How safe is Dropbox and Ubuntu one? Would you store critical files or programs there? Any comments o


Login or Register for Dates, Times and to Reply

 
Thread Tools Search this Thread
The Lounge What is on Your Mind? How safe is Dropbox and Ubuntu one? Would you store critical files or programs there? Any comments o
# 1  
How safe is Dropbox and Ubuntu one? Would you store critical files or programs there? Any comments o

How safe is Dropbox and Ubuntu one? Would you store critical files or programs there? Any comments on the guarantee that the two companies provide and on the technology used for encryption?
# 2  
I'm sure that they are reasonable and I would not wish to disparage or defame them in any way, especially not in a slanderous way. I have no experience of them.

The question you need to ask yourself is:-
If they were to be attacked and your data copied and/or deleted, would that be a problem?
So, when you break it down further:-
  • Is it commercially sensitive?
  • It is personally sensitive? - e.g. customer details
  • Is it critical to your recovery processes?

These are the things you should consider first. If your data falls into any of these, then I would suggests you need to arrange a paid-for contract with a supplier and store real media with your own encryption and practice the recovery process.

This last point is very important. Imagine assuring the regulator/auditors/government/whomever for years that the backups are all fine only to find that you can't actually restore.


I hope that this gives you something to consider.

Like I said at the beginning, I have no experience of the companies you mention and do not wish this to be considered as defaming or slanderous in any way, but YOU are responsible for your data so you have to consider the risks you might be exposing yourself to, even if these are reputable companies.



Robin
This User Gave Thanks to rbatte1 For This Post:
Login or Register for Dates, Times and to Reply

Previous Thread | Next Thread
Thread Tools Search this Thread
Search this Thread:
Advanced Search

Test Your Knowledge in Computers #67
Difficulty: Medium
IT security or cybersecurity controls are based on a combination of three types of security controls, (1) physical controls, (2) logical controls and (3) administrative controls.
True or False?

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Filtering out comments from COBOL programs

In SCO Unix, I have a working script to give me a list of COBOL (files end in .cbl) programs containing a specific variable ($1) on a line which is not a comment. The output of the first grep will be the full path to a file, a colon, and the contents of the line where this variable is found. ... (3 Replies)
Discussion started by: wbport
3 Replies

2. Solaris

Replace critical files with errors - pam_UNIX_auth.so.1 & fed

I moved my server while it was running. I was in a hurry. Also it's a bare motherboard with drives in a cage sitting basically on their own. Once I realized how badly I had hurt it doing this, I mounted the board in a tower case I repurposed, mounted the drives, power supply etc. Now the... (1 Reply)
Discussion started by: BillyPrefect
1 Replies

3. Shell Programming and Scripting

Writing my public IP to Dropbox, Cronjob

Hello. I want to achieve this: 1.) Finding my public IP. I have this and it works perfectly: wget http://ipecho.net/plain -O - -q ; echo2.) I need to write this in a dropbox folder (let's say /home/myusername/dropbox). 3.) Put this script in a cronjob for repeating this every 10 minutes. ... (2 Replies)
Discussion started by: lozicd3
2 Replies

4. Shell Programming and Scripting

Sed script, changing all C-comments to C++-comments

I must write a script to change all C++ like comments: // this is a comment to this one /* this is a comment */ How to do it by sed? With file: #include <cstdio> using namespace std; //one // two int main() { printf("Example"); // three }//four the result should be: (2 Replies)
Discussion started by: black_hawk
2 Replies

5. UNIX for Dummies Questions & Answers

Are programs like sys_open( ) ,sys_read( ) et al examples of system level programs ?

Are the programs written on schedulers ,thread library , process management, memory management, et al called systems programs ? How are they different from the programs that implement functions like open() , printf() , scanf() , read() .. they have a prefix sys_open, sys_close, sys_read etc , right... (1 Reply)
Discussion started by: vishwamitra
1 Replies

6. Solaris

Async-Signal-Safe versus MT-Safe

Hi, I am Solaris 9 developer and notice that the documentation does not provide a clear notion of the inherent concurrency in routines defined as "Async-Signal-Safe". Routines defined as "MT-Safe" obviously have the best level of concurrency, compared to normal "Safe" interfaces. I have... (1 Reply)
Discussion started by: tristan12
1 Replies

7. HP-UX

Critical files in /etc overwritten EMPTY!

The following files were wiped out - new empty files were left in their place. /etc/inittab, /etc/inetd.conf, and /etc/MANPATH The system is running HP-UX 11i v3 - Mar08. Anyone seen anything like this? Any ideas on a way to figure this out if it happens again or a suggested way to... (9 Replies)
Discussion started by: KEnglander
9 Replies

8. UNIX for Dummies Questions & Answers

How safe is it to remove files(/var/spool/mail)?

How safe is it to remove these spooler mail files. I need to make some room in the /usr directory? Any ideas? thanks (2 Replies)
Discussion started by: larcom61
2 Replies