Sysadmin pilot fish is trying out encryption for his firm’s backups.
“We have a mainframe that runs our core system,” explains fish. “Each night time we again as much as an on-site tape after which make a replica of the tape to go off-site. Couriers shuttle the tape forwards and backwards between the websites every day.”
The apparent place to use encryption is to these off-site tapes, so fish decides to create an encrypted copy of a tape to point out how nicely the method works.
And the encryption course of works superb each time. But when fish tries to decrypt the tape, no knowledge comes out.
After fish spends a number of weeks experimenting, speaking to distributors and rising an increasing number of pissed off, one among his co-workers asks whether or not he has checked the script that generates the copy of the tape.
That appears unlikely to be the issue — the identical script has been used for years — however fish checks the code anyway.
Turns out that, a couple of years earlier than, the corporate swapped out the tape drives for newer fashions — however the script was by no means up to date.
Sighs fish, “For the final a number of years, our off-site copy was by no means made. We had couriers shuttling a clean tape forwards and backwards to the websites, in addition to a alternative schedule in place for a tape that by no means had any knowledge on it.
“I fastened the script, and now the off-site tape is checked commonly.”
Copyright © 2020 IDG Communications, Inc.