by Reashad Hossain | Dec 18, 2022 | Networking
RFC 1918 Address Allocation for Private Internets February 1996 3. Private Address Space The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private internets: 10.0.0.0 – 10.255.255.255 (10/8 prefix)...
by Reashad Hossain | Dec 17, 2022 | Security
An Incremental Backup will backup all the files that have changed since the last Full Backup (the first time it is run after a full backup was previously completed) or after an Incremental Backup (for the second backup and subsequent backups) and sets the archive bit...
by Reashad Hossain | Dec 16, 2022 | Security
Shadow files are an exact live copy of the original active database, allowing you to maintain live duplicates of your production database, which can be brought into production in the event of a hardware failure. Data mirroring In data storage, disk mirroring is the...
by Reashad Hossain | Dec 15, 2022 | Security
Power ExcessSpike –> Too much voltage for a short period of time.Surge –> Too much voltage for a long period of time. Power LossFault –> A momentary power outage.Blackout –> A long power interruption. Power DegradationSag or Dip –> A...
by Reashad Hossain | Dec 14, 2022 | Security
The recovery point objective (RPO) is the maximum acceptable level of data loss following an unplanned “event”, like a disaster (natural or man-made), act of crime or terrorism, or any other business or technical disruption that could cause such data loss. The RPO...