Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation

Size: px
Start display at page:

Download "Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation"

Transcription

1 Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation

2 Objectives Outline the features of common compression utilities Compress and decompress files using common compression utilities Perform system backups using the tar, cpio, and dump commands View and extract archives using the tar, cpio, and restore commands Linux+ Guide to Linux Certification, 3e 2

3 Objectives (continued) Use burning software to back up files to CD and DVD Describe common types of Linux software Compile and install software packages from source code Use the Red Hat Package Manager to install, manage, and remove software packages Use the yum command to obtain software from Internet software repositories Linux+ Guide to Linux Certification, 3e 3

4 Compression Compression: process in which files are reduced in size by stripping out characters Compression algorithm: standard set of instructions used to compress a file Compression ratio: percentage by which the file size was decreased Common compression utilities include compress, gzip, and bzip2 Linux+ Guide to Linux Certification, 3e 4

5 The compress Utility Use to compress files using the Adaptive Lempel Ziv coding (LZW) compression algorithm Average compression ratio of 40-50% compress command: used to compress files zcat command: used to display the contents of an archive created with compress Can use zmore and zless commands to view contents page-by-page uncompress command: used to decompress files compressed by compress command Linux+ Guide to Linux Certification, 3e 5

6 The compress Utility (continued) Table 11-1: Common options used with the compress utility Linux+ Guide to Linux Certification, 3e 6

7 The gzip Utility GNU zip (gzip): used to compress files using the Lempel-Ziv compression algorithm (LZ77) Varies slightly from algorithm used by compress Average compression ratio of 60-70% Uses.gz filename extension by default Can control level of compression via numeric option gunzip command: used to decompress.gz files Linux+ Guide to Linux Certification, 3e 7

8 The gzip Utility (continued) Table 11-2: Common options used with the gzip utility Linux+ Guide to Linux Certification, 3e 8

9 The gzip Utility (continued) Table 11-2 (continued): Common options used with the gzip utility Linux+ Guide to Linux Certification, 3e 9

10 The gzip Utility (continued) Table 11-2 (continued): Common options used with the gzip utility Linux+ Guide to Linux Certification, 3e 10

11 The bzip2 Utility bzip2 command: used to compress files using Burrows-Wheeler Block Sorting Huffman Coding compression algorithm Cannot compress directory full of files Cannot use zcat and zmore to view files Must use bzcat command Compression ratio is 50% to 75% on average Uses.bz2 filename extension by default bunzip2 command: used to decompress files compressed via bzip2 Linux+ Guide to Linux Certification, 3e 11

12 The bzip2 Utility (continued) Table 11-3: Common options used with the bzip2 utility Linux+ Guide to Linux Certification, 3e 12

13 The bzip2 Utility (continued) Table 11-3 (continued): Common options used with the bzip2 utility Linux+ Guide to Linux Certification, 3e 13

14 System Backup System backup: process whereby files are copied to an archive Archive: location (file or device) that contains copy of files Typically created by a backup utility Should backup user files from home directories and any important system configuration files Possibly files used by system services as well Several backup utilities available tar, cpio, dump/restore, burning software Linux+ Guide to Linux Certification, 3e 14

15 System Backup (continued) Table 11-4: Common tape device files Linux+ Guide to Linux Certification, 3e 15

16 The tar Utility Tape archive (tar) utility: one of oldest and most common backup utilities Can create archive in a file on a filesystem or directly on a device tar command: activates tar utility Arguments list the files to place in the archive Accepts options to determine location of archive and action to perform on archive Linux+ Guide to Linux Certification, 3e 16

17 The tar Utility (continued) Table 11-5: Common options used with the tar utility Linux+ Guide to Linux Certification, 3e 17

18 The tar Utility (continued) Table 11-5 (continued): Common options used with the tar utility Linux+ Guide to Linux Certification, 3e 18

19 The tar Utility (continued) tar utility does not compress files inside archive Time needed to transfer archive across a network is high Can compress archive Backing up files to compressed archive on a filesystem is useful when transferring data across a network Use options of the tar command to compress an archive immediately after creation Linux+ Guide to Linux Certification, 3e 19

20 The cpio Utility Copy in/out (cpio): common backup utility Activated by the cpio command Has various options Includes options similar to tar utility Has added features Ability to back up device files Long filenames Uses absolute pathnames by default when archiving Linux+ Guide to Linux Certification, 3e 20

21 The cpio Utility (continued) Table 11-6: Common options used with the cpio command Linux+ Guide to Linux Certification, 3e 21

22 The cpio Utility (continued) Table 11-6 (continued): Common options used with the cpio command Linux+ Guide to Linux Certification, 3e 22

23 The dump/restore Utility dump/restore: Used to back up files and directories to device or file on filesystem Works only with files on ext2 and ext3 filesystems Designed to backup entire filesystems to an archive /etc/dumpdates: file used to store information about incremental and full backups Linux+ Guide to Linux Certification, 3e 23

24 The dump/restore Utility (continued) Full backup: archiving all data on filesystem Incremental backup: backs up only data that has changed since last backup Can perform up to nine different incremental backups dump command: create archives for full or incremental backup restore command: extract archives created with dump Linux+ Guide to Linux Certification, 3e 24

25 The dump/restore Utility (continued) Figure 11-1: A sample back-up strategy Linux+ Guide to Linux Certification, 3e 25

26 The dump/restore Utility (continued) Table 11-7: Common options used with the dump/restore utility Linux+ Guide to Linux Certification, 3e 26

27 Burning Software tar, cpio, and dump utilities copy data to backup medium in character-by-character or block-by-block format Typically used with tape, floppy, and hard disk media Disc burning software: used to write files to CD or DVD media Build CD or DVD filesystem, organize the data, and write it all to CD or DVD Fedora 13 comes with Brasero Disc Burner burning software Linux+ Guide to Linux Certification, 3e 27

28 Burning Software (continued) Figure 11-2: The Brasero Disc Burner program Linux+ Guide to Linux Certification, 3e 28

29 Software Installation Software for Linux can consist of: Binary files precompiled to run on certain hardware architectures Source code, which must be compiled before use Typically distributed in tarball format Package manager: system that defines standard package format Used to install, query, and remove packages Red Hat Package Manager (RPM): most common package manager used by Linux systems today Linux+ Guide to Linux Certification, 3e 29

30 Compiling Source Code into Programs Procedure for compiling source code into binary programs standardized among most OSS developers make command: looks for Makefile and it to compile the source code into binary using compiler Makefile: contains most of the information and commands necessary to compile a program, as well as instructions for use of commented areas make install command: copies complied executable programs to correct location Linux+ Guide to Linux Certification, 3e 30

31 Compiling Source Code into Programs (continued) Figure 11-3: The rdesktop program Linux+ Guide to Linux Certification, 3e 31

32 Installing Programs Using RPM Packages in RPM format have filenames that indicate hardware architecture for which the software was compiled End with.rpm extension To install an RPM package, use i option to rpm command Command used to install, query, and remove RPM packages Linux+ Guide to Linux Certification, 3e 32

33 Installing Programs Using RPM (continued) After installation RPM database is updated to contain information about the installed package and files contained in it -q option: query the full package name -i option: together with q used to display full package information -f option: together with q used to display the package to which a specific file belongs -e option: used to remove a package from the system Linux+ Guide to Linux Certification, 3e 33

34 Installing Programs Using RPM (continued) Figure 11-4: The bluefish program Linux+ Guide to Linux Certification, 3e 34

35 Installing Programs Using RPM (continued) Table 11-8: Common options used with the rpm utility Linux+ Guide to Linux Certification, 3e 35

36 Installing Programs Using RPM (continued) Table 11-8 (continued): Common options used with the rpm utility Linux+ Guide to Linux Certification, 3e 36

37 Installing Programs Using RPM (continued) Most RPM packages are located on Internet Servers Called software repositories yum command: used to search Internet software repositories for RPM packages Installs dependent packages if necessary yum install packagename command yum update packagename command KPackageKit: graphical utility for installing or updating packages Linux+ Guide to Linux Certification, 3e 37

38 Installing Programs Using RPM (continued) Figure 11-5: The KPackageKit utility Linux+ Guide to Linux Certification, 3e 38

39 Summary Many compression utilities are available for Linux systems; each uses a different compression algorithm and produces a different compression ratio Files can be backed up to an archive using a backup utility To back up files to CD-RW or DVD-RW, use burning software instead of a backup utility Linux+ Guide to Linux Certification, 3e 39

40 Summary (continued) tar is the most common backup utility used today Typically used to create compressed archives called tarballs Source code for Linux software can be obtained and compiled afterward using the GNU C Compiler Most source code is available in tarball format via the Internet Linux+ Guide to Linux Certification, 3e 40

41 Summary (continued) Package Managers install and manage compiled software of the same format The Red Hat Package Manager is the most common package manager available for Linux systems today You can install or upgrade RPM packages using the yum command yum command obtains RPM packages from software repositories on the Internet Linux+ Guide to Linux Certification, 3e 41

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Training course 2007 BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Nicolas FUNKE PS2 ID : 45722 This document represents my internships technical report. I worked for the Biarritz's Town Hall during

More information

Linux System Administration. System Administration Tasks

Linux System Administration. System Administration Tasks System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,

More information

Linux System Administration

Linux System Administration System Backup Strategies Objective At the conclusion of this module, the student will be able to: describe the necessity for creating a backup regimen describe the advantages and disadvantages of the most

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely Remote access and file transfer Overview Remote logins to Bio-Linux with ssh Running software from another machine Logging in from another machine Getting files on and off Bio-Linux Transferring files

More information

Objectives 102.4 & 102.5 Linux Package Handling by Christine Bresnahan: Christine-Bresnahan.com

Objectives 102.4 & 102.5 Linux Package Handling by Christine Bresnahan: Christine-Bresnahan.com Objectives 102.4 & 102.5 Linux Package Handling by Christine Bresnahan: Christine-Bresnahan.com What is a package? A package is typically an archive (a single file containing many files) along with additional

More information

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical

More information

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions

4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions 4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5

More information

Amanda The Open Source Backup & Archiving Software. Ian Turner ian@zmanda.com 11 April 2006. Copyright 2006 Zmanda, Inc. All rights reserved.

Amanda The Open Source Backup & Archiving Software. Ian Turner ian@zmanda.com 11 April 2006. Copyright 2006 Zmanda, Inc. All rights reserved. Amanda The Open Source Backup & Archiving Software Ian Turner ian@zmanda.com 11 April 2006 Copyright 2006 Zmanda, Inc. All rights reserved. 1 Agenda What is Amanda? Amanda features Configuration Administration

More information

WES 9.2 DRIVE CONFIGURATION WORKSHEET

WES 9.2 DRIVE CONFIGURATION WORKSHEET WES 9.2 DRIVE CONFIGURATION WORKSHEET This packet will provide you with a paper medium external to your WES box to write down the device names, partitions, and mount points within your machine. You may

More information

Backing Up Your System With rsnapshot

Backing Up Your System With rsnapshot Roberto C. Sánchez Dayton Linux Users Group InstallFest Saturday, March 1, 2014 Overview About the Presenter About and Alternatives Installing Options in Configuring Other Operating Systems (e.g., Windows,

More information

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002) Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and

More information

Backup policies. Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical

Backup policies. Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical Backup policies Or - how not to get annoyed when you accidentally delete stuff. Warning - this does get a little technical This is the bottom line The EGTDC cannot be held responsible for loss of data

More information

Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK

Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK Quick Start Guide Copyright Statement Copyright Lone Star Software Corp. 1983-2013 ALL RIGHTS RESERVED. All content viewable or accessible from this guide is the sole property of Lone Star Software Corp.

More information

Package Management. Michael Tsai 2016/4/27

Package Management. Michael Tsai 2016/4/27 Package Management Michael Tsai 2016/4/27 PXEBoot Diskless host operation Boot ROM on your network interface card uses DHCP to get the initial network setting Including the location of the boot file at

More information

How to Restore a Linux Server Using Bare Metal Restore

How to Restore a Linux Server Using Bare Metal Restore How to Restore a Linux Server Using Bare Metal Restore This article refers to firmware version 5.4 and higher, and the Barracuda Linux Backup Agent 5.4 and higher. Use the steps in this article to restore

More information

Understanding RPM Package Management Tutorial

Understanding RPM Package Management Tutorial Understanding RPM Package Management Tutorial Author Name: Chris Negus 08/31/2012 OVERVIEW Red Hat Enterprise Linux, Fedora, and many other Linux distributions group their software together in packages

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

1 Context. 1.111.1 Manage users and group accounts and related system files [4]

1 Context. 1.111.1 Manage users and group accounts and related system files [4] 1. Context 1.111.5 2 Outline Contents 1.111.5 Maintain an effective data backup strategy Weight 3 Grant Parnell Linux Professional Institute Certification 102 Geoffrey Robertson ge@ffrey.com Nick Urbanik

More information

Managed Backup Service - Agent for Linux 6.00.2415- Release Notes

Managed Backup Service - Agent for Linux 6.00.2415- Release Notes Managed Backup Service - Agent for Linux 6.00.2415- Release Notes 1 Managed Backup Service Agent for Linux Version 6.00.2415 Release Notes, 9 th June 2008 1 OVERVIEW This document contains release notes

More information

Acronis Backup & Recovery 10 Server for Linux. Installation Guide

Acronis Backup & Recovery 10 Server for Linux. Installation Guide Acronis Backup & Recovery 10 Server for Linux Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for

More information

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Objectives Develop a Backup Strategy Create Backup Files with tar Work with Magnetic Tapes Copy Data

More information

Software Deployment and Configuration

Software Deployment and Configuration www.dcs.ed.ac.uk/~paul/publications/deployment.pdf Software Deployment and Configuration Paul Anderson Division of Informatics University of Edinburgh

More information

USTM16 Linux System Administration

USTM16 Linux System Administration USTM16 Linux System Administration Lesson 4: Memory Management and Backups Instructor: Peter Chung (cspeter@cse.ust.hk) Peter Chung (cspeter) 1 GNOME System Monitor A graphical user interface to display

More information

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish.

Updates Click to check for a newer version of the CD Press next and confirm the disc burner selection before pressing finish. Backup. If your computer refuses to boot or load Windows or if you are trying to restore an image to a partition the Reflect cannot lock (See here), and then you will have to start your PC using a rescue

More information

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved. Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations

More information

OPTICAL MEDIA WHITEPAPER

OPTICAL MEDIA WHITEPAPER OPTICAL MEDIA WHITEPAPER Lowering the cost of UNIX and Linux hardware with BackupEDGE BackupEDGE was designed to optimize the capabilities of optical media for backups. Using Optical Media With Microlite

More information

Creating a Complete Backup of Shelby v5 Data

Creating a Complete Backup of Shelby v5 Data Creating a Complete Backup of Shelby v5 Data Backup the Shelby folder and all its contents Since the Shelby v5 software now stores information in the \Shelby\ssv5.dat folder as well as in the SQL database;

More information

How To Use Ackup On Ackups On A Cell Phone Or Ipad Or Ipa 2.3.3 (Ackup) On A Pc Or Ipam 2.5 (Aqb) On An Iphone

How To Use Ackup On Ackups On A Cell Phone Or Ipad Or Ipa 2.3.3 (Ackup) On A Pc Or Ipam 2.5 (Aqb) On An Iphone User Guide MAS v3.0 Motorola Automated ackup System MOTOROLA and the Stylized M logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. Firefox and the Firefox logos are trademarks

More information

RHCSA 7RHCE Red Haf Linux Certification Practice

RHCSA 7RHCE Red Haf Linux Certification Practice RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in

More information

1. Installation Instructions - Unix & Linux

1. Installation Instructions - Unix & Linux Planning Your Installation 1. Installation Instructions - Unix & Linux There are two types of Gridgen installations: a First Time Installation and a Maintenance Release Installation. A First Time Installation

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

How to Build an RPM OVERVIEW UNDERSTANDING THE PROCESS OF BUILDING RPMS. Author: Chris Negus Editor: Allison Pranger 09/16/2011

How to Build an RPM OVERVIEW UNDERSTANDING THE PROCESS OF BUILDING RPMS. Author: Chris Negus Editor: Allison Pranger 09/16/2011 How to Build an RPM Author: Chris Negus Editor: Allison Pranger 09/16/2011 OVERVIEW You have created some software that you want to install on Red Hat Enterprise Linux systems. Now that it is done, the

More information

1.111.5. Maintain an effective data backup strategy. Weight 3

1.111.5. Maintain an effective data backup strategy. Weight 3 data back strategy Linux Professional Institute Certification 102 Geoffrey Robertson ge@ffrey.com Nick Urbanik nicku@nicku.org This Licensed under GPL see section 14 2005 July Outline Databases Log files

More information

Module 16: Some Other Tools in UNIX

Module 16: Some Other Tools in UNIX Module 16: Some Other Tools in UNIX We have emphasized throughout that the philosophy of Unix is to provide - (a) a large number of simple tools and (b) methods to combine these tools in flexible ways.

More information

9/3/2013. Storage Media. Storage Media

9/3/2013. Storage Media. Storage Media File Management TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Storage Media A computer file is a named collection of stored data An executable file contains the instructions

More information

Linux Distributions. What they are, how they work, which one to choose. avix@br.ibm.com> +55-11-2132-2327. Avi Alkalay <avix@br.ibm.

Linux Distributions. What they are, how they work, which one to choose. avix@br.ibm.com> +55-11-2132-2327. Avi Alkalay <avix@br.ibm. Linux Distributions What they are, how they work, which one to choose Avi Alkalay +55-11-2132-2327 Linux, Open Standards Consultant IBM Corporation Before You Start...

More information

BackupPC. Network Startup Resource Center www.nsrc.org

BackupPC. Network Startup Resource Center www.nsrc.org BackupPC Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

TECHNICAL BRIEF. Primary Storage Compression with Storage Foundation 6.0

TECHNICAL BRIEF. Primary Storage Compression with Storage Foundation 6.0 TECHNICAL BRIEF Primary Storage Compression with Storage Foundation 6.0 Technical Brief Primary Storage Compression with Storage Foundation 6.0 Contents Introduction... 4 What is Compression?... 4 Differentiators...

More information

Backing Up and Restoring FrontDesk Data Files

Backing Up and Restoring FrontDesk Data Files Chapter 35 Backing Up and Restoring FrontDesk Data Files FrontDesk v4.1.25 Member List Create a Merge File Create a Mailer File Create a CSV/Excel File Create Report Definition Files 338 343 344 345 346

More information

Zmanda: Open Source Backup

Zmanda: Open Source Backup Zmanda: Open Source Backup Chander Kant (ck@zmanda.com) CEO Zmanda, Inc. www.zmanda.com Zmanda: Open Source Backup 1 Agenda A Case for Open Source Backup Introduction to Amanda Amanda Enterprise Edition

More information

Yosemite Server Backup Installation Guide

Yosemite Server Backup Installation Guide Yosemite Server Backup Installation Guide Part number: First edition: October, 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

OpenGeo Suite for Linux Release 3.0

OpenGeo Suite for Linux Release 3.0 OpenGeo Suite for Linux Release 3.0 OpenGeo October 02, 2012 Contents 1 Installing OpenGeo Suite on Ubuntu i 1.1 Installing OpenGeo Suite Enterprise Edition............................... ii 1.2 Upgrading.................................................

More information

Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide

Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide Revision 1.0 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703)

More information

NERSP: Saving File Space and Reducing File Storage Charges

NERSP: Saving File Space and Reducing File Storage Charges NERSP: Saving File Space and Reducing UFIT EI&O Document ID: D0100 Last Updated: 07/03/2002 This document describes methods of managing and conserving file storage space on CNS's NERSP UNIX system. These

More information

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. Page 1 of 5 Table of Contents 1. Introduction...3 2. Supporting Utility...3 3. Backup...4 3.1 Offline

More information

MySQL Backups: From strategy to Implementation

MySQL Backups: From strategy to Implementation MySQL Backups: From strategy to Implementation Mike Frank Senior Product Manager 1 Program Agenda Introduction The 5 Key Steps Advanced Options References 2 Backups are a DBAs Top Priority Be Prepared

More information

File Transfer Protocol. What is Anonymous FTP? What is FTP?

File Transfer Protocol. What is Anonymous FTP? What is FTP? File Transfer Protocol (FTP) File Transfer Protocol Sometimes browsing for information is not sufficient you may want to obtain copies of software programs or data files for your own use and manipulation.

More information

Setting-Up an Open-Source Backup Software Amanda Community in About 15 Minutes

Setting-Up an Open-Source Backup Software Amanda Community in About 15 Minutes Setting-Up an Open-Source Backup Software Amanda Community in About 5 Minutes Abstract Amanda is the most popular open source backup and recovery software in the world because of its openness, robustness,

More information

Acronis Backup & Recovery 10 Server for Linux. Installation Guide

Acronis Backup & Recovery 10 Server for Linux. Installation Guide Acronis Backup & Recovery 10 Server for Linux Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management

More information

SWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities. Administrator's Guide

SWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities. Administrator's Guide SWsoft Plesk 8.2 for Linux/Unix Backup and Restore Utilities Administrator's Guide 2 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.

More information

Managing Data Protection

Managing Data Protection Managing Data Protection with Red Hat Linux and Dell PowerVault Tape Autoloaders and Libraries Protecting data from disaster is a critical concern for any enterprise. This article explores Dell PowerVault

More information

How To Backup and Restore in Infobright

How To Backup and Restore in Infobright How To Backup and Restore in Infobright The ability to quote is a serviceable substitute for wit. Somerset Maugham Susan Bantin, Infobright, 2009 07 05 Infobright, Inc. 47 Colborne Street, Suite 403 Toronto,

More information

Advantages of Amanda over Proprietary Backup

Advantages of Amanda over Proprietary Backup Advantages of Amanda over Proprietary Backup Gregory Grant Revision 02 Abstract This white paper discusses how Amanda compares to other backup products. It will help you understand some key Amanda differences,

More information

EMC NetWorker Module for Databases and Applications Release 1.0

EMC NetWorker Module for Databases and Applications Release 1.0 EMC NetWorker Module for Databases and Applications Release 1.0 Installation Guide P/N 300-009-222 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Fedora Core 4. Managing software with yum. Stuart Ellis Edited by Paul W. Frields

Fedora Core 4. Managing software with yum. Stuart Ellis Edited by Paul W. Frields Fedora Core 4 Managing software with yum Stuart Ellis Edited by Paul W. Frields Copyright 2005 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative

More information

Partek Flow Installation Guide

Partek Flow Installation Guide Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access

More information

Installing VMware Tools on Clearswift v4 Gateways

Installing VMware Tools on Clearswift v4 Gateways Technical Guide Version 2.0 January 2016 Contents 1 Introduction... 3 2 Scope... 3 3 Installation and Setup... 4 3.1 Overview... 4 3.2 Installation... 4 4 Performance Impact... 8 4.1 Overview... 8 4.2

More information

Technology Overview - BackupEDGE

Technology Overview - BackupEDGE Technology Overview - BackupEDGE Technology Overview New Features BackupEDGE 3.x We re constantly asking our clients what tools our products need to serve them better. Introduction to the New Features

More information

Managed File Transfer with Universal File Mover

Managed File Transfer with Universal File Mover Managed File Transfer with Universal File Mover Roger Lacroix roger.lacroix@capitalware.com http://www.capitalware.com Universal File Mover Overview Universal File Mover (UFM) allows the user to combine

More information

Week Overview. Running Live Linux Sending email from command line scp and sftp utilities

Week Overview. Running Live Linux Sending email from command line scp and sftp utilities ULI101 Week 06a Week Overview Running Live Linux Sending email from command line scp and sftp utilities Live Linux Most major Linux distributions offer a Live version, which allows users to run the OS

More information

NETWORK OPERATING SYSTEMS. By: Waqas Ahmed (C.E.O at Treesol)

NETWORK OPERATING SYSTEMS. By: Waqas Ahmed (C.E.O at Treesol) NETWORK OPERATING SYSTEMS By: Waqas Ahmed (C.E.O at Treesol) Locating, Finding Installing, Upgrading and Deleting Packages SEARCHING To find a program commands where they are: [root@tecmint ~]# which ls

More information

Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server 10.5. User s Guide

Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server 10.5. User s Guide Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server 10.5 User s Guide Copyright 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual

More information

Acronis Backup & Recovery 10 Server for Linux. Update 5. Installation Guide

Acronis Backup & Recovery 10 Server for Linux. Update 5. Installation Guide Acronis Backup & Recovery 10 Server for Linux Update 5 Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management

More information

What is a Package Management System?

What is a Package Management System? Package Management What is a Package Management System? A package management system (or PMS) is a collection of tools to automate the process of installing, upgrading, configuring, and removing software

More information

SWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities

SWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities SWsoft Plesk 8.3 for Linux/Unix Backup and Restore Utilities Administrator's Guide Revision 1.0 Copyright Notice ISBN: N/A SWsoft. 13755 Sunrise Valley Drive Suite 600 Herndon VA 20171 USA Phone: +1 (703)

More information

The Linux System. o Updating without touching the user's files and configurations.

The Linux System. o Updating without touching the user's files and configurations. Backups In Linux The Linux System Many Linux distros set up seperate "/home" and "/" (root) partitions. User configuration files are hidden with a "." (period) in the front of the name. Separate partitions

More information

Configure Cisco Emergency Responder Disaster Recovery System

Configure Cisco Emergency Responder Disaster Recovery System Configure Cisco Emergency Responder Disaster Recovery System Disaster Recovery System overview, page 1 Backup and restore procedures, page 2 Supported features and components, page 4 System requirements,

More information

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux.. RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and

More information

Compaq Storage Performance Monitor HOWTO

Compaq Storage Performance Monitor HOWTO Compaq Storage Performance Monitor HOWTO Chris Lorenz lorenzc@us.ibm.com 2002 07 11 Revision History Revision 1.0 2002 07 11 Revised by: CL This HOWTO provides an overview of the Compaq Storage Performance

More information

Integrating SNiFF+ with the Data Display Debugger (DDD)

Integrating SNiFF+ with the Data Display Debugger (DDD) 1.1 1 of 5 Integrating SNiFF+ with the Data Display Debugger (DDD) 1. Introduction In this paper we will describe the integration of SNiFF+ with the Data Display Debugger (DDD). First we will start with

More information

Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012

Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 Installing Virtual Coordinator (VC) in Linux Systems that use RPM (Red Hat, Fedora, CentOS) Document # 15807A1-103 Date: Aug 06, 2012 1 The person installing the VC is knowledgeable of the Linux file system

More information

BF2CC Daemon Linux Installation Guide

BF2CC Daemon Linux Installation Guide BF2CC Daemon Linux Installation Guide Battlefield 2 + BF2CC Installation Guide (Linux) 1 Table of contents 1. Introduction... 3 2. Opening ports in your firewall... 4 3. Creating a new user account...

More information

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 8 Types of Utility Programs and Operating Systems Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define system software and identify the two types of

More information

Introduction to Mac OS X

Introduction to Mac OS X Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the

More information

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Backup of ESXi Virtual Machines using Affa

Backup of ESXi Virtual Machines using Affa Backup of ESXi Virtual Machines using Affa From SME Server Skill level: Advanced The instructions on this page may require deviations from procedure, a good understanding of linux and SME is recommended.

More information

Using Depositit to Backup Microsoft Exchange Server

Using Depositit to Backup Microsoft Exchange Server Using Depositit to Backup Microsoft Exchange Server If you have subscribed to use Depositit s Microsoft Exchange Server backup facility, please make sure you have the Depositit software installed on the

More information

Image for Linux User Manual

Image for Linux User Manual Image for Linux User Manual TeraByte Unlimited Las Vegas, Nevada, USA Hhttp://www.terabyteunlimited.com Copyright 2007 TeraByte, Inc. All Rights Reserved Copyright 1996-2007 by TeraByte, Inc. All Rights

More information

How To Backup To A Hard Drive On A Computer (For A Non-Free) Or Hard Drive (For Free) On A Network (For Non Free) Or A Network On A Pc Or Mac) On Your Computer (Free) On An

How To Backup To A Hard Drive On A Computer (For A Non-Free) Or Hard Drive (For Free) On A Network (For Non Free) Or A Network On A Pc Or Mac) On Your Computer (Free) On An Table of Contents 1. Slide presentation...pp 2-19 2. Notes on selected slides...pp 20-25 3. Brief descriptions of various high level backup programs...pp 26-31 Backing Up Home Computers Considerations

More information

EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER

EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore

More information

Amanda in 15 Minutes

Amanda in 15 Minutes Amanda in 15 Minutes Abstract Amanda is the most popular open source backup and recovery software in the world because of its openness, robustness, functionality and scalability. Yet it is very easy to

More information

Server Installation/Upgrade Guide

Server Installation/Upgrade Guide Server Installation/Upgrade Guide System Version 3.8 2001-2009 Echo 360, Inc. Echo360 is a trademark of Echo360, Inc. Echo360 is a registered trademark of Echo360 Inc. in Australia. All other trademarks

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014 Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security

More information

Detailed Revision History: Advanced Internet System Management (v5.07)

Detailed Revision History: Advanced Internet System Management (v5.07) Detailed Revision History 1 Detailed Revision History: Advanced Internet System Management (v5.07) This detailed revision history document identifies the differences in Advanced Internet System Management

More information

Compliance Procedure

Compliance Procedure Old Dominion University Compliance Procedure Title: Reference Number: System Backups and Restoration (Non- Db) Procedure 3.4.2.2 Purpose The purpose of this compliance procedure is to define the methods

More information

Centralised Backup of the Talis Application Environments

Centralised Backup of the Talis Application Environments safsdfsdkjafdsajf dajf lkasdj flkasdjfadsfasdfffsdakfjsdakjfaalto Consultancy Talis Services Centralised Backup of the Talis Application Environments April 2009 About this document This document contains

More information

How? The choice of procedures of operations.

How? The choice of procedures of operations. Backup Why backup? The choice of goals. Where? The choice of medias. What? The choice of contents. When? The choice of schedules. How? The choice of procedures of operations. Backups 1-1 Backups Unattended

More information

Linux Backups. Russell Adams <rladams@adamsinfoserv.com> Linux Backups p. 1

Linux Backups. Russell Adams <rladams@adamsinfoserv.com> Linux Backups p. 1 Linux Backups Russell Adams Linux Backups p. 1 Linux Backup Discuss a variety of backup software & methods Recommendations for backup HOWTO for Rsnapshot Demonstration Linux

More information

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course

More information

How To Migrate To Redhat Enterprise Linux 4

How To Migrate To Redhat Enterprise Linux 4 Migrating to Red Hat Enterprise Linux 4: Upgrading to the latest Red Hat release By Donald Fischer Abstract Red Hat Enterprise Linux subscribers may choose to deploy any of the supported versions of the

More information

Downloading Your Backup:

Downloading Your Backup: KVS Remote Backup Service (KVSRBS) Restore Procedures (KVSRBS Clients Only) This document will outline the procedures for restoring your most recent KVSRBS backup. If you need to restore from a prior backup,

More information

In this chapter, we want to make sure that your computer (and you) is ready for the Red Hat Linux installation.

In this chapter, we want to make sure that your computer (and you) is ready for the Red Hat Linux installation. CHAPTER 1 Before You Install In this chapter, we want to make sure that your computer (and you) is ready for the Red Hat Linux installation. Systems Requirements Red Hat Linux has a number of systems requirements

More information