Afternotes Discussion on presentation of these slides made it clear to me that what I seek is simplification of the backup and recovery process, not just.

Slides:



Advertisements
Similar presentations
CN Objectives of the course To build and maintain a UNIX-based Network Systems & Servers Install Linux, fine tune the system, enable required server,
Advertisements

TOP Server V5 Features and New Release Presenter: Colin Winchester – VP Operations.
The Penguin Sleuth Kit By Ernest Baca
INSTALLING LINUX.  Identify the proper Hardware  Methods for installing Linux  Determine a purpose for the Linux Machine  Linux File Systems  Linux.
Linux on commodity network H/W Josh Parsons LUGOD talk August 15 th 2005.
Windows 2003 Server. Windows 2003 Server Contents Fitur Windows 2003 Server Installation And Configuration Windows Management Resource  User Management.
Fedora Linux Fedora: the (somewhat) new Linux distribution on the block. To switch or not to switch? Moreover, why use it at all? And, what is its target?
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Systems Administrator for Krannert.
SUPERCOMPUTER TO THE RESCUE Justin Curry EKU, Dept. of Technology, CEN/CET)
Support for Windows 7 Chapter 2 Securing and Troubleshooting Windows 7.
Imaging Software: Norton Ghost Presented by: Paul Tsan Carlos Vasquez Steven Sanchez.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Princeton PC Users Group Hard Drive Disaster! By Paul Kurivchack March 14, 2005.
1 Web Server Administration Chapter 3 Installing the Server.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
Network Performance Toolkit (NPToolkit) A Knoppix Live-CD Rich Carlson Tools Tutorial 12/4/06.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
McGraw-Hill/Irwin© 2006 The McGraw-Hill Companies, Inc. All rights reserved. 5-1.
Developed by Klaus Knopper Linux Consultant. What is Knoppix?  Unix-like operating system  Run directly from CD or DVD  Bootable from USB flash drive.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Copyright 2007 FUJITSU LIMITED Systemwalker Resource Coordinator Virtual server Edition V13.2 December, 2007 Fujitsu Limited Functions Blade Server Management.
The file server model July 14, 2011 © 2011 PC3.org The File Server Model Presented for the PCCC Program Notes We recommend that you print these slides.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Windows XP Professional Windows XP Professional Overview Install and Upgrade Windows XP Pro Customize and Manage Windows XP Pro Troubleshoot Common Windows.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
March 2014 LCCU Meeting How to use Windows XP safely after end of support. We’ll answers members’ questions: –How to restore Win XP backups to Win XP,
Boot Diskettes, Bootable USB Keys and Live CDs Used when the computer can't start for some reason, as a diagnostic, repair and recovery tool. Boot diskettes.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
ONE LAPTOP PER CHILD One Laptop per Child Software Development Ed McNierney December 16, 2008 One Laptop per Child.
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Booting Ubuntu Linux Live CSCI 130 – Fall 2008 Action Lab Dr. W. Jones.
CHAPTER 2. Overview 1. Pre-Installation Tasks 2. Installing and Configuring Linux 3. X Server 4. Post Installation Configuration and Tasks.
Lab 11 Overview Windows Server Last Labs Lab 12  Cisco Firewall.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Host Security Overview Onion concept of security Defense in depth How secure do you need to be? You can only reduce risk Tradeoffs - more security means:
1 Copyright © 2015 Pexus LLC Patriot PS Personal Server Installing Patriot PS ISO Image on.
MySQL Gubbins Richard Sinclair HepSysMan – 11/05/2012.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
WINDOWS SERVER 2003 Genetic Computer School Lesson 12 Fault Tolerance.
Data recovery in 15 minutes or less UsingKnoppix.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
 Prepared by: Eng. Maryam Adel Abdel-Hady
ArtioSign and Receiver V5.2 Partner Webinar – 23 rd May 2016.
Secured Drupal Hosting USA's & Europe's # 1 web hosting company Contact:
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
ITMT 1371 – Windows 7 configuration Chapter 2: Installing Windows 7 ITMT 1371 – Windows 7 Configuration.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Chap 1 ~ Introducing LINUX LINUX is a free-stable multi-user operating system that derives from UNIX operating system Benefits: 1) Linux is released under.
Lab 11 Overview Windows Server Last Labs wk14
An Overview to System Management WorldVistA Community Meeting June 14-17, 2007 Seattle, WA.
Kevin Brouelette OCLUG
CompTIA Server+ Certification (Exam SK0-004)
Introduction to Operating Systems
Backing Up Your System With rsnapshot
BIF713 Managing Disk Space.
Popular Operating Systems
Tailor slide to customer industry/pain points
Chapter 27: System Security
Convergence IT Services Pvt. Ltd
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Afternotes Discussion on presentation of these slides made it clear to me that what I seek is simplification of the backup and recovery process, not just of data, but of the working system in a fashion that it can be transferred to different hardware if necessary. There are certainly some options out there for this, and the discussion was very helpful. Thanks OCLUG participants. JN

Operate from R/O – Does it exist? J C Nash -- March 2006 ● The wish list: ● Boot from r/o media, preferably write-protect USB, but possibly a CD ● Have SSH keys and other important files (?? passwd, etc.) on r/o media too ● Be able to configure / update easily ● /home or parts, /var or parts, ??others on separate partitions – and easy to set up / reconfigure as system grows ● easy backup and restore

What's out there? ● NSA Security Enhanced Linux – – focuses on kernel and utilities to enforce access control – likely NOT what I want, but.... – Seems to be FLOSS

Trustix Secure Linux ● ● Own installer SWUP / Viper (rpm based??) ● Keep it simple claim ● Server oriented (what I want!) ● Maintained ● Appears open and free ● Anybody have experience of it?

LIDS ● ● Linux Intrusion Detection System ● Probably somewhat orthogonal to my wants, but...

En Garde Secure Linux ● ● Simple & Secure Remote Administration ● Powerful Host Intrusion Detection ● Secure Network Services ● Built-in Support and Alerts ● Robust Network Intrusion Detection ● Quick and Secure Web, DNS , FTP ● Community edition free, but clear that it is commercial ● debian based (my preference)

Onward.... ● Plan to try to implement some sort of r/o bootup (e.g. could use a knoppix basis) ● BUT don't want lots of h/w detect each time – want faster reboot if necessary, with disk examination ● Willing to try one of the options above, esp. if others willing to share expertise and write up what is learned. ● Should OCLUG be a focus for such reports?