SlideShare a Scribd company logo
Linux Backup


                  Alec Clews
                 @alecthegeek
        alec.clews@gmail.com
Assumptions

●   Linux
●   Personal System
      –   Not enterprise backup plan!!
●   Simple and quick
Because one day....




               Image: 'Licorne 2'

               http://www.flickr.com/photos/7969902@N07/511103951
Ask yourself...
●   Amount of data
●   Frequency of change
●   Affect of loss
Restoring your work
●   Linux Operating System
    ●   Software and settings
    ●   Release DVD, paper notebook, ...
●   Work in progress
    ●   Documents, account files, email, code,...
    ●   USB Drive, Cloud, DVD,
●   Keys, personal config settings
    ●   Multiple copies
    ●   CD/DVD, USB thumb drive, Online
Backup Media
●   CD/DVD ROM
●   Online e.g. DropBox
●   Small media e.g. USB Thumb Drives
●   Large Portable Media
●   Another Machine
●   Remote Storage
    –   email servers
    –   "cloud"
DVD/CD ROM
●   Off-site
    ●   Robust,cheap, universal, long lived
●   Static files
    ●   Media collections (beware size)
    ●   ssh and GnuPG keys




          Image: 'Information Superhighway'

          http://www.flickr.com/photos/7762644@N04/2533281806
Online
●   “Set and forget”
●   Limited free storage
●   Useful for passwords (encrypted), rc files etc
●   Keep files in online folder, use links to original
    location
Large Drives




               Image: 'My Book'

               http://www.flickr.com/photos/46177487@N00/193505182
Large Drives contd.
●   Cheap (1Tb < A$80!)
●   Simple to use
●   Format as NTFS. Universal restore
●   Do not encrypt
●   You still need off-site copies of critical info.
Tools
●   Drag and drop in file manager
●   Back In Time     http://backintime.le-web.org/
●   Command Line interface e.g.
$ tar czf /media/backups/bkps_$(date 
+%C_%m_%d­%k_%M).tgz $HOME


$ cp ­a <src> <backup>
Plan
●   How much
    ●   Use files analysis tools
●   When
    ●   Weekly?
    ●   Daily?
    ●   Online?
And Finally
●   Backupas are useless without a way to restore
●   Your hardware will fail and you will make
    mistakes. Backups will save your mental health
●   Simple plans and regular routines
●   Make sure you backup hidden files and
    directories
    ●
                                               .
        In Linux the hidden names begins with “ ”

More Related Content

Similar to Linux backup

AWS Customer Highlight - Craftsy
AWS Customer Highlight - CraftsyAWS Customer Highlight - Craftsy
AWS Customer Highlight - Craftsy
Amazon Web Services
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing Development
CTruncer
 
Slash n: Technical Session 8 - Making Time - minute by minute - Janmejay Singh
Slash n: Technical Session 8 - Making Time - minute by minute - Janmejay SinghSlash n: Technical Session 8 - Making Time - minute by minute - Janmejay Singh
Slash n: Technical Session 8 - Making Time - minute by minute - Janmejay Singh
slashn
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
Mike Spaulding
 
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
WiLS
 
Hadoop-2.6.0 Slides
Hadoop-2.6.0 SlidesHadoop-2.6.0 Slides
Hadoop-2.6.0 Slides
kul prasad subedi
 
Preventive Maintenance
Preventive MaintenancePreventive Maintenance
Preventive Maintenance
Zainab Almugbel
 
Dfrws eu 2014 rekall workshop
Dfrws eu 2014 rekall workshopDfrws eu 2014 rekall workshop
Dfrws eu 2014 rekall workshop
Tamas K Lengyel
 
External storage devices and basics of file
External storage devices and basics of fileExternal storage devices and basics of file
External storage devices and basics of file
KanchanPatil34
 
Backing up your computer
Backing up your computerBacking up your computer
Backing up your computer
clcewing
 
How to optimize your windows computer
How to optimize your windows computerHow to optimize your windows computer
How to optimize your windows computer
Malik Browne
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
remotestaffdesignsolution
 
Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2
Davor Guttierrez
 
dataacquisition.pdf
dataacquisition.pdfdataacquisition.pdf
dataacquisition.pdf
Jayaprasanna4
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
primeteacher32
 
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux AdministratorsProper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
Dave Stokes
 
Nagios Conference 2014 - Andy Brist - Nagios XI Failover and HA Solutions
Nagios Conference 2014 - Andy Brist - Nagios XI Failover and HA SolutionsNagios Conference 2014 - Andy Brist - Nagios XI Failover and HA Solutions
Nagios Conference 2014 - Andy Brist - Nagios XI Failover and HA Solutions
Nagios
 
Threads and processes
Threads and processesThreads and processes
Threads and processes
Fungirayiini Chiweshe Mushaninga
 
The Accidental DBA
The Accidental DBAThe Accidental DBA
The Accidental DBA
PostgreSQL Experts, Inc.
 
Wonderful world of (distributed) SCM or VCS
Wonderful world of (distributed) SCM or VCSWonderful world of (distributed) SCM or VCS
Wonderful world of (distributed) SCM or VCS
Vlatko Kosturjak
 

Similar to Linux backup (20)

AWS Customer Highlight - Craftsy
AWS Customer Highlight - CraftsyAWS Customer Highlight - Craftsy
AWS Customer Highlight - Craftsy
 
Pen Testing Development
Pen Testing DevelopmentPen Testing Development
Pen Testing Development
 
Slash n: Technical Session 8 - Making Time - minute by minute - Janmejay Singh
Slash n: Technical Session 8 - Making Time - minute by minute - Janmejay SinghSlash n: Technical Session 8 - Making Time - minute by minute - Janmejay Singh
Slash n: Technical Session 8 - Making Time - minute by minute - Janmejay Singh
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...Digitization Basics for Archives and Special Collections – Part 2: Store and ...
Digitization Basics for Archives and Special Collections – Part 2: Store and ...
 
Hadoop-2.6.0 Slides
Hadoop-2.6.0 SlidesHadoop-2.6.0 Slides
Hadoop-2.6.0 Slides
 
Preventive Maintenance
Preventive MaintenancePreventive Maintenance
Preventive Maintenance
 
Dfrws eu 2014 rekall workshop
Dfrws eu 2014 rekall workshopDfrws eu 2014 rekall workshop
Dfrws eu 2014 rekall workshop
 
External storage devices and basics of file
External storage devices and basics of fileExternal storage devices and basics of file
External storage devices and basics of file
 
Backing up your computer
Backing up your computerBacking up your computer
Backing up your computer
 
How to optimize your windows computer
How to optimize your windows computerHow to optimize your windows computer
How to optimize your windows computer
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2Perfect Linux Desktop - OpenSuSE 12.2
Perfect Linux Desktop - OpenSuSE 12.2
 
dataacquisition.pdf
dataacquisition.pdfdataacquisition.pdf
dataacquisition.pdf
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux AdministratorsProper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
 
Nagios Conference 2014 - Andy Brist - Nagios XI Failover and HA Solutions
Nagios Conference 2014 - Andy Brist - Nagios XI Failover and HA SolutionsNagios Conference 2014 - Andy Brist - Nagios XI Failover and HA Solutions
Nagios Conference 2014 - Andy Brist - Nagios XI Failover and HA Solutions
 
Threads and processes
Threads and processesThreads and processes
Threads and processes
 
The Accidental DBA
The Accidental DBAThe Accidental DBA
The Accidental DBA
 
Wonderful world of (distributed) SCM or VCS
Wonderful world of (distributed) SCM or VCSWonderful world of (distributed) SCM or VCS
Wonderful world of (distributed) SCM or VCS
 

More from Alec Clews

Novices guide to docker
Novices guide to dockerNovices guide to docker
Novices guide to docker
Alec Clews
 
Ras pioverview
Ras pioverviewRas pioverview
Ras pioverview
Alec Clews
 
Fixing Australian Computer Education
Fixing Australian Computer EducationFixing Australian Computer Education
Fixing Australian Computer Education
Alec Clews
 
Novice Programmers Workshop
Novice Programmers WorkshopNovice Programmers Workshop
Novice Programmers Workshop
Alec Clews
 
Software Build processes and Git
Software Build processes and GitSoftware Build processes and Git
Software Build processes and Git
Alec Clews
 
Deploy Application Files with Git
Deploy Application Files with GitDeploy Application Files with Git
Deploy Application Files with Git
Alec Clews
 
Collaboration With Git and GitHub
Collaboration With Git and GitHubCollaboration With Git and GitHub
Collaboration With Git and GitHub
Alec Clews
 
Basic Make
Basic MakeBasic Make
Basic Make
Alec Clews
 
Create a better Demo
 Create a better Demo Create a better Demo
Create a better Demo
Alec Clews
 
OSDC 2006 Presentaton: Building with a Version Control Audit Trail
OSDC 2006 Presentaton: Building with a Version Control Audit TrailOSDC 2006 Presentaton: Building with a Version Control Audit Trail
OSDC 2006 Presentaton: Building with a Version Control Audit Trail
Alec Clews
 
SCM: An Introduction
SCM: An IntroductionSCM: An Introduction
SCM: An Introduction
Alec Clews
 

More from Alec Clews (11)

Novices guide to docker
Novices guide to dockerNovices guide to docker
Novices guide to docker
 
Ras pioverview
Ras pioverviewRas pioverview
Ras pioverview
 
Fixing Australian Computer Education
Fixing Australian Computer EducationFixing Australian Computer Education
Fixing Australian Computer Education
 
Novice Programmers Workshop
Novice Programmers WorkshopNovice Programmers Workshop
Novice Programmers Workshop
 
Software Build processes and Git
Software Build processes and GitSoftware Build processes and Git
Software Build processes and Git
 
Deploy Application Files with Git
Deploy Application Files with GitDeploy Application Files with Git
Deploy Application Files with Git
 
Collaboration With Git and GitHub
Collaboration With Git and GitHubCollaboration With Git and GitHub
Collaboration With Git and GitHub
 
Basic Make
Basic MakeBasic Make
Basic Make
 
Create a better Demo
 Create a better Demo Create a better Demo
Create a better Demo
 
OSDC 2006 Presentaton: Building with a Version Control Audit Trail
OSDC 2006 Presentaton: Building with a Version Control Audit TrailOSDC 2006 Presentaton: Building with a Version Control Audit Trail
OSDC 2006 Presentaton: Building with a Version Control Audit Trail
 
SCM: An Introduction
SCM: An IntroductionSCM: An Introduction
SCM: An Introduction
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Linux backup

  • 1. Linux Backup Alec Clews @alecthegeek alec.clews@gmail.com
  • 2. Assumptions ● Linux ● Personal System – Not enterprise backup plan!! ● Simple and quick
  • 3. Because one day.... Image: 'Licorne 2' http://www.flickr.com/photos/7969902@N07/511103951
  • 4. Ask yourself... ● Amount of data ● Frequency of change ● Affect of loss
  • 5. Restoring your work ● Linux Operating System ● Software and settings ● Release DVD, paper notebook, ... ● Work in progress ● Documents, account files, email, code,... ● USB Drive, Cloud, DVD, ● Keys, personal config settings ● Multiple copies ● CD/DVD, USB thumb drive, Online
  • 6. Backup Media ● CD/DVD ROM ● Online e.g. DropBox ● Small media e.g. USB Thumb Drives ● Large Portable Media ● Another Machine ● Remote Storage – email servers – "cloud"
  • 7. DVD/CD ROM ● Off-site ● Robust,cheap, universal, long lived ● Static files ● Media collections (beware size) ● ssh and GnuPG keys Image: 'Information Superhighway' http://www.flickr.com/photos/7762644@N04/2533281806
  • 8. Online ● “Set and forget” ● Limited free storage ● Useful for passwords (encrypted), rc files etc ● Keep files in online folder, use links to original location
  • 9. Large Drives Image: 'My Book' http://www.flickr.com/photos/46177487@N00/193505182
  • 10. Large Drives contd. ● Cheap (1Tb < A$80!) ● Simple to use ● Format as NTFS. Universal restore ● Do not encrypt ● You still need off-site copies of critical info.
  • 11. Tools ● Drag and drop in file manager ● Back In Time http://backintime.le-web.org/ ● Command Line interface e.g. $ tar czf /media/backups/bkps_$(date  +%C_%m_%d­%k_%M).tgz $HOME $ cp ­a <src> <backup>
  • 12. Plan ● How much ● Use files analysis tools ● When ● Weekly? ● Daily? ● Online?
  • 13. And Finally ● Backupas are useless without a way to restore ● Your hardware will fail and you will make mistakes. Backups will save your mental health ● Simple plans and regular routines ● Make sure you backup hidden files and directories ● . In Linux the hidden names begins with “ ”