The Computer plug-in is used to work with local computer′s file system. It can be used as both source of data and storage destination.
Files and folders of the plug-in file system correspond to common files and folders. They support all attributes, such as file size, creation time, modification time, and other.
The plug-in can back up open files, i.e. files that are locked by other applications. This is made with the use of the Volume Shadow Copy Service. If you want to back up open files, then you need to have this service running on your system.
Using Computer Plug-in as Data Source
The Computer plug-in is the main way to back up local files and folders.
To add data to backup set, follow these steps:
You can find more information about selecting data for backup in the Specify Backup Set chapter.
Using Computer Plug-in as Destination
Using the Computer plug-in as storage (i.e. copying backups to a local folder) is made in a very straightforward way. After selecting data for backup, you need to select destination.
To select a local destination, follow these steps:
You can read general description of this step of the New Task Wizard in the Select Destination chapter.
Using Computer Plug-in in Restore Tasks
General scheme of restore task creation is as follows:
If you want to restore your files to a different folder, follow these steps:
After verifying paths of restoration, you need to select type of restoration, enter decryption password (optional), and name the task. These steps are not specific to the Computer plug-in. To learn more, please see Restore Task.
Mounting a Protected NAS Unit via the Computer Plug-in
To use a mapped drive on a NAS unit protected by password, you can mount its drive via the Computer plug-in, as described in the next instruction.
You can use this mapped drive as usual storage device.
Note: The program will unmount a drive automatically after finishing a task wizard. Starting from this point, Handy Backup will mount a drive every time before executing this particular task, and unmount it after finishing a task. This approach adds to security of protected data.