A utility like mysqldump is very useful for backing up MySQL data and table schema. However, backups are usually made only once a day or at some other regular interval. If data is lost on your system several hours after the last backup is completed, you may not be able to recover it. There are a few methods by which you can continuously protect data. One method that you can use to be able to recover interim data is to use binary logs. A binary log will record all SQL transactions on a server as they are executed. Some administrators try to minimize any logging because of concerns about server performance. However, on average, binary logging will slow a server by only one percent. In return, though, it allows for up to the minute data recovery.Read the full article
Chris, Los Angeles' CSS & ActionScript guru, successfully cannonballed into web development in the late 90's. Always caught up with the latest in Flash, Dreamweaver, Fireworks, and XML, Chris authored premium articles for the largest Dreamweaver/Flash community (www.DMXzone.com) and produced WebDevDesign (iTunes featured), a popular Web Design & Development Podcast. Somewhere, Chris finds time to run an authorized Adobe user group focused around open source and Adobe technologies. Being a big community leader, Chris Charlton remains a resident faculty member of the Rich Media Insitute and lends himself to speak at large industry events, like JobStock, NAB, and FITC Hollywood.
Brain cycles from Chris are always Web Standards, Flash Platform, and accessibility.
Share this Article
Other SQL and Databases
| Relational Databases for Dummies |
Properly design your database to store your app’s information
| MySQL – Deletion History Part 1 |
Get the appropriate tables in place to preform history logging
| Getting Started with MongoDB |
Learn how to create and update databases and records witn MongoDB
| SQL for Beginners |
Start with some basic SQL queries...
| Understanding MySQL for PHP |
| Setting up an Automated Import/Export |
| MySQL - Security, Access Control, and Privileges |
| SQL Injection Attacks by Example |
| MySQL Configuration and Installation |
| Database Security (Common-sense Principles) |