Secure Remote Backups, Part III
At the end of the previous entry in this series, I mentioned that there were still some things that made the backup system I’d developed less than optimal: The backup files aren’t compressed; Backups should always be read-only, even when the media is mounted, so it’s a lot harder for a virus or user-error to …