A Web Site Protection Oriented Remote Backup and Recovery Method

Size: px
Start display at page:

Download "A Web Site Protection Oriented Remote Backup and Recovery Method"

Transcription

1 2013 8th International Conference on Communications and Networking in China (CHINACOM) A Web Site Protection Oriented Remote Backup and Recovery Method He Qian 1,2, Guo Yafeng 1, Wang Yong 1, Qiang Baohua 1 1. Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education Guilin University of Electronic Technology, Guilin , China 2. College of Computer, National University of Defense Technology, Changsha treeqian@gmail.com Abstract It becomes more and more important to protect the security of web sites. In order to solve the problem about web site disaster recovery, a web site protection oriented remote backup and recovery method is proposed in this paper. Customers can design various backup strategies such as full, incremental and differential backup by themselves. A multi version control method is given to text files, and the remote transmission and backup mechanism is designed based on Rsync and FTP protocols. Rsync is used to reduce the transferred data efficiently, the experiment results show that the remote backup and recovery system can work fast and it can meet the requirements of web site protection. Keywords-Backup and Recovery, Web Protection, Version Control, Rsync, FTP I. INTRODUCTION With the rapid development of Internet technologies and applications, websites Information security issues are increasingly complex, and the Webpage has been tampered more and more seriously. The statistics of 2010 Internet Security Report given by the National Computer network Emergency Response technical Team/Coordination Center of China (CNCERT/CC) shows that Web pages Tampered events are at the top of the all the events of network security. According to the monitoring data, there are Web sites are being tampered with the average number of 2904 every month, and there are 100 sites being tampered in Chinese mainland per Day [1]. The problem about how to protect Web files is facing severe challenges. Once the web pages are tempered by a hacker illegally, it may hurt their owners and even bring some society serious damage and negative influence. So, the studies of web pages anti-tampered system or web site protection system are pay attention to. The studies of anti-tampered protection of the website can be separated into 3 types: pre-prevention, inrestraint and post-recovery [2]. The pre-prevention relies on some safety assessment and firewalls, such as ref [3], using static analysis to test if the Web code exits security vulnerabilities. Firewalls and Intrusion detection systems are typical technologies for in-restraint protection. Post-recovery, as the last measure which can prevent page from being tampered, requires the web page to be recovered timely after being tampered. Existing researches discuss little about postrecovery mechanisms which is usually used as the complement of Website Protection System. Ref [4] introduces a web antitampered model. The model includes a prepared recovery subsystem which can provide bare metal system recovery after the Web server fails to work. However, it is not able to achieve the requirements of real-time recovery after the event. From the publicly available information, we can know that a lot of popular web site protection system have weak backup and recovery capacity. For example, IGuard [5] has no backup and recovery function, WebGuard [6] only uses digital certificates for file encryption backup, and InforGuard [7] just takes a simple automatic incremental backup. None of these systems can achieve the real-time recovery after a WEB page being tampered. There are a lot of backup products in the market, but most of these systems focus on large-scale clusters which provide centralized backup service [8], for example, the massive data backup and storage without paying attention to the real-time backup and recovery of small files. Therefore, they cannot satisfy the requirements of safety recovery mechanisms of anti-tampered Webpage. The common file management system is not suitable for the requirements of antitampered system of Webpage. In this paper, we design a specific web site protection oriented backup and restore method to solve the special requirements of website protection. The automatic backup and recovery system for Web site not only plays an important part in the Web defense system but also is the last line for disaster recovery. After a server is attacked successfully by a hacker, all the files on that server shouldn t be trusted. So, the remote data outside the web site should be used, and then the backup and restore method is needed. Based on our former work [9], importing multi-version control and the Rsync synchronization algorithm, which is simple to realize and easy to achieve remote data synchronization fast [10], a specific web site protection oriented remote backup and restore method is designed. In this method, a multi version control method is given to text files recovery, transferred data are obtained based on Rsync which can decrease communication, and the File Transfer Protocol (FTP), a very popular and standard network protocol, is used in the transmission process. The rest of this paper is organized as follows. The overview system architecture is discussed in section 2. Section 3 introduces the multi-version control method for the text file. The remote transmission and backup/recovery method is IEEE

2 presented in Section 4 and the performance is evaluated in Section 5. Finally, we conclude the paper in Section 6. II. THE OVERVIEW OF SYSTEM ARCHITECTURE A. The distributed anti-tampered system All our work are based on the distributed anti-tampered system[9] which provides a full range of three-dimensional protection system for the Website, including five subsystems: consists of five sub systems including web file monitor, content publish, reverse proxy, backup and recovery, and monitor center, as shown in Figure 1. Fig.1 The distributed anti-tampered system architecture The web file monitor subsystem runs on web servers, including application and driver components. All the operations such as file creation, deletion and modification of web directories are monitored by driver component. While illegal modifications are found, messages can be forbidden and sent to application components to warn. The content publish subsystem is used to publish web program files to web server. Only the web pages that publish through this subsystem are legal, otherwise are illegal. The processes of content publish use SSL and digital certificate technology. The reverse proxy subsystem runs on independent servers. It not only achieve WWW server to forward requests and responses, but also checks semantics, protects dynamic pages, and resists SQL injection and cross site scripting attacks. The backup and recovery subsystem can backup program files of websites. When the websites files are lost or illegal modified, they can be recovered based on this subsystem. The remote backup and recovery method talking in this paper is working for this subsystem. The monitor center subsystem is a unified administrator platform for all these subsystems. The running information of web servers, webpage intrusion detection warning, and interactive information between subsystems are shown. B. The backup and restore model The backup and recovery system model mainly consists of local backup system and remote backup system which is shown in Figure 2. The local backup system uses snapshot technology. If the Web server s pages and snapshot files are destroyed at the same time, on this occasion, the tampered pages cannot be recovered only relying on local backup. To protect the security of the Web server further, it deploys on the remote backup server, and the administrator can define backup strategies. There are several kinds of remote backup strategies including full, differential and incremental. The full backup needs more space, the differential backup can backup fast and the incremental has better space performance. Administrators can select the backup strategy based on what they need. When the differential and incremental strategies are used, there are text and file modes. Every line is checked in the text mode, while the file mode just test whether the whole file is modified. So, the version control management is used for the text mode in the remote backup and recovery system. According to the administrator s strategies, the file system can achieve file backup and restore. As the time goes, there are more and more backup files. In order to recover to either station before, we need to carry on version management for these files. So that when it is recovering the webpage, we can achieve a particular page or a special period Website for the exact restore. In order to improve the speed of backup and restore, and reduce network load, all transfer data are gotten based on Rsync, and then they are compressed and transferred using FTP over the network. Figure 2 Backup and recovery model III. THE TEXT VERSION CONTROL MANAGEMENT Because a lot of web files are text mode, for example, files of jsp, php, asp and so on, these is a special multi-version control management mechanism for that. Web files of web server changes frequently and how to recover is complex. The version control system must have the following characteristics: (1) Using the version of the directory tree to implement a change to track the virtual version of the file system, file and directory; (2) Recording the reasons for changes and modification; (3) Getting the differences between the version and the local copy; (3) When two users modify a file, the system can automatically merge changes; (4) Preventing unauthorized modification and access. The purpose of version comparison is to obtain the differences between the same documents of different versions. Each time the same file updates are logged to a differential file by the system and version comparison is based on these differential files. The generation of differential file based on two rules: the add operation and delete operation. An example of add operation to note the generation process of differential files is shown as follows. add line start: \\m,n Content to be added 396

3 add line end The first line represents the add operation, m identifies the starting row will be added, and n gives the total number of rows that will be added. Based on these differential files, the system can obtain the difference between any versions of the files, which is conducive to recovery page on the version of choice. The backup and recovery subsystem generates a version when the content distribution subsystem publishes a web site to the web server. When the web server is illegal tampered, the recovery sub-module will receive the restore instruction from the monitoring center, then analyze the instruction and obtain to the files' information. Lastly, version control module extracted corresponding version files according to version information and send it to the web server, the process is shown in Figure 3. IV. Figure 3 Version control mechanism REMOTE TRANSMISSION AND BACKUP/RECOVERY A. File synchronization and transmission In the web site protection system, web files may be small and changed frequently, so how to realize synchronous files between website and backup servers are very important. In the process of backup and restoring files, the synchronous algorithm and the transmission protocol may affect speed very much. In our method, rsync and standard FTP protocol are selected. Client:Backup Server bda abcd h1 h2 Hash FTP Hash Server:Web Server F F FTP Matching ef abcd h1 F diff Figure 4 Synchronization and transmission mechanism In the synchronous process, the web server works as server, and the backup server works as client. The client checks the h2 server-side data regularly. If there are changes it will send the synchronous request to the web server for refreshing its data. Assuming the client file is F and the server-side file is F. After synchronization, the client file will be synchronized as F. In many systems, the server-side F is directly sent to the client to cover F files. It is simple but has many shortcomings, especially if the network speed is slow, the file transmission will take a lot of time. The rsync algorithm can get a small difference file F diff to the client through calculating the difference of F and F, and then FTP is used to transmit the data, which is a standard network protocol used to transfer files from one host to another host over a TCPbased network. Because s multi-file synchronization based on single file synchronization, in the next, we mainly talk about a single file synchronizing process. In the server side, we can combine with F to generate F to achieve the file synchronization. The file synchronous and transmission method can be divided into three main stages, which are as follows and shown in figure 4. Step 1, in the backup server, all the synchronous file F are divided into blocks, and the hash table, which includes the 124 bit MD4 strong and 32 bit rolling weak checksum, is computed for each block. All checksums of all the files that should be synchronized are computed like that and stored as checksum files. Step 2, If there is changed on web server, it may download the checksum files using the FTP protocol. After the web server receives the request message, it will check checksums of its current files and obtain a hash table for F. If the hash table is same to the hash sent by client, it means there is no change. If not, the different matching file F diff should be established, and be sent to the backup server. Step 3, if the backup server receives F diff, it will reconstruct the F file set and a temp file is created. Based on F diff, the unmodified file blocks are copied directly to the temp file while the modified are copied from the F diff. So, the temp file is same as F of the web server, and then the synchronous process is finished after using the temp to replace F. B. Remote backup and recovery process The remote backup works as a disaster recovery measure, and also as an online anti-tamper mechanism to ensure the security of the Web server. The remote backup system is a filelevel, so the administrator can select client backup source, create a backup task, and choose backup strategy custom. The remote backup process is as follows and the whole remote backup and recovery process is shown in Figure 5. Step 1: Customers create a backup task. If it is the first time, the full backup will be run automatically. Otherwise, the backup strategy is defined by what they want. Step 2: Web files are operated differently based the backup strategy. If it is full backup, all the web files should be 397

4 synchronized to the backup server; if incremental backup, the added or modified files according to the last backup process should be recorded into a temp file. If differential backup, the added or modified files are according to the last full backup process. Step 3: All the files including the full backup files and temp files for incremental or differential are transferred to the backup server through FTP protocol. If the incremental or differential strategy is select, we just store F diff and tag their corresponding backup version but not synchronize the file in Step 3 in the process of synchronization and transmission. The backup server will manage these files in order to realize version control and recovering process. the rsyn based method is slower than the method using FTP directly. But when the file size becomes more than 11M, their speeds are very similar. The method s advantages are not obvious for that it is a consuming process to compute the checksum. From the figure 6.b, we can find that if the speed of network is 1Mbps, which is a typical local network speed, the method is better than the FTP based method very much. When the file size becomes 51M, nearly 86 percent of backup time is saved using rsyn. The reason is mainly that the lower transferred data costs long time. Therefore, the rsyn based method is very suitable for real network backup environment. (a) Under the unlimited virtual network Figure 5 Remote backup and recovery process The recovery of the data is actually the inverse process of backed up. If the snapshot is fail, here is a disaster on the web server, or the administrator want to roll back to an version web application, the remote recovery will work. Administrators just select which the files or fers to recover that on the web server based on what they want. V. EXPERIMENT ANALYSIS We implement the FTP protocol through the open source project j-ftp[11], and realized the remote backup system based on JDK 1.6. The experiment is working on the table PC Thinkpad X220. The Backup server is run on the physical operation while the Web server needing to backup data is run on a VMware virtual PC. All the parameters are listed in the table 1. Table 1 Experimental environment parameters parameter configuration Backup Intel i5-2450m; 8G memory; CT256M4SSD3 and Server 500G hard disk; Win 7+ JDK 1.6+VMWare 9; Backup Vmware virtual PC: 2 Processors; 2G memory; Client Windows XP + Network Virtual Network We test how to backup files whose size vary from 1M-byte size to 51M-byte size, and there are 10 percent data changed in the web server which want to be send to the backup server. The result recording the backup time is shown in Figure 6. According the Figure 6.a, if the network speed is not limited, (b) Under the virtual network with 1M bps Fig 6 Backup time for the system VI. CONCLUSION With the events about web page tampered being increasingly serious, the web site protection system becomes more and more necessary. The remote backup and recovery subsystem is very important to realize full protection. In this paper, a web site protection system oriented remote backup and recovery method is proposed. Customers can design various backup strategies by themselves. A special multi version management mechanism is given for text mode file, the whole remote transfer and backup system is mainly based on Rsync and FTP protocols. The experiment results show that the Rsync algorithm can decrease the backup time very much under normal network, and it is suit for web site protection. 398

5 ACKNOWLEDGMENT This work was partly supported by the National Natural Science Foundation of China ( , , ), the Important National Science & Technology Specific Projects (2012BAH18F00, 2012ZX ) and Guangxi Natural Science Foundation of China (2012GXNSFBA053174, 2012GXNSFAA053230). REFERENCES [1] Internet White Paper(in China) [EB/OL].[ ]. com/ /08/c_ htm. [2] Gao Yanling, Zhang Yuqing, Bai Baoming, Wang Xinmei. Overview of Web protection system [J]. The Computer Engineering (10): [3] Huang Yaowen, Yu Fang, Christian Huang, et al. Securing web application code by static analysis and runtime protection[c]//proc. of Thirteenth International World Wide Web Conference Proceeding. New York, United states:association for Computing Machinery,2004: [4] Zhang Lei, Wang Lina, Wang Dejun. Model of Webpage Tamper-Proof System [J]. Journal Wuhan University (01): [5] solution_ government.htm [6]. zhananquanf/2010/0705/27.html [7] [8] Xu Wei,Wang Min, He Xiang, etc. BM-CVI: A backup method based on a cross-version integration mechanism[c] //Proc. of International Conference on Convergence Information. Gyongju: IEEE Press. 2007: [9] Zhou Jun, He Qian, Yao Linlin. A distributed website anti-tamper system based on filter driver and proxy[c]//proc. of the 2011 MSEC International Conference on Multimedia, Software Engineering and Computing, Wuhan, China. Germany:Springer Verlag.2011: [10] A. Tridgell, P. Mackerras.The rsync algorithm[eb/ol]. [ ]. [11] 399

Res. J. Appl. Sci. Eng. Technol., 5(7): 2439-2444, 2013

Res. J. Appl. Sci. Eng. Technol., 5(7): 2439-2444, 2013 Research Journal of Applied Sciences, Engineering and Technology 5(7): 2439-2444, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 26, 2012 Accepted: September

More information

STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS

STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS STREAD CLOUD BACKUP MILITARY-GRADE ONLINE BACKUP BUILT FOR YOUR BUSINESS STREAD Cloud Backup is an affordable backup and recovery solution for all your mission critical business information on all devices

More information

Web-Based Data Backup Solutions

Web-Based Data Backup Solutions "IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of

More information

Maintaining a Microsoft Windows Server 2003 Environment

Maintaining a Microsoft Windows Server 2003 Environment Maintaining a Microsoft Windows Server 2003 Environment Course number: 2275C Course lenght: 3 days Course Outline Module 1: Preparing to Administer a Server This module explains how to administer a server.

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

NAS 259 Protecting Your Data with Remote Sync (Rsync)

NAS 259 Protecting Your Data with Remote Sync (Rsync) NAS 259 Protecting Your Data with Remote Sync (Rsync) Create and execute an Rsync backup job A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Having

More information

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction

More information

Web Security School Final Exam

Web Security School Final Exam Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

VMware vsphere Data Protection

VMware vsphere Data Protection VMware vsphere Data Protection Replication Target TECHNICAL WHITEPAPER 1 Table of Contents Executive Summary... 3 VDP Identities... 3 vsphere Data Protection Replication Target Identity (VDP-RT)... 3 Replication

More information

Xopero Centrally managed backup solution. User Manual

Xopero Centrally managed backup solution. User Manual Centrally managed backup solution User Manual Contents Desktop application...2 Requirements...2 The installation process...3 Logging in to the application...6 First logging in to the application...7 First

More information

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential

More information

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft

More information

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM

Detailed Features. Detailed Features. EISOO AnyBackup Family 1 / 19 WWW.EISOO.COM Detailed EISOO AnyBackup Family 1 / CONTENT Chapter 1. About AnyBackup Family... 4 Chapter 2. Detailed... 5 2.1 Data Protection... 5 2.2 Regular Backup... 6 2.3 Regular Backup and Restore for File... 7

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Maintaining a Microsoft Windows Server 2003 Environment

Maintaining a Microsoft Windows Server 2003 Environment Maintaining a Microsoft Windows Server 2003 Environment Key Data Course #: 2275C Number of Days: 3 Format: Instructor-Led Certification Exams: None Certification Track: Exam 70-290: Managing and Maintaining

More information

C p o y p r y i r g i h g t D t e a t i a lie l d

C p o y p r y i r g i h g t D t e a t i a lie l d of EISOO AnyBackup Appliance Copyright 2003-2012 EISOO Software Co.,Ltd. No company or individual are allowed to copy, distribute and extract all or parts of this document without the permission of EISOO

More information

HELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES

HELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES HELPDESK & SERVER MONITORING Organisations are under pressure to implement efficient, reliable and cost effective helpdesk And server monitoring service solutions. Our Helpdesk & Server Monitoring services

More information

DNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.

DNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly. This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube

More information

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00

VTLBackup4i. Backup your IBM i data to remote location automatically. Quick Reference and Tutorial. Version 02.00 VTLBackup4i Backup your IBM i data to remote location automatically Quick Reference and Tutorial Version 02.00 Manufacture and distributed by VRTech.Biz LTD Last Update:16.9.2013 Contents 1. About VTLBackup4i...

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Log files management. Katarzyna KAPUSTA

Log files management. Katarzyna KAPUSTA Log files management Katarzyna KAPUSTA CERN openlab 07 September 2012 CERN openlab otn-2012-01 openlab Summer Student Report Log files management Katarzyna KAPUSTA Giacomo TENAGLIA 07 September 2012 Version

More information

Cover sheet. How do you create a backup of the OS systems during operation? SIMATIC PCS 7. FAQ November 2013. Service & Support. Answers for industry.

Cover sheet. How do you create a backup of the OS systems during operation? SIMATIC PCS 7. FAQ November 2013. Service & Support. Answers for industry. Cover sheet How do you create a backup of the OS systems during operation? SIMATIC PCS 7 FAQ November 2013 Service & Support Answers for industry. Question This entry originates from the Service & Support

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines

More information

Deployment Topologies

Deployment Topologies , page 1 Multinode Cluster with Unified Nodes, page 2 Clustering Considerations, page 3 Cisco Unified Communications Domain Manager 10.6(x) Redundancy and Disaster Recovery, page 4 Capacity Considerations,

More information

Part Two: Technology overview

Part Two: Technology overview Already covered: Part One: Introduction to BackupAssist Now: Part Two: Technology overview 64 Backup Rsync Backups Still to come: Part Three: Putting it all together Server 2008 family. Image your entire

More information

NAS 253 Introduction to Backup Plan

NAS 253 Introduction to Backup Plan NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup

More information

ClockWork Enterprise 5

ClockWork Enterprise 5 ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

White Paper ClearSCADA Architecture

White Paper ClearSCADA Architecture White Paper ClearSCADA Architecture ClearSCADA has 3 major components or software applications; the ClearSCADA server, a windows client known as, and a web client known as Webx. The software is designed

More information

A New Mechanism for Service Recovery Technology by using Recovering Service s Data

A New Mechanism for Service Recovery Technology by using Recovering Service s Data A New Mechanism for Service Recovery Technology by using Recovering Service s Data Monire Norouzi Department of Computer Engineering, Shabestar Branch, Islamic Azad University, Shabestar, Iran Monire_norouzi@yahoo.com

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration

More information

ViewBox: Integrating Local File System with Cloud Storage Service

ViewBox: Integrating Local File System with Cloud Storage Service ViewBox: Integrating Local File System with Cloud Storage Service FAST 2014 Yupu Zhang +, Chris Dragga +*, Andrea Arpaci-Dusseau +, RemziArpaci-Dusseau + University of Wisconsin-Madison 1 Outline Introduction

More information

http://www.paper.edu.cn

http://www.paper.edu.cn 5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission

More information

Enterprise Backup and Restore technology and solutions

Enterprise Backup and Restore technology and solutions Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE

VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your

More information

We look beyond IT. Cloud Offerings

We look beyond IT. Cloud Offerings Cloud Offerings cstor Cloud Offerings As today s fast-moving businesses deal with increasing demands for IT services and decreasing IT budgets, the onset of cloud-ready solutions has provided a forward-thinking

More information

VANGUARD ONLINE BACKUP

VANGUARD ONLINE BACKUP VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful

More information

IBM Tivoli Storage Manager for Microsoft SharePoint

IBM Tivoli Storage Manager for Microsoft SharePoint IBM Tivoli Storage Manager for Microsoft SharePoint 2007 IBM Corporation What is SharePoint? 2007 IBM Corporation What is SharePoint? What is SharePoint? Web-based workplace for online collaboration MS

More information

Retrospect 7.7 User s Guide Addendum

Retrospect 7.7 User s Guide Addendum Retrospect 7.7 User s Guide Addendum 2011 Retrospect, Inc. All rights reserved. Retrospect 7.7 Users Guide Addendum, first edition. Use of this product (the Software ) is subject to acceptance of the license

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Symantec Backup Exec Blueprints

Symantec Backup Exec Blueprints Symantec Backup Exec Blueprints Blueprint for SQL Backup Exec Technical Services Backup & Recovery Technical Education Services Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints Preface/disclaimer

More information

Quanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud

Quanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Quanqing XU Quanqing.Xu@nicta.com.au YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Outline Motivation YuruBackup s Architecture Backup Client File Scan, Data

More information

EISOO AnyBackup 5.1. Detailed Features

EISOO AnyBackup 5.1. Detailed Features EISOO AnyBackup 5.1 Detailed Detailed Content Copyright... 3 EISOO AnyBackup 5.1... 4 1.1 Regular Backup... 4 Regular Backup... 4 File Backup and Recovery... 5 Mail Backup and Recovery... 5 SQL Server

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course

More information

Virtual Machine Environments: Data Protection and Recovery Solutions

Virtual Machine Environments: Data Protection and Recovery Solutions The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:

More information

SOLUTION GUIDE AND BEST PRACTICES

SOLUTION GUIDE AND BEST PRACTICES SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery

More information

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

More information

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions. Vmware ESX 4/5/6 - Provision virtual machines through vsphere, assign available resources and install operating systems. - Configure the various built in alarms for monitoring, configure alarm thresholds

More information

Database Backup and Recovery Guide

Database Backup and Recovery Guide Scout Diagnostics Database Backup and Recovery Guide P H 803. 358. 3600 F A X 803. 358. 3636 WWW.AVTECINC.COM 100 I N N O VAT I O N P L ACE, L E X I N G T O N SC 29072 Copyright 2013 by Avtec, Inc. All

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

CrashPlan PRO Enterprise Backup

CrashPlan PRO Enterprise Backup CrashPlan PRO Enterprise Backup People Friendly, Enterprise Tough CrashPlan PRO is a high performance, cross-platform backup solution that provides continuous protection onsite, offsite, and online for

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, snw.sit@sinhgad.edu Gitanjali Dabhade Monika Ghodake Gayatri

More information

Frequently Asked Questions About WebDrv Online (Remote) Backup

Frequently Asked Questions About WebDrv Online (Remote) Backup Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks

More information

Maintaining the Content Server

Maintaining the Content Server CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down

More information

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION

HIGH AVAILABILITY DISASTER RECOVERY SOLUTION Manvi Sharma CFS-SA-Bladelogic HIGH AVAILABILITY High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Planning for Windows Server 2008 Servers

Planning for Windows Server 2008 Servers Planning for Windows Server 2008 Servers Course Number: 6430B Course Length: 3 Days Course Overview This 3-day course is intended for IT pros who are interested in the knowledge and skills necessary to

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1

More information

Service Level Agreement (SLA) Arcplace Backup Enterprise Service

Service Level Agreement (SLA) Arcplace Backup Enterprise Service (SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

DocAve 6 Service Pack 1 Platform Backup and Restore

DocAve 6 Service Pack 1 Platform Backup and Restore DocAve 6 Service Pack 1 Platform Backup and Restore User Guide Revision B Issued September 2012 1 Table of Contents About DocAve Platform Backup and Restore... 5 Complementary Products... 5 Submitting

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Redefining Microsoft SQL Server Data Management. PAS Specification

Redefining Microsoft SQL Server Data Management. PAS Specification Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing

More information

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide

National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide National Fire Incident Reporting System (NFIRS 5.0) Configuration Tool User's Guide NFIRS 5.0 Software Version 5.6 1/7/2009 Department of Homeland Security Federal Emergency Management Agency United States

More information

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use

More information

PN: 210-0317-04. Using Veeam Backup and Replication Software with an ExaGrid System

PN: 210-0317-04. Using Veeam Backup and Replication Software with an ExaGrid System PN: 210-0317-04 Using Veeam Backup and Replication Software with an ExaGrid System Copyright No part of this document may be reproduced or transmitted in any form or by any means without the express written

More information

10972B: Administering the Web Server (IIS) Role of Windows Server

10972B: Administering the Web Server (IIS) Role of Windows Server 10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSA Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

FAQ. Hosted Data Disaster Protection

FAQ. Hosted Data Disaster Protection Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional

More information

Total Backup Recovery 7

Total Backup Recovery 7 7 TM 7 Automat backup and restore management for all networked laptops & workstations from a centralized administrating console 7 Advanced Workstation assures that critical business information is well

More information

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National

More information

Data Replication in Privileged Credential Vaults

Data Replication in Privileged Credential Vaults Data Replication in Privileged Credential Vaults 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Background: Securing Privileged Accounts 2 2 The Business Challenge 3 3 Solution Approaches

More information

Managing and Maintaining a Windows Server 2003 Network Environment

Managing and Maintaining a Windows Server 2003 Network Environment Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.

More information

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred

CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides

More information