By clicking “Accept All”, you agree to the storing of cookies on your device to enhance site navigation, analyse site usage, and assist in our marketing efforts
Essential
These cookies enable our website and App to remember things such as your region or country, language, accessibility options and your preferences and settings.
Analytics
Analytic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Marketing
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.
When you don't follow due procedure, the other party can come back and say you misrepresented the situation and manipulated them into taking X action against their interest.
As a rule, I assume that the other party will 100% take me to court using lies and tears. Then, what I have to do...
When you get something real cheap, know that you're getting something premade. There is one case though where you can get lucky. A good professional may be just starting out in these platforms and they might work for very little just to get going and get a few reviews.
ffox,
1. Storing backups costs money, you can't simply have an older version. Especially if you don't keep it on your own storage, as you seem to advocate (cloud everything!)
2. On the part you quoted me regarding clusters, i said you don't need a cluster.
3. Linux still safer than Windows even...
You speak of "cloud" as if it's some sort of alien technology never seen before. It's the same thing with non-cloud, only designed and organised in clusters so that servers don't have unused resources. That's the only difference.
My way of general purpose security:
0. Know what security is about
1. Linux
2. Never use any "cloud" services (aka "check this box if you're not very bright")
3. Keep everything in my own local file server and my own off-site backup location
4. Communication between machines restricted to keys...