File Backups: Self-Hosted vs. Cloud Storage

In the digital age, safeguarding data has become very important. Whether it’s cherished memories, important documents, or sensitive information, losing data can be a major problem for both personal reasons (e.g., irreplaceable family photos) as well as business reasons (e.g., customer data, data breach).

There are two popular ways to backup your files. One, backing up your files to your own hard drives, and two, backing up your files to a remote location (e.g., cloud storage). Which of these two are best for your needs you ask?

In this blog post, I’ll explain the and pros and cons of these two approaches (self-hosted vs. cloud storage) and help you make an informed decision.

 

Self-Hosted Backups

Using your own hard drives for storing your backups provides complete control and customization at the cost of time to setup and manage. Here’s a breakdown of the pros and cons:

 

Pros

  • Total Control: When you store your own backups, you have complete control over the storage environment. You decide the hardware specifications, security measures, and software configurations for your backups.
  • Privacy and Security: Storing backups on your own gives you more control over data privacy and security. You can implement encryption, compression, backup automation (your own automation or paid software) and anything else you may need.
  • Cost Efficiency: Over the long term, self-hosted backups are almost always more cost-effective, especially if you have a large amount of data to back up. If you require more than 1TB of disk space, rolling your own backups is going to be less costly in the long run.

 

Cons

  • Technical Expertise: Setting up and maintaining a proper self-hosted backup environment requires technical knowledge. You’ll want to have a separate computer dedicated to hosting your backups. This will entail needing to manage software updates, security patches, and troubleshoot any issues that arise (e.g., failed backup hard drives; trust me, this will eventually happen in the long-term).
  • Resource Management: You’re responsible for managing the backup server’s resources. This can become complex as your backup needs grow. You will need to have some kind of alert letting you know if a hard drive is near full, so you can plan accordingly.
  • Physical Security: Hosting your own backups ultimately means you are responsible for the physical security of your backups. If anyone can just walk up and steal a backup hard drive, you have greater problems to worry about.

 

Cloud Storage: Convenience and Accessibility

Cloud storage services like Google Drive and Microsoft OneDrive offer convenience and ease of use at the expense of flexibility and control. Here’s a look at the pros and cons of cloud storage:

 

Pros

  • Simplicity: Cloud storage services are user-friendly and require no technical expertise to get started. Most tasks, such as uploading, organizing, and sharing files, are straightforward.
  • Accessibility: Your backups are accessible from any device with an internet connection. This accessibility proves invaluable, especially in situations where you need to retrieve data urgently.
  • Automated Services: Many cloud storage platforms offer automated backups, ensuring that your data is continuously and seamlessly protected without manual intervention.

 

Cons

  • Cost Scaling: While cloud storage is convenient, costs can increase as your storage needs grow. Monthly subscription fees can add up, making it potentially more expensive over time.
  • Dependency: Relying on a third-party service means entrusting your data security and availability to that provider. This can raise concerns about data breaches and service outages. (Encrypting your data on your computer before uploading to the cloud storage is highly recommended.)
  • Limited Customization: Cloud storage services provide a proprietary environment, potentially limiting your ability to customize the storage infrastructure according to your specific requirements.

 

Conclusion

The decision to self-host or use cloud storage for your backups ultimately depends on your individual needs and priorities. If you value control, customization, and have the technical know-how, a self-hosted backup environment might be the right fit. On the other hand, if convenience, accessibility, and automated services are crucial, cloud storage could be more suitable.

In some cases, a hybrid approach might be the optimal solution, combining the control of self-hosted backups with the convenience of cloud storage for redundant backups. Whichever way you choose, remember that the key to effective backup strategies is consistency, security, and regular testing of backups.

Personally, the hybrid approach is my favorite method, since I can quickly restore from my backup, since I have it local, but I have the reassurance that if my local backup gets destroyed (natural disaster, drive failure, etc.), I have (encrypted) copies of my data in cloud storage just in case.

Also, as I previously mentioned, please keep in mind to always (where possible), encrypt your data before uploading your data to the cloud. Otherwise, you risk someone at one of the cloud storage’s data centers snooping through your files.

Click here to view how to keep your files in cloud storage secure.


Posted in Cloud, Computers, Internet and Servers, Security, Software, Tips & Tutorials

Comparison Chart between hMailServer and Postfix

hMailServer is an open source email server for Microsoft Windows. Postfix is an open source SMTP server for Linux, BSD, etc.

Since hMailServer contains an SMTP, POP3, and IMAP server (all-in-one “package”), and Postfix is only an SMTP server (POP3 and IMAP require third-party software), I won’t be comparing anything with hMailServer’s POP3 and IMAP servers.

Note: The chart is meant to show a general overview of the differences between hMailServer and Postfix. More specific features and performance may vary depending on the user’s setup and configuration.

Mobile users may need to manually swipe the table to the left to view all of the chart.

Feature hMailServer Postfix
Open Source Yes Yes
Platform Windows Linux, BSD, MacOS X, Solaris, HP-UX, etc.
Config Storage Supports multiple storage options (e.g. MySQL, MSSQL, PostgreSQL) Supports multiple storage options (e.g. MySQL, LDAP, PostgreSQL)
Administration GUI-based administration interface Command line and web-based administration interface (via third-party software)
Security Supports SSL/TLS, STARTTLS Supports SSL/TLS, SASL authentication, STARTTLS
Scalability Limited scalability (requires third-party software to sync data for a fail-over setup) Limited scalability (requires third-party software to sync data for a fail-over setup)
Ease of use Simple and easy to configure Steep learning curve, but highly configurable
Email Delivery Good performance Good performance
Email Filtering Yes (advanced options via ‘rules’ you can setup to tell hMailServer what to do with individual email messages based upon different conditions) Advanced email filtering options (https://www.postfix.org/FILTER_README.html)
Anti-Spam Yes (built-in & third-party support) Yes (built-in & third-party support)
Program Stability Excellent Excellent
Security Track Record Excellent Excellent
Programming Language C++ (server), C# (GUI) C
Community Support Small community forum Large and active community
Special Notes No longer under active development. However, there are third-party developers that occasionally add to the software, and the software is still perfectly usable in its current state. Under active development
Website
https://hmailserver.com/

https://github.com/hmailserver/hmailserver
https://www.postfix.org/

 


Posted in Computers, Internet and Servers, Software

Simple Ways to Get Less Spam in Your Email

We have all been there. Wake up in the morning and find you have a dozen or so spam emails sitting in your inbox, all mixed in with your legitimate emails from family and business. You may have wondered how you can prevent so much spam from hitting your inbox.

The truth is …there really is no “magic formula” when it comes to fighting spam. Some people seem to never get any spam even if they give their email out to everyone they meet. For others, they seem to have been “blessed” with tons of spam, when they have been very careful who they have given their email too.

Here are some ideas that may help you prevent spam from hitting your inbox. Please remember, none of these ideas have any guarantee that you will not receive any spam.

  • (As mentioned above) Be careful who you give your email out to. Never just hand over your email to just anyone (e.g., an online “signup” form to potentially win a prize).
    • There are several places on the Internet where people collect email addresses to put into lists to sell to spammers. Unfortunately, many of these signup forms look legit and people fall for them, not realizing that they are getting setup to be spammed.
    • Many companies that require your email have good intentions, but their systems may get compromised and their customers’ emails get leaked to spammers. In this case, that is not your fault. Life happens.
    • In addition, your friends’ and family’s email accounts may become compromised at a certain point in time. This will undoubtedly cause their address books to become leaked. You can guess what the hacker will do with all the emails he collects.
  • Use a third-party email spam filter (e.g., SpamAssassin).
    • Some examples of third-party spam filters are: SpamAssassin, rspamd, and Gmail.
      • SpamAssassin is a self-hosted software program. When your email server receives an email, it sends the email to SpamAssassin which then tries to determine if the email is legit. However, SpamAssassin also has quite the learning curve. So, unless you have time to learn how to set it up properly, I would opt to using a commercial third-party spam filter.
        • SpamAssassin can be trained what emails are spam and what emails are not spam.
      • rspamd is another self-hosted software program for filtering email. While not as popular as SpamAssassin, there is no reason to disregard the program, if you want an alternative to using SpamAssassin or another email filter.
      • Gmail has an excellent spam filter. There are people (mainly businesses) who purposely forward all mail to a Gmail account they setup to have Gmail’s system filter out the illegitimate emails. They can do this even if they own their own domain name, and are not using a Gmail email address for their business.
        • Since Gmail is not self-hosted, all your email ultimately gets seen by a third-party. Some individuals and businesses may not be comfortable with this idea.
  • Use a “catch-all” anti-spam system.
    • What a “catch-all” system does is redirect all your email to a “bin” of sorts and lets you – later – review all the email you wish to forward to your email.
    • An example of a program that does this is “Tagged Message Delivery Agent (TMDA)”.
      • You can do a Google search to learn more about it.
    • The only downside to this type of anti-spam is you now effectively have two emails to manage instead of one. You must watch and manage the “anti-spam bin” and you still must monitor your real email. For many people, this would not be acceptable or practical.
  • Use an email alias instead of giving out your real email.
    • This is when you have multiple email addresses that all forward to your real (main) email address.
    • This is like having a forwarding address at the US Post Office.
    • For example, you have your personal email: alfred@example.com.  Now you want to sign up for a new online service, but you do not want to give out your personal email. You setup an alias ad130@example.com and give that email to the online service instead of your actual email. Now anytime the service emails you, the email is forwarded from ad130@example.com to alfred@example.com.
      • In the event the service gets compromised and you start getting spam to ad130@example.com, you can create another one ad250@example.com and continue using the service while stopping the spam that started coming to the other email alias.
    • Unfortunately, there are a couple of problems with this idea.
      • 1. With several email aliases, you must now keep up with all these virtual email accounts, instead of just one (your main email).
      • 2. Unless you are self-hosting your email, in which case you can set as many email aliases as you need, some free email services may not allow you to create 20+ emails for the purpose of forwarding to another email address. It would depend upon the email service’s “Terms of Service” …what they allow and do not allow.

Posted in Computers, Internet and Servers, Software, Tips & Tutorials

List of Free and Public DNS Resolvers

Here is a list I compiled of free and public DNS resolvers you can use. Hopefully this will save you some time looking for an alternative DNS resolver.

Last Updated: August 2022

Name IP Address & Notes
Cloudflare

1.1.1.1

1.0.0.1


No DNS filtering; everything allowed

Cloudflare

1.1.1.2


Filters malware domains; useful if you have a public Internet service (e.g., library, coffee shop)

Cloudflare

1.1.1.3


Filters malware & adult content

Google

8.8.8.8

8.8.4.4


Google Public DNS is purely a DNS resolution and caching server; it does not perform any blocking or filtering of any kind, except that it may not resolve certain domains in extraordinary cases if we believe this is necessary to protect Google’s users from security threats.as of August 2022

Quad9

9.9.9.9

149.112.112.112

2620:fe::fe  [IPv6]

2620:fe::9  [IPv6]


Filters malware domains & DNSSEC validation

Quad9

9.9.9.11

149.112.112.11

2620:fe::11  [IPv6]

2620:fe::fe:11  [IPv6]


Filters malware domains & DNSSEC validation + ECS enabled

Quad9

9.9.9.10

149.112.112.10

2620:fe::10  [IPv6]

2620:fe::fe:10  [IPv6]


No malware domain filtering, no DNSSEC validation

OpenDNS

208.67.222.222

208.67.220.220


Without an OpenDNS account, supposedly it blocks some malware and phishing domains; with an account, you can have much more control over what it blocks and does not block

 


Posted in Computers, Internet and Servers, Software, Tips & Tutorials