Brian Cuttler wrote:
I looked though the archives but didn't see anything about
"encryption and tape", I've seen articles on encrypting the
network traffic but that isn't the task we're looking at.
We have some potentially sensitive data and this seems like
a possible way to make sure that it stays private - vs of
course the standard mission of making sure we can get it back
incase something happends to the on-disk bits and bytes.
Are their hooks for this ?
Anyone done it yet ?
Long ago, I bookmarked this page:
http://security.uchicago.edu/tools/gpg-amanda/
but I never tried it myself...
--
Paul Bijnens, Xplanation Tel +32 16 397.511
Technologielaan 21 bus 2, B-3001 Leuven, BELGIUM Fax +32 16 397.512
http://www.xplanation.com/ email: Paul.Bijnens AT xplanation DOT com
***********************************************************************
* I think I've got the hang of it now: exit, ^D, ^C, ^\, ^Z, ^Q, F6, *
* quit, ZZ, :q, :q!, M-Z, ^X^C, logoff, logout, close, bye, /bye, *
* stop, end, F3, ~., ^]c, +++ ATH, disconnect, halt, abort, hangup, *
* PF4, F20, ^X^X, :D::D, KJOB, F14-f-e, F8-e, kill -1 $$, shutdown, *
* kill -9 1, Alt-F4, Ctrl-Alt-Del, AltGr-NumLock, Stop-A, ... *
* ... "Are you sure?" ... YES ... Phew ... I'm out *
***********************************************************************
|