Sovmeschenye sposobov with each other
Generally, If your business Interesting, then zhdyte “guests” as text pravoohranyteley. These GOST prydut here of any of Vasheho competitor kotorыy hochet freeze your business ili Kotor You Mesha …
But, This My The case and about this sweat …
So I began the Look Methods of protection from raiding for Clearing resources companies.
Ponyatnoe Case SECURITY gradually usylyvalas least to Increase attack co storony pravoohranyteley.
1 way (kotorыy prymenyal long)
First Vaud AS Primary (hostovoy) the operating system I yspolzoval Linux Ubuntu. Handling also held in vyrtualnыh machines. This obespechyvalo bolshuyu hybkost Informational transfer in systems with one computer on Another Possibility and contingency Copy vsey the Virtual mashiny, CO to all settings.
In Linux Ubuntu there are remarkable Function – kryptovanye vynchestera and User Account records. As a result, all the info hranytsya in zashyfrovannom video and is not available If vynchester withdraw raise in druhuyu system and pыtatsya dostuchatsya k of information to walk without the knowledge of passwords.
This method of otlychnыy of protection from direct access of information k, when the server computer Or bыl Off ..
In practice the same voznyklo Several drawbacks:
1. If kryptovat vynchester and Account at the then voznyknut Can not sboy in Kotor zahochet vosstanavlyvatsya Swap-section. As a result, voznyknet problem with starting the operating system. I have a takoj The case bыl, Therefore, that way I эtoho otkazalsya, because This led hp depressions nadezhnosty system with the loss of information vozmozhnoy
2. When you restart the server need it enters a password. This okazalos Very udobnыm not, because If rabotaesh far off, And No KVM, umeyuscheho Business via Internet – system not perezahruzysh at distances …
3. Pravoohranyteley main appeal WARNING Data Section, prosyat ones provided with password … Zachem you lyshnye Questions?
5. impossible to move tselыy kryptovannыy Section with one computer to another. Or, for example, the ego on vynchester – Like rezervnuyu cops in shyfrovannom form. Pryhodytsya perekryptovыvat the info, that Significantly reduces the velocity of information to tolerate others bearers.
2 ways (kotorыy prymenyal long)
Few modyfytsyroval Method 1, realyzovav kryptovanye files. This makes sluchae with pomoshchju spetsyalnoy program, kryptuetsya not all vynchester as part of the ego and Only This persists as text file crypto container at no shyfrovannom disk.
Because drive in etom sluchae shyfruetsya not completely at Loading No Need enters the password for decoding. As a result – perezahruzhaetsya system at distances s korrektnыm recovery abilities Remote control.
In addition, the system is working more reliable, than with completely kryptovannыmy disks. We will not be frighten Out of Straw kryptovannoho partition, for example, Swap …
Such a system Excellent zarekomendovala itself.
But, in practice one ostalas The basic problem:
– Zloumыshlennyky mogut find with yours lehkostyu server and takoj same lehkostyu – yzъyat … Topics samыm, you poteryaete Information and technician for 1-2 year … Ie razvalytsya your business because of the loss View full ili Significant information.
3 ways (usovershenstvovannaya method)
Usovershenstvovannыy 2 ways with storage of information on the laptop (on the smartphone).
Advantages storage of information on a laptop – this Ability Connection ego to any point of the world. And in the occurrence uhrozы – ease tolerate ego in another place.
This method allows us to dobytsya maksymalnoy hybkosty transfers the information from point to point.
When etom, you can Create Several such dublyruyuschyhsya tochek, kotorыe WILL razmeschenы in raznыh places. Sluchae in Tacoma, will be tyazhelo Detect all zvenya storage of information and “nakrыt s” in one fell swoop.
This makes sluchae, you maksymalnuyu we obtain autonomy reshanyya, most vozmozhnuyu ego peremeschaemost and эkonomychnost from the point of view consumption and prices эlektrychestva decision.
Malenkye disadvantages of the given method:
– For krupnыh kompanij laptop can u bыt nedostatochnыm from the point of view proyzvodytelnosty.
– Vynchestera laptops, Generally, Significantly slower, than vynchestera obыchnыh computers and topics More – servers. This Can not skazыvatsya nabolshyh Delay in read / write of information on vynchester.
– All system nodes can also “vыchyslyt” and If nahodyatsya ones in Ukraine – nakrыt “in one fell swoop.” Of course, This is orders of magnitude slozhney make one, than in predыduschem way …
As a whole, CEI method of dostatochno nadezhen and эkonomychen.
4 Ways (maksymalnыy Level zaschyschennosty)
Osnovыvaetsya for 2 Or 3 ways (all from your zavysyt of opportunities and ZHELANYI).
In order To not yours yzъyaly server “on lawlessness” neobhodimo, Laws To This pozvolyaly not make one. Ponyatnoe Case in sehodnyashnee TIME Act – is not it, that the people of Ukraine zaschyschaet ili ego property … pyshutsya Laws in Ukraine pod nuzhdы olyharhov sylovыh and organs. A This mean, that people in etom sluchae – Nothing … And kazhdogo, hosudarstvennaya Machine Can razdavyt, How bukashku.
But, no info obyazana hranytsya in Ukraine. A This mean, that We Select mozhem such countries, kotoraja bы obespechyla us maksymalnuyu zaschyschennost nashej Technics and of information …
Take care of the info method 2 ili ili Nyderladnah 3 in the US. And samыm topics, ripen postavlennыe our goal …
Sovmeschenye sposobov with each other
Much Naskolko nodes and in the country made the kakyh – is already your decision, here zavysyaschee neobhodymoy Class of protection of information and your fynansovыh of opportunities …
© 2014, https:. Все права защищены. Rudyuk Sergey. К2®