Backup schema

November 4, 2009 Tinggalkan komentar

Backup is needed in company for disaster recovery purpose and provide availability data so can achieve one of principle of information security also known as CIA Triad.

Basic of common backup process :
1. Full Backup : Backup all data that have selected.
2. Incremental Backup : Backup all data or files changed since last backup (any kind of backup such as full, incremental or differential).
3. Differential Backup : Backup all data or files changed since last full backup

Backup Rotation
there are 2 backup rotation method :

1. Grandfather-father-son

Most common use for backup schedule and also Known as GFS. GFS using 3 generation of tapes. incremental backup is son, Weekly Full Backup is father and Monthly Full Backup is GrandFather.
firstly : One to four media is set for incremental backup, performed daily from Monday to thursday. 4 media set referred as son media set.
secondly : New media set performed weekly full backup started on friday, and not performed incremental backup. Media set used referred as father media set.
thirdly : New media set performed monthly full backup on the last friday of the month.Media set used referred as grandfather media set. Grandfather tape stored off-site while younger generations in backup rotation.

2. Tower of hanoi
This method is more complex and based on mathematical puzzle. The game consists of three pegs with a number of discs placed on one of them. Each disc is of its own size and the smaller discs are placed on the larger ones. The task is to move the discs to another peg moving only one disc at a time and only placing a smaller disc on a larger one.

still in update progress… i will explain later.


Cannot open vsd file using visio viewer 2007

November 3, 2009 109 komentar

i face the problem that user want to view vsd file without having office visio license, so i installed visio viewer 2003 but it cannot opened,after right-click to allow activeX control and then internet explorer only shown red X only.
so i upgrade to newer version visio viewer 2007 SP2 but the problem still cannot solve. i search and tried to reconfigure microsoft office, internet explorer include security, add-ons and other component for 6 hours, finally i can fix it with simple step, tried to uninstall security update KB973525(Cumulative Security Update for ActiveX Killbits).

Kategori:Desktop, MIc. OffiCe

Edit bootloader windows 7 dengan EasyBCD

September 23, 2009 2 komentar

Seharusnya untuk dual boot windows 7 dan XP, XP terlebih dahulu diinstall baru kemudian windows 7. Saya mencoba install windows 7 baru kemudian windows XP,sehingga setiap kali booting langsung boot ke XP, lalu saya mencoba repair windows 7 dan hasilnya sama langsung booting ke windows 7 tanpa ada bootloader.

Untuk mengubah konfigurasi bootloader di windows 7, gunakan bcdedit dari command prompt. BCDedit adalah tool berbasis command line untuk mengubah konfigurasi boot di vista ataupun windows 7.

EasyBCD merupakan software gratis dari neosmart technologies yang berfungsi mengubah BCDedit berbasis GUI yang user-friendly sehingga mengkonfigurasi bootloader menjadi lebih mudah. Untuk menambahkan OS di bootloader, kita tinggal menambahkan entry sesuai OS-nya.

Security Evaluation on network

Agustus 25, 2009 2 komentar

Security evaluation needed to prevent and protect information from unauthorized access in our network. Information security is concerned of protecting confidentiality, integrity and availability of information, which also known as CIA Triad. CIA Triad forms the core principles of information security.

  • Confidentiality means information should be accessed only to whom have the right acess to it.
  • Integrity means information should be modified only to whom have authorized.
  • Availability means information should be available when its needed.
  • We have to understand about the weaknesses in our network, using framework such as ISO/IEC 27002:2005. The weakness in the system called vulnerability. Vulnerability can cause harm called threat. Threat not always can cause corruptness of the system but from the threat possibly occur attack that can harm security element of the system. Risk is the possibility that something bad will happen to informational asset.

    The ISO/IEC 27002:2005,Code of practice for information security management recommends the following be examined during a risk assessment:

    • security policy,
    • organization of information security,
    • asset management,
    • human resources security,
    • physical and environmental security,
    • communications and operations management,
    • access control,
    • information systems acquisition, development and maintenance,
    • information security incident management,
    • business continuity management, and
    • regulatory compliance.

    In broad terms the risk management process consists of:

    1. Identification of assets and estimating their value. Include: people, buildings, hardware, software, data (electronic, print, other), supplies.
    2. Conduct a threat assessment. Include: Acts of nature, acts of war, accidents, malicious acts originating from inside or outside the organization.
    3. Conduct a vulnerability assessment, and for each vulnerability, calculate the probability that it will be exploited. Evaluate policies, procedures, standards, training, physical security, quality control, technical security.
    4. Calculate the impact that each threat would have on each asset. Use qualitative analysis or quantitative analysis.
    5. Identify, select and implement appropriate controls. Provide a proportional response. Consider productivity, cost effectiveness, and value of the asset.
    6. Evaluate the effectiveness of the control measures. Ensure the controls provide the required cost effective protection without discernible loss of productivity.

    Diproteksi: All My Stuff

    Agustus 18, 2009 Masukkan password Anda untuk melihat komentar.

    Konten ini diproteksi dengan password. Untuk melihatnya cukup masukkan password Anda di bawah ini:

    Kategori:TutoRiaL n InFo

    Germany input language di VPC 2007

    Untuk dapat menginput tulisan german seperti öáåð di virtual PC dengan menggunakan keyboard US, biasanya kita menekan ALT kanan(ALTGR) + a untuk menghasilkan á. Dikarenakan ALT kanan di VPC 2007 telah digunakan untuk VPC console maka sebaiknya merubah host key nya di VPC console > file > Options > keyboard > klik current host key dan tekan ALT.


    Enable POP3 di exchange Server 2003

    Desember 24, 2008 4 komentar

    Untuk mengaktifkan pop3 :

    1. Jalankan service Microsoft Exchange POP3, di start > Run kemudian ketik services.msc default startup type-nya disabled ubah menjadi automatic
    2. Aktifkan default virtual POP3 server, di ESM > Administrative Groups > First Administrative Groups > Server > Protocols > POP3 > Default POP3 virtual server kemudian klik start