Automated Offsite Backup with rdiff-backup
|
|
|
- Juniper Harvey
- 9 years ago
- Views:
Transcription
1 Automated Offsite Backup with rdiff-backup Michael Greb Contents 1 Overview Conventions Used Setting up SSH Generating SSH Keys Setting up Key Based Authentication on the Remote System Setting Custom SSH Options Testing the SSH Setup Setting up rdiff-backup Creating the Location for Storing Backups Specifying Files to Exclude from Backup Automating it with Cron 5 5 Testing It 6 6 Conclusion 6 1
2 1 Overview rdiff-backup provides a simple easy means for providing remote backups. This is intended to be a simple, easy to follow set of instructions for implementing off site backups. There are some great advantage to using rdiff-backup for this, here are some of my favorite: Files are stored on the remote site as normal files, not in some proprietary format making looking for something easy using standard *nix tools such as find, grep and locate. A full history of previous revisions is kept so you can restore a copy of that file you accidently changed from several days ago, before the change was made. Rsync s algorithms are used so only the changes from the previous day are transfered, not a full image. Previous revisions of files are stored as differences from current version saving space where backups are stored. Can use ssh for transferring files making the transmissions secure from packet sniffing. Can use RSA or DSA public key cryptography for authenticating to the remote host so automated backups are still secure without a clear text password in a config file. If you have any corrections or suggestions for this document, either technical or regarding readability, please do drop me a line at [email protected] so your suggestions can help other people. 1.1 Conventions Used In this document program output will look like typed on a typewriter. Anything typed by the user will be shown in bold. For host-names, source will be used for the server being backed up and destination for the host storing the backups. This document assumes you already have rdiff-backup installed, if you need help with this, feel free to me at the address above with any questions you may have. If there is enough demand, I will add instructions for getting it installed on the most popular distributions. 2 Setting up SSH This step gets ssh setup for secure unattended, password-less use. Public and private RSA keys will be generated. The private key is stored on the machine you are backing up too while the public key gets sent to your server you are backing up. These keys are used to authenticate a connection without passwords in a secure manner. Then we setup the remote end to authenticate against this key and allow only rdiff-backup to run. 2.1 Generating SSH Keys Use the ssh-keygen program to generate a password-less RSA key pair by executing the following command. In this example /root is root s home directory. Adjust accordingly for your system. 2
3 destination# ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/root/.ssh/id rsa): /root/.ssh/id rsa backup Enter passphrase (empty for no passphrase): <ENTER> Enter same passphrase again: <ENTER> Your identification has been saved in /root/.ssh/id rsa backup. Your public key has been saved in /root/.ssh/id rsa backup.pub. The key fingerprint is: aa:63:1a:f8:0f:44:78:e9:d2:e1:25:40:51:2f:59:29 SSH will complain if it doesn t have se- Set this new private key as readable only by root for security. cure file permissions. destination# chmod go-r /root/.ssh/id rsa backup 2.2 Setting up Key Based Authentication on the Remote System Now we must transfer the public key to the source system. destination# scp /root/.ssh/id rsa backup.pub source:/root/.ssh/id rsa backup.pub root@source s password: <enter root password> id rsa backup.pub 100% KB/s 00:00 Now setup the entry on the source system, on the source system open id rsa backup.pub in your favorite text editor. This should be one really long line and you want to add the following to the beginning of it. Note that this line has been significantly shortened here. command= rdiff-backup server ssh-rsa AAAAB3Nz[...]iNM= root@destination The command= option restricts connections using this key to only being able to run rdiff-backup --server improving security of the authentication mechanism. Add this new line to authorized keys2. If there is no /root/.ssh/authorized keys2 already then execute the following command: source# mv /root/.ssh/id rsa backup.pub /root/.ssh/authorized keys2 If this file already exists, use these commands instead to add your new line to it: source# cat /root/.ssh/id rsa backup.pub >> /root/.ssh/authorized keys2 source# rm /root/.ssh/id rsa backup.pub Finally, set the permissions on this file to only readable by root: source# chmod go-r /root/.ssh/authorized keys2 3
4 2.3 Setting Custom SSH Options Now we need to tell ssh to use our new private key and a few other settings, this will lessen the CPU load on both ends. Open in your favorite editor, creating if it doesn t already exist, the file /root/.ssh/config on the destination system. You want to add the following section to this file. host source-backup hostname source identityfile /root/.ssh/id rsa backup compression yes cipher blowfish protocol 2 This causes ssh to use these settings when you ask it to connect to source-backup. The hostname specifies the real host to connect to. identityfile specifies the name of the private key to use when connecting. cipher is used to tell ssh we wish to use the blowfish cypher which has lower CPU overhead then the default. 2.4 Testing the SSH Setup rdiff-backup has a handy test mode to test connectivity. destination# rdiff-backup test-server source-backup::/ignored Testing server started by: ssh -C source-backup rdiff-backup --server Server OK If your output doesn t match hopefully you will receive an error that make sense. The most important thing here is that ssh shouldn t ask you for your password. If it doesn t work out, check you filenames and permissions. If your still at a loss, feel free to send some output my way and we ll see if we can get it knocked out. 3 Setting up rdiff-backup In this section we will setup a location for storing the backups, create an rdiff-backup configuration file, and set things up for automatic backup via a system cronjob. 3.1 Creating the Location for Storing Backups You need to decide on a location to store the backups on destination. I store my backups in /backups/<hostname>. Once you decide where you want to put your backups. Create the path. For example, to create the location I use you would type: destination# mkdir -p /backups/source 4
5 3.2 Specifying Files to Exclude from Backup We need to specify the files to include and exclude when backing up with rdiff-backup. This can be done on the command line when it is run, but for an automated system it is much easier to create a file with this information. I use /etc/backup-source.conf but you may use something else if you prefer. It is important to note that this file is located on destination, not on source as you might expect. - /dev - /proc - /tmp - /var/tmp - /usr/portage - /home/michael/dl In this file a - at the start of a line excludes paths matching the contents of the line. To include a path, you just place the path on the line with no preceding symbols. My example is for a Gentoo system, though the only Gentoo specific item is /usr/portage. /home/michael/dl is the location I download, extract and compile software and is easily replaceable, hence it s exclusion. The remainder of the entries you will most likely want to keep. The way we are setting stuff up, the root dir will be included, causing everything to be backed up except for the items listed in this file. 4 Automating it with Cron Finally, we setup rdiff-backup to run daily from cron. You will need to locate the directory holding scripts for system cronjobs that run daily. In most cases this is /etc/cron.daily. In this directory you need to create a new shell script that looks like this: #!/bin/sh export HOME=/root rdiff-backup --print-statistics \ --include-globbing-filelist /etc/backup-source.conf \ source-backup::/ /backup/source You may choose what ever name you desire for this script. I use rdiff-backup.sh. This script will run rdiff-backup using the config file you created earlier. The --print-statistics option is not required, it produces output that looks like this: 5
6 [ Session statistics ] StartTime (Mon Oct 20 00:00: ) EndTime (Mon Oct 20 00:12: ) ElapsedTime (12 minutes seconds) SourceFiles SourceFileSize (409 MB) MirrorFiles MirrorFileSize (395 MB) NewFiles 1226 NewFileSize (14.4 MB) DeletedFiles 2 DeletedFileSize 3501 (3.42 KB) ChangedFiles 119 ChangedSourceSize (1.67 MB) ChangedMirrorSize (1.61 MB) IncrementFiles 1349 IncrementFileSize (115 KB) TotalDestinationSizeChange (14.5 MB) Testing It Lastly you may want to run it for the first time right now. The first run will be the longest as it will need to transfer everything that needs to be backed up. A great way to do this and test out your script at the same time is by running it: destination# /etc/cron.daily/rdiff-backup.sh 6 Conclusion You should be now on your way to a happily backed up system. If you see any errors in this document, or think things could be clarified some where, please let me know! 6
Step One: Installing Rsnapshot and Configuring SSH Keys
Source: https://www.digitalocean.com/community/articles/how-to-installrsnapshot-on-ubuntu-12-04 What the Red Means The lines that the user needs to enter or customize will be in red in this tutorial! The
CloudVPS Backup Manual. CloudVPS Backup Manual
1 Index Cover Index Preface Software requirements Installation of the backupscript (easy) Installation of the backupscript (advanced) Configuration editor Uninstall the backupscript Show quota usage Quota
Backup with rdiff-backup and rsnapshot
Backup with rdiff-backup and rsnapshot Christoph Mitasch & Thomas Niedermeier, Thomas-Krenn.AG @Cmitasch, @tktniedermeier Open Source Backup Conference 2015 September 29th-30th 2015, Cologne, Germany Status
Rsync: The Best Backup System Ever
LinuxFocus article number 326 http://linuxfocus.org Rsync: The Best Backup System Ever by Brian Hone About the author: Brian Hone is a system administrator and software developer at
WinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
Configuring SSH and Telnet
This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About
Back Up Linux And Windows Systems With BackupPC
By Falko Timme Published: 2007-01-25 14:33 Version 1.0 Author: Falko Timme Last edited 01/19/2007 This tutorial shows how you can back up Linux and Windows systems with BackupPC.
Defeating Firewalls : Sneaking Into Office Computers From Home
1 of 6 Defeating Firewalls : Sneaking Into Office Computers From Home Manu Garg Overview Yes, it's possible. Let me first give you an overview of the setup. You work with a company
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
TS-800. Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.
TS-800 Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.4 dsas Table of Contents Overview... 1 Configuring OpenSSH Software
Backing Up Your System With rsnapshot
Roberto C. Sánchez Dayton Linux Users Group InstallFest Saturday, March 1, 2014 Overview About the Presenter About and Alternatives Installing Options in Configuring Other Operating Systems (e.g., Windows,
Ciphermail Gateway Separate Front-end and Back-end Configuration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction
Rsync Internet Backup Whitepaper
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Important notice about terminology... 3 Rsync: An overview... 3 Performance... 4 Summary...
File Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
Git - Working with Remote Repositories
Git - Working with Remote Repositories Handout New Concepts Working with remote Git repositories including setting up remote repositories, cloning remote repositories, and keeping local repositories in-sync
HADOOP - MULTI NODE CLUSTER
HADOOP - MULTI NODE CLUSTER http://www.tutorialspoint.com/hadoop/hadoop_multi_node_cluster.htm Copyright tutorialspoint.com This chapter explains the setup of the Hadoop Multi-Node cluster on a distributed
Secure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE
Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,
How to backup a remote MySQL server with ZRM over the Internet
How to backup a remote MySQL server with ZRM over the Internet White paper "As MySQL gains widespread adoption and moves more broadly into the enterprise, ZRM for MySQL addresses the growing need among
Installing Hadoop. You need a *nix system (Linux, Mac OS X, ) with a working installation of Java 1.7, either OpenJDK or the Oracle JDK. See, e.g.
Big Data Computing Instructor: Prof. Irene Finocchi Master's Degree in Computer Science Academic Year 2013-2014, spring semester Installing Hadoop Emanuele Fusco ([email protected]) Prerequisites You
How to Push CDR Files from Asterisk to SDReporter. September 27, 2013
How to Push CDR Files from Asterisk to SDReporter September 27, 2013 Table of Contents Revision History... 3 1 Introduction... 4 2 Build Asterisk... 4 3 Configure Asterisk... 4 3.1 Load CDR Modules...
Know your tools SSH. Dariusz Puchalak Dariusz_Puchalak < at > ProbosIT.pl
Know your tools SSH Dariusz Puchalak Dariusz_Puchalak < at > ProbosIT.pl History SSH: Secure Shell Created by Tatu Ylonen (1995) Secure loggin into remote computer Authentication, encryption, integrity
HADOOP CLUSTER SETUP GUIDE:
HADOOP CLUSTER SETUP GUIDE: Passwordless SSH Sessions: Before we start our installation, we have to ensure that passwordless SSH Login is possible to any of the Linux machines of CS120. In order to do
Single Node Hadoop Cluster Setup
Single Node Hadoop Cluster Setup This document describes how to create Hadoop Single Node cluster in just 30 Minutes on Amazon EC2 cloud. You will learn following topics. Click Here to watch these steps
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
OpenSSH: Secure Shell
OpenSSH: Secure Shell Remote console access Campus-Booster ID : **XXXXX www.supinfo.com Copyright SUPINFO. All rights reserved OpenSSH: Secure Shell Your trainer Presenter s Name Title: **Enter title or
Chapter 1. Backup service
The current backup policy is a two-step process. First, all hosts run a daily and/or weekly shell script in cron that creates one (or more) compressed tar files with the relevant content to be stored as
File Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
SSH with private/public key authentication
SSH with private/public key authentication In this exercise we ll show how you can eliminate passwords by using ssh key authentication. Choose the version of the exercises depending on what OS you are
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Backing up the Embedded Oracle database of a Red Hat Network Satellite
Backing up the Embedded Oracle database of a Red Hat Network Satellite By Melissa Goldin and Vladimir Zlatkin Abstract This document will help you create a backup of the Oracle database of a Red Hat Network
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
Implementing Microsoft SQL Server 2008 Exercise Guide. Database by Design
Implementing Microsoft SQL Server 2008 Exercise Guide Database by Design Installation Lab: This lab deals with installing the SQL Server 2008 database. The requirements are to have either a Windows 7 machine
Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary
Technical Bulletin Application Note April 2013 Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2 Summary This application note describes how to install the
SSH! Keep it secret. Keep it safe
SSH! Keep it secret. Keep it safe Using Secure Shell to Help Manage Multiple Servers Don Prezioso Ashland University Why use SSH? Proliferation of servers Physical servers now Virtual / Hosted System management
CS380 Final Project Evaluating the Scalability of Hadoop in a Real and Virtual Environment
CS380 Final Project Evaluating the Scalability of Hadoop in a Real and Virtual Environment James Devine December 15, 2008 Abstract Mapreduce has been a very successful computational technique that has
A SHORT INTRODUCTION TO DUPLICITY WITH CLOUD OBJECT STORAGE. Version 1.12 2014-07-01
A SHORT INTRODUCTION TO DUPLICITY WITH CLOUD OBJECT STORAGE Version 1.12 2014-07-01 PAGE _ 2 TABLE OF CONTENTS 1. Introduction....Page 03 2. System Configuration....Page 04 3. Create Backup Script....Page
Cryptography: RSA and Factoring; Digital Signatures; Ssh
Cryptography: RSA and Factoring; Digital Signatures; Ssh Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin The Hardness of Breaking RSA
File transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
Rsync Internet Backup Whitepaper
WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Important notice about terminology... 3 Rsync: An overview... 3 Performance... 4 Summary...
How To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint
StoreGrid Linux Server Installation Guide Before installing StoreGrid as Backup Server (or) Replication Server in your machine, you should install MySQL Server in your machine (or) in any other dedicated
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
SSH. Introduction. SSH Private Key
SSH 1. Introduction 2. SSH Private Key 2.1. How can I download my private SSH key 2.2. How can I get my private SSH key in PPK format? 3. How to connect to my server 4. How can I access my server as the
Best Practices. AIX Operating System Level Backup and Recovery for an IBM Smart Analytics System
IBM Smart Analytics System Best Practices AIX Operating System Level Backup and Recovery for an IBM Smart Analytics System Garrett Fitzsimons IBM Smart Analytics Systems Best Practices Richard Lubell IBM
Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE
Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address
TELE 301 Network Management. Lecture 16: Remote Terminal Services
TELE 301 Network Management Lecture 16: Remote Terminal Services Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus Remote Terminal Services
Nessus Training Session 2 - Scanning and Reporting
Nessus Training Session 2 - Scanning and Reporting Prepared by Ramsey Dow for NWACC Contents Configuring Ubuntu for Authenticated Scanning Configuring Windows for Authenticated Scanning
HIPAA Compliance Use Case
Overview HIPAA Compliance helps ensure that all medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy. Current Situation
Configuring an OpenNMS Stand-by Server
WHITE PAPER Conguring an OpenNMS Stand-by Server Version 1.2 The OpenNMS Group, Inc. 220 Chatham Business Drive Pittsboro, NC 27312 T +1 (919) 533-0160 F +1 (503) 961-7746 [email protected] URL: http://blogs.opennms.org/david
STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE
STEP 4 : GETTING LIGHTTPD TO WORK ON YOUR SEAGATE GOFLEX SATELLITE Note : Command Lines are in red. Congratulations on following all 3 steps. This is the final step you need to do to get rid of the old
Decision Support System to MODEM communications
Decision Support System to MODEM communications Guy Van Sanden [email protected] Decision Support System to MODEM communications by Guy Van Sanden This document describes how to set up the dss2modem communications
This appendix describes the following procedures: Cisco ANA Registry Backup and Restore Oracle Database Backup and Restore
APPENDIXA This appendix describes the following procedures: Cisco ANA Registry Oracle Database Cisco ANA Registry This section describes the Cisco ANA Registry backup and restore procedure. Overview Provides
CycleServer Grid Engine Support Install Guide. version 1.25
CycleServer Grid Engine Support Install Guide version 1.25 Contents CycleServer Grid Engine Guide 1 Administration 1 Requirements 1 Installation 1 Monitoring Additional OGS/SGE/etc Clusters 3 Monitoring
1.0. User Manual For HPC Cluster at GIKI. Volume. Ghulam Ishaq Khan Institute of Engineering Sciences & Technology
Volume 1.0 FACULTY OF CUMPUTER SCIENCE & ENGINEERING Ghulam Ishaq Khan Institute of Engineering Sciences & Technology User Manual For HPC Cluster at GIKI Designed and prepared by Faculty of Computer Science
Tera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
Parallels Cloud Server 6.0
Parallels Cloud Server 6.0 Parallels Cloud Storage I/O Benchmarking Guide September 05, 2014 Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings
HSearch Installation
To configure HSearch you need to install Hadoop, Hbase, Zookeeper, HSearch and Tomcat. 1. Add the machines ip address in the /etc/hosts to access all the servers using name as shown below. 2. Allow all
NAS 259 Protecting Your Data with Remote Sync (Rsync)
NAS 259 Protecting Your Data with Remote Sync (Rsync) Create and execute an Rsync backup job A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Having
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
CEFNS Web Hosting a Guide for CS212
CEFNS Web Hosting a Guide for CS212 INTRODUCTION: TOOLS: In CS212, you will be learning the basics of web development. Therefore, you want to keep your tools to a minimum so that you understand how things
How to upload large files to a JTAC Case
How to upload large files to a JTAC Case Summary: JTAC often requires data to be collected (such as configuration files, tracedump data, log files, etc) and sent in for review. If the files are larger
When Bad Things Happen to Good Amanda Backup Servers
When Bad Things Happen to Good Amanda Backup Servers By Lois Garcia, Dmitri Joukovski and Pavel Pragin White Paper "Even if your backup system makes volumes that can be read by native backup utilities,
How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
SSH, SCP, SFTP, Denyhosts. Süha TUNA Res. Assist.
SSH, SCP, SFTP, Denyhosts Süha TUNA Res. Assist. Outline 1. What is Secure Shell? 2. ssh (Install and Configuration) 3. scp 4. sftp 5. X11 Forwarding 6. Generating Key Pairs 7. Disabling root Access 8.
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER
Training course 2007 BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Nicolas FUNKE PS2 ID : 45722 This document represents my internships technical report. I worked for the Biarritz's Town Hall during
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com [email protected] August 2015 Copyright 2015 1&1
Access Instructions for United Stationers ECDB (ecommerce Database) 2.0
Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Using sftp in Informatica PowerCenter
Using sftp in Informatica PowerCenter Applies to: Informatica PowerCenter Summary This article briefs about how to push/pull files using SFTP program in Informatica PowerCenter. Author Bio Author(s): Sukumar
JBackpack Manual. Version 0.9.3. Abstract
JBackpack Manual JBackpack Manual Version 0.9.3 Abstract JBackpack is a personal backup program. It features incremental backups, network transparency and encryption. Table of Contents 1. Overview... 1
How To Backup A Database On A Microsoft Powerpoint 3.5 (Mysqldump) On A Pcode (Mysql) On Your Pcode 3.3.5 On A Macbook Or Macbook (Powerpoint) On
Backing Up and Restoring Your MySQL Database (2004-06-15) - Contributed by Vinu Thomas Do you need to change your web host or switch your database server? This is probably the only time when you really
Encrypted File Transfer - Customer Testing
Encrypted File Transfer - Customer Testing V1.0 David Wickens McKesson CLASSIFICATION McKesson Technical Guidance Documentation: NOT PROTECTIVELY MARKED VERSION 1.0 SCOPE This guidance document is aimed
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
How to Backup XenServer VM with VirtualIQ
How to Backup XenServer VM with VirtualIQ 1. Using Live Backup of VM option: Live Backup: This option can be used, if user does not want to power off the VM during the backup operation. This approach takes
Junio 2015. SSL WebLogic Oracle. Guía de Instalación. Junio, 2015. SSL WebLogic Oracle Guía de Instalación CONFIDENCIAL Página 1 de 19
SSL WebLogic Oracle Guía de Instalación Junio, 2015 Página 1 de 19 Setting Up SSL on Oracle WebLogic Server This section describes how to configure SSL on Oracle WebLogic Server for PeopleTools 8.50. 1.
Setting-Up an Open-Source Backup Software Amanda Community in About 15 Minutes
Setting-Up an Open-Source Backup Software Amanda Community in About 5 Minutes Abstract Amanda is the most popular open source backup and recovery software in the world because of its openness, robustness,
4PSA Total Backup 3.0.0. User's Guide. for Plesk 10.0.0 and newer versions
4PSA Total Backup 3.0.0 for Plesk 10.0.0 and newer versions User's Guide For more information about 4PSA Total Backup, check: http://www.4psa.com Copyright 2009-2011 4PSA. User's Guide Manual Version 84359.5
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
McAfee GTI Proxy 1.0.0 Administration Guide
McAfee GTI Proxy 1.0.0 Administration Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
Setting up Radmind For an OSX Public Lab
Setting up Radmind For an OSX Public Lab Radmind consists of a set of about ten Unix Commands installed on both the client and server machines. A GUI application, called Radmind Assistant, provides a simplified
Georgia State Longitudinal Data System
Georgia State Longitudinal Data System FTP Client Installation Manual Version 3.0 Table of Contents 1 Overview... 3 2 FTP Connection Checklist... 3 3 FTP Installation Instructions... 4 4 Apply license
DigiVault Online Backup Manager. Microsoft SQL Server Backup/Restore Guide
DigiVault Online Backup Manager Microsoft SQL Server Backup/Restore Guide Version 4.6.1.4 October 2005 DigiVault Backup Manager User Guide 2 Table of Contents 1 Backup/Restore Microsoft SQL Server 7.0
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St Buffalo, NY 14203 Phone: 716-881-8959
