Program or Lesson 9:30 - 10:30 AM
One on One Help 10:30-?
In the Library
SPECIAL INTEREST GROUPS:
If you would like to meet in a small group to discuss special computer related subjects or form a Special Interest Group lets discuss it.
Our bulletin is also available on line by visiting tecc.apcug.org and clicking on bulletin.
|Our weekly program or
lesson is intended
to be of interest to all computer users.
Following the program an allotment of time will
be available for one on one help to those
who want a better understanding of something done during the presentation.
Upcoming EventsWednesday MARCH 12, 2014 Meeting
9:15 AM Set up your computer
9:30 AM Special Guest Speaker Linda Stainer will make a presentation on Trails End Club new web site.
10:30 AM One on One help
Backups and Disk Cloning
Recap of October 2013 Meeting by Anne Moss, Secretary, Northern Neck Computer Users’ Group, NJ
October 2013 issue, The Computer Link www.nncug.org mcmillan (at) va.metrocast.net
Brian Riley, Vice President of the NNCUG, gave a Membership Meeting presentation on computer backups and cloning of hard drives. Most of his presentation centered on what you can do to get your computer working quickly after a virus infestation or hard drive failure.
He explained that while backing up is necessary, the problem is that you have to have a working operating system and backup software to restore the backup you made. This may entail having to reinstall the operating system and backup software before you can even start to get your computer back.
He then explained the difference between cloning a disk and making a disk image. With cloning a disk, you get an exact copy of the disk, that if inserted into your machine, will allow you to resume work from the point the clone was made. Disk imaging on the other hand, which is how backups work, makes a copy of the contents of the disk in some kind of compressed format (zipped), which then has to be restored by a program that can read that format.
Usually this is done with a “restore” disk, which is a bootable CD or DVD that contains enough of an operating system to run the backup software that can restore your drive, but requires you to make that disk ahead of time. If you haven’t done that (and most backup software, including what comes with Windows 7, has utilities to make one of those disks), you need to restore from the original Operating System Install disks. This is a time consuming process!
Brian showed us what he called a “toaster” drive, which is a USB or ESATA device that allows you to put a regular 3 ½ “ (desktop hard drive) or 2 ½” (laptop drive) in a slot, and run your backup or clone to it.
Tiger Direct has a listing of toaster drives here (NewEgg and Amazon have them also) http://www.tigerdirect.com/applications/category/category_slc.asp?MfrId=0&CatId=2785
He then explained that if you have chosen a computer that has your C: accessible from the outside of the machine, you can take that disk and easily and quickly replace the damaged or infected drive with it.
Brian explained he had made a clone of the laptop drive he was giving the presentation on the night before, he simulated the computer becoming infected with a virus, shut it down, replaced the hard drive, and rebooted continuing the demonstration, all within three minutes.
He pointed out making a clone is not the complete answer to backups: clones do not do versioning of your files for example, and it is still important to do a regular backup.
There are two key questions you have to ask yourself in choosing a backup method:
Things that cause data loss come in many forms: from “happy clicking”, where you accidentally overwrite something you have been working on all day with an inappropriate up-date; virus infestation that makes your machine unusable and may scramble the contents of your hard drive; hard drive failure (sooner or later they all fail); or catastrophic event such as a fire or burglary.
Even if you are using anti-virus software, your machine can become infected by a virus that was built to get around that software. Often the first thing these viruses will do if they manage to get a foot-hold on your machine is turn off your anti-virus software.
Brian suggested a simple step: since many viruses work on the account level, you should always create a second account on your machine with administrative privileges.
This may allow you to log in as that other user and run your anti-virus software that has been disabled under your main account.
He also suggested you should hover over any link with your mouse to see where it is sending you. Depending on the application, the address the link is sending you to will be displayed in a tool-tip or on the bottom of the screen. If that address goes somewhere unexpected, don’t click on it!
What backup software should you use?
Windows 7 ships with backup software, and allows you to make a restore disk. It doesn’t do cloning, it isn’t easy to tell what it is backing up, and the backup requires a disk larger, sometimes double the size, of the drive you are using as your C: In other words you would need a one terabyte drive to back up a 500 gigabyte one.
It was suggested using Macrium Reflect, which is available as either free or paid software. The major difference for the home user between the two is the free version can’t do incremental backups (that is, only backup the files that have changed since your last full backup). You can read more about it on their website:
Along with the free version, the Standard version costs $49.99, and the Pro version costs $58.99.
There is cloning and backup software available from other vendors also.
Acronis is another backup/cloning program. Brian and Rob stated it is much more Bloated but not as user friendly as Macrium.
If you are interested, reviews of 10 of the top contenders for 2013 can be found here:
Brian emphasized that if your concern is getting your computer up and operating as quickly as possible from a simple hard drive failure or virus infestation, then cloning is the way to go.
He also made the point that one does NOT have a backup UNTIL it is confirmed that the data can be RESTORED from the backup!
Your article; deadline for next bulletin is Tuesday
noon each week. Only what you write may be published. We cannot
without written permission. Simply
click here EDITOR AT TECC
and paste your write-up to submit it.
Share your computer experiences with other members. We need articles to publish in the TECC Bulletin each week.
YOUR MEMBERSHIP INFORMATION Change
unsubscribe to this bulletin, etc. Use link below.
UPDATE YOUR MEMBERSHIP