Internet Windows Android

Performing a backup. Overview of data backup and recovery systems in the global and Russian markets

In this article I will tell you how to back up data: work files, multimedia and operating system (make an image of it). Backup (data archiving) is extremely necessary, because as a result of a hard drive failure, or a virus, you can lose important documents, photo archives, works created in various programs. Maybe you just want to reinstall a clean copy of the OS with all the programs. When this happens, this situation will be easy to correct.

The most common case for users is the failure of the operating system. In order to restore the previous state of the computer (programs, settings, etc.), you need to spend from several hours to several days to install and configure Windows, but installing additional software takes the most time. Often inexperienced users store their data on the system disk without thinking about transferring information to other hard disk partitions, not to mention external HDDs.

Backup (archiving) and recovery methods

Windows 7: built-in backup and restore tool

It is quite easy to use and even allows you to perform this procedure automatically on a schedule. Location on the system of the backup tool: «Start | All programs | Service | Archiving and Restoration». Menu in the column on the left - "Create System Recovery Disc" And "Creating a system image".

Create a system image. You must specify the location of the future archive: select another disk partition, external HDD or optical disk (DVD, Blue Ray). It is also possible to save a backup to a network drive. It is not practical to use optical media, so use a logical drive with sufficient storage space or an external HDD to store the backup. Select a location and click the "Archive" button. The entire system partition will be archived. This procedure can be carried out on a schedule, while Windows updates the previously recorded system image without creating it again, which saves time.

If you select the "Archive" tool, you can set up regular backups of important user data. To do this, select "Set up backup", specify which drive will be saved to, click "Next", in the next window select "Give me a choice" and then mark the objects for archiving. To restore the contents of a backup, select one of the three suggested actions: Restore my files from this backup, Restore files for all users on this computer, or Manage the disk space used by this backup.

To restore the system, in case it does not boot or gives an error that you are not able to fix, you may need a rescue disk. To create it, select "Create a system recovery disk" from the menu on the left and specify on which media it will be organized. Unfortunately, only laser discs are supported, which is not suitable for owners of laptops without an optical drive.

This built-in tool in Windows is not without drawbacks, such as a long time to create an archive and the lack of a compression function. However, there are other, more functional products.

Backup and recovery using Acronis True Image Home 2013

For Windows XP users, where there is no built-in backup tool, as well as users with higher requirements for the functionality of the backup program, I recommend using Acronis True Image Home 2013.

Acronis True Image Home uses 3 backup methods.

Full image - archiving absolutely all data, including MBR (if the partition is bootable).

Differential - only the data that has changed since the backup was created by the first (full) method is included in the backup.

Incremental method - allows you to supplement the backup with files that have changed since the last backup procedure.

It is easy to make a backup copy of the system partition: in the main program window, select the first option - "Backing up disks and partitions", then specify a partition or drive, specify a location for saving the archive and, if necessary, change the archiving parameters (for example, set the archive compression level on the tab "Performance" or protect the archive with a password). At the end of the process, a file with the extension *.tib. Acronis True Image Home 2013 allows you to mount a backup as a logical drive and work with the data you need. In this way, you can extract the desired file from a pre-created archive that you accidentally completely deleted from your hard drive.

In addition to backing up partitions and disks, you can back up (including on a schedule) individual directories and files, as well as the Windows Address Book, contact list, and Microsoft Outlook correspondence. For recovery in the most severe cases, you can use the bootable version of the program (boot disk or boot disk), and it is possible to create such a solution both on optical and USB media.

It happens that when experimenting with installing several operating systems, the master boot record (Master Boot Record) turned out to be corrupted, you can try to “revive” it by ticking “MBR” when restoring from an image. Also, Acronis True Image Home 2011 can convert backups from its "native" format to VHD format (these are backups created by the Windows 7 system tools, and at the same time virtual disk images, that is, they can be connected to almost any virtual machines) and vice versa.

In most cases, recovery comes down to selecting the desired archive and partition, in which the contents of the backup will be deployed. It is worth noting the extremely long installation time and the low speed of Acronis True Image Home in Windows XP.

Paragon Backup & Recovery Professional: Advanced Backup

About the Paragon Backup & Recovery Professional program, which provides file backup and restore I told in, however, with the aim of transferring Windows to another PC. Unlike the Acronis product, in addition to archiving operations, it also allows you to perform some actions with partitions - for example, changing the label, formatting, hiding, and deleting. However, for this you will need to switch to "Advanced User Mode".

Before backing up, it is recommended to create a rescue disk to restore data from the image. To do this, go to the "Utilities" section and select "Create a rescue disk". Here you can also select either an optical drive, an external hard drive, or a USB flash drive as the media.

To create a backup copy of your data, go to the section "Data protection and recovery | Intelligent archiving”, without forgetting to prepare a reliable storage before that. You can choose what to back up: "Drives or partitions", e-mail (emails, accounts and address books of Outlook, Outlook Express and Windows Mail), "Media Files" and "Documents" (texts, photos, videos and music stored in the "My Documents" directory) or "Other Files or Folders".

Then you can make additional copying parameters - choosing the degree of image compression, password protection and sector-by-sector copying mode (all sectors of the disk are processed "as is", including unused ones). You can also assign an FTP server as an archive storage, if you have one. If you choose optical media, the program will warn you that it will not be possible to save the disk's master boot record.

For advanced users, Backup & Recovery has a professional virtual machine imaging tool for Virtual PC, VMware Workstation and VMware Fusion. Thanks to it, you can convert an image of a real hard disk, such as a system partition, and then open it along with all the data and programs in a virtual machine, even on another computer.

Dear friends, today we will consider a very important topic: data backup and recovery. Why do these two concepts go together and not separately? What are their features, what are they for? We will answer all these questions now, and then we will proceed directly to active actions.

So, let's start with backup: it allows us to save all files, documents and other information from a device or program to an external storage medium. Please note that the latter may be cloud storage on the Internet. But not all data can be stored in this way. We'll talk about this a little later.

But it makes it possible to return everything that we saved earlier, with the subsequent exploitation of the files. For example, if you saved photos from your summer vacation in the cloud, then you can not only view them later, but also upload them back to any supporting device. Now that you’ve added a little to your baggage with these two concepts, we can move on to an active discussion: how to back up data, what programs exist for this, on which devices it can be done, and so on. As you can see, our little discussion is slowly getting bigger. To make it easier for you to work, we will immediately show you the blocks that will be illuminated. You can immediately select the one you need and get to work:

  • Information from a computer
  • Information from tablets and smartphones
  • Recommendations to the user

It is worth noting that in order to create a copy of files or a system, you will need an external storage medium on which your data will be stored. Plug it into the USB port on your computer or laptop. Make sure that the amount of available space on the disk or flash drive is larger than your files take up. Also, make sure that there is no failure during the recording: if someone accidentally touches the cable and it disconnects, then you may lose data.

If you want to create a copy from a smartphone or tablet, it is advisable to use the original cable to connect to a PC. For cloud storage users, a fast unlimited internet connection is recommended. For example, if you have limited traffic, and you exceed it, then you will have to shell out some amount to cover the resulting debt.

Information from a computer

Since computer data occupies the first line in the ranking of importance among other devices, we will begin our work with them. First of all, it is worth noting that here there is also a small division of the backup by the type of information stored: it can be a complete copy of the operating system, a copy with files, or separate storage of files. For convenience, consider an example for Windows 7, 8.1 and 10.

Windows 7

  • We go to the computer control panel using the Start button or any other navigation tools.
  • Click on the "System and Security" menu.
  • Next, a tabbed window will open in front of you, where you will need to click on "Data Backup and Restore".
  • So, in a new window you will see a menu with archiving settings. Click on "Backup and Restore".
  • Next, we need to set up backup using the blue button of the same name.

Click on "Set up backup"

  • Then you will see a dialog box with archiving settings. Select your hard drive and click on the "Next" button.

Choose the location of the archive

  • In the next window, the system will ask you to clarify what exactly should be archived. It is recommended to use the first option ("Let Windows choose") as it saves everything and updates the data regularly. Please note that here the second option allows the user to choose what exactly needs to be saved. That is, you can put your own folders or separate directories if you do not need a full backup along with operating system files.

Selecting objects for archiving yourself

  • Next, we check the set parameters. Here you can set a schedule for automatic copy creation using the "Change schedule" button.

  • When everything is installed and verified, click "Save settings and start backup".

Process in progress

  • Wait for the process to finish, then check your external hard drive to see if your data has been written to it.

Windows 8.1

  • Launch the toolbar on the right side of the screen. To do this, move the mouse to the upper right corner, then click on "Search".
  • Type the phrase "File History" without quotes from the keyboard and press Enter. In the results, click on the folder of the same name.
  • You will be taken to a window where you will need to click on the "System Image Backup" link, which is located in the lower left corner of the window.

  • We select the location for storing the archive (as we agreed above, it should be an external hard drive). Click "Next".
  • The next window will show you the amount of memory you need. Check all the data and click the "Archive" button.
  • Wait while the system backs up Windows to an external storage medium. This process may take some time, so do not rush to panic.

Windows 10

  • Launch "Settings" using the Start button on the taskbar.
  • Now open the Update & Security tab.
  • In the left column with parameters, click on the item "Archiving service".
  • Use the button of the same name to set up an automatic backup system.
  • Please note that you can easily adjust the folders that will be copied there without any problems. This will make your work much easier.
  • If you want to create a full backup along with the operating system, and not individual libraries and directories, then use the instructions for Windows.

To restore data, repeat the steps until you find the backup settings. BUT now just select the tab or item "Recovery" and just follow the instructions in the dialog box on your monitor screen. There is nothing difficult in this. Naturally, we have reviewed the standard Windows OS tools from Microsoft. There are also special programs for carrying out similar operations. They may be more convenient, but in terms of safety and reliability, they may be inferior to these. Therefore, it is recommended to still use the standard OS utilities.

Information from tablets and smartphones

Everything is somewhat simpler here, since standard programs are also used (for example, for iPhone and iPad, we will work with iTunes). For all gadgets of any operating system, the backup procedure will be the same:

  • Connect your device to your computer or laptop. Wait for the appropriate drivers to be installed.
  • Run the program that is designed to synchronize with your device. That is, if you have an iPhone, then open the iTunes application on your PC.
  • Find the tab or item "Synchronization", or "Backup". Click on it and follow the prompts on the screen to create a copy.

  • To restore data in the same window, find the button of the same name and click on it.
  • Do not disconnect the device from the USB while the computer is performing these steps. This may result in a software failure of the device.
  • Please note that you can simply transfer some files from your smartphone or tablet to your PC. This is especially true for owners of gadgets running the Android operating system: there is full access to all files and folders.
  • Owners of iOS devices can only store photos and videos in the same way: go to Computer and right-click on your device. Click on Import Photos and Videos. Following the prompts on the screen, you can not only import, but also customize it.

Cloud storage

Today, this type of data storage is quite popular on the market: no flash drives, cables, or other peripherals are needed. All you need is an active high-speed Internet connection, and all your files are in your hands. We will not consider their settings (there is a separate topic for this), but we will simply talk about each storage for a specific OS:

  • OneDrive for Windows
  • iCloud and iCloud Drive for iOS and MacOS
  • Google Drive for Android

It is worth noting that there are also universal ones that are installed on any device, regardless of the installed OS:

  • Cloud Mail
  • OneDrive
  • google drive

As you can see, of all the repositories, only Apple has made its product available only to its system. Good or bad - you decide.

  • When using an external hard drive or flash drive, make sure that it has enough free space.
  • Please note that most cloud storages have limited storage for free access. For example, in iCloud Drive, five gigabytes will be available to you. To expand it you will need to buy a subscription. If you don't have many files, then you don't need to buy anything. You can also use multiple cloud storages.
  • Check the creation of copies: if the memory on the disk or in the cloud is over, then the copy will not be created. You risk losing some data, which will be a very sad consequence.
  • If you are just copying some files, then it is advisable to delete them from the copied device to free up memory on it.
  • If you want to keep very important documents, it is better to make two copies. For example, you can make one on an external hard drive, and the other with a cloud storage program.

Summing up

Dear friends, today we discussed a very extensive and important topic: data backup and recovery. Particular emphasis was placed on computer information, then we examined the general principle of creating a copy of smartphones and tablets, and also got acquainted with cloud storage. At the end, we gave some recommendations to make your work as productive as possible. Remember: timely saved data is the key to saving your nerves. If you lose the files of your thesis, which you have been doing for several weeks or months, it will not be very fun, will it? Tell us in the comments which archiving services you most prefer to use and why.

Backup effective only when it is performed regularly. If the data changes frequently, copying should also be frequent. Therefore, many prefer to use special software to automate this process, rather than copying data manually.

Any computer is at risk of hardware failure and many other dangers that can lead to the loss of important data. In the business world, this has a particularly dire effect, as the loss of business data results in huge losses and loss of customers.

The key point in backup tools is data recovery. Really, what's the use of a backup if you can't restore it? Therefore, when choosing a backup program, you need to make sure that you can easily restore the desired data with it.

Backup program for Windows

Handy Backup is a reliable backup and restore software for Windows computers, known for its simple and user-friendly interface and a huge number of features. To back up or restore data, you simply need to create a new "task" (using the step-by-step Create Task Wizard). Handy Backup will help you back up the following data:

  • Files and folders

Handy Backup can restore both the entire backup and individual files and folders.

  • Popular utilities and applications

The program can automatically search and backup many popular applications, including Outlook, Skype, Adobe Photoshop, etc.

  • Disk image

Handy Backup can create an exact copy of the HDD, including the operating system, boot records and other information. You can copy and restore both the entire hard disk and its individual partitions.

You can create a special bootable recovery disk using the Handy Backup Disaster Recovery utility, from which you can start the operating system in the event of a failure and restore the system, settings, and all data.

  • Support for all versions of Windows systems

The program implements the ability to work in various versions of Windows, including the ability to back up and restore Windows 8.

  • Database

The program can copy ODBC compatible databases, and also has special plugins for exact copying of DB2, Oracle, MS SQL, MySQL, etc. databases.

  • MS Exchange and mail data

The application is capable of backing up and restoring MS Exchange Server data without stopping the server. And also create an automatic backup of mail from Yandex.Mail, Mail, Gmail, Yahoo Mail, etc. servers.

How to quickly recover lost computer data. A detailed guide to saving information Gladkiy Alexey Anatolyevich

6.3. Saving and Restoring Data with Handy Backup

The probability of successful recovery of data after their sudden loss is much higher if the user foresaw the possibility of such a nuisance in advance and took care to save their data in a safe place by creating a backup copy. In this section, we will get acquainted with a program that is designed and created specifically to create backup copies of data and restore them if necessary. Moreover, with its help you can recover not only individual files and folders, but also the entire contents of the hard drive. The relevance and usefulness of the latest functionality can hardly be overestimated, given the fact that the vast majority of users store a lot of necessary and important information on their hard drive.

This program is called Handy Backup, its developer is the Novosoft company (program website - www.handybackup.ru). The program is shareware: its demo version can be downloaded from the developer's website. A distribution kit with a volume of about 12.5 MB is offered for download.

It is worth noting that the demo version has a time limit: you can use it for 30 days from the date of installation, after which you must either register the program or remove it from your computer.

To install Handy Backup on your computer, you need to run the installation file and then follow the instructions of the installer. After the installation is completed, the menu Start program group will be created Handy Backup, the commands of which are designed to launch the program, call up help information, go to the program's website, and also uninstall it. For convenience, it is recommended to display the launch shortcut on the desktop.

The program has a clear and intuitive user interface, as well as convenient tools. Important for domestic users is the fact that Handy Backup supports the Russian language.

6.3.1. Features of Handy Backup

Handy Backup is a multi-functional product for backing up, restoring and synchronizing data, and these processes can be performed automatically at certain intervals - you just need to make the appropriate settings for this. The program successfully copes with the tasks both on a separate computer and when working in a local network.

Handy Backup allows you to back up any objects specified by the user. One of its most important and most requested functions is the creation of a hard disk image, which involves backing up the operating system, applications, drivers used, as well as user personal data.

The program features include hard drive cloning. For those who do not know what it is - let's explain: cloning a hard disk is copying it sector-by-sector, which allows you to quickly restore the operating system if the need arises.

The program can back up databases (including tables from SQL, MS Access, Oracle, PostgreSQL, FoxPro, etc.), save email, Lotus Notes data, and create backup copies of the Windows registry.

Created backups can be packaged in zip format to save space, and the archive can be password protected to prevent unauthorized and unqualified access to the saved data.

Of particular note is the ability to back up data using an FTP connection, which not all competing products can boast of.

6.3.2. UI Structure

After starting the program, its user interface is displayed on the screen, which is shown in Fig. 6.28.

Rice. 6.28. Handy Backup user interface

The key elements of the user interface of the program are: main menu, toolbar, context menu, task area, file area, log window and status bar. Let's take a brief look at each of these elements.

The main menu of the program is located in the usual place - at the top of the interface. It includes the following items: File, View, Actions, Service, Language And Help. Each item contains a list of commands designed to select the desired mode of operation or call the corresponding function of the program.

Just below the main menu is a toolbar. Its buttons do not carry additional functional load, and only duplicate some commands of the main menu. The names of the toolbar buttons are displayed as tooltips when you hover over them with the mouse pointer. Note that even in the localized version of the program, these tooltips are displayed in English, but in any case this does not make it difficult to use the buttons: firstly, they have a characteristic pattern, and secondly, even an English-language tooltip makes it easy to determine what a particular button is intended for.

Note. If necessary, you can remove the toolbar from the interface. Its display is controlled using the main menu command View? Toolbar .

The context menu of the program is called by pressing the right mouse button, and its commands also duplicate some commands of the main menu. The contents of the context menu may be determined by the current mode of operation and the place in which it is called.

Below the toolbar is the task pane. It displays a list of current tasks. For each task, the following information is displayed sequentially in the corresponding columns.

Task name (assigned by the user at the task setting stage).

Task type (possible options - Backup, Recovery or Synchronization).

The last time this task was run.

The time of the next run of this task according to the set schedule (if a schedule was configured for it when the task was created).

Task progress indicator;

The current status of the task.

Note that each task can take one of the statuses listed below.

Expectation– this status is assigned to tasks waiting for a command to be executed.

Backup, Recovery or Synchronization– one of these statuses (depending on the task type) is assigned to tasks that are in progress.

Success– status means that the task was successfully completed.

Scheduled– this status is assigned to tasks that are waiting to start execution in accordance with the previously set schedule.

Error– this status is assigned to tasks that, for some reason, have encountered errors.

Below the task area is the file area, which is used to manage the data involved in tasks. In other words, the user has the ability to manage files and folders as if they were tasks.

For each object, the following information is displayed in the corresponding columns.

The name of the file or folder.

The current status of the object.

The original size of the object (note that this information is not shown for folders).

The size of the saved object.

The time the file or folder was last edited.

The time the file or folder was last saved.

You can define the set of information shown for objects in the file pane yourself. To do this, right-click and select the required items in the context menu that opens. The only information that cannot be disabled is the name of the object (the corresponding command in the context menu will be disabled).

Below the task area is a log window. It displays the contents of an automatically generated log file that provides information about the progress of the task. Note that this information is updated automatically according to the progress of the task. By pressing the right mouse button anywhere in the log window, a context menu is called up on the screen, using the commands of which you can copy the contents of the log window to the clipboard, save it in a separate file, completely clear the log screen, and also switch to the font and message color settings mode.

If necessary, you can remove the log window from the interface. Its display is controlled using the main menu command View? log window? Hide/Show log window.

At the bottom of the interface, below the log window, there is a status bar that displays information about the current mode of operation. The display of the status bar is controlled using the main menu command View? Status bar.

6.3.3. Handy Backup settings

As with many other applications, before using Handy Backup, it is recommended to review and, if necessary, change the settings of the program in order to adapt it as much as possible to the specifics of use on this computer. To switch to this mode, use the main menu command File? Settings, also called by pressing the key combination Alt+F7. When this command is activated, a window is displayed on the screen, which is shown in Fig. 6.29.

Rice. 6.29. Program settings, section basic settings

The structure of this window is as follows: the list of sections is presented in its left part, and the contents of the current section are displayed in the right part. Each section includes settings of the same type, similar in functionality and purpose. Let's take a closer look at some of them.

In chapter basic settings(see Fig. 6.29) there are several parameters of a general nature. If the checkbox is checked Start agent on Windows startup, then the program will be placed in the automatic download directory and will be launched along with the operating system.

You can make it so that the Handy Backup item will be added to the context menu of the operating system - for this you need in the section basic settings check the box Allow integration with Windows Explorer.

While the program is running (in particular, when compressing and encrypting objects), temporary files are created, which are stored in a temporary directory. The path to this directory is indicated in the area temporary folder. You can use the temporary folder of the operating system for this purpose - to do this, check the box Use Windows temporary directory.

If in the section basic settings is checked, the CD-ROM drive will automatically open when copying is complete to eject the disc. Sometimes it is useful to check the results of copying to disk: for this, you need to check the box Eject CD/DVD after backup. When this box is checked, there is one more parameter - Stop checking after first error. If it is set, then when the first error is detected, the disk check will be terminated. The meaning of this parameter is that sometimes even one error is enough for the recording to be considered unsuccessful.

In chapter Logging you can define the maximum allowed log file size. To do this, check the box Log file size limit, and in the field located on the right, use the keyboard to enter the maximum allowable value in kilobytes. In the same section, you can configure the color scheme of the log window.

In chapter Data transfer connection settings are configured. The content of this section is shown in fig. 6.30.

Rice. 6.30. Program settings, section Data transfer

In field Maximum network latency specify how long the program should wait for a response from the network. This parameter is expressed in seconds and defaults to 120 . If the connection fails after the specified time has elapsed, the program will try to reconnect after a pause. The duration of this pause is indicated in the field Delay between reconnects, and the number of connection attempts - in the field. If the checkbox is checked Repeat until successful, then the field Retry attempts on network errors becomes uneditable. In this case, the program will attempt to connect until one of them is successful. The program can inform you about the progress of its processes by e-mail. This is a very convenient functionality: it will allow you to control the position even if you do not have direct access to this computer (it is enough to have access to your e-mail box from any other place). The necessary settings are made in the section Email Notifications, the content of which is shown in Fig. 6.31.

Rice. 6.31. Program settings, section Email Notifications

You need to check the box first Use email notification - only after that the e-mail parameters will become available for editing. In field SMTP Server the address of the SMTP server for outgoing mail messages is specified, and in the field Port– port number of the SMTP server (in most cases, you need to enter a value here 25 , and it is his program that suggests using it by default).

If the SMTP server you use to send e-mail messages requires authorization, then check the box. Use SMTP Authentication, then enter your username and password in the fields below.

You can check the correctness of the settings made using the button. Send test message. Please note that this requires an active Internet connection.

All the settings made by the program come into effect after pressing the button in this window. OK. With button Cancel exit from this mode without saving the changes made. Note that in most cases, the default program settings are optimal.

6.3.4. Disk image backup

As we noted earlier, one of the functions of the program is to backup the hard disk image. Having a disk image, you can later easily restore your data even if the hard disk is damaged.

It should be noted that all work in the Handy Backup program is a step-by-step procedure: the transition to the next step is possible only after performing certain actions in the previous step. This is a rather convenient mechanism that allows you to easily and quickly do what you need, and, in addition, significantly facilitates the use of the program.

To create an image of a hard disk, you need to create an appropriate task. To do this, you need to execute the main menu command File? New task, which is also called by pressing the key combination Ctrl+N, or click the corresponding toolbar button. When performing any of the specified actions, the New Task Wizard window will open on the screen, shown in fig. 6.32.

Rice. 6.32. New Task Wizard

To create a hard disk image, you need to set the switch at the first stage of creating a task Select task type into position Backup task(This value is selected in all cases where a backup is required, regardless of the type of data being backed up). To proceed to the second stage, press the button Further. In the window that opens, click the button Add, and in the menu that appears, select the command Disk Image(Fig. 6.33),

Rice. 6.33. Choosing a Disk Image Copy Command

As a result, the contents of the window will take the form, as shown in Fig. 6.34.

Rice. 6.34. The second stage of setting the task

Having expanded the hierarchical list in the central part of this window, you should mark with a checkbox those sections of the hard disk for which you want to create a backup copy of the image. To go to the next stage of setting the task, press the button Further. As a result, the Wizard window will look as shown in Fig. 6.35.

Rice. 6.35. The third stage of problem setting

At this stage, you should select the type of reservation. When creating a disk image for the first time, set the switch to All selected files (full backup): in this case, the program will backup absolutely all information stored on the selected disk(s). If you have already backed up this disk (s) before, it is more expedient to select the option New and changed files (incremental backup). In this case, the disk image backup will contain only the information that has changed, which is very important in terms of the size of the backup file and, therefore, saving space. Having chosen the type of reservation, proceed to the next step by pressing the button Further. In this case, the window of the Wizard hello view, as shown in Fig. 6.36.

Rice. 6.36. The fourth stage of setting the task

Now you need to specify the address where the created backup copy of the hard disk image should be saved. You can save it on a hard drive or a network drive, a remote FTP server (in this case, you must have an active Internet connection), on a CD, etc. The media is selected by setting the switch to the appropriate position. Further actions depend on the position of the switch.

If an FTP or SFTP server is selected for copying the disk image, then fields will open below for entering the server address, user name and password, and other necessary data. However, in most cases, users prefer to save the disk image to a hard drive, network drive, CD, or flash memory. In this case, in the field below Folder specify the folder where the disk image will be placed. To do this, click the button located to the right of this field, then in the window that opens, select the required folder with a mouse click and click the button OK or key Enter.

After selecting the path to save and pressing the button Further will proceed to the next step. In this case, the Wizard window will look as shown in Fig. 6.37.

Rice. 6.37. Fifth stage of problem setting

At this stage, you can set the parameters for compressing and encrypting the resulting hard disk image. To do this, you need to check the appropriate boxes, and in the case of encryption, enter the password that will be used for access. Note that the password must be entered twice to eliminate the possibility of an error when entering. By default, both compression and encryption are disabled. After pressing the button Further a transition to the next stage of the problem statement is performed (Fig. 6.38).

Rice. 6.38. The sixth stage of setting the task

Here, using the appropriate checkboxes, you should specify when exactly the program should backup the hard disk image - immediately after setting the task or in accordance with a specific schedule. To create a disk image immediately, you need to check the box Run now and press the button Further. At the final, seventh stage of setting the task, the Wizard window looks as shown in Fig. 6.39.

Rice. 6.39. The seventh stage of setting the task

Here it is necessary to enter the name of the generated task from the keyboard, under which it will be displayed in the task area of ​​the main program window. After pressing the button Complete the assigned task will be added to the list of tasks and its execution will begin, as indicated by the information in the column Development / Course of events, as well as the contents of the log file (Fig. 6.40).

Rice. 6.40. Completion of the task

After the backup is completed, the task will be assigned the status Success, and in the column Development / Course of events it will display the value 100 % (Fig. 6.41).

Rice. 6.41. Information about the successful completion of the backup

Similarly, you can create not only disk images, but also backup copies of individual files and folders. In case of loss of data on the primary media, you can always restore them from a backup. How to do this is described in the next section.

6.3.5. Restoring data from a backup

To restore data from a backup, you need to set the appropriate task for the program. To do this, execute the main menu command File? New task or press the key combination Ctrl+N, then in the New Task Wizard window that opens (see Fig. 6.32), set the switch to Data recovery task and press the button Further. As a result, the Wizard window will look as shown in Fig. 6.42.

Rice. 6.42. Selecting an index file to restore

In this window, you need to specify the path to the index file that was automatically created by the program during the backup process. This file is in NB or NBI format.

First, select the type of media on which the backup is stored. To do this, set the switch located at the top of the window to the appropriate position.

In most cases, this media is a local or network drive, CD, or flash memory: this corresponds to the top position of the switch. Next you need in the field Index file specify the path to the required file. To do this, click the button located to the right of the field. Browse files/directories on this computer/local network(the name of the button is displayed as a tooltip when you move the mouse pointer over it), then in the window that opens, select the required file by clicking the mouse and click the button Open or key Enter.

If the source on the FTP or SFTP server is selected for data recovery, then after setting the switch to the FTP or SFTP fields for entering the server address, user name and password and other necessary data will open below.

Rice. 6.43. Choosing a path for data recovery

By default, the program offers to restore the data to its original location. However, if you are not satisfied with this option and would like to specify a different path, click the button Edit.

This will open the window shown in Fig. 6.44.

Rice. 6.44. Entering the path for data recovery

The required path is indicated in the field Location of data to be recovered. This field can be filled from the keyboard or from the clipboard, but it is more convenient to do this using the button located on the right. When pressed, a window opens on the screen. Folder overview, in which you need to specify the required directory and click the button OK or key Enter. After choosing the path to restore and pressing the button Further The Wizard window will look as shown in Fig. 6.45.

Rice. 6.45. Choosing a Recovery Method

In this window, using the switch, you need to specify the recovery method. You can choose one of two options.

Full recovery– in this case, all objects without exception will be restored from the backup. This method of restoring data from a backup is suggested to be used by default.

Partial recovery– when choosing this method, only those objects that have undergone changes will be restored.

If this box is checked Delete all files in destination folder, except for those being restored, then all other objects will be automatically deleted from the folder to which data will be restored from the backup. In other words, the destination folder will be completely cleared for recoverable data.

Rice. 6.46. Set up a schedule for automatic task execution

To do this, check the box Enable scheduler– as a result, the following parameters for setting the schedule will become available for editing. For example, you can do automatic recovery daily, or every other day, or on certain days of the week or month, etc.

Advice. Performing this procedure is especially useful when data is also backed up at regular intervals. For example, you can set a schedule, according to which the program will back up data every Wednesday and Friday after the end of the working day, and restore it from the backup copy every Thursday and Monday before the start of the working day..

It may happen that at the time when it is necessary to automatically perform a task, the computer is turned off, therefore - it is not able to do this. If you check the box in the schedule settings Perform missed runs, the outstanding tasks will be executed immediately after the operating system boots. If you check the boxes Execute at login And Execute on logout, then this task will be automatically executed, respectively, immediately after each boot of the operating system, as well as before each exit from it.

The transition to the final stage of setting the problem is carried out by pressing the button Further. In this case, the Wizard window will look as shown in Fig. 6.47.

Rice. 6.47. Entering a task name

Here you need to enter an arbitrary task name from the keyboard, under which it will be displayed in the task pane. If there is a checkbox at the bottom of the window Complete this task immediately, then restoring data from the backup will start immediately after pressing the button Complete. In the process of restoring data from a backup, the current task will be assigned the status Recovery(Fig. 6.48).

Rice. 6.48. Data recovery process

And after the restoration is completed, in the column Development / Course of events value will be displayed for this task 100 % , and it will be assigned the status Success(Fig. 6.49).

Rice. 6.49. Successful completion of recovery

Completed tasks can be removed from the list using the context menu command Delete or the corresponding toolbar button. In this case, the program will issue an additional request to confirm the deletion operation.

Thus, with the help of Handy Backup, you can create a hard disk image and data backups, which will allow you to quickly restore them in case of an unexpected loss.

When recovering a hard drive, keep the following in mind. If you need to restore a specific hard disk partition, make sure in advance that a partition with the same name exists on the hard disk. Remember that in order for the new settings to take effect after restoring the hard drive, you must restart the computer.

This text is an introductory piece. From the book Security Encyclopedia the author Gromov V I

2.6. Data protection using the Cobra program Cobra is a program that even foreign experts speak of as the most advanced and scientifically based cryptosystem. Seminars and scientific conferences are held annually, where hundreds of respected mathematicians of all

author

3.1. Recovering passwords for MS Office documents using Advanced Office Password Recovery Advanced Office Password Recovery, which we will learn about in this section, is designed to recover forgotten and lost passwords for MS Office documents. This program was created

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

3.3. Recovering passwords for archives using Advanced Archive Password Recovery If you lose the password for an archive, it will be impossible to extract data from it: each time you try to extract it, a window will appear on the screen in which you will need to enter the password. If this is not

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

4.2. Restoring damaged archives using the Advanced RAR Repair program As we noted above, the standard tools of archivers designed to restore archives, although they are quite effective, do not always solve the problem. That's why

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

4.3. Restoring ZIP archives with DiskInternals ZIP Repair The solutions we have discussed above are more focused on repairing RAR archives. However, ZIP archives are no less popular, and in this section we will get acquainted with a program that

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

5.1. Data Recovery with BadCopy Pro One of the most popular programs for recovering damaged files is BadCopy Pro. The product is shareware; The demo version of the program can be downloaded from the developer's website www.jufsoft.com.

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

5.3. Recovering deleted data with Recover My Files One of the most powerful and effective products for recovering deleted files is Recover My Files. It is shareware; You can download its demo version at

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

5.4. Recovering data from damaged media using Max Data Recovery We already know how to recover deleted or damaged data - this was discussed in the previous sections of this chapter. However, it often happens that not the data is damaged, but

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

5.5. "Repair" and restore objects using Restorer2000 Pro Another popular program designed to "repair" and restore damaged or deleted objects is called Restorer2000 Pro. Its developer is a software and consulting company

From the book How to quickly recover lost computer data. Detailed Information Rescue Guide author Gladkiy Alexey Anatolievich

Chapter 7. Backing up and restoring data using Acronis True Image Home There are many different backup and recovery products on the market today, and we have already met some of them in

Almost all of our customers who have implemented a backup system (BMS) think that this solves all their problems. They did everything in their power to ensure that everything was backed up and, in the event of an accident, correctly restored. But it often happens like this: the company is facing a serious problem, and the traditional backup system does not allow you to recover within the time that the company considers to be the target. In fact, the SLA, which the backup system must comply with, is not fulfilled. Alas, during our work we have accumulated many sad examples confirming this. Below we present two cases and give advice on what technical means will reduce the recovery time. When choosing cases, we focused on examples related to databases, where the most business-critical information was stored.

Retail Challenges

Customer: large insurance company.

Brief description of the cause of the crash: personnel error, incorrect patch installation on Oracle.

Description of the problem

We are talking about a large company that has a mature IT department and invests enough in its equipment and staff. Suffice it to say that the Oracle DBMS was running on two Oracle Exadata, distributed over two technology sites, with a well-developed DR solution and a customized backup system.

One sad day, it was decided to install a patch on the Oracle DBMS. Unfortunately, the engineer did not read the instructions to the end: “What, I won’t install the patch without a piece of paper ?!” - and did it wrong. The error was noticed a few hours later, when the DBMS began to behave strangely and report it in the logs. Then the engineer decided to roll back. This action finally immobilized both instances of the database (all changes managed to be replicated to Standby) and corrupted all the data.

The company was left without its main information asset - a database through which all business processes worked. Business has practically stopped.

Solution

The customer has decided to restore from a backup. At that time, restoring a 5 TB database (now ~ 15 TB) took - attention! - over 30 hours! In total, after 1.5 days the base was restored a day before the accident. But there was more data! Everything else was restored by programmers and staff from other company systems, from primary documentation (application forms, copies, scans). It took another 1.5 days of hard work.

Total

2 High-End Oracle Exadata systems, Oracle Standby, working backup system and 3!!! days of complete downtime due to incorrect patch installation. Was it allowed by company policy? Of course not.

The main problem: the lack of quick recovery tools for logical errors.

How could you have avoided

To mitigate the consequences of such accidents, you need to move in two directions. On the one hand, to make backups more often, and on the other hand, to be able to recover quickly. The following products might help:

Oracle FlashBack- a technology that allows you to not only "roll forward" new data to the backup Oracle system, but also roll back to the desired transaction. With such a scheme, it would be possible to roll back the system before the problems with the patch began, which would greatly facilitate data recovery.

Snapshot technology. Snapshots allow you to back up and restore data in seconds. At the same time, they have little effect on performance, and it is possible to take snapshots quite often (for example, once an hour). Thus, it was possible to roll back an hour and recover only an hour of lost data.

Continuous Data Protection- continuous data protection. These are proprietary devices or software that allow you to log all records with the ability to roll back to any point in time. Works similar to Oracle FlashBack, but for any data.

Case: Hardware failure

Customer: Federal service in one of the constituent entities of the Russian Federation

Brief description of the cause of the crash: hardware error inside the disk array.

Description of the problem

This time the company has a slightly less developed IT infrastructure, but it is more common with our customers: mid-level disk arrays, Oracle DBMS, Standby is not used.

As is often the case, on Friday, when everyone was happily going home, the array hardware failed. Due to a bug in the firmware, when a disk failed, the array turned the data into a mess. From this, the databases of the federal level service stopped working. For more than a day, the customer was waiting for a solution from the storage vendor. After analyzing all the logs, the vendor gave his conclusion: the data is lost!

Solution

The customer has decided to restore from a backup. This process took about a day, despite all the tricks and performance tuning (the base is quite large). While the database was being restored, the backup copy of the logs was lost (the Retention Period was set too short, the SRK deleted them itself).

Further - deeper. The company, like many others, at some points used unlogged operations in Oracle, which greatly improves performance, but leaves no chance to recover, except from a backup. That is, it must be done immediately after the operation session. Naturally, over the years, the operation service forgot about this. Thus, part of the data was completely lost.

It took a few more days to completely restore infrastructure services - there were no backup copies of operating systems, binaries, configurations, etc.

All the lost information was collected from primary documents (third-party databases, paper documents, data on the computers of the tellers), which took another 3 days. Some documents may never have been recovered.

Total

An array problem caused data loss and downtime for about a week! In modern conditions, this can lead to the bankruptcy of the company.

Main problems:

  • RMS was set up incorrectly, trial restores were not performed.
  • There were no means of prompt recovery in case of an accident and no redundant systems.
  • There was no clear DR plan.

How could this be avoided:

  • Use Oracle Standby located on another array. This would allow for a short time to switch to a running data instance.
  • Oracle ZDLRA would have made it possible to restore the database on backup equipment in a much shorter time.
  • Proper planning of backup and recovery processes would have avoided such large losses and recovered in less than a day.

Conclusion. From the above examples, it can be seen that the backup systems were installed and configured, but despite this, they were not able to recover within the time frame specified in the SLA.

Main problems of backup systems

Based on our experience, we decided to highlight a number of problems that, in our opinion, readers should pay special attention to.

Speed ​​of backup and subsequent recovery

At the moment, the backup speed is directly proportional to the amount of data, while all of our customers have an annual data growth of at least 30%. In 3-4 years, data at least doubles, but for some companies this figure is even higher, while during the same time the backup speed does not change at all. Here we can make a simple conclusion that those terms and those SLAs that were relevant 3–4 years ago now need to be at least doubled. At the same time, business requirements for data recovery (RPO / RTO) are constantly growing.

Gradually, all business processes of the company are being transferred to IT and paper primary documents (copies and originals of documents, applications, scans, etc.) are dying out. Everything revolves inside IT systems, and data loss is, in fact, the loss of everything. IT no longer has the right to make mistakes. In the cases that we cited, all the time the data was not available due to various circumstances, the companies could not function. This led to both direct losses, when it was impossible to carry out the main business process of the organization, and implicit ones, for example, reputational ones, which are not so easy to measure in monetary terms, but which in the future can cause no less damage to the company.

On the image I reflected my observations regarding recovery time (RTO). As data grows, the actual recovery time will certainly increase, while SLA requirements will only become tougher. The point on the graph where the actual time equals the required time has already been passed for most customers.

Dependence of recovery time on the amount of data

Low granularity recovery

In fact, most errors are due to the loss of some part of the data. At the same time, traditional backup tools allow you to restore data directly from backup, but more often you have to restore the entire system. If your database is 15 TB, you will spend several days on it. We do not know customers who have an RTO (Recovery Time Objective) requirement of 2 days. In our practice, there were no such examples when the client would say: “Guys, it's normal to recover for 2 days, I'll be patient,” if the administrator accidentally deleted several rows from the database. A fairly common problem that our customers face is how to isolate a small piece of data from a backup without restoring it itself (and not spending several days on it).

Excessive RPO (Recovery Point Objective)

In a world where paper records have disappeared and everything is stored in IT systems, data is created every second that we would like to protect immediately - at the same moment when it was created. But with the help of classic backup systems, this cannot be done. For each piece of data, there is a certain long period of time during which this data exists all over the world in a single copy. Our customers want to protect data continuously, from the moment it appears. When deciding to restore from a backup, you will most likely have to restore a day ago, then the data for the day will need to be obtained from somewhere else. As a rule, this is a long work of administrators, which takes several days. With the most negative development of events, this can result in the loss of critical information. Of course, the question is not limited to backup, it concerns the construction of an IT system as a whole, but the topic of RMS in this case is very important, it cannot be neglected.

Hidden bugs

Unfortunately, there are still no cheap and quick options to check how well the backup is made. Of course, this can be done with periodic test restores, but this is a very expensive operation in terms of human effort and IT resources. This is the work of a separate team on a separate hardware.

Alas, most of our clients do not. It often happens that everyone makes backup copies, but by the time of restoration, it turns out that they could not be done - they simply are not restored, despite the outwardly correct operation of the RMS. This happens for various reasons. And the best way to demonstrate this is with an example. One of our customers used a SAP system with an Oracle database. Backup was carried out by built-in SAP tools with the help of one of the largest vendors of SRK.

2 different backup policies were configured: one of them was file-based - it copied operating system data and software settings, and the second one - the database itself. Since they were directed to the same system, an exclusion list was set up in which the database was entered. The file policy took into account this list and did not reserve those directories in which the database was located. Due to the peculiarities of the RMS architecture, the database reservation policy ignored the list of exceptions and correctly copied the necessary data.

In one of the software releases, this vendor fixed this “bug”, from that day on, both policies began to take into account the list of exceptions and bypass the database. Moreover, this did not affect the errors in the RMS software in any way, since it worked normally: all data not specified in the list was backed up normally. The system reported on its serviceability.

Thus, everything worked for more than six months. Until you need to recover...

Non-systematic approach

An important problem is a non-systematic approach to the problem of backup. RMS has historically been built either by the company itself or by an integrator involved. At the time of construction, it certainly met all the requirements and performed its function entirely. Over time, the company's IT landscape has changed. At the same time, the backup system simply adjusted to it as the system developed, and most often no systematic approach that would take into account the importance of keeping the system in line with the initial indicators at all subsequent stages was observed. When building an RMS in your organization, remember that this is only part of your data protection strategy.

We have presented several case studies that demonstrate that the approach to data protection should be comprehensive. Alas, the SRC is just a reserve parachute, not a silver bullet, so when you start creating it, you need to clearly understand what place it will take in the global data protection strategy.

To check how systematically you approached the issue of building an RMS, answer a few simple questions:

  • Do you have a built-in risk model, within which the place of the IBS is registered?
  • What failures does the IBS protect you from?
  • How do you protect yourself from other risks (this may be not just technical solutions, but also other compensatory measures)?
  • Are you sure that the system will recover within the specified time frame?
  • Have you tested this in practice?

Solution

Based on our own experience and the experience of our customers, we have tried to develop an approach that allows us to solve or significantly reduce the consequences of these problems. The essence of our approach:

First, you need to decouple the speed of backup and recovery from the volume of the system. Manufacturers of storage systems, application software and RMS offer some tools that can be used to solve this problem. Below I will describe the most promising of them.

Snapshots allow data to be backed up and restored in seconds with virtually no impact on performance. This is done by means of the array, and at the same time it can be controlled by the SRC, be part of its policy. Such backup and recovery really takes seconds, which distinguishes this technology from classic systems with alienable media.

Another solution could be to use various application tools, such as Oracle Standby, DB2 HADR, MS SQL Always On. All these tools allow you to have a working copy of a productive system, decoupled from the original, which can be deployed instantly. This allows you to start working immediately after failures.

The second is to give the opportunity to recover only the necessary data. Our approach takes into account that when restoring part of the data, we do not need to copy the entire system, we can restore the data that we need at the moment. This is achieved by the ability to quickly deploy or use already deployed systems that contain this data. Just like in the first case, snapshots allow you to solve this problem (you can quickly open a snapshot to a neighboring server and pull out the necessary piece of data). This also includes continuous data protection technologies, for example, Oracle Standby with Flashback, continuous data protection (CDP) solutions. They allow you to quickly deploy a working copy of the data at the right time.

When you need to get one logical block, for example, a row or a database table, these tools greatly facilitate the task, allowing you to restore the necessary piece of data without restoring the entire copy.

The third is to reduce the gap between the appearance of data and their protection. This can be achieved in several ways, based on the specifics of a particular case and the degree of importance of the data.

For example, for less critical systems, the time interval for backup can be reduced to several hours. In this case, we use snapshots. They can serve as a restore point, which can be done once an hour. Some modern arrays cope with these processes quite well and can store a fairly large number of system snapshots. This is a great way out of a situation where you need to roll back a while.

For the most critical systems, there may not be a time interval at all - data must be protected continuously. There are several solutions of this class, for example, Oracle Standby with FlashBack, which allows you to roll back the database some time ago by logging all changes. You can also use the Oracle ZDLRA PAC, which almost synchronously receives all changes to the database, or general-purpose hardware and software systems, for example, EMC RecoverPoint, Vision Solutions Double-Take software. They also log all changes and allow you to restore to any point in the time interval.

When it comes to innovations in backup and recovery systems, one cannot fail to mention the Oracle Zero Data Loss Recovery Appliance (ZDLRA). This software and hardware complex of the Oracle Engineered Systems family provides the ability to backup and quickly restore Oracle Database of any platform and any Edition (Enterprise and Standard). ZDLRA is based on virtual backup databases (Virtual Full Backup), obtained on the basis of the first full backup and subsequent change logs. Due to these virtual backups, you can restore the database to any point in time much faster than with the classic use of the RMS according to the scheme “full backup once a week, incremental once a day”. We can say that ZDLRA continues the direction given by Oracle Exadata. In Exadata, due to special Software, an innovative storage system is implemented, optimized for Oracle Database tasks. And in ZDLRA there is a special Software that optimizes the backup of Oracle Database.

Now we are talking only about operational recovery. In the event of major disasters or the need to recover more time back, regular backups remain an indispensable tool. But in the current conditions, this is only a reserve parachute, opened at the last moment.

The fourth is the reduction of latent errors. There is only one way to make sure that the backup is working correctly - to try to restore it. This is the most correct and rarely used method by our customers.

But we offer a way out of this situation. First, to have easily recoverable system instances. This is again a story about snapshot and standby systems that can be quickly deployed and tested. It will take incomparably less time and effort than "unwinding" the entire backup. Of course, this does not always help, but it leaves a little more hope that in the event of an emergency it will be possible to recover data at least by these means.

Secondly, some SRKs allow you to perform automated testing. At a certain time, according to a schedule, you can run virtual machines in an isolated environment and, using predefined algorithms, check whether the data has really been restored, whether the application is available, whether it is consistent, and whether it responds to the necessary requests. In this way, administrators can be saved from long routine work.

Fifth - the transparency of the backup system. The described integrated approach involves the construction of a complex system using a variety of technologies from different manufacturers. The task of making this system really workable, laying in it the possibility of further changes and scaling, is not trivial, and it can be solved in two ways:

  • The first way - provided that the customer is competent enough himself and wants to take this system into operation. Here, as an integrator, we help to build all the necessary processes, create a regulatory framework, develop all the necessary instructions and plans so that the customer's IT department can further independently develop and operate the system in the right direction. And then transfer all this practical base of regulations and tasks to the customer in the form of a working system of business processes.
  • The second way, when the customer is not sure that he will be able to maintain the RMS system constantly in a combat state, the way out is to transfer the system to partial or full outsourcing. And we have such clients who successfully use this service, constantly increasing both SLA requirements and the scale of our involvement as an IT outsourcer.

Unfortunately, there is no universal recipe yet that would solve the problem of data recovery in the current conditions of constant growth and complication of systems. Only the combination of the above solutions and a systematic approach will allow companies to recover data within the timeframe required by the business.