rdiff-backup backs up one directory to another, possibly over a network. The target directory ends up a copy of the source directory, but extra reverse diffs are stored in a special subdirectory of that target directory, so you can still recover files lost some time ago. The idea is to combine the best features of a mirror and an incremental backup. rdiff-backup also preserves subdirectories, hard links, dev files, permissions, uid/gid ownership, modification times, extended attributes, acls, and resource forks. Also, rdiff-backup can operate in a bandwidth efficient manner over a pipe, like rsync. Thus you can use rdiff-backup and ssh to securely back a hard drive up to a remote location, and only the differences will be transmitted. Finally, rdiff-backup is easy to use and settings have sensical defaults.
Permanent link to this article: https://www.darknessgate.com/2014/06/21/rdiff-backup/
Categories
- Privacy Tools (96)
- Safe Browsing (16)
- Web Proxies (2)
- Secure Connection (25)
- Secure Deletetion (8)
- Cleaning Tools (21)
- Encryption Tools (25)
- Hiding techniques (13)
- Cloud Encryption (5)
- Anonymity Online (30)
- Android (1)
- Malicious Software Detection (78)
- Anti Malware (5)
- AntiVirus (29)
- Anti Trojan (16)
- Anti KeyLogger (20)
- Anti Spyware (37)
- Anti Rootkits (25)
- Anti Spam (8)
- Anti Phishing (3)
- Anti Stealth (0)
- Process Discovery (15)
- Integrity Checking Tools (15)
- Startup Program Monitor (6)
- System Management (42)
- Backup Software (20)
- Data Recovery (16)
- Registry Monitor (10)
- Network Security (58)
- Firewall (17)
- Vulnerability scanner (1)
- Network Analyzer (22)
- Intrusion Detection Systems (IDS) (6)
- Port Monitor (7)
- Traceroutes Tools (0)
- Anti-Sniffing Tools (6)
- DNS Tools (1)
- Wireless Networks Security (67)
- Web Application Security (22)
- SQL Injunction detection tools (20)
- Website Mirroring Tools (9)
- Linux Security Distro (27)
- Social engineering (4)
- Digital Forensic (97)
- Integrated Forensic Software (13)
- Debuggers (1)
- Memory Imaging (16)
- $MFT Parser (2)
- Encrypted Disk Detector (2)
- Metadata Analyzer (6)
- Registry analysis (7)
- Forensic Live CD/DVD (5)
- Memory Forensics (10)
- Forensic Tools (3)
- Password Recovery (12)
- Hex Editor (12)
- Disk Image (13)
- USB Write Blocker (4)
- Browser Forensic (1)
- Email Forensic (3)
- Forensic User Groups (1)
- Antiforensics (19)
- Learn Programming (28)
- Academic Lectures (100)
- Technical Training (17)
- Tech Tips (1)
- Security News (100)
- Uncategorized (5)
Archive
Data Hiding Techniques in Windows OS
Your Location
Tag Cloud
Android anonymouse anonymouse IM Browser Specific checksum Command Line Tool Commercial Application Computer Forensics Course Lectuers Cyber intelligence Data Hiding Digital Certificates Encryption File System FireWall Framework Freeware Hash Internet Protocols intrusion detection Latest Computer Security News learn programming Linux OS Mac Malware Analysis Mobile Networks Network Backup Network Forensics network management Online Tool open source Password Cracking PC Utilities Portable Version Privacy Safety Online Secure Communication Security learning Symbian USB flash USB forensic vulnerability scanner Windows OS wireless networks XSS