bvckup2.com Open in urlscan Pro
37.35.106.94  Public Scan

URL: https://bvckup2.com/
Submission Tags: falconsandbox
Submission: On August 26 via api from US — Scanned from CH

Form analysis 0 forms found in the DOM

Text Content

Bvckup 2
Download Purchase • Features Opinions • Articles Blog • Support Customer login



SIMPLE FAST BACKUP

Light, versatile and very capable software for professional data replication.
Select a pair of folders and it will make sure that one stays an exact copy of
the other.
Download
Includes a 2-week trial


WHAT'S DIFFERENT


IT'S FAST

With fully asynchronous IO, ultra fast delta copying and multi-threaded
processing the program is expressly built for speed.


IT'S ROBUST

From massive data sets with millions of files and terabytes of data to small
personal jobs Bvckup 2 easily accommodates replication tasks of all sizes.


IT'S REFINED

The user interface is a first-class feature of the program. Light and eloquent,
it is painstakingly designed to keep things simple and convenient.
Made in Switzerland


FEATURES AT A GLANCE


LOCAL DRIVES

Local storage devices of all major classes are supported - fixed, removable and
emulated.

Their exact type and properties are detected automatically and used to adapt the
copying pipeline for maximum performance.


DEVICE TRACKING

Backups can be pinned to specific removable devices so that they will run only
when these devices are present.

They can also be set to run on device arrival.


NETWORK SHARES

Remote storage devices accessible via the SMB protocol are supported just as
well.

This includes anything from home routers with USB sticks to proper NAS devices
to enterprise-grade storage filers.


SHARE MONITORING

Shares are automatically connected as soon as they become accessible. Shares
going offline are also detected and handled accordingly.

Share credentials can be configured if needed.
Copying


ASYNCHRONOUS I/O

With its ultra-low-overhead fully parallel data transfer the program can extract
every bit of performance from participating devices.


IO THROTTLING

Disk load can be controlled with the help of a fair weighted scheduler, shaping
just a single backup or spreading the load across multiple.


DELTA COPYING

Delta copying is a method of updating existing files that skips over any
unmodified parts and copies over only blocks that actually change.

It helps dramatically cutting down processing time of very large, but
slowly-changing files like VM images, encrypted file containers and even raw
photos.

More on this...


WRITE VERIFICATION

The program can be set to read back all written file blocks and compare them to
the originals to detect any in-flight corruption.


SHADOW COPYING

Files locked for exclusive use by other running programs can be copied using
Windows native shadow copying service.


TIMESTAMPS, ETC.

Timestamps, attributes, security information (Owner, Group, DACL, SACL) and
alternate data streams (ADS) can be copied as well if needed.


ABORT AND ERROR RECOVERY

For file updates that are interrupted part-way through the program will
automatically check the file on the next run, recover as much of its data as
possible and continue the copying.

That is, file copying is resumable.
Scheduling


REAL-TIME BACKUPS

Source location can be monitored continuously and backups executed as soon as
any changes are detected.


SERIALIZED OR CONCURRENT

Backups can be sorted into scheduling queues to be run one by one, with queues
themselves serviced in parallel with each other.


QUIET PERIODS

Backups can be suppressed at specific times to not interfere with other tasks on
the machine.


PERIODIC BACKUPS

Backups can also be set to run periodically at fully customizable intervals, and
with the first backup potentially set in the future.


ON DEVICE ARRIVAL

The program can run the backups as soon as their source or target device is
plugged into the computer.


MANUAL AND SIMULATED

Any backup can be run manually at any time. Simulated "dry" runs are also fully
supported.
Scanning


AUTOMATIC FILE SYSTEM TESTING

File system volumes are tested to detect their capabilities and effective
timestamp resolution.

Knowing the resolution is essential for accurate detection of modified files
residing on different file system volumes.


FILE INDEX CACHING

Once the file index is compiled, it can be saved and reused on subsequent runs,
eliminating the need for re-scanning the backup.


REPARSE POINTS AND SYMLINKS

Flexible policies to control the traversal of symlinks and reparse points.


FAST PARALLEL SCANNING

When building a list of files at a location, the program processes multiple
folders at once.

This makes for a little miracle when scanning ultra fast local drives and remote
shares over slow networks.


LONG PATHS

All file system operations are carried out using long path notation, which
supports paths of up to 32,767 characters in length.


FILE AND FOLDER FILTERING

Comprehensive support for defining file sets based on inclusion and exclusion
rules.
Planning


LOGICAL AND PREDICTABLE

Every backup run comprises three distinct phases - scanning, planning and
execution.

No action is taken until the program has a complete list of everything it plans
to do.


MOVE/RENAME DETECTION

The backup planner can recognize less obvious changes, such as renames and
moves, for what they are and replicate them accordingly.


ARCHIVING OF DELETED ITEMS

Backup copies of items that are deleted at source can be moved to a special
folder and deleted from there after a grace period.

They can also be retained there indefinitely.


ARCHIVING OF MODIFIED FILES

Backup copies of files modified at source can be archived as well, creating a
history of past file versions.
* Similar to the Safety Net feature of the Carbon Copy Cloner
Management


SYSTEM SERVICE MODE

The program can be switched to run as a system service so that the backups would
continue running even if no one is logged in.


COMMAND-LINE CONTROL

Backups can be controlled and their status queried through the command line.


COMPREHENSIVE LOGGING

Detailed logs are maintained for all backups and the program itself, including
full support for both size and age-based log rotation.


EMAIL REPORTS AND ALERTS

Email alerts can be dispatched upon backup's completion, including the run
summary, logs or just a list of errors.


PRE/POST-BACKUP SCRIPTING

Custom commands of arbitrary nature can be executed before and after each backup
run.


SOFTWARE UPDATES

Built-in mechanism for checking and optionally installing updates, including
"stable", "newest" and custom channels for managed site installs.


SAFEGUARDS

Backups can be set to abort on any changes to a "canary" file or when the amount
of changes exceeds specified thresholds.
Meta


RIGOROUSLY ENGINEERED

Bvckup 2 is written in a way and to the standards typically employed in
development of low-level, embedded and system software.

It puts strong emphasis on using simple clean code, keeping resource usage in
check and running as close to the hardware as possible.


ROBUST AND MATURE

Since its first release back in 2014 the program has been in a routine
production use handling all kinds of jobs for thousands of our clients from more
than 80 countries around the world.


MINIMAL DEPENDENCIES

Bvckup 2 ships as single executable with no dependencies on any external
frameworks, third party components or system services (with an exception of
shadow copying).

It can also run without full Admin privileges, though, of course, it can do more
with them.


COMPACT CONFIGURATION

All program settings are stored in plaintext INI files in a single configuration
folder that can be easily relocated if required.
See the complete list of features...


USER INTERFACE

Main window



THE BACKUPS

Each servicing a pair of
source and destination
directories


THE LOG

Details of all backup activity.
More on this below.


THE CONTROLS

Two buttons to start, stop,
pause, resume, enable and
disable the backups.


WHEN IDLE...

Description

Status

Last run

Backup statistics


WHEN RUNNING...

Description

Current step

Overall progress

Step progress

To re-arrange the jobs -
just click and drag
Dark mode supported


Backup configuration
Summary view
Summary view
First things first


PRINCIPAL OPTIONS

Quickly adjustable with
a couple of clicks
More options


SECONDARY OPTIONS

All on a single page
for a fast overview
Connoisseur's delight


THE RABBIT HOLE

Over 80 advanced options covering all other elements of backup configuration
Exclusions & inclusions


POINT-AND-CLICK FILTERING

Fast and intuitive


MANUAL WILDCARD FILTERS

Pre-populated with
common exceptions
Exclusions & inclusions


EASILY EXTENDED

with custom rules
Email alerts


TEMPLATED ALERT MESSAGES

With over 80 variables covering all aspects of the program and backup state,
configuration and operating environment.
Drives & shares


NETWORK SHARE ACCESS

Includes credentials and connection preferences


DEVICE TRACKING

Allows pinning backups to
a specific storage device
Ejection & throttling


DEVICE AND MEDIA EJECTION

Allows disconnecting external
drives and ejecting removable
media after a backup


IO THROTTLING

Limits the read/write speed of
one or more backups using fair
weighted queueing


Log viewer


HIERARCHICAL LOGS

Quick summary for
an at-a-glance inspection ...


HIERARCHICAL LOGS

Quick summary for at-a-glance inspection ...


HIERARCHICAL LOGS

... with all the details a click
away when you need them.



ERRORS

Errors are shown automatically by expanding preceding parent entries.


TROUBLESHOOTING

Error details are logged as well. In many cases a human-friendly explanation is
also included.



UP AND DOWN

Hovering mouse cursor over an error line reveals a pair of arrows for quickly
scrolling through all errors in the log.


JUST THE GOOD BITS

Alternatively, the errors-only view can quickly surface all errors in a simple
and concise way.




WE TREAT THE USER INTERFACE AS A FEATURE IN ITS OWN RIGHT

Clean and expressive. A pleasure to use. How the UI looks and feels is just as
important as how it functions.

Our development blog covers several years worth of screenshots, sketches and
experiments. Some made it into production, others - didn't, but they all were
instrumental to shaping Bvckup 2 into what it is today. Check it out here...


WHAT PEOPLE SAY

The pedal-to-the-metal mindset of a command-line tool with a beautifully
functional graphical user interface. Erez Zukerman, PCWorld.com
One of the most usable backup tools ever. Not hiding what software does, but
instead, showing the backup process in a way that makes sense. Anonymously, via
in-app feedback
This is one of the best designed utilities I've used in nearly 30 years of being
an IT professional. Simple, intuitive, powerful and just works every time. Well
done, and thanks! Mark G., via in-app feedback
Amazing attention to detail and simply wonderful to use. One of the best windows
apps I have ever used. Period. Mike B., via in-app feedback
Holy sh#t... just tried bvckup2 on the same directory. Went from 13 mins 29 secs
to 1 min 9 secs to move the same data! Courtesy of /r/sysadmin
Read more...


GIVE IT A TRY

Download Release 82  /  3.35 MB
Includes 2 weeks of evaluation period
Requires Vista / WS 2008 or newer

Looking for the last beta?


GET IT LICENSED

Purchase
Windows Server license
Windows desktop license


149.99 USD
49.99 USD




See the feature matrix




NEWS AND UPDATES

Every once in a while we send out a short newsletter that covers new releases,
planned features and related matters. We also use it to solicit opinions on new
ideas and to recruit beta testers.

Subscribe to the newsletter
For more frequent development updates consider subscribing to the RSS feed of
our development blog. All updates are also cross-posted to our Twitter account
and bvckup2 sub on Reddit.




QUESTIONS?

Get in touch - hello@iobureau.com
Made by IO Bureau in Switzerland

Support Forum
Email

Updates Newsletter
Blog & RSS

Follow Twitter
Reddit

Miscellanea Press kit
Testimonials

Company Imprint
Contact us

Legal Terms
Privacy

4 8 15 16 23 42 73



LAST BETA

In addition to the production version that is actively developed and supported,
we made the last version from the beta testing cycle available for download.

The last beta requires no license, it is free to use, perpetually with no
restrictions or time limits.


CAVEATS

 1. The last beta was released in April 2014.
 2. It receives no updates.
 3. None of its installations receive any technical support.


To download the last beta use this link.