How to use backup. Backup. Here tbneebfsh teetchee lpry

Backup(English backup)- the process of creating a copy of the data on the media ( hard disk, floppy disk, etc.) intended for their original or new location in case they are damaged or destroyed. Procedure backup or Reserve copy very simple, but can be a big headache if not done. The business of many companies directly depends on the manipulation of information stored on servers: databases, source code repositories, web projects, etc.. All this must be saved daily to backup media. In case of loss of information and its impossibility to recover the company can suffer big losses.

Copying data from the production server to the backup server

Production server- This is a working server that performs any services for users.

backup server is the server to which content is copied from the production server. The only purpose of such a server is to store data from other servers. Usually he does not perform any services. The main requirement is a large disk space. Speed disk drives it doesn’t really matter, since access to data is not frequent - write the backup to disk and read it if necessary.

The downside of this solution is the need for a separate server for backups, which is an additional cost. Small and medium-sized companies usually try to save money on the purchase of ancillary equipment.

Cross copy data

When two or more production servers copy their data to each other. In the case when production servers have enough disk space to store data from other servers, they can be used as backup servers. We are copying data from server1 to server2 and data from server2 to server1.

Plus, we save money on equipment. As I wrote above, small and medium organizations may not allocate money for auxiliary equipment, even if it is necessary for backups. In this case, this backup method can help you.

Storage systems

“Classic” servers for storing backups are good for relatively small volumes. Now it is several hundred gigabytes. When the volumes are much larger, storage systems, Data Storage Systems come to the rescue.

Disk arrays

Essentially the same server, but designed specifically for data storage. Has a lot of larger HDDs. For example, disk array Sun Storage J4500. Scalability - from 24 to 192 TB. Supported OS: Solaris, RedHat, Suse, Windows

Tape drives

They are streamers. Data, as in the case of tape libraries, is written to special cartridges. As a rule, the cartridge is a magnetic tape in plastic case. For example, an HP StorageWorks DAT 160 SAS tape drive. Cartridge for HP StorageWorks DAT 160 SAS. 160 GB.

Tape Libraries

Designed for automated data backup. Using multiple tape drives at the same time increases library performance and reduces the time it takes to write and read backups. One of SUN's most serious decisions. Sun StorageTek SL8500 Tape Library. Up to 56 petabytes of data. Up to 70 thousand cartridges.

Other storage media

  • optical disc (CD-R/RW, DVD-R/RW);
  • flash drives;
  • ZIP, Jaz, MO drives.

Backup types

Full backup

A full backup usually covers your entire system and all files. Weekly, monthly and quarterly backups mean full backups. The first weekly backup should be a full backup, usually done on Fridays or over the weekend, during which all desired files are backed up. Subsequent backups, which run Monday through Thursday until the next full backup, can be incremental or differential, primarily to conserve time and space on the media. A full backup should be done at least weekly.

Differential backup

With a differential (differential) backup, every file that has changed since the last full backup is backed up each time. Differential redundancy speeds up the recovery process. All you need is the latest full and latest differential backup. Differential backups are growing in popularity, as all copies of files are made at certain times, which is very important, for example, in case of a virus infection.

Incremental backup

An incremental ("incremental") backup only copies files that have changed since the last full or incremental backup. A subsequent incremental backup only adds files that have changed since the previous incremental backup. On average, incremental backups take less time because fewer files are copied. However, the restore process takes longer because the data from the last full backup must be restored, plus the data from all subsequent incremental backups. In this case, unlike differential backup, changed or new files do not replace the old ones, but are added to the media independently.

Backup by cloning

Cloning allows you to copy an entire partition or media (device) with all files and directories to another partition or media. If the partition is bootable, then the cloned partition will also be bootable.

Backup as an image

An image is an exact copy of the entire partition or media (device) stored in a single file.

Real-time backup

Real-time backup allows you to create copies of files, directories and volumes without interrupting your work, without restarting your computer

Backup rotation schemes

rotation is the policy by which the backup is made. How often will we backup, how long will we keep backups. All this is described by the rotation policy.

One time copy– the administrator does the copying manually. Usually done full data backup.

Simple rotation- it is understood that a certain set of media is used cyclically. For example, 5 tape media for each day of the week. On Friday we make a full backup of the data, and on the rest of the week we do an incremental backup.

"Grandfather, father, son" (gfs)- has a hierarchical rotation structure.

Three media sets are used. Once a week, a full backup of the data is made. On other days of the week it is incremental. Once a month, another full backup of the system is made. The daily incremental media set is the son, the weekly full backup set is the father, and the monthly full backup set is the grandfather.

"Tower of Hanoi"- the name comes from an ancient Chinese game. The meaning of the game is as follows. There are three rods and some set of disks. The disks must be moved from rod to rod, but in such a way that each new disk lay down on a disk of larger diameter. This backup method is quite complicated and is practically not used at present.

“10 sets”– the method is designed for 10 media sets. The period of 40 weeks is divided into ten cycles. During the cycle, each set is assigned one day of the week. After a four-week cycle, the set number is shifted. That is, in the first cycle, set N1 answered for Monday, N2 for Tuesday, N3 for Wednesday, and so on. In the second cycle, set N2 will be responsible for Monday, N3 for Tuesday, N4 for Wednesday, and so on. Such a scheme allows you to evenly distribute the load between the carriers, but due to its complexity it is practically not used.

Database backup methods

  • hotbackup- hot database backup. This is when the backup is done with the database server turned on.
  • coldbackup- cold database backup. This is when the DB server needs to be shut down in order to take a backup.

Conduct a thought experiment: imagine that you have lost the information that you use in your work: an accounting computer, a customer database, a website with years of accumulated information. What is the estimated economic cost to you from this loss?

What can cause data loss? There are many reasons: the ransomware virus encrypted all the data, there was a technical failure, the hard disks or the computer with the information was stolen.

Also, do not think that the information that is with your hosting provider is completely protected. The hosting provider may have exactly the same problems.

It is clear that if you had a backup copy, then the damage would be significantly less. Moreover, the newer the copy, the less damage.

Conclusion: a backup will allow you to significantly reduce economic losses.

Backup is a process

It is important to understand that backup is primarily a workflow, not a technological one. There are two roles in this workflow.

1. Backup Creator:

  • organizes the process of creating and storing backup copies;
  • creates instructions for creating and restoring information from backups;
  • creates instructions for creating backups;
  • Reports to the person responsible for storing backups.

2. Backup Keeper:

  • responsible for the safety of backups (has passwords for storage locations);
  • conducts periodic checks of recovery from backups;
  • periodically personally according to the instructions creates backup copies.

Unfortunately, often the performer and the person responsible for storage are the same person. This is wrong and increases the risk of data loss.

Firstly, it is always better to divide such a responsible job among several people in order to reduce human factor- illness, vacation, dismissal, conflict situations.

Secondly, in the role of the creator, by definition, it is impossible to carry out a process check, since it will be part of the work on organizing the process.

That is why a separate role is needed to control the created backup process. Simply put, you need an “unblurred” view of a third-party person in order to avoid mistakes.

The backup custodian should include managers, and not just ordinary employees, since usually it is the manager who is the most interested person in this process.

It is worth noting that the backup creator can be the backup custodian, provided there are other custodians.

Where to store backups

It is important that the backup custodian has access to and permanent control over where the backups are stored. It's also worth having several different backup storage locations so you don't "put all your eggs in one basket".

Often, backups are stored in the same place where the actual data that needs to be saved is located. This is an unreliable method of storage, since data can be lost if the storage medium is damaged.

It is very good to occasionally save all information on non-rewritable media, such as optical discs(CD, DVD) or file systems without delete and overwrite mode. They, in turn, can be located in cloud storages.

But this does not exclude the importance of storing information on rewritable media without constant access to the Internet. For example, on hard drives in the safe.

In addition, information can be stored in cloud storage such as Dropbox.

About the importance of encrypting backups

It is important to store your backups in a secure, encrypted location. If you do not use encryption, then all your data, especially databases, can completely "leak" to the Web.

In the event of a "leak" of the database, it is necessary to change the passwords immediately, since the "leaked" passwords are easy to retrieve from the database.

It is acceptable to store data in encrypted form in cloud storage. But the encryption algorithm must be strong enough. If the information is of great value over time, then this method should be abandoned in favor of local storage in reliable places. It must be remembered that information leaks also occur from cloud storage.

How often should you back up

  • once every six months, a year - make copies on non-rewritable media and for storage in a safe;
  • at any time, but more often than once every six months - on your resources responsible for storing backups;
  • once a day/week - directly on the server itself or in the cloud storage using automatic creation backups.

Recovery instructions

Why is it important to have a worked out instruction in case you need to recover from a failure? Imagine the situation: you had a failure, and the person who was in charge of backup went on vacation and there is no connection with him. What are you going to do?

If you have worked out the instructions according to which you periodically conduct exercises, then such problems should not arise. It is also important to have periodic exercises to restore data from backups.

Name of operations

  • Data backup (Data backup) - the process of creating a copy of data
  • Data recovery - the process of restoring to the original location

Target

Backup is necessary to be able to quickly and inexpensively restore information (documents, programs, settings, etc.) in case of loss of a working copy of information for any reason.

In addition, related problems are solved:

  • Data duplication
  • Transferring data and working with shared documents

Backup system requirements

  • Reliability of information storage - is ensured by the use of fault-tolerant equipment of storage systems, duplication of information and replacement of a lost copy with another in case of destruction of one of the copies (including as part of fault tolerance).
  • Ease of operation - automation (if possible, minimize human involvement: both the user and the administrator).
  • Rapid implementation - simple installation and configuration of programs, rapid user training.

Types of backup

Full backup A full backup usually covers your entire system and all files. Weekly, monthly and quarterly backups mean full backups. The first weekly backup should be a full backup, usually done on Fridays or over the weekend, during which all desired files are backed up. Subsequent backups, which run Monday through Thursday until the next full backup, can be incremental or differential, primarily to conserve time and space on the media. A full backup should be done at least weekly. Differential backup In a differential backup, every file that has changed since the last full backup is backed up every time. Differential redundancy speeds up the recovery process. All you need is the latest full and latest differential backup. Differential backups are growing in popularity, as all copies of files are made at certain times, which is very important, for example, in case of a virus infection. Incremental backup An incremental ("incremental") backup only copies files that have changed since the last full or incremental backup. A subsequent incremental backup only adds files that have changed since the previous incremental backup. On average, incremental backups take less time because fewer files are copied. However, the restore process takes longer because the data from the last full backup must be restored, plus the data from all subsequent incremental backups. In this case, unlike differential backup, changed or new files do not replace the old ones, but are added to the media independently. Backup by Cloning Cloning allows you to copy an entire partition or media (device) with all files and directories to another partition or media. If the partition is bootable, then the cloned partition will also be bootable. Backup in the form of an image An image is an exact copy of the entire partition or media (device) stored in a single . Real-time backup Real-time backup allows you to create copies of files, directories and volumes without interrupting your work, without restarting your computer.

Rotation schemes

Changing the working set of media during copying is called media rotation. For backup, a very important issue is the choice of a suitable media rotation scheme (for example, magnetic tapes).

One time copy

The simplest scheme that does not involve media rotation. All operations are carried out manually. Before copying, the administrator sets the backup start time, lists file systems or directories to be copied. This information can be stored in a database so that it can be used again. In one-time copying, it is most often used full copy.

Simple rotation

Simple rotation means that a certain set of tapes is used cyclically. For example, a rotation cycle can be a week, then a separate media is allocated for a specific working day of the week. The disadvantage of this scheme is that it is not very suitable for archiving, since the number of media in the archive is growing rapidly. In addition, incremental/differential writes are carried out on the same media, which leads to their significant wear and, as a result, increases the likelihood of failure.

"Grandfather, father, son"

This scheme has a hierarchical structure and assumes the use of a set of three sets of media. Once a week, a complete copy of the computer's disks is made ( "father"), while incremental (or differential) backups are performed daily ( "son"). Additionally, once a month, another full backup is performed ( "grandfather"). The composition of the daily and weekly set is constant. Thus, compared to a simple rotation, the archive contains only monthly copies plus the latest weekly and daily copies. The disadvantage of this scheme is that only the data available at the end of the month, as well as the wear and tear of the media, are included in the archive.

"Tower of Hanoi"

The scheme is intended to address some of the shortcomings of the simple rotation scheme and the "Grandfather, Father, Son" rotation scheme. The scheme is based on the use of several sets of media. Each set is designed for weekly copying, as in the simple rotation scheme, but without withdrawal full copies. In other words, a separate set includes media with a full weekly copy and media with daily incremental (differential) copies. A specific problem with the Tower of Hanoi scheme is its higher complexity than other schemes.

"10 sets"

This scheme is designed for ten media sets. The period of forty weeks is divided into ten cycles. During the cycle, each set is assigned one day of the week. After a four-week cycle, the set number shifts by one day. In other words, if in the first cycle set number 1 was responsible for Monday, and set number 2 was responsible for Tuesday, then in the second cycle set number 2 is responsible for Monday, and set number 3 is responsible for Tuesday. Such a scheme allows you to evenly distribute the load, and therefore, wear between all media.

Tower of Hanoi and 10 sets are not commonly used because many reservation systems do not support them.

Backup storage

  • Streamer tape - recording backup data on the streamer's magnetic tape;
  • "Cloud" backup" - recording backup data using "cloud" technology through the online services of special providers;
  • DVD or CD - recording backup data on compact discs;
  • HDD - recording backup data on a computer hard disk;
  • LAN - recording backup data to any machine within the local network;
  • FTP - recording backup data on FTP servers;
  • USB - write backup data to any USB-compatible device (such as a flash card or external hard drive);
  • ZIP, JAZ, MO - backup to ZIP, JAZ, MO floppy disks.

Methods of dealing with information loss

Loss of information happens for various reasons.

Operational breakdowns of storage media

Description: Random breakdowns within the failure statistics associated with negligence or end of life. Of course, if some important information has already been lost, then you can contact a specialized service - but this is not one hundred percent reliable.

Struggle: store all information (each file) in at least two copies (and each copy on its own data carrier). For this apply:

  • RAID 1 for recovery the freshest information. Files located on a server with RAID are more protected from breakage than those stored on a local machine;
  • Manual or automatic copying to another medium. For this, a version control system, a specialized backup program, or improvised tools like a periodically launched cmd file can be used.

Natural and man-made disasters

Description: storm, earthquake, theft, fire, water main break - all this leads to the loss of all data carriers located in a certain area.

Struggle: The only way to protect against natural disasters is to keep part of the backups in another room.

Malware

Description: this category includes accidentally entered software that deliberately corrupts information - viruses, worms, Trojan horses. Sometimes the fact of infection is discovered when a large part of the information is distorted or destroyed.

  • Installation of anti-virus programs on workstations. The simplest anti-virus measures - disabling startup, isolation local network from the Internet, etc.
  • Providing centralized updates: the first copy of the antivirus receives updates directly from the Internet, and other copies are configured to the folder where the first one downloads updates; you can also configure the proxy server so that updates are cached (these are all measures to reduce traffic).
  • Have copies in a place that the virus cannot reach - a dedicated server or removable media.
  • If copying goes to the server: protect the server from viruses (either install an antivirus or use an OS for which the probability of infection is low). Store versions that are old enough so that there is a copy that has not been in contact with the infected computer.
  • If copying goes to removable media: keep some of the media (without writing to them) for a long time so that there is a copy that does not come into contact with the infected computer.

DEMBKFE TEETCHOSCHE LPRYY CHBYI DBOOSHI ABOUT RPDIPSEIK OPUIFEMSH Y ITBOYFE YI CH OBDETSOPN NEUFE. fBLPE NEUFP, RP CHPNPTSOPUFY, DPMTSOP VSHCHFSH RPDBMSHYE PF NEUFB CHBYEK PVSHCHUOPK TBVPPFSHCH. ChSch NPTSEFE DBTSE YNEFSH DCHE TETETCHOSHE LPRYY DBOOSHI, PDOH FBN, ZDE ChSCH TBVPFBEFE, DTHZHA ZDE-OYVHDSH EEE H DTHZPN NEUFE. CHPPVEEN, CHBN OHTSOP HVEDYFSHUS CH FPN, UFP CHSH UNPTSEFE CHPURPMSHCHBFSHUS LFYNY CURRENT LPRYSNY, YUFPVSHCH CHUE UFP YNEMP UNSCHUM.

CH LBFBMPZE /etc:

/etc/lilo.conf

UPDETCYF LPOJYZHTBGYA BLZTHYUYLB LILO. eUMMY CHSH YURPMSHHEFE grub CHNEUFP of LILO, FPZDB ZHBKMSCH, LPFPTSCHE OBDP UPITBOSFSH, OBIPDSFUS CH LBFBMPZE /boot/grub .

/etc/fstab

ITBOYF LPOZHYZHTBGYA FBVMYGSHCH TBDEMPCH DYULB Y UPPFCHEFUFCHHAEYE FPYULY NPOFITPCHBOYS.

/etc/modules.conf

UPDETCYF ЪBZTKHЪPYUOSCHE NPDHMY Y YI RBTBNEFTSC UZMBUOP PVPTKHDPCHBOIS CHBYEK UYUFENSCH. ChPNPTSOP FFPF ZHBKM OE FBL ChBTsOP UPITBOSFSH, EUMY ChPUUFBOPCHMEOYE VHDEF RTPY'CHPDYFSHUS ABOUT UPCHUEEN OERPIPTSEK NBYOE, OP OELPFPTSCHE RPDULBLY CH OEN CHUE TBCHOP YNEAFUS.

/etc/isapnp.conf

UPDATECYF OBUFTPCLY ISAPnP, EUMY CHS YURPMSHHEFE HER DMS OBUFTPCLY ISA Plug & Play PVPTHDPCHBOYS.

bneuboye

U SDTBNY 2.4.x CHBN, CHPNPTsOP, CHPPVEE VPMSHIE OE OHTSEO LFP ZhBKM, FBL LBL PVPTKHDPCHBOYE plug "n" play FERETSH OBUFTBYCHBEFUUS U YURPMSH'PCHBOYEN ZHBKMPCHPK UYUFENSCH DevFS.

/etc/X11/XF86Config-4 Y/YMY /etc/X11/XF86Config

UPDETCYF OBUFTPCLY X. X LFP ZTBJYUEULPE SDTP GNU / Linux

/etc/cups

ITBOYFE SHOULDER CUPS. CUPS UYUFENB REYUBFY RP HNPMYUBOYA CH Mandrake Linux. eUMY CH OE RPMSHHEFEUSH CUPS, BY UYUFENPK REYUBFY lpr, FPZDB UPITBOSFSH OHTSOP /etc/printcap .

/etc/bashrc

SHEETS bash shell DMS CHUEK UYUFENSCH.

/etc/profile

OBUFTPKLY UYUFENOPZP PLTKHTSEOIS Y OELPFPTSCHI RTPZTBNN, CHSHCHRPMOSENSCHI CH RTPGEUUE ЪBZTHЪLY UYUFENSCH.

/etc/crontab

HUFBOPCLY CHSHCHRPMOSENSCHI RETYPDYUEULY BDBOYK cron, OBRTYNET, DMS OBDBYU PVUMHTSYCHBOYS UYUFENSCH.

/etc/rc.d/*

HUFBOPCHLY TBMYUOSCHI HTPCHOK CHSHCHRPMOEOIS (run levels) UYUFENSCH. pVSCHYuOP YI OE OHTSOP VELBRYFSH, EUMY FPMSHLP CHSHCHOE DPVBCHMSMY YuEZP-OYVHDSH UCHPEZP CH OYI YIMY OYI YINEOSMY HTPCHEOSH CHSHCHRPMOEOIS, HUFBOCHMEOOSHK RP HNPMYUBOYA.

/etc/inittab

OBUFTPKLY HTPCHOS CHSHCHRPMOEOIS, CH LPFPTPN RP HNPMYUBOYA BRHULBEFUS CHBYB UYUFENB.

/etc/ssh

ITBOYFE SHOULDER ssh. eUMY CHSH YURPMSHHEFE VEEPRPBUOSCHK HDBMEOOOSCHK DPUFHR, FFPF ZHBKM PUEOSH CHBTsOP UPITBOYFSH.

EUMY X CHBU TBVPFBAF web UETCHET, FTP UETCHET YMY LBLIE-MYVP DTHZYE UETCHETB, FBLTS UDEMBKFE TEETCHOSHE LPRYY YI LPOZHYZHTBGYPOOSCHI ZHBKMPCH. NSC OE NPTSEN RETEYUYUMYFSH YI CHUE, FBL LBL LFP IBCHYUIF PF LPOLTEFOPZP UETCHETB.

H LBFBMPZE /root Y H LBTsDPN Y RPMShЪPCHBFEMSHULYI LBFBMPZCH /home/user_name , UPITBOSFSH OHTSOP UMEDHAEYE LBFBMPZY:

~/.gnome/* ~/.gnome2/*

OBUFTPCLY PLTCEOIS TBVPYUEZP UFPMB GNOME.

~/.kde/*

OBUFPKLY DMS PLTCEOIS TBVPYUEZP UFPMB KDE.

~/.mozilla/*

OBUFTPCLY UENEKUFCHB RTPZTBNN Mozilla. BLMBDLY Navigator pVTBFIFE CHOYNBOYE, UFP CH LFPN LBFBMPZE FBLCE OBIPDIFUS CHUS CHBYB RPYUFB Y UPPVEEOIS ZTHRR OCHPUFEK. chsch PRTEDEMEOOOP OE BIPFIFE LFP RPFETSFSh, OE RTBCHDB MY?

~/Mail/*

EUMY CHSH JURPMSHEKHEFE kmail, FP LFPF LBFBMPZ UPDETSYF CHUE CHBY RPYUFPCHSHCHE UPPVEEOIS. chsch LPOEYUOP CE OE IPFIFE YI FETSFSH, OE FBL MY?

~/.ssh/*

ITBOYF MYWOSHE OBUFTPCLY DMS ssh. eUMY CHSH TBVPFBEFE U ssh, UPITBOEOYE LFPZP LBFBMPZB PVSEBFEMSHOP.

UMFYF PVTBFIFSH CHOYNBOYE FBLCE ABOUT UMEDHAE JBKMSCH:

~/.bash_profile th ~/.bashrc

UPDETCBF RETENEOOSCHE PLTHCEOYS, alias-SCH, Y DTHZYE OBUFTPCLY DMS bash shell.

~/.cshrc

UPDETCYF RETENEOOSCHE PLTHCEOYS, alias-SCH, Y DTHZYE OBUFTPCLY DMS CSH shell.

~/.tcshrc

UPDETCYF RETENEOOSCHE PLTHCEOYS, alias-Sch, Y DTHZYE OBUFTPCLY DMS tcsh shell.

RPTsBMHKUFB, YNEKFE CH CHYDH, UFP NSC OE NPTSEN HDEMYFSH CHOINBOYE LBTsDPNKh PFDEMSHOPNH ZHBKMH OBUFTPEL, RPFPNH UFP OB LFH FENKH OBN RTYKDEFUS RYUBFSH GEMHA LOYZH. OBRTYNET, EUMY CH O RPMSHHEFEUSH Mozilla, CHBN OCHTSOP UPITBOSFSH PFOPUSEYEUS L OEK ZHBKMSCH Y LBFBMPZY, EUMY CH CH O TBVPFBEFE U ssh, CHBN OE OBDP DEMBFSh TEETCHOKHA LPRYA ZHBKMPCH ssh, Y FBL DBMEE.

РПДЧПДС ЙФПЗЙ, НПЦОП УЛБЪБФШ, ЮФП ТЕЪЕТЧОПЕ ЛПРЙТПЧБОЙЕ ОЕПВИПДЙНП ДМС ЧУЕИ ЛПОЖЙЗХТБГЙПООЩИ ЖБКМПЧ ЧУЕИ РТПЗТБНН, ЛПФПТЩНЙ ЧЩ РПМШЪХЕФЕУШ Й ДМС ЧУЕИ ЛПОЖЙЗХТБГЙПООЩИ ЖБКМПЧ, ЛПФПТЩЕ ЧЩ ЙЪНЕОСМЙ. LTPNE FPZP, UPITBOSKFE CHUE CHBY MYUOSCHE (Y RPMSh'PCHBFEMEK CHBYEK UYUFENSCH FPTS) ZHBKMSCH DBOOSCHI. CHSH OE VKhDEFE RPFPN TsBMEFSH PV LFPN.

HERE TBNEEBFSH CURRENT LPRYY

UMEDHAEIK OBUKHEOSCHK CHPRTPU, LPFPTPNH FTEVHEFUS PFCHEF. CHUE BBCHYUYF PF FPZP, ULPMSHLP YOZHPTNBGYY CHSC UPVTBMYUSH UPITBOSFSH, ULPMSHLP CHTENEOY DPMTSOB BOINBFSH RTPGEDHTB UPITBOOYS, OBULPMSHLP RTPUF DPUFHR L OPUIFEMSN DMS VELBR DB ME FBL.

Ch PVEEN UMKHYUBE, CHBN OKHTSEO OPUIFEMSH, TBNET LPFPTPZP OEULPMSHLP VPMSHYE TBNETB UPITBOSENPK YOZHPTNBGYY, Y LPFPTSCHK DPUFBFPYUOP VSHCHUFT, YUFPVSCH CHEUSH RTPGEUU UPITBOEUPOEIKHOES TBUFSOEVOYES TBUFSOYOES

Teetchoshchk opuyfemsh

ЪDEUSH NSCH CHBN RTEDPUFBCHYN OEVPMSHYPE PRYUBOYE RBTBNEFTCH OPUIFEMEK, RTYZPDOSCHI DMC VELBRB. sing TBMYYUBAFUS RP TBNETBN, OBDETSOPUFY Y ULPTPUFY. PRYUBOYSOE UMEDHAF LBLPNKh-MYVP PUPVPNKh RPTSDLKh, B DBAFUS RP NETE FPZP, LBL POY RTYYMY ABOUT HN. YNEKFE CH CHYDH, YUFP CHBYE RTPZTBNNOPE PVEUREYEOOYE DMS TEETCHOPZP LPRYTPCHBOYS OE PVSBFEMSHOP VHDEF RPDDETSYCHBFSH OELPFPTSCHE YЪ PRYUBOOSHCHI OPUIFEMEK.

bneuboye

DBOOSCHK URYUPLOE SCHMSEFUS YUYUETRSHCHCHBAEYN BOBMYYPN UHEUFCHHAEYI OPUIFEMEK. zhBLFYUEULY, OELPFTSHCHE CHEEY, LPFPTSHCHE ЪDEUSH PRYUBOSCH, NPZHF YЪNEOYFSHUS CH VHDHEEN. fBLYE RBTBNEFTSHCH, LBL UTL TSOYOY OPUIFEMS, CHSFSHCH U web UBKFPCH RTPY'CHPDYFEMEK Y/YMY YY PRSHCHFB PFDEMSHOSHCHI MADEK Y UPPVEEUFCHB. lTPNE FPZP, NPTSEF VSHCHFSH NOPZP UHVYAELFICHOSHI FPYUEL ЪTEOYS ABOUT OELPFPTSCHE CHEEY, FBLIE LBL, OBRTYNET, GEOB.

DYULEFB

HER ENLPUFSH DPUFYZBEF 1.44 MB . DYULEFSHCH MEZLP OPUSFUS, OP DMS UEZPDOSYOYI OHCD POY YNEAF UMYYLPN NBMP NEUFB. MHYUYE CHUEZP ABOUT OII RETEOPUYFSH OEVPMSHYYE ZHBKMSCH. WELCOME. REALLY. uFBODBTFOSCHK DYULCHPD EUFSH ABOUT MAVPN LPNRSHAFETE. NPTsOP YUIFBFSH Y RJUBFSH. pTSYDBENSCHK UTPL TSOYOY - 4-5 MEF.

CHOYNBOYE

RPTsBMHKUFB YNEKFE CH CHYDH, UFP DYULEFSHCH OE PYUEOSH OBDETSOSCHCH.

LS120 DYULEFB

CHNEUFYNPUFSH FBLPK DYULEFSHCH 120 MB. RP ZBVBTYFOSHCHN TBNETBN RPIPTSB ABOUT PVSCHUOKHA DYULEFKH, OP YNEEF RPYUFY CH UFP TB VPMSHIE NEUFB. oE PYUEOSH DEYECHBS. FTEVHEFUS UREGYBMSHOSHCHK DYULPCHPD, OP FBLPK DYULPCHPD NPTsOP YURPMSHЪPCHBFSH DMS UFEOYS/ЪBRYUY PVSCHUOSCHI DYULEF. oERMPIBS ЪBNEOB DYULEFBN, PDOBLP ULPTPUFSH ZPTBDP OYCE, YUEN H HUFTPKUFCH ZIP. yuFEOYE / BRJUSH. CHTENS TJOY OPUIFEMS RTYNETOP FBLPE CE, LBL X HUFTPKUFCH ZIP.

ZIP DYUL

CHNEUFYNPUFSH DP 750 MB. IPFS POY OE FBLYE FPOLYE, LBL PVSCHYUOSCHE DYULEFSHCH, YI FPTS OEUMPTsOP OPUIFSH, Y, L FPNKh TSE, POY ZPTBDP VPMSHIE RPDIPDSF DMS UPCTENEOOOSCHI FTEVPCHBOIK. IPTPYK VBMBOU CHPNPTSOPUFEK, IPFS OEULPMSHLP DPTPZPCHBFShch. yuFEOYE / BRJUSH. pTSYDBENSCHK UTPL UMHTsVSHCH 10 MEF DMS 100 MB AOYFCH, ChPNPTsOP VPMSHYE DMS 250/750 MB AOYFCH.

CD-R

TBNET OPUIFEMS DPUFYZBEF OB WEZPDOSYOYK DEOSH 700 MB, IPFS UFBODBTFPN SCHMSEFUS 650 MB. PUEOSH DEYECHSHCHK Y OBDETSOSCHK OPUIFEMSH. UEZPDOS CHEDHFUS URPTSCH, UFP 650 MB LFP OEDPUFBFPYuOP, OP DMS VPMSHYYOUFCHB MADEK LFP FP, UFP OBDP. eZP UBNBS UYMSHOBS UFPTPOB, UFP RTBLFYUEULY MAVPK LPNRSHAFET ABOUT ENME PUOBEEO HUFTPKUFCHPN CD-ROM, RPFPPNH LPNRBLF-DYULY NPTsOP RTPUYFBFSH RPCHUENEUFOP. RYEFUS FPMSHLP PDOPTBBPCHP. yuFBFSH NPTsOP UFPMShLP, ULPMSHLP HZPDOP (TEBMSHOP UFPMShLP, ULPMSHLP ChShCH UNPTSEFE). pTSYDBENSCHK UTPL UMHTSVSHCH 20 MEF, CHPNPTSOP VPMSHYE, EUMY ITBOIFSH H VEIPRBUOPN NEUFE YOE UMYYLPN YUBUFP YUYFBFSH.

CD-RW

FE CE UPPVBTSEOIS, UFP Y DMS CD-R, OP NPTsOP ZhPTNBFYTPCHBFSH Y RETEBRYUSCHCHBFSH VPMEE YUEN 100 TB. h GEMPN, FFP DEYECHSHCHK Y ODETSOSCHK OPUIFEMSH. pTSYDBENSCHK UTPL UMHTSVSHCH 15 MEF, CHPNPTSOP VPMSHYE, EUMY ITBOIFSH H VEIPRBUOPN NEUFE YOE UMYYLPN YUBUFP YUYFBFSH.

DVD

FFP PDOP YY OPCHSHCHI CHESOYK CH NYTE OPUIFEMEK DMC ITBOOEIS. ENLPUFSH 4.7 GB DMS PDOPUFTPOOYI BRJUSCHCHBENSCHI DVD DYULCH. HUFTPKUFCHB OEULPMSHLP DPTPZPCHBFSCH, OP YFP VPMEE YMY NEOEE LPNREOUYTHEFUS FEN, UFP POY URPUPVOSHCH ITBOYFSH 4.7 GB ABOUT PDOPN DYUL. pTSYDBENSCHK UTPL UMHTSVSHCH 15 MEF, CHPNPTSOP VPMSHYE, EUMY ITBOIFSH H VEIPRBUOPN NEUFE YOE UMYYLPN YUBUFP YUYFBFSH.

nBZOYFOBS MEOFB (Tape)

YNEEF CHNEUFYNPUFSH PF 120 MB DPTPZPK Y OE PYUEOSH OBDETSOSCHK OPUIFEMSH (CH LPOGE LPOGCH, LFP CHUEZP MYYSH NBZOYFOSHCH MEOPSHCH). oEUNPFTS ABOUT CHUE FFP, CHNEUFYNPUFSH MEOP DEMBEF YI YDEBMSHOSHCHN ITBOYMYEEN TEJETCHOSHI LPRYK DMS UETCHETCH Y FPNKh RPDPVOPZP; EUMY CHBN OHTSOP UPITBOYFSH LPRYA CHUEZP CEUFLPZP DYULB ABOUT PDOPN OPUIFEME, MEOPB SCHMSEFUS, CHPNPTSOP, EDYOUFCHEOOOSCHN URPUPVPN UDEMBFSH FFP. оБЙВПМШЫЙК ОЕДПУФБФПЛ МЕОФ Ч ФПН, ЮФП ДПУФХР СЧМСЕФУС РПУМЕДПЧБФЕМШОЩН, Й ЬФП ХДБТСЕФ РП РТПЙЪЧПДЙФЕМШОПУФЙ, ПДОБЛП SCSI ХУФТПКУФЧБ НБЗОЙФОЩИ МЕОФ ДПУФБФПЮОП ВЩУФТЩ ДМС УЕЗПДОСЫОЙИ ОХЦД Й ЙНЕАФ НОПЗП ЗЙЗБВБКФ РПМЕЪОПЗП РТПУФТБОУФЧБ ДМС ИТБОЕОЙС ЧБЫЙИ ЖБКМПЧ. uFEOYE / BRJUSH. pTSYDBENSCHK UTPL UMHTSVSHCH RTYNETOP 30 MEF DMS MEOP OPCHSHCHI FEIOPMPZYK.

CEUFLIK DYUL

UEZPDOSYOYE GEOSHCH ABOUT CHOYUEUFETSCH HRBMY OBUFPMSHLP, YuFP HCE NPTsOP UETSHEP TBUUNBFTYCHBFSH YI LBL OPUIFEMSH DMS TEETCHOSHI LPRYK. PFOPUYFEMSHOP DEYECHSHCHE, YNEAF PZTPNOSCHE TBNETSHCH (ON NPNEOF OBRYUBOYS DBOOPZP THLPCHPDUFCHB DP 120 GB), PYUEOSH OBDETSOSCH Y ZPTBDP VSHCHUFTEE CHUEI OPUIFEMEK, RTEDUFBCHMEOOSHCHY UFPN UR. eUMMY H CHBU OPHFVHL, FPZDB CHTSDMY CHBN LFPF OPUIFEMSH RPNPTSEF, OP CH OBUFPMSHOSCHI UYUFENBI DPVBCHMEOYE BRBUOPZP DYULB UREGYBMSHOP DMS TEETCHOPZP LPRYTPCHBOYS, CHPNPPTsOPSHCH, OERM. zhBLFYUEULY, ChSh NPTSFE DBTS OE UVBCHYFSH CHFPTPK DYUL Y DEMBFSH TEETCHOSCHE LPRYY ABOUT FPF DYUL, LPFPTSCHK HTS YNEEFUS; PDOBLP, LFP OE PYUEOSH IPTPYBS YDES, FBL LBL CH SFPN UMHYUBE OILBL OE BEEYEEOSCH PF BCHBTYY TSEUFLPZP DYULB.

dTHZYE UYAENOSHCHE OPUIFEMY

UHEEUFCHHAF Y DTHZYE UYAENOSHCHE OPUIFEMY (Castlewood ORB, IOMEGA JAZ), LPFPTSHCHE YNEF OERMPIPE UPPFOPEOYE GEOB/CHPNPTSOPUFY RPDIPDSF DMS UPDBOYS TEETCHOSHI LPRYK. Oelpftche dbce Vschmy Rededufbchmeosh LBB “Kuuflei Dyulpch” (Obrtynet, JAZ), PDULP, SE RTEDSHEOSHEOSHEA DMS DMIFEMSHOPSHOPSHEPHECHETSHECHECHETSHECHECHECHETSHECHECHETSHETOKHTOKHITOKHTOKHITOKHA OE SCHMSAFUS TSEUFLYNY DYULBNY). fBL YMYY YOBYUE, CHCHPVPDOSHCH CH UCHPEN CHSHVPTE, ZMBCHOPE, RPDPKDYFE L CHPRTPUKH U DPUFBFPYuOPK TBUUHDYFEMSHOPUFSHHA Y... HDBYU CHBN!

xDBMEOOSHCH (remote) LBFBMPZY

ЛПОЕЮОП, ЬФП ОЕМШЪС ТБУУНБФТЙЧБФШ ОЕРПУТЕДУФЧЕООП Ч ЛБЮЕУФЧЕ “ОПУЙФЕМС”, ФЕН ОЕ НЕОЕЕ НЩ ОЕНОПЗП ТБУУЛБЦЕН ПВ ЬФПН ОЕРМПИПН УРПУПВЕ УПЪДБОЙС ТЕЪЕТЧОЩИ ЛПРЙК, ЛПФПТЩК РПМЕЪЕО, ЕУМЙ Х ЧБУ ЕУФШ ДПУФБФПЮОП РТПУФТБОУФЧБ Й РПМПУЩ РТПРХУЛБОЙС.

EUMY CHBY ISP RTEDPUFBCHMSEF CHBN OELPFTPTPE LPMYUEUFCHP NEUFB, CH NPCEFE YURPMSHЪPCHBFSH LFP NEUFP DMS TBNEEEOYS UCHPYI ZHBKMPCH TSDPN UP UCHPYNY web-UFTBOIGBNY. chshch NPTSEFE PVOBTHTSYFSH, UFP H UEFY UHEEUFCHHEF NOPTSEUFCHP RTEDMPTSEOIK UETCHYUPCH HDBMEOOPZP ITBOOEIS DBOOSHI. еУМЙ ​​Х ЧБУ ЙНЕЕФУС УЕФШ ЙЪ ОЕУЛПМШЛЙИ НБЫЙО, ЧЩ НПЦЕФЕ УПЪДБЧБФШ ТЕЪЕТЧОЩЕ ЛПРЙЙ ОБ “ХДБМЕООПК” НБЫЙОЕ Ч УЕФЙ (ЛПОЕЮОП ЦЕ, ЬФП ДПМЦОБ ВЩФШ ДТХЗБС НБЫЙОБ, Б ОЕ ФБ, ДМС ЛПФПТПК ЧЩ УПВЙТБЕФЕУШ УПЪДБФШ ТЕЪЕТЧОХА ЛПРЙА...)

For quick recovery lost data on a smartphone, you need to know what a backup is and how to create it on Android.

With it, you will quickly return everything deleted files, restore the settings of games and programs, as well as IMEI, identification numbers, passwords and all other information that is contained on the device.

Definition

Backup is an archived backup of your phone or computer files. A backup can be created on any operating system. Its purpose is to save all user data and set up the system at the time the archive was created.

After a factory reset or a forced system restore using a backup, you can quickly return all lost data and not waste time reinstalling programs and setting up the OS.

A copy of the data is created using special programs. Most popular utilities:

  • Titanium Backup;
  • super backup;
  • nandroid manager;
  • Helium and others;
  • SP FlashTools.

Types of backupsAndroid

On Android OS, users can create a backup copy of the entire system or its individual components:

  • Copy SMS -messages and contact list ;
  • Backup of the entire system, taking into account security settings (save all lock passwords);
  • Backup any selected files ;
  • Backup photos and videos ;
  • Copy of Google account information ;
  • Backup for IMEI .

Why is it important to create a backup periodically?

Backup allows you to get rid of the problems associated with the sudden loss of data on your smartphone. Periodic backup will save all settings operating system, as well as messages and media files.

If you encounter errors that require you to reset your phone, you can easily get back all the deleted information. OS Android backup can be created using the built-in options of the system or use special programs.

When should a backup be made?

1. Before updating the firmware . It doesn't matter if you download a new android version"over the air" or install updates manually, create a copy of the installed OS. We recommend moving all photos, videos and music to a memory card or uploading this data to cloud storage;

2. Before resetting. Over time, smartphone users may experience a decrease in the performance of their gadget. This is due to the load random access memory, viruses. The easiest way to restore devices is to reset the OS to factory settings. Before that, it is better to create a backup of the phone book and SMS, so as not to lose important data;

3. To reset the lock password. If you have set a password, graphic key or a pin code and forgot it, you can reset it without losing data using a backup. The only requirement is that an archive with a copy of the data must be created before the password is set.

Also, periodic backup of the phone book will allow you to quickly return the lost numbers in case of a SIM card error or after clearing the memory card.

What do you need to make a copy?

To create a backup in Android OS in a standard way, you will need:

  • Superuser rights – ROOT must be active on the smartphone at the time of copy generation;
  • Media for copy storage - it can be a built-in memory card, any cloud storage or the memory of your computer;
  • Backup program . Software that works with backups with active ROOT rights allows you to create a copy of all data in the operating system - from contacts to arbitrary files and settings of each program.

Another way to create a backup- this is the use of third-party programs that do not require superuser rights. They allow you to archive only basic OS data. Eg, phone book, messages linked to OS accounts. Creating and restoring a copy can be done using one program that must be installed on the smartphone.

Backup programs

After flashing your gadget, you get an absolutely “clean” software shell. You will not be able to return any programs, accounts and settings of their previous version of the OS if you did not take care of creating a backup copy in advance.

Many users prefer to install applications from scratch. However, it is much easier to use a backup and restore all application settings using a single archive. Restoring previous settings does not affect the operation of the OS in any way, does not provoke bugs and errors.

Topical backup programs will be for those applications that are not in the official play market .

Titanium Backup and Helium are the two most popular programs to work with backup copies of applications in the Android OS of any version. To start working with each of these utilities, you will need superuser rights.

To create a backup of one installed program or several types of software at once, use the instructions for one of the following utilities.

Titanium Backup

The utility has over 5 million official downloads in Play market. The application allows you not only to restore operating system data, but also works with the manufacturer's installed software tools, removes components and settings that a normal user cannot remove using the standard settings window.

Main features of Titanium Backup:

  • Setting up backup according to a specific schedule;
  • Move programs between internal and external memory without having to close the application;
  • Quick Scan for Presence new version firmware;
  • Firmware installation;
  • Storing the history of calls and text messages of a cellular operator;
  • Backup of browser bookmarks;
  • Backup access point of the router;
  • Data synchronization with cloud services DropBox, OneDrive, Google drive;
  • Assigning a system status to any program (the option is configured by the user);
  • Creating a backup archive that can be re-installed on a smartphone using the console;
  • Sync settings and app data across multiple gadgets.

Convenient transfer of settings from one gadget to another is the most useful feature Titanium backup. If it happens that your smartphone is broken, or you have lost it, thanks to the backup, you can easily restore all contacts and messages in popular messengers and transfer information to another device.

You do not need to transfer data old sim card. All you need is a second gadget, a backup archive and the Titanium Backup utility. All backups created in the program are automatically synchronized with one of your cloud storages:

  • Go to utility window Titanium Backup;
  • In the list of programs installed on the smartphone, select the desired messenger or other application to back up its settings. In our case, we will archive all numbers and messages from Whatsapp;
  • Click on the name of the program, holding it for a few seconds. In the pop-up window, click on the field "Save";
  • Next select cloud storage, to which the archive with software settings will be sent.

To move the program data to a second gadget or restore settings after a factory reset, reinstall Whatsapp messenger and Titanium Backup. Open the recovery tool and sync the utility with the cloud.

In the list of all programs installed on your smartphone, select the desired messenger, click on it and click on "Restore" in the options menu. Titanium Backup will automatically put on the necessary backup in the cloud and return all lost files to the programs. You will be able to use all contacts again and access lost chats.

In a similar way, one can transfer given any another program on the second gadget. Most often, the application backup function is useful for transferring messenger data, saving progress in games.

Helium

Helium is another simple and useful utility to quickly restore your device. The software works on all devices, regardless of the presence of superuser rights. The only requirement is cloud sync. The utility does not save a backup to a memory card or external drive.

Helium features:

1. Synchronization of applications on multiple devices;

2. System backup;

3. Convenient file explorer;

4. Removing programs and rolling back their updates.

To back up the data of an installed program, follow instructions:

  • Open the Helium app. The main window of the utility will display file explorer Carbon is a built-in service for viewing a list of all installed applications. Click on desired program and from the action menu select backup;
  • Wait for the copy to complete. The created archive will be sent to the cloud;

To restore information from a copy using Helium, open the utility on another device. In the settings, activate the item "Synchronization with the cloud." Next, in the main program window, go to the "Recovery and synchronization" tab.

Select the program whose data you want to restore and click on "Restore".

To create any other type of backup, go to the "Browse" tab and select one of the backup options.

Save IMEI

IMEI is the international numeric ID of your device. Using this set of numbers, you can find out the manufacturer of the gadget, its model and status. Phones and tablets without IMEI are considered stolen and are unofficially banned for use in the CIS.

As a result of resetting settings or software errors, the IMEI identifier may be lost. However, you can restore it using a backup.

Signs of a lost IMEI:

  • After flashing or resetting to factory settings, there are communication problems (cellular network, Bluetooth, Wi-Fi);
  • Complete lack of connection with GPS;
  • The phone does not see any SIM card.

You can restore the identifier only with superuser rights. To return IMEI you will need to install an emulator utility android consoles Terminal Emulator (if your phone can't see the network, download the installation APK to your computer and then transfer the file to your phone using a USB connection).

Follow instructions:

  • First we need to know the EFS code. To do this, enter the command mount and press Enter to execute it;
  • A text will appear in the console window in which you must find the EFS command, written through a slash. The text identifier before the command is the code we need. Code lookup example:
  • Write down the found code on a piece of paper and restart the application. After restarting the emulator, enter the command to IMEI recovery(each of the lines must be entered through Enter). XXXXX is the found EFS code;
  • To save the IMEI settings without leaving the program, enter the following lines:

After successful execution of all commands, exit the emulator window, restart your smartphone and check the operation cellular network, geolocation and internet connection. Everything should work fine. If desired, you can check for IMEI using the engineering menu.

Backup photo and video

As a result of a smartphone theft or a factory reset, the most frustrating thing is the loss of photos, videos, music and other personal data. All programs can be reinstalled, but here personal information it is almost impossible to return without premature preparation.

Even if you are sure that nothing will happen to your gadget, we recommend that you set up at least one of the methods described below for saving your multimedia data.

Using the Google+ App

Standard Application by Google is preinstalled on all Android devices. The purpose of Google+ is to unite and synchronize all Google services in one account. If you have Google Drive cloud storage installed on your device and google app+ - this does not mean that file synchronization is configured.

The point is that in mobile version Google Drive cannot be configured to sync a specific folder. Users can only activate the automatic sending of all photos taken on the gadget's camera through the smartphone settings.

Follow the instructions to sync any folder on your smartphone to One Drive and automatically send copies of files to the cloud:

1. Install the FolderSync app on your smartphone or update it to a new version if the utility is already on your smartphone. The utility allows you to select any folder in the smartphone's memory and set up its synchronization with the cloud (link to the Play Market page :);

2. Further, for devices with OS Android0 and above, it is not necessary to allow access to all folders and files on the smartphone. To do this, simply open the FolderSync program immediately after the first installation and in the pop-up window press the key "Allow";

3. To set up automatic backup of photos, videos and other files in the main FolderSync window, click the button "Create New Sync";

4. Then the built-in help window will open. In it, you must enter a name for the created pair "folder-cloud storage";

6. In the horse that appears, select the OneDrive cloud service or another site that with which you want to link;

8. To confirm the action and save the settings, click on "Authenticate Account";

All user data is added to the repository. Whatever happens to your phone, you can always get your photos back using any computer or browser.

At the stage of choosing a directory, you will be prompted configure one of the following connection options with cloud storage:

  • Connection with local folder (select if the backup data will be created and located only on your smartphone);
  • Synchronization with a remote folder(if you want to create a backup for a folder on your computer);
  • hybrid variant(to create a backup given smartphone and other remote gadgets).

In the connection settings, you can select the schedule according to which the synchronization will take place. We recommend sending data to the cloud every day. In the event of an error or breakdown of the phone, all important files will be backed up.

other methods

Apart from google storage Drive, you can also choose any of the following services:

  • drop box is the most popular cloud storage in the world. Its peculiarity lies in the fact that the program can automatically create a backup of the phone's photos and immediately delete them, freeing up memory. You can access the folder with all the images at any time from all devices. All you need is an internet connection;
  • MEGA - a cloud that provides free 50 GB of space on a virtual disk space. The user can set up synchronization with any device, download client programs for PC and smartphone, manage access to folders and files;
  • Mail . en cloud - after registration, you will have access to 100 GB for free. Manage simple file sync and view in any browser.

All these cloud storages have client applications in the store Google Play and the ability to synchronize phone data with the server through the usual settings of the program.

Create a backup of any files

In addition to the options described above for creating a backup of photos, music, videos, users can download such programs to their smartphone for work with backup copies of documents of any format:

  • datasync;
  • Dropsync.

DataSync

The application works by analogy with the FolderSync discussed above and allows you to create a backup of any information that is stored internally or external memory device (excluding installed programs and system settings).

Also, DataSync allows you to set up sending a backup from one device to another via a Bluetooth connection, which is convenient at times when you need to save important information and no internet connection.

Thanks to the two-way sync option, two gadgets will be able to exchange game data. Thus, all missions and progress will be saved on both devices at once.

DropSync

DropSync- This is another popular utility for sending backups. Its peculiarity lies in the additional monitoring of phone performance. If the smartphone has a low battery, the application will not sync data so as not to reduce the operating time of the device.

Users can choose the type of synchronization:

(after synchronization, the data remains in the smartphone’s memory); (automatic deletion information from the phone's memory to free up space. Users can access files using the cloud storage associated with the program);
  • Download only- getting a backup from the cloud and adding its contents to the smartphone's memory.
  • Backup for all data and settings

    NAND (or Nandroid Backup)- This is a concept that is used in the Android OS to refer to a complete backup of the firmware installed on the smartphone, including all system data and its settings. The backup also includes everything installed programs.

    The full backup function is supported by the recovery menu like TWRP or CWM. TWRP is an advanced recovery menu that is installed on the phone by the user, while CWM is an alternative recovery menu.

    Firmware with one of two types of recovery is installed in the system partition of the smartphone’s memory, after which you can create a backup of absolutely all data. After recovery, you will be able to use all the lost programs, contacts and files again.

    Also, a backup created in CWM or TWRP can be installed on any other Android device if it supports the created firmware version. Nandroid Backup Online

    nandroid manager

    To create a full backup copy of the software shell of the device, you need to download and install the Nandroid Manager program

    The utility allows you to create a quick standard (copying all data) or a custom backup of the system (the user chooses what needs to be saved) without entering the recovery menu. In the app settings, you can choose the following backup options:

    • Backup name– contains a unique name, date, code and name of the firmware;
    • Creation mode- normal (full), user choice sections of memory;
    • copy type- CWM or TWRP. Also, you can choose compression to save disk space;
    • The location where the backup will be stored. You can add it to your phone memory, download it to your PC or upload it to the cloud;
    • Exclusion from backup content temporary files, bugs, erroneous system settings, cache and found viruses.

    The Nandroid Manager utility synchronizes the created backup archive with the cloud, FTP server. Users have the option to create a schedule to update the backup. To save battery power, we advise you to set up uploading a new version of the backup only during the period when the gadget is charging.

    Notice! Unloading a full backup of the operating system viaNandroid managermay affect the performance of the gadget.

    Backup with ADB

    ADB is a debugging bridge for Android OS. In simple words, using ADB, you can create a system backup by connecting your smartphone to your computer. ADB is a console application in which the user enters system programs that run on the phone.

    ADB features:

    • View the contents and system settings of connected gadgets;
    • Client-server interaction between smartphone and PC;
    • View logs;
    • Removing or cleaning system partition DATA;
    • Fast copying of files of any format between devices;
    • Execution of the firmware;
    • Application of control scripts;
    • Removing superuser rights;
    • Manage network connection settings.

    To get started, download and install the ADB Run utility on your computer.

    Run the folder that appeared on the desktop of the computer as a result of the installation of ADB Run. Connect the phone to the PC and in the ADB Run program folder create Text Document devices.cmd (the file must be an object of a standard notepad or any other text editor. Immediately after creation, rename the TXT format to CMD).

    Open devices.cmd and write in the file the following commands:

    • echo off
    • adb devices
    • pause

    After the text about the successful completion of the operation appears, enter a new command to create a backup of the current state of the firmware:

    adb create backup [- l ] [- r ] < name > , where name is the name of the archive with the firmware copy.

    Backup copy will save in root folder ADB Run utilities on your computer. You can move it to any other folder or cloud.

    Super Backup app - create a copy without ROOT

    To back up your smartphone data, you can use third party programs, which, without superuser rights, are able to set up a backup of the selected information.

    Super Backup is one of those applications. His main feature- wide functionality.

    The user can create copies of the following types of information:

    1Applications;

    3 Call log;

    4Calendar;

    5Bookmarks;

    6 Phone book contacts.