Mechanisms for backing up at least a portion of storage at a primary computing system to a backup computing system. The primary system identifies primary memory block(s) that have altered content since the time of a last backup. For each such primary block, the primary system estimates whether or not the altered content of the primary block is the same as content of another primary block as the content existed at the time of a specific backup. If they are the same, the primary system backs up the corresponding block by simply informing the backup system of the matching content, and having the backup system write the matching content of other backup block over the respective backup block, rather than transferring the entire block contents.
Hash-Based Data Block Processing With Intermittently-Connected Systems
Methods are provided for detecting the processing status of data blocks in systems having intermittent connections. A hash value is used at times in place of a block's data content, thereby reducing processing of the block. Hash values may be maintained locally. Blocks collected locally may be stored locally at least until a connection to a server becomes available again. Systems and configured storage media are also provided.
Detecting And Removing Rootkits From Within An Infected Computing System
A computing system configured to detect and/or remove a rootkit. For detection, a snapshot component takes a snapshot of a storage unit. A rootkit detection component accesses an enumeration of individual files stored on the storage unit using an alternative file system I/O to detect the presence of a rootkit. For removal, the location of a rootkit is identified and a computing system shutdown is initiated. A snapshot component pauses the shutdown operation prior to the completion of the shut down and takes a snapshot of a file storage unit. A rootkit repair component accesses the identified location of the portion of the file storage unit containing the rootkit and modifies the portion of the snapshot of the file storage unit so as remove the rootkit.
Reducing The Probability Of Undetected Collisions In Hash-Based Data Block Processing
Methods are provided for detecting the processing status of data blocks. A hash value is used at times in place of a block's data content, thereby reducing processing of the block. Superblocks and superblock hash values are used to manage collisions between hash values of individual blocks, in order to reduce or eliminate the risk that blocks having different content will be treated as though they have the same content merely because they have the same hash value. Systems and configured storage media are also provided.
Defragmentation of a file system. Multiple files within the file system may be fully or partially defragmented with respect to the physical storage system containing the physical file system. The defragmented files include at least one file that represents a virtual storage system. That virtual storage system file contains a number of sub-files that represent files (i. e. , virtual files) of the virtual storage system. These virtual files are not files managed by the physical file system, but are files recognized by a virtual file system managed by a virtual machine running on the physical machine. The defragmentation of the virtual files occurs using knowledge of the unordered nature of the allocation segments that make up the virtual storage system file. Accordingly, after defragmentation, the files of the physical file system and the virtual file system are more defragmented with respect to the physical storage system, while not requiring a shut down of the virtual file system.
Tracking of memory block relocation when write occur to memory blocks. After detecting a write operation to be performed on a particular target memory block, it is identified whether the write operation is due to a relocation of data from another memory block. Depending at least in part on this result, the modified data may not need to be included in a subsequent incremental backup. If appropriate, relocation data is included instead. This may potentially reduce the size of the incremental backup, especially in cases in which there were many memory block movements since the last backup, as is the case with defragmentation.
Russell Stringham - Orem UT, US Paul Madden - Lehi UT, US Jonathan Ludwig - Lehi UT, US
Assignee:
Symantec Corporation - Mountain View CA
International Classification:
G06F 7/00
US Classification:
707646, 711162
Abstract:
Mechanisms for generating an incremental backup of a set of data blocks while excluding certain files that are less desired to be backed up. Examples of such files include temporary Internet files and the recycle bin. This allows the size of the incremental backup to be reduced significantly since such undesired files are often changed between backups. The incremental backup is constructed by first calculating which data blocks should be included in the incremental backup. The calculation is a function of at least the identity of which if any of the data blocks in a prior snapshot have been or would have been altered as a result of potential file alterations in the prior snapshot, and/or which if any of the data blocks in the subsequent snapshot have been or would have been altered as a result of potential file alterations in the subsequent snapshot.
Running A Virtual Machine Directly From A Physical Machine Using Snapshots
Embodiments of the present invention are directed to the running of a virtual machine directly from a physical machine using snapshots of the physical machine. In one example, a computer system performs a method for running a virtual machine directly from a physical machine using snapshots of the physical machine. A snapshot component takes a snapshot of the physical system volume while the physical system volume is in an operational state. The virtual machine initializes using the physical system volume snapshot thereby allowing the physical system volume snapshot to be a virtual system volume snapshot representing an initial state of a virtual system volume. The physical system volume snapshot includes instances of all the files within the physical system volume at the time the snapshot was taken.
Russell Stringham 1969 graduate of East Meadow High School in East meadow, NY is on Classmates.com. See pictures, plan your class reunion and get caught up with Russell and other high school alumni
Russell Stringham 1972 graduate of Westchester High School in Los angeles, CA is on Classmates.com. See pictures, plan your class reunion and get caught up with Russell and other high school alumni