Solved

Discovering Tape Contents (What BU software was used?)

Posted on 2006-06-27
2
227 Views
Last Modified: 2012-05-05
Hi all,

   Fun question here.  I've got a series of DLT IV tapes sitting here, I'm not sure what software was used to back up the data at all.  NTBACKUP and Ultrabac 8 (Fresh install) do not seem to recognize or show valid data.  I do know that NTBACKUP noticed data, and Ultrabac 8 is allowing me to push it to a file right now.  I tried the INDEX TAPE function in Ultrabac, but it comes up with a "no index / data" found type of error.  The drive, cable, and HBA are good.  I'm new at backups and was asked to go through some of this.

Thoughts anyone?

Thanks
0
Comment
Question by:jennifer_borman
2 Comments
 
LVL 8

Accepted Solution

by:
Disorganise earned 500 total points
ID: 17000634
Do you have a list of backup products that were used in the past?

The two 'big' ones a few years ago were Arcserve (Computer Associates) and Backup Exec (Veritas).  Both will read NTBackup format tapes, and have varying success at read each others format.  Both have trial versions available which give you about 45 days to 'play'.

I start with these two - download/order the trial version, install it and then try inventory/scan the tape before running a catalog/merge.

There are many other backup software vendors around of course so it'll be a matter of trial and error.  your best bet is to ask around for some IT staff who've been there a while and might remember what products were employed.

The other alternative is to outsource to a data recovery firm.  These guys generally have specially written software that can read pretty much ALL the different formats and thus determine what software was used, or simply execute the restore directly.  Of course, this costs money.
0
 

Author Comment

by:jennifer_borman
ID: 17456722
Good grief!  I left this one open way too long.  Disorganise, I appologize about the delay.  This project was passed over for other stuff (red tape...).  I haven't tried ARCServe, but I think you might be on to something...

I'm awarding points for what it's worth to you:)  I appreciate the help!

-Jennifer
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

We wanted to provide an in-depth explanation of the Ping Node offering clarifications on its function and usage. Incorrect Ping Node configuration and functionality can cause problems with HA clusters. The importance of this article is critical for …
The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now