Author: Vijay Ron

How to take a screenshot on your Mac: Multiple ways to capture your screen

Usually, we take screenshots of our computer screen of some important pic, slide, info etc. You may have multiple options to take a screenshot from your Apple computer depending upon the model, so let’s find how to take a screenshot on your MacBook.

Since we take screenshots frequently its great to know the best way to take the screenshot so that you can capture every important thing that is on your screen like any online payment info, email, transaction snapshots etc.

Most of Mac computers you have at least three ways to take a screenshot with keyboard shortcuts and if you have a MacBook with a touch bar then you get the fourth method as well. Here we’ll see the multiple ways of taking the screenshots with keyboard shortcuts on your Mac. We’ll show you what you can do with those screenshots as well once you have taken some. Apple computers provide you with several better ways to save, edit, modify, delete and open the screenshot for markups.

Lets check the ways to take screenshots:

Command-Shift-3

This keyboard shortcut captures a screenshot of your entire screen.

Shift-Command-4 

Use this keyboard combo to turn your cursor into a crosshair, which you can drag to select a portion of your screen to capture. Release the mouse button or trackpad to take the shot.

You have a number of other options after hitting Shift-Command-4:

Press and release the space bar: The crosshair turns into a little camera icon, which you can move over any open window. Click on your desired window to take a screenshot of it. A screenshot captured by this method features a white border around the window with a bit of a drop shadow.

Press and hold the space bar (after dragging to highlight an area but before releasing the mouse button or trackpad): This locks in the shape and size of the selection area but lets you reposition it on the screen. It’s very handy if your initial selection area is off by a few pixels; just hold down the space bar to reposition it before releasing the mouse button to snap a screenshot.

Hold down the Shift key (after dragging to highlight an area but before releasing the mouse button or trackpad): This locks in each side of the selection area made with the crosshairs save the bottom edge, letting you move your mouse up or down to position the bottom edge. 

Without releasing the mouse button, release the Shift key and hit it again to reposition the right edge of your selection area. You can toggle between moving the bottom edge and right edge by keeping the mouse button or touchpad engaged and pressing the Shift key.

Shift-Command-5

A shortcut command introduced in MacOS Mojave (2018), this combination calls up a small panel at the bottom of your display with your screen capture options. There are three screenshot buttons that let you capture the entire screen, a window or a selection of your screen. 

Similarly, the two video-recording buttons will allow you to record the entire screen or a part of it. On the left is an X button to close the screenshot panel, but you can also just hit the Escape key to exit out.

On the right side, there is an Options button. It provides you with the option to choose where to save your screenshot. Desktop, Documents, Clipboard, Mail, Messages, Preview or Other Location and set a 5- or 10-second delay so that you can arrange up your items that might otherwise disappear when you engage your screenshot tool.

Normally the Show Floating Thumbnail option is enabled, which puts a little preview thumbnail of your just-capture screenshot in the lower-right corner of your screen, similar to the screenshot procedure with iOS. Unlike your iPhone ($899 at Amazon), you can turn off this preview thumbnail on your Mac. Lastly, you can choose to show your mouse pointer in a screenshot or video.

If the screenshot panel is in your way, you can grab its left edge and drag it to a new spot on your screen.

Bonus for Touch Bar MacBooks: Command-Shift-6

If you are lucky and got the 16-inch MacBook Pro or another model with the Touch Bar, did you know you can take a screenshot of what’s currently showing on the Touch Bar? Just hit Command-Shift-6 to take a very wide and skinny screenshot of your Touch Bar.

Easy annotation

If you embrace the Floating Thumbnail, then you’ll gain quick access to Markup tools to annotate your screenshot. You can swipe the Floating Thumbnail away or just let it slip away on its own and it can be saved to the spot you last saved a screenshot. Click the Floating Thumbnail and it’ll open in a Markup View preview window (but not Preview) with all of the markup tools you get in Preview.

You can right-click the Floating Thumbnail to:

  • Save the screenshot to your desktop, Documents folder or clipboard
  • Open it in Mail, Messages, Preview or Photos
  • Show in Finder
  • Delete
  • Open in in the Markup preview window described above
  • Close (and save)

In the long run Mac screenshotters may be slow to adopt the new Command-Shift-5 shortcut, however, people seem to be using it more for the ability to annotate screenshots without needing to open Preview and quickly delete screenshots that immediately we mess up. The 5- and 10-second delay options are useful and appreciated additions as well.

How to Scan, Copy and Print Documents from Mobile Phone?

How to Transfer files from Mobile Phone to laptop wirelessly?

How to find if your phone has been hacked?

Grab One of Apple’s Sleek iMac Laptops and Desktops for Less at Amazon’s Refurb (Renewed) Sale

Save hundreds on one of Apple’s stunning desktops with refurb models from 2014 to 2020.

Apple confirms new Mac Pro is on the way in rare tease at March 8 event |  iMore

As people are adopting a new work environment and started working remotely, there has been a huge jump in tech product sales where desktop computers may be making a comeback. True, they may not as convenient as laptop computers however, they offer plenty of their own benefits, which include larger screens and impressive hardware that’s not constrained by size and weight.

The iMac is one of the most popular and widely used desktops in the market in 2022, and while deals on the latest 2022 model are slim, right now, Amazon has come up with a great opportunity to save hundreds of dollars on older models of desktops, laptops and other electronic devices required for personal and office use.

Amazon is offering a huge selection of refurbished computers including iMacs and some models from as recently as 2021. All of the computers that you’ll find at this sale are “Grade A” refurbs. According to Amazon, that means each one has been thoroughly and has been restored to full working condition. They also offer 3 months to 6 months of warranty on most of the refurbished products.

The iMac is a stunning desktop that comes up with the computer and monitor into a single sleek device. The 2020 model is only one year behind the latest generation, and is being offered packed full of some pretty impressive hardware. The 27-inch model with 256GB of storage is on sale for $728 and features a brilliant 5K IPS Retina display, a 6-core intel i5 processor, 16GB of DDR4 memory and a AMD Radeon R9 M380 graphics processor. Besides that you get 1TB (7200-rpm) Hard Drive, FaceTime HD camera, 802.11ac Wi-Fi wireless networking, Bluetooth 4.0 wireless technology, Mac OS.

If you don’t need the latest model available, you also have the options to choose from the older generations on sale as well. Starting at just $559, this 2019 model is equipped with a smaller 21.5-inch display, though it still boasts a stunning 4K resolution. It has similar hardware to the 2020 model above with a 256GB SSD, 8GB of DDR4 memory, a 6-core Intel i5 processor and a 4GB AMD Radeon Pro 560X graphics card.

There are even a wide range of affordable models available, as well. This 21.5-inch model from 2017 has a dual-core processor, a full HD LED-backlit display and is on sale for just $324.99. There are even models available for as low as $230, though they stretch all the way back to 2014. 

5 Best Free Professional Video Editing Software with great Features

How to Send Confidential and Secure Email using Gmail


10 ways to use your mobile phone safely | technoworldnow

In today’s digital world we are so addicted to use our electronic devices and gadgets that we use them for almost everything to ease our lives. While we transact and communicate online across the world, today the data privacy has become a major concern. Lets check below.

10 ways to use your mobile phone safely | technoworldnow

Are you addicted to connecting with friends online and playing games on social media that analyze your personality? Do you love to browse through e-commerce websites and are surprised to see related ads popping up on your social media news feed and phone browser?

Ever wondered why these ads make it to your social media feed so soon? Here’s the thing, in the digital world, you are being watched all the time. Whether you like it or not, your online activities are being tracked. But, are there ways to safeguard your privacy? As the world observes Data Privacy Day on January 28, we talk to experts and find ways to limit your digital footprint and protect it from being misused.

Here is what you have given access to when you have clicked on allow after you have downloaded an app on your phone:

86% – Can write to your external storage

75% – Have your exact location

66% – Have access to your phone member

58% – Have access to your camera

40% – Can read your contacts

33% – Have access to your microphone

29% – Can read your message


THERE ARE WAYS TO KEEP YOUR DATA PRIVATE

Cross-check third-party apps before downloading them on your phone

The first step to ensure a safe browsing experience is to be wary of what to download and what not to. “Downloading unknown apps and taKing quirky psychological tests on social media puts your personal information at risk. People take random quizzes to find out how rich they’ll be when they are older or how they’ll look at a certain age.

These tests serve as a psychological record of you for social media companies, an independent researcher on data and cyber security A digital security expert from Delhi says, “Malicious apps downloaded on your phone can access your messages and can read your one time passwords (OTPs) too. Even though the digital era makes life convenient, the privacy of your data depends on how you use these apps.” He adds, “It is a trade-off for the convenience you enjoy by using these apps.”

Even trusted apps, that have a million downloads to their credit, ask for permissions that they do not need. “For instance, there are photo editing apps and e-commerce related äpps that ask for permission to view contacts and messages. One must always question why an app needs certain permission, does it really require access to your messages and contact list to function? It is advisable to avoid downloading apps that ask for too much access.

LOOK FOR OPEN-SOURCE ALTERNATIVE

Open-source software not only provides a better browsing experience but you are also deemed to be safer, state experts. “It makes sense to find an open-source alternative to major software systems, as they address legal and ethical issues from a consumer’s perspective, winch makes them safer and easy to use. One can search for these alternatives online.

DON’T USE SAME PASSWORD FOR ALL YOUR ACCOUNT

If you have resorted to using the same login ID and password for all your accounts in our effort to remember them easily, you are putting our personal information at risk. In case of a security breach on even one your accounts, a hacker can access your other accounts and steal data.

SAY NO TO FREE WI-FI AND RANDOM EMAILS THAT PROMISE FORTUNES

Even if you do not need to use wi-fi, say at a cafe or another unknown location, avoid logging on to your personal online banding websites, personal emails or utility-based apps when you are using a network that you are not familiar with. Unsecured networks may put vital information at risk. Be extra wary if a network provides you an offer that i too good to be true.

LOOK FOR PRIVACY ADD-ONS ON YOUR WEB BROWSER

As browsing tracks all your information and maintains a specific record of internet user, experts advise using privacy add-ons and extensions that can block access from other online software. Privacy extensions and add-ons not only protect us from attacks by hackers but also block ads that show up while browsing. Several privacy add-ons block trackers too.

BEFORE YOU DOWNLOAD A NEW APP ON YOUR PHONE

How to Code an App: An Overview of Mobile App Development | Udacity

• Avoid using an unknown free app, especially one that has very few downloads.
• Always read the reviews for an app before downloading it.


• Find out the origin of the ‘app. IVs important to know where it was developed. Free apps designed in countries that have earlier been In the news for data theft should anyway raise an alarm.


• Don’t install any app through links received in your email or SMS that also offer prize money.
Clicking those links often exposes you to malicious malware and can gain access to your system.


• Be alert while downloading apps. For example, a gaming app shouldn’t ask for your location.
Finance-related apps shouldn’t ask for, access to your camera. Be mindful of the permissions you give.


• Declutter your phone by removing apps that you don’t use on a regular basis.


• Install apps from official app stores.


• Use the right browsers or VPN.


• Turn off location services when not required twit you don’t want your phone to save or track your timeline.

PREVENT IDENTITY THEFT

The most critical type of data is your Personally Identifiable Information (P11) — which includes your IDs such as driving license, passport, transmittal ID number, PAN Card, Aadhar, Credit Account Numbers, etc. Not just ID numbers, but anything that can help identify you — such as your fingerprint, retina scan details, phone number, and your address, needs to be safe.

It is essential to keep this information private and protected in order to prevent identity theft. This occurs when someone gains access to your personal information and pretends to be you. This can have a long-lasting impact on your online reputation and digital privacy. Also, keep your social media connections limited to friends. Be wary of whom you add as a friend on your social media accounts. Share only relevant information whenever you sign up on any online platform.

With the government pushing for a digital India, one would wonder how safe the common man is in all this. The fundamental problem has to do with how the industry works. Our Aadhar data is being leaked to third parties, we need to understand that businesses run on personal data. Data is being used to micro-target ads and create propaganda.

No number of laws can fix this unless citizens act on this issue. The Supreme Court upholds the Right to Privacy as a Fundamental Right and consumers can always take people to court if they feel that their privacy is being tampered with.

Also read:

How to find if your phone has been hacked?

How to remove virus from your laptop or desktop manually

………………………………………………………………………………………

What is 3D Printing technology? | How does it work?

3D printing is a process of manufacturing a three-dimensional products using a variety of materials. It is a technology to make anything quickly using a digital format respective products.

www.technoworldnow.com

3D printing technology is the latest technology which is used for many purposes in todays

life. Here we are going to study how this technology works and what are the usage of 3D printing and including the features and functionality of using this technology?

  • Invention
  • Functionality
  • Information
  • Advantages and disadvantages

What is 3D printing? 

So, 3D printing is the latest technology that eases the work. 3D printing is actually making a proxy image or cloning the object with an easier method. 3D means three dimensions . We can see the depth of a 3D model. In 3D printing, you can print the model as it is the way it looks. This means if anybody wants to make a model of a house or any architecture we can use this technology.

Examples of 3D Printing

3D printing includes many sorts of technologies and materials as 3D printing is being adopted in almost all industries worldwide.

3D Printing on the Moon and Mars | designnews.com

Some examples:

  • Consumer products (eyewear, footwear, design, furniture)
  • Industrial products (manufacturing tools, prototypes, functional end-use parts)
  • Dental products
  • Prosthetics
  • Architectural scale models & maquettes
  • Reconstructing fossils
  • Replicating ancient artefacts
  • Reconstructing evidence in forensic pathology
  • Movie props

Invention

The invention of 3D printing was done by Charles Hull in 1980.Charles invented the first commercial way of prototyping technology. The fastest and cheapest way of making proxy or prototyping technology. As technologies are always getting updated and upgraded.

Functionality of 3D printing

The meaning of 3d printing is additive manufacturing .3D printers print the model in such a way that when we combine all the parts it will make a proxy image of the model. It works by the slicing or layering process.3D printer uses computer-aided design (CAD) to create a model. IT uses various types of material for printing like plastic, metal, resin, thermoplastics, fiber, and ceramic. We can make 3D printing technology in many industries like automobile industries,

Hospital industries and many more. Nowadays people are making weapons, houses, and toys by using this technology at a very low cost with very little manpower.

Information

  • World’s first 3D printed object was an eye wash cup.
  • The USA remains the global leader in 3D printing with more than 35% market shares.
  • In Asia about 50% of the market is covered by China followed by Japan at 30% and South Korea at 10%.
  • Now technology is upgrade in such a manner that people are making houses, human organs, and building models from this technology.

Advantages

  • The process of 3D printing has to be done in very traditional way. There are very few limitations in traditional processes so it’s very flexible for 3D printing.
  • 3D printing allows persons to complete task in very less time that affects the very low cost of production and work is done more efficiently as compared to other prototyping machines.
  • The 3D designs files are stored on CAD or STL files to help in production. No need to store the inventory of stock.  Editing designs can be also done in less time and fewer tools.
  • The models made by 3D printing are lightweight and strong as they are made from plastic. It is light in weight and durable. Such kinds of parts or equipment are very useful in the automotive and aerospace industries.
  • The main advantage of 3D printing is we can reuse and recycle waste in the process. So, there are very less chances of dumping waste.

How to Add iSCSI Storage to Datastore in Vmware ESXi 5.5

How to install 3par Virtual Service Processor 4.4

What is AWS Elastic Compute Cloud (EC2)?

Disadvantages

  • First disadvantage of 3D printing is it has limited material to be used in the process. Very less metal and plastic which can be used in the particular temperature for the process. In addition to this very less materials are recycled and food safe.
  • Large size is another disadvantage of this technology. Due to the small size of the printing chamber can’t able to print large size models. If anyone wants to print then they have to split it and then print.
  • Printing process of models is easy and faster but the post process is very slow as it needs waterjet ting, sanding, rinse, chemical soaking and air heat drying. So all this process is done after printing so it is much time consuming.
  • As 3D printing is additive manufacturing it create model or part in layers or slices .This may cause in durability or strength of part or model.

………………………………………………………………………….

Free Background Music Download for Youtube Videos

If you create a YouTube video and want to attract larger audience for more views then you must have background music in your YouTube video which actually enhances the quality of the video.

Youtube Logo - Free photo on Pixabay

There are many websites available to download background music for your Youtube videos however below are the best sites where you get quality music based on your need and for various moods.

Free background music for Youtube

Pixabay

Website: https://pixabay.com/music

Pixabay offers thousands of music and audio tracks, free for commercial and non-commercial use. There are music for every mood. You also get music played on several wonderful instruments which will sooth the mode of the listener. It makes a best combination to add a music for your video according to the subject.

The best part of Pixabay is that it does ask you to login, sign up or register. You just need to open the site and look for the music of your choice and download in a single click.

It offers music based on Genre, Mood, Movement and Theme. You get free music for Videos, music for YouTube videos, Vlog music, Film music, Background music, Cinematic music, Podcast music and many more.

You can download any music which is best suitable for your videos and you can also upload music as well.

AudioJungle

Website: https://audiojungle.net/

AudioJungle is provides a list of 1,724,305 tracks and sounds from our community of musicians and sound engineers.

So you get a huge amount of audio library to choose from according to you need. You can choose the music from a variety of moods, situation etc.

Every category of music has got a huge amount of list of music which makes the AudioJungle one of the best place to download the music of any type. However all the music are not free to download here and you need to pay for certain music as well.

CHOSIC

Website : https://www.chosic.com/

Chosic also offers several thousands of music which are available to download for free. You get music for numerous category and mood, theme, genre etc. It also offers music for kids, old, young.

Chosic - YouTube

You can choose and download a music depending upon many topics as well. If you need horror, action, classical, angry, happy, funky, dark etc music then Chosic is a right place. Here also you don’t need to sign in, log in, register or sign up to download a music. Just visit the site and you are ready to get your favorite music. You can sort the music by mood, topic, category, instrument etc.

AShamaluevMusic

Website: https://www.ashamaluevmusic.com/

AShamaluevMusic claims to offer the best music for content creators and filmmakers as it has music for every need.

Here you can find and free download instrumental background music by AShamaluevMusic. Free Download 320 kbps MP3, Streams and licensing. You can choose from popular background music like cinematic, corporate, ambient, sad, dramatic, epic, trailers, emotional, happy, uplifting, guitar, wedding, fashion and many more.

You can download music for background of videos as many as you want for free however until your YouTube channel is not monetized. Post your YouTube channel monetization your videos many receive a copywrite issue. If you want to use the music for monetized channel then you need to purchase the license for it.

Mixkit - Awesome free assets for your next video project

MixKit

Website: https://mixkit.co/

Mixkit offers a large stock of background music, video clips, stock music, sound effects, video templates and much more things.

Mixkit has got a gallery of several types of music like nature, hip-hop, jazz, drums etc. where you enjoy a collection of 50,000 premium audio tracks available with one click download.

Also check:

———————————————————————-

Latest WhatsApp Features of 2021 available for multiple devices

WhatsApp has been updating it’s app and providing multiple useful features time to time and mobile users are loving the updated features. Now WhatsApp has come up with more useful features in year 2021 as well.

www.technoworldnow.com

Lets check the latest features available on WhatsApp

Multi Device Support

This is a wonderful feature where users can access same WhatsApp account on multiple devices like mobile app, desktop web etc. You can also link same WhatsApp account on multiple devices. Even if you mobile number is inactive you can still use WhatsApp on same mobile and desktop web application. To link more than one device on WhatsApp, You can go to WhatsApp > click on three dots top right side > Linked Devices.

End-to-End Encryption

Sharing your personal feelings, moments etc has become more secure now as all you chats, messages, calls, pics, voice notes etc are going to be encrypted so no worries on your chats getting leaked or accessed by any third party other than the sole recipient. This feature is so secure that even WhatsApp can not read your messages. Not only the chats, your WhatsApp backups are also going to be encrypted no matter where you save it however WhatsApp provides only google drive as a backup destination as of now.

Enhanced Photo sharing

Earlier many users were unhappy with the feature of sharing photos on WhatsApp since photos were not getting sent and received with their original quality. WhatsApp used to compress the size of the photos, pics, screenshots, videos etc before sending them which used to degrade their quality. Now you can choose the quality of the photos and videos etc while sending – Auto (recommended) / Best quality / Data Saver.

Joining Video Call / Group Call any time

Video call is a high demand feature now especially after covid-19 pandemic since most of the people started using video calls instead of simple calling. It seems to have same feature as other video call software where someone can join a video call any time during the session.

View Once

This feature is basically for the photos and videos where you share a photo or a video on the WhatsApp and once the user at the other end sees it then the photo will disappear and it won’t be available any more. I do not have this feature as of now however if it is available for you then you can try this feature and find out how it works.

Archive

Some time back when we used to archive a chat, number or a group and if there were new messages in that then it used be on the top of the chat list. Now once you archive a chat or a group then it won’t be listed at the top even there is a new message received in the archived chat/group.

Audio Control

This is a very minor feature which is available on sending a voice note or an audio file to someone on WhatsApp. This feature gives you the option to control the speed of the audio file while playing it – you can increase the speed and listen to to a large audio file in half of the time or lesser time.

In-App Ban Review

Some time back there were millions of WhatsApp account banned by WhatsApp due to some suspicious contents shared across. It is also possible that some normal accounts could have been banned or can be banned by WhatsApp by mistake. In this situation WhatsApp also provides an opportunity where the user can send their account for review so that it can be activated later.

Flash Calls

When you change your mobile number, change your mobile phone or do a factor reset of your mobile you always want to retrieve all your WhatsApp call history, chat, voice, video, photos etc. While trying to regain your account WhatsApp sends an OTP to your mobile number for verification. Now your WhatsApp account can be verified with this new feature which is Flash Calls so that instead of OTP you get an automated call to verify your account and once verified it gets re-activated and you can see all your WhatsApp history.

Also read:

How to stop people from adding you in their WhatsApp group

It’s been found that our mobile number is getting added in so many unknown WhatsApp groups without our permission and agreement today since WhatsApp is widely used social media platform.

WhatsApp is a very good platform which provides the way to be connected to friends, family, colleagues all the time, it is also a method for the marketing and sales people who add you without your permission and try to sell their product and services. It is a very irritating at time as they keep sending you unwanted notification everyday.

Below WhatsApp settings gives you an option so that you can get rid of all the unwanted groups and they can not add you into their groups without your information. However, any group admin can certainly send you an invite to add you to their group.

  • You can open your WhatsApp
  • Click the three dots top right side on the screen
  • Go to Settings options and then click account
  • Click Privacy
  • Then click Groups, here you see the option “who can add me to groups
  • Now you can choose the option “My contact” and click “DONE” so that only the contacts whom you have added in your contact list can add you to their WhatsApp group and no one else.
  • If you select Everyone then any one can add you to their group

How to read WhatsApp messages secretly without letting the sender know

Sometimes if you want to read a WhatsApp message and at the same time you don’t want the sender to know about it you can do it by just enabling / disabling some settings.

There are times we do not want to reply to a message due to some reason so that later you can tell the sender that you have not seen or read their message yet. So lets check how we can do it.

You can simply turn off the read receipt or blue ticks. This will work same way for others as well and you will also not know if others have read your messages.

It is easy to run off the read receipts or disabling the blue ticks on WhatsApp. To disable read receipts go to WhatsApp > Accounts > Privacy > Turn off read receipts by swiping left.

Another way to read a message secretly is that before opening a WhatsApp message turn on the “Airplane mode” in your mobile phone and read the message. It will be marked unread / unseen. Later you can turn off the “Airplane mode.

Another trick you can try is to switch off your presence by turning off your last seen in WhatsApp.

Go to Settings > click on Account > select Privacy > Last seen > choose Nobody

You can also mark a particular message as unread however don’t read so that you can check it later and respond

How to send WhatsApp message without saving the mobile number

Sometimes you may want to send a message but you don’t want to save the number as it could be a one time message like sharing your location to a delivery guy. So there is a way you can do it by not adding the mobile number to your contact list. Follow below steps.

  • Open your phone internet browser and copy the link: http://wa.me/xxxxxxxxxx,
  • Or you can use this link as well: http://api.whatsapp.com/send?phone=xxxxxxxxxx
  • You can replace xxxxxxxxxx with mobile number with country code whom you want to send the message
  • For example if Indian mobile number – http://wa.me/919856098560 (first two digits are India country code 91)
  • Now click CONTINUE TO CHAT > Looks like you don’t have WhatsApp installed! > use WhatsApp Web
  • Not you get WhatsApp web chat opened for that number and you can send any message

How to chat on WhatsApp without showing online status

You can chat on Whatsapp without showing your online status to others. There are some methods available. At times we do not want to show up our online status on WhatsApp and prefer to hide it. So lets check the below tips.

  • When you get a message on WhatsApp message notification you can reply from the WhatsApp notification itself which actually does not show your online status to others.
  • You can reply to a WhatsApp message from your smart watch which also hides your WhatsApp online status.
  • Before replying to a WhatsApp message you can turn off the wi-fi or the data on your mobile it does not reveal when you were online on WhatsApp as you turn on the data or wi-fi later which sends out the message.

How to send and receive money from WhatsApp?

How to find if your phone has been hacked?

…………………………………………………………………

How to find if your phone has been hacked?

With the growing mobile phone users and millions of apps being available and downloaded worldwide everyday, our mobile phones are becoming vulnerable for any kind of malware attacks.

Today we have multiple apps available for almost everything for android and iOS and the interesting thing is that whenever we install an app in our mobile phones we tend to give all the permissions which the app asks for without reading it. However very minimal permission is required for almost all the apps to function.

Lets find out the symptoms of the hacked phone

Battery draining abnormally : If you phone is old then certainly it is likely to drain the battery frequently and you need to charge it. However if thats not the case then it is possible that there are some apps running in the background all the time which has been installed by the hacker to monitor your mobile activity and suspicious threat.

Slow performance : Most of the time if there is a malware installed in your phone then it becomes very slow. Same goes for the laptop as well where if there is any virus then it makes the device very sluggish. So if your mobile is very slow to open the lock and then populating the icons takes longer time, if opening any app does not respond and closes automatically, then this is also a sign that your phone is hacked possibly. If your phone was working fine and all of a sudden its starts working weird then it might be due to some virus.

Internet unresponsive : You open internet browser in your mobile and it closes automatically. If you open a particular website and it redirects to some other sites which asks you to pay some money. Most of time the internet browser opens multiple sites automatically then it could be due to some malicious present in the phone.

Frequent popups : Some time if your mobiles internet is on, you might get some popups frequently which will say that your phone storage is full, click here to free. It also says that there is a virus detected in your phone which is harmful, click here to remove the virus. If all these things are very frequent and then there is a chance that your mobile is infected.

High Internet usage : If your mobile internet data usage is very high which is more than your daily usage limit then it could that your phone is send or receiving some information possibly your all day activity to someone and which is causing high data usage.

Frequent messages : If you are getting frequent messages saying your credit card bill due date is going to expire today please pay your bill or any other utility bills etc. Your friend has sent your some money or link your credit card / debit card has expired click here to renew etc or you are getting similar alerts. All these messages are sent from the hackers to steal some money from you.

Phone overheating : If you are watching videos on the internet, youtube or social media then it normal for the mobiles to be warm. But if you are not watching any videos or playing any games and your phone is heating a lot which is not normal then there is possibility that there are some additional app, software or program is active all the time which is processing high data and information that’s which your phone is heating and battery is draining faster. If this is happening then you need to have a look of your mobile phone to be on the safer side.

Also read:

How to remove virus from your laptop or desktop manually

How to send and receive money from WhatsApp?

………………………………………………………..

How to Send Confidential and Secure Email using Gmail

Gmail which is also known as google mail is a very common email platform which is used by world wide and it is absolutely free with huge number of features.

Google has been offering several amazing features for free for years and most of the features are very useful and we all love it. Now Google has come up with another feature in Gmail which by you can send a confidential email which is secure as well.

By using confidential email option you can send the email that will open with a passcode. The recipient will not be able to send to someone, forward, copy or print or download this email. Not only these, you can set an expiry date for this email for a particular time so that the person will not have the access to this email for forever.

Send Confidential email using Desktop

Open Gmail and click Compose:

Now you can write your email and at the bottom click the Clock sign:

Note: You can schedule you email by clicking the drop down option of Send and select Schedule Send

It opens the confidential mode and you can read the disclaimer : Recipient won’t have the options to forward, copy, print or download this email.

You can select the expiry date from the drop down and Save. Once you click Save then confidential option will be applied for period of : Expires in 1 day, Expires in 1 week, Expires in 1 month, Expires in 3 months, Expires in 5 years:

You also have the option to set a password / passcode for this email so that when the recipient will need a passcode to read email. To enable to passcode choose option: SMS passcode and Save:

Now once you save the confidential email it shows the expiry date in your composed email before sending:

Post sending this confidential email with SMS Passcode enabled the other person will receive the email like below:

When you click “View the email” it opens like below and asks to send a password on the phone number:

Upon entering the passcode the user will be able to read the email:

The view email will redirect back to Gmail which was originally composed:

Send Confidential email using Mobile

Open the mobile Gmail App:

The click the 3 dots which are on right side:

Now click Confidential mode and create a confidential email:

You can also schedule your email by choosing the option Schedule send.

Also read: Best Free Email Service Providers

…………………………………………………………………………………………

How to make CCTV Camera using Mobile Camera?

With the increasing crime world wide it is very crucial to have an eye on suspicious movement in our street and our home. You can convert your mobile phone camera into a CCTV camera with video and audio.

https://technoworldnow.com/how-to-make-cctv-camera-using-mobile-camera/

Here we’ll discuss How to make CCTV Camera using Mobile Camera? Your mobile phone camera can help you monitor all the activities inside your house and outside of your house as well. If you have any new, old smart mobile phone or spare mobile phone of any brand then you can use it more effective by making it a CCTV camera easily.

Here are the methods how we can turn a mobile phone camera into a CCTV camera.

  1. First of all we’ll required an App which needs to be installed in your android mobile phone and in your desktop or laptop computer.
  2. There are many apps however the one which I found very user friendly and easy to use is DroidCam which does not require any email or sign in.
  3. Once you install this app in your mobile and PC you will also need a Wi-Fi internet connection as it works best on wifi.
  4. Now you can open the DroidCam app in your PC and ensure that audio and video both the options are selected. It will show the IP address of your internet as below.

5. We need to open DroidCam app in our mobile phone as well and ensure that the app shows same IP range in both our mobile and PC. In case the IP addresses are not same then we can manually correct it. Port number can be left default which is 4747 most of the time.

6. There are some optional settings in the PC client app which can be changed or customized if you want such as Wi-fi, USB or create WiFi server in the PC app.

7. Mobile app also has some optional settings which can be changed or modified like front camera or back camera, white balance, exposure lock, Anti-Flicker etc.

Note: All the settings and options are optional and not mandatory. The app connects the mobile and pc instantly without any settings or log in.

8. Now once you have everything OK then you can connect the mobile to the PC via the DroidCam app and click start option in the pc then it quickly connects.

9. Here the video is working of the mobile via the DroidCam app and below is the just the a screenshot.

10. Now you can place your mobile phone secretly to the place you want to monitor. As long as the mobile phone is in the WiFi range it will work continuously without any interruption. The best part is that the mobile phone will appear like the screen is off and you can lock your mobile as well however the video service will stay on as long as the mobile battery lasts. You can also keep the mobile charger connected to ensure it does not stop working.

You can hide the mobile phone in your room as well and monitor the kids, pets and someone’s activity from your PC screen.

– Also Read –

How to Transfer files from Mobile Phone to laptop wirelessly

How to take full backup of Android phone on PC

How to send and receive money from WhatsApp?

WhatsApp being the most common chat and video platform for years now it has also launched and added payment feature which is WhatsApp Pay which is similar to Google pay and PhonePe.

https://technoworldnow.com/how-to-send-and-receive-money-from-whatsapp/

WhatsApp Pay has recently launched the payment option along with chat, video call and other features. Here we’ll discuss how to use WhatsApp pay to send and receive money.

  1. First of all go to WhatsApp settings > open WhatsApp > Three Dots Top right side

2. Then Click Payments

3. Then click Add Payment Method

4. Now select the Bank which you want to add to send and receive payment. You need to select the bank where you have your bank account and same WhatsApp number is added and linked for banking services as well.

5. Once you select the Bank WhatsApp will verify your linked phone number

6. Now WhatsApp will retrieve your phone number which is linked with mobile banking send an SMS to you

7. Now your bank you will send an alert message to you like below:

Dear Customer, your UPI registration for WhatsApp has started. Do not share your Debit cad details / One time password or OTP / Expiry date number to avoid any financial loss. If it is not initiated by you, please report to your bank immediately.

Hello, you have initialed the process of adding Axis Bank account in WhatsApp.

8. Now it will ask you choose your SIM in case if you have multiple SIM cards in your phone. So you can choose the SIM which is linked to the bank account.

9. Post verifying the phone number and authentication it will retrieve and add the bank account

10. Now the bank account will be linked to WhatsApp and you are ready to send and receive money on WhatsApp.

Note: The person whom you want to send money, they should also have the WhatsApp payment method configured and bank account linked only then you can send the money.

11. Now since you are ready to send and receive money on WhatsApp you can open your WhatsApp and again follow the step No. 1 and > go to Payment > New Payment

12. Now you get three options to send money > Send to a UPI ID, Scan QR code and mobile number. You can choose any method and send the money.

Also read:

How to Transfer files from Mobile Phone to laptop wirelessly?

How to Scan, Copy and Print Documents from Mobile Phone?

……………………………………………………….

How to create AdvancedDisk Pool in NetBackup?

Before we configure AdvancedDisk Pool we need to check and identify if the NetBackup already has any storage server configured. If not then we can configure a new storage server and then create a new disk pool. Post configuring storage server storage unit can be configured for the disk pool.

How to configure Disk Storage Server

Go to master server > then in right pane select wizard > Configure Disk Storage Servers

Now it will ask which type of storage server you want to configure. We’ll select AdvancedDisk

Command > nbdevconfig -creatests (However Veritas recommends to use the wizard to configure the AdvancedDisk storage server)

Next select the media server where storage server needs to be configured.

Note : Each Media sever needs to be configured only once as Storage server even if multiple disk pools are created

Now the Storage server configuration wizard is completed

Since the Storage server has been configured clicking Next will start creating Disk Pool

Next it will ask to select the volumes for configuring disk pool. Now all the selected volumes would be used for storage purpose and it can not used for any other purpose later. Here directory or folder can not be specified since the entire volume will be used.

Then you can give a name for the Disk Pool. You can also set High water mark and Low watermark however this option may not work properly if selected volumes are shared with any other server. You can also set the IO limit but there is no limit actually so you can run as many jobs as possible to the disk pool and back job concurrent level can be set later at the storage unit level which will decided how many job you can run to the disk storage.

Once you name and set the other parameters Disk Pool will be configured successfully. Now it will ask you if you want to create the Storage Unit as well. You can give name for the Storage Unit which is easily identifiable as recommended by Veritas. It also asks to select the media server to transport data however we needs to select the media server where storage server has been configured. Here Maximum concurrent job can be opted.

Now since Storage server, DiskPool and Storage unit have been configured, we need to verify all these things to ensure everything has been configured properly. So lets check if the Storage server is ready. Go to Media and Device Management >Credentials > Storage Server > Here it will show the configured Storage server.

Now we’ll verify the AdvancedDisk Pool by going to Media and Device Management > Devices > Disk Pools > right side it will the configured Disk Pools. You can double click the Disk Pool to check the property and confirm the volumes etc.

Finally we can also check and confirm the Storage Unit by going to >NetBackup Management > Storage >Storage Units > right side pane it will show the configured storage units.

Now since everything has been verified and configured you can create back policies and good go ahead and run as many backups as possible.

Related Posts:

How to configure NetBackup storage unit groups

How to configure NetBackup storage unit and Storage device

…………………………………………….

What is DiskPool in NetBackup?

In NetBackup there are multiple types of storage devices used for backup and restore process. One of the mostly used storage type is Disk Pool which we’ll discuss about.

NetBackup support storage types like Basicdisk, AdvancedDisk, OpenStorage and PureDisk however there is another storage which is DiskPool and it is supported used widely. Lets discuss further about DiskPool further.

A Storage array with multiple disk is called disk enclosure in NetBackup. Each logical unit presented to server operation system is considered as a disk volume. NetBackup has a concept of using multiple disk volumes together and it is referred as DiskPool and NetBackup considers it as a single entity which is presented for backup policy destination.

NetBackup uses OpenStorage technology or the OpenStorage API to communicate with media server which can a physical server and storage server which is responsible for reading and writing data to storage hardware. In some cases media server and storage server would be two different systems however in the case of AdvancedDisk and NetBackup Deduplication media server and storage server both are same.

Advantages of Pooling Disk resources

There are several advantages of pooling disk resources such as ease of managing multiple disk volume as a single disk entity. Also, helping in media server load balancing and storage life cycle along with spanning backs to multiple disk volumes automatically. It also helps in scaling up the disk pool as the disk volumes can easily be added to it.

What is Advanced Disk disk pool and storage units?

Veritas recommends pooling disk with similar characteristics

Here we see that there are three media server in the top row. Media server M1 connected to two disk arrays, Media server M2 has its own internal storage and NetBackup Appliance 5330-1 is connected to an external storage shelves. Here the media server is performing the job of storage server itself.

Since Media M1 has two disk enclosures we can take all the disk volumes of both disk enclosures and present as a single storage entity or we can also configure single – single disk pool and present to NetBackup for data backup. In case Media server M2, its internal disks would be configured as a single disk pool and it would be considered a single disk pool storage for backups.

In NetBackup Appliance we can decide to use some of the drives to be used specifically for AdvancedDisk disk pool and it would also be considered as a single storage storage unit for backup destination.

Also check:

How to configure NetBackup storage unit and Storage device

What is Veritas NetBackup 7.7 and how it works?

…………………………………………….

Best Free Email Service Providers

Today E-mail has become an integral part of our digital world since we communicate frequently via email rather than sending traditional hard copy letters by post.

Black and Gray Digital Device

Email is an electronic mail which is sent over the internet to reach the desired recipient instantly using email provider platforms. There are several free email service provider platforms today which we can use without paying anything and also get plenty of space. Here are some widely used free email platforms with free space available.

|Gmail – 15 GB

|Microsoft Outlook – 15 GB

|Yahoo – 1 TB

|Aol – 250 GB

|Zoho – 5GB

|Mail.com – 65 GB

|Proton Mail – 500 MB

|Yandex Mail – 10 GB

|Tutanota – 10 GB

Gmail is a product of google which is used widely and it has many advantages as well. Once you start using google mail you can access several free services also offered by google. We also find that most of the app or software requires sign up using google account. Google offers 15 GB of free email including google drive storage as well which you can link to many places such as WhatsApp to store and backup your important documents, pic, images, videos and other files and folders online.

Google offers many wonderful services which are useful to our day to day activities such as email, chat, meeting, video conferencing, google docs, google classroom, Education, automated reminders of bills, office time and many more. I would say google is the best for all in terms of great free products and services.

Outlook is provided by Microsoft and you can access it using the internet browser and also via outlook App. It also offers 15 GB of free storage space and 5 GB of cloud storage which is OneDrive. Like google, Microsoft also provides many other products along with Outlook. Here is the list.

Besides above listed products you also get To Do, Word, MSN and Bing which are free. Skype and Teems are the Microsoft’s widely product as well and we all use it communicate in our office and at the work places. Power point is something which we have been using since decades which has now more improved features than before.

Meet, Skype and OneNote are also integrated with Outlook email itself in the front page since people use them frequently at workplace. It seems Microsoft provides mostly the enterprise products where google focuses on our day to day use consumer product.

Yahoo mail has been around us for decades and I remember we all used be jumping to Yahoo chat rooms a coupe of decades back. All the cyber cafes used be fully occupied and there was a general term in Yahoo chat for asking what is your ASL? which basically meant – Age, Sex and Location. Yahoo offers the highest email storage limit which is 1 TB and you will never run our of space.

Like google, Yahoo is also used as a search engine in most of the countries worldwide and it fetches relevant results as well. Here are services Yahoo offers Yahoo! Mail, Yahoo! News, Yahoo! Finance, Yahoo! Answers, Yahoo! Maps, Yahoo! Video, fantasy sports, advertising, and its social media website. Contacts, Calendar and Notepad are integrated services in the Yahoo mail.

AOL is known as America Online a Verizon product which is a search engine and web portal service provider from New York. It also covers all sorts of news worldwide in all the domains including daily news, incidents, politics, fashion ads etc. The email storage space provided by Aol seems to be 250 GB however it is based on overall email as reported by Aol wiki. It supports protocols such as POP3, SMTP and IMAP.

Other feature includes Spam filter, Virus protection and spell check. Aol offers other domains which are @aol.com and additionally @love.com, @ygm.com (short for you’ve got mail), @games.com, and @wow.com.

If your AOL account is not used for 90 days it becomes inactive which can be activated again however if it stays deactivate for 180 days then it would be automatically deleted.

Zoho is a multinational company which offers mainly offers software development services, cloud computing and web-bases business tools. It offers both business email and individual email. Zoho business email is a based on the your own domain which can be integrated and configured with zoho and you get your desired email email account.

You can also host your own free email account such as Gmail account on Zoho and customize it which is free only up to 5 GB of space. It is simple to use as you Gmail account. Here is the list of popular zoho products.

It has some useful services integrated with Zoho email which are – Zoho meeting, CRM, Invoice, Recruit, Inventory, Vault, Expense, Assist and many more and these are very useful to keep a record and track of each contact added in the email. Zoho mail can be accessed via mobile as well.

Mail.com is also a web-based email service provider along with a few other services. It is easy to use with simple navigation options. Mail.com offers 65 GB of space which can accommodate more than 500K emails and also additional 2 GB of file, pics and video storage is provided. The best part is that the storage is located in cloud so any document, image etc can be easily shared with other people.

Mail.com offers free and premiums email accounts. In free account you get basic email account, mobile access and mail collector and of course you get to see several annoying ads while accessing your email on desktop and mobile. Premiums feature offers you ad free account, telephone support and POP3/IMAP. Mail.com does not offer any services in some countries like India.

ProtonMail is also a free web-based email platform provider however it offers very less free storage which is only 500 MB with 150 messages per day. Its paid plan offers storage space start from 5 GB, 20 GB and other features on different pay plan. ProtonMail is based in Switzerland which has secure and encrypted emails.

ProtonMail is available in android, iOS and web version on mobile phone as well. The email interface seems to quite interesting and can be customized according to your liking.

YandexMail is a smart, secure and provides web-based email free with 10 GB of cloud storage and can be personalized as per your choice. It provides anti spam and fraud email platform also available on mobile app with PIN and fingerprint log in. All the email are filtered and sorted out as important and others which can help prioritize your important emails.

There are a few important reason to choose YanderMail such as email scheduler where you write emails in advance and schedule them to be delivered on a specific date and time. The interface can be customized as per your mood. You can have multiple YanderMail account and access all of them using one single mail account.

Other essential feature includes built-in anti-virus which means that all your incoming emails are already scanned and filtered before they reach your inbox. With the help of your mobile number you can recover the lost password of your email account.

Tutanota is also one of the mostly used mail account. It claims to offer most secure email service platform with high encryption. The mail service is based on 2FA which is second factor authentication and supported on Chrome, Opera, and Firefox.

Tutanota has TOTP with an authenticator app such as FreeOTP+, andOTP, Authenticator, Authy etc so that you can easily setup your 2FA with the sync of time in your device. With the above security type you can be rest assured that your mailbox is highly secured and end to end encryption ensures that nobody can decrypt your data.

Tutanota is a Google free open source mail platform and is available to use on android, iOS, Linux, Windows, MacOS and internet browsers as well. It offers business emails which is based on cloud with high availability, cost effective, flexibility and automatic backup features.

…………………………………………..

How to Transfer files from Mobile Phone to laptop wirelessly

Since today we are capturing and saving most of the data in our mobile phones we very often feel the need to transfer them quickly to our laptops as well.

Woman Using Smartphone and Laptop

Transferring files between devices is not a big deal normally however sometimes it can be hard if you run out of storage space in your portable devices, or don’t have a USB flash drive or micro USB to USB adapter. The it might be difficult to move the data from an android phone to an iPhone.

Usually we transfer our files, photos, music files and videos from our mobiles to laptops or PCs via Bluetooth and connecting USB cables but now we have many Apps which can help us to transfer all our important files instantly. Lets check some of the mostly used Apps to transfer our favorite files from our smart phones to laptops and pcs wirelessly and quickly.

|XShare

|Feem

|Take a File

|Send Anywhere

|NitroShare

Make Professional Videos in 5 Minutes! It’s Easy and Free

XShare

XShare allow you to transfer any type of files instantly without any mobile data consumption. It also transfers all the images, photos, videos etc securely and privately. As soon as you install this app it reads out the phone storage and tell you used and remaining storage space along with all the application and files stored. It shows you all the document with file extension as well.

You can share and receive all the files, apps, images, videos, music to other devices. It gives the root level access to your mobile phone in grid folders. You can track all the sent and receive files by history option as well. While you try to share your files to other device it opens your phone GPS and generates a QR code to share with other device. Once you scan the code file are ready to transfer.

Feem

Feem version 4 can be used to share files from a smartphone to other devices in the nearby. It will automatically detect and lists all the devices which have same app installed and connected to the same wireless network. You can also switch on Wi-Fi Direct to turn your device into a Wi-Fi hotspot to transfer files. Both the methods do not required internet access and files are exchanged over a secure connection which is encrypted as well. This is faster, more efficient and secure than Bluetooth as well.

Feem also has a chat feature so that you can exchange chat messages while transferring the files once the connection is established and data transfer is in progress. All these missives are deleted automatically after 24 hours. It also makes the transfer process faster since devices are connected on Wi-Fi and do not rely on internet speed or mobile network. Feem will resume the session as well in case if a device gets disconnected.

This app is also allows you transfer files between PCs with OS like windows, Mac and Linux and smartphone using android and iOS. Now the iOS can transfer images, videos and documents however an android would let you share the apps installed in your as well in APK files so that receiver does not need to download the shared app again.

Take a File

Take a file is similar to NitroShare but makes the file available to multiple people outside your home network. It is a browser-based service that uses the peer-to-peer (P2P) files sharing concept to share files over the internet in real time. When you choose Live Transfer mode you will be able to share a file of any size and type. You just have to share the web link with the recipient.

A real-time transfer starts when a receiver clicks on the web link. This takes place via the web browser, so the only drawback is that you need to keep your computer on and and browser tab open till the file transfer is complete. Take a File shows the number of users that are downloading your file along with a progress bar of the percentage and transfer rate for reach connection.

NitroShare

NitroShare lets you share files between PCs running different operating systems on your home network. This is useful when you do not have a high capacity USB flash drive or need to transfer large files. Normally, you would have to follow some steps to share a folder on the network so that other computers can access its contents. But with NitroShare, you only need to install the software. It quickly discovers devices on the local network that also have this tool installed.

The process is simple and transfers are seamless. Transfer speeds are however, dependent on the quality of the network connection since it depends on it. But it also come with its own hassle free file sharing.

Send Anywhere

This application requires an internet connection but it is for times when you want to transfer files without emailing or signing up for a cloud storage service. The other advantage is you do not have to deal with restrictions on file size and type either. You can upload any file, a contact, photo, audio, apps (APK file), video or an entire folder of any size.

Before the file is sent, Send Anywhere creates a six-digit code. Recipients can get file by entering this access code via the app or the website. Data is sent directly and securely over an encrypted connection to the receiver. Apart from the code it also has the option to share a link via email for deferred downloads. This requires registration and has a 10 file size limit. Here, Send Anywhere stores the files temporarily for up to 24 hours. It supports Android, iOS and Web.

Also learn about :

How to Scan, Copy and Print Documents from Mobile Phone?

5 Best Free Professional Video Editing Software with great Features

………………………………………………………..

How to Scan, Copy and Print Documents from Mobile Phone?

Since we are living in a digital world today everything seems to be going to be digital and so are all our important document. We often need to scan and copy our documents which can be done by using our mobile camera.

As smart mobile phones are being used widely it also has several advantages and feature which we always ignore or do not use them. One of the most useful feature of a smart phone is the camera. By using your mobile phone camera you can scan all your documents in A4 size which is a standard scan, copy and print size with very good resolution and with immaculate quality.

Here we’ll discuss the tips and tricks to scan, copy and print documents using our mobile phone camera.

There are many apps available to do the job however the one I use which does the amazing job is Clear Scan. This is a free document scanner app available in google play store.

1.You can install this app in your mobile phone

2. Then you it shows the camera to scan the document

3. Scan the document

4. Once you scan a document and if that is not captured properly if camera was shaking then don’t worry you can still fix it by adjusting the border. You can simply adjust the green border line to fit the frame properly and make it look good.

5. You also get the option to give a name to the scan documents and add your digital signature as well. A customized text can also be added to the scanned document which makes it look more professional with your added signature.

6. Now if want to add some text it allows you to customize the text size, color, brightness, text alignment and zoom in / out the text etc.

7. It also allow to add a title to each scanned document so that all the documents should not be mixed up.

8. The feature which I liked is that it allows you to add an image as well to the scanned document which makes it more professional and it is kind of wonderful editing as well following the step 5

9. You can copy and print all your scanned documents

10. You can easily copy all the scanned documents multiple times

11. Another important point to note is that all the scanned and copied documents are saved in the and can be found only the app however you can move these documents to gallery and phone storage.

You can also learn about – 5 Best Free Professional Video Editing Software with great Features

……………………………………………….

5 Best Free Professional Video Editing Software with great Features

Since today social media and networking has become a platform for education, information, technology, motivation and entertainment it is crucial to make videos like professional to attract viewers.

Black Dslr Camera on Beige Wooden Surface

A great video is needed for content creators, influencers, marketing professional and mostly for youtubers to make in impact and shine so it creates a need for feature-packed video editing software.

Here we’ll discuss the best 5 video editing software which can help you to make professional like videos and that too with very little knowledge and it can installed in your pc as well.

Video Editing Software

|DAVINCI RESOLVE 16

|SHOTCUT

|VSDC VIDEO EDITOR FREE

|IMOVIE

|OPENSHOT

DAVINCI RESOLVE 16

It is one of the widely used video editing software which has been used in many big time Hollywood movies such as The Martin, Deadpool2, Avengers, Infinity War and John Wick 3 for video and sound effect, visual effects, color grading and several other screen effects feature.

Besides the paid version it also has a free version with many wonderful features like color correction and video resolution conversion from normal to 4K resolution.

The interface offers seven tabs – Media to import files, Cut, Edit (to modify sound and tracks of your choice), Fusion (for visual effects, Color (to tweak color profiles), Fairlight (to mix audio tracks) and Deliver which to export your final video production.

Even if you are a new to video editing software this software has been designed in such a simple way that you can easily use the options to import your raw videos, split the clips to add some effects, crop the vide frames, adjust playback speed, enable camera stabilization, use lends correction and zoom, apply transitions like motions, blur effect, dissolve, venetian blinds etc. It also has the feature to add and position the text tiles throughout the video, you can check the audio track meter to prevent clipping and many more.

The Fusion and Color pages are where you can apply visual effects such as highlights, ripples, film grain and adjust color. You get a flow chart like interface where you can drag and drop effects and color profiles in your preferred sequence for the entire length or specific portion of a track. Besides all these features you can also fine-tune individual color channels, gramma level etc.

Minimum system requirements

• Windows 10 Creators Update.
• 16 GB of system memory. 32 GB when using Fusion.
• Blackmagic Design Desktop Video 10.4.1 or later.
• Integrated GPU or discrete GPU with at least 2 GB of VRAM.
• GPU which supports OpenCL 1.2 or CUDA 11.
• NVIDIA/AMD/Intel GPU Driver version – as required by your GPU.
• A minimum NVIDIA driver version of 451.82 is recommended.

SHOTCUT

SHOTCUT is an open source video editor software. It is based on the FFmpeg library which supports various audio and video file formats including MOV, AVI, MKV, MPEG, WMV and FLV. You can add your own customized images in file format in BMP, GIF, JPEG, PNG, SVG, TGA etc while editing. Videos of different resolution and and aspect ratio can also be customized as per your choice up to 4K at 60fps.

The SHOTCUT software has interface with preview, timeline and filter panel however layout can be customized with multiple tab options as your convenience to edit videos and clips.

Its filters library has over 100 video and 20 audio effects that let you crop and resize a frame, blur a part of the screen, introduce distortion as well as adjust brightness and black levels, colors, contract and saturation. You can also fade in and out, flip the video apply a gradient, use lens correction, film grain and more.

VSDC VIDEO EDITOR

This is a comprehensive multimedia editor packs almost every too you would need to create professional looking productions. It supports formats including AVI, MP4, MKV, MPG, WMV, 3GP and FLV in video; mP3, WAV, WMA, FLAC, PCM, OGG, AAC, M4A and AMR in audio, as well as BMP, JPG, PNG, PSD, ICO and TIFF in image files. With VSDC, you can create 120fps videos in up to 4k resolution and you also get tools to convert audio and video files from one format to another.

The software also allows you to create slideshows, import video files from your PC, use its built-in video capture tool to directly record footage using your webcam and even a screen-capture mode for PC-based tutorials.

VSDC interface is very user friendly and easy to use and navigate. Left you have the option to import a project and preview pane in the middle along with properties in the right pane. It has option to add visual and audio effects.

IMOVIE

This video editing software comes pre-installed in the iPad or MacBook. It is simple to use will offers all the feature of your video editing need. It allows you create crisp videos in up to 4K resolution, apply color filters to your productions, fix shaky videos and even use green-screen (croma) technology to add exotic backgrounds behind your subjects. It also offers to create video-in-video and split-screen edits for your YouTube channel.

If you shoot a video using iPhone to shoot videos, the entire process becomes seamless: iMovie software automatically accesses photos, videos and audio clips from your iCloud account and it inter-operates smoothly with its app version for iPhones. This means you can start your edit on your mobile itself and also continue with the projects on your iPad or Macbook.

For video editing guideline and learning you can visit support.apple.com/imovie. There are lots of tutorials available in YouTube as well.

OPENSHOT

OpenShot is also an open source video editing software that comes with feature like video trim, resize and rotate videos. It supports a wide range of formats, including AVI, MOV, MP4, Motion JPEG and WMV as high as 4K at 30fps. It allow your to import images and musics in JPG, PNG, BMP, TIFF, MP3, WAV and FLAC formats to create a custom movie slideshow.

The user interface has a project pane where you can import photos, audio, video in to the editor for quick access, a timeline onto which you can drag-and-drop files and the preview pane shows you that how the final output will playout. These panels are dockable which means you can click and drag to record them as per your choice.

Post importing your files such as videos, photos, images and audios, you can also insert text frames, transitions and 3D animations onto the timeline. It offers you more than 40 customizable title templates to display a film’s rating, subtitles, text overlay and credits. Openshot even gives you a choice of over 150 2D and 3D transitions with the option to adjust their length, transparency, brightness and contrast.

While editing video tracks you can resize the frame, add fade in / outs, apply and animation, make a video play in reverse and even change the play back speed for each clip. It may not have much options to edit the audio track but allows you to separate the audio from the video clips.

Good to know –

How to Scan, Copy and Print Documents from Mobile Phone?

5 Best Free Professional Video Editing Software with great Features

………………………………………………………………………………………

How to Add iSCSI Storage to Datastore in Vmware ESXi 5.5

If Vmware esxi datastore is running out of storage then nothing to worry since you have the provisioning option which can help to add a new datastore, increase the size and also expand the storage capacity.

There are multiple ways of adding extra storage capacity to the vmware esxi datastore via FC SAN and also using iscsi network. The iscsi network is very easy to deploy and scale the storage system along with cost effective.

Lets discuss the procedure to add additional storage capacity to Esxi 5.5 datastore.

Storage capacity can be added from a SAN / NAS storage and also from a server. So we’ll check how storage from a server to datastore is added via iscsi.

1. First of all open the Server Manager on the server to create a virtual disk which needs to added to the Datastore.

2. Then go to File and Storage Services > iSCSI > To create an iSCSI virtual disk start the New iSCSI virtual disk wizard

3. Now select the disk where new virtual disk needs to be created. For example drive E: and click Next

4. Give a name to the new virtual disk > Next

5. Specify the virtual disk size > Next

6. Now create a new iSCSI target > Next

7. Give a target name > Next

8. Here we need to add the initiator where we need to add the virtual disk

9. Now we need to go to Esxi > Storage adapters > select the iscsi storage adapter > it will show the iscsi name which is the IQN number which needs to be added to the target server

10. So need to copy the iSCSI name (iQN number) and add as the iscsi initiator in the server as we saw in the previous screenshot (step 8) where it gives the option to add IQN / DNS name, IP address and MAC address. > Next

11. Here if you want to enable CHAP you can do so for additional security. If do not want to enable CHAP you simply click Next

12. Now you confirm the configuration and click create

13. Now it configures the Virtual drive > click Close

14. Now we need to establish communication between the windows server (target) and Esxi datatore (initiator) so that virtual disk can be mounted. So we need to add the IQN number of the window server to datastore

So we’ll go to the windows server Tools> iSCSI Initiator

15. Copy the iqn number and add to the datastore

16. Now go to datastore > Storage Adapter > select the adapter > Property

17. In the storage adapter property > click Dynamic Discovery tab > add the windows server IP address and click OK

18. Now it adds the windows server IP successfully > Close

19. Now select the storage adapter and click Rescan All to detect the newly added virtual disk.

20. Now it will show the connection and mapped storage with capacity

21. Since the extra storage is added we can increase the existing datastore capacity or a new datastore can be created. In the below example we are trying to create a new datastore.

22. Select Storage left hand pane > select the existing datastore > Add storage > choose Dis/LUN > Next

23. Now select the added disk storage which we mounted from the windows server and click Next

24. Now select VMFS-5 > Next

25. Now it shows the final status and overview

26. Here you can give a name

27. Now you can choose Maximum or custom space and go next and click finish.

28. Now the new datastore has been created. Once you have new datastore configured then new virtual machines can be configured on any of the available datastore storage.

Also check below posts –

How to replace a failed disk in 3par storage?

How to install 3par Virtual Service Processor 4.4

……………………………………………………….

Amazing Google Products and Features available for all

The internet world rests on google as it is an ocean of knowledge information and technology. Google itself is a great technology as well which is a playing a great part in taking the world to the peak of next level.

Google has evolved a lot over the decades and now offers several important and beneficial products for people of all age groups across the world including email, education, environment, technology, business, entertainment, health and fitness and many more.

Lets explore the products and services offered by google to add value to the world.

Android Auto is an application powered with Google assistance, Navigation, Communication and Entertainment which is mostly installed in cars. It is so user friendly that it make easy to use.

You just need to connect your android phone to your car infotainment display and you are ready to go. Now you can make your drive pleasurable with your finger tips.

Just by tapping with your finger you can direct your car, call your loved ones, play your favorite music and drive your car as well. You can also give voice commands.

Today is the era of mobile phones. Since the mobile has become an inseparable part of our life google is contributing enormously. Today we that millions of phones run on android OS which has great features as we all know.

Gone are the days when we used to watch TVs in a box and controller it with a remote controller. Now google enables you to watch your favourite movies, shows etc just by the click of your mobile phone as well. Yes, you can control your android TV with phone using it as remote as well.

Chromebook a computer which works on an operating system developed by google which is Chrome OS. Its very fast, featured and simple to use.

This is a voice command operating device which can play music, answers your question, sets alarm, reminds you of your importance works and events. It can do anything you tell to do from turning lights on and off and many more things. It has the features to switch music as per your mood from one room to another.

As most of our daily activity is depended on technology now-a-days, it is more important that we become physically, mentally and digitally healthy. Digital wellbeing app helps you to control your addiction to gadgets and technology.

Google Docs is one the mostly loved product which is free for personal and business use. It enables you to create an ever lasting impression and creation of docs such has word, excel, power point and forms. The best part of the google doc is that it is save in google drive automatically which is hosted on cloud storage. So you can access your docs and powerful presentation from anywhere.

Google drive is a free cloud storage provided by google with your Gmail account. It offers a 15 GB free cloud storage to save your important files, folders, docs, zip folders and emails. Once you reach your free limit further storage capacity needs to be purchased as per the plans offered by google like monthly plan and yearly.

Google Earth provides a 360 angle view of the world so that you can rotate all the way from left to right, up to down and all around get a detailed glimpse of the world.

Google finance is tool which provides financial news, intranational real time stock price, value, market insight and analytics and many more. it also helps you get more financial gain in your day to day trading.

Google Arts and Culture provides the unique collection of all the arts, paintings, handicrafts, galleries, historical images and exhibitions. You can also choose to view the wonderful creation by simply clicking on the color of your choice in 3D view.

Google assistant is an interactive tool which accepts commands and gives commands as well. Yes, it will tell you right things at the right place. I can remind you to pay your bills, time to commute office and from office to back home. It guides you about near by facility and services available like ATMS, shops, restaurants, malls and many more useful things.

Also check – What are the features of Microsoft Outlook 365?

How to replace a failed disk in 3par storage?

It is simple to replaced a failed hdd in the 3par storage systems most of the time however we need to ensure that right procedure and guidelines are being followed.

Here are we’ll discuss the the procedure to replace a failed hdd in the 3par storage systems. First of all we need to find about if there is a hdd failure.

Service Processor

First of all you many receive an email notification by the IRS server about failed hdd if the Service processor is connected to the 3par. It can also send an alert saying for example pd 30 has failed. As soon as we receive this type of alert we need validate if that is a genuine alert about a failed hdd and not a false alert.

You can log in to Service Processor or Store Serve Management Console (SSMC) and check the alerts status. If the alert has been resolved by itself then you may not need to do anything. You may see the message like below, for example:

 Magazine 3:7:0, Physical Disk 95 Failed (Replace Drive {0x46}, Vacated {0x45}, Errors on A Port {0x87}, Errors on B Port {0x8b}, Invalid Media {0x98}, Smart Threshold Exceeded {0x9a}, No Valid Ports {0xa1})

Note: Magazine 3:7:0 means – Cage 3, Magazine 7, Hdd 0

A pd (hdd) can be reported as degraded as well and we need to verify why the pd shows as degraded.

However failed hdd can be check by running below commands:

>showpd -failed -degraded

95 3:7:0 FC 10 failed 838656 0 1:0:2 0:0:2* 900

You can also command > servicemag status 3 23 to find out the status of the failed hdd.

Servicemag is process which runs to ensure there is no hdd failure. If there is any hdd failure due to bad blocks or some bad chunklets, then a PD would be marked as failed by the Inform OS of the 3par storage.

Once a hdd is marked as failed then the Inform OS informs all the 3par controllers that a particular pd has failed and not good for data storage anymore. So no chunklets should be drawn from the failed hdd to write anymore data.

Servicemag commands:

servicemag start [options] <cage_ID> <magazine>

servicemag start [options] -pdid <PD_ID_0>…<PD_ID_3>

servicemag resume |unmark [options] <cage_ID> <magazine>

servicemag status [options] [<cage_ID> <magazine>]

servicemag clearstatus <cage_ID> <magazine>

Subcommands

Start – This command informs the 3par system manager to relocate all the data chunklets from this magazine / hdd to other disk location so that this drive magazine can be removed to replace a faulty hdd.

Resume – It informs that 3par system manager that a hdd has been replaced and data can start moving to this replaced hdd.

Unmark – This command stops the servicemag process and resets the internal status of the pd. If servicemag resume command is not working while trying to run servicemag on a newly replaced hdd or servicemag start while trying to fail a hdd manually or vacate the magazine, then servicemag unmark command can be run.

Clearstatus – Clears the log shown by the servicemag command status for the given cage and magazine.

Once the hdd failure is confirmed then failed hdd can be replaced. Now we need to ensure that compatible hdd is replaced as 3par Inform OS. If the compatible part is not replaced then hdd would not work and it would not be detected by the 3par as well.

Also check: What is AWS Elastic Compute Cloud (EC2)?

………………………………





What are the features of Microsoft Outlook 365?

Microsoft Outlook has changed the way we send and receive email messages now a days. It has many amazing features to communicate effectively by email messaging.

Microsoft Outlook is now is much more that any regular mail box. It efficiently organizes your emails, contacts, calendars, appointments, reminders and many important things. Here we’ll discuss the features and options of Microsoft Outlook in details to use is more efficiently.

Adding Email Account

To add an email account we need to go to File option on the tope left side

Once you click the File option you get below options to Add Account

Now click Add Account and enter your email address and password as below:

Post adding your email address and password you get completion windows saying that Account successfully added and it happens automatically however you also have Advance options in case you want to add your email manually.

Now you will see your newly added email account or you may need to restart the Outlook to show up the added email account. You see a welcome email in your inbox.

How to delete an email account

Now lets check how to delete an email account from Microsoft Outlook 365. In order to delete the added email account we need to go to File option again as above by clicking top left side. So go to File >Info > Account Settings > Account settings

Now you can select the email address which you want to remove and click Remove to delete.

Note – you can add any email like your Gmail or Yahoo as well.

New Email

Once you try to create a new email you get options like From – Sender, To – Recipient and CC – Not direct contact but can respond or intervene if main contacts are not responding. If you click on To option it give below option to select the contacts. You can select the contacts and click To so that all the contacts will be added in one go and click OK.

In this windows you can select the contacts, Carbon copy (CC) and Blind carbon copy (BCC) as well. Once you all the desired contacts selected you can draft the email and send across.

Now if you want to save the email or print the email before you send you can click File option top left side and > Save / Save As > Print > Move to Folder

If want to use more options to in new email then lest check below options:

Message

You can modify the font style and size. If numbering has to be pointed you can choose many bullet formats. Text alignment option is also available. Address book is available to choose the contacts as recipient which actually saves time and avoids writing contacts email manually. Attach file options allows to attach any file, folder, image, text file, zip file etc. Attach item allows to attach any email which you may have saved before.

Signature

Signature option is a way to set up your identity in the email message. You can add your name, email address and any specific message for your recipient such as your designation, certification, availability, working hours and days etc.

Follow up

Follow up is a very useful feature to remind you that you need to follow up on a specific day or time. If you send an email with a follow up set, it will keep reminding you of this email with a red flag. You also have the Add Reminder option that can be set for any email.

Right Click on inbox or sent message

If you right click on any email such as sent email or inbox email it shows many useful option to perform as one’s need:

Dictate

The Dictate option allow your to draft an email without typing any letter or without touching the keyboard. You just need to enable the Dictate option > it detects your microphone and start speaking your message and it would write automatically. Dictate feature is available in many languages.

View Templates

The Template option is very useful for instant email message. It has some pre-defined email. You can set up your own email template as well.

Show Training

The Microsoft Outlook 365 show training option is a complete guideline for several amazing feature present the outlook. You can go to the tutorial and learn many useful lesson to manage the outlook emails in a more professional way.

Contact Support

How to set up Skype / Teams Meeting in Outlook?

Outlook provides an option to set up a web meeting as well. You can go to Home tab > Meeting >Title as subject > Required to select member > Optional is for optional member > select Data and Time > Location (optional).

Now you can add Skype or Teams Meeting for people to join on the decided date and time.

Create Rule

Email rules can be created a well to filter any specific email and to save them in a particular folder. You can check more options available.

Get Add – Ins

Microsoft has come with many third party vendor application which can be integrated with Outlook. There are number of applications available that can be added to the Microsoft Outlook as per your need like Salesforce, Leave request for outlook, Translator for outlook, Hub spot sales, Smartsheet, Custom signatures, Emojis, Zoho CRM for email and many more. However some are free and some may need additional purchase.

Create a folder

If you want to create a folder so that you can save your important emails then right click on Inbox > New Folder > folder name. Now once the folder is created emails can be drag and dropped in this folder to save them for future.

Calendar

Calendar option shows all the scheduled meeting and on a daily, weekly and monthly basis. It has the option filter by daily, weeks, today, 7 days etc. So this a great feature to show the schedule meeting so that we do not miss any meeting. I personally use this feature a lot to keep a track of my busy schedule.

Note: All the blue bars in the calendar show the current schedule.

Also check – What is AWS EC2?

…………………………….

What is AWS Elastic Compute Cloud (EC2)?

Amazon has various cloud platform for host many type of services and EC2 is one them where it offers host Elastic Computer Cloud which is virtual server running in the cloud which is highly secure, scalable with load balancing.

AWS offers the amazing cloud services where you can setup your work environment instantly with just a few clicks. You need to decide your IT infrastructure need and create the instances and lunch your severs like windows, Linux, database etc within a few minutes with few clicks.

Cost Effective:

Amazon Web Services eliminate the need for your buy physical hardware to set up your business environment that is also a tedious task which includes planning, approval and budget passing which takes very long time. It also costs a huge amount of money to build a data center and hiring different type of services and engineers to implement the solution and testing.

Also you just need to pay as you use. It means that you are not going to even a single penny extra and just as per your usage. AWS EC2 offers the flexibility to run your environment as long as you want and shut is off when not in production hours which actually minimizes your IT infrastructure cost a lot.

What are EC2 Services:

  • Platform to run Virtual Machines in AWS cloud (Instances)
  • Data storage in cloud (Elastic Block Store)
  • High Security Network (Network and Security)
  • Sharing the performance load among machines (Load Balancing)
  • Scaling the IT infrustruction with auto scaling feature (Auto Scaling Group)
  • EC2 Image Builder (AMIs)

Most of the Amazon Web Services come as free trials for a year which is indeed enough time to build your test infrastructure and analyze how it is going to perform for you. Lets check how to build and launch a virtual machine.

Instances

Instances

This is a great way to find out your configured servers. It is a console which gives a clear view of all the virtual machine which are configured in the AWS platform.

Instance Types

Type of instances offers you the options to choose to build virtual machines as per your requirement. You have immense amount of preconfigured option and customizable options as well such as Nano, micro, small, medium, large, xlarge etc. Each of the instance type has its own configuration and specification being offered with of course price.

Elastic Block Storage

Elastic Block Storage offers the data storage with volume type on SSD storage with optimized performance to suite your need. You can create a volume as your choice:

It also offers a snapshot option for all the volumes or for any specific volume which may have some critical data and needs backup. Snapshot can be created for a volume and instances both.

Data Life Manager

Data Lifecycle Manager enables you to automate the creation, retention, copy and deletion of EBS snapshots and EBS-backed AMIs. It also enables you to automate cross-account snapshot copy actions for snapshots that are shared with you.

Network Security Group

A security group is kind of virtual firewall to control and protect the network traffic for the instance running in the aws cloud platform. It also has the option to deploy and enable one or more security groups with modifying security rules at any time. It is also necessary to define a security groups and security rules before launching any instance.

Elastic IP address

Elastic IP address allocation allows you to choose an IPv4 IP address or choose from global IP address from AWS global accelerator. One Ip address form AWS to an instance is free.

Elastic Load Balancing

Load Balancing option provides three type of load balancing

Application Load Balancer – Choose an Application Load Balancer when you need a flexible feature set for your web applications with HTTP and HTTPS traffic.

Network Load Balancer – Choose a Network Load Balancer when you need ultra-high performance, TLS offloading at scale, centralized certificate deployment, support for UDP, and static IP addresses for your application. 

Classic Load Balancer – Choose a Classic Load Balancer when you have an existing application running in the EC2-Classic network.

Auto Scaling Group

AWS auto scaling the feature of group all the instances together which are of different types and capacity to share the load among them. This is also considered a kind of logical unit combining all maximum and minimum capacity instances together.

It also helps in identifying and terminating a faulty instance and launching a new instance to ensure a continuous stable performance. However we need to ensure that all our instance have optimal capacity to handle the data traffic.

Also check – How to replace a failed disk in 3par storage?

………………………………………….

What is HPE MyRoom?

HPE MyRoom is an enterprise high quality and secured web conferencing application software which allows you to connect with anyone from any where in the world.

https://technoworldnow.com/what-is-hpe-myroom/

MyRoom application provides a high security web conference with chat, voice and video call features. It is a real time web meeting which lets you collaborate with one or more people or a team.

MyRoom user can see anything with real-time with high resolution which helps to troubleshoot any technical issue of any device, software by its visual remote guidance features such has sharing the screen, taking screenshots or making annotation.

MyRoom can be joined on computers, servers, mobile phones, tablets and hands-free wearable devices on 3G/4G or Wi-Fi. It also allows you connect quickly with vendors, partners, engineers and other member and other resources across the globe to get instant solution, guidance and advise with high quality audio and video interaction.

It is also like a remote remote mentor where your colleague, vendor or friends can support you from any part of the world to help you perform your task, replace a hardware part, fix things in your enterprise, office, home, kitchen etc via visual remote guidance.

With the help of a device, network and myroom software you can excel in anything by using the visual guidance approach where the expert can help you remotely.

This is a great way to save a lot of money and minimize the cost of any hardware setup and installation where the travelling cost, lodging and fooding cost of the onsite engineer can be a huge expenditure and impact the overall budget of any product to put in production.

As a result MyRoom increases uptime and reduces overall cost, with fewer calls, shorter repair time, decreased travel requirements, and fewer parts sent onsite especially in an enterprise environments.

Settings:

Personal Information

Basic information is required to sign up with the software to use. In Personal information you can fill up first name, last name, company name etc.

Audio/Video

In Audio/Video dropdown you can choose the headphone or earphone which you want to use to get the audio and video output. In case if you do no choose your device here you will not hear or other person will not hear you.

You can also choose the camera which can be internal or external. By default it chooses the inbuilt camera of the laptop. If you are using any external camera that needs to be selected from the drop down here. It is advisable to test the audio, video and camera before joining or initiating the a web meeting.

General

In general available optional options can be set up. “Log in automatically when Myroom is launched’ is the good option which avoids to put user and password each time you log in. You can also use “Expand toolbars when I enter a room.

Notifications

Sometimes notification can be very annoying as whenever someone types a message you get a very high beep sound frequently which may irritate you. So you can keep it muted. You can disable play sound or pop up message. Other options can be enabled or disabled as per ones choice.

Chat/Questions

Chat option can be customize as per your convenience. If you do not want to use any other option you can keep it default.

File Handling

If someone wants any specific option about the file then this option can be used. File location can be changed for saving the recordings, chat etc.

Translation services

This is one of the best features which translates the chat in your preferred language.

So even if you can in an international web meeting can ask the participants type their message and discussion so that you can translate in your own language and understand them and respond in an effective way if you do not understand someone’s language.

Customization

Customize option lets you choose the wall paper or background of the application while using this application. However you need to choose one from the available themes only and there is no option to customer it.

People

People option gives the view of all the participants who have joined the meeting.

Content

Content option shows all the screenshots, images, docs, files and log etc that are uploaded by the remote engineer or customer which can be saved or shared by email as well.

Chat

Chat option allows to chat and change the font size as well. The chat can be printed and saved as well. The voice and video call can be initiated by enabling them and if you don’t want to hear the audio then it can be disabled as well.

Raise hand

Hands up option allows someone to raise your hand if you have a question or want to ask or tell something in the web meeting.

Other options

There are other options like screenshot which can take if other person shares the screen. You can share the screen or any one who is in the meeting room can share their screen by using the share screen option. Next option is to generate the key which allows your to let others join the meeting by entering the key.

Join via mobile

Next is another importance feature where other person can share the real-time visuals via a mobile phone and it allows to monitor and guide them remotely. MyRoom application is also available for android and iOS users and it can be downloaded from google play store or app store.

You can generate and share the key to the phone users to join. Once the person joins the on mobile phone you can see it in your desktop application of MyRoom.

Once you join the meeting using the mobile you get the same options like mike, speaker and video. The three dots top right side next to the camera icon gives you below option like:

On screen options in mobile

Once you enable your video call three dots at the bottom left side appear for options to flip front / rear camera of the phone. It has option to turn on the flash light of the phone in case if you are in a dark room to show the device etc.

Next camera option is to take a screenshot while showing something via video call. Last option is the zoom in and zoom out.

For more information you can visit the office site : https://www.myroom.hpe.com/Home/Overview

……………………………………………………………………

https://technoworldnow.com/netbackup/

How to create NetBackup Policy and schedule

It is very critical to create an effective policy and schedule to protect the data in the NetBackup. We’ll discuss the basic policy types and configuration of policy attributes.

Here we’ll discuss in detail about NetBackup policy types and attributes, adding clients to a policy and creating backup selections. Lets also talk about how the NetBackup relates to a backup plan.

There are certain things we need to decide before creating a policy which is a backup plan:

  • What kinds of clients need to be backed up?
  • What type of storage you want to use for the backup?
  • How often you wants to backup your clients data?
  • For how many days/weeks/months/years you want to retain your backup images?
  • How long your backups run?
  • How long is your backup window?
  • How much of data needs to backed up?
  • When do you want your backups to run?
  • Where do you want to save your backed up data?
  • When do you want to restore your data?

Most of the Backups will have below four options to define the backup jobs:

Attributes

The Attribute option decides what and where the data will be backed up. The Policy type talks about what kind of data will be backed up like windows, linux etc.

There are two types of basic policy:

  • Standard – Unix, Linux, Mac OS X or Novell NetWare clients
  • MS-Windows – Windows 2003, 2008, 2012, XP, Vista, or Windows 7 or Windows 8 clients

You have the option to choose data classification for the backup, storage for for the backup. If you have a disk based storage you can choose from drop down of “Policy storage” and if have a tape based storage then you can choose “Policy volume pool” and the volume pool is not related to disk based storage.

You can limit the backup job per policy, choose the job priority, and select the media owner. Snapshot backup can also be configured and opt for retain snapshot for Instant Recovery or SLP management. It also give the option to enable off-host backup.

You can also enable or disable Compression, Encryption, collect true image restore information and enable optimized backup of Windows deduplication volume etc. MS-Windows option is used to backup all type of supported windows servers. Standard option is used to backup Unix, Linux, Mac or Novell NetWare servers.

Schedule

In the Schedule tab you have the option to schedule the backup policy as per your choice. You can also create a new schedule, give a name to the backup job, select the type of backup like Full backup / Differential incremental / Cumulative incremental / user backup or archive backup. You can also choose the backup frequency and other related options.

Start window tab in Schedule allows to setup the start time and end time for all the scheduled backup in a day. It decides when a backup can start however once a backup is started it can end post the completion and may exceed the end window and backup end window does not affect it.

For example, you have a Tape library with 4 tape drives and if there are 5 backups scheduled to run on a particular day and the backup start time is 9:00 am and end time is 9:00 pm then if four backups out of 5 start before 9:00 pm and if the 5th job could not start since there was no free tape drive storage then the 5th backup will not run and will report error – 196.

Exclude option allows you to remove any particular day or date when you don’t want to run a backup job. It can be a recurring day in week or month as well. So if you select any day or date in the bottom windows it will show a red x mark in the top window.

Clients

In the Clients tab you can select the added clients or add new clients, delete existing clients. You can have one or more clients in a backup policy.

Backup Selections

Backup selections options allows you to create a selection of files and folders and drives to include in the backup jobs. A new backup selection selection can also be added in policy. It also gives the option to rename the selection list and move up and down any files or folders to prioritize them.

There are multiple ways of creating a policy in NetBackup:

The very first option to create a backup policy is the policy creation wizard which does go through very simple process and creates the policy in an easy way.

Administration console allows to create a policy in a simple method and also to modify an existing policy. Since the Policy configuration wizard is a straight away configuration most of the time we use administration console to edit or modify the backup job policy to ensure it is created as per our need.

You can also create a backup policy using the command-line interface and command is bppolicynew

Also check – How to configure NetBackup storage unit groups

…………………………………………………………………..

https://technoworldnow.com/netbackup/

How to configure NetBackup storage unit groups

Besides storage device and storage unit NetBackup also has storage unit groups which has got another advantage for efficient backups.

We already discussed about the storage devices such as physical disk and tape storage devices those can be attached to the media servers. We also discussed about the storage units which are logical entities in NetBackup and associated with physical storage devices.

Configuring storage unit groups

When we configure a backup job the NetBackup will request for a storage destination and normally we send a backup to a storage unit. However, we can also send our backups to storage unit groups.

This will let us assign multiple storages belonging to a single group. We also have the option to specify a manner and an order to use for the backup jobs. So if a storage unit is not available then backup job will automatically go to the next available storage unit.

On demand only and any available

Lets discuss about on demand and any available storage unit which are two setting in NetBackup available for earlier versions. We see four different storage units above.

On the left there is basic disk storage unit and on the left there are three tape libraries that are connected to three different media servers.

On the top left side we see a backup Policy1 which has assigned storage “ms1_bdisk_STU” which is our basic disk storage unit. If this backup has to run then it would the same storage unit. Policy2 has any_available it means that NetBackup will try use any storage unit available.

However it is not going to use “ms1_bdisk_STU because it set to “On Demand Only” meaning it would only be used if you point a backup job directly to it. It will however try to use any of the tape storage since they are not set as on demand only.

if we have Policy3 which is pointing directly to one of the 3rd tape library then it would use the 3rd tape library when the backup would run. The function of the “On Demand Only” setting is to prevent that storage unit from being used when a policy goes to “any available storage”.

Note: Even though we have the options to use any available storage it is not a best practice to use it for the backup jobs. Veritas recommends to use storage unit groups to provide multiple destination options for a backup.

Prioritizing storage unit groups

One important thing to understand about the the storage unit group is that there are different selection scheme that cab be used. For example, above we have three tape libraries that is put into one storage group which we can see outlined in red dash lines. On the left we can see the names of the storage units that we have put in the storage unit groups and the order as well.

The default section is prioritized so this is a prioritized storage unit group and what is means that top storage unit would be used first before the second one and second one before the 3rd one.

By looking at the jobs we can find out that job1 and job2 are assigned to 1st storage unit and once the storage unit1 is at its capacity the next jobs would go to 2nd storage unit and next jobs would go to 3rd storage unit.

When all the 3 storage unit are occupied and if additional jobs are added like job 7 and job 8, then these jobs need to wait and would be queued until any of the 3 storage unit is free to accept more jobs. In the above example we have used tape libraries with two tape drives which can handle two jobs at a time.

In a prioritized environment, it would make more sense if all the media severs have different capacity and resources to handle more jobs from one another. So if media server1 has more capacity then we would prioritize the backup jobs to use media server1 before they use other media servers.

What is round robin storage unit groups?

In the next example lets discuss the round robin storage unit groups. In this case also we still have our three tape libraries from three different media servers in one group.

However we notice that when try to assign the jobs, they are getting distributed among the storage units more fairly. The job1 would go to 1st storage unit, the job2 to 2nd storage unit and job3 to 3rd storage unit and like wise the job4, job5, and job6.

So above we have even distribution of jobs to storage units. Once all the storage unit reach their capacity then additional jobs like job7 and job8 are going to queued up and they would go to the next available storage unit whichever one that may be.

This type of storage unit makes more sense in order to evenly distribute the backup jobs and share the load balancing among the media servers.

What is failover storage unit groups?

Here we’ll discuss about another storage unit group type which is failover storage unit group. In this example we have two storage units. From media server1 – basic disk storage unit and media server2 – Tape library.

In this scenario all our backups would go to disk and we want them to go to tapes only if disk storage unit is unavailable. So in a failover storage unit group all the jobs would go to 1st storage unit and once it reaches it capacity then all other jobs would queue up and wait for the same 1st storage unit to accept the queued job but will not go to other storage units.

And the only reason the jobs would go to 2nd storage unit if 1st storage unit is no longer available. This could happen if media server 1 is shut down or file system is unmounted etc.

Also read – How to create NetBackup Policy and schedule

………………………………………………………………….

https://technoworldnow.com/netbackup/

How to configure NetBackup storage unit and Storage device

We are going to learn the NetBackup storage configuration and storage concepts such as storage unit and storage unit and also configure and verify basic disk storage.

Here we’ll discuss NetBackup storage device concepts, define the term storage device, storage unit and storage unit groups.

NetBackup storage concepts

A storage device usually referred to as physical disk to tape devices to which NetBackup is going to write data or going to restore the data from. Normally, when we talk about storage device, it a physical storage device which the server or operating system can see and access.

NetBackup has a concept called storage unit and a storage unit is a logical entity which NetBackup associate with physical storage device. This can be a tape device or a path to a storage device or disk pool. Normally, a storage unit is associated with one or more media servers. Lets look at some storage device and storage unit.

Storage devices and storage units

As discussed a storage unit is a group of one or more storage devices and of specific type that is attached to the NetBackup server. When backup run the storage unit specifies the media server that is going to copy the data from the client to the storage device and also which storage device is actually used for that backup.

For example, here we see a storage unit which is ms1_bdisk_STU which is a basic disk location on Media server 1. Another basic disk location is in Media server 2 which is ms2_bdisk_STU. Note that name convention that we are using here indicates the media server the storage is from and type of storage.

This will help us to easily identify the storage unit by looking it by name. Finally we see a third storage unit here which is tape device and connected to media server 2. Note that entire tape library is considered a single storage destination where media server sends the backup to.

Disk storage types

BasicDisk

  • Uses a directory on locally or network attached disk used to store backup data
  • Does not require any additional license

AdvancedDisk

  • Uses a disk pool (a collection of disk volumes) that reside on a media server or NetBackup appliance to store backup data
  • Requires NetBackup Data Protection Optimization Option license

OpenStorage

  • Used with intelligent disk appliances that use the Veritas OpenStorage API for integrated backup functionality
  • Requires NetBackup Data Protection Optimization Option license

PureDisk

  • Uses a Media Server Deduplication pool (MSDP) on an MSDP media server or NetBackup appliance to store backup data
  • Requires NetBackup Data Protection Optimization Option license

When creating disk based storage units a disk type will be assigned to that storage unit and as you see the table here the number of different disk types are available.

A basic disk uses a simple local folder or network attached disk on that server and a basic disk does not require any additional license from the base NetBackup licenses.

Additional disk type such as advancedDisk which uses a disk pool and open storage which allows us integration with third party products and puredisk which stands for media server deduplication that is inherent in NetBackup, all these three other disk storage type are also available in NetBackup.

Configuring a basic disk storage unit

To view our existing storage unit we go in to the NetBackup storage administration console and navigate to left hand tree to NetBackup management > Storage > Storage unit. Under there if you would like to create a new storage unit we simply right click and select new storage unit or select the icon up on the top in icon bar.

Same thing can be done via command line using the command > bpstuadd -label. For more details about commands please refer to NetBackup commands reference guide.

After selecting new storage unit we need to select storage unit type. In this case we are selecting storage unite type as disk and disk type as BasicDisk. Under properties and server selection we need to select the media server name where this storage resides on.

Once we have done that we also need to put a path for the directory to that storage unit. The path can be a drive letter of folder in a windows or some folder on Unix. The check box “This directory can exist on the root file system or system disk” by default is not enabled and this protects us for example on Unix where our file system may have been unmounted and in that case we may not want the NetBackup to write to that same folder accidently which is in the root file system and by default NetBackup would not do that.

Finally you can see a red circle which is “Maximum concurrent jobs”, this tell us how many backup jobs can use this storage unit simultaneously. Default is set to 1, however with a disk storage unit since it is random access device we may have more that 1 concurrent job running. You can also test it by increasing the concurrent number from lower to higher to figure out when the performance is degraded.

Viewing a basic disk storage unit properties

Once we configure a new BasicDisk storage unit it should appear in the NetBackup administration console > NetBackup Management > Storage units. To view the property, right click on the storage > change storage unit or double click on the storage unit and we should get the change storage unit pop up window where you can make any changes if you want.

Some of the options in the property can not be modified such as storage unit name. Clicking on the View Properties > it shows the file system and available storage size of the directory where the basic disk has been configured.

Disk reports for BasicDisk

Another option to get the NetBackup storage unit information is by going to NetBackup management > Disk Reports. In the above screenshot it is the disk status report. By clicking on run repots we can find out disk total capacity, used capacity etc.

Also read – How to configure NetBackup storage unit groups

…………………………………

https://technoworldnow.com/netbackup/

How to install NetBackup Administration console?

NetBackup administrator console is available in Window, Linux and Unix platforms. We’ll see what are the option available and how we navigate the admin console to configure related features.

The NetBackup administration console will help you to getting started with backup and restore operation in a simplified way. It is also very easy to configure storage devices, disk storage servers, cloud storage server, disk pools, volumes, catalog backup, create a policy and various other utility operations.

Navigating the Admin Console

The NetBackup admin console is a primary tool which will help to manage and monitor the day to day operation and used by most of the administrators. Left side of the console is the object tree area and right side is the details pane. Currently we have selection the master server name on the top left side.

It is useful to know that though the Admin console is available on the master server, you can install the remote admin console on any other system and manage the NetBackup master server.

Activity Monitor

Here we ca see a different view where we have selected Activity Monitor left side and we can see the summary of all the jobs jobs which have recently run right hand side.

Master server host properties: Global Attributes

Another important component of the administration console is area under host properties which you can see circled on the slide. The host properties are setting which ae available for each master server, media server and clients within out NetBackup environment. Opening the host property for the master server shows a long list of different tabs and properties available and can be modified for the master server.

NetBackup command locations

  • NetBackup programs, client commands, notification scripts – Unix: /usr/openv/netbackup/bin – Windows: install_path\NetBackup\bin

Although many administrator will use NetBackup admin console to manage their environment there are command line as well that can be used. Many of the common NetBackup program commands and client command scripts are available in NetBackup bin directory, a path shown for both Unix and Windows directory location.

  • Master server only commands
  • Unix: /usr/openv/netbackup/bin/admincmd
  • Windows: install_path\NetBackup\bin\admincmd

A separate folder known as the admin cmd folder is available on the master server and it is usually reserved for lower level commands.

  • Media and Device management programs and utilities – Unix: /usr/openv/volmgr/bin – Windows: install_path\VolMgr\bin

There is also a bin directory under the volmgr folder where the commands are stored for device and media management, these commands are used for tape devices.

  • Other utilities and scripts – Unix: /usr/openv/netbackup/bin/goodies – Windows: install_path\NetBackup\bin\goodies

Other utilities and scripts are also found under netbackup/bin/goodies folder, some of these utilities are used by the consultants and individual and over time it has been included in the NetBackup products.

Finally for help on any of these commands on Unix there are man pages for each of the commands and for windows and unix you can refer to Veritas NetBackup commands reference guide. This guide has detail syntax for all of the available commands.

Here lets take a quick look at NetBackup Appliance

Although many customer prefer to install and configure NetBackup on their own hardware and servers NetBackup is also available as an Appliance.

NetBackup Appliances: All-in-One Solutions Making Backups Simple

The appliance comes with preinstalled with NetBackup software and provides a complete and integrated backup and deduplication solution for customer.

Backup appliances have flexible and scalable architecture and cab be deployed as all-in-one backup server with intelligent and end to end deduplication or in a configuration with multiple backup appliances that can move hundreds of terabytes of data in a day just like just like standard NetBackup, NetBackup appliances have source and target deduplication and support full vmware v-storage API integration.

Tape libraries can be configured with the appliance so that it can provide direct tape out capabilities for long term data retention.

What is a NetBackup appliance?

An appliance is not simply NetBackup installed on a hardware but in fact NetBackup is installed on an optimized hardware that has been shown and tested to meet the needs of many highest customer demands.

NetBackup appliance also contains other Veritas software such as critical system and storage foundation software which allows to meet intense security and availability needs.

NetBackup 5230 appliance

The NetBackup 5230 can function both as a master server and media server. It has multiple ethernet and fiber channel IO options available. It has multiple configuration storage options and can scale up to 144 TB of external storage.

NetBackup 5330 appliance

The NetBackup 5330 appliance currently function as only a media server however also has a number of IO options and can scale up to 229 TB in total capacity.

Example NetBackup appliance configurations

This is sample configuration of the NetBackup appliances and as we can see it can scale from a small office to mid size enterprise to large enterprise. Once of the great advantages is that you are not only getting NetBackup appliances as a true and tested hardware that meets the metrics of high level customer but also a complete solution which is supported by Veritas as a whole.

You don’t need to go to different vendors for hardware and software support and the entire solution is supported by Veritas. For current up to date statistics and sizes you can contact the Veritas sales representative.

Understanding NetBackup appliances

Lets take a moment to figure out the differences between NetBackup and NetBackup appliance. With the appliance the licensing is much like some NetBackup feature is based on Front-End terabytes (FETB). This means that customer are paying for the amount of data that they are protecting as suppose to be amount of data is being stored by the backup software.

This Front-End terabyte license is is separate from the initial hardware cost of the appliance. The software has different advantages and one of them is that you are only paying for the amount of data you are protecting so that you don’t pay additional license fee or for replicating the data or having multiple copies of the data. Additionally, if you are transferring data from traditional NetBackup environment to a NetBackup appliance environment so this license will be similar between the two environment.

The NetBackup appliance version number corresponds to a specific hardware, firmware and software that is used in the appliance. Although, the appliance usage the appliance specific version number it still corresponds to a specific NetBackup software version. For example, NetBackup 7.6.1 corresponds to NetBackup appliance 2.6.1 release.

The NetBackup software release and NetBackup appliance functionality should normally be equivalent however they may not be exactly identical. For more appliance details please refer to below link: https://www.veritas.com/support/en_US/article.100040093

What is OpsCenter?

OpsCenter is a tools which reports and monitors one or more master servers using a web based console. It does require a separate installation from NetBackup however it is available without any additional license.

It runs on multiple platforms including Window, Unix and Linux and can monitor multiple master servers simultaneously. This means that we can have one consolidated report across various NetBackup domains.

Accessing the OpsCenter console

It show the default OpsCenter web address which is based on the n ame of the OpsCenter server. When you login to the OpsCenter you will need a user and password that you would generated during the OpsCenter configuration. For more details about the OpsCenter please refer to link: https://www.veritas.com/support/en_US/doc/27537447-127427700-0/index

Configuring OpsCenter data collection for NetBackup

After installing the OpsCenter server you will additionally need to manually configure any master server that you want the OpsCenter server to communicate with. Clicking the add button allows to add additional master server to the configuration. We need to enter our NetBackup master server name as display name to be used and the user name and password for that master server.

After doing this you can optionally press the test connection so that it would communicate with the master server to ensure that our information is valid. After clicking OK it shows up the master server which is added. However it won’t collect data until “Enable Data Collection” is enabled.

After configuring all the above options OpsCenter server starts communicating with the added master server and collecting data.

Comparing OpsCenter Analytics

Although, the OpsCenter is provided for free and it provides operational reporting and reporting data that lasts up to 60 days, for full functionality you may want the OpsCenter analytics license option.

OpsCenter analytic allow no time limit on reported data and has advance business level reporting including custom reports and custom sql reports.

Also read – How to configure NetBackup storage unit and Storage device

…………………………………..

https://technoworldnow.com/netbackup/

What is Veritas NetBackup 7.7 and how it works?

In NetBackup 7.7 administration we will discuss about its concepts, data protection, environments, administration console, OpsCenter along with NetBackup Appliance overview.

In this introduction we’ll discuss the consideration for data protection. We’ll also identify the components of NetBackup environment and their functions. Define common terms used in the NetBackup product and describe how NetBackup backs up and restores data.

We’ll also navigate the NetBackup Administration console, describe the NetBackup Appliance offerings and navigate the OpsCenter console which is a web based interface as well.

Data Protection in general

As we know data protection is a very critical element of any business and if we lose any data which is crucial for business requirements then it can have a huge impact on the business since today the data growth for any business is at very high level which actually increases the backup windows as well.

This is further very difficult for the IT admin to minimize the applications and user disruption while backups and disaster recovery methods and procedure are being used. Even though there are many different technologies available today to perform the different types of disaster recovery in different scenario in different environments. The IT admins are advised to streamline the backup and restore process.

Data Protection

When we discuss the data protection and disaster recovery the there are certain process or terms which are often applicable which are Recovery Point Objective and Recovery Time Objective.

Recovery Point Objective – RPO: It explains how much data loss is possible during the disaster recovery or system or hardware failure. However we would always try to minimize the data loss as low as zero. It also depends upon how often the full, Incremental or Differential backup had been taken and what backup strategy or data protection strategy was followed along with hardware type associated with system failure.

If the backup copy was sent offsite once a week and there is a complete site failure then there might be a week’s data loss.

Recovery Time Objective – RTO: It measures how long it will take to recover the data in case of failure or outage. In some technologies like cluster system, it detects the failure and restoration process could be faster.

So basically, RPO tells us how much data loss is possible during the data restore and RTO defines how long its going to take to recover the data.

Data Protection Plans

While making the data protection plan we need to keep in mind that all data is not equal and some data may be more critical than other in an organization so recovery point objectives and recovery time objectives should be planned accordingly. Normally the quicker we may need to recover the data the using some specific technology it may be more expensive.

The above things determines the backup strategy and required resources like servers, hardware, storage systems, backup technology etc. It also includes testing the data protection plan often or testing disaster recovery plan to ensure that data protection plan and strategy are effective and backups are also working fine.

There might be some changes in the organization time to time like new application introduced, new hardware, new sites, new technology etc which will require to update the data protection plan accordingly.

NetBackup Components

Usually, in any environment we’ll have some systems like servers, storage and data repository that need to be backed up. Backups refers the these systems as clients. In NetBackup the clients are backed up by media servers. Media servers are data movers which pull the data information from the clients and move the information to the backup storage destination.

Though the media server performs the operation, it is the Master server which is considered the brains of the NetBackup. The Master server performs and manages and centralizes all the backup and recovery activity for the NetBackup. It keeps the track of all the data information which is being backed up.

Since the all the backup and recovery operations are managed by the Master server if there is any backup or recovery is needed then it will assign the require media server to perform the operation.

NetBackup server hierarchy options and domains

It is also possible that in a small environment the Master server can perform both the operation for Master server itself and media server as well. However when the organization grows it may required to add a media server to share the load of Master server and perform the backups and restore operations quickly for more clients.

As in the above picture the resources which fall under Master server are known as NetBackup domain, at the same time we should not be configured with the term domain as in IT since here the we are talking about on the resources that are under Single Master server which performs all operations.

NetBackup domains and OpsCenter

Here we see two NetBackup domain – Master1 and Master2 and each one is considered a separate domain and in order to manage them we need to login to one of them specifically to manage its domain.

NetBackup OpsCenter is a free web based tool to manage one or more NetBackup domains.

OpsCenter Interface

OpsCenter is primarily used as a monitoring and reporting tool however it does have some useful management and restore capabilities. It can be installed and used for free however there are some paid version available as well. For more information please visit below link : https://www.veritas.com/support/en_US/article.100040281

Related post – What is Veritas NetBackup and How does NetBackup work?

—————–

How to configure B2D storage to Data Protector

Data Protector has the simplified option to add a local hard drive which is inbuilt or any usb drive or DAS to configure as B2D storage.

B2D storage can configured on any local drive like C, D, E, F etc. Even you can configured it on a usb drive as well. The best part is that you can configure multiple B2D folder as a separate B2D folder storage to the Data Protector.

Lets check the option to create B2D folder to a local drive

Go to the local drive and create a Folder and give any name as per your wish

In Data Protector go to Devices & Media from the drop down

Now right click on Devices and click Add Device

Now you can put any name for as Device Name and Description. Device Type – File Library, Interface Type – Data Protector and Client – you can choose the server where B2D folder is located, click Next

Now copy and paste the path of the folder from the respective drive and click Add and then click Next

Again click Next

Now Data Protector will recognize that folder folder automatically, click Finish to complete the process.

Now again go to Device and Media and confirm that the B2D has been configured successfully.

Similar way you can create multiple folders in the local drive and configure multiple B2D.

Related post – How to add cloud storage to Data Protector 10


How to create backup to Dedup storage in Backup Exec 20

Backup Exec Deduplication option is a great feature to reduce storage data and eliminate duplicate data to be backed up.

The Deduplication storage opotion provides media server side deduplication and remote server side deduplication to reduce network bandwith and optimize storage device. Please note that client side dedulication is available only on remote servers and not on Backup Exec server (media server).

Let’s check below how to create Deduplication backup job.

Go to Backup and Storage tab > right click on a remote server > choose Backup > choose Backup to deduplication disk storage

Now you can select the files and folders for backup selection by clicking Edit in left panel. It is advisable to run a complete full backup of any server to dedup storage first time for best dedup results. Now click Edit right panel

Now go to storage option and selection Dedup storage. By default Client side dedup is enabled for both Full and Incremental backup job.

Note: sometimes client side dedup backup may fail due to some network related issue then manually change to server side dedup and run the backup job.

Client side Dedup backup is failing

If client side dedup backups fail then you need to check if it fails for one server or multiple remote servers. Normally it fails or one specific server not all servers. It could be any server like windows, sql, oracle, exchange etc. Now in order to fix the client side dedup backup, first check how the server is added to Backup Exec server (media server) like, with IP address, or host name or fully qualified domain name.

If added with host name then add the remote server with IP address or vise-versa. You can go to backup and restore tab and locate the remote server which is failing client side dedup backup then right click on it and choose option Establish Trust. Then you can try the backup job. You also need to ensure that port 10000 is open on the remote server.

You can edit the backup job and go to Network and select IPV4 and try the backup job.

You can add IP and host name of the remote server to backup server’s host file, restart the server and then try the backup job. If reboot of the server is not possible then restart the backup exec services then try the backup job.

You can also install the latest patches on the Backup Exec and then update the remote agent on the affected remote server then reboot the server and try backup client side dedup backup, it should be successful. Dedup storage services can be restarted as well. However once the Backup Exec is patched up with latest, then all the remote servers should be updated as well.

Related Posts:

How to backup NDMP Filer (NetApp Storage) in Backup Exec 20

How to add Netapp Storage to Backup Exec 20?

What is Veritas NetBackup and How does NetBackup work?


How to remove virus from your laptop or desktop manually

Virus and malwares are always a threat to our laptop and desktop computers especially in today’s time where most of the time we are online.

Now a days we always hear news about cyber and malware attack so it is very critical to keep our computers virus free to avoid any possible data threat. Below are the steps to remove any virus and malware from your computer.

If you your computer is affected by virus or malware then it may not function normally. While opening internet browser it may not work or will keep opening a small window which ask you to pay some money to open internet. It may also keep flashing same virus message and won’t allow you do anything.

You may see a black screen which is non responsive as well or your internet may keep redirecting to multiple site frequently and will not load your desired site, these are the symptoms that your computer is affected by virus.

Boot in Safe Mode and delete Temp files

If the virus or malware is not allowing your PC to boot normally or shows a black screen then you need to boot your windows PC in Safe Mode. Once you are in same mode then go Run (win key + r) then type %temp%

Now you need to delete all these temp files by using key shift + delete

Now Run please type C:\Windows\Prefetch

And delete all files again with shift+delete

Again same way in Run box type C:\windows\temp

And delete all files by pressing shift+delete

Now open drive C and on the top look for view

Then click view and then click Folder Option

Now click View and from below options check >Show hidden files, folders, and drives > uncheck Hide empty drives > uncheck Hide extensions for known files types > click Apply and OK

Now click ProgramData

Once you are in Program Date folder then look for any suspicious files for folder which you never installed or not aware or which getting modified frequently and delete them.

Now go to drive C > users > your user name > AppData

Open AppData and you see below folders > Local, Locallow and Roaming

Open folder > Local and look for Temp folder

Now open Temp folder and delete all files and folders by pressing shift+delete. This is the place where viruses are installed by default most of the time. The malware / virus file will be an .exe file which gets activate each time you reboot the computer.

You can also check in Locallow folder and delete any files and folder which is suspicious

Same way check in folder Roaming > delete any folders and files which are suspicious

After performing the above steps virus / malware will be removed. However we need to try below steps to remove the malware completely.

Go to Run > regedit

Open registry and click File > Export. This option is to save the current registry settings and restore it later in case some thing goes wrong while removing virus from registry

Now go to HKEY_LOCAL_MACHINE > SOFTWARE and delete any suspicious folder which you never installed or not familiar with. Also any folder which has some special character name or or which is of no use.

Also go to Programs and Feature and uninstall any application which is of no use.

You can uninstall any old antivirus program which is expired

We should not have two antivirus programs installed in a PC as non of them will work due to conflict.

It is advisable to install only one antivirus program in a PC

You can go to Task Manager > Processes > and check which application is taking highest memory and CPU, you can right click on that application > End task

Now you can reboot your PC normally and check if everything is normal

You can also delete the cookies of your browser frequently

All the above steps will not only remove the virus / malware but also improve the PC performance.

Related post – How to Backup your mobile data?


How to create Deduplication storage in Backup Exec 20

Deduplication storage feature is one of the most useful feature in Backup exec which save a lot of storage space and reduces cost.

Deduplication storage eliminates duplicate data in the storage system and writes only the unique data which reduces the backup windows and saves a lot of space in the storage and ultimately save money as well.

While you create a backup job for Dedup storage you get to choose two option : Client side Dedup and Server side Dedup. The recommended way is client side dedup where data is written and processed on the client server which is the remote server and then only unique data is sent across the network to write on to the dedup storage.

This process also reduces network load and minimizes backup window and it does not use the resources of backup server so that backup server can complete other tasks smoothly. We’ll discuss in detail in the separate blog.

Lets check how to create a Dedup storage in Backup Exec 20

First of all click on Backup Exec icon on top left side of the console and choose > Installation and Licensing > Install features and licenses on this Backup Exec server

You get below window which shows all the licenses which are installed. You can also added new licenses and install it. Now click Next

Here you get all the features and options to choose. We’ll check Deduplication and click Next

Next window prompts you to choose the language and click next

Next windows will install the Dedup option

Now the installation of Dedup option is finished

Now go to Storage tab and click > Configure Storage > and click next

Now in the next window choose > Disk-based storage and click next

Now choose Deduplication disk storage and click next

Now you can give a name and description for Dedup

Here you can choose the drive where you want to configure Dedup storage. Note that any drive which is already added to backup server can be configured as a Dedup storage. You can configure multiple Dedup storage on a backup server as well. If you had configured dedup before then old Dedup storage can be imported as well.

In case you delete Dedup storage from Backup Exec console and not from the drive where it was configured, you can still import it using import an existing deduplication disk storage device.

Dedup storage needs a separate user account which you can add here

You can add a dedup user account by clicking Add

Now choose the dedup user account and click next

Next option suggests you to chose encryption if you wish. Usually not required dedup encryption

Now you can choose Concurrent operations which is how may jobs you can run at a time. Maximum is 16 which is recommended by Backup Exec

Now you can click Finish

Now you can click Yes to create dedup storage

It will start creating dedup storage

Click Yes to restart services

Now dedup storage is configured successfully

Now you can create backup jobs and Dedup storage will appear in storage options.

Related Posts:

Backup Exec 20 Installation Guide Step by Step

How to install Remote Agent on Linux server in Backup Exec 20

What is Veritas NetBackup 7.7 and how it works?


How to create Windows Server backup in Backup Exec 20

Lets check how to create a windows backup in Backup Exec 20 and schedule it.

There are multiple ways of creating backup and restore jobs in Veritas Backup Exec. We’ll discuss all the methods here.

Go to Backup and Restore tab > right click on the server where you want to create the backup job > choose first option > Backup > choose storage device from > drop down disk / tape / Cloud etc, whatever is configured in Backup Exec

Then it opens the backup job wizard. If the windows server is a virtual machine then you get below option to choose. You can choose any as per your backup method. I would prefer Agent-based backup. If it is a physical server then you don’g get this option.

Then it shows you two panels > left panel is to create your backup selection and right panel is job property to chose several custom options. By default it selects entire server and turns on the green light as highlighted below which means that complete server can be restored in future in case of hardware failure.

If you modify the backup selection list then the green light goes off and it does not Simplified Disaster Recovery.

You can also modify the backup selection list by clicking Edit

If you want to add multiple server in this same backup job then you can click the + sign and add any server

Now you can customize the backup choosing below option. By default Backup Exec creates Full and Incremental backups

First option is to schedule the backup job where you can decide when both Full and Incremental backups should run.

You can modify dates, days, week, month etc. You can also include / exclude date and time for full backup and same for incremental backup. Full backups are the primary backups to schedule and run and later incremental or differential backups can run.

If you want to add another Full / Incremental or Differential backup, you can add by clicking > Add a Backup Job and you can schedule them as well

Now you can choose Storage device for Full and Incremental backups. It is advisable to use same storage device for both Full and Incremental backups for smooth restore in future

Now you can choose the retention period which is Keep for. You can choose different retention period for Full and Incremental backups depending upon the type of data

Now you can choose IPv4 or IPv6 or any specified network you may want Backup Exec to use for backup. Click > Network and choose

Next option is to choose the recipient for backup job status notification where it failed or succeeded. You can add or choose by clicking Manage recipient for both Full and Incremental backup or any one.

Test Run can be enable as well which is just to run a quick check if backup is going to be successful. There is any failure it will notify. Test run is used for long backups with huge amount of data which may run for 3 – 4 days or weekend jobs to ensure job is going to be successful

Verify is a job which runs at the end of every backup and restore job in Backup Exec. This is to check the health of the backed up data to any storage device. Sometimes some backups fail during verify state. In this case verify job can be configured and run separately. It could be configured for Full or Incremental or any backup which fails during verify.

Advanced Open File is used while starting the backup job which helps to take the snapshot of the backup list before running the backup job. By default Automatic is selected. If backup job fails during snapshot process then choose > System – Use Microsoft shadow copy provider. Usually this is not required.

Offhost backup is specific type of backup which is used to improve the Backup server performance.

Pre/Post Commands option is used to run some custom script most on linux server. User prefers to run some script before and after backup jobs. Not required normally unless specific reason from user end

Files and Folders option is used to customize the way backup runs internally. You can also modify backup methods if the user environment has some restriction. Usually this option is not needed to configure anything.

Microsoft SQL option is only for sql server backup which allows you choose option and decide the backup method

Exclusions option is another feature which allows you to excluded some files or folders from the Backup selection.

Finally you can click OK and ready to run the backup job.

Related Posts:

How to install Backup Exec Remote Agent for Windows manually?

How to install Remote Agent on Linux server in Backup Exec 20?

How to configure NetBackup storage unit and Storage device?


How to take a full backup of Android phone on PC Before Factory Reset

Today the data is more valuable than any mobile phone. We are always worried about the data so we all want to protect it in every possible way.

In today’s life mobile has become an integral part of our life which makes us to be dependent on it as well for almost everything for day to day life. We tend to make it our personal digital diary as well.

For many mobile has become their life and they cant part from it even for a single second. So all these things make the mobile data very precious thing that we can’t afford to lose at any cost.

Lets check the ways of backing our mobile data

  1. Go to Settings of your phone > System

Then click > Backup

Then click >Backup now > which will be backed up to Google Drive. You also have the option to enable / disable the default backup to Google drive.

You also get the option to sync your account > click Google Photos

Then click > Backup & sync > which upload photos & videos from this device to your Google account

You also get the option to choose the quality type of the photo / video you may want to choose

Must check – 5 Best Free Professional Video Editing Software with great Features

You can choose from below options > Original quality / High quality / Express

You can also limit the mobile data usage by choosing below option

You get the options to choose data size as well. You may enable the option Backup while roaming

You can also choose the files and folder that you want to backup by clicking > Backup device folder

You can choose from below option

2. Connect usb cable to your laptop or desktop computer and it appears as Drive

Then right click on this Drive > select Import pictures and videos

Then it locates all the photos and videos

Then you can choose how you want to backup > Review, organize, and group items to import / Import all new items now

You can also choose where to backup or what to backup by clicking > More Options

You can also choose other available option

Once you click Import > everything gets imported

You can choose where you want to save these data in the above window option. If you do not choose any other location to save the data then all these pic, videos and other file will be save in the default location of you PC. For example pictures will be saved in the pics folder of your PC.

Related Post – How to remove virus from your laptop or desktop manually


What is Full, Incremental, Differential and Duplicate backups

Being a backup administrator it is important to make a backup plan to protect your environment.

There is a huge difference between Full, Incremental, Differential and Duplicate backups. In order to optimize the backup operation and save storage space, it is very importance to create a backup method depending upon the criticality of the data which would help you to recover your data in the shortest possible period during any event of disaster.

How to design an effective Backup Plan

  • Type of data and its criticality
  • How frequent the data changes everyday so that you can run backups accordingly
  • How much is the base backup and changed data hourly/daily/weekly/monthly and how much storage space you may need.
  • How to keep a track of growing data and storage space
  • In case of tape storage, how many tapes you may need and rotate tapes daily/weekly/monthly/yearly etc.

Besides the above point you need to design your backup schedule that is also very important task to optimize the backups. Now scheduling the backup jobs again depends upon the overall data change across your environment including all departments. Also time taken to rebuild a particular server or database in case of hardware failure.

For example if you have a financial database which is very critical data and it changes hourly, then you may consider to run full backup daily and incremental backup every two hours / four hours which will ensure that every change is backed up. You should also consider running differential backup every weekend.

Lets discuss the types of backups.

Full Backup

Full backup is considered a baseline backup which creates a reading points for other type of backups like Incremental and Differential. Full Backup will backup the whole data which is selected for a a backup of a server or source device each time it runs. It will not check or reset the archive bit or anything.

Any file whether is modified or not, each time you run a Full Backup, it backs up everything. It includes backup to a tape library, tape storage, disk storage and cloud storage where it will backup the full data in every Full backup and does not save any space, in fact Full backup occupy a lot space in the storage.

Besides that it would occupy same amount of data as per the total data size. Full backup will not do any de-duplication or avoid duplicate data. However you run full backup to a de-duplication storage then it would not backup same data regardless of type of backup and would backup only unique data to the dedup storage.

Incremental Backup

Incremental backup will backup data which is changed since last full or incremental backup. It will back up only block level changes since the last full and incremental backup. But the differential backup will backup all data changed since the last full backup.

Note: It is advisable to use same storage device for full and incremental backups which is accessible to back exec server.

Backup window of incremental backup will be shorter since it would backup only the changes since previous incremental or full backup.

For example:

-Full backup runs on Sun which is the baseline backup.

-Incremental backups run on Mon, Tue, Wed, Thu, Fri and Sat.

-Now the incremental backup which runs on Mon will backup only changed data since full backup of Sun

-Tues incremental will backup data changed since Mon incremental

-Wed incremental will backup data changed since Tues incremental

-Thu incremental will changed data since Wed incremental

-Fri incremental will backup changed data since Thu incremental

-Sat incremental will backup changed data since Fri incremental

Again on Sun a full backup will run and same cycle will follow

Now if there is hardware failure occurred before next full backup runs, then you will need a last completed full backup and all the completed incremental backups to restore the complete data.

Lets check the above example where full backup runs on Sun and incremental runs Mon – Sat. Now if the backed up server crashes on Sat then you would need last Sun full backup and all the incremental backups which ran from Mon-Sat so that server can be restore till Sat. If you restore full backup and lets say incremental till Wed only, then server will not have all the data. The data of Thu, Fri and Sat would be missing.

Differential Backup

The differential backups will backup all the data which was originally selected in the full backup, changed since the last full backup. And the incremental backup will backup only the data changed since the last full or incremental backup. It depends upon you how you want Backup Exec to detect change of data which can be configured by modified time / archive bit / Backup exec catalogs.

Also, it is advisable to run Full and Differential backups in same storage device accessible to backup server.

Note: Backup selection list should not be changed without completing a full backup cycle. In case any backup selection list is changed then a Full backup should run first then the following incremental or differential or both should be run.

Differential backups will consume a lot of space since it will have all the data changed of previous full backup. However, it helps to restore complete server data faster as you need only a full backup and last differential backup which results in fewer media files in the storage device lesser changes of restore job failure.

Duplicate Backup

Duplicate backup is a copy backup of any backup where duplicate backup is configured. You can run duplicate backup backup Full, Incremental and Differential backup. For a duplicate backup you will need two type of storage as duplicate is configured between two storage device.

If you have only one type of storage then duplicate job is not possible. However you can duplicate backup between two similar storage devices like Disk to Disk but it is not considered a good strategy.

Normally, you can run duplicate backup from Disk to Tape or vise-versa. You can also run Duplicate backup from Disk to a Dedup storage or Tape to Dedup which is the best way to save storage space as well. You can also run duplicate backup from Dedup storage to a disk to tape which will also save storage space as dedup storage will backup only unique data and avoid duplicate data.

Related Posts:

Backup Exec 20 Installation Guide Step by Step

How Veritas Backup Exec restore works?

How to create NetBackup Policy and schedule?


How to add cloud storage to Data Protector 10

Micro Focus Data Protector also supports cloud based storage to backup and restore from various cloud platforms like Azure, Amazon S3 and other cloud storage.

Cloud storage can be configured using its security credential to integrate with cloud provider and to transmit the data to the cloud storage. It support public cloud which works similar to Back to Disk (B2D) storage.

Lets check how to configured the Amazon S3 cloud storage with Data Protector

Log in to Data Protector Cell Manager

Then from the drop down > choose Device & Media

Right click on Devices and choose > Add Device

Then give a Device Name and Description and choose Device Type > Backup to Disk > Interface type > Cloud (Amazon S3 API compatible target > Next

Now you can choose S3 Region > then enter Access Key ID and Secret Access Key > and you can select or create a new Bucket on Amazon

Now you either select exiting bucket if already created on amazon which will list automatically or create a new bucket. Note that bucket name can only be in small letters, without space and no special character. Now click OK

Now post adding or selecting the Bucket > click Add as shown below

Then click Settings

Then choose Default media pool > Amazon_MediaPool and click OK

If you want to change setting of the amazon storage you can click Advanced in above option and make changes like number of jobs to run a time etc.

The gateway will be added and you can click Next

Now Amazon Backup to Disk is added with same Bucket name which you selected or created > click Finish

You can also expand and find same bucket name under Devices option

Related Post – How to configure B2D storage to Data Protector


How to backup NDMP Filer (NetApp Storage) in Backup Exec 20

To Backup Netapp storage in Backup Exec we first need to enable to NDMP option. Then add the Netapp (NAS) storage to Backup Exec as a storage device in Storage option. Then it will list as client server in Backup and Restore option automatically.

Now lets create a backup job for Netapp storage

Go to Backup and Restore option in Admin console > right click on Netapp storage > choose Backup > choose storage device >Backup to Disk / Backup to Cloud etc.

Click Edit in left panel

Selection volumes and shares that you want to backup > click Ok

Now click Edit right hand panel

Schedule the backup job

Choose the storage device and click Ok

Now you can check and confirm that Netapp Backup job has been created and it will run as per it’s schedule

Related Post –

How to add Netapp Storage to Backup Exec 20?

How to create NetBackup Policy and schedule


How to add Netapp Storage to Backup Exec 20?

Adding a Netapp Storage to Backup Exec and to backup it up to third party storage works on a protocol call NDMP (Network Data Management Protocol). The important point here is that in Backup Exec Netapp is added as a storage device under storage option however it is actually a client for backup.

That’s why you though it is a storage device itself but it can be backed up to a third party storage device like disk, tape, dedup etc.

NDMP device can be used as storage device as well if there is any third party storage connected to it like a Tape library.

Lets check an example:

In this pic it is a direct connection between Backup sever and NetApp storage and NetApp here is a client so that we can take a backup of it to any storage device.

Lets see another example

In this below setup NetApp storage can be used as storage device however data would be written to the attached tape library

Now first of all we need to enable the NDMP option in the Backup Exec in order to add a Netapp device.

To install the NDMP option click top left side of Backup Exec icon > Installation and Licensing > Install Features and Licenses on this Backup Exec Server

Here you add the license if not added before then click Next

Now check the box NDMP Feature > click Next

Now click Next > then click Install and it will install the NDMP option

Lets add the Netapp storage to Backup Exec

Go to Storage tab > Configure Storage

Choose Network storage > Next

Choose NDMP Storage > Next

Add name or IP address > Next

Select user name and for Netapp storage

Click OK

Click Yes to restart Backup Exec services

After services restart you will see the Netapp is added

Now you will also see that Netapp is automatically added and listed under servers in Backup and Restore option as well

Now Netapp storage is ready to be backed up.

Related Post :

How to backup NDMP Filer (NetApp Storage) in Backup Exec 20

How to install NetBackup Administration console?


How to install Remote Agent on Linux server in Backup Exec 20

Installing the Remote Agent on a Linux / Unix server in Backup Exec is different than windows servers. We can not push install the remote agent like windows servers. We need to install it manually. Lets check how to install remote agent for a Linux server.

First of all we need to copy the ralus (remote agent for linux Unix server) file to the linux server. The ralus file will be located in the Backup Exec ISO media file. You need to copy from there.

https://www.anrdoezrs.net/click-100505188-14325527

Right click on Backup Exec iso media which was mounted for installation before. If not mounted then you can mount again and it looks like below.

Once you right click on it > click Open > then open Linux folder

And below file needs to be copied to linux server

Now the best and easy to copy the a file from a windows server to a linux server is by using WinSCP software. Open winscp > enter host name or ip address of the linux server > user and password as shown below:

Once you are connected to linux server then you can simply drag the file from left window to right window any any folder. In below pic I dragged and dropped the file in var folder of linux server.

Once the file is copied to linux server then go to linux and look in the same directory to find the copied file.

Note: If you are using the vmware workstation for a test / home lab then on linux run command :dhclient” so that it get a new ip address to connect to windows server via winscp. Because the default ip address of home lab which is in vmware workstation will not connect in winscp.

Now we’ll go to Linux server and log in with root > go to the location where you copied the ralus file. For example > var folder > cd /var > then run “ls” to show the file

Note: Do not extract the ralus file on windows then copy to linux serer because the ralus file needs to be extracted on linux server.

Once you locate the ralus file then run below command to extract the file

tar zvxf filename.tar.gz

or

tar -zxvf filename.tar.gz

After you extracted the file successfully, then run commands “./installrauls”

Then enter the hostname, if same name then hit enter to continue

Now press enter to continue:

Now it check the installation requirement > press enter to continue

Then again press enter to continue

Now it checks the installation package >press enter to continue

Now it goes through the installation process and completes it

During the installation it might ask to create a beoper group then create it.

Now installation completes and ask to restart the ralus agent automatically. Press Y for yes.

Now the ralus is installed and configured, press enter to continue

After remote agent is installed then by default the VRTSralus.init service is stopped. We need to start it manually be running below commands

To Stop: /etc/init.d/VRTSralus.init stop
To Start: /etc/init.d/VRTSralus.init start
Or
service VRTSralus.init restart

Now you can add this linux server to Backup Exec > Click add a server and then choose linux

Then add the server IP address / hostname and also add the root account to authenticate the linux server in the next window

Now you can add root user account and password for authentication

Now you have added the Linux server to Backup Exec server with root user and password and it is ready to start back up.

Related Post:

How to install Backup Exec Remote Agent for Windows manually?

How to configure NetBackup storage unit groups?


How to install Backup Exec Remote Agent for Windows manually?

Backup Exec remote agent can be installed manually on a windows server as well. Lets check it.

On Backup Exec media serve > Go to C:\Program Files\Veritas\Backup Exec\Agents > copy folder RAWSx64 / RAWS32 on the remote server

Now post copying the RAWS folder you can run the setup file

The installation window pops up > click Next

Choose Local Install

Here is the option to change the file installation directory to any other folder or drive

Now click Install

Now remote agent installation begins

Now the Remote Agent is successful

Now you can go to Backup Exec server and add the remote server where remote agent has been installed manually. Now you can go to Backup Exec media server and add the server with option >Add server.


How to install Remote Agent for Windows Servers in Backup Exec 20.5

Remote agent is required to be installed on any remote server to protect it. In fact , other than Backup Exec media server all other server including Windows, Linux and Mac will need a remote agent to be installed on it.

How to install Remote Agent for Windows Servers and add it to Backup Exec media server:

There are multiple ways to install remote agent on a remote server and add it. We’ll discuss all the methods one by one.

  • Push Install Remote Agent on a Windows Server

Go to Backup and Restore tab> either right click below media server or any last server in the list

Or click Add server

Then choose Microsoft Windows computers and servers and click Next

Then check the box > Allow Backup Exec to establish a trust with the servers.

Then add IP address or host name of the server and click Add

Then check the box > Upgrade the Backup Exec Agent for Windows to the current version automatically > then click Next

Once you have added the Server and credential for it > click Install

It shows the next progressing windows

Now the remote agent has been installed and server is also added to Backup Exec media server

Post adding the remote server it might show > Connection not established due to some network related issue.

To fix the connection not established issue > right click on affected server > click Establish Trust

Then click > Establish Connection

Now the remote server will be ready for use

Related Post:

What are Veritas Backup Exec 20 features

How to configure NetBackup storage unit and Storage device


How Veritas Backup Exec restore works?

Veritas Backup Exec restore process is very simple and one click job to restore any data from all types of storage devices like Disk, Tape, Dedup and other devices.

There are certain things we need to keep in mind while trying to restore files and folders in Veritas Backup Exec. The data restore process depends upon the the type of storage devices used during backup. For example if a Disk storage was used then you can simply restore from below options:

You go to Backup and Restore Tab > right click the server where you want to perform the restore> click Restore and follow instruction to complete the restore process.

Also in case Disk store you don’t need to run Inventory and Catalog because storage is not kept offline. You can restore from a disk storage in simple way.

But if the data needs to be restored from a Tape Library / Tape drive then you must run Inventory and Catalog because catalog needs to be updated for populate all the data available in tape so that you can make your restore selection or you can choose which file you need to restore. We’ll discuss in detail about the restore process in the next post.

Lets check how the restore process actually works in Veritas Backup Exec.

Once you right click on a server to restore the data then submit the restore job then it executes the restore. Then restore is initialized and dispatched to BE Engine and Bengine takes over.

Then BE Engine retrieves the restore job and tries to find out storage device associated with it. Once the storage device which was used in backup job is located to restore the requested data in the restore job it reads the file and transfer the data to remote agent to write the data to the destined server / remote agent server.

Post writing the data to the server which was in restore job selection list, the storage device / storage media is released to its original location. For example if tape cartridge was used then the tape is released and sent back to its slot in the tape library.

The restore job status was reported to backup database and logs are generated as well. It also reports if the status of restore job if it was successful or failed. Now the restore job ends. You can see the restored data to its location where the restore job was pointed to be saved / written.

Related Posts:

Backup Exec 20 Installation Guide Step by Step

How to backup NDMP Filer (NetApp Storage) in Backup Exec 20

How to create NetBackup Policy and schedule


What are Veritas Backup Exec 20 features

Veritas Backup Exec 20 has come up with several new features and options compared to previous version of Backup Exec. It offers improved performance across all infrastructure platform. There are also new options have been added in the user interface. Lets check them all and discuss about them.

Lets check all the new features and options added in the user interface

Home

-Home tab gives an overview of all the Backup Exec portfolio with brief information of overall status, storage consumption, licensed used and software validity.

Backup and Restore

-Backup and Restore tab is the main option to perform most of the day to day operation like backup, restore, add or remove servers, check scheduled backup, running backup and all job status.

-It shows you the number of remote agent servers added for backup and restore.

-It has the option to create a group of servers, view retired servers, create a disaster recovery disk.

-It also offers the feature to convert from physical to virtual

– From Backup and restore tab you can put all the backup jobs on hold, run the next scheduled back, update remote agent on multiple servers in one go.

-You can switch the console view Standard / Compact

-You can filter by server type / job type and many more

If you right click on a sever while you are in Backup and Restore tab you get several options to perform as shown below:

Job Monitor

-As the name suggests it shows all the scheduled, running and queued jobs along with failed and successful status. It also shows the history of all the operations performed in the last 30 days.

-You can run backups, perform restore, edit delete and cancel backup jobs

– If you right click on a job in under job history you get below options:

Storage

Storage tab have many useful option to configure all type of storage like disk,tape, dedup, ndmp, cloud etc. It also gives the option to perform inventory, catalog and restore from storage tab. Here you get all other options to create, modify, rename and delete storage devices along with other important features like backup sets and storage property.

Reports

With report tab you can generate all sorts of reports of all the transaction. Reports can be pulled up with jobs type, media, devices, alerts. Custom reports can also be generated.

Property – Saas Backup

Backup Exec property has other option related to this application. You can add a SaaS backup to the designated cloud platform.

Configuration and Settings

In configuration and setting you get many features and option to add remove or create which will be a global change to Backup Exec software. It has the settings to create a default backup job, add, remove or modify logon accounts, set alerts and notification for backup and storage devices, start, start and restart backup exec services etc.

Installation and Licencing

In this option you can add or remove Backup Exec agent options, install additional license, install remote agent on remote servers, update the software, view license information etc.

Veritas Online

Veritas online provides you with the access to Backup Exec education, page. You can share your ideas as well.

Technical Support

You can collect debug logs for any backup or restore related issue. You can connect to technical support assistance. You can can access to knowledge base, best practices and training and other features.

Help and Documentation

Help and documentation offers backup, restore and feature related guides and video education. You can find new releases and can check the current version of installed Backup Exec.

Related Post:

How to install Remote Agent for Windows Servers in Backup Exec 20.5

How to create NetBackup Policy and schedule?


How does Veritas Backup Exec work?

Here we’ll discuss the backup process and functionality of Veritas Backup Exec.

Veritas Backup Exec has a mechanism which takes place during backup and restore process. We’ll discuss below starting from backup job till the job finishes. Here is the process flow of the backup job.

First of all you need a server for backup and it could be the Backup Exec server (media server) itself or any remote agent server which you have already added. Then you create a backup job job and selection the storage device which could be disk / tape / dedup etec.

Post creating the backup job when it starts either the schedule or manual backup it gets executed. Then backup is initialized and checked the entire backup configuration and identifies the initiator and the target devices which includes sources server and destination storage devices and types of backup. Once the job is initialized it is dispatched to Backup Exec job engine (BE engine) and then BE engine takes over the backup operation.

Then it tries to locate the storage devices involved in the backup job. It also ensures that storage device is healthy and ready to perform backup operation.

Then it tried to establish a control connection which ensure that backup job is ready to give commands to storage device for data writing. Then it prepares and decides to pick up storage device like tape if tape library. If disk storage then it creates a media inside the disk storage to write the data.

Now it checks the backup selection list and excludes the files and folders which are not part of the backup. Then it takes a snapshot of the backup selection list and transfers the snapshot in form of data to the storage device to perform the writing.

Once the backup data is written to the storage device, the backup process performs a verification job post writing the data to ensure it all the data present in the selection list are have been written and are healthy and restoreable as well.

Post backup job completion the storage device which was mounted for data writing is released. Then database is updated. It also creates an index of the written data which is a catalog of data which has been backed up for future use. Then it reports that job status whether it failed or succeeded.

Post every operation being performed two log files are also created – Job history and Job log which actually has the detailed information of operation performed. Finally the backup job ends.

Related Posts:

Backup Exec 20 Installation Guide Step by Step

What is Veritas Backup Exec and How does Backup Exec work?

How to install NetBackup Administration console?

………………………………………………………………………………………..

Backup Exec 20 Installation Guide Step by Step

Here we’ll discuss Backup Exec 20.5 Installation step by step. It is important to keeps in mind the prerequisites while installing Backup Exec 20 to better performance.

While installing Backup Exec 20 we need to ensure that we meet it’s minimum system requirement for smooth performance and stability that includes hardware, software and other requirements.

Backup Exec server (Media Server) can be installed on 64 bit operating system only. It can not be installed on any windows core operating system like Windows Server 2008/2012/2012R2/2016. However, only remote agent can be installed on windows core operating system.

Backup Exec can not be installed on windows 2008 SQL or SQL express which is Read Only Domain Controller (RODC) role. In order to use SQL / SQL express it requires the local user account which Read Only Domain Controller does not allow. However if Backup Exec is installed on RODC server then remote SQL instance can be used for Backup Exec Database.

Remote Agent for windows also can not be installed on deduplication volume or ReFS volume.

Below are the additional requirement:

-Internet explorer 9 or later

-Intel 64, Xeon (64bit), AMD64, or compatible processor

-Screen resolution 1024 x 768

-SQL Express 2014 SP2 default instance for Database repository

-Minimum RAM 1 GB, recommended 2 GB or more

– 1.26 GB of Disk space for typical installation

-1.91 GB of Disk space for all options installation

Note: Disk space requirement depends upon the features, options and configuration being used. Additional space would also be required for Database, Catalogs and SQL Express.

Other hardware requirement include NIC card or Virtual network card, CD/DVD drive and a mouse

You can use storage device for data storage which are Disk storage (internal / external) / stand alone tape drive / Robotic Tape Library / Removeable storage devices and non – removeable hard drives.

Note: Backup exec included one tape drive with a robotic tape library by default however tape library with more than one tape drive, Backup Exec Library Expansion Option license is required.

For more details on compatible storage devices please visit: http://www.veritas.com/docs/000024527

Now lets start the Backup Exec 20 Installation

Before we start the installation of Backup Exec 20 we need to download the ISO image from Veritas website. If you have a CD/DVD drive then you can burn the ISO image to a cd/dvd and then insert it for installation. If you don’t have the cd/dvd drive in the server then you can use a third party software like Daemon and mount the ISO image as virtual drive for installation.

You can also mount the ISO image as a virtual drive if you are installing it on Vmware / hyper-v virtual machine:

Once you mount the ISO then you can click Open AutoPlay or Open

Post opening the virtual drive you find below option and click Browser for to start the installation

Then the next screen comes up like below. You can click for Getting started, Pre-instalation or Install Products if you want to know about these option.

To start installation you can click Installation option left side and then you get three option: Backup Exec, Backup Exec Agent for Windows and Simplified Disaster Recovery Disk Creation Wizard. To install Backup Exec, choose “Backup Exec”.

When you click Backup Exec then you get below option so click Install to begin installation

Once you click install then installation begins:

Next screen requires you to choose the license agreement then go next

During installation you get two option to choose Typical installation and Custom installation. Typical is regular installation and Custom options are as listed below

First phase of Backup Exec installation checks computer environment

The next window gives you the option to add the license which is optional. You can install it later also. By default Backup Exec comes with 60 days of trial and you can use all the agent and options.

The next window needs you to put admin password for Backup Exec administrator account which is different than your windows administrator account.

During Backup Exec installation it gives you the option to add one or more remote agent server which you want to backup. However this is optional and not mandatory now and can be done later as well.

Now the final installation begins which will take 20-30 minutes to finish

Now the installation completes

Post installation it requires a reboot

Post reboot of the server you see Backup Exec icon on the desktop

Finally here is the User Interface of the Backup Exec 20

This is the Backup Exec server which is also known as Media Server. Now post installing the Backup Exec software it is not ready to perform any operation. You need to configure storage devices.

You can also add remote servers which you want to backup / protect data. Any remote server which you want to add will require remote agent installation in order to communicate with Backup server.

Related Posts:

What is Veritas Backup Exec and How does Backup Exec work?

How to configure NetBackup storage unit and Storage device


What is Veritas Backup Exec and How does Backup Exec work?

Veritas Backup exec is a backup software which helps you protect your business environment which includes Windows, Linux and Virtual servers to storage devices like disk, tape and cloud.

https://technoworldnow.com/

Veritas Backup exec is a simplified backup solution suitable to protect small, medium and large scale of business environment. It offers very simple and easy to manage graphical user interface (GUI) which is easy to operate and optimize the day to day backup and restore operation.

History

Backup exec software was initially owned by Seagate Software in 1996. Later Seagate Software was acquired by Veritas Software in 1999 along with Backup exec. Now in 2005 Symantec acquired Veritas software including Backup exec.

In 2015, again Symantec separated it’s portfolio and it was decided that security software portfolio would remain with Symantec and Backup and other software would go to a new company formed which was named Veritas Technology Cooperation acquired by the Carlyle Group.

In year 2016 Veritas introduced itself as a new independent company which offered Backup exec, NetBackup and other software.

Backup exec versions of Veritas1999

  • VERITAS Backup exec 7.3
  • VERITAS Backup exec 8.0
  • VERITAS Backup Exec 8.6
  • VERITAS Backup Exec 9.0
  • VERITAS Backup Exec 9.1
  • VERITAS Backup Exec 10.0

Backup exec versions of Symantec 2005

  • Symantec Backup Exec 10d
  • Symantec Backup Exec 11d
  • Symantec Backup Exec 12
  • Symantec Backup Exec 12.5
  • Symantec Backup Exec 2010
  • Symantec Backup Exec 2012
  • Symantec Backup Exec 2014
  • Symantec Backup Exec 15

Backup exec versions of Veritas2016

  • Veritas Backup Exec 15 
  • Veritas Backup Exec 16

Backup Exec versions Veritas – 2017

  • Veritas Backup Exec 20.1
  • Veritas Backup Exec 21

Backup Exec Architecture

UI (user interface): is very simple and easy to manage which provide the all the option for day to day backup operation

Management service: is responsible for performing all the operation and allows all the changes which takes place with every transaction

Metadata service: is responsible for keeping the track of all transaction and segments which are created with each and every operation a user performs

Business objects : Separates the client from directly accessing the backup end

  • All client go through bemsdk to business object
  • Client don’t talk to bengine, adamm, BEDB, etc
  • Browsing is the exception

Backend:

  • Media server
  • Data Server
  • ADAMM
  • Backup Exec Database (BEDB
  • Catalog

Media server (Backup Exec Job Engine Service):

  • The component which actually runs the job
  • Business objects are used to submit jobs to media server
  • Media server talks with the data server to read the data, then talk with ADAMM to write it storage device.
  • Process name is “bengine.exe”

Data Server (Backup Exec Remote Agent for Windows System Service):

Actually reads the data from file system during backup and writes it to file system during restore.

Resides on the client machine (machine to be backed up or restored)

Process name is “beremote.exe ”

ADAMM (Backup Exec Device and Media Service):

Writes \ reads from the Tape or B2D

Implements the media mgmt rules

Process name is “pvlsvr.exe”

BEDB:

BEDB is hosted in Microsoft SQL Application

Stores backup and restore jobs, and all the job settings

Media settings are stored in this database

Managed by Backup Exec Server Service

Default location of Backup Exec database is C:\Program Files\Veritas\Backup Exec\Data folder

Catalog:

Contains meta data such as which file is backed up, on which tape and on which location it lies

Restore browse view comes from Catalog

Catalogs store the information in files and also on the media

Default location of Catalog is C:\Program Files\Veritas\Backup Exec\Catalogs folder

Backup Exec Services:

  • Backup Exec Remote Agent Service
  • Backup Exec Device and Media service
  • Backup Exec Server Service
  • Backup Exec Job Engine Service
  • Backup Exec Agent Browser Service
  • Backup Exec Error Recording Service
  • Backup Exec PureDisk File System Service
  • Backup Exec Management Service

Backup Exec Remote Agent Service (beremote.exe)

  • Gets invoked on receiving control connection request from job engine.
  • Gets selection lists and job options from job engine.
  • Reads the data from the Data Server.
  • Formats the data into Microsoft Tape Format (MTF).
  • Sends formatted data over data connection
  • Also includes Data Store Selection Service (DSSS) (not a separate Window Service).
  • Does not depend on any other BE service

Backup Exec Device and Media Service (pvlsvr.exe)

  • Also known as ADAMM
  • Applies media management rules
  • The Job Engine communicates with ADAMM for Device requests (mount / unmount)
  • Depends on SQL Server Service

Backup Exec Server Service (beserver.exe)

  • Provides BEMSDK services via RPC interface.
  • BEMSDK has a rich set of classes e.g CBemJobHistory, CBemreport.
  • Schedules and dispatches jobs.
  • Manages utility jobs such as inventory, Lock, Unlock
  • Manages the BEDB
  • Depends on Backup Exec Device and Media Service

Backup Exec Job Engine Service (bengine.exe)

  • Engine is an NDMP client
  • Gets the selection list and job options from beservice.exe
  • Controls the Job Execution
  • Acquired device from ADAMM
  • Connects to Data Server
  • Gets data from Data Server and writes to tape using ADAMM mover interface
  • Also gets metadata during the backup to update catalogs and UI
  • Depends on BE Remote Agent, Device and Media service and BE Server service.

Backup Exec Agent Browser Service (benetns.exe)

  • Is responding for advertising between media server and clients
  • It detects the resources published by the remote agent
  • It has the function of adding remote servers in the Favorite Resources node of Backup selection list
  • Allows the Backup Exec job engine to discover the Backup Exec agents that are available on the network (specifically UNIX, Oracle and Macintosh)
  • Depends on Backup Exec Server Service

Backup Exec Error Recording Service (bedbg.exe)

  • BEDBG is automatically installed as a service during the Backup Exec installation
  • Continuously monitors the Backup Exec processes
  • Logs are located at the default location C:\Program Files\Veritas\Backup Exec\BEDBG folder
  • This service does not depend on any other Backup Exec services

Backup Exec PureDisk File System Service

  • Process name is PDVFSService.exe
  • Provides Backup and Restore functionality via an installable file system service
  • Loads the PDvFS DLL and maintains and open connection to the PD/PDDE server(s).
  • Does not depend on any other BE service

Backup Exec Management Service

  • Process name is BackupExecManagementService.exe
  • Used to capture Telemetry information from users
  • Installation, Performance and configuration data is periodically transmitted to Veritas (anonymously)
  • Introduced from Backup Exec 2010 R3
  • Does not depend on any other Backup Exec services

Ports used by Backup Exec Services:

Ports used by Backup Exec Services

Uses TCP Dynamic port range between 1025-65535 for Data transfer from Remote server to media server

Also check :

Backup Exec Installation Guide Step by Step

How Veritas Backup Exec restore works?

Platform Supports:

Microsoft Windows:

Business Server 2008
Windows Server 2008
Windows Server 2008 R2 Windows small Business Server 2008 Windows Small Business Server 2011

  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019

Linux Server:

  • Redhat Enterprise Linux 7
  • Suse
  • CentOs
  • Ubuntu
  • Oracle

Virtualization Platform:

  • Hyper-V
  • Vmware
  • Esx

Storage Platform:

  • Disk Storage
  • OST Storage
  • SAN/NAS/DAS/NDMP
  • Dedup Concept
  • Robotic Tape Library
  • Stand Alone Tape Drive
  • AWS
  • Azure

Top Feature:

User friendly and very simple to use

Manage and protect your entire environment’s data from a single console

Minimize the requirement multiple devices

Manage your backup and restore with just a few clicks

Monitor you daily backup, restore and replication operation easily

Save time and reduce cost and complexity with simplified design and high performance

Supports all major cloud storage like AWS, Azure

Optimize and save storage cost with Deduplication storage support

Supports Instant Disaster Recovery across all platforms like windows, vmware.

With bare-metal restore option, minimize downtime and disruption

Support physical to virtual (P2V) and virtual to physical (V2P) disaster recovery

For more details please visit: ttps://www.veritas.com/protection/backup-exec

Related Posts:

How to configure NetBackup storage unit groups

How to create backup to Dedup storage in Backup Exec 20?

How to install Remote Agent for Windows Servers in Backup Exec 20.5