Thanks, Sam. I thought that was probably the
case. Can you tell me what this file does? I'd like as much info as possible
in order to justify any file exclusion to the powers that be.
Glenn
"Coco, Samuel (Cont, ARL/CISD)" <scoco AT arl.army DOT mil>
07/30/2004 02:38 PM
To: Glenn Summers/AARPHCO/US@AARPHCO
cc:
Subject: RE: [Veritas-bu] Anyone familiar with
security\tmp.edb
No it is not something that is needed.
Normally anything with a tmp can be excluded.
Sam Coco
-----Original Message-----
From:
veritas-bu-admin AT mailman.eng.auburn DOT edu on behalf of Summers, Glenn
Sent: Fri 7/30/2004 1:27 PM
To:
veritas-bu AT mailman.eng.auburn DOT edu
Cc:
Subject: [Veritas-bu] Anyone
familiar with security\tmp.edb
I'm performing a network backup on
several servers with different functions.
(db testing, web server, etc.) This
file, c:\WINNT\security\tmp.edb and its
companion edb.log, are often, but
not always skipped. I'd like to exclude
them from the backup if they are not
essential to the servers' operation. Is
this file one which would be
required for a restoration in case of a server
crash?
TIA,
Glenn
This communication, including
attachments, is for the exclusive use of
addressee and may contain
proprietary, confidential or privileged
information. If you are not the
intended recipient, any use, copying,
disclosure, dissemination or
distribution is strictly prohibited. If
you are not the intended recipient,
please notify the sender
immediately by return email and
delete this communication and destroy all copies.
_______________________________________________
Veritas-bu maillist -
Veritas-bu AT mailman.eng.auburn DOT edu
http://mailman.eng.auburn.edu/mailman/listinfo/veritas-bu
This communication, including attachments, is for the exclusive use of
addressee and may contain proprietary, confidential or privileged
information. If you are not the intended recipient, any use, copying,
disclosure, dissemination or distribution is strictly prohibited. If
you are not the intended recipient, please notify the sender
immediately by return email and delete this communication and destroy all
copies.
|