Solved

Archive bits

Posted on 2006-11-22
4
491 Views
Last Modified: 2010-04-03
Hi

If a file is backed up, and marked as archived. Then at a later date that file is updated, what happens to the archive bit. Does it go away or is it still there.

If it is still there, will the file NOT get backed up as the archive bit is still there (assuming the type of backup that is to be used checks the archive bit first)
0
Comment
Question by:LFC1980
  • 2
  • 2
4 Comments
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 17999846
It's simple... the archive bit is turned on whenever the file is updated/saved or copied.  The only way to turn it off is by using a backup utility or copy utility that supports turning it off when you make a copy, and then only depending on the type of job.  If it's an incremental or full backup, the bit is turned off.  If it's a differential, it is NOT turned off.
0
 

Author Comment

by:LFC1980
ID: 18000147
Still a bit unclear.

If i run a back up job and then a file is marked with an archive bit. The next day i make changes to the file, then when the backup jobs runs again, will that file be backed up again as it has changed, or will it not because it had the archive bit.
0
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 100 total points
ID: 18000167
As I said, it depends on the backup job.  

A full backup job backs up EVERYTHING and resets the archive bit to OFF on EVERYTHING.

A differential backup job backs up ONLY files with the Archive bit set to ON - it does NOT change the archive bit.  Thus, these backups GROW until a full is done.

An incremental backup job backs up ONLY files with the Archive bit set to ON - then it turns the bit OFF.  These backups tend to be consistantly small, but can be time consuming and a pain to restore.

For more information on backup in general, you should review my backup comment - it started as a comment here and grew so big and comprehensive, I turned it into a web page.  Reference:
http://www.lwcomputing.com/tips/static/backup.asp
0
 

Author Comment

by:LFC1980
ID: 18003399
Oh yeah....sorry about that, i'm just confusing myself


Thanks
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

We wanted to provide an in-depth explanation of the Ping Node offering clarifications on its function and usage. Incorrect Ping Node configuration and functionality can cause problems with HA clusters. The importance of this article is critical for …
This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now