Questions tagged [backup]
Backing up is the process of making copies (a backup) of data which may be used to restore the original after a data loss event.
197
questions
2
votes
1
answer
83
views
What are the infection risks for a SMB/Samba file share from an infected client PC?
I have a PC on my home network that I consider potentially infected by exposure to an untrusted program from the internet. (Antivirus detected nothing, and the PC runs fine, but I'm choosing to err on ...
0
votes
0
answers
73
views
Is Windows 10 'Backup and Restore' sending my password in plaintext on unencryped link?
[Note: I have a Windows 10 system in an air-gapped network as the only computer on the network where it is the acting "server", as part of an RMF-compliant, DAAPM (link to PDF on dcsa.mil) ...
0
votes
0
answers
284
views
Outdoor backup: gocryptfs --init --reverse: alway same .diriv in 1st level directory
Intro
Trying to send encrypted backup of in productions filesystems, I was interested by the ability of using gocryptfs in reverse mode!
The idea is to
use gocryptfs --reverse from any existing (...
0
votes
0
answers
182
views
What does an exported BitLocker key package contain?
I've learned that a key protector encrypts the VMK (volume master key), then the VMK encrypts the FVEK (full volume encryption key), and finally the FVEK encrypts the actual data blocks.
I've also ...
1
vote
0
answers
241
views
Encryption Reccomendation for Specific Borg Backup + Rclone Scenario
I currently use Borg backup to make backup repositories of my system data on a local drive. I also use Rclone to transfer the repository to a Backblaze B2 cloud storage bucket.
Borg can create ...
0
votes
1
answer
137
views
Verify the safety of old back ups
I have an old laptop that I've been using since high school, and for a long time I wasn't careful with how I used it. Namely, I shared USBs with friends and teachers for assignments and presentations, ...
2
votes
0
answers
668
views
MMLS (Sleuth Kit) not working in some situations
I am experiencing some issues when using mmls command after having created an image with dcfldd/guymager in some particular situations. Usually this approach seems to be working fine to create ...
0
votes
1
answer
112
views
How to create, use and backup android signing keys without trusting the computer?
I did a lot of research on how to securely create, use and backup android signing keys (when using Google Play Signing is not an option). The best option seams to be a Yubikey or a Nitrokey HSM 2 and ...
0
votes
1
answer
114
views
Is my PGP key which I uploaded to sync.net compromised?
I just accidentally uploaded my PGP key in unencrypted format to rsync.net. As far as I know, nobody but me has access to the account. Is my key compromised?
2
votes
1
answer
1k
views
Is Synology's Active Backup for Business Destination Encryption Secure or Snake Oil?
Synology's Active Backup for Business has a feature for Destination Encryption which only seems to work with BTRFS. It works so that you have to set it up when creating the BTRFS storage. At this ...
1
vote
1
answer
892
views
Good checksum algorithm for backup / cloud sync system
I am writing a cloud backup system, and want to use a checksum to know if a file has been modified, and accordingly sync it with the server.
This question shows that xxHash is super fast, and this ...
1
vote
2
answers
298
views
Storing backup keys (2FA) for online accounts
So I spent the day looking for a good solution of storing the backup keys or the 2FA codes and can't seem to find a convenient way for me, many people have different takes on this, so far I found 2 ...
0
votes
1
answer
119
views
Does keeping a flash drive in my computer all the time expose it to ransomware attacks?
I keep my laptop backed up using Google Desktop. It's how I keep my things like notes, pictures, etc., backed up. I recently have been reading about ransomware attacks increasing and I wanted to ...
0
votes
2
answers
295
views
Why are multi-billion-dollar companies failing to create ransomware-proof backups?
We keep hearing of big enterprises (Garmin, Edeka) being taken out of business for days or weeks, due to ransomware encryption attacks.
One would assume that it can't be that hard to create versioned ...
2
votes
0
answers
183
views
Is "drag-drop files" computer backup sufficient to avoid most malware/ have all my files?
I'm debating dragging all my files onto an external hard drive manually - rather than a time machine backup - and then pulling over any specific files I need if I ever need them.
Afterwards, I'll ...