Archive for 2016

Gmail SMTP Configuration for Backup Alerts

If you plan to use a Gmail email account for sending email alerts, the configuration requires two steps. First visit https://www.google.com/settings/security/lesssecureapps and able “less secure apps”. This step is only necessary once: Then enter the Gmail settings in BackupChain’s Log Options tab as follows: SMTP Server: smtp.gmail.com Port: 587 Sender’s email address and User Name: […]

Ubuntu VM Hyper-V Backup and What You Need to Know for Linux Support

In order for Ubuntu virtual machine live Hyper-V backup to work properly, you need to install Hyper-V’s Linux Integration Services. Download the currently latest version 4.1 at https://blogs.technet.microsoft.com/virtualization/2016/03/21/linux-integration-services-4-1/   Then run the commands: Sudo apt install hv-kvp-daemon-init linux-tools-virtual-lts-xenial linux-cloud-tools-virtual-lts-xenial   Then reboot the VM.      The ISO and RPM files can be downloaded here: https://www.microsoft.com/en-us/download/details.aspx?id=51612   How […]

How to Fix: The semaphore timeout period has expired, Error 121

If you encounter the Windows Error: 121, “The semaphore timeout period has expired”, this could have several potential origins: It could be a hardware connection issue, to or from the drive, such as its physical connection. Beyond that it could be a network issue, as described in Microsoft’s KB 325487 https://support.microsoft.com/en-us/kb/325487 The network issue may be […]

Server Administrator’s Checklist: Manual Server Monitoring

Below is a general checklist aimed for basic server administration and server monitoring when done by hand: When you unpack a new server Hardware defects with brand-new servers and PCs are unfortunately not uncommon. To be certain your hardware is in good condition before you put your server in production: Run chkdsk with /b on […]

Protection Against Ransomware, CryptoLocker, Trojans and Viruses

In this article we describe how to protect against ransomware, CryptoLocker, Trojans, viruses, and other forms of digital vandalism. How to Protect Your Data Against Attacks Depending how your infrastructure is set up and what kind of virus strikes you may be able to recover from it; however, having a server backup is usually not […]

Server Manufacturers

Dell
HP
Intel
IBM
Cisco