The following section contains information that is needed to configure and run Paranoid Backup.
Paranoid Backup involves a number of principles that need to be understood before it can effectively be used. Please check out the documentation about
the principle of
replicating
backups to other computers for additional security
the
stream architecture
and the different
module types
used in Paranoid Backup
how the
configuration files
of Paranoid Backup look like
some
sample configurations
that demonstrate what you can do
the
terminology
used for Paranoid Backup
which
other backup solutions
might be interesting looking at
Replication
Stream Architecture
Configuration Files
Terminology
Related Projects
Hello Backup
Compression
Multiple operations
Command line parameters
FileSystemReader module
Zipper module
Module Types
Download
Contact
RepositoryWriter module
RepositoryReader module