Skip to main content

Networks and security of data storage

Networks and security of data storage

Networks are providing many benefits to handle data comparing to traditional methods like USB-sticks. The biggest benefit is that when data is stored in the cloud, that means it is independent of the platform, where it is handled. So in this kind of cases, we must remember, how many USB-sticks we have stolen, and how many times the computer, where the data is stored has damaged?

This is the reason, why the cloud is a really good place for processing data, and that is the thing why companies are investing in those technologies. The computers and other devices, which are used to handle data can be equipped with biometric keys, which gives access to precise data, what is stored in hard disks. When we are making those biometric identifiers we should make them easy to use, like the image, what is taken from the finger. Or rather the things, what are used automatically.

That means that the user of the system might not even know about the biometric identifier. If we think the keys, what are used to log in the computers, they might be things like mobile telephones. If we will make mobile telephone safe key, we might make a system, what has two modes. If the person just opens the mobile telephone, that thing would act like a normal cell phone. But when a person wants to use it as an electronic key, that might need to boot it, and during the startup, the person might need to give the biometric identifier. That would activate the role as the key.

And in a perfect system, the renew of this action should be done often enough, that the system would be safe. That means the cell phone can use by everybody, but only one person might use it as key to the system. And of course, if a person is under threat the snapping secret SOS over the biometric identifier might tell that person is in trouble. If the wrong person uses a telephone, the information of that would send to security personnel, and they might locate the phone very easily.

The thing is that biometric systems are easy to use, and they can collect many types of data. One thing is that the precise information about the areas, what biometric system uses for recognize person might not be mentioned. So the thing is that the mobile telephones, which are used to send the log-in request might have hidden biometric key, what detects if the wrong person tries to use the system. In some cases, the web-camera, what is used for face recognition might use the image of eyes for recognizing the user, and that thing might not be told to the users.

Or the mobile telephone, what is used to recognize the users, is connected to face or retina recognizer, what might be the normal web camera, and that system detects are the person, who attempts to log in the system, and user of the mobile telephone the same. In this case, there are two keys, which are comparing together. So in those cases, the maker of data security protocols has noticed, that some person can lose the mobile telephones.

In the real-life, there is another thing, what the maker of the log-in protocol must realize, is that there is a possibility, that somebody might be forced to let people access to the system. This means that in those cases there must be something to give for those people. The thing is that the system might have a backup protocol for the cases, where somebody is asked log-in for computers, which are used by some other people, and that thing might cause grey hair for the spies.

The thing is that if a person uses only passwords or tries to log in otherwise wring way, that system can lead the person to wring network segment. That network segment might contain information, what is equipped with a tracking cookie. And the mission of this system is to uncover the hackers, who might attempt to steal data.

Comments

Popular posts from this blog

Antimatter motor

Antimatter motor Antimatter would be an effective fuel for interstellar spacecraft Antimatter would be the most effective power source in the world. It will be the most suitable motor for interstellar spacecraft, but the problem is that thing is very reactive. And actually one of the biggest problems with this kind of motor is that the gram of antimatter would turn the entire planet to the molecular nebula. So this kind of motor can produce only outside of our solar system. Producing antimatter would need large particle accelerators, and that kind of systems might look like giant donuts, what is floating on the space. There are two ways to create the antimatter motor, one is to store the anti-ions in the magnetic bottle, where the pushing magnetic field will keep those ions away from the wall of the bottle, and then the antimatter would conduct to the water or some other particle. The huge explosion or annihilation reaction would send the rocket to a very high speed. The antimatt...

Thoughts about strong leadership

Thoughts about strong leadership Everybody knows, how the dictators would rise in the power of the nation, and the thing what makes people supporting those persons is that they offer strong leadership as the way to make nation proud. And also they have always the same parroting, the foreigners and other nations have a too strong influence in the country. But what makes those persons like some Robert Mugabe or Kim Jong Un to think that they are only possible leaders, and why people would need them? Why there is nobody else allowed to try to come to the head of the state, or even try to challenge those leaders? If they are so popular as they want people to think or believe, why they don't tolerate any kind of opposition if they are done so good and big actions for their people, that they are celebrated in every home in their country. The thing that would return the morale and spine for the nation is the strong leader, who would put the state back in order and row. The thing is ...

Next-generation nanotechnology can be independent-operating molecule-sized robots.

 Next-generation nanotechnology can be independent-operating molecule-sized robots. "A DNAzyme (red) uses its binding arms to dock at a specific location on an RNA strand (yellow) and then cleaves it at its core. High-resolution, real-time NMR, Electron Paramagnetic Resonance, and Fluorescence Spectroscopy." "As well as Molecular Dynamics Simulations are used to identify the structure. And catalytic mechanisms of the DNAzyme. Credit: HHU/Manuel Etzkorn" (https://scitechdaily.com/dnazymes-how-active-dna-biocatalysts-that-destroy-unwanted-rna-molecules-work/) The active DNA catalysts are the gate to DNA-controlled, independently-operating, molecular-size nanomachines.  The DNAzymes or active DNA biocatalysts are next-generation tools for destroying unwanted RNA. The DNA molecule is one of the tools. That can use for controlling molecular-size machines. DNA is like a chemical computer program. And if the researchers can make synthetic DNA that can make exactly what the...