On Mar 17, 2008, at 5:31 PM, Sebastian Petruczynik wrote:
> Hello!
> I have the question to you in relation to the security.
>
> Let us assume the hypothetical situation that somebody is breaking
> into
> to the workstation on which the backup is being done.
> There is a configuration file of t
Hi,
17.03.2008 22:31, Sebastian Petruczynik wrote:
> Hello!
> I have the question to you in relation to the security.
>
> Let us assume the hypothetical situation that somebody is breaking into
> to the workstation on which the backup is being done.
> There is a configuration file of the bacula
Hello!
I have the question to you in relation to the security.
Let us assume the hypothetical situation that somebody is breaking into
to the workstation on which the backup is being done.
There is a configuration file of the bacula client in which the password
of the bacula storage is there aft