In fact it’s not possible to open the zip file directly with Winzip or 7zip, because it would give a corrupt file error. If you choose to encrypt the data in the backup configuration, the restore necessarilyhas to be done with Iperius Backup. Select the path of the zip file created by Iperius, the destination path where extract the data, and the protection password that has been configured inside the Job and then click on”Run the Restore” In the tab “Restore” select the option “Restore from zip file”: If in the Destination settings has been selected the option “Standard Protection”, the data can be simply extracted by inserting the password, and it’s possible using any compression software like 7-zip, so also Iperius Backup. Instead, in this tutorial, we will explain the steps to follow for recover encrypted data, according to the protection option selected inside the Job. In this tutorial we described how the encryption woks and how to configure it inside the Job of Iperius Backup. Restoring files is simple, since all you have to do is point out the source item.Iperius Backup supports the data encryption, as any dedicated software take into consideration, in order to guarantee the protection of the sensitive and personal data, as well as for the GDPR rule. The computer may be scheduled to automatically shut down when the job is completed. backup completed successfully, at least one file copied).įurthermore, the program allows users to set apps or other external files for execution before and after the backup job is done. For example, you can specify multiple mail recipients and hidden recipients, as well as trigger the action only in particular scenarios (e.g. Iperius Backup features task scheduling and email notifications with complex filters. always copy and set the date and time of files). In addition, you can include hidden and system files, record all program activity to a log file, display the backup operation in progress, select the ZIP compression mode, as well as edit properties for normal copy operations (e.g. It is possible to create exclusion lists, enable a user account for network access, and add destinations in directories, tapes, Cloud and FTP.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |