Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This area is for common standards across operating systems and has more in depth details about the why we use them.

Passwords

Algorithm

For medium scale systems, we select a standard password and then append an algorithm to all our passwords based upon what is being protected. This seems to be a good compromise which prevents password overload.

...

Btr33s.Fi

Between Environments We use the same principle between environments but make sure to use a different base password. IST, QAT and Production, use a distinguisher. That distinguisher also helps to prevent accidents such as deleting files in the wrong environment. In some cases the password can be used to remind the person about what the server is for by using the first letter of whether it is production or uat and the first letter of the main purpose of the serverIn this case, we put add to as a first letter,

IST = iBtr33s.Fi
QAT = qBtr33s.Fi
Production = Btr33s.Fi 

I tend to not have a distinguisher in production to keep things simpler there.

Folder Backup

In addition to version control it is often useful to backup folders. Especially since we tend to build self-contained applications.

...

  • 2011-01-20 - the date, yyyy-mm-dd ensures the ls listing is sort-able
  • version - references a version for the release
  • folder - specifies what folder the backup should be restored to
  • bck - the key we have chosen to make searching for backup easier

File Backup

With file backups the recommended approach is to keep any changes in source control and this should be the primary approach.

...

Code Block
welcome.2011-01-20.v0.0.bhitch.before_custom_java_set.bck.jsp
 
# If the change is simple then it can be,
welcome.2011-01-20.v0.0.bhitch
 
# If it is one-time change to the original file by the serveradmin account I have started to use,
welcome.ori
Note

Sometimes we want to retain the original file extension to prevent security breaches. For example, renaming a .jsp to .bck would allow attackers to view the source code of the backup file. However, in some cases you want to ensure that the file is never used. In that case, use *.jsp.bck. The key is to have the bck so searches and filters can easily find backup files.