198
Copyright © Acronis, Inc., 2000-2010
Exclusion examples
Criterion
Example
Description
By name
File1.log
Excludes all files named File1.log.
By path
C:\Finance\test.log
Excludes the file named test.log located in the folder
C:\Finance
Mask (*)
*.log
Excludes all files with the .log extension.
Mask (?)
my???.log
Excludes all .log files with names consisting of five symbols
and starting with “my”.
6.2.7
Archive
Specify where the archive will be stored and the name of the archive.
1. Selecting the destination
Enter the full path to the destination in the
Path
field, or select the desired destination in the
folders tree.
To back up data to a centralized vault, expand the
Centralized
group and click the vault.
To back up data to a personal vault, expand the
Personal
group and click the vault.
To back up data to a local folder on the machine, expand the
Local folders
group and click the
required folder.
To back up data to a network share, expand the
Network folders
group, select the required
networked machine and, then click the shared folder. If the network share requires access
credentials, the program will ask for them.
Note for Linux users:
To specify a Common Internet File System (CIFS) network share which is mounted on a
mount point such as
/mnt/share
, select this mount point instead of the network share itself.
To back up data to an
FTP
or
SFTP
server, type the server name or address in the
Path
field as
follows:
ftp://ftp_server:port _number
or
sftp://sftp_server:port number
If the port number is not specified, port 21 is used for FTP and port 22 is used for SFTP.
After entering access credentials, the folders on the server become available. Click the
appropriate folder on the server.
You can access the server as an anonymous user if the server enables such access. To do so, click
Use anonymous access
instead of entering credentials.
According to the original FTP specification, credentials required for access to FTP servers are transferred
through a network as plaintext. This means that the user name and password can be intercepted by an
eavesdropper using a packet sniffer.
To back up data to a locally attached tape device, expand the
Tape drives
group, then click the
required device.
2. Using the archives table
To assist you with choosing the right destination, the table displays the names of the archives
contained in each location you select. While you are reviewing the location content, archives can
be added, deleted or modified by another user or by the program itself according to scheduled
operations. Use the
Refresh
button to refresh the list of archives.