Packed with Practical, Freely-Available Backup and Recovery Solutions For

Total Page:16

File Type:pdf, Size:1020Kb

Packed with Practical, Freely-Available Backup and Recovery Solutions For Backup & Recovery By W. Preston ............................................... Publisher: O'Reilly Pub Date: December 01, 2006 ISBN-10: 0-596-10246-1 ISBN-13: 978-0-596-10246-3 Pages: 800 Table of Contents | Index Packed with practical, freely-available backup and recovery solutions for Unix, Linux, Windows and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul ofUnix Backup & Recovery by the same author, now revised and expanded with over 75% new material. Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA, Bacula, BackupPC, rdiff-backup, and rsnapshot. Backup & Recovery then explains how to perform bare metal recovery of AIX, HP-UX, Linux, Mac OS, Solaris, VMWare, & Windows systems using freely-available utilities. The book also provides overviews of the current state of the commercial backup software and hardware market, including overviews of CDP, Data De-duplication, D2D2T, and VTL technology. Finally, it covers how to automate the backups of DB2, Exchange, MySQL, Oracle, PostgreSQL, SQL-Server, and Sybase databases - without purchasing a commercial backup product to do so. For environments of all sizes and budgets, this unique book shows you how to ensure data protection without resorting to expensive commercial solutions. You will soon learn to: Automate the backup of popular databases without a commercial utility Perform bare metal recovery of any popular open systems platform, including your PC or laptop Utilize valuable but often unknown open source backup products Understand the state of commercial backup software, including explanations of CDP and data de-duplication software Access the current state of backup hardware, including Virtual Tape Libraries (VTLs) Backup & Recovery By W. Preston ............................................... Publisher: O'Reilly Pub Date: December 01, 2006 ISBN-10: 0-596-10246-1 ISBN-13: 978-0-596-10246-3 Pages: 800 Table of Contents | Index Copyright Preface Part 1: Introduction Chapter 1. The Philosophy of Backup Section 1.1. Champagne Backup on a Beer Budget Section 1.2. Why Should I Read This Book? Section 1.3. Why Back Up? Section 1.4. Wax On, Wax Off: Finding a Balance Chapter 2. Backing It All Up Section 2.1. Don't Skip This Chapter! Section 2.2. Deciding Why You Are Backing Up Section 2.3. Deciding What to Back Up Section 2.4. Deciding When to Back Up Section 2.5. Deciding How to Back Up Section 2.6. Storing Your Backups Section 2.7. Testing Your Backups Section 2.8. Monitoring Your Backups Section 2.9. Following Proper Development Procedures Section 2.10. Unrelated Miscellanea Section 2.11. Good Luck Part 2: Open-Source Backup Utilities Chapter 3. Basic Backup and Recovery Utilities Section 3.1. An Overview Section 3.2. Backing Up and Restoring with ntbackup Section 3.3. Using System Restore in Windows Section 3.4. Backing Up with the dump Utility Section 3.5. Restoring with the restore Utility Section 3.6. Limitations of dump and restore Section 3.7. Features to Check For Section 3.8. Backing Up and Restoring with the cpio Utility Section 3.9. Backing Up and Restoring with the tar Utility Section 3.10. Backing Up and Restoring with the dd Utility Section 3.11. Using rsync Section 3.12. Backing Up and Restoring with the ditto Utility Section 3.13. Comparing tar, cpio, and dump Section 3.14. Using ssh or rsh as a Conduit Between Systems Chapter 4. Amanda Section 4.1. Summary of Important Features Section 4.2. Configuring Amanda Section 4.3. Backing Up Clients via NFS or Samba Section 4.4. Amanda Recovery Section 4.5. Community and Support Options Section 4.6. Future Plans Chapter 5. BackupPC Section 5.1. BackupPC Features Section 5.2. How BackupPC Works Section 5.3. Installation How-To Section 5.4. Starting BackupPC Section 5.5. Per-Client Configuration Section 5.6. The BackupPC Community Section 5.7. The Future of BackupPC Chapter 6. Bacula Section 6.1. Bacula Architecture Section 6.2. Bacula Features Section 6.3. An Example Configuration Section 6.4. Advanced Features Section 6.5. Future Directions Chapter 7. Open-Source Near-CDP Section 7.1. rsync with Snapshots Section 7.2. rsnapshot Section 7.3. rdiff-backup Part 3: Commercial Backup Chapter 8. Commercial Backup Utilities Section 8.1. What to Look For Section 8.2. Full Support of Your Platforms Section 8.3. Backup of Raw Partitions Section 8.4. Backup of Very Large Filesystems and Files Section 8.5. Aggressive Requirements Section 8.6. Simultaneous Backup of Many Clients to One Drive Section 8.7. Disk-to-Disk-to-Tape Backup Section 8.8. Simultaneous Backup of One Client to Many Drives Section 8.9. Data Requiring Special Treatment Section 8.10. Storage Management Features Section 8.11. Reduction in Network Traffic Section 8.12. Support of a Standard or Custom Backup Format Section 8.13. Ease of Administration Section 8.14. Security Section 8.15. Ease of Recovery Section 8.16. Protection of the Backup Index Section 8.17. Robustness Section 8.18. Automation Section 8.19. Volume Verification Section 8.20. Cost Section 8.21. Vendor Section 8.22. Final Thoughts Chapter 9. Backup Hardware Section 9.1. Decision Factors Section 9.2. Using Backup Hardware Section 9.3. Tape Drives Section 9.4. Optical Drives Section 9.5. Automated Backup Hardware Section 9.6. Disk Targets Part 4: Bare-Metal Recovery Chapter 10. Solaris Bare-Metal Recovery Section 10.1. Using Flash Archive Section 10.2. Preparing for an Interactive Restore Section 10.3. Setup of a Noninteractive Restore Section 10.4. Final Thoughts Chapter 11. Linux and Windows Section 11.1. How It Works Section 11.2. The Steps in Theory Section 11.3. Assumptions Section 11.4. Alt-Boot Full Image Method Section 11.5. Alt-Boot Partition Image Method Section 11.6. Live Method Section 11.7. Alt-Boot Filesystem Method Section 11.8. Automate Bare-Metal Recovery with G4L Section 11.9. Commercial Solutions Chapter 12. HP-UX Bare-Metal Recovery Section 12.1. System Recovery with Ignite-UX Section 12.2. Planning for Ignite-UX Archive Storage and Recovery Section 12.3. Implementation Example Section 12.4. System Cloning Section 12.5. Security Section 12.6. System Recovery and Disk Mirroring Chapter 13. AIX Bare-Metal Recovery Section 13.1. IBM's mksysb and savevg Utilities Section 13.2. Backing Up with mksysb Section 13.3. Setting Up NIM Section 13.4. savevg Operations Section 13.5. Verifying a mksysb or savevg Backup Section 13.6. Restoring an AIX System with mksysb Section 13.7. System Cloning Chapter 14. Mac OS X Bare-Metal Recovery Section 14.1. How It Works Section 14.2. A Sample Bare-Metal Recovery Part 5: Database Backup Chapter 15. Backing Up Databases Section 15.1. Can It Be Done? Section 15.2. Confusion: The Mysteries of Database Architecture Section 15.3. The Muck Stops Here: Databases in Plain English Section 15.4. What's the Big Deal? Section 15.5. Database Structure Section 15.6. An Overview of a Page Change Section 15.7. ACID Compliance Section 15.8. What Can Happen to an RDBMS? Section 15.9. Backing Up an RDBMS Section 15.10. Restoring an RDBMS Section 15.11. Documentation and Testing Section 15.12. Unique Database Requirements Chapter 16. Oracle Backup and Recovery Section 16.1. Two Backup Methods Section 16.2. Oracle Architecture Section 16.3. Physical Backups Without rman Section 16.4. Physical Backups with rman Section 16.5. Flashback Section 16.6. Managing the Archived Redo Logs Section 16.7. Recovering Oracle Section 16.8. Logical Backups Section 16.9. A Broken Record Chapter 17. Sybase Backup and Recovery Section 17.1. Sybase Architecture Section 17.2. The Power User's View Section 17.3. The DBA's View Section 17.4. Protecting Your Database Section 17.5. Backup Automation Through Scripting Section 17.6. Physical Backups with a Storage Manager Section 17.7. Recovering Your Database Section 17.8. Common Sybase Procedures Section 17.9. Sybase Recovery Procedure Chapter 18. IBM DB2 Backup and Recovery Section 18.1. DB2 Architecture Section 18.2. The backup, restore, rollforward, and recover Commands Section 18.3. Recovering Your Database Chapter 19. SQL Server Section 19.1. Overview of SQL Server Section 19.2. The Power User's View Section 19.3. The DBA's View Section 19.4. Backups Section 19.5. Logical (Table-Level) Backups Section 19.6. Restore and Recovery Chapter 20. Exchange Section 20.1. Exchange Architecture Section 20.2. Storage Groups Section 20.3. Backup Section 20.4. Using ntbackup to Back Up Section 20.5. Restore Section 20.6. Exchange Restore Chapter 21. PostgreSQL Section 21.1. PostgreSQL Architecture Section 21.2. Backup and Recovery Section 21.3. Point-in-Time Recovery Chapter 22. MySQL Section 22.1. MySQL Architecture Section 22.2. MySQL Backup and Recovery Methodologies Part 6: Potpourri Chapter 23. VMware and Miscellanea Section 23.1. Backing Up VMware Servers Section 23.2. Volatile Filesystems Section 23.3. Demystifying dump Section 23.4. How Do I Read This Volume? Section 23.5. Gigabit Ethernet Section 23.6. Disk Recovery Companies Section 23.7. Yesterday Section 23.8. Trust Me About the Backups Chapter 24. It's All About Data Protection Section 24.1. Business Reasons for Data Protection Section 24.2. Technical Reasons for Data Protection Section 24.3. Backup and Archive Section 24.4.
Recommended publications
  • ERDA User Guide
    User Guide 22. July 2021 1 / 116 Table of Contents Introduction..........................................................................................................................................3 Requirements and Terms of Use...........................................................................................................3 How to Access UCPH ERDA...............................................................................................................3 Sign-up.............................................................................................................................................4 Login................................................................................................................................................7 Overview..........................................................................................................................................7 Home................................................................................................................................................8 Files..................................................................................................................................................9 File Sharing and Data Exchange....................................................................................................15 Share Links...............................................................................................................................15 Workgroup Shared Folders.......................................................................................................19
    [Show full text]
  • OMERO Documentation Release 5.2.5
    OMERO Documentation Release 5.2.5 The Open Microscopy Environment July 29, 2016 CONTENTS I About the OMERO Platform 2 1 Introduction 3 2 OMERO clients 4 2.1 OMERO clients overview .............................................. 4 2.2 Command Line Interface as an OMERO client ................................... 6 3 Additional resources 24 3.1 Community support ................................................. 24 3.2 What’s new for OMERO 5.2 for users ........................................ 25 3.3 OMERO version history ............................................... 25 4 Quickstart server access 42 4.1 OMERO demo server ................................................ 42 4.2 OMERO virtual appliance .............................................. 45 II System Administrator Documentation 60 5 Server Background 61 5.1 What’s new for OMERO 5.2 for sysadmins ..................................... 61 5.2 Server overview ................................................... 61 5.3 System requirements ................................................. 62 5.4 Version requirements ................................................. 64 5.5 Example production server set-ups .......................................... 76 5.6 Known limitations .................................................. 78 5.7 Groups and permissions system ........................................... 80 6 Server Installation and Maintenance 85 6.1 Server installation on UNIX (and UNIX-like platforms) .............................. 85 6.2 Server installation on Windows ..........................................
    [Show full text]
  • IT-Empfehlungen Für Den Nachhaltigen Umgang Mit Digitalen Daten in Den Altertumswissenschaften
    IT-Empfehlungen für den nachhaltigen Umgang mit digitalen Daten in den Altertumswissenschaften Herausgeber: IANUS Version 1.0.0.0 29. März 2017 Koordination Förderung Herausgeber IANUS Autoren: siehe Autorenverzeichnis Titel: IT-Empfehlungen für den nachhaltigen Umgang mit digitalen Daten in den Altertumswissenschaften Sprache: Deutsch doi:10.13149/000.y47clt-t Zitierhinweis: IANUS (Hrsg.), IT-Empfehlungen für den nachhaltigen Umgang mit digi- talen Daten in den Altertumswissenschaften (2017) [Version 1.0.0.0] doi: http://dx.doi.org/10.13149/000.y47clt-t Kontakt: [email protected] www.ianus-fdz.de Lizenz: cba BYSA Dieses Werk bzw. Inhalt ist lizenziert unter einer Creative Commons Namensnennung – Weitergabe unter gleichen Bedingungen 4.0 International Lizenz. http://creativecommons.org/licenses/by-sa/4.0/ Versionshistorie Version Autor Datum Beschreibung 0.9 IANUS 18.02.2014 Erste veröffentlichte Fassung. 0.9 IANUS 11.03.2014 Änderung der Lizenzbedingungen. 0.95 IANUS 05.02.2015 Kapitel „3D und Virtual Reality“ und „Textdokumente“ neu. Anpassungen im Layout und kleinere Korrekturen. 0.96 IANUS 27.05.2015 Kapitel „Datenmanagement“ neu, Ergänzung Versionskontrolle und Korrekturen. Fortsetzung auf der nächsten Seite Fortsetzung der vorhergehenden Seite Version Autor Datum Beschreibung 0.97 IANUS 09.12.2015 Kapitel „Tabellen“ neu, Ergänzungen im Glossar und Korrekturen. 0.97.5 IANUS 21.07.2016 Kapitel „Video“, „Audio“ und „RTI“ neu, Ergänzungen im Glossar, Anpassungen im Kapitel „Archivierung bei IANUS“ und Korrekturen. 0.97.5 IANUS 13.09.2016 Einarbeitung Reviews für „Video“, „Audio“ und „RTI“, Ergänzungen im Glossar und Korrekturen. 0.98 IANUS 22.11.2016 Überarbeitung „Datenmanagement“ und „3D und Virtual Reality“, Ergänzung Bild in „RTI“.
    [Show full text]
  • Unix Backup and Recovery
    Page iii Unix Backup and Recovery W. Curtis Preston Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Page iv Disclaimer: This netLibrary eBook does not include data from the CD-ROM that was part of the original hard copy book. Unix Backup and Recovery by W. Curtis Preston Copyright (c) 1999 O'Reilly & Associates, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472. Editor: Gigi Estabrook Production Editor: Clairemarie Fisher O'Leary Printing History: November 1999: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the image of an Indian gavial and the topic of Unix backup and recovery is a trademark of O'Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. This book is printed on acid-free paper with 85% recycled content, 15% post-consumer waste. O'Reilly & Associates is committed to using paper with the highest recycled content available consistent with high quality. ISBN: 1-56592-642-0 Page v This book is dedicated to my lovely wife Celynn, my beautiful daughters Nina and Marissa, and to God, for continuing to bless my life with gifts such as these.
    [Show full text]
  • OES 11 SP1: Upgrading to OES—Best Practices Guide About This Guide
    www.novell.com/documentation Upgrading to OES—Best Practices Guide Open Enterprise Server 11 SP1 August 28, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on exporting Novell software.
    [Show full text]
  • Antivirus Software
    Backup software Backup software is software which is designed to automate the process of backing up, making it easier and ensuring that people back up their files routinely. Several companies produce free backup software with basic functionality, and it is also possible to purchase backup suites which have an array of settings and options which can be used to customize the backup process. For people who have trouble remembering to back up, or people who deal with important material, backup software can be extremely useful. List of backup software AMANDA 1. Areca Backup 2. BackupPC 3. Bacula 4. Create Synchronicity AMANDA(Advanced Maryland Automatic Network Disk Archiver) Maryland Automatic Network Disk Archiver is an open source computer archiving tool that is able to back up data residing on multiple computers on a network. It uses a client–server model and includes: • the backup server and client itself • a tape server • an index server All three servers do not necessarily need to run on the same machine. Amanda was initially developed at the University of Maryland and is released under a BSD-style license. Amanda is available both as a free community edition and fully supported enterprise edition. Amanda runs on almost any Unix or Linux-based systems. Amanda supports Windows systems using Samba or Cygwin. A native Win32 client (with support for open files) is also now available. Amanda supports both tape-based and disk-based backup, and provides some useful functionality not available in other backup products. Amanda supports tape-spanning - i.e. if a backup set does not fit in one tape, it will be split into multiple tapes.
    [Show full text]
  • Best Recommended Backup Strategy
    Best Recommended Backup Strategy Flagellatory and coronal Claus always Americanized disreputably and perseveres his reintegration. Attemptable Kristopher tweaks erst. Rootless Algernon epigrammatize, his role titivating conform scurrilously. You need something to recover your data to. The ability to restore databases from valid backups is a vital part of ensuring business continuity. What Is Incremental Backup? Nasim thank you so much for your reply I will look into all suggestions. Can the solution connect in to your SAN fabric allowing faster backups? This is especially critical if a disaster has happened. Is there ever a time that one would be requested to restore a backup greater than two days back? Cybersecurity is not something to be taken lightly by businesses. The data may come with a new application. And then make a backup of your backup. The most cautious companies use multiple backup sources. Merely moving your important files to a hard drive or a flash drive does not constitute making a backup. This would likely be most important for offsite storage where the data is not under your direct control. Macrium Reflect Rescue CD that contains a boot loader and user interface allowing you to locate and restore your images. However, I would simply install a new SSD. Do regular fire drill rebuilds and restores. Enables nearly instant, I have to also update Lightroom with the new path to the hard drive. Daisy corporate services, and retained for visual inspection will make room for replacing how you demonstrate compliance with games and recommended best backup strategy depends on failures. One of traditional ways to do that is to store copies of your data on tape devices and physically ship the tapes to a remote location.
    [Show full text]
  • RDX Quikstation 4 User Guide
    RDX® QuikStation® 4 Part Number 1021829 Rev. A May 2015 COPYRIGHT © 2015 by Tandberg Data. All rights reserved. This item and the information contained herein are the property of Tandberg Data. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without the express written permission of Tandberg Data. DISCLAIMER Tandberg Data makes no representation or warranties with respect to the contents of this document and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Further, Tandberg Data reserves the right to revise this publication without obligation of Tandberg Data to notify any person or organization of such revision or changes. TRADEMARK Tandberg Data StorageLibrary, StorageLoader, SecureService, DPS1000 Series, DPS 2000, NOTICES VXA, SLR, RDX QuikStor, RDX QuikStation, AccuVault, and AccuGuard are trademarks of Tandberg Data. RDX is a registered trademark of Tandberg Data S.a.r.l. All other product names are trademarks or registered trademarks of their respective owners. PART NUMBER 1021829 Revision A REVISION HISTORY Revision Date Description A May 2015 Initial release Note: The most current information about this product is available at Tandberg Data’s web site (www.tandbergdata.com). PRODUCT MANUAL 1021829 II PRODUCT The RDX QuikStation 4 by Tandberg Data is warranted to be free from defects in materials, WARRANTY parts, and workmanship and will conform to the current product specification upon delivery. For CAUTION the specific details of your warranty, refer to your sales contract or see the Tandberg Data web site (www.tandbergdata.com).
    [Show full text]
  • And Linux Tools for Backup O P S E R
    e s u y n a r o f e l b i s n o p s e r d l e h e b t o n n a c n o i s s i m m o C e h t d n a , r o h t u a e h t f o y l n o s w e i v e h t s t c e HOGSKOLAN ISKOVDE(HIS) Content createdby: see theIMSdeployedinourMoodle platform. the sources in ELP format (ExeLearning) or enjoy this cisoss.eu content. to Visit download Remember: This is not the best format to l f e r n o i t a c i l b u p . ) s / i 0 h . T 4 / . a n s o - i y s s b i / s m e s PILOT VERSION PILOT m n o e c C i l / n a g r e o p . o s r n u o E m e m h t o c m e o v r i t f a t e r r o c p / / p : s u s p t t h t h i ( w ” l d a e n d o . i n t n u i a f e n r r n e e e t h e t n b I d s e 0 a . n i h 4 a ) t e 8 n k i 5 o l 8 c A 5 n e 1 r o 0 i a - t h a 2 S 0 - m 2 r n o o A f i t n K i u - b 1 e i 0 r h t t S t f E A o - s 1 e - n d 5 o a 1 m 0 m 2 m e ( o b t c C y e a e j v o m i r t p h a c e s i i r h h C T w “ e s u y n a r o f e l b i s n o Backup systems p s e r d l Backup systems e h e b t Content created by: o n n a c HOGSKOLAN I SKOVDE (HIS) n o i s s i m 1.
    [Show full text]
  • RDX Quikstation 4 & 8 Product Manual
    ® Product Manual For RDX QuikStation® 4 and RDX QuikStation 8 Appliances RDX® SATA III Part Number: 1021806 Rev. A, November 2016 November 2019 10400880 RDX QuikStation 4 and 8 Product Manual ©2019 Overland-Tandberg. All rights reserved. Overland®, Overland Storage®, DynamicRAID®, NEO®, NEO Series®, PowerLoader®, RAINcloud®, RapidRebuild®, REO 4000®, REO Series®, VR2®, and XchangeNOW® are registered trademarks of Overland Storage, Inc. Tandberg®, Tandberg Data®, AccuGuard®, AccuVault®, BizNAS®, QuadPak®, QuikStation®, QuikStor®, RDX®, RDXPRESS®, RDXPRO®, StorageLoader®, SupportSuite®, Tandberg SecureService®, and Tandberg StorageLibrary® are registered trademarks of Tandberg Data Holdings S.A.R.L. Overland-Tandberg™ is a trademark of Overland Storage, Inc. All other brand names or trademarks are the property of their respective owners. The names of companies and individuals used in examples are fictitious and intended to illustrate the use of the software. Any resemblance to actual companies or individuals, whether past or present, is coincidental. PROPRIETARY NOTICE All information contained in or disclosed by this document is considered proprietary by Overland-Tandberg. By accepting this material the recipient agrees that this material and the information contained therein are held in confidence and in trust and will not be used, reproduced in whole or in part, nor its contents revealed to others, except to meet the purpose for which it was delivered. It is understood that no right is conveyed to reproduce or have reproduced any item herein disclosed without express permission from Overland-Tandberg. Overland-Tandberg provides this manual as is, without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose.
    [Show full text]
  • Akeeba Backup User's Guide
    Akeeba Backup User's Guide Nicholas K. Dionysopoulos Akeeba Backup User's Guide by Nicholas K. Dionysopoulos Copyright © 2006-2021 Akeeba Ltd Abstract This book covers the use of the Akeeba Backup site backup component for Joomla!™ -powered web sites. It does not cover any other software of the Akeeba Backup suite, including Kickstart and the other utilities which have documentation of their own. Both the free Akeeba Backup Core and the subscription-based Akeeba Backup Professional editions are covered. If you are looking for a quick start to using the component please watch our video tutorials [https:// www.akeeba.com/videos]. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the appendix entitled "The GNU Free Documentation License". Table of Contents I. User's Guide to Akeeba Backup for Joomla!™ ................................................................................ 1 1. Introduction ...................................................................................................................... 6 1. Introducing Akeeba Backup ........................................................................................ 6 2. What can I use Akeeba Backup for? ............................................................................. 6 3. A typical backup/restoration
    [Show full text]
  • NSS File System Administration Guide for Linux Is Available on the OES Documentation Website
    Open Enterprise Server 2015 SP1 Novell Storage ServicesTM File System Administration Guide for Linux June 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. Copyright © 2016 Novell, Inc., a Micro Focus company. All Rights Reserved. Contents About This Guide 19 1 Overview of NSS 23 1.1 Introduction to NSS . 23 1.2 Benefits of NSS . 23 1.3 Understanding NSS . 24 1.3.1 Storage Pools . 24 1.3.2 NSS Volumes. 25 1.4 NSS Features and Capabilities . 25 1.4.1 Use Less Memory and Gain More Speed . 26 1.4.2 Improve Storage Availability. 26 1.4.3 Prevent Unauthorized Access . 26 1.4.4 Protect Data from Corruption or Loss . 27 1.4.5 Maximize Available Space . 27 1.4.6 Delayed Block Allocation . 28 1.5 Comparison of NSS to Other File Systems . 28 1.6 What’s Next . 28 2 What’s New or Changed in NSS 31 2.1 What’s New or Changed in NSS (OES 2015 SP1-Update 32-Patch) . 31 2.2 What’s New or Changed in NSS (OES 2015 SP1-Update 30-Patch) . 31 2.3 What’s New or Changed in NSS (OES 2015 SP1-Update 26-Patch) . 31 2.4 What’s New or Changed in NSS (May 2017 Patch). 31 2.5 What’s New or Changed in NSS (September 2016 Patch) . 32 2.6 What’s New or Changed in NSS (OES 2015 SP1) .
    [Show full text]