Solved

Backup Procedures and Acronis SW

Posted on 2013-12-08
6
352 Views
Last Modified: 2016-10-27
EE Pros,

I have two questions about proper backup procedures;

1.) I have the choice of simply backing up my data files or copying them over to another drive.  If I copy them, I can then access them remotely from my external drive that is connected to my router.  If I back them up using Acronis I cannot see the file but simply restore it.  What's the advantage of backup software such as Acronis?  Is it so I can do automatic backups that only back up changes...thus saving time?  Or is it for some other reason?

2.) With Acronis, I can clone a system.  Does this mean that I can restore the exact system with data and applications on another PC?  Don't the hardware chips or PC components have to be exactly the same?

Thank you in advance,

B.
0
Comment
Question by:Bright01
  • 2
  • 2
  • 2
6 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 250 total points
ID: 39704838
If you just copy the files as they are, you can modify them directly on the backup location, so after that they are different from the original and no backup anymore. For a proper backup it is important that the backups can't be changed before you restore the files.

Even with acronis you should be able to mount the backup image and then see it's contents.

Cloning a system means that you are making a 1:1 copy of the disk to another disk. You can then boot that disk as you would the original. If I'm not mistaken acronis includes an option "restore to disimilar hardware" or something similar. That means it removes drivers etc and you can boot the cloned OS using different hardware. It will just reinstall the drivers etc when you first boot.
0
 
LVL 8

Assisted Solution

by:Emil_Gray
Emil_Gray earned 250 total points
ID: 39704864
You can mount an image with Acronis True Image 2014 and access it as an ordinary disc.
0
 

Author Comment

by:Bright01
ID: 39704890
Sorry to expand the question;  

Is an "image" the same thing as a "clone"?  Or is it simply the backup (not copy)?

B.
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 8

Expert Comment

by:Emil_Gray
ID: 39704907
It is a backup image. My personal preference is cloning the entire disc to use as a back up. An image and a clone are two different animals.
0
 
LVL 88

Expert Comment

by:rindi
ID: 39704924
Acronis and other similar backup utilities (I prefer those made by paragon) backup into image files called "image files". It isn't the same thing as a clone. A clone is as a said a 1:1 copy of disk and is directly usable again. and the image file is one file which contains all the backed up data. It has to be restored before it can be used. The contents of the cloned disk and the image file though are the same.
0
 

Author Closing Comment

by:Bright01
ID: 39704993
Thank you guys!  I'll take your advise and make a Clone of my System.

B.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

VM backup deduplication is a method of reducing the amount of storage space needed to save VM backups. In most organizations, VMs contain many duplicate copies of data, such as VMs deployed from the same template, VMs with the same OS, or VMs that h…
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now