|
You are here |
cullmann.dev | ||
| | | | |
cullmann.io
|
|
| | | | | Backup is always something you under-appreciate until you need it. Therefore, since I lost a lot of my mails due to non-existing backups in the past, I tried to keep proper backups around the last decade. At least this allowed me to keep all my Kate related development mails intact since 2001 or so, not that bad ;=) My old way of doing backups: rsync & duplicity So far, I did my backup on my Unix machines by using rsync to a second host and duplicity to archive stuff on my old Synology NAS. | |
| | | | |
www.franzoni.eu
|
|
| | | | | Why you should care about ransomware attacks even for irrelevant internet-connected systems, and how to use duplicity with AWS S3 to create ransomware-resistant backups. | |
| | | | |
it-notes.dragas.net
|
|
| | | | | I have already dealt with the problem of performing a correct backup. This time I will give you some insights into how I make backups and how I am able to guarantee a certain level of security. | |
| | | | |
materials.rangeforce.com
|
|
| | | SSH (secure shell) is a widely-used protocol for remote administration of Unix and Linux servers. The default configuration of many SSH server implementations includes several potentially-insecure settings so as to maintain compatibility with outdated client software. The ssh-audit tool can be used to check the server settings and recommend changes so as to improve security. | ||