|
|
|
PREVENTING DATA LOSS:
One of the most
important features to ensure a system is its availability. In case
we have a failure (hardware, software, inadvertent or premeditated
by other parties) to disable some or all of the data found in the
system, we have mechanisms that allow us to restore service as
quickly and best.
RecuperaData offers
some guidelines on the importance of good backup policy:
- Redundancy:
The service offered itself must be offered by two or more nodes of
each device in what is known as a cluster. Thus, if a node in any
part of a longer operational, he / the other / s still doing the
same function. It is a good measure, lead to the very service itself
differently in different geographic location to avoid disaster (which,
although rare, occur) in which an entire building that houses one or
more data centers, burned or destroyed by any such attack.
- Cold Backup:
Just install the fully functional system, tuned, optimized, patched
and secured, it is essential to what is called a cold backup of the
installation. This same type of copy should make it quite often to
get back to a known functioning point, if some catastrophe happens.
At least you know that "up here" and you can always worked well from
here if you get to do a restore. The copies are called cold because
they are made without using any of the data on the disks, ie there
is no file in use. The best way is to make booting with another
operating system Live (either on a CD or USB ) and copy disk
partitions completely as they are, without even accessing the files
themselves.
- Hot Backup:
Consists of copy that we consider critical data from one system to
another location. The aim is to have a more updated copy of the same
of what we can give a cold back. What is stored and the frequency
defined in this case, much depends on the functionality of the
system itself, as well as the changing of the data, so it should be
taken case by case basis by those responsible for the information
saved. To do so is often used backup software, free or commercial,
or in some cases through scripts crafted to copy a tar.gz/bz2 or
(pick your favorite compression algorithm) to package the data. With
each packet of data backed up, you should not leave them on the
machine itself, but send them elsewhere. If a home network where one
does not wish to have several machines running, you may copy itself
to be valid in a rewritable DVD or USB permanently connected in
order to have an updated copy if the disks fail, but in the case of
a company, it is best to have centralized the copy in another
location such as through online
backup.
- Vaulting:
This type of backup is that the data (hot) they replicate in "almost
real time" in another location. Often costly in terms of bandwidth
needed to carry data of many machines to another site, but allows
catastrophe if the full path, the latest available data found on
other sites. It is important to keep data from multiple "times"
because if a machine is compromised or trojanized and restores the
last backup exists, the Trojan is also restored to the machine again.
- Time machine:
Although this concept became known as the Apple original, and not a
standard "backup" is a hybrid between Vaulting and Hot Copy. The
idea is to define a device (either an external drive or Time Capsule
via wireless network) on which quite often are set to become "hot
copy". No Electronic Vaulting becomes itself, but it is a good
solution for networks "home." Linux operating systems can use
TimeVault.
Our technicians
are highly skilled in
data recovery .
|
|||||||||||||||||||||||||||||||||||
� 2014 RECUPERADATA: data recovery Site Map |
|||||||||||||||||||||||||||||||||||
Design by: Template World |