Guard Against Data Loss with Mondo Rescue
Good backup software must be well documented, well tested and easy to use. If the backup software is too fiddly then the user simply will not bother. If it is unreliable, then the user will be lulled into a false sense of security, only to have his or her hopes dashed when the crunch comes. I back up my own system with Mondo two or three times a week. I restore regularly as part of the test regime.
If you want to participate, please download the program and join the mailing list. I would love to hear from you.
Hugo Rabson is a 26-year-old Briton living and working in Nashville, Tennessee. His primary qualification is in business, but he has been writing code since puberty. He currently works for WebMD. Mondo is his attempt to give something back to the Linux community, and he gladly will accept all comments, suggestions and patches.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
|CentOS 6.8 Released||May 27, 2016|
|Secure Desktops with Qubes: Introduction||May 27, 2016|
|Chris Birchall's Re-Engineering Legacy Software (Manning Publications)||May 26, 2016|
|ServersCheck's Thermal Imaging Camera Sensor||May 25, 2016|
|Petros Koutoupis' RapidDisk||May 24, 2016|
|The Italian Army Switches to LibreOffice||May 23, 2016|
- Secure Desktops with Qubes: Introduction
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- CentOS 6.8 Released
- Linux Mint 18
- The Italian Army Switches to LibreOffice
- Petros Koutoupis' RapidDisk
- ServersCheck's Thermal Imaging Camera Sensor
- Chris Birchall's Re-Engineering Legacy Software (Manning Publications)
- The FBI and the Mozilla Foundation Lock Horns over Known Security Hole
- Oracle vs. Google: Round 2