abernal's blog

Chapter 37. Backup and Recovery Methods

Objectives

  • Identify and prioritize data that needs backup
  • Employ different kinds of backup methods, depending on the situation
  • Establish efficient backup and restore strategies
  • Use different backup utilities, such as 
    • cpio
    • tar
    • gzip
    • bzip2
    • xz
    • dd
    • rsync
    • dump
    • restore
    • mt
  • Describe the two most well known backup programs
    • Amanda
    • Bacula

Why Backups

  • Data is valuable
  • Hardware fails

Chapter 36. Pluggable Authentication Modules (PAM)

Objectives

  • Explain the basic concepts that motivate the use of PAM
  • List the steps involved in the authentication process
  • Use and modify PAM configuration files
  • Know how to interpret PAM rules and create new ones
  • Apply LDAP to use and administer distributed directory services over the network

PAM: A Unified Approach to Authentication

In order to unify the authentication mechanism, the library

​libpam

​Is needed so that most applications can exploit it in order to perform the authentication process.

Pages

Subscribe to RSS - abernal's blog