One Minute to Learn about WORM Highlighted

Latest reply: Dec 11, 2019 06:26:17 271 6 8 1

Hi, Guys!

Today, let's talk about WORM. 

Speaking of WROM, what do you think of for the first time? 

Caterpillars? earthworms? or some other mollusk?

Or do you think of the computer attack software? Such as a Trojan horse or virus that can paralyze a computer.

Neither. The WORM that we discussed today is related to computer security, but it is not a computer virus.

OK,Let's go into today's theme: WORM

Now is an information era, with the explosive growth of information. A large amount of data is stored in the Internet.

Data security is attracting more and more attention. For example, national laws and regulations, criminal cases, and important personal data need to be protected against tampering.

The WORM (Write Once Read Many) feature comes into being. It provides multiple read and write technologies. It is a commonly used method for data security access and archiving in the industry. It aims to prevent data from being tampered with and archive and archive data.

What is WORM?

WORM means Write Once Read Many.

It is a data security protection feature.  After a file is written, the WORM feature immediately removes the write permission of the file to enable it to enter the read-only state. In this state, files can only be read and cannot be modified, greatly improving data security.

How does WORM work?

The WORM feature adds WORM properties to common file systems so that files in the WORM file system can be read only during the protection period. After a WORM file system is created, the file system is mapped to the application server using the NFS or CIFS protocol.

With the WORM feature, files in a WORM file system can be converted between the initial status, locked state, appending state, and expired state, preventing important data from being accidentally or maliciously modified in a specified period. The following figure shows the relationship between states.


1. Initial to locked

    You can shift a file from the initial state to the locked state using the following methods

2. Locked to locked

    In the locked state, you can manually extend the protection periods of files. Protection periods cannot be shortened.

3. Locked to expired

    After the WORM file system compliance clock reaches the file overdue time, files shift from the locked state to the expired state.

4. Expired to locked

    You can extend the protection periods of files to shift them from the expired state to the locked state.

5. Locked to appending

    You can delete the read-only permission of files to shift the files from the locked state to the appending state.

6. Appending to locked

    You can manually set files in the appending state to the locked state to ensure that files cannot be modified.

7. Expired to appending

    You can manually set files in the expired state to the appending state.

For more command about WORM, please refer to WORM Feature Guide.

That's all for today. I hope it will be helpful to all of you! i_f21.gif

If you have any other comments or want to know more, please leave a message below to let me know.

  • x
  • convention:

Created Nov 25, 2019 11:37:49 Helpful(0) Helpful(0)

Have a good command of new knowledge about WORM.
  • x
  • convention:

MVE Created Nov 25, 2019 19:50:32 Helpful(0) Helpful(0)

Very Informative
  • x
  • convention:

Admin Created Nov 26, 2019 00:48:28 Helpful(1) Helpful(1)

Thank you for feedback.
  • x
  • convention:

Created Nov 30, 2019 00:40:24 Helpful(0) Helpful(0)

WORM, thanks
  • x
  • convention:

Created Dec 7, 2019 17:57:39 Helpful(0) Helpful(0)

Thank you for this. Learned about a new concept.
  • x
  • convention:

Admin Created Dec 11, 2019 06:26:17 Helpful(0) Helpful(0)

Posted by alikhan at 2019-12-07 17:57 Thank you for this. Learned about a new concept.
Thanks for your reply.
  • x
  • convention:


You need to log in to reply to the post Login | Register

Notice Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " Privacy."
If the attachment button is not available, update the Adobe Flash Player to the latest version!
Login and enjoy all the member benefits

Login and enjoy all the member benefits