After I have done a research on the web I have found that the best method is by using LVM. We will need to lock (temporarily) the tables, flush the changes to the disc, do a LVM snapshot of the directory that contains the MySQL data and unlock the tables again.
When I tried to make a radius based authentication system with our Cisco Wireless Control System (WCS) I was hit by the lack of documentation of this feature. The only valid links I have found is this one:
It is pretty old (Dec 12, 2007) & it did not fitted entirely with my new WCS installation. And as a result I made this one so anybody else could cover the holes. Continue reading
I was reading on Softpedia today that the number of infected websites almost doubled in the second quarter of 2010 (http://news.softpedia.com/news/Number-of-Infected-Websites-Almost-Doubled-During-the-Second-Quarter-156591.shtml).
So I was thinking about some methods on how someone can easily scan a web address and I have found some addresses that one can visit:
Yep! It finally strike them that it does not matter how safe you make a system (not that Windows is the safest system around – but it’s over Apple for example http://news.softpedia.com/news/Macs-Are-Probably-Easier-to-Hack-than-Windows-PCs-Notorious-Hacker-Says-155507.shtml ) the human that uses the system will finally have the final word!