Source Files Exclusion - ACRONIS BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - UPDATE 3 User Manual

Hide thumbs Also See for BACKUP AND RECOVERY 10 ADVANCED SERVER VIRTUAL EDITION - UPDATE 3:
Table of Contents

Advertisement

The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a
randomly generated key with a user-defined size of 128, 192 or 256 bits. The larger the key size, the
longer it will take for the program to encrypt the archive and the more secure your data will be.
The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key.
The password itself is not stored anywhere on the disk or in the backup file; the password hash is
used for verification purposes. With this two-level security, the backup data is protected from any
unauthorized access, but recovering a lost password is not possible.
3.4.1.2

Source files exclusion

This option is effective for Windows and Linux operating systems and bootable media.
This option is effective for disk-level backup of NTFS and FAT file systems only. This option is effective
for file-level backup of all supported file systems.
The option defines which files and folders to skip during the backup process and thus exclude from
the list of backed-up items.
The preset is: Exclude files matching the following criteria: *.tmp, *.~, *.bak.
To specify which files and folders to exclude:
Set up any of the following parameters:
Exclude all hidden files and folders
This option is effective only for file systems that are supported by Windows. Select this check box
to skip files and folders with the Hidden attribute. If a folder is Hidden, all of its contents —
including files that are not Hidden — will be excluded.
Exclude all system files and folders
This option is effective only for file systems that are supported by Windows. Select this check box
to skip files and folders with the System attribute. If a folder is System, all of its contents —
including files that are not System — will be excluded.
You can view file or folder attributes in the file/folder properties or by using the attrib command. For more
information, refer to the Help and Support Center in Windows.
Exclude files matching the following criteria
Select this check box to skip files and folders whose names match any of the criteria — called file
masks — in the list; use the Add, Edit, Remove and Remove All buttons to create the list of file
masks.
You can use one or more wildcard characters * and ? in a file mask:
The asterisk (*) substitutes for zero or more characters in a file name; for example, the file mask
Doc*.txt yields files such as Doc.txt and Document.txt
The question mark (?) substitutes for exactly one character in a file name; for example, the file
mask Doc?.txt yields files such as Doc1.txt and Docs.txt — but not the files Doc.txt or Doc11.txt
To exclude a folder specified by a path containing the drive letter, add a backslash (\) to the folder
name in the criterion; for example: C:\Finance\
Exclusion examples
Criterion
Example
106
Description
Copyright © Acronis, Inc., 2000-2010

Advertisement

Table of Contents
loading

This manual is also suitable for:

Backup & recovery 10 advanced server virtual edition

Table of Contents