Monday, August 27, 2007

All About RAID

RAID is the short form of Redundant Array of Inexpensive Disks, where Inexpensive is often replaced with Independent. A few years back when the disks had less storage capacity with expensive prices, a couple of disks were mounted to create a larger virtual disk, and it was much more logical and easily administered.

All the disks are all placed in a confined area and if one disk crashes then a very useful amount of data can be lost. In order to avoid this is a technique called ‘Mirroring’ is taken into consideration. The data from all the disks is copied to another bulk of disks, so that if there is any corrupted disk then it would be replaced with its mirror disk. This is done for the complete integrity of your mission-critical data.

RAID Types

Although there are many types of RAID arrays, but the ones explained below are the important of all.

Concatenation:

This type of RAID array is called ’Simple’ RAIDs. It is a group of disks that are connected together tightly. Data is distributed in a linear pattern on the disk. Data is written a sequential order i-e, first disk is filled and then the text gets written on to the next disk and so on. All this is done by the volume manager, who is the in charge of the RAID. If we have less data as compared to the total size of all the disks combined then it is useless for us.

RAID-0:

It is also known as ‘striping’. Striping is much similar to concatenation, but data processing of RAID-0 is much better than its predecessor. Whenever we write some data it gets stored across all the disks. So when there is a request for data retrieval or placement it is executed much faster. Stripe width and columns are the things which make this type important.
-Stripe Width: It specifies the amount of data to be written on one particular disk.
-Column: It refers to each disk. A major flaw of RAID-0 is that if a single disk crashes than the whole system can collapse, since the data is stripped across all the disks.

RAID-1:

This type of RAID is called ‘Mirroring’. Though it’s not actually a RAID but sure is an important component of RAID. The logic behind this technique is to create a mirror image of your RAID. So that if a particular disk crashes, then the mirror will play its part. Mirroring is an excellent way of protecting the business critical data, but it comes for a good amount of money.

RAID-0+1:

This type combines Stripping and Mirroring together. We place a bunch of disks, which acts like mirrors to save the stripped data. One important thing to know is that the mirror has to be the same type of RAID as the original RAID. If we want to make a mirror copy of the simple RAID, then our mirror will be simple RAID and vice versa.

RAID-5:

RAID-5 is the best solution for increasing disk space and disk redundancy by leaps and bounds. It is similar to RAID-1 as it contains columns and stripe-widths. The difference appears when we write data. The data is written to the multiple disks at the same time, parity is also written along the data.

So even if a single disk fails then no need to worry since the data is saved on the remaining disks. Though we get quite pleased with the results but all goes in vain when we think about I/O bandwidth.

What is Electronic Evidence Discovery?

Electronic Discovery (or E-Discovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. Electronic Discovery can be carried out offline on a particular computer or it can be done across a network.

The average company spends between $100,000 and $1,000,000 in total ramifications per year for data loss. (Source: 7th Annual ICSA Lab's Virus Prevalence Survey, March 2002)

New Federal Rules of Civil Procedure became law on 12-1-2006, which most corporate lawyers and attorneys are either unfamiliar with or have not been required to use. The Federal Rules of Civil Procedure, specifically Rule 26, Rule 34, and Rule 45, have been updated in accordance with Computer Forensics and Electronic Evidence Discovery and have added many new procedures for handling and requesting electronic information.

Various types of data may be considered as critical evidence in a case. These types of data include:

* e-mail
* plain text and documents
* images
* calendar files
* databases
* spreadsheets
* digital faxes
* audio files
* animation
* websites
* computer applications
* viruses and sypware

With the increased usage and dependence on the Internet - for corporate and individual communication - e-mail is a valuable source of evidence.

There are several phases to Electronic Discovery. The collection of data is just the first. Once a data audit has been completed and a computer forensics or data recovery service implemented, then there are the tasks to process the electronic evidence and produce the electronic evidence in a format which the client and lawyers will accept, such as TIFFs or PDFs.

The largest obstacles for Electronic Discovery are attorneys and companies who are not getting a Computer Forensic expert involved early in the process and end up compromising or destroying the data that could be important to their case.

Understanding How Firewalls Protect Your Computer

Not many of us intentionally leave our cars unlocked or the front of our homes open to strangers. But we often leave our computers wide open to anyone and everyone that may want to snoop.

To get and keep our computers safe from hackers,or anyone wanting to have a look in our computers,we need the aid and assistance of something commonly called Firewalls.

A Firewall can be hardware or software that acts as a gatekeeper to your computer.It does this by monitoring all internet traffic coming in and going out of our computers.

They not only allow the passage of this traffic but inspects all,making sure it is safe and do not contain viruses,any spyware,or other malicious software.

Firewalls control internet traffic in two methods,Packet filtering and stateful inspection.A Packet is a chunk of data and it contains the address of the computer it comes from and a destination address.

Ok,so you're wondering what on earth is an IP Address.Well,it is an identifier for your computer device.The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. If the Firewall recognizes the Packet and its IP Address,or its Internet Protocol Address,it allows the Packet to pass. The Stateful Inspection method look at the some data in the Packet and compares key chunks of data to a large area that contains known,trusted information.

to see if it is safe or if your computer is expecting the data.It also allow safe passage of data if all seems well.The Stateful Inspection method is preferred since it checks the data that have passed through your computer before. What About Those Hardware Firewalls Hardware Firewalls are devices that are designed to run software Firewalls.So why are there hardware firewalls,you ask.One big advantage of having a Hardware Firewall is that the computer don't have to do any work. The hardware running the software does all work,thereby leaving the CPU in the computer free to get on with other tasks.The CPU,or Central Processing Unit should be free as much as possible to keep the computer running at peak performance.

Explaining The Software Firewalls

There are many creative ways that people use to access or abuse your computer when its not protected. Someone is able to connect to your computer and control it in some form. This can range from being able to view or access your files to actually running programs on your computer. Some of the software Firewalls protect your computer from are the following. Email Bombs.Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages. If you spend time on the internet often you will most likely experience this. Viruses. This is no doubt the most well known threat.A Virus is a small file which reproduces itself on other computers.Viruses may be harmless to wiping your hard drive clean. Firewalls may not protect you from all viruses.It would be worth your while to invest in good anti virus software as added protection.Once you invest in a Firewall,study its owner's manual to set it up. Once the Firewall has been installed and setup complete,take a minute to be sure its working.Test the Firewall by going online and visiting a security site.Go to www.grc.com and give their free Shields Up security test a try. If the Firewall pass,you will have the comfort of knowing your PC will have that added protection from someone stealing your credit card information or any valuable information. If you have not invested in a Firewall,won't wait to give one a try.Your critical files and programs will be much safer and you will have the knowledge of being able to install Firewalls on the PC of your friends,enemies,and everyone else in between. Keep your computer safe from hackers and other intruders by fully understanding how firewalls operate in the background of your computer.

Blog Archive

Categories