السبت، 29 ديسمبر 2012

my participation about Encryption software


Encryption software



Encryption software is software whose main task is encryption and decryption of data, usually in the form of files on (or sectors of) hard drives and removable mediaemail messages, or in the form of packets sent over computer networks.

Security

Encryption software executes an algorithm that is designed to encrypt computer data in such a way that it cannot be recovered without access to the key. Software encryption is a fundamental part of all aspects of modern computer communication and file protection and may include features like file shredding.
The purpose of encryption is to prevent third parties from recovering the original information. This is particularly important for sensitive data like credit card numbers.

Encryption choices



Many encryption algorithms exist. The more popular options were submitted to the National Institute of Standards and Technology or NIST for the Advanced Encryption Standard (AES) competition. The winner, Rijndael, got 86 votes while Serpent got 59 votes, Twofish 31 votes, RC6 23 votes and MARS 13 votes. NIST chose Rijndael as its standard. Serpent and Rijndael are in fact somewhat similar; the main difference is that Rijndael is faster (having fewer rounds) but Serpent is more secure[citation needed].

Choosing encryption

There are several factors that affect the choice of an encryption algorithm including speed and security. The simplest method would be an XOR operation, with a constant value k, of each byte of plain text b, to produce a cipher value c.

b\, \mathrm{XOR}\, k = c
Ciphers can be categorized into two general types: public key ciphers and symmetric key ciphers.
Public key systems are based upon algorithms that are at least strongly believed to be "one-way" operations. That is, encryption with one member of a key pair is only easily reversed (decrypted) using the other member of the pair. Further, one member of the pair (the public key) cannot be easily used to determine the other (the private key). Provided the problems posed by the system to cryptanalyst are effectively unsolvable, the system is effectively secure. Such systems are used for key exchanges (for subsequent use of symmetric key ciphers), digital signatures and the like.
Symmetric key ciphers (also referred to as secret key ciphers) are called such because the same key is used for both encryption and decryption. Thus, in order for messages encrypted with a symmetric key cipher to remain secure, the key used must remain secret. Symmetric key ciphers can be further subdivided into stream ciphers and block ciphers.
Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encipher real-time communications, such as audio and video information. The key is used to establish the initial state of a key-stream generator, and the output of that generator is used to encrypt the plaintext.
Block cipher algorithms encrypt blocks of bytes of plaintext a block at a time. The Advanced Encryption Standard algorithm (AES - derived from the Rijndael cipher algorithm) is a block cipher that processes 16 bytes at a time, while its predecessor, the Data Encryption Standard algorithm (DES) encrypted blocks of eight bytes.
A common mistake made by amateur cryptographers is the assumption that because the method is secret, the cipher is secure. This is not usually true. Many "home grown" encryption algorithms reveal the key quite easily when fed a string of identical bytes (e.g., nulls).
The purpose of disseminating an encryption method is to allow the community to evaluate it. If it is indeed secure, then its power lies in the fact that its method has been subjected to scrutiny and found to be sound, not that it is secret

Applications


Encryption can be applied to data in many ways. Common categories are:
Network traffic encryption tools
  • Generis 
  • IPSec based
Each of these categories define the range and location of the data to be encrypted, but the process is the same for each
reference
-------------------------------------------------------------------------------------------------------------------------------------------------------------------
in the following link is explain application is safe house  is very nice program and free  
------------------------------------------------------------------------------------------------------------
the end 

الخميس، 27 ديسمبر 2012

my topic


Here my topic
my data     
infrastructure
?What is Infrastructure Virtualization
press here
?????Who Invented Virtualization
press here
Virtual Infrastructure Overview
press here
How Virtualization Works
press here
Virtual Infrastructure Advantages
press here

important-in-virtualization

press here
Types of virtualization
press here
software use in virtualization
press here
Virtualization Issues
press here
security vrtualization
press here
Virtualization for Innovation
press here
?????Is virtualization cloud computing
PRESS HERE
Virtualization and Cloud and Grid
press here
Database virtualization
press here
PDF Book in vrtualization
press here
-------------------------------------------------------------------------------------------------------

 finally i would like to enjoy in myblogger
\
and don't forget give me your feedback and comment *_^i Waiting for every one

--------------------------------------------------------------------------------------------------------




BSHAIR AHMAD AL-HARBI


الاثنين، 24 ديسمبر 2012

Who Invented Virtualization?

 What company "invented" virtualization technology?
A:  The long defunct Burroughs Corporation first brought mainframe virtualization to market in the 1960s.  But it was not until the then laggard IBM brought it to their 360 line in the 1970s that the concept was legitimized.
I'm willing to make this little bet with you:  Most people of a certain age are more than willing to bet folding green that IBM ‘invented' virtualization.  Gen-any-letters will bet VMware with confidence.  You will win either way.
Today's burgeoning virtualization market is a different story.  And in that story,
. VMware is the dad
to read more...

Database virtualization

Database virtualization is the decoupling of the database layer, which lies between the storage and application layers within the application stack. Virtualization at the database layer allows hardware resources to be extended to allow for better sharing resources between applications and users, masking of the physical location and configuration of a database from querying programs, as well as enable more scalable computing.
-------------------------------------------------------------------------------------------------------------------------------------------------------

Database Virtualization Advantages

  • Added flexibility and agility for existing computing infrastructure
  • Enhanced database performance
  • Pooling and sharing computing resources
  • Simplification of administration and management
  • Increased fault toleance
  • reference
---------------------------------------------------------------------------------------------------------
Example of database virtualization :
Oracle Database Support for Server Virtualization

---------------------------------------------------------------------------------------------------------


------------------------------------------------------------------------------------------------------------
to learn more:
show this slides 


الأحد، 23 ديسمبر 2012

Virtualization and Cloud and Grid


Here  will explain about the relationship  between Virtualization and Cloud and Grid 

-------------------------------------------------------------


Cloud and Virtualization to Support Grid 

Infrastructures

Introduce virtualization and cloud from the 
perspective of the Grid computing community 
• Show the benefits of virtualization and cloud for Grid 
computing 
• Demonstrate how Grid, virtualization and cloud are 
complementary technologies that will cooperate in 
future Grid computing infrastructures    
• Introduce the RESERVOIR project, European initiative 
in virtualization and cloud computing 
show this slides to explain more :
---------------------------------------------------------------

An Efficient Use of Virtualization
in Grid/Cloud Environments.

to show more detial 


--------------------------------------------------------------------------------



Is virtualization cloud computing?


Virtualization as an element of cloud computing
Cloud computing is as much a methodology as it is a technology. You cannot plan any single element without considering the effect on the others. You also have to add in practices and policies that govern chargeback, monitoring, procurement and many other facets of your IT infrastructure.
For example, the ability to rapidly provision virtual machines does no good if it still takes six weeks to order and install a host server. Furthermore, procurement will always be a problem if chargeback is not recovering costs, and that requires resource and utilization monitoring. If your storage and compute resources have different provisioning schedules, they'll have to be documented and reconciled to properly forecast demand. I could go on, but your business requirements ultimately drive everything.
Private cloud computing does not center on virtualization or any one technology. It uses a set of technologies that have been aligned to be highly flexible and provide a wide range of services. This approach does not require virtualization, but virtualization does lend well to the core concepts of cloud computing.

Virtualization and cloud computing are also so closely connected because the major hypervisor vendors -- VMware, Microsoft and Citrix Systems -- are putting a lot of emphasis on the cloud. They have closely aligned their products with tools and complementary technologies that promote the adoption of private cloud computing.
Cloud computing is a rapidly evolving discipline, and one that will reshape org charts as fast as it will change data center layouts. It closely aligns with virtualization, but it takes many technologies to be successful.
*There is debate about whether green is a primary color. It takes blue and yellow to make green, but green occurs naturally. That is the reason for the competing CMYK and RGB color standards, and this controversy makes the analogy even more fitting.
reference:
------------------------------------------------------------------------------------------------------------------------------

in the following picture answer for my question ?
Is virtualization cloud computing?
the application is part of type vrtialization so Virtualization as an element of cloud computing


PDF Book in vrtualization

FREE BOOK in vrtualization 
These days it is hard to find useful information, especially if you want to find a lot materials in one place. That’s why I spent some time searching through the web to find interesting and useful information regarding virtualization. So I hope you will find useful my list of free virtualization related books.
To summarize, in my list there are 7 free books (with download links included):


  1. Understanding Microsoft Virtualization Solutions, Second Edition
  2. Introducing Windows Server 2008 R2
  3. Virtualization for Dummies – HP special edition
  4. The Definitive Guide to Virtual Platform Management
  5. the Shortcut Guide to Virtualization and Service Automation
  6. The Shortcut Guide to Selecting the Right Virtualization Solution
  7. Windows Server 2008 Hyper-V: Insider’s Guide to Microsoft’s Hypervisor (this book was free for few weeks and now you can read it on Google)
Ok, so let’s see brief introduction to all books:
-----------------------------------------------------------------------------------------------------------------------------
reference:

السبت، 22 ديسمبر 2012

Virtualization for Innovation

Virtualization for Innovation
In essence, virtualization increases flexibility by decoupling an operating system and the services and applications supported by that system from a specific physical hardware platform. It allows the establishment of multiple virtual environments on a shared hardware platform.
Organizations looking to innovate find that the ability to create new systems and services without installing additional hardware (and to quickly tear down those systems and services when they are no longer needed) can be a significant boost to innovation.
Among possible approaches are the rapid establishment of development systems for the creation of custom software, the ability to quickly set up test environments, the capability to provision alternate software solutions and compare them without extensive hardware investments, support for rapid prototyping and agile development environments, and the ability to quickly establish new production services on demand.
These environments can be created in house or provisioned externally, as with Amazon’s EC2 offering. Since the cost to create a new virtual environment can be very low, and can take advantage of existing hardware, innovation can be facilitated and accelerated with minimal investment.
Virtualization can also excel at supporting innovation through the use of virtual environments for training and learning. These services are ideal applications for virtualization technology. A student can start course work with a known, standard system environment. Class work can be isolated from the production network. Learners can establish unique software environments without demanding exclusive use of hardware resources.
As the capabilities of virtual environments continue to grow, we’re likely to see increasing use of virtualization to enable portable environments tailored to the needs of a specific user. These environments can be moved dynamically to an accessible or local processing environment, regardless of where the user is located. The user’s virtual environments can be stored on the network or carried on a portable memory device.
A related concept is the Appliance Operating System, an application package oriented operating system designed to run in a virtual environment. The package approach can yield lower development and support costs as well as insuring the application runs in a known, secure environment. An Appliance Operating System solution provides benefits to both application developers and the consumers of those applications.
How these applications of virtualization technology apply in your enterprise will vary. If you are already using the technology in more than one of the areas noted above, consider an additional investment in a solution requiring rapid development. If you haven’t started with virtualization, start with a training and learning implementation to develop skills, then move on to application development and testing. Enterprises with broader experience in virtualization should consider implementing portable virtual environments or application appliances
---------------------------------------------------------------------------------------------------------
is big innovation is the Virtualization good use in enterprise,company ,and the person use in the computer


-------------------------------------------------------------------------------------------------------

security vrtualization


Security Challenges to Consider
While virtualization can bring a lot of benefits to users, there are a number of security issues which should be consider. One of the most prominent of these is called "break out" attacks, a situation in which criminals will escape from a virtual machine designed for guests in order to launch attacks against the hypervisor, allowing them to gain control over the host.

While there are many security concerns that should be addressed, it has not yet become clear whether they are larger than contemporary security concerns. Some people would argue that it allows things to have a higher level of security, particularly via the hardware since you are moving things about, and this makes it harder for people to figure out the location of the virtual environment.
.
This is true for the network servers as well. The issue of virtualization security has become more pronounced in recent years. Many people are still not certain whether or not virtual environments have higher levels of security than physical environments.

As of this writing, no one is quite sure, and this includes the likes of Microsoft, which is one of the top virtualization security vendors. Organizations such as the NSA will process the applications it has on the identical physical server, and it does this so that the virtual machines will become isolated in a manner that will allow the virtual machine to be penetrated.

Security Functions
Because an organization as powerful as the NSA makes use of this security measure, some believe that it is more than good enough for them. Despite this, the technology is still in its infancy, and it will take time for vulnerabilities and defense mechanisms to be fully developed.

What this clearly means is that security breaches are a potential reality for those who make use of virtualization. The reason for this is because this technology makes use of layers, and layers can always be exploited. The hypervisor itself is a very prime target, much more so than one physical server. There is little doubt that hackers somewhere in the world are looking to penetrate the hypervisor.

At the same time, as with any new technology, it is important to be prepared to make the necessary trade offs. The biggest trade off that you will make when dealing with virtualization is its utility. There is the risk benefit analysis, and each organization must go through it. The good news is that the benefits of using virtualization outweigh the risks by a very large margin. For example, if you have a total collection of 2,000 servers, and you are making use of a layer 2 network that is connected between two data centers, it is very likely that you want all of the virtual machines to be transported from a single data center to another.

What you will give up in terms of security, you will make up with flexibility. When you consider the standard setup, either one of the virtual machines could be stored inside of any one physical machine, and if this physical machine is approaching its maximum capacity, it is possible to move the virtual machine away from it.

At the same time, mobility comes with a number of different problems. While flexibility and mobility are generally good things, enterprises could get in trouble with regulators. Laws such as the Sarbanes-Oxley Act need the enterprises to have policies set in place which designate the applications that may run, and the other applications they function with.

reference:


Here are a few of the key virtualization security issues that matter most to your organization:
1.     Oversight. One of the grey areas that virtualization has created is that of server oversight. Who’s ultimately responsible for virtual servers is sometimes up in the air. While physical servers are, as a matter of course, under the direct purview of the data center, it’s not as straightforward for virtual servers. Whether it’s the business unit that uses the server, the closest IT manager to the actual physical server, or a central system admin, someone needs to have clear authority to act and responsibility to manage the virtual server.
2.     Maintenance. Flowing out of that oversight confusion is the issue of upkeep and patching. Virtual servers tend to be launched and then their image tucked away, and it may or may not be recreated when patches or configuration changes take place. Taking regular snapshots of a virtual server so as to keep current with things like patches and antivirus reduces risk.
3.     Visibility. One of the risks involved with having significant virtualization is that those network controls that used to segment specific applications off due to reasons of compliance and security often aren’t virtualized. Indeed, virtual servers develop something of an invisible network between them, quite apart from the normal firewalling and monitoring controls that take place between physical servers. This, of course, can lead to issues with HIPPA and other security regulations. Compounding this problem is the fact that the virtualization vendors haven’t yet implemented the kind of robust sniffer, tracking, and firewalling tools that the physical server world has.
 reference:
Virtualized environments can be just as secure as physical server environments, but you need to make sure you’re aware of the unique concerns that virtualization poses 


--------------------------------------------------------------------------------------------------------------------------------------------------------------
be carfull when  use this technology .


to learn more show the following link :


----------------------------------------------------------------------------------------------------------
 because  this topic is very important many witter write about this 

like this book 

and this book 




Virtualization Issues

virtualization has its share of difficulties.  When a company decreases the number of server farms it has, it is often 
possible to see the immediate benefits in terms of price. At the same time, there may be potential problems that lie beneath the surface.
First off, it is still necessary for enterprises to handle the servers, and this will require you to make use of more workers and tools, and you will need to update your images whenever you are ready to add to the environment 
. Many enterprises choose virtualization precisely because it is capable of saving a great deal of money in terms of time and resources. But virtualization is not a magic bullet, and comes with challenges that must be addressed.
If enterprises are incapable of meeting these challenges, then it is very unlikely that their virtualization implementation will be a success. Many companies begin the process of virtualization without realizing that they are not sure exactly what their data centers contain, and this is an issue which is very similar to the Y2K scare that plagued some enterprises.
Another issue that can cause virtualization implementation to be challenging is a lack of co-operation that exists between the IT department, and the business department. Ultimately, the goal of any enterprise should be to use virtualization in a manner which enhances the experience of the end user.
More companies and organizations are taking the time to virtualize the IT assets that they have, and it will be necessary for them to take the time to ensure that both the business side and the IT side are moving in conjunction with one another.
If they are not, you will not obtain the economies of scale that you are supposed to get from virtualization, and this defeats the very purpose of having it. Once the IT systems have been successfully utilized, the business units will make a request to the servers, and this will be dependent on the priority of their application to the total business


----------------------------------------------------------------------------------------------------------------------------------
Any modern technology to be exposed to the problems and issues but we have to control technology so that we can minimize those issues


الثلاثاء، 18 ديسمبر 2012

software use in virtualization

 I search about some software to use in virtualization and I found this software 
VMware Workstation
this you tube explian how to download and take info 

this picture of the software 

  • Popular virtualization products include:
  • VMware
  • Microsoft Hyper-V
  • Virtual Iron
  • Xen

Types of virtualization


WE HAVE SIX TYPES OF VIRTUALIZATION :
1- Desktop virtualization

2-Application virtualization

3-Server virtualization

4-Storage virtualization

5-Presentation virtualization

6-Network virtualization


Desktop virtualization is the concept of separating the logical desktop from the physical machine.
One form of desktop virtualization, virtual desktop infrastructure (VDI), can be thought as a more advanced form of hardware virtualization. Rather than interacting with a host computer directly via a keyboard, mouse, and monitor, the user interacts with the host computer using another desktop computer or a mobile device by means of a network connection, such as a LAN, Wireless LAN or even the Internet. In addition, the host computer in this scenario becomes a server computer capable of hosting multiple virtual machines at the same time for multiple users.[3]


Server Virtualization – consolidating multiple physical servers into virtual servers that run on a single physical 

application Virtualization – an application runs on another host from where it is installed in a variety of ways. It could be done by application streaming, desktop virtualization or VDI, or a VM package (like VMware 
ACE creates with a player). Microsoft Softgrid is an example of Application virtualization.

Presentation Virtualization – This is what Citrix Met frame (and the ICA protocol) as well as Microsoft Terminal Services (and RDP) are able to create. With presentation virtualization, an application actually runs on another host and all that you see on the client is the screen from where it is run.

Network Virtualization – with network virtualization, the network is “carved up” and can be used for multiple purposes such as running a protocol analyzer inside an Ethernet switch. Components of a virtual network could include NICs, switches, VLANs, network storage devices, virtual network containers, and network media
.
Storage Virtualization – with storage virtualization, the disk/data storage for your data is consolidated to and managed by a virtual storage system. The servers connected to the storage system aren’t aware of where the data really is. Storage virtualization is sometimes described as “abstracting the logical storage from the physical storage




To understand more and see more details see the following link