Solved

batch file for backup

Posted on 2011-03-17
6
220 Views
Last Modified: 2012-05-11
I have an external drive that I would like to make a copy of on a regular basis. I have shared the external drive and want to create a batch file on another computer to make a backukp.
Is it possible to tell the batch file to backup from an IP address and not give it a computer name?

At the moment one of my other batch files looks like below. I have tried replacing the name with the ip address but nothing.

rem set backu location
set dest=l:\typing

rem set source to backup
set source=\\exchts\d\typing

thanks
0
Comment
Question by:nibby
6 Comments
 
LVL 9

Expert Comment

by:djpazza
ID: 35155436
if the ip was 192.168.2.100 then

 
rem set backu location
set dest=l:\typing

rem set source to backup
set source=\\192.168.2.100\d\typing

copy source dest

Open in new window

0
 
LVL 9

Expert Comment

by:djpazza
ID: 35155450
0
 
LVL 8

Expert Comment

by:bright12
ID: 35155700
You can also use the following free backup software

http://www.educ.umu.se/~cobian/cobianbackup.htm
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 2

Expert Comment

by:hari_b85
ID: 35277743
Bacth can execute a copy from an IP address too.
Wht error are you receiving while you run the above mentioned script.
0
 
LVL 2

Expert Comment

by:hari_b85
ID: 35292986
you can also use a command "Robocopy" which will copy the updated data and will reduce the time to copy also.
Do let me know in case of any help required.
0
 
LVL 8

Accepted Solution

by:
subhashchy earned 500 total points
ID: 35380158
I think there is a typo in DJPazza script..Here it goes.

rem set backu location
set dest=l:\typing

rem set source to backup
set source=\\192.168.2.100\d\typing

copy %source% %dest%

Open in new window



0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I have published numerous articles here at Experts Exchange that present programs/scripts written in a language called AutoHotkey. Each of those articles has a brief paragraph describing where to download the product and how to install it. I have al…
Introduction: Recently, I got a requirement to zip all files individually with batch file script in Windows OS. I don't know much about scripting, but I searched Google and found a lot of examples and websites to complete my task. Finally, I was ab…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now