BackupAssist 10.1 is now available! With it, we introduce a powerful new feature designed to protect your backups from ransomware called CryptoSafeGuard.
What’s in the Windows 10 Fall Creators Update? Try new and updated security features, MR headset support, and a beloved Win 8.1 feature being brought back.
If you’re performing full image backups to NAS or RDX, you’ll want to seriously consider making a data container; especially for point in time restores.
Using numbers and symbols in your passwords to keep them secure? You’re doing it wrong. Chances are, all you’re doing is making it harder for you to remember – and super easy for a computer to guess. Here’s some password protection myths blown right open, and what you should actually do to make them secure.
Researchers have successfully proven that viruses can be weaponized to infect computers and take them over. And if that’s not the premise of a dystopian sci-fi novel, I don’t know what is. The University of Washington recently baked malware into a genetic molecule and then infected a system analyzing it. If it sounds like DNA data
When you first open BackupAssist’s backup tab, you may be surprised by the number of different backup jobs you can perform. But which one do you choose? This article answers that very question. In it, we go through what each backup job does, and when you should use it. It’s a great refresher for software
IPM have broken a world record in data storage; and they’ve done it on tape. IBM fitted a whopping 330TB of uncompressed data on a palm-sized tape, smashing the record for magnetic tape storage density. It’s not quite DNA or Atomic storage, of course, but it’s pretty amazing given the storage media. That’s 201 gigabits
Even the best set-up server requires occasional maintenance. Here’s a ten point checklist on how to go about performing your own server upkeep and monitoring. Ticking these off can greatly minimize instances of server failure. 1. Check Your Room Arrangement The arrangement of your server room is vitally important. If you’ve inherited the job and had no say
Found any kind of Windows flaw? Then you could be able to claim a big bounty from Microsoft, who announced all Windows flaws were now fair game. While the company has been running bug bounty programs since 2013, it has expanded it year after year to include bugs in Hyper-V, Microsoft Edge, and exploit mitigation
A single source of information, where you can find everything you need with just a click. BackupAssist 10’s Advanced Dynamic Help makes using our software easier than ever before. In this article, we discuss exactly how this new feature benefits you.
Before December 22, upgrade to get 22 new product features!
Any technology sufficiently advanced is indistinguishable from magic. And humanity has spent a great deal of time terrified of both. Even in 2017, many people are still suspicious of common household items, whose inner workings are mysterious and unexplained. This is a portentous list of thirteen technological terrors humanity has been afraid of. Read on, and