Highly Reliable Systems: Removable Disk Backup & Recovery


Monthly Archives: June 2018

General Data Protection Regulation GDPR and Backup

June 29th, 2018 by

Have you heard of the General Data Protection Regulation – GDPR? Do you do business in Europe or with European citizens?  The GDPR regulation is intended to protect the privacy of individuals and has wide ranging implications for technology companies and data backup.  After four years of preparation and debate the GDPR was finally approved by the EU Parliament on 14 April 2016. Enforcement date: 25 May 2018 – at which time those organizations in non-compliance may face heavy fines.

GDPR was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy.  The GDPR creates an EU-wide set of standards for the protection of digital personal data relating to online or real-world behavior for EU internet users. Importantly, these standards apply to the personal data of EU internet users regardless of the location of the entity holding their data.

There are a variety of previsions but one we will discuss here is the so called “Right to be Forgotten” or RTBF in which a user can demand his personal information is removed   The regulations states:

Data subjects have the right to request the controller to erase his or her personal data without undue delay where: the data is no longer necessary for the purposes collected; the data subject withdraws consent; or the data subject objects to data processing Where the controller has made the data public, the controller shall take reasonable steps to inform the controller processing that data of the erasure request.

Let’s discuss this requirement in the context of backup.  Many backups are “image based” in which files are added to a large database structure.  This “wad” of files may take the form of anything from a .zip to a virtual machine image (VMDK, VDI, VHD etc).  The central question is:

If a user requests his data be deleted, does that also apply to all backups?

The reason this question is key is because in most cases it’s impossible to delete a file (or really a record inside of that file) from an image based data store without corrupting the rest of the data.  Since many backups are image based, not record based, even if you could identify the blocks pertaining to a given person inside a database stored inside a file or series of files, deleting those blocks would corrupt the rest of the backup.  And the idea that you would restore every copy of the hard drive you have, delete the files or records associated with the person in question, then re-backup the drive is difficult to contemplate. Ironically, since it is also risky (you could accidentally corrupt the backups) you violate another part of the GDPR, which is the requirement to be able to safely restore personal data that was deleted or corrupted.

One option is to go back to doing backup at a file level using a product like RNAS with High-Sync, but it’s unlikely that will be a choice for everyone.  Even then, deleting one person’s record inside a structured relational database has similar problems as discussed above.  Like the HIPAA law in the United States, much speculation about what the regulation means and how to comply with it has been written.  With the UK leaving the Union, the regulation and who enforces it is mired in politics.  Time will tell how it impacts your backup policies.

Posted in Blog, News

NetSwap Restore: Restoring your High-Rely NetSwap Plus to Factory Default

June 28th, 2018 by

Please note, you will need a monitor and keyboard attached directly to the NetSwap along with a 4GB or larger USB flash drive. You will also need to save a copy of your current Config to restore your settings after the restore is complete. This can be done by selecting Export Configuration from the left-hand sidebar on the Web GUI.

 
Determine the make and model of your NetSwap device by checking your PO, or by contacting our Technical Support department. Visit the following link and download, and then run the High-Rely NetSwap USB Installer. https://www.high-rely.com/downloads/high-rely-usb-installer-version-2-16/ After accepting the terms and conditions, you will choose the High-Rely Restore Image from the drop-down box. Depending on the Model of your NetSwap Device, you will choose the corresponding Image and software version. After selecting the correct model and version, you will need to mark the checkbox that will now appear to the right to begin downloading the selected ISO image. Once the ISO has finished downloading, you will browse to the download location and select your USB Flash Drive. The USB Installer will now begin creating a boot-able USB key that will be used to restore your High-Rely NetSwap device. Once the Key is done being created we will now move over to the NetSwap device.
Begin by shutting your NetSwap down. Please make sure all removable drives are removed or turned off and no other peripherals are attached other than the mentioned monitor and keyboard. Plug the newly made USB key into the NetSwap and power on your device. You will now need to boot to the boot select menu. This can usually be achieved by pressing the F11 key at startup but may vary depending on your Mother Board. Once in the boot select menu you will want to choose the Generic Flash Device and not UEFI. The NetSwap will now boot the created USB key.  You will now see an option to restore you High-Rely NetSwap device. Go ahead and press enter on the first option and the NetSwap will begin restoring. After the restore is complete the NetSwap will shut down automatically and you are now able to remove the USB key from the device. Restart the NetSwap and boot as normal. Once the NetSwap has come back up, please make note that the IP configuration may have changed. You will now be able to log back in to the Web GUI of the NetSwap using the default login of hradmin for the username and password for the password. Once logged back in you will be able to select Import Configuration from the left-hand sidebar and select the recently saved configuration to restore all settings.
Posted in Blog

Automatic Replication on Drive Swaps

June 28th, 2018 by

A brief overview on how to create an Automatic Replication Job that will start when drives are inserted into the RNAS.

Create a new job

Begin by creating a new job from the Profile Overview screen. In this example we have selected two drives for our paths. The left-hand path will be the Primary Drive while the right-hand path will be our secondary drive that we will be swapping in and out. In this example we will be creating a job that will start an automatic replication of the two drives upon the secondary drive being inserted into the RNAS.

Creating a New Job.

Change from Drive Letters to Disk Names

If we want the RNAS the only replicate to a certain drive when it is inserted into the secondary bay rather than any drive, we can label the path names with the Disk Names rather then the Drive Letter. For example, instead of F:\ denoting the path we can use Bay 1:\ as seen in the example below.

Changing Drive Letter.

Profile Settings

We will now select our options for the for the profile. Begin by setting the Copy Directions from Left to Right. Next, Select the Sync Operation Mode that fits your needs. In this example we will be using Standard Copying. We will now move down to the advance settings area. On the Schedule pane select the tab for Monitoring/Real-Time Sync. Next, check the checkbox for Run profile when drive is available and select Once. This setting is telling High-Sync to automatically start the job upon the detection of the drive being inserted. Because of this we do not need to schedule the job and all other options can be left as is.

Profile Settings.

Running the Job

After saving the profile and giving it a name, we will be taken back to the Profile Overview page where we can see our Job is now listed. Go ahead and check the checkbox next to the profile and then click on the gear icon on the top taskbar. We will now go down to Running Options and select Run Checked Profiles Unattended. This will allow High-Sync to schedule the Job and run it without any input required by the user.

 

 

 

 

We can now press the play button to start to Job and we are finished. You are now able to swap drives as needed, and High-Sync will do the rest.

 

Posted in Blog

Netswap Encryption setup using Truecrypt

June 22nd, 2018 by

We’ve previously discussed the ability of the NetSwap NAS devices being able to encrypt using the Truecrypt algorithm.  In this Blog, we’ll do a detailed walk through of setting it up.

High-Rely NetSwap Plus Encryption Setup Guide

Your NetSwap Plus Device is ready for Volume Encryption straight out of the box. Volume Encryption on the NetSwap Plus is compatible with TrueCrypt, in format and encryption/hash algorithms, and encrypted volumes are compatible with the TrueCrypt software for Windows, and Linux.

WARNING: To setup encryption on a drive, you will need to re-format a drive, causing a loss of all data!

To setup a drive with encryption, you will need to logon to the Web Interface for your NetSwap Plus Device, to make sure the drive is not shared either via NAS, or iSCSI.

 

 

 

Once it is determined, the drive is not shared over the network, the next step is to format the drive and setup encryption.

Under the Action header, select Format.

 

 

 

This will take us to the Format and Partition Disk menu, where we will format the drive and choose our encryption settings.

The first two sections, Disk Identification and Partition Settings, can be left as is.

Under Encryption Settings, check the box to Encrypt Data. We will leave the box to use file container unchecked. Next, we will choose our Password (key) that will be used to unlock the encryption Algorithm. It is recommended that the password is at lest 20 characters in length, uses a combination of lower and uppercase letters, numbers, and special characters. It is also recommended that names, dates of birth, or words found in a dictionary should not be used.

 

 

 

 

 

Next, we select the encryption and hash algorithm methods. We recommend using AES and SHA-512, however, other options can be viewed and selected from the drop-down boxes for each.

The use of weak keys and secure erase check-boxes are optional, and their description can be found on the right-hand sidebar, under the Encryption Settings subhead. The last section, File System Settings, can also be left as is.

Once all of our options have been selected we will go ahead and format the disk.

Once disk has completed formatting, on the disk status screen, we will now see that the disk is showing as an encrypted volume under Details.

 

 

We are now ready to share the encrypted drive. Begin by going to properties, under the Action sub-head. Once we are in the disk properties menu, we are able to select the share method for the disk.

 

 

 

Go ahead and choose between either NAS, or iSCSI, depending upon your preference. In this example, we will be going over a NAS share.

Select NAS, as your share mode, and give the disk a share name. The next step in to expend the Mount Settings tab. These options will allow us to be able to access the encrypted drive on the network.

 

 

 

The first checkbox should already be checked as default and can be kept as is. We will leave the second check box, and its text box, both blank. We will check the Automount checkbox and insert the password we gave the encryption algorithm earlier. Once this is done, we will click Save at the bottom of the page and proceed with the next step.

After clicking Save, we can proceed back to Disk Status screen, where we can see that our encrypted volume has been shared and will now be available to access over the Network. Since we selected the Automount setting in the previous step, the NetSwap will remember the encryption algorithm key and we will not be required to enter it every time the disk is swapped.

We have now completed the steps necessary to encrypt and access the drive on the NetSwap. We will now proceed with instructions on how to mount the encrypted volume on a Windows machine, in case access to your data is needed outside of the NetSwap.

Accessing an Encrypted Netswap Drive from Windows.

Begin by downloading the TrueCrypt software, which can be found below. TrueCrypt can either be installed to the machine itself, or can be installed on a USB thumb drive to make a portable version.

https://s3.amazonaws.com/highrelydownloads/TrueCrypt+Setup+7.1a.exe

Once we have installed the TrueCrypt software, we are now ready to mount our encrypted volume. Begin by connecting the encrypted drive to your machine, via either an open HDD slot, or an external caddy. Once the drive has been connected, you will see an error message from Windows, stating that the drive will need to be formatted be use. Do not click Format disk. We will ignore this error message; click cancel and proceed.

 

 

 

 

Open Windows File Explorer, verify that you are able to see the encrypted drive, and take note of its assigned drive letter. Take note that even though the drive shows in File Explorer, we are not able to access the drive.

 

 

 

We will now run the TrueCrypt software from either the local machine, or a USB thumb drive. Upon opening the TrueCrypt software, we will be shown the Homepage. Begin by clicking Select Device down in the lower right-hand corner.

 

 

 

 

 

 

 

True Crypt will now scan for all available disks. Once the results are displayed, you will need to select the drive letter we took note of earlier. In this case, we would select drive letter F, which has the the device name of \Device\Harddisk1\Parttition0. Once selected, we will be taken back to the TrueCrypt Homepage, where our encrypted Volume will now be selected. Click on the Mount button below the drive and enter the Encryption key from earlier.

We have now successfully mounted the encrypted Volume to our Windows Machine, and have full access to our drive.

TrueCrypt also has the option to Automount the drive, however for security purpose, we recommend not to choose Automount outside of the NetSwap environment.

 

 

 

For further help, or any questions that may arise during setup, please contact our Technical Support department by visiting: https://www.high-rely.com/support/

Posted in Blog

Restoring Files using High-Sync

June 22nd, 2018 by

Restoring Files From Backup Storage 

Restoring files from a backup is done by copying in the opposite direction. Normally, the restore operation copies from the right-hand side back to the left-hand side.

The Restore Wizard will guide you through the steps.  Start by choosing “Wizard Mode” from the menu at the top.  The screen should look like the one nearby.  Then select “Edit or Run one of my saved profiles”

 

File Destination
You can choose to put files back where they came from or choose a different destination folder for the restore, so that the restored files aren’t copied back to their original location immediately. Restoring can sometimes be easier if you are copying to a new folder and don’t need to worry about any errors overwriting existing files.  This would occur if existing files are open (locked) or if there are permissions problems during the restore.

Chose Restore to kick off wizard


Fill in each of 5 tabs to restore

Selecting folders and files
To restore only a specific folder, you can modify the profile’s path specification for the right-hand side accordingly (and the left side to match). You can also use the radio button “Pre-Select Folders Now”.

If you are looking for specific files, you can type their names, or appropriate file masks in to the Filename Mask(s) field in the profile.

After starting the profile, you can remove any files you don’t need in the Synchronization Preview using the F5 key.

If no files are shown, because the same or newer versions exist on the left-hand side, then you need to click on Show All in the top left corner of the Synchronization Preview.  The preview pops up after you’ve filled out all 5 tabs in the restore wizard.  Now you will see all files, but no actions have been specified for them yet. So, choose the files you want and specify the desired copying direction using the checkboxes, or the right-click menu or the F8 key.

selecting files and folders

Older Versions
The Restore Wizard will let you specify a Target Date for the restore. This can be an older date, in case you want to restore older versions of the files rather than the latest ones. When you edit the restore profile manually, you will find this option on the “File Age and Size” filters tab sheet.

After starting the restore, you will see the newest version of each file in the Synchronization Preview. To select an older version of a file, right-click its line and choose the version you want from the menu.

Manual Restore

If you prefer not to use the wizard, you can set up a restore job manually. Make a copy of the backup profile using the Save As button and change the name a little. Then reverse the copying direction. For the restore, it should now be Right to Left.


 

Posted in Blog

Using Amazon S3 with High-Sync

June 22nd, 2018 by

Amazon S3 online storage is an inexpensive place for any amount of data. After creating an account on Amazon you can start storing data right away. There are no fixed monthly fees but you do pay a low monthly fee for any storage used and Gigabytes transferred.

S3 can be specified as the left or right side of the synchronization. When using S3 for backup (upload to the cloud), it is recommended to use the right side for S3.

Click on the Internet… (world icon) button to configure the Amazon S3 access. In the dialog box that appears, please change the protocol from FTP to Amazon S3. Specify the desired bucket name and your S3 credentials.

Configuring Amazon S3 with High-Sync

S3 Compatible Services
There are any number of S3 compatible cloud providers popping up.  Many are less expensive or may have the advantage of being located in a specific geography.   S3 compatible services are supported by  using a different type of bucket name.  They are specified with an @ symbol as your bucket name:  For example bucketname@cs.hosteurope.de.   Note that S3 compatible services may a 5GB file limit.  Look here for discussion and work around.  For a detailed walk through of Wasabi (one of several compatible S3 services) look here. You may also be interested in creating a server of your own with S3 storage on it.


Buckets

Amazon S3 storage is divided into units called buckets. Each customer can create 100 buckets. However, you must find bucket names that no other customer has chosen yet. Within a bucket, you can store any number of folders and files.


Credentials
On the Internet Protocol Settings dialog, you can enter your S3 access details. You can retrieve the credentials on the Amazon S3 web site.  You will probably want to choose options Save Access ID and Save Secret Key.  It’s a good idea to store these on a USB key or in a safely backed up spot because without them you won’t be able to access your account.

Preserving File Dates and Times on Amazon S3


Filename Encoding – Preserving Timestamps, Versioning

Since S3 storage is bucket and object oriented, by default it does not preserve the dates files were created or modified because there is no “metadata” stored for the files.  If you would like to preserve your files’ timestamps on Amazon S3, you should choose the High-Sync option Filename Encoding. This also allows you to using versioning by keeping multiple versions of each file in backup storage, each with a synthetic name that has the date of the file embedded in the filename.  The file is renamed to the original name when it is restored with High-Sync later on.  Our S3 5GB limit document shows a screenshot of how files are renamed.

Compression / Zipping / Encryption
If you want, your files can also be zipped and encrypted. You will find these options on the Zip tab sheet. When combining compression with filename mangling, you must compress each file into a separate Zip file. So you should only use the two upper checkboxes on the Zip tab sheet.


Speeding things up with the Destination Cache
You can speed up reading the file list with the setting “Cache Destination File List…”. This can be used when you are uploading to a remote folder only from one local PC by doing regular backups.

 


Restoring Files From Backup Storage

Restoring files from a backup is done by copying in the opposite direction. Normally, the restore operation copies from the right-hand side back to the left-hand side.  For more about restoring click here.

Posted in Blog

High-Sync Remote Service

June 22nd, 2018 by

Using the High-Sync Remote Service


The Remote Service is a useful tool to enable some special features like “partial file updating” also known as block level incremental uploads.  This feature is not often used, but the service can speed it up when it is.  To be clear there are two “services” in High-Sync, the High-Sync Service, which is the scheduler and runs profiles in the background which most users will utilize, and the High-Sync Remote Service, which optional and is not needed to run any profiles.

The High-Sync Remote Service is installed on the “other end”. For example, if you use High-Sync on a client which exchanges files with a server, then High-Sync Remote Service can be installed on the server to perform one or more of the following tasks:

  • Unzip incoming ZIP packages. This feature is used in conjunction with the ZIP Package capability in order to speed up the transfer of files.
  • Generate a Remote Listing. This feature is used to speed up the “Building File List” phase.
  • Generate MD5 Checksums for Partial File Updating.

Installation of the High-Sync Remote Service

The Remote Service is installed using the same Setup program from our download page that you use to install High-Sync. When running the Setup, make sure you include the High-Sync Remote Service and its Control Panel.

You will find the High-Sync Remote Service Control Panel in the High-Sync program group in your Windows Start menu. Please run it and install the service with it.

Configure Unzipper

To use the unzipping capability, you need to specify the “folders to watch” on the tab sheet “Configure Unzipper”. Each folder must be the same one that you specify as destination folder in the High-Sync profile on the other computer. Except that here, you specify local folders, but they must be the same ones. If you have several profiles with different destination folders, each one must be specified here on a separate line, even if they are all on the same drive.

The High-Sync profile on the sending maching needs to be set up to “Use ZIP Packages” and on the ZIP Package Configuration dialog, you need to use the setting “High-Sync Remote Service will be used”.

The High-Sync main program will put the ZIP packages into a subfolder called “Incoming High-Sync Packages”. This is actually the folder that the Remote Service’s unzipper will watch, but you don’t specify it. You specify the same folder that is used in the profile.


Configure Checksummer and Remote Lister

The checksummer and the remote lister are configured on the third tab sheet. Like the unzipper, they watch certain folders for incoming files. The incoming files are special request files sent by the synchronizer on the other machine. So, the Synchronizer does not communicate with the Remote Service using any kind of network protocol. Instead, it puts a “request file” with a special filename into the folder on the server, and the Remote Service sees the file, reads it and then knows what to do and deletes the request file.

You need to specify the “folders to watch” for incoming checksum or remote listing request files. Each folder must be the same one that you specify in the High-Sync profile on the other computer. Except that here, you specify local folders, but they must be the same ones. If you have several profiles accessing different folders on this machine, each one must be specified here on a separate line, even if they are all on the same drive.

Using the Remote Listing Feature

Once the Remote Service has been set up correctly, you can speed up the “Building File List” phase considerably by using the checkmark “Left/Right side listing uses Remote Service”, which can be found in the profiles on the “Specials” tab sheet, when editing them in Advanced Mode.

Using the Checksummer Feature for Partial File Updating

Posted in Blog

Installing High-Sync

June 22nd, 2018 by

To Install High-Sync on a Windows PC, select either the 32 bit or 64 bit version of the installer.  The 64 bit version should have “64” in the name.   If your CPU and version of Windows supports 64 bit, choose that. When the program starts click “Run” to begin the install.

 

 

 

 

 

 

 

 

 

You may be asked to confirm whether to allow the program to run (this is Windows User access Control).  Say Yes and the setup Wizard should start.

 

 

 

 

 

 

 

 

 

The default installation location of c:\Program Files\High-Sync will be fine for most users

 

 

 

 

 

 

 

 

 

 

By default the High-Sync with Scheduler and VSS Helper service are selected.  Here’s what each services does

  • High-Sync with Scheduler – Main sync program, required to replicate files and schedule profiles to run.
  • VSS Helper Service for Locked Files – Recommended to Install. Microsoft’s VSS stands for Volume Snapshot Service, also known as Shadow Copy .  It is a technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of computer files or volumes, even when they are in use. In older versions of DOS or Windows, the user would get an error when copying a file that a program or another user had open.  VSS works around this problem by taking a snapshot of the directory. A snapshot is a read-only point-in-time copy of the volume. Snapshots allow the creation of consistent backups of a volume, ensuring that the contents do not change during the copy.  Note that copying an open file may, in some cases, provide a file that is corrupt to the program that uses it depending on the architecture of the program.
  • Remote Service (unpacks ZIP packages, creates checksums).  This service doesn’t do anything if you’re uploading to public cloud providers. This optional service is for special features sometimes used for site to site transfers to a second machine(for example  the machine receiving uploads).  It’s purpose is to speed up “synthetic backups” or when using the “partial file upload” feature.  Partial file upload is also known as block level incremental uploads.   This service can be used with the SSH/SFTP protocol or disk to disk transfer.   If you’re not using partial file upload,  you don’t need this service.  Also note the service would typically be installed on the secondary (remote) machine in a replication pair.
  • Remote Service Control Panel – Used to configure the Remote Service (since you may not have the main High-Sync program loaded on a remote machine.
  • Guardian Service (Monitors and restarts the main service).  Under normal conditions a service like High-Sync will never crash.  However, if it does it means scheduled replications won’t occur.  The Guardian service provides extra protection to restart High-Sync should it quit abnormally.  Microsoft Windows may have a similar restart option

 

 

 

 

 

 

 

 

Choose Start Menu folder where  Shortcuts will go

 

 

 

 

 

 

 

 

 

Finalize by choosing to create icons.  Then click Install

 

 

 

 

 

 

 

 

 

 

Note in addition to the installation path, profiles and logs may be stored in C:\ProgramData\High-Sync.  Look for High-Sync.ini file

Posted in Blog

Windows Storage Server 2012 Licensing

June 20th, 2018 by

All our Windows NAS products now ship with Windows Storage Server 2016.  

Posted in Blog

High-Sync Support for Block Level Incremental File Uploads

June 19th, 2018 by

“Partial File Updating” – Incremental File Uploads with High-Sync


Incremental File Uploads.  High-Sync can detect which parts of a file have changed, and copy only the changed blocks rather than the complete file.   The idea is to reduce copy time after the initial file has been uploaded.  We also call this partial file updating.  This feature is similar to but does not use the Rsync protocol.  In all cases High-Sync must be the only program manipulating destination files in order to track changes properly.

Incremental file uploads are supported when using the SSH/SFTP protocol or when doing drive to drive copies.  You can also use incremental file uploads when using a VPN (tunnel), saving files to a shared drive on the remote side.  If you need incremental block upload capability when using other clouds or protocols that don’t support it, you may be able to achieve this by zipping your files up into an archive with “synthetic backup”.  See Method 3 below.

Incremental block level upload is a good idea to save time for large block oriented file types but may not be as effective for small or stream based files.  Block oriented files include database files such as SQL or Outlook PST, as well as drive images and virtual hard disk images (VMs).  Stream-based files, on the other hand, will usually cause all blocks to be changed whenever they are modified (for example text documents, spreadsheets, zip files, and photos).  To further illustrate this point, Microsoft Word’s .docx format is actually a .zip file, which means that even small text changes modify the entire file because it’s saved using compression.  Obviously if the entire file changes then block-level copying won’t be able to save much time or bandwidth.  It’s also possible that external programs such as hard drive defrag programs trigger changes that require an entire file to be re-uploaded.

While block-level copying is certainly advantageous, some services simply can’t add it. The reason stems from the fact that in order to perform block-level analysis on a file, the service must be able read it, which it can’t without knowing the file’s encryption key.  In particular, we’re talking about zero-knowledge cloud services. With a zero-knowledge provider, only you, the account holder, hold the encryption key. Box, Google Drive or OneDrive aren’t zero-knowledge services, yet they do not support block level incremental.  You have one of two choices open to you: either you go with block-level copying or with zero-knowledge encryption to the cloud. Do you want to keep a cloud storage service from being able to read your files or do you want to be able to sync content as quickly as possible and with minimum bandwidth used?  If you’d like to learn more, here is an good article.  If you use synthetic backup to a .zip file, you may be able to overcome these limitations.

Copying only the changed blocks can save bandwidth and time, especially over a slow connection. When copying between local disks or in a LAN environment, it can save bandwidth too, but may not always save much copying time, because the source file has to be read in its entirety every time in order to determine the changed blocks.  In some cases it can actually slow transfers down.

Partial FIle Uploads using High-Sync

Block Level Incremental

In High-Sync, block-level copying is called “Partial File Updating”. In many cases, you need to choose only this one checkmark, which is on the Special settings category in the profiles (in Advanced Mode).

The program needs to have fast access to at least one of the sides of the synchronization. The other side may be a low-bandwidth connection. If you are using an Internet Protocol, please note that only SSH/SFTP supports block-level updating directly. Block level copying with SSH/SFTP has only been implemented for uploads, not downloads.The other protocols can only be used with Synthetic Backup (see Method 3 below).

Partial File Updating can work in three ways:

Method 1: Uploading Files (works with local/network drives, VPN, or using SSH/FTP)
Method 2: Speed up using special service software on remote side
Method 3: Backing up to a ZIP rather than file sync (synthetic backup)

Method 1: Uploading Local Files
In this mode, the block level incremental speed-up is available when you copy files from a location to which you have fast access (preferably your own hard disk). The destination can be a slow connection, but it must be a normal file system (either LAN or VPN) or SSH/SFTP. For other connections, you can use Synthetic Backup (Method 3).

  •  Source access must be fast
  •  Destination may be slow
  •  MD5 checksums are stored in database
  •  Destination files must not be modified by any other profile, person, or tool
  •  Destination must be accessed via LAN, VPN, or SSH/SFTP

Instructions for Method 1
In your profile, make the following checkmark: Use Partial File Updating, which is on the Special tab sheet when editing the profile in Advanced Mode. The next time you run the profile, a database is created on your hard drive where information needed for the speed-up is stored. The second time you run the profile, you should notice the speed-up.

Method 2: Use Remote Service for Additional Speed:
This method is similar to Method 1 but has a speed up technique and can update large files in both directions. The remote computer can be both source and/or destination. This is achieved by running a small service application on the remote computer, which will create the necessary checksums on the fly, when requested by the main application running on a different machine.

The other (local) computer, where the main High-Sync program is running, needs to have normal file system access to the remote computer (LAN or VPN), or it can use SSH. It needs to have write access to the remote computer so that it can save the checksum request file there. The MD5 checksums are created when needed, so that no database is being used.

Instructions for Method 2
On the remote system, run the Setup program and install the High-Sync Remote Service along with its control panel. Start the control panel from the High-Sync group in the Start menu. On the tab sheet Configure Checksummer, enter the base folders that will be used for synchronization. Click Apply. On the tab sheet Service Configuration, click on Install Service and Start. The service will be using the Windows System account by default. If this account doesn’t have sufficient access privileges, you may have to change the account in Windows Control Panel -> Administrative Tools -> Services.

On the local system, you are running the main High-Sync program. In your profile, the right-hand side must be the remote system. Specify one of the folders which you have specified for the remote service to monitor. The left side should be your local folders, or a network drive with relatively fast access. On the Specials tab sheet in Advanced Mode, make the following checkmarks: Use Partial File Updating and Right side uses Remote Service.

  • High-Sync Remote Service computes MD5 checksums on remote computer
  • The “slow” side can be both source or destination
  • MD5 checksums are newly calculated each time
  • Files on both sides can be modified by other profiles, persons, or tools
  • One side must be local or LAN/VPN, the other can be LAN, VPN, or SSH/SFTP

Method 3: Synthetic Backup to Zip files
This feature is intended for backing up from local storage to any type of backup storage.  However, there is no attempt to keep individual files on the destination storage.  Rather, files are stored in a .ZIP archive.   This is more of a backup program technique rather than a sync program technique.  When you look at image based backups on the market, they tend to store all files in one big file and that is what is being done here as well.  Choose “Synthetic Backup” on the tab sheet Versioning->Synthetic Backup. This will automatically place these additional check marks:

  • Use Partial File Updating (under Special)
  • Filename Encoding (under Versioning)
  • Zip Each File Individually (under Zip/Encryption)

What this method does in practice is that it

  • adds Zip compression, versioning, and filename encoding
  • can work locally or with any Internet Protocol for the destination side
  • the changed blocks are uploaded in a new, separate zip file every time
  • all older zip files must stay on the backup storage, but can be thinned out
  • all connection types and Internet Protocols are supported
  • As with Method 1, destination files must not be modified by any other profile, person, or tool. The intention is restores should be done from within High-Sync.
Posted in Blog

What is Windows 10 IoT Enterprise?

June 14th, 2018 by

WIndows 10 IoT Enterprise is the same full Windows 10 Enterprise desktop operating system with a special license for the OEMs in an embedded market. Plus with the major advantage of long term support, which is always a requirement in IoT and the Embedded Systems market.

Windows IoT Enterprise is essentially based on the Windows 10 Pro code base.  High-Rely uses the CBB (Current Branch for Business) variant of the OS.  There are also 3 different price levels: Entry, Value, and High End.  There are NO DIFFERENCES in software functionality in these.  The difference is simply the cost of the license which is based on the power of the CPU the OS is loaded on.  Although the “Entry” level is not intended for virtualization, this is mainly because it is based on CPUs that don’t support virtualization in hardware.  Like Windows 10 the number of simultaneous network connections is limited to 20.

WIndows 10 IoT Enterprise pricing is based on CPU

WIndows 10 IoT Enterprise

 

 

 

 

 

 

 

 

 

 

 

The 3 variants for WIndows 10 IoT Enterprise business installations are:-

  • CB (Current Branch)
  • CBB (Current Branch for Business)
  • LTSB (Long Term Servicing Branch)

High-Rely Uses the WIndows 10 IoT Enterprise CBB version. Here’s what that means:

Current Branch Variants included: Windows 10 Home, Windows 10 Pro, and Windows 10 Enterprise. This is the least flexible branch of the three. It requires Windows users to take any new features, fixes and security updates that Microsoft pushes to them via Windows Update. No choice or option to be more flexible.

Current Branch for Business
Variants included: Windows 10 Pro, Windows 10 Enterprise. This is a more flexible branch than the Current Branch when it comes to choosing and scheduling updates. Users who are running Windows on the CBB will have a choice of how they get these updates – whether via Windows Update for Business or Windows Server Update Services (WSUS). Windows Update for Business is being rolled out with Windows 10 to allow businesses some flexibility with how they roll out updates.

Long Term Servicing Branch
Variants included: Windows 10 Enterprise. The Long Term Servicing Branch has the most flexibility of all. Most popular for true vertical market application and devices (Point of Sale, Industrial Devices etc.). This option allows users to refuse everything but security updates. So it appropriately reserved for the highest specification version of Windows – Enterprise. As in CBB this branch allows users to also just take security fixes and defer taking any new features and to handle them via Windows Update for Business and/or WSUS.  Windows 10 IoT Enterprise LTSB also includes the usual lockdown features that have been in previous Embedded Standard operating systems like:

  • Unified Write Filter
  • Shell Launcher
  • Write Filters (EWF/FBWF/UWF)
  • USB-Filter
  • Keyboard Filter
  • Gesture Filter
  • App Locker and Layout Control
  • Dialog Box and Notification Filter
Posted in Blog

Windows IoT Enterprise license Agreement

June 14th, 2018 by

MICROSOFT SOFTWARE LICENSE TERMS
WINDOWS 10 IOT ENTERPRISE
WINDOWS 10 IOT ENTERPRISE FOR RETAIL OR THIN CLIENTS October 2015

IF YOU LIVE IN (OR IF YOUR PRINCIPAL PLACE OF BUSINESS IS IN) THE UNITED STATES, PLEASE READ THE BINDING ARBITRATION CLAUSE AND CLASS ACTION WAIVER IN SECTION 9. IT AFFECTS HOW DISPUTES ARE RESOLVED.
Thank you for choosing Microsoft!
Depending on how you obtained the Windows software, this is a license agreement between (i) you and the device manufacturer or software installer that distributes the software with your device; or (ii) you and Microsoft Corporation (or, based on where you live or if a business where your principal place of business is located, one of its affiliates) if you acquired the software from a retailer. Microsoft is the device manufacturer for devices produced by Microsoft or one of its affiliates, and Microsoft is the retailer if you acquired the software directly from Microsoft.
This agreement describes your rights and the conditions upon which you may use the Windows software. You should review the entire agreement, including any printed paper license terms that accompany the software and any linked terms, because all of the terms are important and together create this agreement that applies to you. You can review linked terms by pasting the (aka.ms/) link into a browser window.
By accepting this agreement or using the software, you agree to all of these terms, and consent to the transmission of certain information during activation and during your use of the software as per the privacy statement described in Section 3. If you do not accept and comply with these terms, you may not use the software or its features. You may contact the device manufacturer or installer, or your retailer if you purchased the software directly, to determine its return policy and return the software or device for a refund or credit under that policy. You must comply with that policy, which might require you to return the software with the entire device on which the software is installed for a refund or credit, if any.
1. Overview.
a. Applicability. This agreement applies to the Windows software that is preinstalled on your device, or acquired from a retailer and installed by you, the media on which you received the software (if any), any fonts, icons, images or sound files included with the software, and also any Microsoft updates, upgrades, supplements or services for the software, unless other terms come with them. It also applies to Windows apps developed by Microsoft that provide functionality such as mail, calendar, contacts, and news that are included with and are a part of Windows. If this agreement contains terms regarding a feature or service not available on your device, then those terms do not apply.
b. Additional terms. Depending on your device’s capabilities, how it is configured, and how you use it, additional Microsoft and third party terms may apply to your use of certain features, services and apps.
(i) Some Windows apps provide an access point to, or rely on, online services, and the use of those services is sometimes governed by separate terms and privacy policies, such as the Microsoft Services Agreement at (aka.ms/msa). You can view these terms and policies by looking at the service terms of use or the app’s settings, as applicable; please read them. The services may not be available in all regions.
(ii) The manufacturer or installer may also preinstall apps, which will be subject to separate license terms.
(iii) The software may include third party software such as Adobe Flash Player that is licensed under its own terms. You agree that your use of Adobe Flash Player is governed by the license terms for Adobe Systems Incorporated at (aka.ms/adobeflash). Adobe and Flash are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries.
(iv) The software may include third party programs that Microsoft, not the third party, licenses to you under this agreement. Notices, if any, for the third party program are included for your information only.
2. Installation and Use Rights.
a. License. The software is licensed, not sold. Under this agreement, we grant you the right to install and run one instance on your device (the licensed device), for use by one person at a time, so long as you comply with all the terms of this agreement. Updating or upgrading from non-genuine software with software from Microsoft or authorized sources does not make your original version or the updated/upgraded version genuine, and in that situation, you do not have a license to use the software.
b. Device. In this agreement, “device” means a physical hardware system) with an internal storage device capable of running the software. A hardware partition or blade is considered to be a device.
c. Restrictions. The manufacturer or installer and Microsoft reserve all rights (such as rights under intellectual property laws) not expressly granted in this agreement. For example, this license does not give you any right to, and you may not:
(i) use or virtualize features of the software separately;
(ii) publish, copy (other than the permitted backup copy), rent, lease, or lend the software;
(iii) transfer the software (except as permitted by this agreement);
(iv) work around any technical restrictions or limitations in the software;
(v) use the software as server software, for commercial hosting, make the software available for simultaneous use by multiple users over a network, install the software on a server and allow users to access it remotely, or install the software on a device for use only by remote users;
(vi) reverse engineer, decompile, or disassemble the software, or attempt to do so, except if the laws where you live (or if a business where your principal place of business is located) permit this even when this agreement does not. In that case, you may do only what your law allows; and
(vii) when using Internet-based features you may not use those features in any way that could interfere with anyone else’s use of them, or to try to gain access to or use any service, data, account, or network, in an unauthorized manner.
d. Multi use scenarios.
(i) Multiple versions. If when acquiring the software you were provided with multiple versions (such as 32-bit and 64-bit versions), you may install and activate only one of those versions at a time.
(ii) Multiple or pooled connections. Hardware or software you use to multiplex or pool connections, or reduce the number of devices or users that access or use the software, does not reduce the number of licenses you need. You may only use such hardware or software if you have a license for each instance of the software you are using.
(iii) Device connections. You may allow up to 20 other devices to access the software installed on the licensed device for the purpose of using the following software features: file services, print services, Internet information services, and Internet connection sharing and telephony services on the licensed device. The 20 connection limit applies to devices that access the software indirectly through “multiplexing” or other software or hardware that pools connections. You may allow any number of devices to access the software on the licensed device to synchronize data between devices. This section does not mean, however, that you have the right to install the software, or use the primary function of the software (other than the features listed in this section), on any of these other devices.
(iv) Remote access. Users may access the licensed device from another device using remote access technologies, but only on devices separately licensed to run the same or higher edition of this software.
(v) Remote assistance. You may use remote assistance technologies to share an active session without obtaining any additional licenses for the software. Remote assistance allows one user to connect directly to another user’s computer, usually to correct problems.
(vi) Specific Use. The manufacturer designed the licensed device for a specific use. You may only use the software for that use.
(vii) POS application. If the software is installed on a retail point of service device, you may use the software with a point of service application (“POS Application”). A POS Application is a software application which provides only the following functions: (i) process sales and service transactions, scan and track inventory, record and/or transmit customer information, and perform related management functions, and/or (ii) provide information directly and indirectly to customers about available products and services. For clarification purposes, an automated teller machine (“ATM”) is not a retail point of service device.
(viii) Cloud Computing Devices. If your device uses Internet browsing functionality to connect to and access cloud hosted applications: (i) no desktop functions may run locally on the device, and (ii) any files that result from the use of the desktop functions may not be permanently stored on the industry system. “Desktop functions,” as used in this agreement, means a consumer or business task or process performed by a computer or computing device. This includes word processing, spreadsheets, database, scheduling, and personal finance.
(ix) Terminal Services Protocols. You may use terminal service protocols to enable a device to connect to and access applications running on a server. These include Remote Desktop Protocol, Remote Assistance and Independent Computer Architecture. If you use these protocols on a device then you must not allow any desktop functions to run locally on the device except for network/Internet browsing functions
(x) Other Programs. You may use other programs with the software as long as the other programs: (i) directly support the manufacturer’s specific use for the device, or (ii) provide system utilities, resource management, or anti-virus or similar protection.
e. Backup copy. You may make a single copy of the software for backup purposes, and may also use that backup copy to transfer the software if it was acquired as stand-alone software, as described below.
3. Privacy; Consent to Use of Data. Your privacy is important to us. Some of the software features send or receive information when using those features. Many of these features can be switched off in the user interface, or you can choose not to use them. By accepting this agreement and using the software you agree that Microsoft may collect, use, and disclose the information as described in the Microsoft Privacy Statement available at (aka.ms/privacy), and as may be described in the user interface associated with the software features.
4. Transfer to a Third Party.
a. Software preinstalled on device. If you acquired the software preinstalled on a device, you may transfer the license to use the software directly to another user, only with the licensed device. The transfer must include the software and, if provided with the device, an authentic Windows label including the product key. Before any permitted transfer, the other party must agree that this agreement applies to the transfer and use of the software.
b. Stand-alone software. If you acquired the software as stand-alone software, you may transfer the software to another device that belongs to you. You may also transfer the software to a device owned by someone else if (i) you are the first licensed user of the software and (ii) the new user agrees to the terms of this agreement. You may use the backup copy we allow you to make or the media that the software came on to transfer the software. Every time you transfer the software to a new device, you must remove the software from the prior device. You may not transfer the software to share licenses between devices.
5. Authorized Software and Activation. You are authorized to use this software only if you are properly licensed and the software has been properly enabled and activated with a genuine product key or by other authorized method. When you connect to the Internet while using the software, the software will automatically contact Microsoft or its affiliate to confirm the software is genuine and the license is associated with the licensed device. You can also activate the software manually by Internet or telephone. In either case, transmission of certain information will occur, and Internet, telephone and SMS service charges may apply. During activation (or reactivation that may be triggered by changes to your device’s components), the software may determine that the installed instance of the software is counterfeit, improperly licensed or includes unauthorized changes. If activation fails the software will attempt to repair itself by replacing any tampered Microsoft software with genuine Microsoft software. You may also receive reminders to obtain a proper license for the software. You may not bypass or circumvent activation. To help determine if your software is genuine and whether you are properly licensed, see (aka.ms/genuine). Certain updates, support, and other services might only be offered to users of genuine Microsoft software.
6. Updates. You may obtain updates only from Microsoft or authorized sources, and Microsoft may need to update your system to provide you with those updates. The software periodically checks for system and app updates, and may download and install them for you. To the extent automatic updates are enabled on your device, by accepting this agreement, you agree to receive these types of automatic updates without any additional notice.
7. Geographic and Export Restrictions. If your software is restricted for use in a particular geographic region, then you may activate the software only in that region. You must also comply with all domestic and international export laws and regulations that apply to the software, which include restrictions on destinations, end users, and end use. For further information on geographic and export restrictions, visit (aka.ms/georestrict) and (aka.ms/exporting).
8. Support and Refund Procedures. For the software generally, contact the device manufacturer or installer for support options. Refer to the support number provided with the software. For updates and supplements obtained directly from Microsoft, Microsoft may provide limited support services for properly licensed software as described at (aka.ms/mssupport). If you are seeking a refund, contact the manufacturer or installer to determine its refund policies. You must comply with those policies, which might require you to return the software with the entire device on which the software is installed for a refund.
9. Binding Arbitration and Class Action Waiver if You Live in (or if a Business Your Principal Place of Business is in) the United States.
We hope we never have a dispute, but if we do, you and we agree to try for 60 days to resolve it informally. If we can’t, you and we agree to binding individual arbitration before the American Arbitration Association (“AAA”) under the Federal Arbitration Act (“FAA”), and not to sue in court in front of a judge or jury. Instead, a neutral arbitrator will decide and the arbitrator’s decision will be final except for a limited right of appeal under the FAA. Class action lawsuits, class-wide arbitrations, private attorney-general actions, and any other proceeding where someone acts in a representative capacity aren’t allowed. Nor is combining individual proceedings without the consent of all parties. “We,” “our,” and “us” includes Microsoft, the device manufacturer, and software installer.
a. Disputes covered—everything except IP. The term “dispute” is as broad as it can be. It includes any claim or controversy between you and the manufacturer or installer, or you and Microsoft, concerning the software, its price, or this agreement, under any legal theory including contract, warranty, tort, statute, or regulation, except disputes relating to the enforcement or validity of your, your licensors’, our, or our licensors’ intellectual property rights.
b. Mail a Notice of Dispute first. If you have a dispute and our customer service representatives can’t resolve it, send a Notice of Dispute by U.S. Mail to the manufacturer or installer, ATTN: LEGAL DEPARTMENT. If your dispute is with Microsoft, mail it to Microsoft Corporation, ATTN: LCA ARBITRATION, One Microsoft Way, Redmond, WA 98052-6399. Tell us your name, address, how to contact you, what the problem is, and what you want. A form is available at (aka.ms/disputeform). We’ll do the same if we have a dispute with you. After 60 days, you or we may start an arbitration if the dispute is unresolved.
c. Small claims court option. Instead of mailing a Notice of Dispute, and if you meet the court’s requirements, you may sue us in small claims court in your county of residence (or if a business your principal place of business) or our principal place of business–King County, Washington USA if your dispute is with Microsoft. We hope you’ll mail a Notice of Dispute and give us 60 days to try to work it out, but you don’t have to before going to small claims court.
d. Arbitration procedure. The AAA will conduct any arbitration under its Commercial Arbitration Rules (or if you are an individual and use the software for personal or household use, or if the value of the dispute is $75,000 USD or less whether or not you are an individual or how you use the software, its Consumer Arbitration Rules). For more information, see www.adr.org or call 1-800-778-7879. To start an arbitration, submit the form available at (aka.ms/arbitration) to the AAA; mail a copy to the manufacturer or installer (or to Microsoft if your dispute is with Microsoft). In a dispute involving $25,000 USD or less, any hearing will be telephonic unless the arbitrator finds good cause to hold an in-person hearing instead. Any in-person hearing will take place in your county of residence (of if a business your principal place of business) or our principal place of business—King County, Washington if your dispute is with Microsoft. You choose. The arbitrator may award the same damages to you individually as a court could. The arbitrator may award declaratory or injunctive relief only to you individually to satisfy your individual claim.
e. Arbitration fees and payments.
(i) Disputes involving $75,000 USD or less. The manufacturer or installer (or Microsoft if your dispute is with Microsoft) will promptly reimburse your filing fees and pay the AAA’s and arbitrator’s fees and expenses. If you reject our last written settlement offer made before the arbitrator was appointed, your dispute goes all the way to an arbitrator’s decision (called an “award”), and the arbitrator awards you more than this last written offer, the manufacturer or installer (or Microsoft if your dispute is with Microsoft) will: (1) pay the greater of the award or $1,000 USD; (2) pay your reasonable attorney’s fees, if any; and (3) reimburse any expenses (including expert witness fees and costs) that your attorney reasonably accrues for investigating, preparing, and pursuing your claim in arbitration. The arbitrator will determine the amounts unless you and we agree on them.
(ii) Disputes involving more than $75,000 USD. The AAA rules will govern payment of filing fees and the AAA’s and arbitrator’s fees and expenses.
(iii) Disputes involving any amount. If you start an arbitration we won’t seek our AAA or arbitrator’s fees and expenses, or your filing fees we reimbursed, unless the arbitrator finds the arbitration frivolous or brought for an improper purpose. If we start an arbitration we will pay all filing, AAA, and arbitrator’s fees and expenses. We won’t seek our attorney’s fees or expenses from you in any arbitration. Fees and expenses are not counted in determining how much a dispute involves.
f. Must file within one year. You and we must file in small claims court or arbitration any claim or dispute (except intellectual property disputes — see Section 9.a.) within one year from when it first could be filed. Otherwise, it’s permanently barred.
g. Severability. If the class action waiver is found to be illegal or unenforceable as to all or some parts of a dispute, those parts won’t be arbitrated but will proceed in court, with the rest proceeding in arbitration. If any other provision of Section 9 is found to be illegal or unenforceable, that provision will be severed but the rest of Section 9 still applies.
h. Conflict with AAA rules. This agreement governs if it conflicts with the AAA’s Commercial Arbitration Rules or Consumer Arbitration Rules.
i. Microsoft as party or third-party beneficiary. If Microsoft is the device manufacturer or if you acquired the software from a retailer, Microsoft is a party to this agreement. Otherwise, Microsoft is not a party but is a third-party beneficiary of your agreement with the manufacturer or installer to resolve disputes through informal negotiation and arbitration.
10. Governing Law. The laws of the state or country where you live (or if a business where your principal place of business is located) govern all claims and disputes concerning the software, its price, or this agreement, including breach of contract claims and claims under state consumer protection laws, unfair competition laws, implied warranty laws, for unjust enrichment, and in tort, regardless of conflict of law principles, except that the FAA governs all provisions relating to arbitration.
11. Consumer Rights, Regional Variations. This agreement describes certain legal rights. You may have other rights, including consumer rights, under the laws of your state or country. You may also have rights with respect to the party from which you acquired the software. This agreement does not change those other rights if the laws of your state or country do not permit it to do so. For example, if you acquired the software in one of the below regions, or mandatory country law applies, then the following provisions apply to you:
a. Australia. References to “Limited Warranty” are references to the express warranty provided by Microsoft or the manufacturer or installer. This warranty is given in addition to other rights and remedies you may have under law, including your rights and remedies in accordance with the statutory guarantees under the Australian Consumer Law.
In this section, “goods” refers to the software for which Microsoft or the manufacturer or installer provides the express warranty. Our goods come with guarantees that cannot be excluded under the Australian Consumer Law. You are entitled to a replacement or refund for a major failure and compensation for any other reasonably foreseeable loss or damage. You are also entitled to have the goods repaired or replaced if the goods fail to be of acceptable quality and the failure does not amount to a major failure.
b. Canada. You may stop receiving updates on your device by turning off Internet access. If and when you re-connect to the Internet, the software will resume checking for and installing updates.
c. European Union. The academic use restriction in Section 12.d(i) below does not apply in the jurisdictions listed on this site: (aka.ms/academicuse).
d. Germany and Austria.
(i) Warranty. The properly licensed software will perform substantially as described in any Microsoft materials that accompany the software. However, the manufacturer or installer, and Microsoft, give no contractual guarantee in relation to the licensed software.
(ii) Limitation of Liability. In case of intentional conduct, gross negligence, claims based on the Product Liability Act, as well as, in case of death or personal or physical injury, the manufacturer or installer, or Microsoft is liable according to the statutory law.
Subject to the preceding sentence, the manufacturer or installer, or Microsoft will only be liable for slight negligence if the manufacturer or installer or Microsoft is in breach of such material contractual obligations, the fulfillment of which facilitate the due performance of this agreement, the breach of which would endanger the purpose of this agreement and the compliance with which a party may constantly trust in (so-called “cardinal obligations”). In other cases of slight negligence, the manufacturer or installer or Microsoft will not be liable for slight negligence.
12. Additional Notices.
a. Networks, data and Internet usage. Some features of the software and services accessed through the software may require your device to access the Internet. Your access and usage (including charges) may be subject to the terms of your cellular or internet provider agreement. Certain features of the software may help you access the Internet more efficiently, but the software’s usage calculations may be different from your service provider’s measurements. You are always responsible for (i) understanding and complying with the terms of your own plans and agreements, and (ii) any issues arising from using or accessing networks, including public/open networks. You may use the software to connect to networks, and to share access information about those networks, only if you have permission to do so.
b. “This Products includes audio encoding and decoding technology from Dolby Laboratories. Microsoft has licensed Dolby’s two-channel decoder for use in this Product. You are not licensed for Dolby Digital Plus decoder for decoding more than two channels and the Dolby Digital consumer encoder, and you must separately license such technologies from Dolby. You agree to obtain the license(s) and to pay applicable royalties and other fees. Dolby considers failure to obtain such licenses to be infringement of Dolby Laboratories intellectual property rights. You may apply for a license from Dolby Laboratories using the following URL: http://www.dolby.com/professional/technology/licensing/getting-licensed.html
If you have questions for Dolby Laboratories, you may contact Dolby Laboratories at the following email address: licensinginquiries@dolby.com
Dolby, Dolby Digital Plus, Dolby Digital Stereo Creator and the double-D symbol are registered trademarks of Dolby Laboratories. Any use of those marks requires a separate license from Dolby.
c. H.264/AVC and MPEG-4 visual standards and VC-1 video standards. The software may include H.264/MPEG-4 AVC and/or VC-1 decoding technology. MPEG LA, L.L.C. requires this notice:
THIS PRODUCT IS LICENSED UNDER THE AVC, THE VC-1, AND THE MPEG-4 PART 2 VISUAL PATENT PORTFOLIO LICENSES FOR THE PERSONAL AND NON-COMMERCIAL USE OF A CONSUMER TO (i) ENCODE VIDEO IN COMPLIANCE WITH THE ABOVE STANDARDS (“VIDEO STANDARDS”) AND/OR (ii) DECODE AVC, VC-1, AND MPEG-4 PART 2 VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A PERSONAL AND NON-COMMERCIAL ACTIVITY AND/OR WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO PROVIDE SUCH VIDEO. NO LICENSE IS GRANTED OR SHALL BE IMPLIED FOR ANY OTHER USE. ADDITIONAL INFORMATION MAY BE OBTAINED FROM MPEG LA, L.L.C. SEE WWW.MPEGLA.COM.
d. Malware protection. Microsoft cares about protecting your device from malware. The software will turn on malware protection if other protection is not installed or has expired. To do so, other antimalware software will be disabled or may have to be removed.
e. Limited rights versions. If the software version you acquired is marked or otherwise intended for a specific or limited use, then you may only use it as specified. You may use other programs with the software as long as the other programs directly support the manufacturer’s specific use for the device, or provide system utilities, resource management, or anti-virus or similar protection.
(i) Academic. For academic use, you must be a student, faculty or staff of an educational institution at the time of purchase.
(ii) Evaluation. For evaluation (or test or demonstration) use, you may not sell the software, use it in a live operating environment, or use it after the evaluation period. Notwithstanding anything to the contrary in this Agreement, evaluation software is provided “AS IS”.
(iii) NFR. You may not sell software marked as “NFR” or “Not for Resale”.
13. Entire Agreement. This agreement (together with the printed paper license terms or other terms accompanying any software supplements, updates, and services that are provided by the manufacturer or installer, or Microsoft, and that you use), and the terms contained in web links listed in this agreement, are the entire agreement for the software and any such supplements, updates, and services (unless the manufacturer or installer, or Microsoft, provides other terms with such supplements, updates, or services). You can review this agreement after your software is running by going to microsoft.com/useterms or going to Settings – System – About within the software. You can also review the terms at any of the links in this agreement by typing the URLs into a browser address bar, and you agree to do so. You agree that you will read the terms before using the software or services, including any linked terms. You understand that by using the software and services, you ratify this agreement and the linked terms. There are also informational links in this agreement. The links containing notices and binding terms are:
· Windows 10 Privacy Statement (aka.ms/privacy)
· Microsoft Services Agreement (aka.ms/msa)
· Adobe Flash Player License Terms (aka.ms/adobeflash)

***********************************************************************
NO WARRANTY
THE SOFTWARE ON YOUR DEVICE (INCLUDING THE APPS) IS LICENSED “AS IS.” TO THE MAXIMUM EXTENT PERMITTED BY YOUR LOCAL LAWS, YOU BEAR THE ENTIRE RISK AS TO THE SOFTWARE’S QUALITY AND PERFORMANCE. SHOULD IT PROVE DEFECTIVE, YOU ASSUME THE ENTIRE COST OF ALL SERVICING OR REPAIR. NEITHER THE DEVICE MANUFACTURER NOR MICROSOFT GIVES ANY EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS FOR THE SOFTWARE. TO THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, THE MANUFACTURER AND MICROSOFT EXCLUDE ALL IMPLIED WARRANTIES AND CONDITIONS, INCLUDING THOSE OF MERCHANTABILITY, QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. YOU MAY HAVE ADDITIONAL CONSUMER RIGHTS OR STATUTORY GUARANTEES UNDER LOCAL LAWS THAT THESE TERMS CANNOT CHANGE.
IF YOUR LOCAL LAWS IMPOSE A WARRANTY, GUARANTEE, OR CONDITION EVEN THOUGH THIS AGREEMENT DOES NOT, ITS TERM IS LIMITED TO 90 DAYS FROM WHEN THE FIRST USER ACQUIRES THE SOFTWARE. IF THE MANUFACTURER OR MICROSOFT BREACHES SUCH A WARRANTY, GUARANTEE, OR CONDITION, YOUR SOLE REMEDY, AT THE MANUFACTURER’S OR MICROSOFT’S ELECTION, IS (I) REPAIR OR REPLACEMENT OF THE SOFTWARE AT NO CHARGE, OR (II) RETURN OF THE SOFTWARE (OR AT ITS ELECTION THE DEVICE ON WHICH THE SOFTWARE WAS INSTALLED) FOR A REFUND OF THE AMOUNT PAID, IF ANY. THESE ARE YOUR ONLY REMEDIES FOR BREACH OF A WARRANTY, GUARANTEE, OR CONDITION YOUR LOCAL LAWS IMPOSE.
TO THE EXTENT NOT PROHIBITED BY YOUR LOCAL LAWS, IF YOU HAVE ANY BASIS FOR RECOVERING DAMAGES, YOU CAN RECOVER FROM THE MANUFACTURER OR MICROSOFT ONLY DIRECT DAMAGES UP TO THE AMOUNT YOU PAID FOR THE SOFTWARE (OR UP TO $50 USD IF YOU ACQUIRED THE SOFTWARE FOR NO CHARGE). YOU WILL NOT, AND WAIVE ANY RIGHT TO, SEEK TO RECOVER ANY OTHER DAMAGES OR REMEDY, INCLUDING LOST PROFITS AND DIRECT, CONSEQUENTIAL, SPECIAL, INDIRECT, OR INCIDENTAL DAMAGES, UNDER ANY PART OF THIS AGREEMENT OR UNDER ANY THEORY. THIS LIMITATION APPLIES TO (I) ANYTHING RELATED TO THIS AGREEMENT, THE SOFTWARE (INCLUDING THE APPS), THE DEVICE, SERVICES, CORRUPTION OR LOSS OF DATA, FAILURE TO TRANSMIT OR RECEIVE DATA, CONTENT (INCLUDING CODE) ON THIRD PARTY INTERNET SITES OR THIRD PARTY PROGRAMS, AND (II) CLAIMS FOR BREACH OF CONTRACT, WARRANTY, GUARANTEE, OR CONDITION; STRICT LIABILITY, NEGLIGENCE, OR OTHER TORT; VIOLATION OF A STATUTE OR REGULATION; UNJUST ENRICHMENT; OR UNDER ANY OTHER THEORY.
THE DAMAGE EXCLUSIONS AND REMEDY LIMITATIONS IN THIS AGREEMENT APPLY EVEN IF YOU HAVE NO REMEDY (THE SOFTWARE IS LICENSED “AS IS”), IF REPAIR, REPLACEMENT, OR A REFUND (IF REQUIRED BY YOUR LOCAL LAW) DOES NOT FULLY COMPENSATE YOU FOR ANY LOSSES, IF THE MANUFACTURER OR MICROSOFT KNEW OR SHOULD HAVE KNOWN ABOUT THE POSSIBILITY OF THE DAMAGES, OR IF THE REMEDY FAILS OF ITS ESSENTIAL PURPOSE.
Check with your device manufacturer to determine if your device is covered by a warranty.
HP INC. GIVES NO EXPRESS OR IMPLIED WARRANTIES, GUARANTEES OR CONDITIONS FOR THE USE OF ANY AND ALL UPDATES PROVIDED OR OBTAINED DIRECTLY FROM MICROSOFT. YOU BEAR THE RISK OF ACCEPTING, INSTALLING, AND USING SUCH UPDATES. IN ADDITION AND WHERE ALLOWED BY YOUR LOCAL LAWS, HP INC. EXCLUDES IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS OR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.

© Copyright 2015 HP Development Company, L.P.
The information contained herein is subject to change without notice. All other product names mentioned herein may be trademarks of their respective companies. To the extent permitted by applicable law, the only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. To the extent permitted by applicable law, HP shall not be liable for technical or editorial errors or omissions contained herein.
First Edition: November 2015
845906-001

Posted in Blog

Windows Storage Server 2016 Standard versus Workgroup

June 14th, 2018 by

The Graphic below details the differences between Windows Storage Server 2016 Workgroup and Standard Edition.  If a user needs Hyper-V functionality the Standard edition should be used.  However, if you want to spin up virtual machines using a third party virtualization program such as Virtual Box, that may be done on the Workgroup edition.

Notice also that the Workgroup edition has several other limitations such as 1 CPU, 6 hard drives, 32GB of RAM, 50 users, and 250 simultaneous connections.

Posted in Blog

Bandwidth Throttling of Internet Speed with High-Sync

June 12th, 2018 by

Bandwidth throttling of Cloud upload or download jobs with High-Sync is possible.  The native speed you get without throttling will depend on how fast your connection is, along with other traffic currently using your pipe, other jobs running on your machine, and possibly other variables that depend on the speed of your cloud provider.  Below is a graphic of a large unthrottled High-Sync job in progress, uploading about 820GB (80% of  one TB) to the Wasabi S3 compatible service.  As you can see, the job has been running for 15.91 hours and has uploaded 451GB so far.  So overall we can see this job is uploading at around 28.34 GB per hour and the program is predicting it has 11 hours and 43 minutes left to run.  The pipe in use is 100Megabits/sec up and down.

Screenshot of upload in progress.

Bandwidth throttling

It is possible to “throttle” High-Sync’s use of Internet bandwidth, which may be desirable to allow shared Internet access on slower connections during working hours.  To set a “Global Speed Limit” on the entire High-Sync program (all profiles) use the Advanced tab from the Program Settings (Gear Symbol) and check the box for “Use Global Speed Limit”, and check the “Speed Limit for all Profiles” box, while setting a bandwidth for the connection.

Screen 2 – Global Speed Limit. Check”Speed Limit for All Profiles”

Bandwidth Throttling

Getting to Global Speed Limit – Screen 1

 

 

 

 

 

 

 

 

Throttling Individual Profiles

Individual profiles can also be bandwidth limited as well as limited by time frames. This is also known as “Group speed limits”, which can be changed by right-clicking a profile.  Inter-process communication is used to manage the bandwidths correctly even if some jobs are running in different processes (for example, in the foreground and in the background). You can change these bandwidths in the GUI and they will be communicated to running jobs, which will change their copying speed on the fly. To test this, you can open the main program (GUI) several times.

Refer to the screen shot nearby in which we edit an individual profile, select the “Files” Entry under advanced settings, then “More” and check the “Limit” box and then “advanced” check box to bring up a bandwidth schedule.

Setting Advanced speed limits on a profile

Posted in Blog

High-Rely Classic Versus the New Utility Bays?

June 12th, 2018 by
  • Choose C models for daily swap media that replaces tape

  • Choose U Models for lower cost, yet field replaceable/upgradable drives.  They can also be quickly installed into a USB 3 toaster enclosure for fast restores.

Since 2004 Highly Reliable Systems has always relied on “daily swap” aluminum drive trays to provide an alternative to tape.  This physical media contained low cost SATA hard drives and kept our users in control of their own data.  The ideas behind fully enclosed trays included:

  • Provide physical protection against shock or damage of electronic components on the bottom of the drive.
  • Include a connector designed for thousands of plug/unplug cycles (versus a rating of 50-100 for raw SATA connector)
  • Provide a level of static protection because when you carry a hard drive your body induces static shocks that can damage electronics.

So why have we introduced the New RNAS with “Utility bays” that allow the raw hard drive to be removed?  Because increasingly our clients don’t intend on “handling hard drives” and want an automated solution in which any off-site is down to the cloud.  However, the ability to access the drives for either upgrade or to do fast restores was still desirable so we created the “Utility Bay”

In the RNAS-C models.  The “C” stands for  High-Rely Classic.   These are trays designed for daily or regular swap and transportation of the media.

RNAS-U models.   The Utility bay model should be used if drives will be left in place. U models are not intended for daily swap or transportation because the connectors are not rated for it and the drives are unprotected.

If there is a drive failure, upgrade, or emergency restore the drives are easy to remove.

Raw hard drive can be upgraded or plugged in via Thunderbolt for rapid restore

Utility Bay allows easy access to raw drives.

Posted in Blog

Running Multi-Cloud Replication Jobs in Sequence: High-Sync

June 12th, 2018 by

Multi-Cloud Replication Jobs Should run in Sequence – NOT in Parallel

When scheduling Multi-Cloud or Multiple location jobs in High-Sync on RNAS products it is often desirable to use several distinct jobs or profiles and make sure one job finishes before another starts.  This limits the use of available bandwidth, and prevents hard drive thrashing (where the drive must seek back and forth from one file to another).  One way to run jobs one after another is to use the Scheduler. Give them a scheduled time and leave a minute between each profile.  Then, on the Scheduler tab sheet, click on the Tools and Settings button and Make sure to uncheck “Start Profiles In Parallel”. Alternatively, go to the Program Settings dialog, tab sheet Advanced, and specify 1 for Max. simultaneous jobs.  This will make sure one job finishes before the next one begins.

Multi-Cloud Replication setup

Multi-Cloud Replication Jobs should run One after another…NOT in Parallel

Running Multi-Cloud Replication Profiles manually

For manual runs, select the profiles in the Overview, right-click the selection and choose “Run in Unattended Mode”. This will run them one after another, as opposed to “Run in Background”.

Tip:  If you need High-Sync to do other things while the jobs are running, you can open the program a second time.

Chaining Multi-Cloud Replication directly

Another way is to chain profiles. As an “after” command line in “Execute before/after” you can put:
RUN PROFILE Profile Name

This will start the next profile when the first one has finished, and so forth. One downside to this particular approach is that the chaining is always done, so it may be a problem if there is an occasion where you want to run only one of the chained jobs.

Using the command line to run Multi-Cloud Replication

A final way  is to use the High-Sync command line and invoke your jobs from a batch file or script.

Posted in Blog

Automatically Email a File on a Schedule: How To

June 12th, 2018 by

If you want to automatically email a file on a scheduled basis, you can do that with the RNAS product line.  Any file stored on an RNAS appliance (or available via a share) can be automatically emailed using pop, Gmail, or O365 by using High-Sync’s email option.  The screen shot below gives you an idea how to configure.  Once the job is created and tested you can schedule it to occur at any time, as often as you’d like.

Scheduled send of an attachment via Email

Automatically Email a file

Posted in Blog

Backup and Disaster Recovery – Creating Your own BDR

June 12th, 2018 by

5 Elements of a Backup and Disaster Recovery Appliance (BDR)

Rather than buying a BDR with high monthly fees and storage costs, you can use our hardware to build your own.  Many of our backup NAS appliances can be used as a platform to create a Backup and Disaster Recovery (BDR) box.  This is typically configured as a Local to Local to Cloud backup configuration.  After the backup is sent to the local appliance, it is uploaded to the cloud to protect against on-site disasters.

Backup and Disaster Recovery box

High-Rely backup NAS can be used to create a BDR

The elements of a BDR may include:

  1. A network attached storage appliance to backup local servers to.  In addition, if you want the ability to run an emergency server in an outage, the appliance you choose should have sufficient software, CPU, and RAM to run virtual machines.  Virtualization is what differentiates a “backup appliance” or “backup NAS” from a true BDR box.
  2. Third party backup software, preferably image based should be chosen and installed.  Many good choices are available. market leading software and vendors who know backup the best.   Some of software that can be used on our network appliances include: StorageCraft, VEEAM, Arcserve, Acronis, Paragon, Others.  We typically don’t include backup software but do include mirroring and replication software.  This allows you the flexibility of rolling your own BDR with best of breed software and support.
  3. Cloud upload capability – Either use third party backup software or a program like High-Sync to upload data to the cloud for protection against local disasters.
  4. A storage cloud that supports large image based backup.  When choosing a cloud provider consider the ability to consolidate incremental images in the cloud.  Some backup vendors such as Storage Craft provide their own cloud. Some cloud services also allow you to “spin up” virtual machines in the cloud, allowing you to use the cloud server resources as your emergency server.  This type of service typically comes at a premium but is an alternative to running locally if fire, flood, thefts or other disasters occur that prevent the default location from being used.
  5. Technical support and services.  The combination of a High-Rely dynamic support contract, along with backup software vendor support gives you the ability to get help when you need it.
Posted in Blog

How to connect to Google Cloud Storage using Windows NAS

June 8th, 2018 by

Setting up Google Cloud Storage using Windows NAS (The RNAS series appliances)

Google Cloud Storage using Windows NAS is possible because Google uses an Amazon S3 compatible (Object and Bucket based) cloud. This encompasses several storage options including multi-regional, regional, nearline, and coldline storage.  Each of these looks the same to the end-user, the differences are how they are stored on Google’s side.  The quick instructions to get Google Cloud Storage to work with High-Sync are:

  1. Setup a Google Cloud Storage Account.  Follow the detailed walk through below for more details.  Search for Google Cloud Storage or go to https://cloud.google.com/storage and setup an account with the “Try it Free” button. You will need a credit card to complete the setup, but Google is currently giving the account free for 12 months. Create a bucket (all lowercase with no dots in the name unless you own the DNS name), and choose your storage type.  In the walk through below we checked pricing and chose “regional”.
  2. After your account is setup and authorized, go into High-Sync and create a replication job. choose “Internet” button for your destination or source and Amazon S3 as protocol, and specify your bucketname like this: bucketname@storage.googleapis.com
  3. You can get your Access ID and Secret Key via the Interoperability tab sheet of the Cloud Storage Settings page
    https://console.cloud.google.com/storage/settings
  4. Please note after you setup your keys in the S3 configuration page of High-Sync you may have to delete any trailing asterisks in the “Left hand Side” or “Right hand Side” fields if they are inserted by the program.
  5. Please don’t choose unsupported features like Reduced Redundancy, as they will cause errors.For more detailed instructions refer to the screenshots below, in which a free account is setup, a regional storage bucket is created, and then a job is tested with High-Sync.
Google Cloud Storage

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Google will require you to setup a Payments Profile.  As you can see below the account is free for the first 12 months.

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

Check the pricing of the various storage classes using the online calculator.

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

 

 

 

 

 

 

 

 

 

 

Use the Google Storage price calculator to get a sense of what the cost will be.

Below we create a bucket name (each bucket name must be universally unique).  Unlike Wasabi, which allows dots in the bucket name, Google will warn you that use of dots requires you to prove you own that DNS name.  Below we chose Regional and US west coast as our storage type and location.

 

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

 

 

 

 

 

 

 

 

 

 

 

After creating the bucket you should access the settings on the left side of the menu as shown below.

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

 

 

 

 

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

 

 

 

 

Now select the Interoperability tab and read the key and copy the access key and secret so that you can paste these values into High-Sync

Note as part of the setup process you will also have received a google email allowing you to be setup as the administrator of this account.

Google Cloud Storage with Windows NAS

Google Cloud Storage with Windows NAS

 

 

 

 

 

 

 

Specify your bucketname like this: bucketname@storage.googleapis.com  After you click “OK” it’s common for the program to add an extra @ symbol to the back of the “Right Hand Side” field.  You need to delete these trailing @ symbols from this field to make it work properly.  Finally, due to API limitations if you will be uploading any files larger than 5GB choose to split the files smaller than that.  The default of 2GB works nicely.

 

 

 

 

 

 

That’s It!  You should be able to upload your files to Google now.

 

Posted in Blog

Cloud-to-Cloud Backup

June 8th, 2018 by

Cloud-to-Cloud backup is becoming more important for protecting data from crypto-viruses, user errors, and vendor outages.

The RNAS series of appliances can be used as cloud-to-cloud (C2C) backup appliances.  Some of the reasons to do “reverse-cloud” or Cloud-to-Local jobs apply here as well.  In the screenshot nearby, a test is underway which transfers a large file from Dropbox to Microsoft One Drive.  The functionality allows entire directories and folder structures to be moved with a single replication job.  While most C2C scenarios require a specific cloud, the power of High-Sync software is the ability to specify just about any two clouds and manage the backup process from a single pane of glass without involving the vendors own software.  Additional replication jobs can be created to send the data to more clouds to create multiple vendor independent redundancies using data from multiple user accounts as needed.  Other than the normal cloud storage fees, there are no per user or per month licensing fees to use High-Sync for this application.  It is easy to make sure that multiple replication jobs run in sequence to limit the impact on bandwidth and local resources, including thrashing on the local drive.

Multi-Cloud replication

Cloud-to-Cloud (C2C) backup

Microsoft OneDrive Cloud to Cloud

High-Sync replication job from Dropbox to OneDrive

Posted in Blog

S3 5GB Limit -Split Large Files to Overcome Amazon Object Size limits

June 8th, 2018 by

Amazon S3 5GB Limit

Amazon S3 and compatible services used to have a 5GB object (file size) limit. Although Amazon Changed the total object limit in 2010 to 5TB it is still true that the largest object that can be uploaded in a single PUT command is 5 gigabytes.  They  require that the software uploading large files upload it in smaller parts using their Multipart upload API.

S3 5GB Limit

Split Large Files into 2GB files on destination

High-Sync fully supports Multipart upload to Amazon S3 so the option discussed below “Split Large FIles” is not necessary when using Amazon S3.  However, some Amazon Compatible Services may not support multipart uploads.  Also some users may have Internet connections that may be slow or unreliable in ways that cause large file uploads (greater than 5GB) to fail intermittently.  To overcome these challenges, High-Sync includes an option to  break files into smaller files during the upload process.

When this option is selected, rather than using Amazon’s multi-part upload, the files are broken into individual files and stored up on the cloud as separate files  with filenames that allow High-Sync to understand the various pieces and reassemble them when they’re brought back down later.  Refer to the nearby Graphic showing the option to Split Large Files.  The default option is 2GB file size.  Adjust this size as desired to create reliable uploads while staying under the file size limit of your cloud provider.

S3 5GB Limit

Screenshot from Windows File Explorer showing Original 6.7GB file

To see how this feature works, refer to the screenshot showing a 6.7GB inbox.pst file as shown in Windows file explorer.  After uploading to Wasabi using the Split Large Files option you can see in the Wasabi screen shot the file has been broken into 4 pieces.  Note the first 3 are 2GB each with the remainder in the 4th file.

Notice also that the original filename “inbox.pst” has been renamed on the destination with a code number and part number that will allow High-Sync to automatically identify it as a segmented file and reassemble it back to it’s original file name if it is pulled back down from the cloud.  Obviously, High-Sync must be used to retrieve the file to automatically reassemble.  If you use another tool such as the web interface you will simply end up with the 4 pieces named as shown.

S3 5GB Limit

Screenshot from Wasabi browser window showing file has been broken into 4 pieces

Posted in Blog

Backup Dropbox to a local NAS using High-Sync

June 7th, 2018 by

Backup Dropbox to local drives with a delay.

High-Sync allows you to push or pull files from Dropbox without using the DropBox application.  The advantage of not installing the Dropbox app include the ability to manage multi-cloud backups from a variety of different sources in a single pane of glass (inside the High-Sync app), as well as allowing granular control of when backups occur.  Dropbox tends to replicate files quickly so any errors can get out of control rapidly. We recommend delaying your jobs by as much as 1 day or 1 week so that if corruption or user error occurs in Dropbox and the issue is replicated across all users, the High-Sync software will retain an older backup Dropbox copy.  You can also turn on versioning if you want to provide additional protection by saving historical versions of your file.

The screenshot below shows an example setup of how to setup a Backup Dropbox job.  A single Dropbox folder is being pulled down to a local backup folder.  When you put in a valid account name (usually your email address) a browser window should open asking you to authenticate with your password.  When you put a password in you may also get an email that requires you to confirm this is you for additional security.  Save the job and either run it immediately for testing or schedule it to run regularly depending on your needs

Backup Dropbox

Backup Dropbox folders using High-Sync

Posted in Blog

Multi-Cloud Support with High-Sync File Replication

June 7th, 2018 by

Multi-Cloud Support means Automated Upload and Download for mission critical files

One unique feature of the RNAS product line is the inclusion of a license for High-Sync with Multi-Cloud capability.  This can be used to create multiple replication jobs to several supported clouds.  These  jobs allow file sync between local and network drives, as well as 28 different public cloud or protocol options at no extra cost.  Additional license may be copied to support Apple, Linux products or to install on Windows machines to “push” data to an RNAS appliance.  The alternative is use the default RNAS license to “pull” the data from a shared drive on these machines.

High-Sync is considered file based “replication software”,  not an image based backup program.   Some users may choose additional functionality to backup servers with popular programs such as VEEAM, Shadow Protect, Arcserve, Acronis, etc to provide advanced features such as “bare metal” restore or support for spinning up virtual machines.

High-Sync provides Multi-Cloud support and file copy capability with a wide variety of features and support including scheduling, incremental copying and much more. Multiple jobs will be run in order, so jobs won’t compete for resources.

Here are the Multi-Cloud support and protocols available in High-Sync:

  1. FTP A standard Internet Protocol, An FTP address looks like an web address except it uses the prefix ftp:// instead of http://.  FTP servers are very common ways to upload/download files on the Internet and High-Sync can be configured to pull all new files from any FTP server on a regular basis.   One use of the FTP protocol is to setup box-to-box replication scenarios between private sites or office locations.  Purchase at least 1 RNAS appliance for each location.  Note:  You may need to open ports in the firewall at each end for box-to-box replication.
  2. SFTP (Secure File Transfer Protocol).  The same as FTP but with better security. SFTP is setup via SSH protocol.
  3. SSH (Secure Socket Shell).   Widely used by Linux administrators for managing systems and applications remotely.
  4. WebDAV. Web Distributed Authoring and Versioning. is an extension of the Hypertext Transfer Protocol (HTTP) that allows clients to perform remote Web content authoring operations. 
  5. Amazon S3.  S3 is a popular cloud Storage service that uses objects and “buckets” to store data.  Files can be “put” into the cloud and you can “get” the files back using a standard API interface.  Files in this type of storage can’t be modified in place, so to change a file you must delete it and re-upload the new version.  High-Sync takes care of all this transparently.
  6.  (S3 Compatible) Google Cloud Storage (Including Nearline) Google Cloud Storage is competitor to Amazon S3 and “Nearline” competes with the slower Amazon Glacier, providing lower cost but slower storage.   It is supported by High-Sync, with certain restrictions.  Use the Amazon S3 setting to configure.  For a configuration walk through click here.  You can get your Access ID and Secret Key via the Interoperability tab sheet of the Cloud Storage Settings page.  Some features such as reduced redundancy are not supported. Individual file size on some S3 compatible services are currently limited to 5GB, however by selecting the “Split large Files” option you can work around this limitation.
  7. (S3 Compatible) Wasabi.  Wasabi is an S3 compatible storage cloud that is substantially less expensive then S3.  Individual file size on some S3 compatible services are currently limited to 5GB, however by selecting the “Split large Files” option you can work around this limitation.  Configuration instructions for Wasabi are here.
  8. HTTP (Hyper Text Transfer Protocol).  The same as used by web browsers, can be used to transfer files as well.
  9. Microsoft Azure.  Microsoft’s suite of services includes file storage in the cloud, also known as Azure Files.  High-Sync can send and receive files form this system.
  10. Rsync.  A popular Linux based file sync program.  Windows versions are also available, but in order to work Rsync must be run on both sides (sending and receiving machines).
  11. Amazon Glacier.  Slower, low cost version of Amazon S3 storage.  Possibly based on tape.
  12. External.  The copying can be done by invoking an external tool such as rsync.exe rather than any of High-Sync’s internal routines.
  13. BackBlaze B2.  This is Silicon Valley California based BackBlaze’s Amazon S3 compatible file storage.  Typically priced 25% below Amazon S3.
  14. Box. With High-Sync, you to not need to install the Box app, so sync control is independent, giving “single pane of glass” management for all accounts. A key implication of this is that even if a file gets deleted, encrypted, or corrupted in the cloud, the High-Sync version can be delayed in time (because unlike box application it doesn’t immediately replicate data).  In addition, versioning can be used on the local machine to provide additional protection.
  15. Google Drive.  Includes the ability to replicate Google apps such as docs, sheets and other files. Also supports Team Drives. Any one profile can sync with your main Google Drive, or one Team Drive.
    • Gmail: To backup Gmail to .pdf format stored on Google Drive (and then backed up using High-Sync) you may load a third party add on.  Another slightly more sophisticated alternative is OwnMyCopy, which can be installed on an RNAS and configured to directly pull down multiple Gmail accounts directly on the local hard disk.  A viewer is included to see and search mail.  Other options for cloud to local Gmail backup might be shown here
  16. DropBox Version 2.  Does not require installing Dropbox app, so sync control is independent, giving “single pane of glass” management for all accounts.  A key implication of this is that even if a file gets deleted, encrypted, or corrupted in the cloud, the High-Sync version may still be good because the Cloud-to-Local can be delayed in time.  Unlike the dropbox app it doesn’t immediately replicate data, but rather does it on your schedule.  In addition, versioning can be used on the local machine to provide additional protection.
  17. Rackspace Cloud Files. Cloud Files, powered by OpenStack®, provides an easy to use online storage for files and media which can be delivered globally at blazing speeds over Akamai’s content delivery network (CDN).
  18. Amazon Cloud Drive . Now called “Amazon Drive“.  Faster than Amazon S3, but intended for personal use.  Unlike Amazon S3 storage there is no charge for put/get requests so this service is storage based and more comparable to Apple icloud.  With High-Sync you do not need to install any Amazon software, so sync control is independent, giving “single pane of glass” management for all accounts.
  19. Microsoft OneDrive, OneDrive New, Onedrive for business.  Formerly called Skydrive, these are Microsoft’s file storage apps.  High-Sync does not require installing any Microsoft apps, so sync control is independent, giving “single pane of glass” management for all accounts. A key implication of this is that even if a file gets deleted, encrypted, or corrupted in the cloud, the High-Sync version can be delayed in time (because unlike dropbox it doesn’t immediately replicate data).  In addition, versioning can be used on the local machine to provide additional protection.
  20. Sharepoint – A Microsoft file sharing application and protocol. The Sharepoint and Graph protocols can access data on any public or private site if you specify the site URL, such as contoso.sharepoint.com/sites/thesitename.
  21. Graph.    The Open Graph protocol enables any web page to become a rich object in a social graph.  You may be able to use this to integrate with Facebook.
  22. Hubic.  Hubic is a French based online storage provided by OVH Group founded in 1999.
  23. SugarSync.  Sugarsync provides both a program and cloud storage for backing up local PCs.  High-Sync does not require the SugarSync app, so sync control is independent, giving “single pane of glass” management for all accounts..
  24. MediaFire.  A Texas based cloud storage provider.  High-Sync does not require the MediaFire app, so sync control is independent, giving “single pane of glass” management for all accounts.
  25. Orange.fr.  French based cloud storage provider.
  26. Mega.  Mega.NZ is a new incarnation of MegaUpload, the notorius New Zealand based file storage provider that was shut down by the FBI in 2012.  Former CEO Kim Dotcom is no longer with the company, having been ousted from MEGA by a Chinese investor.
  27. MTP.  Media Transfer Protocol is an extension to the Picture Transfer Protocol (PTP) communications protocol that allows media files to be transferred atomically to and from portable devices, typically cell phones.  This potentially gives High-Sync the ability to backup employees cell phones.
  28. Email.  Allows you to send an email with up to one attached file using a standard mail server, including support for Gmail and Office 365.   This is very useful for automatically forwarding a frequently changed file to a supervisor or monitoring the status of a log file by sending to the responsible party regularly.  Note:  Pulling down Messages from a cloud email account is not fully supported at this time.

We expect to continue to add features to the Multi-Cloud support for High-Sync.

Multi-Cloud Support

Multi-Cloud replication options available.

Posted in Blog

Wasabi and High-Sync: How to Configure Cloud Upload

June 6th, 2018 by

Wasabi Configuration with High-Sync

Wasabi is a less expensive Amazon S3 compatible cloud.   Further down in this blog you will see some screen shots on how to setup a Wasabi account.  This may change slightly over time but the basics involve naming a bucket in lower case dns compatible format, then copying your access key and secret key (called “Access ID” and Secret Key inside High-Sync).  Once that’s done you can setup a replication job inside High-Sync.  Note that High-Sync’s S3 replication engine has honored the old S3 limit that files be < 5GB in size.  However you can overcome that limitation by selecting the “Split Large Files – Maximum Part Size”  and setting that to 2GB (or whatever size less than 5GB you want).  To learn more click here for more detailed instructions.

Select Amazon S3 as your “Internet” destination or source and configure your bucket in this format: bucketname@S3.wasabisys.com  using Library 2 MS SSL option.  Note the graphic below.  After saving the settings the program may put an extra @ symbol at the end of the source or destination.  If so, edit it directly in the “Left hand side” or “Right hand side” field and remove the extra @ symbol.

Wasabi Cloud Upload

How to configure Wasabi using S3 compatible settings

 

If you’d like more information on setting up the Wasabi account review the screenshots below.   We went to Wasabi.com and selected the “Try it Free” button.  After registering with a name and email address we received a welcome email that allowed us to click “Create Account”.  Notice right in this email it gives the server /endpoint name as S3.Wasabisys.com.  You will use this to setup your High-Sync Job.

Wasabi

Wasabi Account Creation

As you create an account one of the first things you need to do is create at least one bucket. To name your bucket you must use lower case letters and avoid any characters not allowed by DNS naming conventions.  As you can see below we have created a test using rnas.backup.bucket.    If someone else has ever used a bucket name, you will not be able to use that same bucket (in other words don’t try to use the name we show here).  Select Next.

Wasbi Buckets us lower case DNS format

Wasabi Bucket Naming

Wasabi bucket options

Wasabi Buckets – Don’t Enable Logging to avoid clutter

Now choose whether you want to enable file versioning and logs, as well as where to store the logs.  As you see below we selected “Enable Logging” but think that was a mistake.  We recommend you Not turn on logs unless you need to troubleshoot with Wasabi tech support.  The logs clutter up your folder structure and are unstructured and difficult to read.

Wasabi Bucket creation

Wasabi Create Bucket

To finalize select “create Bucket”.  You will have to specify an access key as well.

 

Wasabi can use CSV to download key

Wasabi Access Key copy

Access key will be generated (It is blurred out in the screenshot above) and you can simply copy and paste the key or download it as a csv file (comma separated values).

That’s it, if you want to create “users” and “Groups” you can, however you can use the master access key if only one user (such as the backup administrator) is using the account.

 

 

 

 

Posted in Blog

Windows NAS using Windows IoT Enterprise

June 6th, 2018 by

The RNAS is a Windows NAS intended as use as dedicated BDRs (Backup and Disaster Recovery), Self Backing NAS, or Cloud-to-Local backup appliances (reverse cloud).

Use of Windows IoT for Windows NAS

Windows NAS

RNAC-C Models have fully enclosed removable hard drives intended for daily swap

Windows IoT is a version of Windows typically intended to be installed on dedicated appliance or control computers.  Windows 10 IoT is a member of the Windows 10 family that brings enterprise-class power, security and manageability to the Internet of Things. It leverages Windows’ embedded experience, ecosystem and cloud connectivity, allowing organizations to create their Internet of Things with secure devices that can be quickly provisioned, easily managed, and seamlessly connected to an overall cloud strategy.

Windows 10 IoT comes in two editions. Windows 10 IoT Core is the smallest member of the Windows 10 operating system family. By contrast, Windows 10 IoT Enterprise, which is used exclusively in the RNAS line of products is a full version of Windows 10 with specialized features to create dedicated devices locked down to a specific set of applications and peripherals.  Windows IOT Enterprise is limited to 20 simultaneous network connections.

In general all features of Windows 10 Pro are available in Windows IoT including Virtualization if supported by the hardware (not available on RNAS 200 models with Celeron processors).  This includes the ability to join a domain,  support headless operation via RDP protocol, etc.  Microsoft intends the usage of Windows IoT Enterprise to include Industry Tablets, POS, Kiosk, Digital Signage, ATM, Medical Devices, Manufacturing Devices, Thin Clients, etc.  Windows IOT Enterprise allows 20 simultaneous device connections.

It should be noted that Windows IoT Enterprise is licensed by the type of processor in the machine.  While the functionality is the same between the 3 versions available (entry, value, high end), the license requires the version to be matched to the power of the CPU.  Therefore changing the motherboard or upgrading the CPU to a more powerful one may violate Microsoft license terms.

Posted in Blog

Backup to or from BackBlaze B2 with High-Sync

June 4th, 2018 by

Backblaze B2 – Backup and Mirror Your Data With High-Sync

Low Cost, High Performance Cloud Storage with Backblaze B2

Using High-Sync, you can now store and synchronize your data on BackBlaze B2. High-Sync is a generic file synchronization, mirroring and backup tool that provides an extremely wide range of features. It is a lightweight tool that runs on a variety of platforms and is highly optimized to run efficiently with little CPU and memory usage.

Advantages of using Backblaze B2 with High-Sync

  • B2 is a high-reliability and high performance storage
  • High-Sync runs on Windows and is included with RNAS devices.  (Macintosh, Linux, FreeBSD, and Solaris/Illumos (Intel only) versions available at additional cost)
  • Supported processors are i386, x64, ARM, as well as PPC and PPC64EL (on request)
  • High-Sync runs directly on RNAS, BNAS or other Windows devices.
  • You can set up multiple jobs with extreme customize-ability, including:
    • File Masks & Filters
    • Compression, Encryption, and Filename Encryption
    • Multi threaded Transfers
    • File List Cache can avoid re-scanning the B2 folders every time the profile runs
    • Manual, scheduled, or real-time operation
    • One-Way or Two-Way Syncs
    • SmartTracking for Two-Way Syncs can detect deleted files and you can use B2 as central repository for sharing files between several computers
    • File timestamps are preserved on B2
    • Detailed log files and email notifications
    • Synthetic Backup can upload only the changed blocks in larger files to save bandwidth
    • You can also use the same tool to sync local folders and other types of storage.
    • Many additional options are available

For more details on High-Sync, please visit the software functionality page on our web site.

Setting it up

Create a new profile, using either Wizard Mode or Advanced Mode. On the right-hand side, click the Internet button and change the protocol to B2 as shown in the following screenshot. Enter your Account ID and Application Key, which you can get from the Buckets page in the B2 web interface. Choose your container and folder with the Browse buttons. To create a new container, just type the name.

B2 Settings

B2 Settings

 

Posted in Blog

High-Sync: Block Level Backup – Block Level Copying

June 4th, 2018 by

Using High-Sync for Block-level Backup and Block-level Copying.

High-Sync can detect which parts of a larger file have changed, and copy only the changed blocks, rather than the complete file. Copying only the changed blocks can save bandwidth, and time, especially over a slow connection. When copying between local disks, or in a LAN environment, can save bandwidth too, but may not always save much copying time, because the source file has to be read in its entirety every time in order to determine the changed blocks.

Only block-oriented file types are eligible for block-level copying. These include database files, such as SQL, or Outlook PST, as well as drive images, and virtual hard disk images (VMs). Alternatively, stream-based files will usually cause all blocks to be changed whenever they are modified. Thus, block-level copying will not be able to save much bandwidth with stream-based files.

In High-Sync, block-level copying is called ‘Partial File Updating.’ In many cases, you need to choose only this one, via a check-mark, which is on the ‘Special’ settings category, in ‘Advanced Mode.’

The program needs to have fast access to at least one of the sides of the synchronization. The other side may be a low-bandwidth connection. If you are using an ‘Internet Protocol,’ please note that only SSH/SFTP supports block-level updating directly. The other protocols can only be used with ‘Synthetic Backup.’

Note: Block level copying with SSH/SFTP has only been implemented for uploads, not downloads.


Partial File Updating can work in three varying ways:

1: With Database:
– Source access must be fast.
– Destination may be slow.
– MD5 check-sums are stored in the database.
– Destination files must not be modified by any other profile, person, or tool.
– Destination must be accessed via LAN, VPN, or SSH/SFTP.

2: With Remote Service:
– High-Sync Remote Service computes MD5 check-sums on remote computer.
– The ‘slow’ side can be both the source, or the destination.
– MD5 check-sums are newly calculated each time.
– Files on both sides can be modified by other profiles, persons, or tools.
– One side must be local, or LAN/VPN, the other can be LAN, VPN, or SSH/SFTP.

3: Synthetic Backup:
– Similar to Mode 1, but adds ‘Zip’ compression, versioning, and filename encoding.
– Can work locally, or with any ‘Internet Protocol,’ for the destination side.
– The changed blocks are uploaded in a new, separate zip file every time.
– All older zip files must stay on the backup storage, but can be thinned out.
– All connection types and ‘Internet Protocols’ are supported.


1: Slow Destination
In this mode, the speed-up is available when you copy files from a location to which you have fast access (preferably your own hard disk). The destination can be a slow connection, but it must be a normal file system (either LAN or VPN), or SSH/SFTP. For other connections, you can use the Synthetic Backup.

Using Number 1:
In your profile, make the following check-mark: ‘Use Partial File Updating,’ which is on the ‘Special’ tab sheet when editing the profile in ‘Advanced Mode.’ The next time you run the profile, a database is created on your hard drive where information needed for the speed-up is stored. The second time you run the profile, you should notice the speed-up.


2: With Remote Service
This mode can speed up updating large files in both directions. The remote computer can be both source and/or destination. This is achieved by running a small service application on the remote computer, which will create the necessary check-sums on the fly, when requested by the main application running on a different machine.

The other (local) computer, where the main High-Sync program is running, needs to have normal file system access to the remote computer (LAN or VPN), or it can use SSH. It needs to have write access to the remote computer, in order to save the checksum request file there. The MD5 check-sums are created when needed, so that no database is being used.

Using Number 2:
On the remote system, run the ‘Setup’ program and install the High-Sync ‘Remote Service,’ along with its control panel. Start the control panel from the High-Sync group in the ‘Start’ menu. On the tab sheet, ‘Configure Check-summer,’ and enter the base folders that will be used for synchronization. Click ‘Apply.’ On the tab sheet ‘Service Configuration,’ click on ‘Install Service and ‘Start.’ The service will be using the ‘Windows System’ account by default. If this account does not have sufficient access privileges, you may have to change the account in ‘Windows Control Panel’ > ‘Administrative Tools’ > ‘Services.’

On the local system, you are running the main High-Sync program. In your profile, the right-hand side must be the remote system. Specify one of the folders which you have specified for the remote service to monitor. The left side should be your local folders, or a network drive, with relatively fast access. On the ‘Specials’ tab sheet in’ Advanced Mode,’ make the following check-marks: Use ‘Partial File Updating’ and ‘Right side uses Remote Service.’


3: Synthetic Backup
This feature is intended for backing up from a local storage to any type of backup storage. The backup can be local, or online.

Choose ‘Synthetic Backup’ on the tab sheet ‘Versioning>Synthetic Backup.’ This will automatically place these additional check-marks:
– Use Partial File Updating (under Special).
– Filename Encoding (under Versioning).
– Zip Each File Individually (under Zip/Encryption).

Posted in Blog

High-Sync: Google Drive, and Google Docs

June 4th, 2018 by

Syncing with High-Sync to Google Docs, or Google Drive.

Google Drive is an online storage system originally intended for text documents, spreadsheets, and presentations. It is possible to upload any type of file and use it for generic storage. Google Drive can be specified as one side of the synchronization by clicking on the ‘Internet’ button and choosing ‘Google Docs,’ or ‘Google Drive’ as a protocol.

Now, it is supported via two different APIs: the original Google Docs API, as well as the new Google Drive API. Each has its pros and cons, but support for the Google Drive API is more actively developed and seems to be more future proof. By choosing Google Drive, the main advantage is that uploaded files will retain their original ‘Last Modified’ timestamps without the need for ‘Filename Encoding.’

Alternatively, Google Docs needs to be used in order to download native Google Docs files and have them converted to file formats, such as .doc or .pdf.


The Possible Delays when choosing the Google Docs API

After uploading files, or creating folders with High-Sync, they may not be immediately visible. If you want to re-run the same job, please wait for a few minutes. Otherwise, you may see that the program wants to upload the files again, or re-create folders, which will cause duplicates on Google Docs.


Uploading ‘any file:’

For some time now, all Google Docs accounts can upload ‘any file.’ You are no longer limited to documents, spreadsheets, or presentations.

On the ‘Internet dialog,’ where you choose Google Docs, you will see a tab sheet with settings specific to Google Docs. Here, you can specify in which format to download your Google Docs native files. For example, a spreadsheet would usually be downloaded as an xls file. Similarly, you can specify which file types to convert to native Google Docs files upon uploading.


Timestamps – ‘Last Modification Dates’

Note: this limitation only applies to the old Google Docs API.

Choose Google Drive to preserve your timestamps. Upon uploading to Google Docs, the ‘Last Modified’ timestamp of your files is lost. This is similar with many storage systems in the cloud, but it can lead to problems with two-way synchronizations. Uploaded files are seen as new and the program wants to download them again, even though they have not changed. The solution for this is ‘SmartTracking.’ Choose the ‘SmartTracking’ operating mode and click on its ‘Configure’ button. Following this, on the last tab sheet, choose ‘Detect Unchanged Files’ for the Google side of the synchronization. Do not select any other checkbox on this tab sheet. Only one check-mark, out of the three, should be selected.


Preserving Timestamps, and Versioning

If you would like to preserve your files’ timestamps on Google Docs, you can choose the option ‘Filename Encoding.’ This also enables you to use versioning and keep multiple versions of each file in the backup storage. For additional information, view: Versioning and Filename Encoding.


Compression, Zipping, or Encryption.

The files can also be zipped and encrypted. You will find these options on the ‘Zip’ tab sheet. When combining compression with filename mangling, you must compress each file into a separate zip file. You should only use the two upper check-boxes on the ‘Zip’ tab sheet.


 Using the ‘Destination Cache’ to speed things up.

You can speed up reading the file list with the setting ‘Cache Destination File List…’ This can be used when you are uploading to a remote folder only from one local PC, by doing regular backups, and not making any changes to these files on Google Docs directly.

Posted in Blog

High-Sync: Command Line

June 4th, 2018 by

High-Sync allows you to completely manage profiles via the command line.

Windows
You can create High-Sync.exe or High-Sync_Service.exe with the command line parameters shown on this page. High-Sync_Service.exe is only able to run standard jobs, while High-Sync.exe can perform all of the following actions. High-Sync_Service.exe is not as serious and it can run totally invisible, as well as report progress to the main GUI.

Command Line Examples for ‘Running a Job’ on Windows:

  • Run a job minimized:
    High-Sync.exe /RUNX=”Profile Name” /S /M
  • Run a job invisible, but with progress reporting to the GUI:
    High-Sync_Service.exe /RUNX=”Profile Name” /S /M /P /T

Mac.
On Mac, you are able to use the command line parameters in a shell script. An example:
Open ./High-Sync.app –args /RUNX=”Profile Name” /U

In addition, you can use the new High-SyncCL command line tool. It is found in the Contents/MacOS, inside the High-Sync.app folder. You could use it there directly, or copy it to a more convenient location. It takes the same parameters mentioned prior.

Parameters for ‘Running a Job’

  • /RUN=”Profile Name” and /RUNX=”Profile Name”
    With these options, you can create a specific profile from the command line for immediate execution. /RUN= starts the profile and leaves the program running. /RUNX= starts the profile and exits the program after the profile has been executed.
    You can use the asterisk wildcard at the end of this option, for example:
    /RUN=* or /RUNX=* or /RUNX=Office*
    You can also add this to cause a shutdown when done, by adding /SHUTDOWN
  • /O (Show only results.)
    Runs the job without High-Sync Preview, but shows a dialog with the results.
  • /U (Unattended mode.)
    The profile is started and executed without further user interaction. When this option is not specified, the file list is being shown, but the actual synchronization must be started manually. In unattended mode, the program will only show an error message if one of the synchronization paths cannot be accessed.
  • /S (Silent mode.)
    Like /U, but there will not be any error messages.
  • /M (Minimized mode.)
    The program is minimized to the system tray, while executing the profile. This option implies /U.
  • /P (Progress reporting – High-Sync_Service.exe only.)
    High-Sync_Service.exe will report progress information to the main program, in the same way the scheduler starts background jobs.
  • /T (Run in threads – High-Sync_Service.exe only.)
    High-Sync_Service.exe will run the job in a separate thread rather than in the main process thread, in the same way the scheduler starts background jobs, when the option ‘Start profiles in parallel’ is selected.
  • /LEFT=”Folder Path”
    Allows you to specify a left path that is different from the one stored with the profile.
  • /RIGHT=”Folder Path”
    Allows you to override the profile’s right path.
  • /MASK=”File1.txt;*.doc”
    Allows you to override the profile’s inclusion masks, or simply specify one, or more, files to copy.
  • /EXCL=”*.bak”
    Allows you to override the profile’s exclusion masks.
  • /SHUTDOWN (Windows only)
    Shutdown after running the profile(s) specified with /RUNX=”Profile Name”.
  • /CHOOSESUBFOLDERS
    The sub-folder selection dialog is shown prior to running the job. The selection that is made is not saved permanently unless you also specify the /SAVE parameter. Alternatively, you can add /SAVEONLY in order to save the new selection without running the job. In all situations, the profile name should be specified with /RUNX, even if you use /SAVEONLY.

General-Purpose Parameters

  • /INI=”Path to configuration file”
    Specifies the configuration file to be used. For example:
    /INI=”C:\ProgramData\High-Sync\High-Sync.ini”
  • /IMPORT=”Path to XML or CSV file”
    Import profiles from XML, or CSV. To find out how to make such files, please create a sample profile and export it by right-clicking it on the ‘Profile Overview.’

Command Line Parameters for Managing Profiles

The command line, to create any given profile, can be seen by creating it manually first, then going to ‘Information>Show Profile Details…’ in the profile editor.
An example:
High-Sync.exe ADD /Name=”Documents Backup” /Left=”C:\Users\Me\Documents” /Right=”D:\Backup\Docs” /L2R /Deletes /ReplaceNewer /MaxParallelCopiers=2

Alternatives to ADD are:
RUN (creates & runs a job without creating a permanent profile)
DELETE “Profile Name” (deletes a profile)
CHANGE “Profile Name” (changes an existing profile, keeping any existing settings which are not set on the command line)
RENAME “Old Profile Name” “New Profile Name”

ADD can be used to completely replace an existing profile with new settings.

Posted in Blog

High-Sync: Versioning and Filename Encoding

June 4th, 2018 by

High-Sync can preserve multiple versions of each file in your backup. The recommended method to achieve this is by encoding the timestamp into the filename. The option is called ‘Filename Encoding’ within the synchronizer software. The date and time is added at the end of each file, before the file extension.

‘Filename Encoding’ is also needed to preserve a file’s timestamp on most FTP servers, as well as on WebDAV, and Amazon S3 online storage. Since a file’s date and time are very important for synchronization, we recommend to use this feature with such servers whenever you do not need to have the original filenames on the server. This method requires that the local folders with the original filenames are on the left-hand side and the remote folder with the encoded filenames are on the right.


Example:

A file named Example.doc becomes Example.d20180604-u112510.doc on the right-hand side. The time you see in the filename is UTC/GMT time, which is independent from time zones and daylight saving time.

The encoded filename is only visible when looking directly at the storage used for the right side. When using High-Sync, the filenames are automatically decoded, and the ‘Synchronization Preview’ shows the original filenames only, along with the original file’s date and time.


Filename encoding can be chosen:

  • On the ‘Internet Protocol Settings’ dialog.
  • Or, on the tab, labeled ‘Advanced’ in Advanced Mode.

Versioning

By adding the date and time to a file’s name, it becomes possible to keep multiple versions of the same file, in the same folder, in the backup. This is the recommended method to keep multiple versions with any type of backup storage. To use it, choose ‘Keep multiple versions…’ on the ‘More’ tab, and mark only the first check-mark in the dialog that comes up. Earlier files should not be moved into a separate folder.


Compression – Zipping – Encryption

The files can also be zipped and/or encrypted. You will find these options on the ‘Zip’ tab. When combining compression with filename encoding, you must compress each file into a separate zip file. Only use the two upper check-boxes on the ‘Zip’ tab.


Restoring Files From Backup Storage

Restoring will give you the original file names and modification dates. For additional information, view our documentation on performing a restore.

Posted in Blog

High-Sync: Restore files from backup

June 4th, 2018 by

To restore files from a backup, start by coping the files you want. Then, the restore operation copies from the right-hand side back to the left-hand side, like normal. The ‘Restore Wizard’ will take you through all of the steps. Additionally, you can manually set up a restore job. Make a copy of the backup profile using the ‘Save As’ button and slightly change the name, then reverse the copying direction. For the restore, it should now be ‘Right to Left.’ You may want to choose a different destination folder for the restore, so that the restored files are not being copied back to their original location(s) immediately. Restoring is easier if you are copying to a new folder and do not need to worry about existing files.


Older Versions

The ‘Restore Wizard’ will let you specify a ‘Target Date’ for your restore. This can be an earlier date, in case you want to restore older versions of the files, rather than the most current ones. When you edit the restore profile manually, you will find this option on the ‘File Age and Size’ filters. After starting the restore, you will see the newest version of each file in the ‘Synchronization Preview.’ To select an earlier version of a file, right-click the file and choose the version you want from the menu.


Selecting folders and files

To restore only a specific folder, you can modify the profile’s path specification for the right-hand side accordingly, with the left side to match. Also, you can use the button ‘Selected Folders and Files.’ If you are looking for specific files, you can type their names, or an appropriate file mask, into the ‘Filename Mask(s)’ field in the profile. After starting the profile, you can remove any files you do not need in the ‘Synchronization Preview,’ by using the F5 key.

If no files are shown, due to the same or newer versions of the files exist on the left-hand side, then you need to click on ‘Show All’ in the top left corner of the ‘Synchronization Preview.’ You will now see all files, but no actions have been specified for them yet. Select the files you want and specify the desired copying direction using the check-boxes, the right-click menu, or the F8 key.

Posted in Blog

High-Sync Software functionality

June 4th, 2018 by

High-Sync Software is used to create replications jobs that can be local (disk to disk, disk to network share) or remote (public cloud providers or Internet protocols like FTP).  Not all of the features listed below work to all cloud providers so it’s best to check with your sales rep or technical support.   Some of these features will only work with high bandwidth (local area network) connections.

  • Synchronizes or Backs Up Files and complete folder structures in different locations, such as PCs, Macs, laptops, or online storage. There are no limits in terms of file sizes, the number of files, or filename lengths. The program fully supports Unicode characters so that it can copy filenames in all languages.  Be aware for Amazon S3 and compatible services will restricts individual files uploaded or downloaded to less than 5GB in size.
  • Each sync job is saved as a profile so that you only need to specify the settings once.
    You can run multiple profiles with a single click. You can also run profiles from the command line.
    Profiles can be created using a wizard, or in advanced mode.
  • Copy several files in parallel.
    You can copy between 1 and 10 files in parallel. This can greatly speed up the copying phase. Just specify the number of simultaneous copying threads on the Files tab sheet when editing a profile in Advanced Mode.
  • Includes a scheduler.
    Schedule the synchronization of your data on a backup hard disk at a convenient time each day, or as frequently as you wish. You can also schedule profiles to run upon shutdown or log-off. The scheduler can launch different jobs in parallel or sequentially. On Windows, the scheduler can run as a service – without users having to log on.
  • Internet and Cloud Support.
    Supports various Internet protocols, including FTP, FTPS, SFTP/SSH, WebDAV, SSL, HTTP, as well as these cloud services: Amazon S3 and compatible services, Microsoft Azure, Rackspace Cloud Files, Microsoft OneDrive (formerly SkyDrive), Google Drive and Google Docs, DropBox, Box.com, and more.  A summary of the multi-cloud support can be found here.
  • Compression and Encryption Support.
    Easily zip your files and encrypt them with strong 256-bit AES encryption. To unzip and decrypt, simply use the Restore Wizard or make a copy of your profile and copy in the opposite direction.
  • Detects Moved Files.
    If you reorganized your folders by moving files to different locations, High-Sync will detect this and quickly perform the same moves on the other side of the sync, rather than deleting and re-copying the files.
  • SmartTracking.
    This operating mode has been designed for two-way synchronizations. It keeps a database of all files so that it can detect file deletions and conflicts. Via the Configure button, you have access to the SmartTracking dialog where you can specify how to handle the various situations that can occur in two-way syncs.
  • Exact Mirror Mode.
    This operating mode has been designed for one-way synchronizations. In addition to copying newer files, this mode can also delete files which are no longer present on the source side, and it can replace newer files with older ones if it is necessary to create an exact mirror.
  • Unattended Mode.
    In this mode, no questions are asked while the profile is run. All relevant choices can be made beforehand in the profile settings.
  • Copy Locked Files.
    If some files cannot be copied due to other software accessing these files, Volume Shadowing can be used on Windows XP or later to copy the files. If files can’t be copied, the synchronizer will continue copying the remaining files, and then retry all those files that were locked, until all files have been copied successfully. A limit for the time spent on retries can be specified. On Macintosh and Linux, locked files can also be copied because the operating system does not normally enforce locks as strongly as Windows.
  • Versioning:
    this feature enables you to keep multiple older versions of each file in the backup. There are several naming schemes available.
  • Block Level Copying (or delta copying / partial file updating):
    this feature copies only the changed portions of files in order to speed up the synchronization. See Block Level Copying.
  • Database-safe mode:
    this mode requires exclusive access to the files to be copied. If exclusive access is not possible, Volume Shadowing is used, or the program will wait until the exclusive access becomes possible.
  • Can Use Recycle Bin
    for older versions of files that are overwritten, as well as for deleted files. This will give you a chance of retrieving overwritten or deleted files. By default, the recycle bin is used for deletions but not for updated files. These settings can be changed in the profiles.
  • File Masks & Filters.
    Numerous ways to select/deselect files and folders are available.
  • Daylight Saving Time / Time Zones.
    Due to consistent internal use of UTC/World Time, there are rarely any issues with timezone differences. However, if you find that your files have a timestamp mismatch such as 1 hour, the program can be set to ignore that and consider these files as identical – provided that the file size is the same, and the difference is exactly 1 hour (or an exact hour difference below the maximum number of hours allowed).
  • Easy Resuming On Disk Full. 
    You simply make more space and ask the software to continue copying. It can pause right in the middle of a file until additional space is freed.
  • Obsolete File Folders.
    If you occasionally move obsolete files to a specially designated folder, this usually causes trouble with traditional file synchronizers. They will copy the obsolete files back from your other machine right into the folders where you moved them out of. No longer! If you use the Selected Folders option, you can specify folders for obsolete files using the right mouse button. These folders are then taken into account for moving files into them, but not for copying files out. Thus, the synchronizer does the same moving of obsolete files on your one machine that you previously did on the other, but it does not waste any time copying all obsolete files  between the two machines.
Posted in Spotlight

Cloud-to-Local Backup – Reverse Cloud

June 1st, 2018 by

Cloud-to-Local Backup (Reverse Cloud) Provides Data Consolidation

Cloud-to-Local backup deals with the increasing use of the cloud storage, including the possibility that crypto viruses can reach into and encrypt mapped storage.  This scenario, or an end user error of accidentally deleting files, may result in an unrecoverable loss of data.  Even more importantly, you can consolidate corporate data from many sources onto one trusted local platform.  We’ve talked about at least 14 reasons to do reverse cloud backup before.  Cloud-to-Local backup can solve these issues. While many users trust their cloud provider to provide protection in the form of redundant storage or file versioning, many cases have emerged where that protection fails.

Multiple user accounts and clouds supported

Protect multiple public clouds and multiple user accounts with one NAS appliance. See Last Bullet in this document for brief explanations of each option.

The RNAS-U and C series of products, based on the Windows IOT enterprise operating system includes High-Sync software to create “pull down” replication jobs from 28 popular cloud storage providers or protocols.  While this functionality can be used to “push” corporate data up to public clouds for protection off-site, more users are discovering the benefits of implementing an automated Cloud-to-Local storage protection system.  Such a system automatically “pulls” cloud data on a regular basis to provide protection against cloud data loss.  The High-Sync Software is highly sophisticated, supporting a variety of incremental update and file replication scenarios. It is easy to make sure that multiple replication jobs run in sequence to limit the impact on bandwidth and local resources, including thrashing on the local drive.  An overview of benefits follows, but for more detailed list of High-Sync capabilities click here:

Here are some of the features and benefits of using an RNAS for Cloud-to-Local backup:

  • Restore Speed.  While some cloud providers (such as Dropbox) have tech support that can help restore accidentally encrypted or deleted files, it is much faster to recover files locally without involving tech support personnel.
  • Ease of Restore.  Restoring files locally using a windows based NAS doesn’t require a slow or complicated web interface, allowing files to be recovered easily.
  • Low Cost. Unlike cloud to cloud backup solutions, there are no per user, per GB, or per account fees with RNAS High-Sync.  You can basically protect multiple users for the cost of the NAS box.
  • Data Consolidation.  Backup multiple user accounts from as many disparate cloud sources as required.  User A may use dropbox, User B Google Drive, and User C may have a Microsoft One Drive account.  Create 3 distinct incremental replication jobs to pull all the data down to one local NAS device.
  • Security.  Since the RNAS is a Windows based device, all domain join, password management, and active directory features are available.  Drives can be encrypted with bitlocker.
  • File Versioning.  Implement File versions to retain multiple versions of your files, no matter which cloud they are stored in.  Note:  You can also use Microsoft File History to implement versions, but High-Sync allows you to manage versions directly in the same interface.
  • Local & Removable.  Many clients like the idea of a local hard drive they can physically remove that contains all their data.
  • Phone Support.  Add Dynamic Support to get telephone technical support with replication, setup, and recovery of crucial files.
  • Anti-Ransomware.  By implementing delayed push replication and versioning, RNAS cloud protection features provide best in class protection against viruses and malware that may infect popular cloud platforms through mapped drives.
  • Remote Management.  Because the RNAS is Windows IOT based (Same code base as Server 2016 and Windows 10) you can use your remote monitoring and management tools to notify you of problems and use RDS to remote into the box for ease of management.
  • Reduce Cloud Storage fees.  By pulling older files down to the RNAS, the client can save on monthly cloud storage expenditures by archiving older files locally and removing them from the cloud.
  • Encryption Support.  Use Bitlocker to encrypt the local hard drive for extra protection against physical media theft.
  • Clouds Supported.  The nearby graphic and the link here shows the wide variety of public clouds and protocols that can be used or backed up to the local drives.  These include, FTP, SFTP, SSH, WebDAV, Amazon S3, Wasabi, HTTP, Azure, Rsync, Glacier, External, Backblaze B2, Box, Google Drive, Google Nearline, Dropbox, Rackspace, Amazon Cloud drive, Microsoft One Drive (all versions), Sharepoint, Graph, Hubic, Sugarsync, Mediafire, Orange.fr, Mega, MTP, and Email.  To get details of the multiple public clouds & protocols click here:
Posted in News