SlideShare a Scribd company logo
If there is any issue at setup or connection contact support@k21technologies.com
Overview of Unix
Activity Guide 6
[Edition 1]
[Last Update 130815]
For any issues/help contact : support@k21technologies.com
If there is any issue at setup or connection contact support@k21technologies.com
BACKUP AND RESTORE IN LINUX
 In information Technology, a backup or the process of backing up is masking copies of data
which may be used to restore the original after a data loss event.
 Backups have two district purposes.
 The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data
loss is a very common experience of computer users. 67% of Internet users have suffered
serious data loss.
 The secondary purpose of backups is to recover data from an earlier time, according to a user-
defined data retention policy, typically configured within a backup application for how long
copies of data are required.
 Backup is the most important job of a system administrator, as a system admin it is your duty to
take backup of the data every day.
 Many companies have gone out of the market because of poor backup planning.
 The easiest way to backup up your files is just copying. But if you have too many files to backup,
copying and restoring may take too long time and it is not convinient. If there is a tool that can
put many files into one file, the world will be better. Fortunetly, 'tar' is used to create archive
files. It can pack files or directories into a 'tar' file. It is like Winzip in windows, without much
compression.
 The gzip program compress a single file. One important thing to remember about gzip is that,
unlike tar, it replaces your original file with a compressed version. (The amout of compression
varies with the type of data, but a typical text file will be reduced by 70 to 80 percent).
If there is any issue at setup or connection contact support@k21technologies.com
To backup the file using tar
 To backup the file using tar Syntax is
#tar -cvf <destination and name to be > <source file>
Check the size of tar file by using du -h <filename> command #du -h /opt/etc.tar
Now apply gzip on tar file and check the size
To apply gzip on a tar file, the syntax is #gzip <file name>
#gzip /u02/etc.tar
Now check the size of the file
If there is any issue at setup or connection contact support@k21technologies.com
Transfer the file to other system and remove gzip and tar from it and check the size on every step
 Let's Transfer the file to other computer using scp
#scp /u02/etc.tar.gz 192.168.2.10:/root/
Untar the file and check for the size of the file / directory
tar -xvf <file name>
If there is any issue at setup or connection contact support@k21technologies.com
If there is any issue at setup or connection contact support@k21technologies.com
=============End of the Activity 6 Guide========

More Related Content

What's hot

File system.
File system.File system.
File system.
elyza12
 
File Management
File ManagementFile Management
File Management
spickul
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basics
Shahed Mohamed
 
File Management
File ManagementFile Management
File Management
ramya marichamy
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Ali Broumandnia
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
duraimurugan89
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
Maham Huda
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
catacutanjcsantos
 
How to use disk cleanup on your PC
How to use disk cleanup on your PCHow to use disk cleanup on your PC
How to use disk cleanup on your PCrochoaz78
 
Backup
BackupBackup
Presentation on Magnetic Tapes
Presentation on Magnetic TapesPresentation on Magnetic Tapes
Presentation on Magnetic Tapes
Aditya Goswami
 
Cloud storage advantages vs disadvantages
Cloud storage advantages vs disadvantagesCloud storage advantages vs disadvantages
Cloud storage advantages vs disadvantages
realtycabinet
 
Backup
BackupBackup
Software management in linux
Software management in linuxSoftware management in linux
Software management in linuxnejadmand
 
File management
File management File management
File management
Abenezer Abiti
 
Unix files
Unix filesUnix files
Unix files
Sunil Rm
 

What's hot (20)

File system.
File system.File system.
File system.
 
File Management
File ManagementFile Management
File Management
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basics
 
File Management
File ManagementFile Management
File Management
 
File Management
File ManagementFile Management
File Management
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
File organisation
File organisationFile organisation
File organisation
 
How to use disk cleanup on your PC
How to use disk cleanup on your PCHow to use disk cleanup on your PC
How to use disk cleanup on your PC
 
Backup
BackupBackup
Backup
 
Presentation on Magnetic Tapes
Presentation on Magnetic TapesPresentation on Magnetic Tapes
Presentation on Magnetic Tapes
 
Cloud storage advantages vs disadvantages
Cloud storage advantages vs disadvantagesCloud storage advantages vs disadvantages
Cloud storage advantages vs disadvantages
 
Backup
BackupBackup
Backup
 
Software management in linux
Software management in linuxSoftware management in linux
Software management in linux
 
File management
File management File management
File management
 
Storage Technologies
Storage TechnologiesStorage Technologies
Storage Technologies
 
Unix files
Unix filesUnix files
Unix files
 

Viewers also liked

Linux Ensim Reseller Doc
Linux Ensim Reseller DocLinux Ensim Reseller Doc
Linux Ensim Reseller Docdineshviswanath
 
Thesis - Linux on the desktop
Thesis - Linux on the desktopThesis - Linux on the desktop
Thesis - Linux on the desktopAdam Lalani
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
Víctor Capetillo
 
linux interview questions and answers
linux interview questions and answerslinux interview questions and answers
linux interview questions and answers
Ganapathi Raju
 
Devops interview questions
Devops interview questionsDevops interview questions
Devops interview questions
enrollmy training
 
Linux server world
Linux server worldLinux server world
Linux server worldAkshat Singh
 
Linux System Administration Crash Course
Linux System Administration Crash CourseLinux System Administration Crash Course
Linux System Administration Crash Course
Jason Cannon
 
Full system roll-back and systemd in SUSE Linux Enterprise 12
Full system roll-back and systemd in SUSE Linux Enterprise 12Full system roll-back and systemd in SUSE Linux Enterprise 12
Full system roll-back and systemd in SUSE Linux Enterprise 12
Gábor Nyers
 
Linux administration classes in mumbai
Linux administration classes in mumbaiLinux administration classes in mumbai
Linux administration classes in mumbai
Vibrant Technologies & Computers
 
Redhat training &certification
Redhat training &certificationRedhat training &certification
Redhat training &certificationAhmed Abbas Ahmed
 
RHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
Radien software
 
Self introduction
Self introductionSelf introduction
Self introduction
Benjamin Bowman
 
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
iimjobs and hirist
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questionsKavya Sri
 

Viewers also liked (14)

Linux Ensim Reseller Doc
Linux Ensim Reseller DocLinux Ensim Reseller Doc
Linux Ensim Reseller Doc
 
Thesis - Linux on the desktop
Thesis - Linux on the desktopThesis - Linux on the desktop
Thesis - Linux on the desktop
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
linux interview questions and answers
linux interview questions and answerslinux interview questions and answers
linux interview questions and answers
 
Devops interview questions
Devops interview questionsDevops interview questions
Devops interview questions
 
Linux server world
Linux server worldLinux server world
Linux server world
 
Linux System Administration Crash Course
Linux System Administration Crash CourseLinux System Administration Crash Course
Linux System Administration Crash Course
 
Full system roll-back and systemd in SUSE Linux Enterprise 12
Full system roll-back and systemd in SUSE Linux Enterprise 12Full system roll-back and systemd in SUSE Linux Enterprise 12
Full system roll-back and systemd in SUSE Linux Enterprise 12
 
Linux administration classes in mumbai
Linux administration classes in mumbaiLinux administration classes in mumbai
Linux administration classes in mumbai
 
Redhat training &certification
Redhat training &certificationRedhat training &certification
Redhat training &certification
 
RHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
 
Self introduction
Self introductionSelf introduction
Self introduction
 
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 

Similar to Backup and restore in linux

Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
jrm1224
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
perry57123
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
Ashwin Pawar
 
Disaster Recovery Plan Whitepaper
Disaster Recovery Plan Whitepaper Disaster Recovery Plan Whitepaper
Disaster Recovery Plan Whitepaper
Actian Corporation
 
List the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docxList the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docx
darlened3
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
ZAG Technical Services
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
Bill Kuhl
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
Ashwin Pawar
 
Emc World Keynote Slootman
Emc World Keynote SlootmanEmc World Keynote Slootman
Testing pc’s performance lf
Testing pc’s performance lfTesting pc’s performance lf
Testing pc’s performance lf
iteclearners
 
Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010
lincolng
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
Sandra Ahn
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
ssuser1eca7d
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
christinemaritza
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data Explosion
IBM India Smarter Computing
 
By default software
By default softwareBy default software
By default software
Swift Nejra
 
CTERA Minimizing the threat of Ransomware with enterprise file services
CTERA  Minimizing the threat of Ransomware with enterprise file servicesCTERA  Minimizing the threat of Ransomware with enterprise file services
CTERA Minimizing the threat of Ransomware with enterprise file services
David Finkelstein
 
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file servicesMinimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
David Finkelstein
 

Similar to Backup and restore in linux (20)

Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
 
Disaster Recovery Plan Whitepaper
Disaster Recovery Plan Whitepaper Disaster Recovery Plan Whitepaper
Disaster Recovery Plan Whitepaper
 
List the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docxList the most common arguments and describe the effect of that argumen.docx
List the most common arguments and describe the effect of that argumen.docx
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
SnapDiff
SnapDiffSnapDiff
SnapDiff
 
Emc World Keynote Slootman
Emc World Keynote SlootmanEmc World Keynote Slootman
Emc World Keynote Slootman
 
Testing pc’s performance lf
Testing pc’s performance lfTesting pc’s performance lf
Testing pc’s performance lf
 
Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010Unitrends Sales Presentation 2010
Unitrends Sales Presentation 2010
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
Continuous data protection
Continuous data protectionContinuous data protection
Continuous data protection
 
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxChapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docx
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data Explosion
 
By default software
By default softwareBy default software
By default software
 
CTERA Minimizing the threat of Ransomware with enterprise file services
CTERA  Minimizing the threat of Ransomware with enterprise file servicesCTERA  Minimizing the threat of Ransomware with enterprise file services
CTERA Minimizing the threat of Ransomware with enterprise file services
 
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file servicesMinimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
 

More from Mohammed Yazdani

Installing webmin on linux
Installing webmin on linux Installing webmin on linux
Installing webmin on linux
Mohammed Yazdani
 
Configuring vnc server in linux
Configuring vnc server  in linux Configuring vnc server  in linux
Configuring vnc server in linux
Mohammed Yazdani
 
Administering Remote System in Linux
Administering Remote System in Linux Administering Remote System in Linux
Administering Remote System in Linux
Mohammed Yazdani
 
Overview on Linux
Overview on LinuxOverview on Linux
Overview on Linux
Mohammed Yazdani
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in Linux
Mohammed Yazdani
 
User and group administration in Linux
User and group administration in LinuxUser and group administration in Linux
User and group administration in Linux
Mohammed Yazdani
 
Solaris 10 installation on vmware
Solaris 10 installation on vmware Solaris 10 installation on vmware
Solaris 10 installation on vmware
Mohammed Yazdani
 
Installation of Oracle Linux 5.4 32 bit on vmware
Installation of Oracle Linux 5.4 32 bit on vmware Installation of Oracle Linux 5.4 32 bit on vmware
Installation of Oracle Linux 5.4 32 bit on vmware
Mohammed Yazdani
 

More from Mohammed Yazdani (8)

Installing webmin on linux
Installing webmin on linux Installing webmin on linux
Installing webmin on linux
 
Configuring vnc server in linux
Configuring vnc server  in linux Configuring vnc server  in linux
Configuring vnc server in linux
 
Administering Remote System in Linux
Administering Remote System in Linux Administering Remote System in Linux
Administering Remote System in Linux
 
Overview on Linux
Overview on LinuxOverview on Linux
Overview on Linux
 
Network configuration in Linux
Network configuration in LinuxNetwork configuration in Linux
Network configuration in Linux
 
User and group administration in Linux
User and group administration in LinuxUser and group administration in Linux
User and group administration in Linux
 
Solaris 10 installation on vmware
Solaris 10 installation on vmware Solaris 10 installation on vmware
Solaris 10 installation on vmware
 
Installation of Oracle Linux 5.4 32 bit on vmware
Installation of Oracle Linux 5.4 32 bit on vmware Installation of Oracle Linux 5.4 32 bit on vmware
Installation of Oracle Linux 5.4 32 bit on vmware
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Backup and restore in linux

  • 1. If there is any issue at setup or connection contact support@k21technologies.com Overview of Unix Activity Guide 6 [Edition 1] [Last Update 130815] For any issues/help contact : support@k21technologies.com
  • 2. If there is any issue at setup or connection contact support@k21technologies.com BACKUP AND RESTORE IN LINUX  In information Technology, a backup or the process of backing up is masking copies of data which may be used to restore the original after a data loss event.  Backups have two district purposes.  The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss is a very common experience of computer users. 67% of Internet users have suffered serious data loss.  The secondary purpose of backups is to recover data from an earlier time, according to a user- defined data retention policy, typically configured within a backup application for how long copies of data are required.  Backup is the most important job of a system administrator, as a system admin it is your duty to take backup of the data every day.  Many companies have gone out of the market because of poor backup planning.  The easiest way to backup up your files is just copying. But if you have too many files to backup, copying and restoring may take too long time and it is not convinient. If there is a tool that can put many files into one file, the world will be better. Fortunetly, 'tar' is used to create archive files. It can pack files or directories into a 'tar' file. It is like Winzip in windows, without much compression.  The gzip program compress a single file. One important thing to remember about gzip is that, unlike tar, it replaces your original file with a compressed version. (The amout of compression varies with the type of data, but a typical text file will be reduced by 70 to 80 percent).
  • 3. If there is any issue at setup or connection contact support@k21technologies.com To backup the file using tar  To backup the file using tar Syntax is #tar -cvf <destination and name to be > <source file> Check the size of tar file by using du -h <filename> command #du -h /opt/etc.tar Now apply gzip on tar file and check the size To apply gzip on a tar file, the syntax is #gzip <file name> #gzip /u02/etc.tar Now check the size of the file
  • 4. If there is any issue at setup or connection contact support@k21technologies.com Transfer the file to other system and remove gzip and tar from it and check the size on every step  Let's Transfer the file to other computer using scp #scp /u02/etc.tar.gz 192.168.2.10:/root/ Untar the file and check for the size of the file / directory tar -xvf <file name>
  • 5. If there is any issue at setup or connection contact support@k21technologies.com
  • 6. If there is any issue at setup or connection contact support@k21technologies.com =============End of the Activity 6 Guide========