Backup VSS Engineering & Build VSS Directory security Architecture

Source: Internet
Author: User
Tags ini

First, use the backup file. When the SSA is recovering:
1. If you originally made a backup of the archive all, and did not delete the original project.
Then: "Permanently delete" the original project again for recovery.

2. If the original archive this version and older and you confirm that you want to revert to the original
Then: "Permanently delete" the original project again for recovery. (if there are documents in projects that are shared with other projects, the latest version is not overwritten)

Note:
1. The 2nd method of backup Method (archive this version and older) is not recommended, unless you want to save hard disk space, then the original version after the backup to remove this option to hit, so as not to restore the trouble.
2. "Permanently delete" a project can be done in VSS explore or in VSS Administrator. See VSS Online Help

Second, the VSS Data Directory Security principle explanation
Follow the steps below to establish a relatively "secure" VSS Data protection system
1. Set a security folder parallel to the database directory (for example, the library in D:/doc/vss/aaa, the directory is set to D:/doc/vss/lock), this directory is hidden, the normal group of members of the permissions are set to read-write but not column directory. The directory cannot be accessed directly through the browser to prevent accidental deletion.
The directory share of the 2.VSS library is the same, but only the Srcsafe.ini file is retained, and everything else is moved into the security folder described above. (Create D:/DOC/VSS/LOCK/AAA to accommodate the original AAA files and subfolders)
3. In file Srcsafe.ini, point the path and file to the actual content (plus the relative path, such as the original Data_path = data, and now change to: /lock/aaa/data, other analogy).
Srcsafe.ini to make a backup, to recover after damage.
4. Add a random filename such as (asdhfn3.7d) to the above security directory to monitor the read and write of the file (see if there is unauthorized access)
5. This security system does not eliminate the hardware failure and other people with administrator permissions to destroy the situation, so regular backup or need
6. This method is personally developed by me, not through the external safety inspection. The introduction to everyone caught dead.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.