Questions tagged [data-protection]

22 questions
6
votes
3 answers

Best way to 'harden' embedded ext4 file server against unexpected loss of power?

First, a little background: my company makes an audio streaming device that is a headless, rack-mounted Linux box with a Solid State e-SATA drive attached. The drive is formatted with ext4. The users can connect to the system using Samba/CIFS to…
Jeremy Friesner
  • 1,311
  • 1
  • 14
  • 25
6
votes
2 answers

Is continuous backup workable for shared flat-file databases?

I'm talking about a dataset containing hundreds of DBF-format data files in a shared location, some or all of which may be open or locked by multiple network users, and Microsoft's Data Protection Manager replicating every two hours. Can the…
Alan B
  • 503
  • 5
  • 15
5
votes
1 answer

How can I encrypt my SSD but still boot unattended (linux)?

I have a system that displays video from a camera feed with an overlay, and it must boot without any user intervention (the quicker the better). However, these systems will be in the hands of customers so we are worried about…
Chriszuma
  • 151
  • 1
  • 4
3
votes
2 answers

Emulate EWF effects on Linux

Recently, for an embedded project, I was asked to emulate on Linux the effects of the Enhanced Write Filter (EWF) of Windows XP Embedded. In particular, I need a sort of EWF for: avoiding to write too many times on disk (we use CFs); protecting…
3
votes
3 answers

Data leak prevention and HTTPS issues

I've been looking at several data leak/loss prevention suites but, in their documentation, I'm unable to find how they treat HTTPS. One of the 'leakage vectors' is sending information to webapps through HTTPS. In which case, the only way to detect…
chmeee
  • 7,270
  • 3
  • 29
  • 43
3
votes
1 answer

Data Protection Manager System Protection Backups Failing

I'm just starting to setup DPM 2010 in a test environment with a Domain Controller and a File Server. Everything seem to be working fairly well and I can get all of my backup jobs to succeed except for the "Computer\System Protection" backups. Both…
TrueDuality
  • 1,844
  • 5
  • 27
  • 37
3
votes
2 answers

Secure corporate document storage

One of the more interesting arguments currently rumbling around the office is the lack of backup for the HR person's laptop. This contains a copy of the contract and other HR type info on every member of staff we've got working here. It's certainly…
Tom O'Connor
  • 27,440
  • 10
  • 72
  • 148
2
votes
1 answer

How to prevent users from copying or printing files?

The head of my company is concerned about data leak. In order to strengthen the protection of sensitive data I have to limit ability to copy and print certain files from the employess notebooks. I thought about using True Crypt so that copied files…
B14D3
  • 5,110
  • 13
  • 58
  • 82
2
votes
3 answers

What is the point of BlackBerry encryption on the devices?

Our BlackBerry servers require a password to be set on the device, all traffic between the devices and the servers is encrypted, and in addition, we have set the devices to be encrypted when locked. Encrypting the content on the devices when locked…
Sam Meldrum
  • 273
  • 4
  • 12
1
vote
2 answers

What is the default registry location that is used for the registry key ring for ASP.NET Core Data Protection system

TL;DR; In which registry hive does the ASP.NET Core Data protection system store it's keys when you are running your app in IIS with a worker process account without user profile It looks like it's reusing the hive used by ASP.NET…
1
vote
1 answer

GDPR - Server access logging at the point of authentication

In the UK are are undergoing a large reform of data protection policy known as GDPR. For one client we need to beef up our auditing on access to certain servers by our support and development team. I want to know not only who logged in to a servers…
Damo
  • 405
  • 3
  • 7
  • 17
1
vote
1 answer

Veeam backup and copy jobs reorganization to resolve out-of-space issue

I have two sites, one hosting the Veeam Management Server, the other hosting a Proxy. Both server have proxy and repository roles, and both are running one job to backup all production VMs of on-site ESXis. Also, they are both running Copy jobs to…
cJu
  • 45
  • 1
  • 1
  • 8
1
vote
5 answers

How to protect data from being stolen?

We have Ubuntu Server with Subversion installed on it. It makes automatic backups every week. And it doesn't connected to the Internet. Seems all OK with security. But one thing concern me — this server is in the room that accessed by a lot of…
1
vote
1 answer

Suggestions for Scheduled Tasks to call OSQL without hard-coding cleartext password

Can anyone think of any techniques where i can have a Windows scheduled task run OSQL, but not have to pass the clear-text password with cleartext password being in the clear? E.g.: >osql -U iboyd -P BabyBatterStapleCorrect Assumption: No Windows…
Ian Boyd
  • 5,131
  • 14
  • 57
  • 79
0
votes
1 answer

ServeRAID M5110 - does enabling T10-PI Data Protection require recreating all raid arrays?

The raid controller and drives seem to support T10-PI Data Protection information ('Type2'). It is currently disabled on the controller, and the MSM Ui doesn't show an option to enable it, but it is there in StorCLI.exe. Let's say I enabled this…
theultramage
  • 393
  • 1
  • 4
  • 14
1
2