Most viewed
|
|
 |
How to use local security settings to force NTLM2 / NTLMv2 on Microsoft Windows platform?
To use the local security settings to force Windows Server 2008, Windows Server 2003, Windows 7, Windows Vista, Windows XP and 2000 to use NTLMv2:
Open the Local Security Policy console, using one of the following methods:
The Local Security Policy consol...
|
|
|
Views: 287,412 |
|
|
|
 |
How to mount/unmount an NFS StoreSafe virtual storage on Mac OS X using command line tool?
To mount an NFS StoreSafe virtual storage on Mac OS X using command line tool, execute the following in console
mount -t nfs <storesafe hostname>:/<virtual storage> <mount point>
To unmount,
umount <mount point>
|
|
|
Views: 11,732 |
|
|
|
 |
What does Bloombase Security Infrastructure do?
A majority of large corporations have suffered from confidential data theft, phishing, data tampering by insiders (or outsiders), and application hacking. To add to that, they are often not aware of these breaches, until after the damage has been done. The same way physical, conf...
|
|
|
Views: 11,088 |
|
|
|
 |
Bloombase StoreSafe Storage Security Server 3 Update Release Notes
Current Version
Changes in 3.0.9.0
Bug Fixes
Bug ID
Category
Description
...
|
|
|
Views: 10,074 |
|
|
|
 |
What encryption standards does Bloombase StoreSafe adopt?
Bloombase StoreSafe supports the following encryption standards which are safe and strong
NIST FIPS-197 AES encryption and decryption
NTT/Mitsubishi Camellia encryption and decryption
NIST FIPS-46-3 3DES encryption and decryption
CAST5, RC2 encryption
...
|
|
|
Views: 9,481 |
|
|
|
 |
Performance tuning for concurrent file access through NFS-mounted Bloombase StoreSafe virtual storage
Summary
Multi-threaded applications having file access on Bloombase StoreSafe NFS virtual storages experience slow response during file read and write.
More Information
Highly multi-threaded applications with intense file read/write access experiences slow response and fi...
|
|
|
Views: 8,520 |
|
|
|
 |
Why XML?
Extensible Markup Language (XML) is the de-facto industry standard for carrying business data. It is simple, and very flexible text format. Originally designed to meet the challenges of large-scale electronic publishing. XML is playing increasingly important role in exchange of a...
|
|
|
Views: 7,943 |
|
|
|
 |
Bloombase KeyCastle Security Server 2 Update Release Notes
Current Version
Changes in 2.2.0.0
Bug Fixes
Bug ID
Category
Description
...
|
|
|
Views: 7,610 |
|
|
|
 |
How do I get rid of the Certificate Error in Microsoft IE7?
Click 'Continue to this website (not recommended)' on alert message 'There is a problem with this website's security certificate'
You should now be at a page on the system with IE7 indicating a certificate error. Click on the box that states a 'Certif...
|
|
|
Views: 7,090 |
|
|
|
 |
How well Bloombase Security Servers are prepared for disasters?
Selected models of Bloombase appliances are fault-tolerant by design. Other Bloombase appliances can be configured to run in high-availability mode such that when the active appliance fails, backup takes over and act as active node.
Bloombase system settings and security configu...
|
|
|
Views: 6,316 |
|
|
|
|
|
Recent articles
|
|
 |
What Post-Quantum Cryptography (PQC) cipher algorithms are supported by the Bloombase products
Bloombase products support the following NIST standard Post-Quantum Cryptography (PQC) cipher algorithms:
Public-Key Encryption and Key-Establishment (KEM) Algorithms
CRYSTALS-KYBER
Digital Signature Algorithms
CRYSTALS-Dilithium
Falcon
SPH...
|
|
|
Views: 257 |
|
|
|
 |
What is the vendor ID assigned for Bloombase by Peripheral Component Interconnect Special Interest Group (PCI-SIG)
The vendor ID for Bloombase assigned by Peripheral Component Interconnect Special Interest Group (PCI-SIG) is:
187 (Dec)
0x00BB (Hex)
For more information, check out https://pcisig.com/membership/member-companies
|
|
|
Views: 432 |
|
|
|
 |
What are the Institute of Electrical and Electronics Engineers (IEEE) IDs assigned to Bloombase?
Bloombase has the following IDs assigned by Institute of Electrical and Electronics Engineers (IEEE):
OUI: F0-3A-4B
company_id: F03A4B
MAC Address: F0:3A:4B
For more information, check out https://standards.ieee.org/develop/regauth/oui/oui.txt and https://re...
|
|
|
Views: 546 |
|
|
|
 |
What are the Apple Bundle IDs assigned to Bloombase?
Bloombase is assigned the following Apple Bundle IDs:
com.bloombase
com.keyparc
|
|
|
Views: 478 |
|
|
|
 |
What is the Internet Assigned Numbers Authority (IANA) enterprise ID assignment for Bloombase?
The Internet Assigned Numbers Authority (IANA) enterprise ID for Bloombase is 23372.
For more information, check out https://www.iana.org/assignments/enterprise-numbers/enterprise-numbers.
|
|
|
Views: 576 |
|
|
|
 |
CPU sizing for Bloombase StoreSafe
Bloombase StoreSafe delivers scalable data-at-rest encryption at performance with available number of CPU processor-cores and/or vCPU allocated to the software appliance instance.
On hardware platform with presence of Intel AES-NI cryptographic acceleration technologies, Bloom...
|
|
|
Views: 1,845 |
|
|
|
 |
About Keyparc Business client auto startup function
Keyparc Business client auto startup function required creating registry entry in
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
If Windows Domain administrator decided to enable "Prevent access to registry editing tools" or "Do not p...
|
|
|
Views: 2,035 |
|
|
|
 |
"Too low max_hw_sectors" on StoreSafe SAN
For StoreSafe SAN target, if the host send SCSI command size bigger the HBA support, there will be I/O error and the following log message will appear in system log:
***ERROR***: Too low max_hw_sectors 65535 sectors
The workaround is to limit the maximum size of the...
|
|
|
Views: 2,915 |
|
|
|
 |
Modifying the FC Port Retry Setting for Multipath I/O
The qlport_down_retry setting specifies the number of times to attempt to reconnect to a port if it is down when using multipath I/O in a cluster.
Use the following setting in the /etc/modprobe.conf file:
options qla2xxx qlport_down_retry=3
This option will also ap...
|
|
|
Views: 3,414 |
|
|
|
 |
What is a typical implementation life-cycle for data protection using Bloombase StoreSafe?
There is no golden rule on what a typical implementation and deployment process for data protection and specifically for Bloombase StoreSafe. Nevertheless there are some major milestones and checkpoints below which can serve for customer's reference:
Preparation
Cla...
|
|
|
Views: 3,913 |
|
|
|
|