Home The Wired CIO In this day and age people still need to know backups matter

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Another day, another story of someone deleting data and backups too.

Late last week the story emerged of Marco Marsala inadvertantly deleting all his company data, including his customer's websites that he was hosting.

His problem, he claimed, was a mistake in an automated script which invoked rm -rf {foo}/{bar}, but a bug left the variables undefined, thus invoking the dreaded rm -rf / command.

Masala posted a request to the popular ServerFault forums asking for assistance, only to be soundly rebuked because such recovery was not trivial, and it transpired the only backups made were sitting on the same server, in the same disk hierarchy, and thus were deleted also.

Some on the forum questioned just how this could have happened. While it was always a macabre joke over the decades, and entirely possible to do this in times gone past, Linux has evolved the rm command to include a measure of safety precautions.

For the curious, Kyle Kelley decided to see what happened if you actually do run rm -rf / on your Linux system as did Mario Wolczko prior to him.

Now, Masala is now claiming his story was a farce, that he did no such destruction, and that it was all in fact a viral marketing attempt.

It's difficult to know what is and is not truthful in this situation. On the one hand, Linux does require a verbose command-line flag be added if you really want to delete files from the root partition and it seems possibly that Masala's original story was not true.

Yet, on the other hand, it is unclear what possible "marketing" could be gained by making yourself out to be someone who destroys all their client files. Is it a case of mistakingly believing any news is good publicity? Perhaps we could ask former Telstra Operations Chief Greg Winn who famously said Apple had no business in mobile phones and should "stick to its knitting", this quote now surfacing anytime anyone Googles him.

Nevertheless, whether Masala is a fraudster the first or second time, it is a timely reminder that backups must exist, and they must exist on an off-site storage device which is not directly accessible from the equipment it represents.

Consider the hapless case of Jeff Atwood, the very founder of the Server Fault (and Stack Overflow) Q and A site used by Masala who himself lost all his backups because they resided on the same disks as his faulty server.

Or, consider the increase threat of cryptographic trojan/virus attacks which encrypt all a company's file shares rendering them useless unless either a fee is paid for a decryption key, or a backup exists and is available. The best recovery mechanism from CryptoWall attacks is a good, reliable, recent and importantly, offline, backup.

Even if you're just an individual, and not an enterprise, backups still matter. Consider the varied cloud storage options which can help you out.

Backups matter. In the immortal words of Jeff Atwood - who perhaps should have listened to himself - "Shut up. I know things." Don't complain about backups. Do it.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

David M Williams

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect