- What platforms can MyProBackup support?
- Where is my data stored?
- May I use MyProBackup to back up a laptop?
- What is the optimal configuration for the best data protection?
- How long does it take before the restore download begins?
- Where do I find my log files?
- Will MyProBackup continue to run when users are logged out or logged in as a different user?
- What type of encryption does MyProBackup™ use?
- Is MyProBackup™ HIPAA compliant?
MyProBackup™ is cross-platform, client backup software that runs on your hardware. With the MyProBackup™ software installed, you can back up any computer to our servers. MyProBackup™ runs equally well on Windows, Mac, Linux and Solaris!
Your MyProBackup™ client software will backup to a server that we host for you in our datacenters. This is an affordable option for your offsite, mission critical backup and requires zero setup on your behalf.
Yes. Backing up a laptop is uniquely challenging. Having less memory, CPU, and I/O performance than their desktop and server brethren, they also operate in a wide variety of network conditions. MyProBackup™ is designed to address these challenges in a continuous, quiet background operation providing unsurpassed laptop protection.
MyProBackup™ works over any network connection, including the Internet. As long as your MyProBackup™ client is Internet-accessible, your laptop is backed up regardless of location. Full communication and data transfer encryption provides secure protection in the office as well as on the road. Coffee shops, airports and hotels - any place with an Internet connection is now a protected location for your hardware.
For the best data protection, these are the settings you want:
- MyProBackup will always run.
- Keep unlimited versions.
- Never remove deleted files (or at least give them a month).
- Watch the file system in real-time.
- Back up changed files after 15 minutes or less (5 is even better).
- Verify backup file selection every 1 day at a time when the computer is usually on.
If MyProBackup consumes too much network or CPU while you are using the computer, go to the Network or Advanced tabs and throttle the settings appropriately to slow it down. It's much better to throttle than limit MyProBackup's ability to run.
The files selected for restoring begin downloading as soon as you click restore.
- Open up the CrashPlan Desktop UI on the relevant machine.
- Go to the Backup tab.
- Double-click the CrashPlan logo in the upper-right corner.
- Type dump all. The text will appear in the lower left corner.
- Press Enter. That causes client state to dump to the service log file for easy reading.
- Navigate to the log directory (locations listed below).
- Archive the log directory and send to support.
Log file locations:
- Mac: /Library/Logs/CrashPlan
- Windows: C:\Program Files\CrashPlan\log
- Linux (default): /usr/local/crashplan/log
If you are using a Windows computer, MyProBackup will always continue to back up because it runs as a background service only (for now).
If you are using a Macintosh computer, MyProBackup will always continue to back up unless it was specifically installed as “Run as User”.
CrashPlan uses 448-bit Blowfish to encrypt your files.
Blowfish is an encryption algorithm. It's a freely available, documented and open method of encrypting data. Open is very important. This means that the processes it uses are public and can be tested by everyone and are proven to be secure. Blowfish was invented by a security expert named Bruce Schneier. More information is available online here.
448-bit is the length of the key. The longer the key, the harder it is to decrypt data. Online banking uses 128-bit keys. We're much stronger than online banking.
Put simply, if someone ever got a hold of your backup archive, you wouldn't need to worry about it. They would need your password and encryption key to decrypt your data. The methods we use to encrypt your data are superior to those used in online banking and most businesses.
Yes. Data is backed up symmetrically at the source and cannot be decrypted at the destination without the user's password.