|Stratesave Backup Organization|
Backup of Short Filenames
You can choose different media for daily, weekly etc. backups. For example, store your daily differntial backups
on fixed disk, which is fast, and needs no media handling. Store your monthly or weekly fullbackups
on tape, which are cheap.
System state can be backed up differentially. To assure all system state
files have been backed up correctly, catalog of base backup will be read first. Then, for every file it will be checked if the correct version
(same creation and modification dates) is already backed up. It does not rely on before/after file dates, which are not reliable for
system state files. This step of checking every file assures the system is backed up at the latest state after every differential backup,
but keeps the differential backups small.
To keep the backups and restores fast, Stratesave 6.0 has high speed optimized catalog reading.
For differential backups, Stratesave finds out by itself, where to restore the selected files/directories.
For example after a differential backup, all files are listed for selection, which were present at
the time the differential backup was made, even if they are stored in an earlier backup.
You can choose to restore from an earlier backup, and are also presented with the state of your files
at that time, even if some files are stored in an even older backup.
Optionally you can choose to restore from a specific backup, independent of the backup plan.
In this case, only files from that particular backup will be shown/restored.
Also known as "8.3" names, they were introduced for backwards compatibility with Windows 3.1/MSDOS.
But the surprising thing is, from Windows 95 to even Windows 2000, short filenames are used heavily by
applications and the operating system itself. Even a blank installation of Windows has many
entries in the registry referring to files and directories with the short filename (like PROGRA~1).
For this reason, Stratesave backups include short file and directory names. If a short name can't be
restored correctly (because it is already taken by another file/directory), a warning message will be shown.
This will give you the chance to check the registry for references to that short name, and possibly correct
the registry entry.
The 'compare option' of Stratesave now compares much more in details. This is not so much to check your backup
(which can be done with the 32-bit CRC checksum run quite effectively), but to compare your
current PC data/configuration, with what it was when your backup was done.
In addition to comparing file data, Stratesave 'true compare' checks file/directory securities,
creation and modification times, attributes, and the NTFS specialities (streams, sparse files, links,
reparse points, file compression, file encryption). It also reports files/directories, which have been added
to your PC, which are not in backup. For registry, true compare compares each registry key and value,
also listing all differences (security changes, changed/added/removed keys/values etc.).
All this is displayed in a list (1 line per difference), which can be copied to clipboard for further processing.
A fast compare detects only added and removed files and directories, and changes in file dates and sizes,
without comparing file data.
Why is this a must have security feature?
Lets imagine you install some Software which you downloaded from the internet.
Maybe you prefer to uninstall it after having tested it. Now you may ask yourself: Did this Software leave something
on my PC, and, if yes, what? So before you install the downloaded Software, make a PC backup with Stratesave (even an
differential backup will do the job, which usually is done quickly). Then after uninstall,
make a compare run, to find out about the changes.
Another scenario is, you have to give a "friend" access to your PC for some reason. After this you
want to protect yourself from trojan horses and such. Or maybe you are suspicious that
a hacker might have intruded your system. Here it is important to check out carefully for
added files and registry keys/values or security changes. Even 1 file added to your system directory
or 1 key added to the system registry can be enough to form a side door into your system,
for someone to gain system privilege later.