Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

NAS devices, SSH access, and secure backups



On 09/14/2009 09:46 AM, markw-FJ05HQ0HCKaWd6l5hS35sQ at public.gmane.org wrote:
> The "Securely backing up Linux machines to NAS?" discussion got me
> thinking...
>
> I have a DLINK-321 NAS device (From Microcenter, of course). The cool
> thing about this unit is the fact that the standard firmware is Linux a=
nd
> it looks for a script file called "fun_plug" on the mounted volume at
> startup. This is so vendors can customize the units operation. Well....=

> There is a fairly good set of Linux utilities that can be installed on
> your disk that provide things like sshd, rsync, samba, etc.
>
> I have been running this for a couple months and it seems pretty stable=
=2E
> The best part is that is does not change the firmware, it merely gets
> executed at startup, so it is fairly safe. I bet that most of the units=

> out there are fairly similar.
>
> So, as per the previous discussion....
>
> If you install the "fun_plug" utilities, you can rsync, through ssh, (o=
r
> just scp) your backup into a directory on the NAS without ever making t=
he
> backed-up directory exposed through samba.
>  =20
Can you install rsnaphot. Since I first heard about rsnapshot here, I've
been using it on my home system and on our WD MyBook. The biggest
advantage of rsnapshot is that it is configured through a standard
config file, and it uses rsync. Multiple backups effectively provide
incremental backup by using hard links, so that files in the daily.0 and
daily.1 directory that did not change are simply hard linked. It uses
the rsync --link-dest command to do this.

--=20
Jerry Feldman <gaf-mNDKBlG2WHs at public.gmane.org>
Boston Linux and Unix
PGP key id: 537C5846
PGP Key fingerprint: 3D1B 8377 A3C0 A5F2 ECBB  CA3B 4607 4319 537C 5846








BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org