The backup is necessary because when it comes to important information, it’s crucial for businesses to make sure that their data is protected and backed up in the event of an emergency. But unfortunately, today only about 50% of small and medium-sized businesses are confident that their data is being backed up properly. And many times they feel as if they lack with their technical experts or equipment to back up their critical data properly. But the truth is that disaster waits for no one and it can happen at any time and in any form. Even something as harmless as accidentally dropping an important hard drive can throw business into a tailspin. Regardless of the type of disaster that may occur to a business, you as a company may very well experience one. That’s where data backup comes into play. It also recommended taking a backup when you are performing any configuration changes in the server.
The main purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. Because if there is a failure in the primary failure then it will result in hardware or software failure, data corruption or even human-caused event with malware attack or deleting the data accidentally. By having backup copies it allows data to be restored at any point of time which will help the business to recover from an unplanned event.
Moreover storing the copied data on a separate medium is more critical to protect against the primary data loss or corruption. The alternate medium can be in the same location as the primary data or at a remote location. The possibility of weather-related events may justify having copies of data at remote locations. For best results, backup copies are made on a consistent, regular basis to minimize the amount of data lost between backups. The more time passes between backup copies, then the more potential for data loss when recovering from a backup. Retaining multiple copies of data provides the insurance and flexibility to restore to a point in time not affected by data corruption or malicious attacks.
What is SSH?
Secure Shell which is commonly known as SSH, it is most commonly used by Linux Hosting server and it is a protocol that is used to login to the server in a secure way
SSH is a more secure network connection when compared to FTP, hence it is recommended to take backup using SSH, and Installing and Managing applications through the command line, using SSH you can very quick Live Edit and save the files, though no need of downloading it to the Local system.
Note:
In shared hosting, you will be having a restriction for all your access. Hosting providers will set a limit and restriction as per their plans or their terms. And also in few cheap hosting plans you will not get SSH access.
Step 1: To log in to your computer from a Unix-like machine, go to a command-line and type:
ssh <username>@<computer name or IP address>
Example:
ssh root@donamain_name.com (or) ssh
This email address is being protected from spambots. You need JavaScript enabled to view it.
document.getElementById('cloak54877589670d2b419f6c823357f826e8').innerHTML = ''; var prefix = 'ma' + 'il' + 'to'; var path = 'hr' + 'ef' + '='; var addy54877589670d2b419f6c823357f826e8 = 'root' + '@'; addy54877589670d2b419f6c823357f826e8 = addy54877589670d2b419f6c823357f826e8 + '11' + '.' + '12' + '.' + '11' + '.' + '12'; var addy_text54877589670d2b419f6c823357f826e8 = 'root' + '@' + '11' + '.' + '12' + '.' + '11' + '.' + '12';document.getElementById('cloak54877589670d2b419f6c823357f826e8').innerHTML += ''+addy_text54877589670d2b419f6c823357f826e8+'';