Skip to main content

Backup and Recovery

YouUnfortunately, there may have some utterlybe disgusting individualindividuals who attemptswill attempt, and succeedsmost likely succeed in compromising your retro system. Let'sWe becan honest: weeasily understand and appreciate that the retro community recognises there arewill be many known attack vectors in older network stacks. Buffer overflows orand direct access toother known vulnerabilities will be available to anyanyone userwho ofcares thisto system.perform a quick search.

One potential option for us is apathyto andessentially resignationresign yourself to the fact that some people getwill find a kickway outto ofbreak hurtingour others.system(s). MakeTherefore, protecting yourself by making an easy recovery or rollback to a 'Golden Image' of your system.system is a great option.

Be prepared to perform a full recovery of this backup to restage your system. BlueSCSI,BlueSCSI IDEand IDE-to-CF adaptors can be an excellent mechanism for quickly reimagining with removable media and a modern computer to CFtransfer adaptors...dothe whatever is easier. Even discdupe (dd) or tar your data files. You 100% do not want to lose your precious system just because some disgusting clown thinks they are clever using a script written by someone way more intelligent than they will ever be.data.

ide_to_cf.jpg

To conclude this topic, give yourself the best chance of not getting too cut up if you are hacked. Have a clean image ready to reboot to. You can alert the moderators with any evidence of who is responsible. People found to be breaking the terms of use will be disciplined accordingly.