Talk With an Expert

Logfile Analysis: Identifying a Network Attack

Logfile Analysis: Identifying a Network Attack (PDF, 4.12MB)Published: 21 Jul, 2001
Created by:
Michael Fleming

A backup strategy is more complex then creating a redundant copy of disk storage and considering the strategy a success. A successful backup strategy must detail how the backup media are rotated, how the media are archived, how the system will be recovered, and what the backup software will do to create the backup. Although all parts of the backup strategy are equally important, this paper will focus on the backup script and will detail a flexible backup script that uses built-in Solaris software tools which create a reliable local backup of a Solaris machine running Oracle.