-solutions-market-to-reflect-impressive-growth-rate-during-2016-to-2026-persistence-market-research/)

But problems are inevitable, but can be recovered from (https://www.harddrivefailurerecovery.net/hard-drive-recovery/) as businesses continue to grow and the demand for data increases without compromising the quality of the data that is analyzed.

Large enterprise customers have made huge investments in data warehousing technology over the past decade. The cost of upgrading and adding new data warehouse licensing is cost prohibitive. Technologies like Hadoop and Spark offer organizations the option of accruing a greater ROI on existing data warehouse resources, by providing a data processing platform to offload Extract, Transform, Load (ETL) and Extract, Load, Transform (ELT) workloads from the data warehouse and to reduce the cost of storing and accessing less frequently used data.

(Via: http://insidebigdata.com/2017/03/01/changing-data-landscape/)

And more progress can be seen in the days to come as modern data warehousing continues to evolve and be refined.

Big data. Everyone has it. And no one has a way to organize, store, and access it in the most cost-effective manner.

Well, GV (the former Google Ventures) is leading a $10 million round into Incorta, an analytics platform that purports to make the modern data warehouse a thing of the past.

That new $10 million for San Mateo-based Incorta is cash to get its new product, a “direct data mapping engine” into the wide world.

The company claims that its technology “rethinks how data is stored and accessed”, by relationally mapping individual data points. The company says that relational mapping can reduce or remove the need for joint operations that integrate different data sets and create data warehouses.

For companies grappling with massive amounts of data, this means they can analyze datasets much more quickly (the company boasts that data analysis can be done in minutes instead of hours or days).

(Via: https://techcrunch.com/2017/03/01/pitching-tech-that-makes-the-data-warehouse-obsolete-incorta-raises-10-million/)

Progress can’t be stopped and technology is doing its part in making things happen. Analyzing data enables people to gain a deeper understanding of how a business works and its current state without the usual limitations of traditional or modern data warehouses.

The blog article What To Expect With Data Warehousing Find more on: HDRA Blog

source https://www.harddrivefailurerecovery.net/what-to-expect-with-data-warehousing/

How True Are Hacking Attacks On Apple Devices?

Hacking is a common problem that our modern world faces. Whatever your computer/ laptop or gadget may be, the hackers do not discriminate and will do everything to break the integrity of your system and either steal your files or corrupt it.

As more mysteries are being unraveled by Wikileaks to the world at large, it just shared details about hacking incidents involving the Apple’s Mac line and our country’s very own Central Intelligence Agency. As sophisticated its hard drive may be, experienced hackers can still get through the system and infect your Mac computer or iPhone.

WikiLeaks just shared a few new documents as part of the CIA Vault 7 data dump. These documents describe hacking methods allegedly used by the agency to access Apple devices and upload data. Most of today’s exploits are related to the Mac platform. It’s interesting to see the CIA’s old hacking techniques. It’s unclear if some of them still work today.

Here’s an example of an easy to pull off a hacking attack on a Mac computer which made it to the news several years ago and how the CIA executed it to breach security and retrieve important data:

Sonic Screwdriver v1.0

This 2012 hack is quite neat as it uses a peripheral device to infect your Mac. In particular, the CIA was installing the malware on Thunderbolt-to-Ethernet adaptors.

After the CIA had flashed the dongle, it was quite easy to execute. By powering on the Mac, the code would automatically execute on the accessory and infect the firmware with something like Der Starke (see below).

It’s a silent attack and it would fool anyone. The accessory remains infected so you could end up attacking multiple Macs with the same device.

Does this sound familiar? Because when I read this, I instantly remembered Thunderstrike 2. Xeno Kovah and Trammell Hudson described the exact same exploit at Black Hat in 2015, three years after the CIA’s document.

Apple has fixed the exploit around the same time, so you should be fine.

(Via: https://techcrunch.com/2017/03/23/wikileaks-releases-new-cia-documents-describing-mac-exploits/)

And the recent Wikileaks expose reveals how vulnerable Apple’s Mac and iPhones are to hacking attacks.

WikiLeaks has released a new set of documents related to alleged CIA spying techniques, this time detailing tools purportedly used by the agency to gain access to Apple Mac computers and iPhones. It’s calling this new leak Dark Matter.  

The majority of today’s document dump, part of the organization’s larger Vault 7 leak, deals with ways the CIA could exploit Macs. It’s unclear if these tools are still in use today or would be as effective on newer machines, though Apple has patched at least one of the vulnerabilities detailed.

The first exploit is called Sonic Screwdriver, and it let the CIA execute code from a peripheral device onto a laptop or desktop while the machine was booting. The code would be carried on an Thunderbolt-to-Ethernet adapter and would execute when the target Mac powered on. 

Apple recognized the potential for third-party devices to do this and patched the hole in 2015, as TechCrunch points out.

(Via: http://www.techradar.com/news/wikileaks-latest-leak-reveals-alleged-cia-exploits-for-mac-and-iphone)

There is a reason to be scared if you are an Apple user because of claims that the CIA has zeroed in on this user demographic for a decade now and that no one is safe considering they are said to target iPhone units that are fresh from the factory. Another reason for concern is that the bugs they use persist even after reinstalling the iOS.

‘That means that this is a malware technique developed by the CIA to insert its malware and viruses into people’s computer systems, Macintosh computer systems, which doesn’t store itself on the regular hard drive that people use,’ WikiLeaks publisher Julian Assange said in a press conference live-streamed on Periscope today.

Instead, according to Assange, it will persist ‘even if you throw away your hard drive and reinstall your operating system.’

The leak also includes the manual for a program called ‘NightSkies 1.2,’ which is a ‘beacon/loader/implant tool’ for the iPhone.

So, always keep this in mind:

And, the program is ‘expressly designed’ to be physically installed in ‘factory fresh iPhones,’ Assange said.

This, in essence, means ‘the CIA has been infecting the iPhone supply chain of its targets since at least 2008,’ WikiLeaks claims.

(Via: http://www.dailymail.co.uk/sciencetech/article-4343102/WikiLeaks-claims-CIA-bug-factory-fresh-iPhones.html)

This is a serious concern for all of us – ordinary citizens – because you may be subjected to these hacking attacks as long as you’re a Mac or an iPhone user. You can never tell if the CIA was able to get to your gadget first before you even buy it and implant it with a bug.

Moreover, the Apple Mac line is often used by the higher end of the market, so they probably have more to lose once their data is lost, stolen, or hacked. The government is yet to explain for these accusations and also explain to the public why these measures were undertaken to begin with. If proven, this is a clear breach of Apple users’ privacy. Now, the question is why does Apple allow it to happen? What’s in it for them?

The following blog article How True Are Hacking Attacks On Apple Devices? Read more on: HDRA Blog

source https://www.harddrivefailurerecovery.net/how-true-are-hacking-attacks-on-apple-devices/

Disaster Preparedness Concepts Everyone Should Know

Nobody likes to be taken by surprise. The feeling of helplessness and not knowing what to do brings out the worst in people. But if there is a certain preparedness we should all be taking seriously, that involves knowing what to do in case of a natural disaster.

Mother Nature is a force to reckon with. Natural calamities – big or small – are not a joke, so it is a must to learn what to do before, during, and after disaster strikes. All over the globe, we are at risk of climate change and global warming that makes common calamities like floods, drought, bushfire, storms, hurricanes, tornadoes, etc. experienced by different regions worse and even deadlier than before.

When speaking about communities affected by natural disasters like the 2013 Alberta floods or last year’s Fort McMurray wildfires, people often throw around words like “recovery” and “resilience.” These words seem singularly appropriate, but they also suggest these events are almost momentary issues — unpleasant blips that a community will spring back from, like a squeezed foam ball.

(Via: https://www.ucalgary.ca/utoday/issue/2017-03-15/international-disaster-readiness-workshop-planned-calgary)

We should all be prepared at all times since nobody is safe and we never know when and where natural calamities will strike next or risk losing hundreds to thousands of lives because we did not have the foresight to prepare beforehand.

Sixty-seven people have been killed and thousands more forced to evacuate by intense rains which damaged 115,000 homes and destroyed more than 100 bridges in Peru’s worst floods in recent memory.

“We are confronting a serious climatic problem,” said Peru’s president, Pedro Pablo Kuczynski, in a broadcast to the nation on Friday afternoon. “There hasn’t been an incident of this strength along the coast of Peru since 1998.”

The disaster – which came after a period of severe drought – has been blamed on abnormally high temperatures in the Pacific Ocean, and fuelled criticism that the country is ill-prepared for the growing challenges of climate change.

(Via: https://www.theguardian.com/world/2017/mar/17/peru-floods-ocean-climate-change)

Even the experts do not just anticipate calamities brought about by Mother Nature but a global disaster of cataclysmic proportions that may end the world that we now know of.

In recent years, warnings by top scientists and industrialists have energized research into the sort of civilization-threatening calamities that are typically the stuff of sci-fi and thriller novels: asteroid impacts, supervolcanoes, nuclear war, pandemics, bioterrorism, even the rise of a super-smart, but malevolent artificial intelligence.

But what comes afterward? What happens to the survivors? In particular, what will they eat? How will they stay warm and find electricity? How will they rebuild and recover?

These “aftermath” issues comprise some of largest points of uncertainty regarding humanity’s gravest threats. And as such they constitute some of the principal research focuses of the Global Catastrophic Risk Institute (GCRI), a nonprofit think tank that Seth Baum and Tony Barrett founded in late 2011. Baum, a New York City-based engineer, and geographer is GCRI’s executive director. Barrett, who serves as its director of research, is a senior risk analyst at ABS Consulting in Washington, DC, which performs probabilistic risk assessment and other services.

(Via: https://futurism.com/how-could-we-survive-after-a-global-catastrophic-event/)

There is something we can all do to raise awareness on disaster preparedness and equip everyone with the knowledge and skills to help them survive whatever disaster they face.

In the face of this reality, one would assume that investments in disaster preparedness and climate action were on the rise. If you lived in the United States, however, you’d be grossly mistaken. In fact instead of being serious about protecting the health, safety, and general welfare of its citizens, the Trump administration has decided to gut all programmes related to climate and many related to disaster-preparedness.

If you still doubt the need for action to adapt to the consequences of climate change, don’t just listen to me – listen to the US military, world business leaders, or the majority of Americans. Given that climate leadership is unlikely to come from the US federal government under Trump, many are asking, what can I do to prepare for climate change? Here are eight initial actions that individuals, as well as governments, could take immediately to prepare.

So, here are what you can do to raise disaster preparedness:

  • Make a plan; build a kit.

  • Get to know your neighbours.

  • Reduce your carbon footprint.

  • Call your legislators today, and every day.

  • Integrate climate change into all policies, programmes, and decision-making processes.

  • Invest in climate science.

  • Embrace green infrastructure.

  • Embrace climate action as a means of advancing economic development and social justice.

(Via: https://www.theguardian.com/commentisfree/2017/mar/21/eight-things-adapt-climate-change-donald-trump)

The threat is real as every year no matter where you are in the world, disaster kills thousands of people and destroys millions of properties and infrastructures. Your efforts – big or small – matter. Whatever you can contribute on your own or as a part of the community can make a difference to help everyone be prepared in case of a disaster. You may even help or save someone’s life.

Disaster Preparedness Concepts Everyone Should Know is available on HDRA Blog

source https://www.harddrivefailurerecovery.net/disaster-preparedness-concepts-everyone-should-know/

Security Issues On The Web

We now live in a digital world where technology makes the world go round. At home, we try to automate as much as we can so we free ourselves from the hassle of doing manual labor leaving us with more time to pursue our interests. The same thing applies to work where tech gadgets dominate the workspace. It is not uncommon today to receive work-related emails even in the wee hours of the morning because that is now the norm.

Almost everyone also owns a smartphone or two aside from possibly owning a tablet and a personal computer/ laptop. The number of gadgets in our lives put our important data and files at risk of data loss or hacking. We should value the importance of cyber security because not only we own all these tech devices but because we also use them to connect to the World Wide Web every day.

We all know that what we mean by hacker around here and what the world at large thinks of as a hacker are often two different things. But as our systems get more and more connected to each other and the public Internet, you can’t afford to ignore the other hackers — the black-hats and the criminals. Even if you think your data isn’t valuable, sometimes your computing resources are, as evidenced by the recent attack launched from unprotected cameras connected to the Internet.

As [Elliot Williams] reported earlier, Trustwave (a cybersecurity company) recently announced they had found a backdoor in some Chinese voice over IP gateways. Apparently, they left themselves an undocumented root password on the device and — to make things worse — they use a proprietary challenge/response system for passwords that is insufficiently secure. Our point isn’t really about this particular device, but if you are interested in the details of the algorithm, there is a tool on GitHub, created by [JacobMisirian] using the Trustwave data. Our interest is in the practice of leaving intentional backdoors in products. A backdoor like this — once discovered — could be used by anyone else, not just the company that put it there.

(Via: http://hackaday.com/2017/03/22/shut-the-backdoor-more-iot-cybersecurity/)

And we continue to experience computing issues as the days go by. At times, such problems can cripple the entire system of major businesses and affect thousands to millions of people using it.

It’s been a rough couple of weeks for the internet. First, Google researchers revealed a serious vulnerability that was causing private data to be leaked from some websites supported by Cloudflare. Then, other Google researchers announced that they had broken the popular encryption algorithm SHA-1. Finally, just when you thought your faith in the internet couldn’t sink any lower, an Amazon data center in Virginia started having problems Tuesday, causing major outages for a number of sites that rely on the company’s popular Amazon Web Services infrastructure.

At this point, we practically expect that whatever personal information we enter into websites will be stolen. But this is different. These incidents point to weaknesses in some of the most ubiquitous and trusted brands (and algorithms) in technology—thousands of organizations and millions of people rely on Cloudflare, Amazon Web Services, and SHA-1 every day. And, in fact, part of the point and promise of using cloud computing services, like Amazon Web Services, is to ease the burden for every individual company owner and website operator.

As the popularity of cloud computing increases so is the possibility of experiencing problems with it that can affect everyone else relying on that single server for storage and security among others and opened up another round of debate regarding the Internet that will likely have no end.

On the whole, from a security and reliability standpoint, this is usually a good thing. Amazon, like most other major cloud providers, has invested in both resources and very talented security engineers to ensure that its infrastructure is well protected and resilient. Without a doubt, it does a better job at providing security than most of their customers would be able to do on their own.

But nobody’s perfect, and when you’ve got thousands of customers all relying on a single service provider and something does go wrong, it’s no longer a small isolated incident. Instead, it’s huge swaths of the internet suddenly becoming inaccessible, as they did on Tuesday.

In the wake of that outage, some people were quick to point out that the internet was deliberately designed to be decentralized specifically so it would not have single points of failure that could take out huge parts of the network. Centralizing everyone’s computing in the massive data centers of the major cloud service providers means that those companies do, indeed, become single points of failure. Very secure, reliable single points of failure, for the most part, but certainly not infallible ones.

(Via: http://www.slate.com/blogs/future_tense/2017/03/01/the_amazon_web_services_outage_shows_the_risks_of_a_centralized_internet.html)

Cybersecurity remains to be a big issue for many mainly because of the catastrophic implications once important and sensitive data get into the wrong hands. We rely heavily on the Internet and on technology in almost every aspect of our modern society. Chaos and mass hysteria may happen if something goes wrong and precious data on the web or on your gadget is compromised.

While many blame the government for some of these security issues, hackers are also to blame as they become more adept and skilled in hacking complex systems and bypassing cyber security measures enforced by the government and server companies.

Protect your gadget and data as an ordinary citizen. Arm your gadgets with antivirus or firewall for protection from malware and viruses. Never visit questionable sites or risk introducing harm to your system. And as for the rest, we can only cross our finger and hope that our data remains secure right where they are now.

Security Issues On The Web Read more on: HDRA Blog

source https://www.harddrivefailurerecovery.net/security-issues-on-the-web/

Fog Computing: A Better Alternative To The Cloud

Technology has taken over humanity. Artificial intelligence that used to be the plot of many Hollywood movies in the past is now a part of our daily lives – albeit some things are done under the radar. Smartphones, Smart TV, and Smart watches among others that are found in most households are becoming more of a necessity than a luxury. Everything has gone smarter except perhaps the person next to you.

While cloud computing gains more popularity, what we should all watch out for is the concept of fog computing. Unlike cloud computing that relies solely on a single server in order to function, fog computing utilizes a less centralized system of storage.

The term “fog computing” has been floating around for a couple of years. Coined by Cisco, it essentially refers to a strain of cloud computing with a less centralised storage system. Rather than keep everything in one physical facility, the network tries to move its files closer to where the end user – such as your phone – is located.

This is one of the biggest issues with current cloud computing. Because your phone doesn’t have enough power to run the code behind assistants like Siri or Google Assistant, it talks to a data centre each time you make a voice query. The nearest servers could be hundreds or thousands of miles away, incurring a performance penalty each time you use the system.

Fog computing decentralises the cloud. It uses smaller data centres placed across a wider area to reduce the distance between your device and the servers. The distance data has to travel is lowered so you get a response more quickly. As TechRadar reports, a team at the University of Camerino has now developed the concept further, creating an actual “fog” of files that also increases cloud security.

This form of “fog computing” endlessly redistributes packets representing an individual file among the nodes in its network. At no point is the entire file stored in a single location. Even if an attacker gains access to one of the servers, all they can download is the garbled contents of sections of a file.

(Via: http://www.digitaljournal.com/tech-and-science/technology/fog-computing-could-be-more-important-than-the-cloud/article/488354)

Fog computing provides the same benefits offered by cloud computing minus the flaws people often encounter on the cloud. Hacking – as serious as it may be – will no longer be able to disable an entire server system through fog computing and offer more security to each data stored.

The use of a serverless system is now possible – changing the way cloud computing works. Computer users now have more option when it comes to data storage and security – a long-awaited good news considering how hacking and phishing remains a very real threat to many.

Technology never stands still, both in invention and execution. One of the newest trends is also one of the most misleading because of the term: Serverless computing. The term suggests that no back-end servers are used – when that is not at all the case. It just means servers are no longer your concern.

The first wave of the move away from servers is well underway with the move from on-premises hardware in company data centers toward renting compute capacity from Platform-as-a-Service (PaaS) vendors like Amazon Web Services (AWS) and Microsoft Azure.

The promise was straightforward and simple: developers can rent capacity as needed and shut it down when they are done. They can “spin up” a virtual server on AWS or Azure in just a few minutes, with the defined amount of CPU cores, memory, storage, and necessary software, as opposed to waiting weeks to order a server and install it in the company data center.

Serverless computing takes our computing experience to the next level without us having to deal with server issues that have been the bane of our existence.

Enter serverless computing, the next step in the move to IaaS. With serverless computing, rather than allocating virtual machines and deploying code to them, the development team just uploads its code, called functions because they perform a single function, and lets the PaaS vendor figure out how to best deploy and run those functions.

The benefits are huge, says Torsten Volk, managing research Director with Enterprise Management Associates, an IT consultancy. “Coders don’t have to worry about scalability and high availability, you only pay for the time your code runs, instead of reserving EC2 resources for an ongoing time period, and setup is almost instant. Create code and give it a try,” he said.

(Via: http://www.datamation.com/cloud-computing/how-serverless-computing-is-changing-the-cloud.html)

It may only be available for some today but time will come when serverless computing will be made available to everyone on the web. Computer experts still have time to make minor tweaks and modifications so that users encounter fewer problems with its use and for it to be able to perform a wider range of functions. Until then, we can only hope that security and storage issues with cloud computing are resolved while we wait for a better one to come along.

If you are currently experiencing server issues and want to learn more about hard drive recovery, visit https://www.harddrivefailurerecovery.net/raid-recovery/ to find out exactly what needs to be done. Meanwhile, check out https://www.harddrivefailurerecovery.net/the-harsh-realities-of-ssd-drive-failure/ to learn more about SSD drive failure and solutions.

Fog Computing: A Better Alternative To The Cloud Find more on: http://www.harddrivefailurerecovery.net

source https://www.harddrivefailurerecovery.net/fog-computing-a-better-alternative-to-the-cloud/

Data Security On The Cloud

As we attempt to speed up transactions – whether in the government or in private companies – the processes of all offices and agencies are centralized and thus computerized. Like any form of technology, centralizing data and files has its pros and cons. It means that people in the same agency can access or modify the same file with just a few clicks regardless of location.

But as the number of computer users increases, the demand for servers to accommodate data storage and security also rises. It is why cloud computing came into existence – to defy the usual physical limitations we face when it comes to communication and computing. With data on the cloud, we free our computer’s hard drives from the burden of storing such a large number of files yet still allow us to access it whenever the need arises. Indeed, cloud computing will remain to be a permanent fixture in the computing world.

Most people have an idea of what “cloud computing” is. In a nutshell, it refers to accessing documents, information and applications online rather than storing things on hard drives. Dropbox, Apple’s iCloud, and Salesforce.com are all examples.

Although countless businesses worldwide have been accessing their data on the cloud for several years, some are still hesitant. A few reasons for resisting the move to cloud computing include:

  • Downtime. “What if my documents become unavailable right when I’m about to make an important pitch to a client?”

  • Security. “Do I know for sure that my important data won’t get hacked?”

  • Costs. “We have enough business costs. Can we really afford one more monthly service fee?”

(Via: http://www.wral.com/cloud-computing-the-environmental-pros-and-cons/16126937/)

So yes, there are data issues in using the cloud. And considering that the cloud supports the function of numerous big companies on the web, issues involving data security should be a reason for concern to all of us.

If you’re a small business owner, you’ve heard a lot about cloud computing in the last few years. You may even be thinking about taking your enterprise into the cloud right now.

Cloud computing, the process of storing data and running software applications offsite on remote servers, has taken off because it provides a high level of productivity and convenience.

Is Cloud Computing Safe?

The assumption that by putting your data in the cloud you’re essentially “hanging it out to the wind” is a false one. In fact, in most cases, storing your data in the cloud is safer than storing it on local servers or in hard copy. Hard copies and local servers can be stolen during break-ins and local servers may be targeted by hackers just as cloud servers are. In fact, data stored in the cloud is less likely to be hacked than that stored locally because the security protocols used by reputable cloud providers are so good now. The very survival of a cloud platform as a business hinges on its ability to keep data safe. Take the case of Amazon Web Service (AWS), the world’s largest cloud provider. AWS uses hundreds of security controls to keep client data safe, including data encryption. The platform serves over a million customers, including Amazon’s giant retail operation.

Smaller providers also have robust security measures in place and the reputable ones have great track records in cloud security. Check out their reputations by doing internet research (look at each company’s client base and testimonials, if available), reading trade journals or by talking to tech experts.

The question now is this, how can you secure your data once it is on the cloud?

  • Strong passwords and multi-factor authentication systems are your first line of defense when it comes to security.

  • Train your staff to beware of phishing attacks emails or other communications which trick users into revealing security information like passwords. 

  • Many cloud platforms include login and activity monitoring tools as part of their security measures. 

  • In addition to phishing tactics, hackers also use malware (such as Trojans) to gain access to mobile devices and computers.

  • Finally, you should strongly consider encrypting your data on the cloud.

(Via: http://security.itbusinessnet.com/article/Small-Business-Security:-Keeping-Data-Safe-in-the-Cloud-4847351)

There is no assurance that data is 100% secured on the cloud because threats are just around the corner. We all know that by now. It’s the reason why you should take measures yourself in protecting your data, whether it is on the cloud or on your computer hard drive. Data loss is possible whether through hard drive failure or a malware or virus that managed to get into your system without you knowing.

The following article Data Security On The Cloud was originally published on http://www.harddrivefailurerecovery.net

source https://www.harddrivefailurerecovery.net/data-security-on-the-cloud/