A Web Site Protection Oriented Remote Backup and Recovery Method
|
|
- Maude Hensley
- 8 years ago
- Views:
Transcription
1 2013 8th International Conference on Communications and Networking in China (CHINACOM) A Web Site Protection Oriented Remote Backup and Recovery Method He Qian 1,2, Guo Yafeng 1, Wang Yong 1, Qiang Baohua 1 1. Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education Guilin University of Electronic Technology, Guilin , China 2. College of Computer, National University of Defense Technology, Changsha treeqian@gmail.com Abstract It becomes more and more important to protect the security of web sites. In order to solve the problem about web site disaster recovery, a web site protection oriented remote backup and recovery method is proposed in this paper. Customers can design various backup strategies such as full, incremental and differential backup by themselves. A multi version control method is given to text files, and the remote transmission and backup mechanism is designed based on Rsync and FTP protocols. Rsync is used to reduce the transferred data efficiently, the experiment results show that the remote backup and recovery system can work fast and it can meet the requirements of web site protection. Keywords-Backup and Recovery, Web Protection, Version Control, Rsync, FTP I. INTRODUCTION With the rapid development of Internet technologies and applications, websites Information security issues are increasingly complex, and the Webpage has been tampered more and more seriously. The statistics of 2010 Internet Security Report given by the National Computer network Emergency Response technical Team/Coordination Center of China (CNCERT/CC) shows that Web pages Tampered events are at the top of the all the events of network security. According to the monitoring data, there are Web sites are being tampered with the average number of 2904 every month, and there are 100 sites being tampered in Chinese mainland per Day [1]. The problem about how to protect Web files is facing severe challenges. Once the web pages are tempered by a hacker illegally, it may hurt their owners and even bring some society serious damage and negative influence. So, the studies of web pages anti-tampered system or web site protection system are pay attention to. The studies of anti-tampered protection of the website can be separated into 3 types: pre-prevention, inrestraint and post-recovery [2]. The pre-prevention relies on some safety assessment and firewalls, such as ref [3], using static analysis to test if the Web code exits security vulnerabilities. Firewalls and Intrusion detection systems are typical technologies for in-restraint protection. Post-recovery, as the last measure which can prevent page from being tampered, requires the web page to be recovered timely after being tampered. Existing researches discuss little about postrecovery mechanisms which is usually used as the complement of Website Protection System. Ref [4] introduces a web antitampered model. The model includes a prepared recovery subsystem which can provide bare metal system recovery after the Web server fails to work. However, it is not able to achieve the requirements of real-time recovery after the event. From the publicly available information, we can know that a lot of popular web site protection system have weak backup and recovery capacity. For example, IGuard [5] has no backup and recovery function, WebGuard [6] only uses digital certificates for file encryption backup, and InforGuard [7] just takes a simple automatic incremental backup. None of these systems can achieve the real-time recovery after a WEB page being tampered. There are a lot of backup products in the market, but most of these systems focus on large-scale clusters which provide centralized backup service [8], for example, the massive data backup and storage without paying attention to the real-time backup and recovery of small files. Therefore, they cannot satisfy the requirements of safety recovery mechanisms of anti-tampered Webpage. The common file management system is not suitable for the requirements of antitampered system of Webpage. In this paper, we design a specific web site protection oriented backup and restore method to solve the special requirements of website protection. The automatic backup and recovery system for Web site not only plays an important part in the Web defense system but also is the last line for disaster recovery. After a server is attacked successfully by a hacker, all the files on that server shouldn t be trusted. So, the remote data outside the web site should be used, and then the backup and restore method is needed. Based on our former work [9], importing multi-version control and the Rsync synchronization algorithm, which is simple to realize and easy to achieve remote data synchronization fast [10], a specific web site protection oriented remote backup and restore method is designed. In this method, a multi version control method is given to text files recovery, transferred data are obtained based on Rsync which can decrease communication, and the File Transfer Protocol (FTP), a very popular and standard network protocol, is used in the transmission process. The rest of this paper is organized as follows. The overview system architecture is discussed in section 2. Section 3 introduces the multi-version control method for the text file. The remote transmission and backup/recovery method is IEEE
2 presented in Section 4 and the performance is evaluated in Section 5. Finally, we conclude the paper in Section 6. II. THE OVERVIEW OF SYSTEM ARCHITECTURE A. The distributed anti-tampered system All our work are based on the distributed anti-tampered system[9] which provides a full range of three-dimensional protection system for the Website, including five subsystems: consists of five sub systems including web file monitor, content publish, reverse proxy, backup and recovery, and monitor center, as shown in Figure 1. Fig.1 The distributed anti-tampered system architecture The web file monitor subsystem runs on web servers, including application and driver components. All the operations such as file creation, deletion and modification of web directories are monitored by driver component. While illegal modifications are found, messages can be forbidden and sent to application components to warn. The content publish subsystem is used to publish web program files to web server. Only the web pages that publish through this subsystem are legal, otherwise are illegal. The processes of content publish use SSL and digital certificate technology. The reverse proxy subsystem runs on independent servers. It not only achieve WWW server to forward requests and responses, but also checks semantics, protects dynamic pages, and resists SQL injection and cross site scripting attacks. The backup and recovery subsystem can backup program files of websites. When the websites files are lost or illegal modified, they can be recovered based on this subsystem. The remote backup and recovery method talking in this paper is working for this subsystem. The monitor center subsystem is a unified administrator platform for all these subsystems. The running information of web servers, webpage intrusion detection warning, and interactive information between subsystems are shown. B. The backup and restore model The backup and recovery system model mainly consists of local backup system and remote backup system which is shown in Figure 2. The local backup system uses snapshot technology. If the Web server s pages and snapshot files are destroyed at the same time, on this occasion, the tampered pages cannot be recovered only relying on local backup. To protect the security of the Web server further, it deploys on the remote backup server, and the administrator can define backup strategies. There are several kinds of remote backup strategies including full, differential and incremental. The full backup needs more space, the differential backup can backup fast and the incremental has better space performance. Administrators can select the backup strategy based on what they need. When the differential and incremental strategies are used, there are text and file modes. Every line is checked in the text mode, while the file mode just test whether the whole file is modified. So, the version control management is used for the text mode in the remote backup and recovery system. According to the administrator s strategies, the file system can achieve file backup and restore. As the time goes, there are more and more backup files. In order to recover to either station before, we need to carry on version management for these files. So that when it is recovering the webpage, we can achieve a particular page or a special period Website for the exact restore. In order to improve the speed of backup and restore, and reduce network load, all transfer data are gotten based on Rsync, and then they are compressed and transferred using FTP over the network. Figure 2 Backup and recovery model III. THE TEXT VERSION CONTROL MANAGEMENT Because a lot of web files are text mode, for example, files of jsp, php, asp and so on, these is a special multi-version control management mechanism for that. Web files of web server changes frequently and how to recover is complex. The version control system must have the following characteristics: (1) Using the version of the directory tree to implement a change to track the virtual version of the file system, file and directory; (2) Recording the reasons for changes and modification; (3) Getting the differences between the version and the local copy; (3) When two users modify a file, the system can automatically merge changes; (4) Preventing unauthorized modification and access. The purpose of version comparison is to obtain the differences between the same documents of different versions. Each time the same file updates are logged to a differential file by the system and version comparison is based on these differential files. The generation of differential file based on two rules: the add operation and delete operation. An example of add operation to note the generation process of differential files is shown as follows. add line start: \\m,n Content to be added 396
3 add line end The first line represents the add operation, m identifies the starting row will be added, and n gives the total number of rows that will be added. Based on these differential files, the system can obtain the difference between any versions of the files, which is conducive to recovery page on the version of choice. The backup and recovery subsystem generates a version when the content distribution subsystem publishes a web site to the web server. When the web server is illegal tampered, the recovery sub-module will receive the restore instruction from the monitoring center, then analyze the instruction and obtain to the files' information. Lastly, version control module extracted corresponding version files according to version information and send it to the web server, the process is shown in Figure 3. IV. Figure 3 Version control mechanism REMOTE TRANSMISSION AND BACKUP/RECOVERY A. File synchronization and transmission In the web site protection system, web files may be small and changed frequently, so how to realize synchronous files between website and backup servers are very important. In the process of backup and restoring files, the synchronous algorithm and the transmission protocol may affect speed very much. In our method, rsync and standard FTP protocol are selected. Client:Backup Server bda abcd h1 h2 Hash FTP Hash Server:Web Server F F FTP Matching ef abcd h1 F diff Figure 4 Synchronization and transmission mechanism In the synchronous process, the web server works as server, and the backup server works as client. The client checks the h2 server-side data regularly. If there are changes it will send the synchronous request to the web server for refreshing its data. Assuming the client file is F and the server-side file is F. After synchronization, the client file will be synchronized as F. In many systems, the server-side F is directly sent to the client to cover F files. It is simple but has many shortcomings, especially if the network speed is slow, the file transmission will take a lot of time. The rsync algorithm can get a small difference file F diff to the client through calculating the difference of F and F, and then FTP is used to transmit the data, which is a standard network protocol used to transfer files from one host to another host over a TCPbased network. Because s multi-file synchronization based on single file synchronization, in the next, we mainly talk about a single file synchronizing process. In the server side, we can combine with F to generate F to achieve the file synchronization. The file synchronous and transmission method can be divided into three main stages, which are as follows and shown in figure 4. Step 1, in the backup server, all the synchronous file F are divided into blocks, and the hash table, which includes the 124 bit MD4 strong and 32 bit rolling weak checksum, is computed for each block. All checksums of all the files that should be synchronized are computed like that and stored as checksum files. Step 2, If there is changed on web server, it may download the checksum files using the FTP protocol. After the web server receives the request message, it will check checksums of its current files and obtain a hash table for F. If the hash table is same to the hash sent by client, it means there is no change. If not, the different matching file F diff should be established, and be sent to the backup server. Step 3, if the backup server receives F diff, it will reconstruct the F file set and a temp file is created. Based on F diff, the unmodified file blocks are copied directly to the temp file while the modified are copied from the F diff. So, the temp file is same as F of the web server, and then the synchronous process is finished after using the temp to replace F. B. Remote backup and recovery process The remote backup works as a disaster recovery measure, and also as an online anti-tamper mechanism to ensure the security of the Web server. The remote backup system is a filelevel, so the administrator can select client backup source, create a backup task, and choose backup strategy custom. The remote backup process is as follows and the whole remote backup and recovery process is shown in Figure 5. Step 1: Customers create a backup task. If it is the first time, the full backup will be run automatically. Otherwise, the backup strategy is defined by what they want. Step 2: Web files are operated differently based the backup strategy. If it is full backup, all the web files should be 397
4 synchronized to the backup server; if incremental backup, the added or modified files according to the last backup process should be recorded into a temp file. If differential backup, the added or modified files are according to the last full backup process. Step 3: All the files including the full backup files and temp files for incremental or differential are transferred to the backup server through FTP protocol. If the incremental or differential strategy is select, we just store F diff and tag their corresponding backup version but not synchronize the file in Step 3 in the process of synchronization and transmission. The backup server will manage these files in order to realize version control and recovering process. the rsyn based method is slower than the method using FTP directly. But when the file size becomes more than 11M, their speeds are very similar. The method s advantages are not obvious for that it is a consuming process to compute the checksum. From the figure 6.b, we can find that if the speed of network is 1Mbps, which is a typical local network speed, the method is better than the FTP based method very much. When the file size becomes 51M, nearly 86 percent of backup time is saved using rsyn. The reason is mainly that the lower transferred data costs long time. Therefore, the rsyn based method is very suitable for real network backup environment. (a) Under the unlimited virtual network Figure 5 Remote backup and recovery process The recovery of the data is actually the inverse process of backed up. If the snapshot is fail, here is a disaster on the web server, or the administrator want to roll back to an version web application, the remote recovery will work. Administrators just select which the files or fers to recover that on the web server based on what they want. V. EXPERIMENT ANALYSIS We implement the FTP protocol through the open source project j-ftp[11], and realized the remote backup system based on JDK 1.6. The experiment is working on the table PC Thinkpad X220. The Backup server is run on the physical operation while the Web server needing to backup data is run on a VMware virtual PC. All the parameters are listed in the table 1. Table 1 Experimental environment parameters parameter configuration Backup Intel i5-2450m; 8G memory; CT256M4SSD3 and Server 500G hard disk; Win 7+ JDK 1.6+VMWare 9; Backup Vmware virtual PC: 2 Processors; 2G memory; Client Windows XP + Network Virtual Network We test how to backup files whose size vary from 1M-byte size to 51M-byte size, and there are 10 percent data changed in the web server which want to be send to the backup server. The result recording the backup time is shown in Figure 6. According the Figure 6.a, if the network speed is not limited, (b) Under the virtual network with 1M bps Fig 6 Backup time for the system VI. CONCLUSION With the events about web page tampered being increasingly serious, the web site protection system becomes more and more necessary. The remote backup and recovery subsystem is very important to realize full protection. In this paper, a web site protection system oriented remote backup and recovery method is proposed. Customers can design various backup strategies by themselves. A special multi version management mechanism is given for text mode file, the whole remote transfer and backup system is mainly based on Rsync and FTP protocols. The experiment results show that the Rsync algorithm can decrease the backup time very much under normal network, and it is suit for web site protection. 398
5 ACKNOWLEDGMENT This work was partly supported by the National Natural Science Foundation of China ( , , ), the Important National Science & Technology Specific Projects (2012BAH18F00, 2012ZX ) and Guangxi Natural Science Foundation of China (2012GXNSFBA053174, 2012GXNSFAA053230). REFERENCES [1] Internet White Paper(in China) [EB/OL].[ ]. com/ /08/c_ htm. [2] Gao Yanling, Zhang Yuqing, Bai Baoming, Wang Xinmei. Overview of Web protection system [J]. The Computer Engineering (10): [3] Huang Yaowen, Yu Fang, Christian Huang, et al. Securing web application code by static analysis and runtime protection[c]//proc. of Thirteenth International World Wide Web Conference Proceeding. New York, United states:association for Computing Machinery,2004: [4] Zhang Lei, Wang Lina, Wang Dejun. Model of Webpage Tamper-Proof System [J]. Journal Wuhan University (01): [5] solution_ government.htm [6]. zhananquanf/2010/0705/27.html [7] [8] Xu Wei,Wang Min, He Xiang, etc. BM-CVI: A backup method based on a cross-version integration mechanism[c] //Proc. of International Conference on Convergence Information. Gyongju: IEEE Press. 2007: [9] Zhou Jun, He Qian, Yao Linlin. A distributed website anti-tamper system based on filter driver and proxy[c]//proc. of the 2011 MSEC International Conference on Multimedia, Software Engineering and Computing, Wuhan, China. Germany:Springer Verlag.2011: [10] A. Tridgell, P. Mackerras.The rsync algorithm[eb/ol]. [ ]. [11] 399
Res. J. Appl. Sci. Eng. Technol., 5(7): 2439-2444, 2013
Research Journal of Applied Sciences, Engineering and Technology 5(7): 2439-2444, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 26, 2012 Accepted: September
More informationSTREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS
STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS STREAD Cloud Backup is an affordable backup and recovery solution for all your mission critical business information on all devices
More informationWeb-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
More informationMaintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationNAS 259 Protecting Your Data with Remote Sync (Rsync)
NAS 259 Protecting Your Data with Remote Sync (Rsync) Create and execute an Rsync backup job A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Having
More informationYiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
More informationWeb Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
More informationVMware vsphere Data Protection
VMware vsphere Data Protection Replication Target TECHNICAL WHITEPAPER 1 Table of Contents Executive Summary... 3 VDP Identities... 3 vsphere Data Protection Replication Target Identity (VDP-RT)... 3 Replication
More informationXopero Centrally managed backup solution. User Manual
Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First
More informationProduct Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
More informationNE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
More informationDetailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM
Detailed EISOO AnyBackup Family 1 / CONTENT Chapter 1. About AnyBackup Family... 4 Chapter 2. Detailed... 5 2.1 Data Protection... 5 2.2 Regular Backup... 6 2.3 Regular Backup and Restore for File... 7
More informationExploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
More informationMaintaining a Microsoft Windows Server 2003 Environment
Maintaining a Microsoft Windows Server 2003 Environment Key Data Course #: 2275C Number of Days: 3 Format: Instructor-Led Certification Exams: None Certification Track: Exam 70-290: Managing and Maintaining
More informationC p o y p r y i r g i h g t D t e a t i a lie l d
of EISOO AnyBackup Appliance Copyright 2003-2012 EISOO Software Co.,Ltd. No company or individual are allowed to copy, distribute and extract all or parts of this document without the permission of EISOO
More informationHELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES
HELPDESK & SERVER MONITORING Organisations are under pressure to implement efficient, reliable and cost effective helpdesk And server monitoring service solutions. Our Helpdesk & Server Monitoring services
More informationDNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.
This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube
More informationVTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00
VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationLog files management. Katarzyna KAPUSTA
Log files management Katarzyna KAPUSTA CERN openlab 07 September 2012 CERN openlab otn-2012-01 openlab Summer Student Report Log files management Katarzyna KAPUSTA Giacomo TENAGLIA 07 September 2012 Version
More informationCover sheet. How do you create a backup of the OS systems during operation? SIMATIC PCS 7. FAQ November 2013. Service & Support. Answers for industry.
Cover sheet How do you create a backup of the OS systems during operation? SIMATIC PCS 7 FAQ November 2013 Service & Support Answers for industry. Question This entry originates from the Service & Support
More informationSecurity Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
More informationDeployment Topologies
, page 1 Multinode Cluster with Unified Nodes, page 2 Clustering Considerations, page 3 Cisco Unified Communications Domain Manager 10.6(x) Redundancy and Disaster Recovery, page 4 Capacity Considerations,
More informationPart Two: Technology overview
Already covered: Part One: Introduction to BackupAssist Now: Part Two: Technology overview 64 Backup Rsync Backups Still to come: Part Three: Putting it all together Server 2008 family. Image your entire
More informationNAS 253 Introduction to Backup Plan
NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup
More informationClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
More informationSystem Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
More informationCA ARCserve Family r15
CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationWhite Paper ClearSCADA Architecture
White Paper ClearSCADA Architecture ClearSCADA has 3 major components or software applications; the ClearSCADA server, a windows client known as, and a web client known as Webx. The software is designed
More informationA New Mechanism for Service Recovery Technology by using Recovering Service s Data
A New Mechanism for Service Recovery Technology by using Recovering Service s Data Monire Norouzi Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran Monire_norouzi@yahoo.com
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
More informationTECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY
INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration
More informationViewBox: Integrating Local File System with Cloud Storage Service
ViewBox: Integrating Local File System with Cloud Storage Service FAST 2014 Yupu Zhang +, Chris Dragga +*, Andrea Arpaci-Dusseau +, RemziArpaci-Dusseau + University of Wisconsin-Madison 1 Outline Introduction
More informationhttp://www.paper.edu.cn
5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission
More informationEnterprise Backup and Restore technology and solutions
Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013
More informationBackup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
More informationVIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your
More informationWe look beyond IT. Cloud Offerings
Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking
More informationVANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
More informationIBM Tivoli Storage Manager for Microsoft SharePoint
IBM Tivoli Storage Manager for Microsoft SharePoint 2007 IBM Corporation What is SharePoint? 2007 IBM Corporation What is SharePoint? What is SharePoint? Web-based workplace for online collaboration MS
More informationRetrospect 7.7 User s Guide Addendum
Retrospect 7.7 User s Guide Addendum 2011 Retrospect, Inc. All rights reserved. Retrospect 7.7 Users Guide Addendum, first edition. Use of this product (the Software ) is subject to acceptance of the license
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationSymantec Backup Exec Blueprints
Symantec Backup Exec Blueprints Blueprint for SQL Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints Preface/disclaimer
More informationQuanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud
Quanqing XU Quanqing.Xu@nicta.com.au YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Outline Motivation YuruBackup s Architecture Backup Client File Scan, Data
More informationEISOO AnyBackup 5.1. Detailed Features
EISOO AnyBackup 5.1 Detailed Detailed Content Copyright... 3 EISOO AnyBackup 5.1... 4 1.1 Regular Backup... 4 Regular Backup... 4 File Backup and Recovery... 5 Mail Backup and Recovery... 5 SQL Server
More informationAdministering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
More informationVirtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
More informationSOLUTION GUIDE AND BEST PRACTICES
SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery
More informationAdministering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
More informationActive Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.
Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds
More informationDatabase Backup and Recovery Guide
Scout Diagnostics Database Backup and Recovery Guide P H 803. 358. 3600 F A X 803. 358. 3636 WWW.AVTECINC.COM 100 I N N O VAT I O N P L ACE, L E X I N G T O N SC 29072 Copyright 2013 by Avtec, Inc. All
More informationMCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationCrashPlan PRO Enterprise Backup
CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationINTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY
INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, snw.sit@sinhgad.edu Gitanjali Dabhade Monika Ghodake Gayatri
More informationFrequently Asked Questions About WebDrv Online (Remote) Backup
Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks
More informationMaintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
More informationHIGH AVAILABILITY DISASTER RECOVERY SOLUTION
Manvi Sharma CFS-SA-Bladelogic HIGH AVAILABILITY High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be
More informationIceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
More informationLoophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
More informationPlanning for Windows Server 2008 Servers
Planning for Windows Server 2008 Servers Course Number: 6430B Course Length: 3 Days Course Overview This 3-day course is intended for IT pros who are interested in the knowledge and skills necessary to
More information"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
More informationAPPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
More informationEasy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1
More informationService Level Agreement (SLA) Arcplace Backup Enterprise Service
(SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise
More informationCapability Service Management System for Manufacturing Equipments in
Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan
More informationFORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationDocAve 6 Service Pack 1 Platform Backup and Restore
DocAve 6 Service Pack 1 Platform Backup and Restore User Guide Revision B Issued September 2012 1 Table of Contents About DocAve Platform Backup and Restore... 5 Complementary Products... 5 Submitting
More informationIBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide
IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationNational Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide
National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States
More informationBest Practices for Trialing the Intronis Cloud Backup and Recovery Solution
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationFrequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
More informationPassing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
More informationComparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationDisk-to-Disk-to-Offsite Backups for SMBs with Retrospect
Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use
More informationPN: 210-0317-04. Using Veeam Backup and Replication Software with an ExaGrid System
PN: 210-0317-04 Using Veeam Backup and Replication Software with an ExaGrid System Copyright No part of this document may be reproduced or transmitted in any form or by any means without the express written
More information10972B: Administering the Web Server (IIS) Role of Windows Server
10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationCompulink Advantage Online TM
Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved
More informationMCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
More informationRingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
More informationStorage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
More informationHyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
More informationFAQ. Hosted Data Disaster Protection
Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional
More informationTotal Backup Recovery 7
7 TM 7 Automat backup and restore management for all networked laptops & workstations from a centralized administrating console 7 Advanced Workstation assures that critical business information is well
More informationMigration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
More informationData Replication in Privileged Credential Vaults
Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches
More informationManaging and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
More informationCimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
More information