In Backup4all you can clear the backup job, which means to delete all backup versions from destination and also delete the backup catalog. That will result in a fresh job, starting that backup from the beginning.
To create a new backup job, click on the "New" button from the application's toolbar. For each backup job you must specify at least its name, a valid storage destination and the source files, the rest of the options not being mandatory. In New Backup Wizard, you can switch anytime to Advanced mode for more configuration options.
To create a backup plugin for a specific program, you will need to install the Backup4all Plugin Creator and also another application that will monitor the 3rd party program installation. Using the information from the monitoring program, Backup4all Plugin Creator will generate an XML file (backup plugin) that can be loaded in Backup4all as a Predefined Backup. Please note that advanced computer skills are required to create a backup plugin.
OneDrive is a file hosting service that allows users to upload and sync files to a cloud storage and then access them from a Web browser or their local device. You can also use Onedrive to access and manage files from multiple devices.
Full backup is the starting point for all other backups and contains all the data in the folders and files that are selected to be backed up. Because the full backup stores all files and folders, frequent full backups result in faster and simpler restore operations. Remember that when you choose other backup types, restore jobs may take longer.
This article explains how to use an Amazon S3 storage account as backup destination in Backup4all. The idea is to use a third party application (such as WebDrive) to map the Amazon S3 account as a local drive. This way, Backup4all will recognize the mapped drive as a valid destination for backups and you'll be able to perform an online backup of your data.
The differential backup contains all files that have changed since the last FULL backup. The advantage of a differential backup is that it shortens restore time compared to a full backup or an incremental backup. However, if you perform the differential backup too many times, the size of the differential backup might grow to be larger than the baseline full backup.
Mirror backup is identical to a full backup, with the exception that the files can be compressed/encrypted only individually and only the latest file version is preserved in destination. A mirror backup is most frequently used to create an exact copy of the backup data. It has the benefit that the backup files can also be readily accessed using tools like Windows Explorer.
Backing-up is a crucial process that everyone should do in order to have a fail-safe, for when the inevitable happens. The principle is to make copies of particular data in order to use those copies for restoring the information if a failure occurs (a data loss event due to deletion, corruption, theft, viruses, etc.)
If you work in the backup field and want to make money promoting an excellent backup program, then Backup4all is the right software. This section contains answers for frequent questions regarding a possible partnership with us in order to resell Backup4all:
This article will show you how to create a new backup job using Backup4all. The backup sources can be located in various places and the backup destination be a local hard drive, a network place, FTP server or SFTP server.
To make a full or a filtered restore start the Restore Wizard by pressing the Restore (or F7) button from the application's toolbar. You can restore to the original location or to a different location of your choice.
This article describes what is keyboard authentication and how it can be used. Keyboard authentication is the advanced form of password authentication, aimed specifically at the human operator as a client.
Every digital certificate has a pair of associated cryptographic keys. This pair of keys consists of a private key and a public key. Public/private key pairs are used for asymmetric encryption. Asymmetric encryption is used mainly to encrypt and decrypt session keys and digital signatures.