{"id":28,"date":"2008-06-18T19:35:35","date_gmt":"2008-06-18T19:35:35","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=28"},"modified":"2019-11-13T09:48:47","modified_gmt":"2019-11-13T09:48:47","slug":"exchange-server-corruption-and-recovery","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery","title":{"rendered":"Exchange Server corruption and recovery"},"content":{"rendered":"<p>Yesterday, an unfortunate thing happened. After a reboot of our server (that was combined with the installation of some Windows updates), our Exchange Information Store became corrupt.<\/p>\n<p>(Note: In our company, we use Exchange for internal company emails. All emails that go to our backupassist.com email addresses are hosted externally, so thankfully this Exchange corruption didn&#8217;t affect our helpdesk and tech support team.)<\/p>\n<p>To compound matters, our staff member who is also our system administrator has been sick for nearly 3 months, so it was left to me (a developer!) to get our Exchange Server going again.<\/p>\n<p>It took a few attempts, but thankfully having a good backup (made by <a href=\"http:\/\/www.BackupAssist.com\">BackupAssist<\/a>!) saved the day.<\/p>\n<p>The symptoms were these:<\/p>\n<p>Every minute, this event is logged:<\/p>\n<p>&#8211; Event ID 9175, Source MSExchangeSA, Category MAPI Session, Message: The MAPI call &#8216;OpenMsgStore&#8217; failed with the following error:<br \/>\nThe Microsoft Exchange Server computer is not available.  Either there are network problems or the Microsoft Exchange Server computer is down for maintenance.<\/p>\n<p>When the Exchange Information Store service is started, this is logged:<\/p>\n<p>&#8211; Event ID 9518, Source MSExchangeIS, Gategory General, Message: Error Read verification error starting Storage Group \/DC=local\/DC=CortexIT\/CN=Configuration\/CN=Services\/CN=Microsoft Exchange\/CN=CORTEXIT\/CN=Administrative Groups\/CN=first administrative group\/CN=Servers\/CN=GERSHWIN\/CN=InformationStore\/CN=First Storage Group on the Microsoft Exchange Information Store.<br \/>\nStorage Group &#8211; Initialization of Jet failed.<br \/>\n&#8211; Event ID 419, Source ESE, Category: Logging\/Recovery, Message: Information Store (1220) First Storage Group: Unable to read page 457774 of database G:\\ExchSvr\\MDBDATA\\priv1.edb. Error -1018.<br \/>\n&#8211; Event ID 454, Source ESE, Category: Logging\/Recovery, Message: Information Store (1220) First Storage Group: Database recovery\/restore failed with unexpected error -1018.<\/p>\n<p>[And several more such logs]<\/p>\n<p>And from within Exchange System Manager, the stores simply wouldn&#8217;t mount. There was no real error message.<\/p>\n<p>The first thing I did was to make a copy of the MDBDATA directory. When doing any work to the Exchange database files, ALWAYS MAKE A COPY BEFORE YOU START!<\/p>\n<p>Then I found some instructions on using eseutil to repair the databases &#8211; and I ran through them and ESEUTIL claimed it had fixed the problem. The instructions are found here: <a href=\"http:\/\/www.mike-tech.com\/article.php?gif=exchange2k3&amp;article=304\">http:\/\/www.mike-tech.com\/article.php?gif=exchange2k3&amp;article=304<\/a><\/p>\n<p>However, the mount of the database still wouldn&#8217;t work, with more of the same errors.<\/p>\n<p>After more Googling and trying other things, I found this article: <a href=\"http:\/\/support.microsoft.com\/kb\/264228\/en-us\">http:\/\/support.microsoft.com\/kb\/264228\/en-us<\/a><\/p>\n<p>Okay, so it points to missing database files, where the solution is to put them back where they belong. mmmmmm&#8230; Or the other solution is to run eseutil \/r. Which I did &#8211; and it didn&#8217;t work either.<\/p>\n<p>A similar article is also found here: <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb498209(EXCHG.80).aspx\">http:\/\/technet.microsoft.com\/en-us\/library\/bb498209(EXCHG.80).aspx<\/a><\/p>\n<p>Then I took another copy of the MDBDATA directory, and decided to do a full restore from the last full backup &#8211; which was done the night before. So in the worst case scenario, we&#8217;d lose one day of emails &#8211; which for us, is fine. I could then look at the log files later.<\/p>\n<p>So after doing a full restore, and following the brilliant instructions in our white paper which I&#8217;d written a few years prior (available here <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb498209(EXCHG.80).aspx\">http:\/\/www.backupassist.com\/downloads\/whitepapers\/ExchangeMailboxBackup_WP.pdf<\/a>), I was all set! Or so I thought&#8230;<\/p>\n<p>The blasted Information Store still wouldn&#8217;t mount!<\/p>\n<p>Argh &#8211; how could this be??? A full backup wouldn&#8217;t mount?<\/p>\n<p>After some thought, I deduced that the problem was that when the Information Store service starts, it automatically tries to use the log files to bring the database &#8220;up to date&#8221;. And it&#8217;s most likely that the log files were corrupt.<\/p>\n<p>So I deleted the two *.log files [E00.log and E00xxxxxx.log] and did another full restore.<\/p>\n<p>And hey presto! The mailbox store mounted successfully!<\/p>\n<p>Now, did we lose any emails, given that we restored from the previous night\u2019s backup? Well, in actual fact, no. We use Outlook in Cached Exchange mode so all the emails sent and received during the day were cached. And to my surprise, when we connected Outlook back to the Exchange Server and it synchronised, it did NOT delete the emails that were only in the OST file but not on Exchange. Having said that, those emails weren\u2019t pushed back to the Exchange Server either. For us, this situation was acceptable.<\/p>\n<p>So the total time taken to do this was about 1 hr 30 mins. Of that time, about 1 hr 15 mins was spent pursuing the eseutil database repair options&#8230; another 10 minutes figuring out that I had to delete the *.log files, and 5 minutes actually doing the restore.<\/p>\n<p>The magic is knowing what to do&#8230; so I hope this information will be of benefit to other poor souls who suffer the same fate!<\/p>\n<p>And remember \u2013 always backup! Thanks <a href=\"http:\/\/www.BackupAssist.com\">BackupAssist<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday, an unfortunate thing happened. After a reboot of our server (that was combined with the installation of some Windows updates), our Exchange Information Store became corrupt. (Note: In our company, we use Exchange for internal company emails. All emails that go to our backupassist.com email addresses are hosted externally, so thankfully this Exchange corruption &#8230; <a title=\"Exchange Server corruption and recovery\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\">Read more <span class=\"screen-reader-text\">Exchange Server corruption and recovery<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":13831,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,760],"tags":[],"class_list":["post-28","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-support","category-legacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Exchange Server corruption and recovery - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exchange Server corruption and recovery - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Yesterday, an unfortunate thing happened. After a reboot of our server (that was combined with the installation of some Windows updates), our Exchange Information Store became corrupt. (Note: In our company, we use Exchange for internal company emails. All emails that go to our backupassist.com email addresses are hosted externally, so thankfully this Exchange corruption ... Read more Exchange Server corruption and recovery\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-06-18T19:35:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-13T09:48:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"842\" \/>\n\t<meta property=\"og:image:height\" content=\"596\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"Exchange Server corruption and recovery\",\"datePublished\":\"2008-06-18T19:35:35+00:00\",\"dateModified\":\"2019-11-13T09:48:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\"},\"wordCount\":817,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"articleSection\":[\"Support\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\",\"url\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\",\"name\":\"Exchange Server corruption and recovery - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"datePublished\":\"2008-06-18T19:35:35+00:00\",\"dateModified\":\"2019-11-13T09:48:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png\",\"width\":842,\"height\":596},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exchange Server corruption and recovery\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exchange Server corruption and recovery - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery","og_locale":"en_US","og_type":"article","og_title":"Exchange Server corruption and recovery - Cyber Resilience Blog","og_description":"Yesterday, an unfortunate thing happened. After a reboot of our server (that was combined with the installation of some Windows updates), our Exchange Information Store became corrupt. (Note: In our company, we use Exchange for internal company emails. All emails that go to our backupassist.com email addresses are hosted externally, so thankfully this Exchange corruption ... Read more Exchange Server corruption and recovery","og_url":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery","og_site_name":"Cyber Resilience Blog","article_published_time":"2008-06-18T19:35:35+00:00","article_modified_time":"2019-11-13T09:48:47+00:00","og_image":[{"width":842,"height":596,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","type":"image\/png"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"Exchange Server corruption and recovery","datePublished":"2008-06-18T19:35:35+00:00","dateModified":"2019-11-13T09:48:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery"},"wordCount":817,"commentCount":3,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","articleSection":["Support","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery","url":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery","name":"Exchange Server corruption and recovery - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","datePublished":"2008-06-18T19:35:35+00:00","dateModified":"2019-11-13T09:48:47+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2008\/05\/tile-placeholder1-01.png","width":842,"height":596},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/exchange-server-corruption-and-recovery#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Exchange Server corruption and recovery"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":2,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/28\/revisions"}],"predecessor-version":[{"id":14185,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/28\/revisions\/14185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/13831"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=28"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=28"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}