Microsoft Word Hardware Reconfiguration Methodology V final2


Download 242.15 Kb.
bet42/70
Sana02.04.2023
Hajmi242.15 Kb.
#1321952
1   ...   38   39   40   41   42   43   44   45   ...   70
Bog'liq
LInux1

File attributes


Not all backup tools are capable of storing extended file attributes. Depending on the tool used and the data backed up, the backup archive may or may not have saved the files’ attributes. Furthermore, during restoration, it is important to use the correct restoration tool that is able extract and restore the various extended file attributes. The most common type of extended attribute is the ACL, and if incorrectly restored or backed up could result in the administrator having to manually recreating all the missing ACL’s, a very time consuming process. Tar and Cpio-based backups do not store or restore extended file and filesystem attributes.




        1. Security, compression, and networking


If security is a concern, then it is important that the same security measures be taken during restoration as was done during the backup. If certain applications such as SSH or GPG were used during the backup then they will also have to be used during the restoration in order to secure the network and/or data stream. Similarly, if the tools SSH, RSH or Netcat were used for the backup then they too should be used for the restoration. If encryption was used, then the passwords used must be available for data decryption. Furthermore, if administrative accounts are used for the backup, then the same administrative account will be required for a successful restoration. Access to system directories and direct disk access via raw devices also requires administrative access. Just as with data backups, certain permissions will be required in order to write to various parts of the system and to overwrite existing data. For most backup and restoration purposes, an administrative account will be required. In addition, various security mechanisms may be required in order to perform an over-the-network restoration; these types of restorations should generally be restricted to administrative accounts. The media should not be accessible to just anyone; only authorized personnel should be able to use and access backup media. Finally, if


compression was used during the backup then the same tools will also be needed in order to decompress the network or data stream.



        1. Download 242.15 Kb.

          Do'stlaringiz bilan baham:
1   ...   38   39   40   41   42   43   44   45   ...   70




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling