data

Tue
18
Jul
Dennis Faas's picture

Nothing Short of Pure Magic: Genie Backup Manager v7 Released!

Last year, infopackets.com went on a quest to find the most ideal backup software available based on very stringent criteria . That expedition ended with the discovery of Genie Backup Manager. Well, as any good treasure hunter can attest to, there's ... always more gold to be found ... and in this case, it's the launch of Genie Backup Manager version 7! Reminder: What Is Genie Backup Manager? Genie Backup Manager (GBM) is an easy-to-use and extremely versatile all-in-one backup solution. Among some of its basic backup features, Genie Backup Manager can archive any file or folder, emails, media ... (view more)

Tue
27
Jun
Dennis Faas's picture

This Stolen Laptop Will Self Destruct in 5 Seconds

The crusade to combat data theft has produced a recent technology which was only previously seen in movies. Those interested in protecting sensitive data can now turn to software which erases files from a remote location, or by using a chemical that ... physically destroys a hard drive. Absolute Software's "Computrace LoJack for Laptops" can ask the company to wipe out files from a hard drive the next time a computer connects to the Internet. In a process which takes anywhere from ten to thirty minutes, random information overwrites the computer's data several times, rendering the original files ... (view more)

Fri
19
May
Dennis Faas's picture

How To Build Your Own External Hard Drive

An External Hard drive can come in handy for backing up files or freeing up some disk space on your PC. The only problem is they can be pretty expensive. An easy alternative is to buy a drive enclosure for about $20 and build your own using an ... internal hard drive. Building your own external hard drive enclosure can be done in as little as 5 to 10 minutes time, and without opening up your PC's case. Not only does assembling your own external hard drive save money, it provides flexibility in choosing the connections, capacity and style that fit your needs. It is also an excellent way to make ... (view more)

Wed
11
Jan
Dennis Faas's picture

Can a Keylogger intercept cut and paste?

Infopackets Reader Windy H. writes: " Dear Dennis, I keep important information (such as credit card numbers) stored on my PC. The sensitive information, however, is disguised in such a way that if someone were to 'break in' to my PC, they would ... never realize that it is my credit card number. Question: I always go back to my repository program to cut and paste my credit card number into order forms when I make a purchase online. If there was a stealth Keylogger installed on my system, would it be able to detect the numbers I am entering? " My response: The short answer is "yes ... (view more)

Tue
10
Jan
Dennis Faas's picture

Backup Premium v2.0 Review

Synopsis: Need a reliable, secure, and equally flexible solution to backup your valuable data? Look no further -- Backup Premium v2.0 is the answer! With its well-designed user interface and flexible built-in scheduler, wide media support, and data ... integrity testing, Backup Premium v2.0 makes archiving data as pleasant as it is simple! Backup Premium 2.0: Screenshots Click to view: Page 1 | Page 2 | Page 3. Backup Premium 2.0: Features Drilldown Wide Support for Backup Medium, including: external and internal hard drives, network drives (including SAN, NAS, and LAN locations), all types of ... (view more)

Wed
21
Dec
Dennis Faas's picture

Mp3

MP3 is a popular digital audio encoding and lossy compression format invented and standardized in 1991 by a team of engineers working in the framework of the ISO/IEC MPEG audio committee under the chairmanship of Professor Hans Musmann (University ... of Hannover - Germany). MP3 was designed to greatly reduce the amount of data required to represent audio, yet still sound like a faithful reproduction of the original uncompressed audio to most listeners. In popular usage, MP3 also refers to files of sound or music recordings stored in the MP3 format on computers. MP3: Overview In the simplest ... (view more)

Wed
21
Dec
Dennis Faas's picture

'Data Recovery', and 'Usb Autorun Suite'

Data Recovery DataRecovery will undelete accidentally deleted files, even after they've been deleted from the recycle bin. http://tokiwa.tomato.ne.jp/EN/dr.html Usb Autorun Suite APO USB Autorun Suite enables you to add autorun functionality to your ... USB drive. It provides an Autorun.inf Builder and a standalone portable Starter too. http://www.archidune.com/apo/ (view more)

Wed
23
Nov
Dennis Faas's picture

Seek Time

Seek time is one of the several delays associated with reading or writing data on a computer's disk drive. In order to read or write data in a particular place on the disk, the read/write head of the disk needs to be moved to the correct place (just ... as to play a particular song on a cassette of recorded music, the tape needs to be wound to the right place). This process is known as "seeking", and the time it takes for the head to move to the right place is the "seek time". Seek time for a given disk varies depending on how far the head's destination is from its origin at the time of each read ... (view more)

Thu
10
Nov
Dennis Faas's picture

Acronis Disk Director Suite 10 Review

I've just received wind that Acronis has released Disk Director Suite version 10 -- the perfect companion to the extremely popular Acronis True Image (disk imaging backup software)! Who is Acronis, you ask? Acronis is a leading software company that ... specializes in storage management solutions for mission-critical situations. Acronis provides technically advanced (but simple to use) applications for: disaster recovery, backup and restoration, hard drive partitioning, boot management, data migration and other storage management products. Acronis' line of disk management software has won many ... (view more)

Thu
03
Nov
Dennis Faas's picture

Checksums

A checksum is a form of redundancy check, a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space (telecommunications) or time (storage). It works by adding up the basic components of a ... message, typically the bytes, and storing the resulting value. Later, anyone can perform the same operation on the data, compare the result to the authentic checksum, and (assuming that the sums match) conclude that the message was probably not corrupted. The simplest form of checksum, which simply adds up the bytes in the data, cannot detect a number ... (view more)

Pages

Subscribe to RSS - data