Best backup practices and recovering lost data.
Backup and Recovery
Tyson wants to know if using a torrent is a good way to send files across the country. Leo says it is, but he'll want to use a standard called BitTorrent Sync. Resilio Sync is the app to use. Then he can drop the files into the folder, send him the torrent link, and it will sync both computers automatically.
Rick just upgraded to a Surface Pro with an i7 and tons of great specs. How does he move all his programs and data as easily as possible? Leo says programs are not easy at all and there's no decent tool that can do it. Data is the exact opposite — it's easy as pie. But Windows installs program files all over the place, making it difficult to move an entire program package to a new computer. That can cause what Leo calls "DLL hell" because he'll eventually get a warning that a DLL file is missing. It can also cause problems with other programs and even crash the computer.
Gary is an attorney and has heard of a business product called LockBin that promises to encrypt his data. Is it legit? Leo says that there are limits of privacy with an encryption service. If the service can give him his password, then it has access to all his data and it's not really reliable. If they can't give him the password because only he knows it, then he's in good shape. The downside, though, is that if he forgets it, he's out of luck.
In a move that is causing concern with privacy advocates, Apple has announced it will store iCloud recovery keys in China. Leo says that it's really no different from what Apple does here, but it will make it easier for the Chinese government, or any government for that matter, to gain access to someone's data. Apple does protect your privacy from selling to advertisers, but if the government really pushes, Apple will cave to what they consider an "appropriate" law enforcement request.
Brian wants to know how safe online encryption is. Leo says that as long as he has the only encryption key, he's safe. But if he doesn't even trust that, then Leo suggests using his own Network Attached Storage. Leo uses Synology, and he syncs it to all his computers using the web.
Don recently got a used PC, but it's locked with a password. Since the password prompt comes up after the PC has loaded Windows, Leo says it's easy to wipe it and reinstall the operating system. All he needs to do is download the Windows 10 installation tool from Microsoft called the "Media Creator's Tool", and put that on a thumb drive. Then he can boot to that drive, format, and reinstall it from there.
Rene is having trouble updating Windows. It stalls out at 80%. He then reboots and it goes back to before he tried updating. Then he gets a blue screen and he can't restore or update. Leo says that not an unusual problem. If you think about it, with millions of computers, there's going to be a certain percentage that will experience issues like this, and updating while a computer is running is nontrivial. It could be something is blocking it, like a third-party antivirus app. It could also just be a bad download. Or this could be the Intel Spectre/Meltdown fix that is causing problems.
Carl has made backup flash drives, but he can't read the Word Office files that are on them. Leo says that the files are .DOCX files created by Word and he'll need to open them with Word. Instead, what he's seeing is "word salad" which is Word format commands that tell the software what fonts to display, indents, margins, etc. So if his other app doesn't understand the format, he should try using Word's built-in backup solution, then restore it with the other copy of his app. There could be something that gets corrupted in the transfer by just dragging and dropping.
Christian is installing new computers at his accounting company. He's going to be transferring the data from one computer to another and wants to know if Google Drive will work. Leo says absolutely not. There are serious privacy issues handling a client's financial information and personal details. Carbonite is a better option that is encrypted. He'll want to be sure that the data is not only encrypted at the destination but also in transit and that the keys are well controlled, ideally only by him.