BRU 2000 for X11
Manufacturer: Enhanced Software Technologies, Inc.
Price: $89 US (personal edition) Free for xbru only
Reviewer: Garrett Smith
While not the most flashy area of computing, proper backups are essential. BRU 2000 for X11 (xbru) is a user-friendly graphical interface for EST's BRU backup software. It is targeted for users who want to easily back up their computer without having to learn the command-line interface for their backup software. To use the more complex options of BRU 2000, you still need to learn BRU's command-line interface.
xbru came with BRU 2000; however, I downloaded the newest version (as of July 1997) of xbru from EST's web site. xbru is freely available, but it does require BRU 15.0 which is sold by EST Inc. xbru also requires Tcl 7.6 and tk 4.2, which are freely available (see Resources).
I had one problem during the installation procedure for xbru—it wanted to install its files into the /usr/local/lib/bru directory, but, unfortunately, on my computer, /usr/local is mounted read-only from the NFS server. I sent e-mail to email@example.com asking how to install into a directory other than /usr/local/lib/bru. I later got a reply to my question, but before the reply came, I had obtained permission to install xbru on the NFS server.
Once I had root access on the server, the rest of the installation was straightforward. I ran bru, which was already installed, on the X11 package from the command line using the following command:
bru -xvf bru4X11.bru
Executing this command produced an install script to do the installation, which I then ran.
When you start up xbru, it asks you which device you wish to use for backup. You can chose from the devices in your /etc/brutab file, or you can select a file. I used a file for testing at first, and later I tried it on a 4GB SCSI 4mm DAT tape drive. The main screen gives a few default options that make standard backups very easy: Full, Level 1 and Level 2. If you are root, Full does a full backup of the entire system; otherwise, it does a full backup of your home directory. The Level 1 and Level 2 options are more complicated. Level 1 backs up files modified since the last Full backup. Level 2 backs up files modified since the last Level-1 backup.
BRU comes with a hefty manual for its command-line software which I didn't have time to look through thoroughly. There is a 25-page booklet for the X11 interface that is very basic and generally easy to understand—a little more detail might have been helpful. There is context help for the backup and restore operations which was helpful, but would have been even more helpful if it had included other operations and dialog boxes.
The main on-line help was more troublesome—it launched a web browser (Netscape, by default) to look at EST's web page. Starting the browser suspended xbru until you exited the browser. As a result, you can't easily refer to the help page while using xbru. You can start a web browser independent of xbru and go to EST's page, but, of course, this solution is less convenient. Also, xbru points the browser at EST's main web page, not a page dedicated to help for BRU and not to a local help file. This last can be particularly bothersome, if you are not always connected to the Internet.
After resolving my problems with the /usr/local directory, I had no other major problems. Mainly, xbru just showed a general lack of polish—as if it had been rushed out the door in order to be able to advertise the inclusion of a user-friendly GUI. Some of the little problems I had were:
I received several Tcl error messages when xbru got confused.
xbru locked up every time I did a search through the backup listings.
Whenever I created a new backup, the buttons to restore, verify or list the backup were disabled until I restarted the program.
The whole point of xbru is to supply an easy-to-use front end for BRU, so the interface is a big part of the package. Overall I liked the interface. The front screen was simple, with only a few options. Unfortunately, the Full, Level 1 and Level 2 buttons are slightly confusing to a new user who hasn't looked at the documentation closely. The little message bar at the bottom of the screen does explain the buttons more thoroughly; however, since there is a lot of unused space on the front screen, labeling the buttons “Full Backup”, “Level 1 Backup” and “Level 2 Backup” would be less confusing. Also, substituting an explanatory paragraph next to the buttons for the large EST logo would certainly be more helpful to the new user.
The backup page was similar to other backup programs I have used, and I found it generally intuitive.
The restore page was not quite so easy to understand. The confusing thing about the restore page was that on the left it gave a listing of files labeled as the current directory, but it listed only those files I had backed up, not all of the files on my hard drive. I could move these files to a listing labeled as the backup device to restore the files. While it worked as I expected from using other backup products, the labels just seemed confusing.
The verify and list operations were relatively simple and understandable.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- BitTorrent Inc.'s Sync
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide