Should I do daily backups of my site to overcome any hacking that could happen?

1 Answer

Answer :

Today many website owners find they have issues with spam or being hacked. This can really damage a website and the downtime can destroy the site. People find it hard to maintain a site and keep it up and running. The hosting provider will do all they can to keep your site up and running. However, they don't do a backup daily on your site. If you have an issue with your website, you'll need to rely on the hosting company to install their latest backup. This could mean data loss and information that was posted on the site before the last back up was performed. Therefore, it is basically up to you to make a site backup to ensure that you can reinstall your site from a backup and lose the least amount of data as possible. If you do a site backup each evening and your site has been attacked, you can ask the hosting company to restore your website from your own backup. When signing up with a hosting company, it is wise to find out how often the hosting company will make a backup of your website. This will give you a good idea of the current backup on your website. If the backups are made ever 5 days, you'll understand that your data restored to the site is 5 days old and you'll have a lot of work to do to fix or correct these problems. However, if you had a backup from the day before, the hosting company could use your personal backup to restore your website.

Related questions

Description : Have you lost any files that you could have prevented with backups in the last year? Please say also if you haven't. This is kind of a statistic. Feel free to share horror stories. I've been there. Thanks :)

Last Answer : I haven’t but I work in the computer industry and know a lot of people who have. Hard disk failure is the usually the cause, but back in the days of floppies I knew someone who was keeping their backups “safe” by sticking them to a fridge with fridge magnets!

Description : Is BitLocker disk encryption compatible with online/offline backups?

Last Answer : answer:Are you completely settled on Bit Locker? it was developed by Microsoft and is almost all proprietary (not open source) software. Microsoft has worked with NSA and other organizations in the past. ... to make to you - just that BitLocker is somewhat suspect from a security point of view.

Description : Why are my hourly 'Time Machine' backups so HUGE!

Last Answer : Are you using a program like Parallels, that stores things in a huge file? There are a few other programs like that out there, too. You need to exclude those files. I’ll see if I can find the link I read a couple of years ago about this, and if so I’ll post it.

Description : I've been using Backup on my Mac to back up my home folder. It has been putting these backups on my hard drive. Now I want to put all my backups on my Seagate external drive. Can I safely delete the backups that are on my hard drive since they're taking up 80 GB of space?

Last Answer : Plug the seagate in and it will ask you if you want to use the drive for time machine. Say yes, wait until it does a backup then delete the backups on your hard drive.

Description : What's best: CCC or SuperDuper for bootable backups on Leopard?

Last Answer : answer:CarbonCopyCloner is free. SuperDuper is $27.95 for full functionality. I would tend to assume that any slowness perceived would be a function of how much data was in the incremental change, as ... than just the software. Under the covers, many of those are very similar in how they operate.

Description : If I relocate a Backups.backupdb file from one Time Machine drive onto another blank drive, will the Mac simply continue backing up to the volume as normal?

Last Answer : answer:oooh, good question, can’t test it at the moment, im not sure if time machine also identifies the volume of the drive, i’d have to get back on that one, currently not at home i mean, i could relocate it for you on the fly and test, i started fresh so i don’t care if it gets lost

Description : Making backups, keeping passwords and having access control are used for ………….. (a) Data security -Technology

Last Answer : (a) Backups, access authorised are the techniques to secure data from damage and getting lost.

Description : I will live alone but I do not understand the energy reserves. How it goes? Do I pay in advance or how is it? Thanks Minda

Last Answer : Well, you pay an amount every month as a deposit. A bill will be made at the end of the year and if you have an overpayment, they will refund your money.

Description : Do you do regular backups of your main hard drive and any drive you store data on?

Last Answer : This is not my job, but sometimes I lost my important data, so I once decided to make a copy and save elsewhere. This was a fine point as this stores my important data which I need to use later. ... So the saved data is helpful for me. I have plan to buy Linux laptop next to overcome this problem.

Description : What is the difference between online and offline backups? (for DBA

Last Answer : A hot backup is a backup performed while the database is online and available for read/write. Except for Oracle exports, one can only do on- line backups when running in ARCHIVELOG mode. A cold backup is a backup performed while the database is off-line and unavailable to its users.

Description : What are the different kind of export backups?

Last Answer : Full back - Complete database Incremental - Only affected tables from last incremental date/full backup date. Cumulative backup - Only affected table from the last cumulative date/full backup date.

Description : How does one do on-line database backups? (for DBA

Last Answer : Each tablespace that needs to be backed-up must be switched into backup mode before copying the files out to secondary storage (tapes). Look at this simple example. ALTER TABLESPACE xyz ... files while in backup mode. This will lead to excessive database archiving and even database freezes.

Description : How does one do off-line database backups? (for DBA

Last Answer : Shut down the database from sqlplus or server manager. Backup all files to secondary storage (eg. tapes). Ensure that you backup all data files, all control files and all log files. When ... at a convenient time, switch your database into ARCHIVELOG mode and perform hot (on-line) backups.

Description : What is the benefit of the Networking? A. File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above

Last Answer : D. All of the Above

Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is an example of an unmanaged storage utility set up to do automated backups? a) XDrive b) OmniDrive c) FreeDrive d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following can be used for reducing recovery time? a) Automatic failover b) By taking backup on a faster device c) Taking multiple backups – one in same location, another at different location d) All of the mentioned

Last Answer : All of the mentioned

Description : Will RMAN takes backups of read-only tablespaces?

Last Answer : No

Description : What is the recommended method to make backups of a RAC environment?

Last Answer : RMAN to make backups of the database, dd to backup your voting disk and hard copies of the OCR file.

Description : What is the most important requirement in order to use RMAN to make consistent hot backups

Last Answer : Your database has to be in ARCHIVELOG mode.

Description : Which one of the following statements regarding enzyme inhibition is correct? (a) Competitive inhibition is seen when a substrate competes with an enzyme for binding to an inhibitor protein. (b ... large amount of substrate. (d) Non-competitive inhibitors often bind to the enzyme irreversibly.

Last Answer : (b) Competitive inhibition is seen when the substrate and the inhibitor compete for the active site on the enzyme

Description : A Solution to overcome the challenge to support a large number of application service consumers from around the world, cloud infrastructure providers (i.e., IaaS providers) have established data ... ) Global exchange of cloud resources b) Resource provisioning c) Cloud security d) Resource sharing

Last Answer : Global exchange of cloud resources

Description : What will happen if I do 100's of situps daily without taking breaks?

Last Answer : Umm. I do about 300 a day.. All at once, and then stretch at night. I've been doing it for a month and already seeing a bit of improvement. Also, I do this.. http://www.youtube.com/watch?v= ... starting out, and every week or so take a new picture. You'll be able to tell the results that way.

Description : You can become moody by simply switching on night bulb daily. How can this happen ? -Biology-10

Last Answer : Night bulb reduces the secretion of melatonin hormone. Melatonin controls our day-night or circadian rhythm, healthy digestive and immune system, sexual cycle and moods. A reduced secretion causes insomnia and mood changes besides affecting health of our digestive and immune system.

Description : Brad stared through the dirty soot-smeared window on the 22nd floor of the office tower. Overcome with depression he slid the window open and jumped through it. It was a sheer drop outside the building ... nothing to cushion his fall or slow his descent, how could he have survived the fall? -Riddles

Last Answer : Brad was so sick and tired of window washing, he opened the window and jumped inside.

Description : Is there a good site or app for tracking daily events?

Last Answer : You didn’t indicate what you wish to use the app on (android, iPad, etc.).

Description : Does anyone know of an inspirational site that is great for daily living?

Last Answer : I use this one. http://www.bestinspiration.com/index.php3?uid=202448 Not interactive but great choices.

Description : In a 40-day period, at least one bear was observed by a camper in a designated camp site on 28 separate days. According to this information, what is the daily frequency of bear sightings (in which at least one bear is observed)?

Last Answer : 28% (apex)

Description : How do I work at Earningspoint ? Earningpoint Bangladeshi PTC site. It has been paying for a long time. About 36000 people are working here . I can earn 25-30 rupees daily. But I do not know how to earn more money if I work.

Last Answer : Sorry this is not possible. Because if you continue to work here, at one time the credit decreases at an unusual rate. So you can't earn more. But there are two more sites like Earnings Point like http ... 10685 can work on sites. As a result, you can earn money by working together on all the sites.

Description : In a 40 day period at least one bear was observed by a camper in a designated camp site on 28 separate days. according to this information what is the daily frequency of bear sightings?

Last Answer : 0.7

Description : What site are good for daily recipes?

Last Answer : You can find daily recipes to inspire you at the following websites...allrecipes.com/ or at www.recipedujour.com/ or simpledailyrecipes.com/ I hope this helps you....good luck.

Description : Is it possible that PETA or the Vegetarian Society or some similar group is responsible for hacking the beef producer yesterday?

Last Answer : I don’t see that as within their capabilities or within their MO. I blame Canada – just kidding!

Description : What is the action you are anticipating regarding hacking by Russia?

Last Answer : nothing

Description : Any ideas on how my daughter's ex keeps hacking her face book account?

Last Answer : Police will deal with it!

Description : What are your greatest hacking exploits?

Last Answer : Does using Astroglide to lube a lizard stuck in a flower pots hole count?

Description : Gary McKinnon's extradition to the USA on computer hacking charges has been blocked by the UK's Home Secretary. Any thoughts on this from the Fluther community?

Last Answer : Maybe he's also a paranoid schizophrenic conspiracy theorist that gets messages from his dead aunt Lulus teddy bear. So what? Regardless of his mental health he needs to suffer the consequences of his ... whatever they have done, wherever they have done it, in the order the crimes were perpetrated.

Description : What are some movies about computers and hacking?

Last Answer : Sneakers Fun movie; all-star cast. It was sort of sad watching Gandhi play the villain though.

Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?

Last Answer : This is not a question.

Description : How did someone manage this hacking/identity theft and what else can we do about it?

Last Answer : Someone was arrested after stealing my identity, and cashing 2 checks in Georgia that nearly reached $10,000. The person who did it was a Bank of America employee, who had access to all my ... could have been anyone. A former IP person at your husbands work would easily have all that information.

Description : What is the appeal of hacking?

Last Answer : answer:It's a challenge. Like with any skill, you learn it and want to apply it and use it, then you feel you're pretty good at it, so you want to hone it more and try to take it to the next ... most famous hackers said he hacked into things just to see if he could do it. It sounds like such a rush.

Description : What do you think about anonymous hacking sony?

Last Answer : Was it done by 4chan?

Description : Can anyone walk me thru the steps of hacking Samsung Behold 2 and installing android 1.6?

Last Answer : answer:Well, from what I see, it already runs Android. What I really want to know is why you would want 1.6 on it rather than 2.2. Care to explain?

Description : Is hacking for the well being of someone a good thing to do?

Last Answer : answer:No. You should fix whatever damage you did, and then ban yourself from the internet.

Description : When people say that their Facebook or Myspace "was hacked into"... what is the usual cause that led to the successful hacking?

Last Answer : Usually if it’s hacked, it’s by a friend. Sometimes friends tell each other a bit too much, most of the time friends stop liking each other and this password gets passed on to other people. As far as it getting hacked by a random. Well, I’m not sure.

Description : Are people hacking into my computer?

Last Answer : Stop downloading “stuff” especially if you admit that you’re technology illiterate. It’s most likely slow cause of all the junk you have.

Description : What does "Hacking Education" mean?

Last Answer : It is simply the title of the conference. “hack” can mean to cut awake to make clear, like hacking a path through the forest. My guess is that it is referring to clearing the clutter from education, seeing what it really is, and making the necessary changes.

Description : Is email hacking illegal?

Last Answer : Well considering it’s illegal to read someones mail without consent, I’m guessing the same is applied to email. I don’t know the exact law you are breaking by doing it, but I’m sure a lawyer could find something.

Description : What is the best anti-virus/anti-spyware/anti-hacking program (free or not free) out there?

Last Answer : They are all very very similar, all of the big guys (Trend, Symantec, Macafee) collaborate on their virus definitions to lower development costs and to speed up the reaction time to outbreaks. The main ... computer I would simply find one that was on special and get it on the cheap. Cheers! Mike

Description : What is the best anti-virus/anti-spyware/anti-hacking & firewall program (free or not free) out there for APPLE MAC?

Last Answer : OSX. There are still 0 confirmed viruses for Macs running OSX. There are a couple Trojans, apparently, but you’d have to go looking for them to find them – and be pretty stupid to actually get infected by them. So, I wouldn’t consider it a problem worth worrying about on a Mac. Enjoy!

Description : How can I change the picture ( apple logo ) when my iPod restarts without hacking?

Last Answer : No.