Most viewed
|
|
 |
How to use local security settings to force NTLM2 / NTLMv2 on Microsoft Windows platform?
To use the local security settings to force Windows Server 2008, Windows Server 2003, Windows 7, Windows Vista, Windows XP and 2000 to use NTLMv2:
Open the Local Security Policy console, using one of the following methods:
The Local Security Policy consol...
|
|
|
Views: 17,565 |
|
|
|
 |
What does Bloombase Security Infrastructure do?
A majority of large corporations have suffered from confidential data theft, phishing, data tampering by insiders (or outsiders), and application hacking. To add to that, they are often not aware of these breaches, until after the damage has been done. The same way physical, conf...
|
|
|
|
 |
Bloombase StoreSafe Storage Security Server 3 Update Release Notes
Current Version
Changes in 3.0.9.0
Bug Fixes
Bug ID
Category
Description
...
|
|
|
Views: 9,485 |
|
|
|
 |
What encryption standards does Bloombase StoreSafe adopt?
Bloombase StoreSafe supports the following encryption standards which are safe and strong
NIST FIPS-197 AES encryption and decryption
NTT/Mitsubishi Camellia encryption and decryption
NIST FIPS-46-3 3DES encryption and decryption
CAST5, RC2 encryption
...
|
|
|
|
 |
How to mount/unmount an NFS StoreSafe virtual storage on Mac OS X using command line tool?
To mount an NFS StoreSafe virtual storage on Mac OS X using command line tool, execute the following in console
mount -t nfs <storesafe hostname>:/<virtual storage> <mount point>
To unmount,
umount <mount point>
|
|
|
|
 |
Performance tuning for concurrent file access through NFS-mounted Bloombase StoreSafe virtual storage
Summary
Multi-threaded applications having file access on Bloombase StoreSafe NFS virtual storages experience slow response during file read and write.
More Information
Highly multi-threaded applications with intense file read/write access experiences slow response and fi...
|
|
|
Views: 7,496 |
|
|
|
 |
Why XML?
Extensible Markup Language (XML) is the de-facto industry standard for carrying business data. It is simple, and very flexible text format. Originally designed to meet the challenges of large-scale electronic publishing. XML is playing increasingly important role in exchange of a...
|
|
|
|
 |
Bloombase KeyCastle Security Server 2 Update Release Notes
Current Version
Changes in 2.2.0.0
Bug Fixes
Bug ID
Category
Description
...
|
|
|
|
 |
How do I get rid of the Certificate Error in Microsoft IE7?
Click 'Continue to this website (not recommended)' on alert message 'There is a problem with this website's security certificate'
You should now be at a page on the system with IE7 indicating a certificate error. Click on the box that states a 'Certif...
|
|
|
|
 |
How well Bloombase Security Servers are prepared for disasters?
Selected models of Bloombase appliances are fault-tolerant by design. Other Bloombase appliances can be configured to run in high-availability mode such that when the active appliance fails, backup takes over and act as active node.
Bloombase system settings and security configu...
|
|
|
|
|
|
Recent articles
|
|
 |
What are the IEEE IDs assigned to Bloombase?
Bloombase has the following IDs assigned by IEEE:
OUI: F0-3A-4B
company_id: F03A4B
MAC Address: F0:3A:4B
For more information, check out https://standards.ieee.org/develop/regauth/oui/oui.txt
|
|
|
Views: 20 |
|
|
|
 |
What are the Apple Bundle IDs assigned to Bloombase?
Bloombase is assigned the following Apple Bundle IDs:
com.bloombase
com.keyparc
|
|
|
Views: 11 |
|
|
|
 |
What is the IANA enterprise ID assignment for Bloombase?
The IANA enterprise ID for Bloombase is 23372.
For more information, check out http://www.iana.org/assignments/enterprise-numbers.
|
|
|
Views: 14 |
|
|
|
 |
CPU sizing for Bloombase StoreSafe
Bloombase StoreSafe delivers scalable data-at-rest encryption at performance with available number of CPU processor-cores and/or vCPU allocated to the software appliance instance.
On hardware platform with presence of Intel AES-NI cryptographic acceleration technologies,...
|
|
|
Views: 1,315 |
|
|
|
 |
About Keyparc Business client auto startup function
Keyparc Business client auto startup function required creating registry entry in
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
If Windows Domain administrator decided to enable "Prevent access to registry editing tools" or "Do not p...
|
|
|
Views: 1,504 |
|
|
|
 |
"Too low max_hw_sectors" on StoreSafe SAN
For StoreSafe SAN target, if the host send SCSI command size bigger the HBA support, there will be I/O error and the following log message will appear in system log:
***ERROR***: Too low max_hw_sectors 65535 sectors
The workaround is to limit the maximum size of the...
|
|
|
Views: 2,195 |
|
|
|
 |
Modifying the FC Port Retry Setting for Multipath I/O
The qlport_down_retry setting specifies the number of times to attempt to reconnect to a port if it is down when using multipath I/O in a cluster.
Use the following setting in the /etc/modprobe.conf file:
options qla2xxx qlport_down_retry=3
This option will also ap...
|
|
|
Views: 2,193 |
|
|
|
 |
What is a typical implementation life-cycle for data protection using Bloombase StoreSafe?
There is no golden rule on what a typical implementation and deployment process for data protection and specifically for Bloombase StoreSafe. Nevertheless there are some major milestones and checkpoints below which can serve for customer's reference:
Preparation
Cla...
|
|
|
Views: 3,367 |
|
|
|
 |
How Bloombase helps to achieve various IT security regulatory compliance requirements of Hong Kong Government?
The Government of Hong Kong sets out rules and regulations to ensure government agencies to secure IT infrastructure and electronic data from various vulnerabilities and potential threats
Baseline IT Security Policy (S17)
IT Security Guidelines (G3)
Interne...
|
|
|
Views: 1,882 |
|
|
|
 |
How Bloombase helps customers achieve Personal Data Privacy Ordinance (PDPO) of Hong Kong?
The Office of the Privacy Commissioner for Personal Data has brought the Personal Data Privacy Ordinance in 1996.
The purpose of the Ordinance is to protect the privacy interests of living individuals in relation to personal data. It also contributes to Hong Kong's continued...
|
|
|
|
|