Solutions / Knowledge base

Steganography

Despite the possibly unfamiliar name, steganography is simply a technique or method of hiding secret information in the form of an ordinary message, photo, or even a file in a given medium. Compared to traditional cryptography, it is distinguished by the fact that the most important thing here is to hide this message. Any third party is therefore unaware that any communication or encryption is taking place. Thanks to this, steganography is considered the best method when it is also necessary to hide the fact of sending a hidden message.

Network example

A steganography-based router can create an open Wi-Fi network that is not password protected. This is means that any person within its range can connect to it. Thanks to steganography, a person connected to the router will receive from it only intentionally damaged frames, i.e., data packets. This information is ignored by the regular network card, making it impossible to read. A regular network card is any other device except those that are included in the router kit. The right network cards, which connect via USB or to the motherboard, will deal with the deliberate damage and will receive data correctly.

Disk / Hardware example

Devices such as steganography-based flash drives give the outward impression of broken hardware. This means that if it is connected to a regular computer, the user will not see any login window or preview of the content. Instead, you will get a message stating that the USB stick has not been formatted correctly and you can try to do it again. Despite the action taken, it will fail – the user will receive information that the flashdrive is seriously damaged and cannot be repaired. The only access to the data on it is provided to computers that have been previously added to the group of trusted devices.

Mesh networks

Simply put, the mesh system was created to connect many routers into one network. As a result, the standard range of the internet is significantly increased.

Most importantly, the user, while moving around the facility, is constantly connected to one access device – he does not have to change the signal source for a better one each time. Another name for a mesh system is a mesh network, which emphasizes its collaborative nature.

Compared to signal amplifiers, i.e., repeaters or extenders, mesh systems are much easier to configure, and are also able to seamlessly switch between network devices. They are usually used in residential buildings with a large area or office spaces – wherever the highest quality of continuous internet coverage is most important.

Desktop as a Service - DaaS

DaaS is a service of information, data, and software processing in the cloud by an external provider.

This type of virtual desktop has gained enormous popularity especially in enterprises where employees have gained the opportunity to use hosted programs, applications, databases, or entire desktops. Desktop as a Service is a fairly easy and pleasant to configure way that allows for efficient software updates or backups.

 

For the company, the DaaS infrastructure means not only high security, but also a reduction in hardware costs. In addition, you can access the remote desktop not only from a desktop computer, but also from a mobile phone or Mac. Backups, updates, and all software are stored in one convenient place.