<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Business @ Computer Division</title>
	<atom:link href="http://business.computer-division.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://business.computer-division.com</link>
	<description>Business solutions for all...</description>
	<lastBuildDate>Tue, 07 Jul 2015 15:42:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Combat Cyber Crime</title>
		<link>http://business.computer-division.com/uncategorized/combat-cyber-crime/</link>
		<comments>http://business.computer-division.com/uncategorized/combat-cyber-crime/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 12:08:38 +0000</pubDate>
		<dc:creator>Admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://business.computer-division.com/?p=454</guid>
		<description><![CDATA[<p>Types of threats Malicious code Malicious code is a broad category that encompasses a number of threats to cyber-security. In essence it is any “hardware, software, or firmware that is intentionally included or inserted in a system for a harmful purpose.”[5] Commonly referred to as malware it includes computer viruses, worms, Trojan horses, keyloggers, BOTs, Rootkits, and any software security exploits.[6] Malicious code also includes spyware, which are deceptive programs, installed without authorization, “that monitor a consumer’s activities without their consent.”[7] Spyware can be used to send users unwanted popup ads, to usurp the control of a user’s Internet browser, or to monitor a user’s online habits. However, spyware is usually installed along with something that the user actually wishes&#160;<a href="http://business.computer-division.com/uncategorized/combat-cyber-crime/" class="read-more">Continue Reading</a></p><p>The post <a href="http://business.computer-division.com/uncategorized/combat-cyber-crime/">Combat Cyber Crime</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Types of threats<br />
Malicious code</p>
<p>Malicious code is a broad category that encompasses a number of threats to cyber-security. In essence it is any “hardware, software, or firmware that is intentionally included or inserted in a system for a harmful purpose.”[5] Commonly referred to as malware it includes computer viruses, worms, Trojan horses, keyloggers, BOTs, Rootkits, and any software security exploits.[6]
<p>Malicious code also includes spyware, which are deceptive programs, installed without authorization, “that monitor a consumer’s activities without their consent.”[7] Spyware can be used to send users unwanted popup ads, to usurp the control of a user’s Internet browser, or to monitor a user’s online habits. However, spyware is usually installed along with something that the user actually wishes to install. The user consents to the installation, but does not consent to the monitoring tactics of the spyware. The consent for spyware is normally found in the end-user license agreement.[7] akua AB</p>
<p>Network attacks</p>
<p>A network attack is considered to be any action taken to disrupt, deny, degrade, or destroy information residing on a computer and computer networks.[8] An attack can take four forms: fabrication, interception, interruption, and modification. A fabrication is the “creation of some deception in order to deceive some unsuspecting user”; an interception is the “process of intruding into some transmission and redirecting it for some unauthorized use”; an interruption is the “break in a communication channel, which inhibits the transmission of data”; and a modification is “the alteration of the data contained in the transmissions.”[5] Attacks can be classified as either being active or passive. Active attacks involve modification of the transmission or attempts to gain unauthorized access to a system, while passive attacks involve monitoring transmissions. Either form can be used to obtain information about a user, which can later be used to steal that user’s identity. Common forms of network attacks include Denial of Service (Dos) and Distributed Denial of Service(DDoS), Man-in-the-middle attack, packet sniffing, TCP SYN Flood, ICMP Flood, IP spoofing, and even simple web defacement.[9]
<p>Network abuse</p>
<p>Network abuses are generally considered fraudulent activity that is committed with the aid of a computer. SPAM is one of the most common forms of network abuse, where an individual will email list of users usually with unsolicited advertisements or phishing attacks attempting to use social engineering to acquire sensitive information such any information useful in identity theft, usernames, passwords, and so on by posing as a trustworthy individual. Pharming is also another form of network abuse where a website’s traffic is redirected to a bogus website, usually by exploiting vulnerabilities in Domain Name System(DNS) servers.</p>
<p>Social engineering</p>
<p>Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[10] This method of deception is commonly used by individuals attempting to break into computer systems, by posing as an authoritative or trusted party and capturing access information from the naive target.[11] Email Phishing is a common example of social engineering&#8217;s application, but it is not limited to this single type of attack.</p>
<p>The post <a href="http://business.computer-division.com/uncategorized/combat-cyber-crime/">Combat Cyber Crime</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://business.computer-division.com/uncategorized/combat-cyber-crime/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>4webs</title>
		<link>http://business.computer-division.com/uncategorized/203/</link>
		<comments>http://business.computer-division.com/uncategorized/203/#comments</comments>
		<pubDate>Sat, 04 May 2013 15:50:31 +0000</pubDate>
		<dc:creator>Admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://business.computer-division.com/?p=203</guid>
		<description><![CDATA[<p></p><p>The post <a href="http://business.computer-division.com/uncategorized/203/">4webs</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></description>
				<content:encoded><![CDATA[<p><a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0075.jpg"><img class="alignnone size-full wp-image-201" alt="thumb_007" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0075.jpg" width="288" height="200" /></a> <a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0065.jpg"><img class="alignnone size-full wp-image-200" alt="thumb_006" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0065.jpg" width="288" height="200" /></a> <a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0055.jpg"><img class="alignnone size-full wp-image-199" alt="thumb_005" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0055.jpg" width="288" height="200" /></a> <a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0045.jpg"><img class="alignnone size-full wp-image-198" alt="thumb_004" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0045.jpg" width="288" height="200" /></a> <a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0035.jpg"><img class="alignnone size-full wp-image-197" alt="thumb_003" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0035.jpg" width="288" height="200" /></a> <a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0025.jpg"><img class="alignnone size-full wp-image-196" alt="thumb_002" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0025.jpg" width="288" height="200" /></a> <a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb5.jpg"><img class="alignnone size-full wp-image-195" alt="thumb" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb5.jpg" width="288" height="200" /></a> <a href="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0124.jpg"><img class="alignnone size-full wp-image-194" alt="thumb_012" src="http://business.computer-division.com/wp-content/uploads/2013/04/thumb_0124.jpg" width="288" height="200" /></a></p>
<p>The post <a href="http://business.computer-division.com/uncategorized/203/">4webs</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://business.computer-division.com/uncategorized/203/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Active Directory / System State</title>
		<link>http://business.computer-division.com/uncategorized/active-directory-system-state/</link>
		<comments>http://business.computer-division.com/uncategorized/active-directory-system-state/#comments</comments>
		<pubDate>Mon, 15 Apr 2013 16:18:27 +0000</pubDate>
		<dc:creator>Admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://business.computer-division.com/?p=56</guid>
		<description><![CDATA[<p>Feature Overview Computer Division performs single click backups for active directory/system state No need for application specific backup tools</p><p>The post <a href="http://business.computer-division.com/uncategorized/active-directory-system-state/">Active Directory / System State</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Feature Overview</p>
<p>Computer Division performs single click backups for active directory/system state<br />
No need for application specific backup tools</p>
<p>The post <a href="http://business.computer-division.com/uncategorized/active-directory-system-state/">Active Directory / System State</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://business.computer-division.com/uncategorized/active-directory-system-state/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Microsoft Exchange Backup and Recovery</title>
		<link>http://business.computer-division.com/uncategorized/microsoft-exchange-backup-and-recovery/</link>
		<comments>http://business.computer-division.com/uncategorized/microsoft-exchange-backup-and-recovery/#comments</comments>
		<pubDate>Mon, 15 Apr 2013 16:17:09 +0000</pubDate>
		<dc:creator>Admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://business.computer-division.com/?p=53</guid>
		<description><![CDATA[<p>Computer Division Backup and Recovery Software for Microsoft Exchange delivers rapid granular recovery of information stores, specific user mailboxes, email messages, shared folders from point-in-time Exchange backups. Our Exchange Server Backup Software gives you the ability to be ready and worry-free when disaster strikes, whatever the cause at a price and performance point that is attractive to SMBs. Key Features: Supports fast backup and rapid recovery of Exchange 2000 2003 2007 2010 Backup mailboxes or public folders or entire information store or sub folders Support near continuous data protection by backing up Exchange transaction logs Supports multiple options to recovery mailbox, single mail message or entire information store Schedule full and incremental exchange backups using easy-to-use management console Delivers Bare&#160;<a href="http://business.computer-division.com/uncategorized/microsoft-exchange-backup-and-recovery/" class="read-more">Continue Reading</a></p><p>The post <a href="http://business.computer-division.com/uncategorized/microsoft-exchange-backup-and-recovery/">Microsoft Exchange Backup and Recovery</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Computer Division Backup and Recovery Software for Microsoft Exchange delivers rapid granular recovery of information stores, specific user mailboxes, email messages, shared folders from point-in-time Exchange backups. Our Exchange Server Backup Software gives you the ability to be ready and worry-free when disaster strikes, whatever the cause at a price and performance point that is attractive to SMBs.</p>
<p>Key Features:</p>
<p>Supports fast backup and rapid recovery of Exchange 2000 2003 2007 2010<br />
Backup mailboxes or public folders or entire information store or sub folders<br />
Support near continuous data protection by backing up Exchange transaction logs<br />
Supports multiple options to recovery mailbox, single mail message or entire information store<br />
Schedule full and incremental exchange backups using easy-to-use management console<br />
Delivers Bare metal restore.</p>
<p>The post <a href="http://business.computer-division.com/uncategorized/microsoft-exchange-backup-and-recovery/">Microsoft Exchange Backup and Recovery</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://business.computer-division.com/uncategorized/microsoft-exchange-backup-and-recovery/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Restores</title>
		<link>http://business.computer-division.com/uncategorized/restores/</link>
		<comments>http://business.computer-division.com/uncategorized/restores/#comments</comments>
		<pubDate>Mon, 15 Apr 2013 16:14:18 +0000</pubDate>
		<dc:creator>Admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://business.computer-division.com/?p=51</guid>
		<description><![CDATA[<p>Easy and Instant Restores Instant restore by booting up as a virtual machine (P2V) Computer Division Disk image backups are in VHD format by default and therefore can be quickly booted up as a virtual machine in a Hyper-V server. The VHD based backups can also be converted into VMware file format (VMDK) and booted up as virtual machines in VMware ESX servers. This helps MSPs to provide an efficient Disaster Recovery and Business Continuity service to their customers. Secure Restores Data arrives at the agent machine (machine to which data has to be restored) in encrypted format keeping it secure during transit from the remote backup server. Restore jobs have to be first authenticated at the backup server and&#160;<a href="http://business.computer-division.com/uncategorized/restores/" class="read-more">Continue Reading</a></p><p>The post <a href="http://business.computer-division.com/uncategorized/restores/">Restores</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Easy and Instant Restores<br />
Instant restore by booting up as a virtual machine (P2V)</p>
<p>Computer Division Disk image backups are in VHD format by default and therefore can be quickly booted up as a virtual machine in a Hyper-V server. The VHD based backups can also be converted into VMware file format (VMDK) and booted up as virtual machines in VMware ESX servers. This helps MSPs to provide an efficient Disaster Recovery and Business Continuity service to their customers.<br />
Secure Restores</p>
<p>Data arrives at the agent machine (machine to which data has to be restored) in encrypted format keeping it secure during transit from the remote backup server. Restore jobs have to be first authenticated at the backup server and the encryption password has to be provided before the restore can initiate.<br />
Restore on agent machine, backup server or replication server</p>
<p>Restore jobs can be initiated from the agent machine, backup server or from the replication server (server to which backup server is replicated). This provides the ability for MSPs to restore data at the server which they manage and ship the disk with the restored data to their customer.<br />
Exporting backup data</p>
<p>Backup data can be exported to an external disk, keeping the data in encrypted and compressed format. The disk can then be shipped to the customer site where data is imported and restored into the machine that is to be recovered.<br />
Restoring versions from different backup timestamps</p>
<p>Sometimes it may be required that some of the files have to be restored from previous versions while the latest version has to be restored for rest of the files.<br />
Our backup restore lets you do that.<br />
Resume from where it left off.</p>
<p>Restore jobs initiated to an offsite backup server could sometimes take a longer time to complete depending upon the available network bandwidth and data size. Our Backup software can resume restore from exactly where if left off in case the restore job gets interrupted due to, say network failure.<br />
Restoring to an alternate machine</p>
<p>The post <a href="http://business.computer-division.com/uncategorized/restores/">Restores</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://business.computer-division.com/uncategorized/restores/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Virtualization Protection</title>
		<link>http://business.computer-division.com/uncategorized/virtualization-protection/</link>
		<comments>http://business.computer-division.com/uncategorized/virtualization-protection/#comments</comments>
		<pubDate>Mon, 15 Apr 2013 16:08:05 +0000</pubDate>
		<dc:creator>Admin</dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://business.computer-division.com/?p=47</guid>
		<description><![CDATA[<p>Complete Protection for Your Virtual Environment Computer Division can backup entire virtual machine centrally without having to install the agent in each of the virtual machines. We currently supports backing up of VMware and Hyper-V VMs. Backing up VMware ESX Servers A single installation of Computer Division backup client can backup VMs running on multiple ESX/ESXi servers. Computer Division client can also connect to vCenter Server to backup all the VMs that the vCenter server manages. Computer Division can directly backup the VMs from the source to the backup server without having to first dump the data locally in a temporary storage in  client machine.  Software supports incremental backup of VMware VMs. ESX 3.0, ESX 3.5, ESXi 3.5, ESX 4.x&#160;<a href="http://business.computer-division.com/uncategorized/virtualization-protection/" class="read-more">Continue Reading</a></p><p>The post <a href="http://business.computer-division.com/uncategorized/virtualization-protection/">Virtualization Protection</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></description>
				<content:encoded><![CDATA[<p>Complete Protection for Your Virtual Environment<br />
Computer Division can backup entire virtual machine centrally without having to install the agent in each of the virtual machines. We currently supports backing up of VMware and Hyper-V VMs.</p>
<p>Backing up VMware ESX Servers<br />
A single installation of Computer Division backup client can backup VMs running on multiple ESX/ESXi servers. Computer Division client can also connect to vCenter Server to backup all the VMs that the vCenter server manages. Computer Division can directly backup the VMs from the source to the backup server without having to first dump the data locally in a temporary storage in  client machine.  Software supports incremental backup of VMware VMs.</p>
<p>ESX 3.0, ESX 3.5, ESXi 3.5, ESX 4.x and ESXi 4.x and VMware Server 2.0 Virtual Machines are supported<br />
Backing up Hyper-V Servers<br />
Backup software  installed in the Hyper-V Host Server can backup the VMs running on it. Backup software uses Microsoft VSS to make sure the VMs are in a consistent state before backing up. It backs up only the changed data in the VMs during incremental backup. It can backup the data directly to the remote backup server without requiring a temporary storage space in the Hyper-V server that is backed up.</p>
<p>The post <a href="http://business.computer-division.com/uncategorized/virtualization-protection/">Virtualization Protection</a> appeared first on <a href="http://business.computer-division.com">Business @ Computer Division</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://business.computer-division.com/uncategorized/virtualization-protection/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
