READ MY BLOGS
Cloud Storage Vs Cloud Backup: What’s The Difference?
Did you know that over 100 zettabytes of data will be stored on the cloud by the year 2025? 1 Cloud...
How to Detect Malware in a MySQL Database
A malicious user can find vulnerabilities that will exploit an organization's MySQL database. Thus,...
How to Get Started with Amanda Rapid Installer
This year Zmanda announced Amanda Enterprise Edition 3.6. With that new edition, upgrades came to...
5 Reasons Open Source Backup is Ideal for the Education Industry
Open source backup is ideally suited for the education industry. Just like other organizations, s...
Check Out the 13 New Linux Versions Supported by Zmanda
Following the 3.6 release, we have updated our Linux clients to support new Linux operating syste...
Oops, I Deleted My MySQL Binary Logs
There are times when we are exhausted because of a long day and we end up making mistakes, which en...
Universities: A New Target for Ransomware
Ransomware is a form of malware that requests payment in currency or bitcoin that hackers demand ...
How To | Reset Your Zmanda Admin User Password
Amanda Enterprise (AE) is one of the products of Zmanda. It facilitates the backup of File System...
How To Manage Exponential Data Growth And Data Loss
Data growth and data loss are two vital things to understand; especially in relevance to data backu...
The Impact of Ransomware on Healthcare: A Case Study
In the IT industry, ransomware and healthcare are two words often seen side by side. The reason? He...