Regular backups are one of the most important factors of IT security. With Linux systems – which are often the backbone of a webserver – you can very efficiently create backup copies with the program tar. What can the archiving program do? We explain to you how tar functions and what its special features are. So that you’re able to create regular backups with tar in the future, we explain step by [...]
For many, the cloud is a place where private documents, music, pictures, or videos can be stored and exchanged online. But understanding the different technological aspects of these services proves to be a cloudy venture for many. For example did you know that in addition to many other things, online stores and websites can also be hosted in the cloud?
Backing up your data is a popular option for securing your database. In order to create backup copies, you need additional hardware and to install a suitable backup structure. How do you secure your own network and web server against attacks and proceed to protect your databases?
A server backup is the best method for securing the data of your online projects, thereby preventing any damaging losses. Server environments are especially in need of cleverly devised backup strategies that take every type of device into account. Here, backup programs become essential. Free applications, like rsync, offer reliable and compelling alternatives to their expensive conventional [...]
“Data is the new oil!”. So when it comes to online businesses, loss of data means loss of capital. Important and sensitive data should be backed up at regular intervals. Thanks to free programs such as MySQLDumper you can create MySQL database backups in minutes! Once installed, you can use the software to automatise and administer backups.
For server operators, security is of the utmost importance. Only those who have developed and set up a foolproof defence strategy are ready for drastic situations. As well as regular protection mechanisms, like security software, backups, and encryption, there are also some useful tools and frameworks that may come in handy in the fight against intruders. We have laid out the essential details on [...]
Shared hosting is a comfortable and affordable solution for managing websites online. We’ve answered some basic questions regarding shared hosting’s definition, laid out some of its pros and cons, and highlighted what it is that makes this web hosting model different from alternative solutions, like setting up private servers or opting for a free hosting provider.
Double is better, especially when it comes to data backups. Backups shouldn’t only contain important files like documents, tables, presentations, or videos. Generate a comprehensive storage image of your entire system with the help of image-based backup tools and completely restore it including configurations in the event of total failure. Find what makes a good image tool and which functions you [...]
Server failures can be devastating for businesses, especially if central business areas are controlled by IT systems since the longer the server is down, the costlier is it for the company. This can result in loss of sales and in the worst case, the loss of business or customer data. Here we demonstrate the internal and external sources of danger that can lead to server failure, explain the [...]
With the mass of data constantly increasing, ever more efficient storage techniques are required to reduce storage requirements with as few losses as possible. For this purpose, there are two compression techniques that are currently in use. While data compression identifies and eliminates redundant information within a file, deduplication is a cross-file method that is particularly suited to [...]