Skip to main content

Windows 7's Built-in Backup

Windows 7's Built-in Backup



Microsoft has a history of bundling really bad backup programs with their operating systems. The company has been accused of a lot of monopolistic behavior, but their backup programs often seemed designed to not threaten the market for third-party competitors.




So I wasn't prepared to like Windows 7's Backup and Restore. But much to my amazement, I kind of do.



does image backups for system protection and file backups for regular data protection--and does both for the Home Premium as well as the Business and Ultimate editions. For file backups, it defaults to backing up exactly what you should be backing up (libraries, appdata, and a few other important folders), and lets you tell it to back up any other folders you want to protect.
 
Backup and Restore can backup files incrementally, saving only those created and changed since the last backup. And it does versioning--if several versions of a file have been backed up, you can pick which you want to restore. It defaults to restoring the most recent backup, and generally avoids the confusion that versioning causes in some people.
And it's all very easy and direct.

Not that it's perfect. Backup and Restore allows you to pick which drive you wish to backup to, but won't let you pick a folder in that drive. It can be pretty picky about restoring an image, to the point where I wouldn't use it for image backup. You can save to a network, but not over the Internet. If you're looking for something better, see 7 Backup Strategies for Your Data, Multimedia, and System Files.

PC World Senior Editor Robert Strohmeyer (full disclosure: He's my editor) created a video showing how to set up a scheduled, automatic backup with Backup and Restore. But since I don't believe in automatic backups--at least not to local media like an external hard drive--I'll tell you how to back it up manually.

(What do I have against automatic backups? For them to work, the backup media must always be available. This is fine if you're backing up over a network or the Internet, but an external drive that's connected to your PC 24/7 is vulnerable to the same disasters that could destroy the data on your internal hard drive. It's best to connect a backup drive only when you need to.)
To launch the program, simply click Start, type backup, and select Backup and Restore. Plug in your external hard drive and click Set up backup. Make your own decisions in the setup wizard, but when you get to the last page, click Change schedule. Uncheck Run backup on a schedule (recommended), and click OK. You're set up.

To back up your data (and you should do this every day), plug in the external drive, launch Backup and Restore as described above, and click Back up now.



You can continue working as you back up.

Source : www.pcworld.com




Comments

Popular posts from this blog

Quiz 1 : Mobile Application Development - Android

Download PDF Version From Here   MCQ 1. Select a component which is NOT part of Android architecture. a. Android framework   b. Libraries          c. Linux kernel   d. Android document 2. What is AAPT? a. Android Asset Processing Tool.             b. Android Asset Providing Tool.   c. Android Asset Packaging Tool.             d. Android Asset Packaging Technique 3. Required folder when Android project is created. a. build                 b. build/               c. bin     d. bin/ 4. Adb stands for   A. Android Drive Bridge.                  ...

IP Delivery Concept

It is the practice of using the IP, the network address of the connecting computer, whether robot or human, and sending different content based on that. The database used to assist with the process. In the case of geo-targeting: Databases stores various ranges of IP addresses, and indicates where this ranges of IPs are in the world. A geo-targeting script scans the list to see in which country the current IP is located. Programmer can use this value to effect changes in presentation or logic. In the case of cloaking : Databases stores the IP addresses of the various spiders that may hit your site. The cloaking script scans the list to see if the current IP is a spider. The programmer can use this information to effect changes in presentation or logic. Implementations of IP-delivery-based cloaking also look at the User-Agent header of the request. The user agent header is a header sent by both browsers and spiders. But it is not regarded authoritative, bec...

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.