Take Control of Backing up Your Mac

Total Page:16

File Type:pdf, Size:1020Kb

Take Control of Backing up Your Mac EBOOK EXTRAS: v2.0 Downloads, Updates, Feedback TAKE CONTROL OF BACKING UP YOUR MAC by JOE KISSELL $20 2ND EDITION Table of Contents Read Me First ................................................................. 5 Updates and More .......................................................... 5 Basics ......................................................................... 6 What’s New in the Second Edition ..................................... 8 Introduction ................................................................. 11 Mac Backups Quick Start ............................................... 13 Plan a Backup Strategy ................................................. 15 Understand Joe’s Basic Backup Strategy ........................... 15 Why Create Versioned Backups? ...................................... 17 Why Create Bootable Duplicates? .................................... 18 Why Use an External Hard Drive? .................................... 22 Why Use Multiple Partitions? ........................................... 24 Why Automate Backups? ............................................... 24 Why Keep Multiple Backups? .......................................... 26 Why Store Backups Offsite? ............................................ 27 Reassess Your Backup Strategy ..................................... 29 What’s New in the World of Mac Backups ........................... 29 Factors to Reevaluate .................................................... 36 Choose a Versioned Backup Program ............................. 40 Decide If Time Machine Is Right for You ............................ 40 Explore Backup Software Features ................................... 44 Choose Another Versioned Backup Program ....................... 54 Choose Backup Hardware .............................................. 58 Decide on Capacity ....................................................... 58 Choose an Interface (or Several) ..................................... 62 Consider Other Factors .................................................. 64 Decide Whether to Buy a Time Capsule ............................. 65 Decide How Many Drives to Buy ...................................... 67 Consider Other Hardware Options .................................... 68 2 Prepare Your Hard Drive ............................................... 78 Choose a Partition Map Scheme ...................................... 78 Decide How Many Partitions to Make ................................ 81 Configure Your Drive ..................................................... 82 Choose Local or Network Backups .................................... 85 Configure and Use Time Machine ................................... 88 Time Machine Basics ..................................................... 88 Choose a Destination (or More Than One) ......................... 89 Exclude Files from Time Machine ..................................... 91 Restore Data with Time Machine ...................................... 98 Delete Files from a Time Machine Backup ........................ 108 Encrypt Your Time Machine Backup ................................ 110 Use a Single Backup Disk with Multiple Macs .................... 111 Use Power Nap ........................................................... 113 Manage Your Time Machine Schedule .............................. 114 Migrate to a Larger Time Machine Disk ............................ 117 Avoid (or Solve) Time Machine Problems ......................... 121 Use Other Versioned Backup Software ......................... 126 ChronoSync Tips ........................................................ 126 CrashPlan Tips ........................................................... 128 Data Backup Tips ....................................................... 129 DollyDrive Tips ........................................................... 129 QRecall Tips .............................................................. 130 Retrospect Tips .......................................................... 131 Test Your Versioned Backup .......................................... 133 Create a Bootable Duplicate ......................................... 135 Set Ownership on the Destination Volume ........................ 136 Create a Duplicate with SuperDuper ............................... 136 Create a Duplicate with Carbon Copy Cloner ..................... 138 Test Your Duplicate ..................................................... 140 Store an Extra Backup Offsite ...................................... 143 Use an Extra Hard Drive ............................................... 143 Use an Internet Backup Service ..................................... 145 3 What to Do When Disaster Strikes ............................... 153 Restore Individual Files ................................................ 153 Use Your Bootable Duplicate ......................................... 154 Restore a Disk from a Bootable Duplicate ........................ 155 Manage Your Media ..................................................... 157 What to Do When Your Disks Fill Up ............................... 157 Think about Long-Term Archive Storage .......................... 159 Consider Special Backup Needs .................................... 161 Digital Photos ............................................................ 161 Dealing with Huge Volumes of Data ................................ 164 Back Up Data from the Cloud ........................................ 172 Backing Up a Small Network ......................................... 173 Backing Up While on the Road ....................................... 177 Windows Files and Volumes .......................................... 181 Teach This Book ......................................................... 190 About This Book ......................................................... 191 Ebook Extras ............................................................. 191 About the Author ........................................................ 192 About the Publisher ..................................................... 193 Copyright and Fine Print .............................................. 194 Featured Titles ........................................................... 195 ChronoSync Coupon .................................................... 196 CrashPlan Coupon ....................................................... 197 Data Backup Coupon ................................................... 198 DollyDrive Coupon ...................................................... 199 QRecall Coupon .......................................................... 200 Retrospect Desktop Coupon ......................................... 201 4 Read Me First Welcome to Take Control of Backing Up Your Mac, Second Edition, version 2.0, published in June 2013 by TidBITS Publishing Inc. This book was written by Joe Kissell and edited by Jeff Carlson. The data on every Mac should be backed up to protect you against theft, hardware failure, user error, and other catastrophes. This book helps you design a sensible backup strategy, choose and configure the best backup hardware and software for your needs, and understand how to make your backups as painless as possible. If you want to share this ebook with a friend, we ask that you do so as you would with a physical book: “lend” it for a quick look, but ask your friend to buy a copy for careful reading or reference. Also, you can Teach This Book. Copyright © 2013, alt concepts inc. All rights reserved. Updates and More You can access extras related to this book on the Web (use the link in Ebook Extras, near the end; it’s available only to purchasers). On the ebook’s Take Control Extras page, you can: • Download any available new version of the ebook for free, or buy any subsequent edition at a discount. • Download various formats, including PDF, EPUB, and Mobipocket. (Learn about reading this ebook on handheld devices on our device advice page.) • Read postings to the ebook’s blog. These may include new information and tips, as well as links to author interviews. At the top of the blog, you can also see any update plans for the ebook. 5 If you bought this ebook from the Take Control Web site, it has been added to your account, where you can download it in other formats and access any future updates. However, if you bought this ebook elsewhere, you can add it to your account manually; see Ebook Extras. Basics Here are a few basic concepts that will help you read this book: • Links: All blue text in this ebook is hot, meaning you can click (or tap) it, just like a link on the Web. When you follow a link to a different part of the ebook, you can return quickly to where you were by using your ebook reader’s “back” feature, if offered. For example, if you use iBooks in iOS to read the EPUB version of this ebook, you can tap the “Back to” link at the lower left of the screen. Or, if you use Preview on a Mac to read the PDF version, you can choose Go > Back or press Command-[. • Menus: Where I describe choosing a command from a menu in the menu bar, I use an abbreviated description. For example, the abbreviated description for the menu command that creates a new folder in the Finder is “File > New Folder.” • Contextual menus: Contextual menus appear when you Control- click various elements on a Macintosh screen, including Dock items and files in Finder windows. To describe opening a contextual menu, I usually I tell you to right-click (Control-click) an item on the screen. If your mouse offers a right-click option, or if you use
Recommended publications
  • Factories of the Future the Italian Flagship Initiative Factories of the Future Tullio Tolio • Giacomo Copani Walter Terkaj Editors
    Tullio Tolio · Giacomo Copani Walter Terkaj Editors Factories of the Future The Italian Flagship Initiative Factories of the Future Tullio Tolio • Giacomo Copani Walter Terkaj Editors Factories of the Future The Italian Flagship Initiative Editors Tullio Tolio Giacomo Copani Director of the Italian Flagship Project CNR-STIIMA, Istituto di Sistemi e “Factories of the Future”, Direttore del Tecnologie Industriali Intelligenti per il Progetto Bandiera “La Fabbrica del Futuro” Manifatturiero Avanzato CNR - National Research Council of Italy Milan, Italy Rome, Italy Walter Terkaj and CNR-STIIMA, Istituto di Sistemi e Tecnologie Industriali Intelligenti per il Dipartimento di Meccanica Manifatturiero Avanzato Politecnico di Milano Milan, Italy Milan, Italy ISBN 978-3-319-94357-2 ISBN 978-3-319-94358-9 (eBook) https://doi.org/10.1007/978-3-319-94358-9 Library of Congress Control Number: 2018960237 © The Editor(s) (if applicable) and The Author(s) 2019. This book is an open access publication. Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adap- tation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
    [Show full text]
  • Macquisition Quickstart Guide-V2020r1
    QUICK START GUIDE VERSION 2020 R1 INTRODUCTION MacQuisition 2020 R1 is officially supported on macOS 10.11 (El Capitan), 10.12 (Sierra), 10.13 (High Sierra), 10.14 (Mojave), and 10.15 (Catalina) systems, although 10.10 (Yosemite) and lower may potentially work. MacQuisition also boots into a forensically sound environment directly from the dongle. This QuickStart guide provides a brief explanation to get the examiner started. See the MacQuisition User Guide located on the 'Application' partition for more detailed information. Welcome to the MacQuisition Quick Start Guide MacQuisition™ is designed for triaging and imaging Mac computers. MacQuisition can be used to image Mac computers, including those with T2 chips, and also to collect data from live running Mac computers. This Quick Start guide will walk through live data collection with MacQuisition, booting a target system with MacQuisition for imaging, and running MacQuisition from an analysis Mac to acquire the target system via Target Disk Mode. Other factors that have to be considered when determining your approach, such as firmware passwords, FileVault2, T2 security chips, the file system used, and fusion drives will also be explored. The MacQuisition Device MacQuisition devices are setup up with multiple boot partitions, an application partition, a preferences partition, a license partition, and a data partition. The size of the data partition varies, depending on which MacQuisition device is purchased. Currently, there are two device sizes to choose, 1 TB or 120 GB. The devices connect via USB or USB-C cables shipped with the device. 300 Piercy Road • San Jose, CA 95138 • 408.844.8890 • https://www.blackbagtech.com Page 1 In Finder, the following partitions will appear when MacQuisition is connected: The Application partition contains the MacQuisition application, used to collect data from live systems and when running MacQuisition from an analysis Mac to acquire a target system.
    [Show full text]
  • Improvements in Secure Deletion Mechanism for Crucial Data on Android Gadgets
    INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY SCIENCES AND ENGINEERING, VOL. 9, NO. 3, MARCH 2018 Improvements in Secure Deletion Mechanism for Crucial Data on Android Gadgets M. Ali Tariq1 and M. J. Arshad2 1,2Department of Computer Science and Engineering, University of Engineering and Technology, Lahore, Pakistan [email protected] Abstract– In the current era, due to the advancement of for a man in any shape. However, when a gadget is stolen, technology and improved services, use of smartphones is lost or incidents whenever or on the off chance that becoming more popular day by day. The use of smartphones is anybody sales his/her gadget at that point there is a not only restricted to instant messages and calls but people also perform business transactions and social networking as well. But noteworthy security issue of information procurement by with the massive use of phones the safety and security of data is any outsider and which is extremely critical [1]. always a critical issue if the phone is stolen, lost or fell into the As indicated by these security issues there is a need of custody of an adversary. While mostly data communication is such a framework situation, to the point that must be given secured through encryption but due to the efficiency issues whole Android Operating System (OS) which offers information data can never be encrypted. Anyhow, normal deletion method covering up or encryption at deletion time and at storage also misleads the user into considering that all data had been removed but that’s not the situation. On the other hand, once time.
    [Show full text]
  • Security on the Mac Or How Paranoid Are You?
    Security on the Mac or How Paranoid are You? Bob van Lier Wednesday, August 11, 2010 BackUp, BackUp, BackUp … First and foremost defense when something goes wrong Macs are reliable and well-built, but internal HDDs are commodity products HDDs will FAIL! It is only a matter of when? The most complete and practical solution is to use an external HDD • Multiple DVDs or CDs can be used for select folder, but no longer practical for today’s HDDs Time Machine is included with OS10.5 and 10.6 Carbon Copy Cloner SuperDuper! Many others Wednesday, August 11, 2010 BackUp Strategy While Time Machine works well and is a painless option consider cases of fire or theft Multiple copies using different software/process • Offsite backup ✦ Keep a copy at a friend's house, safety deposit box, or hidden fire-proof box ✦ Online storage - Mozy ($55/year) - Dropbox ($600/year for 100Gb) - Carbonite ($55/year unlimited) - CrashPlan (Free or $55/year to use their servers) Wednesday, August 11, 2010 OSX Security Settings Use of “standard account” rather than admin account for routine usage Deselect automatic login Keep software up to date so latest security patches are applied Set Screensaver password Parental Controls in OS X Use Private Browsing when exploring suspect web sites FileVault • Essentially creates an encrypted sparse image bundle of your user folder Wednesday, August 11, 2010 Hazards of Web Browsing 1. IP address which leads to your ISP's location can be cross correlated with other browsing history. IP address and logged in user account are all tied together 1.1.
    [Show full text]
  • Free Disk Space in Mac Os X
    Free disk space in mac os x To really free up disk space on your Mac's hard drive, you're going to need to Mac OS X tries to automatically remove temporary files, but a. Ever wonder how much free space is available on your Mac's hard disk or partitions? It's easy to check in OS X. Plus, if your Mac is running Mac. Optimized Storage in macOS Sierra and later can save space by storing your content You'll see an overview of your free space and the space used by different Move your pointer over the file name, then click the x button. Mac running out of disk space? Maybe you don't have room for installing a new app, backing up a device, copying some files, or much of. on your Mac? These 10 tips can help you free up space you didn't know you were even using! . Service files and app remnants can eat up terrible amounts of disk space. This is bad if . How To Completely Uninstall Software under Mac OS X [MacRx] iPhone X won't reveal your lock screen notifications to anyone else. Disk Inventory X, disk usage utility for Mac OS X. If you've ever wondered where all your disk space has gone, Disk Inventory X will help you to answer this. DaisyDisk is a disk analyzer tool for OS X that visualizes hard disk usage and allows to free up hard disk space. After the break we'll look at the most efficient ways to free up space on your Mac.
    [Show full text]
  • Mac User's Guide
    Retrospect® 15.0 Mac User's Guide COPYRIGHT © 2018 RETROSPECT, INC. Protecting data since 1984. Copyright © 2018 Retrospect, Inc. All rights reserved. Retrospect 15.0 Users Guide, first edition. Use of this product (the “Software”) is subject to acceptance of the license agreement presented in the installer. You may not install, copy or otherwise use the Software except as expressly provided in that license agreement. Retrospect is a registered trademark of Retrospect, Inc. in the United States and/or other jurisdictions. All other trademarks are the properties of their respective owners. ii MAC USER'S GUIDE Contents What's New...................................................................................................................................6 ▪ Email Protection.......................................................................................................................6 ▪ BackupBot...............................................................................................................................6 ▪ Remote Backup .......................................................................................................................7 ▪ Data Hooks ..............................................................................................................................7 ▪ Web Console ...........................................................................................................................7 ▪ Management Console Replication...........................................................................................8
    [Show full text]
  • Mergers & Acquisitions
    Mergers & Acquisitions........................1 Letter to the Editor.................................2 Radioshift-TiVos Internet Radio ..........4 Download of the Month .......................5 AT&T DSL Email Changes ....................6 Peter’s Hometown Computing Corner 8 Special User Group Offers....................9 Meetings and Club News ...................11 NEWSLETTER OF CONNECTICUT MACINTOSH CONNECTION, INC.JANUARY 2008 Mergers & Acquisitions companies – fully embraced the digital music evolution. By Chris Hart, CMC President Netscape wasn’t helped one bit by I’ve always known that I would the diversion of AOL’s attention and never make it in the business of high they did very little during this finance. The reason? This world of “browser war” to maintain their top big money requires that you be ruth- dog position. As the use of their pri- less and focus solely on what it mary product declined, the takes to fatten that bottom line and company’s fortunes waned. This line your pockets. That’s not me. In resulted in AOL dropping the hatch- fact, I believe such approaches to et in 2003; drastically downsizing business are ultimately self-destruc- Netscape and laying off a majority tive and a hindrance to a healthy of the employees. consumer marketplace. Lack of innovation always spells What’s prompted me to discuss this death for companies whose founda- subject? Well, in the month of tion is built upon the Internet. And December, there were two signifi- the pressure on Netscape was even cant announcements from tech greater, because they were a found- companies who have been around ing father of the modern World for years. Netscape declared that Wide Web.
    [Show full text]
  • Real World Mac Maintenance and Backups by Joe Kissell. Copyright © 2007
    Prepared for Apple Consultants Network Partners. Real World Mac Maintenance and Backups by Joe Kissell. Copyright © 2007. Used with permission of Pearson Education, Inc. and Peachpit Press. Real World Mac Maintenance and Backups Joe Kissell Peachpit Press Take Control Books Prepared for Apple Consultants Network Partners. Real World Mac Maintenance and Backups by Joe Kissell. Copyright © 2007. Used with permission of Pearson Education, Inc. and Peachpit Press. Real World Mac Maintenance and Backups Joe Kissell Peachpit Press 1249 Eighth Street Berkeley, CA 94710 510/524-2178, 800/283-9444, 510/524-2221 (fax) Find us on the Web at: www.peachpit.com To report errors, please send a note to [email protected] Peachpit Press is a division of Pearson Education Real World Mac Maintenance and Backups is published in association with Take Control Books and was origi- nally published by Take Control Books as Take Control of Maintaining Your Mac (ISBN 1-933671-10-6) and Take Control of Mac OS X Backups (ISBN 0-9759503-0-4), both by Joe Kissell and copyright © 2006 by Joe Kissell. Learn more about Take Control at www.takecontrolbooks.com. Copyright © 2007 by TidBITS Electronic Publishing and Joe Kissell Editors: Jeff Carlson and Caroline Rose Project Managers: Tonya Engst and Adam Engst Production Editor: Susan Rimerman Tech Editor: Take Control authors and the TidBITS Irregulars Proofreader: Clark Humphrey Compositor: Jeff Tolbert Indexer: Rebecca Plunkett Cover design: Aren Howell Cover illustration: Alicia Buelow Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher.
    [Show full text]
  • Sparse Image - Wikipedia, the Free Encyclopedia Log in / Create Account Article Discussion Edit This Page History Sparse Image from Wikipedia, the Free Encyclopedia
    Sparse image - Wikipedia, the free encyclopedia Log in / create account article discussion edit this page history Sparse image From Wikipedia, the free encyclopedia A Sparse image is a type of disk image file that can be created under Mac OS X using Disk Utility. Encrypted sparse image files are used to secure a user's home directory by Mac OS X's FileVault feature. navigation Unlike a full image file (.dmg), which takes up as much actual space as the real disk it represents Main page Contents (regardless of the amount of unused space), a sparse image file (.sparseimage) takes up only as much Featured content actual disk space as the data contained within. Current events This can be advantageous when backing up data. For example, assume a user would like to make a Random article backup of a hard disk volume named "INFO" that is 5GB in size, yet only contains 2.5GB of actual search data. While a single layer DVD-R (with around 4.7GB capacity) would be too small to store a full-sized "INFO.dmg" image file, an "INFO.sparseimage" image file will fit. This is because the unused 2.5GB from the original volume is not actually allocated within the sparse image file. The "INFO.sparseimage" file will occupy only 2.5GB. interaction Note that if the 2.5GB "INFO.sparseimage" backup on the DVD is subsequently opened and mounted About Wikipedia as a "clone" of the source volume, the Finder will report the clone as having the original 5GB capacity, Community portal with 2.5GB available, but the virtual disk will be "read-only", because the source image file resides on Recent changes read-only media.
    [Show full text]
  • Xsan Security
    559 Appendix A Xsan Security Xsan is Apple’s implementation of a Clustered File System. This means that the file system can be accessed by multiple machines concurrently. Fibre Channel is an extension of the SCSI protocol and can be accessed through fiber optic cabling. Using Xsan, multiple Macs can simultaneously access shared storage provided over a Fibre Channel network. This allows multiple users to access data striped across a large number of physical drives (let’s just say six Promise VTrak RAIDs’ worth) as though they are one volume. Each client can access data at speeds of up to 4Gbps. Xsan is commonly used high-definition video and multiuser high-bandwidth creative environments, and it is also found in web and file-sharing farms. Xsan is based on the StorNext File System, made by Quantum. Apple and Quantum both claim interoperability between StorNext and Xsan, which means that by combining the two, it’s possibly for Macs, Windows, and many Unix variants (including Solaris, AIX, Linux and IRIX) can share communicate and share storage in a fast Fibre Channel environment. When looking to secure Xsan, you may find that there are specific features of StorNext that you want to use. Because Xsan is based on StorNext, many of the features of StorNext are built into the Xsan but might not be available through Xsan Admin. To begin unlocking some of the hidden features of Xsan, you will need to dip into the command line. Xsan stores most of its data in /Library/Filesystems/Xsan. Configuration files are stored in the Config directory, and binaries are in the bin directory.
    [Show full text]
  • January's Meeting December's Meeting
    JANUARY 2008 www.limac.org NEWSLETTER OF THE LONG ISLAND MACINTOSH USERS GROUP LIMac was estab­­- lished in 1984, when December’s Meeting January’s Meeting the Mac was intro- MacSpeech, makers of iListen speech recog- Have you upgraded to duced. Annual dues LIMac Inc. for member ship nition software, was scheduled to give the Leopard yet? Have you had P.O. Box 2048 are $36. (The first presentation for December. Unfortunately, JANUARY a chance to delve into all Seaford, NY meeting is free.) they could not make it due to weather. Apple’s purported 300 new 11783-0180 For information, In spite of that, the meeting was great features in Leopard? Do President contact any of the fun. Bradley did an extended Q&A in which you even know if Leopard Bill Medlow following: he answered many questions aboutLeopard . 11 will run on your current [email protected] Membership There were also quite a few questions about hardware? No matter how Vice President Donald Hennessy the new iMacs. In addition people asked you answered any of those George Canellis (516) 541-3186 about other new software such as Adobe questions you’re going to get your chance to [email protected] [email protected] Creative Suite 3, and, the various flavors of see Mac OS X 10.5 put through its paces at this Treasurer Technical Advice virtualization software, such as Parallels month’s meeting. Tom Abruzzo and Rick Donald Hennessy Bradley Dichter Desktop, and VMware’s Fusion for the Mac. Johnson from the Walt Whitman Apple Store [email protected] (631) 348-4772 After the Q&A, we had the raffle and our will be here to show you what Leopard can do Secretary [email protected] annual holiday party.
    [Show full text]
  • 2020-06-02-RECON IMAGER Manual
    M A N U A L 1.Introduction 4 2. Version Comparisons 4 3. Supported Hardware 6 3.1 MODE A - SUPPORTED HARDWARE (Version 4.0.0) 6 3.2 MODE B - BOOT SUPPORTED HARDWARE (Version 5.0.0) 6 3.3 MODE C - SUPPORTED HARDWARE (Version 5.0.2 A1) 7 4. Before You Start 7 4.1 How Will You Process The Image? 7 4.2 What To Image? 8 4.3 What Image Format Should I Use? 8 5. Key Concepts To Understand 9 5.1 Apple File System (APFS) 9 5.2 Apple Extended Attributes 9 5.3 Fusion Drives 10 5.4 Core Storage 10 5.5 FileVault 11 5.6 T2 Security Chipset 11 5.7 Local Time Machine Snapshots (APFS) 12 5.8 Apple Boot Camp 12 6. Booting RECON IMAGER 13 6.1 Instant On - Portable Macs 13 6.2 Firmware Password 13 6.3 Connecting RECON IMAGER 14 6.4 Connecting Your Destination Drive 15 6.5 Starting RECON IMAGER 15 7. Using RECON Imager 17 7.1 Disk Manager 18 7.1.1 Refresh To Detect Changes 19 RECON IMAGER Copyright © 2010-2020 SUMURI LLC 1 of 58 7.1.2 Formatting a Collection Drive 20 7.1.3 Decrypting A FileVault Volume 22 7.1.4 System Date and Time 24 7.2 Disk Imager 24 7.2.1 Source 25 7.2.2 Image Type 25 7.2.3 Compression Options 27 7.2.4 Processing Local Time Machine Snapshots (APFS) 27 7.2.5 Destination 28 7.2.6 Image Name 28 7.2.7 Segment Size 29 7.2.8 Evidence Descriptor Fields 29 7.2.9 Hashing and Verification 30 8.
    [Show full text]