Copy locked files with Robocopy using /B parameter

    Question by:
    On

    Topics:

    Hello,
    I want to use the robust file copy utility Robocopy to backup the workstation of my small office network.

    The problem is this utility does not allow to copy files locked especially the files PST of Outlook.

    I am amazed because Robocopy allows the parameter / B which makes a copy in backup mode. But even with this parameter I have an error " ERROR 32 ( 0x00000020 ) ".

    What is necessary to make Robocopy able to copy locked files ?

    Any help will be very appreciated
    Good Question?
    0

    Featured Post

     Java Android Coding Bundle

    Whether you're an Apple user or Android addict, learning to code for the Android platform is an extremely valuable, in-demand skill. It all starts with Java, the language behind the apps and games that make Android the top platform it is today.

    Deal ends on 6/22!

    Top Expert Contributor

    Essential articles and videos from the Experts

    How to recover the deleted data from a formatted pen drive or USB

    Article by John Wilson

    USB flash drives -- pen drives, memory sticks, or USB drives -- are helpful useful to exchange individual information or data from one computer to another computer. Sometimes we format our data by mistake, and we lose all of the files from our pen drive. Now a user has a question: Is it possible to get back all formatted data from pen drive? How does one recover lost files and folders from a formatted pen drive? Yes, it is possible to recover lost files from a pen drive. First, we have to know how files store on our storage devices like hard disks or pen drives. Every storage device stores files and information in a tabular format called the File System, which helps the operating system to locate the files when user searches or open a file. File systems are like a bookshelf in a library, meaning it stores everything in the storage device in a very ordered way so that it perform fast when user requires it. Most commonly used Windows operating systems use FAT32 and NTFS to store the files. When we permanently delete a file from our storage device it is not actually deleted from the file system of the device. The computer file system removes the path of the file system to access that file. It show you that the space is free but system stores that file in binary format so it isn't overwritten by other files. If user want to recover file from the FAT or NTFS formatted file system, it is necessary that the drive is not overwritten by any other file. Now the user can recover their lost data from the USB. Recovery of any type of data is possible from pen drive if the user has the backup of deleted data but if there is no backup then user should have to try recovery software to retrieve the data. You can find some good recovery software from Internet: Recuva data recovery softwarePandora recovery softwarePhotoRec data recovery softwareUndeleted 360 USB data recovery There are lots of tools to recover a USB drive in some easy steps. You can use any of them and recover your deleted files from the pen drive.  

    Stop workplace bullying with email archiving

    Article by David Willis

    When you hear the word ‘bullying‘, it is usually associated with children’s behavior at school. Kids talk about it in reference to the actions of their peers, while parents talk about it out of concern for their offspring not being in a safe learning environment. When bullying makes the news, it is often associated with a violent school incident or some sort of tragedy. However, there does not seem to be much public awareness when it comes to workplace bullying and the damaging effect it can have on an employee’s morale and productivity. With the rise of the Internet, particularly email and social media, workplace bullying has seen a rapid increase over the last 10-15 years.  What is workplace bullying? According to the Workplace Bullying Institute (http://www.workplacebullying.org), “Workplace bullying is repeated, health-harming mistreatment of one or more persons (the targets) by one or more perpetrators that “includes verbal and nonverbal abuse that is threatening, humiliating, or intimidating. Workplace bullying is prompted “by perpetrators’ need to control the targeted individual(s), or initiated by bullies who choose their targets, timing, location, and methods.” Nonverbal workplace bullying often occurs over email or social media posts on something like Facebook. It is often referred to as ‘cyber-bullying’ or ‘trolling’. Some examples of workplace bullying include: Spreading malicious rumors about someone that aren’t true.Excluding someone socially in a deliberate fashion.Being intimidating towards a fellow employee.Deliberately undermining a person’s work.Physically abusing or threatening abuse.Removing someone’s responsibilities without cause.Constantly changing work guidelines.Giving impossible deadlines that sets someone up to fail.      Workplace bullying and email archiving The effects of bullying in the workplace via email and social media can have serious social, mental and economic impacts. This leads to clinical depression, anxiety and decreased job productivity. However, with a robust email archiving solution in place, perpetrators can easily be found out if they are using email and social media to bully someone. A company may not be able to fully control its employees’ cyber stalking, harassing and bullying, but it can enact a zero tolerance policy for such behavior and use email archiving as a tool to enforce it. With email archiving, all emails are stored within a central store, so evidence can be provided quickly if someone is accused of malicious conduct. Any email generated can be archived indefinitely so no one can harass another employee and expect to get away with it. The cyber trail created by email archiving also serves to minimize a company’s risk and responsibility for an employee’s bad behavior. Workplace bullying remains a worryingly common problem and online communication has only made worse. With an email archiver in place, however,  you can ensure that employees are able to provide evidence they are being bullied before it gets too serious and take appropriate disciplinary actions.

    Moving the Backup Exec 2012 Database to a New Server with a New Name

    Video by Rodney Barnhardt

    Make Windows 10 Look Like Earlier Versions of Windows with Classic Shell

    Video by Joe Winograd

    More valuable questions with Expert answers

    Unable to RDP To cloned xenapp servers

    Answer by jfortun

    Question: I have a set of Server 2008 R2 Xenapp 6.5 vmware VMs that were recently cloned. I am unable to RDP to these servers. The RDP connection appears to open- flashes a black screen- then closes immediately before asking for credentials with no error message or event log entry on their the source or destination server. RDP is running on 3389 and I am able to telnet to that port. I validated that the server is able to see licenses from our RDS licensing servers (I even removed and re-added the license servers). The RDP-Tcp listener is set to use any network connection. I also recreated the RDP listener. Windows firewall is not running on the target server. Citrix/ICA sessions to the servers work just fine. Any help would be appreciated.

    Answer: I did check the event log and there is nothing there. I had checked out the linked answer but my scenario is different- I have confirmed the server is listening on port 3389 as I can telnet to it. I am also not getting any errors regarding RDS Licensing- i am able to run the RDS licensing diagnosis and see plenty of available licenses. New symptoms: just now, while I was validating the "Restrict each user to a single session fix" i think i found a solution though I can't think of why this would work. All I did was logon via the vmware console once with my active directory credentials (not with the local admin credentials) and now RDP is working. I was able to replicate this on 6 of my newly cloned servers. I then restarted the servers and RDP failed again (with the flashing black screen and no error). Logging on and off again via the console restored RDP access.

    WIndows and iOS and th ecloud

    Answer by Gerwin Jansen

    Question: I have a windows desktop I like, and now I have a iOS device I like How can I have the two devices share certain documents (PDF, docx, text), in the cloud Thanks

    Answer: Dropbox is what you can use for that.

    EMC VNX storage pool Vs raid group question

    Answer by Vaseem Mohammed

    Question: I am trying to setup a raid group in vVNX and there is no option to create RAid grup and create lun from Raid. Looks like I can only create LUN from storage pool. Is some thing new or RAID is removed?

    Answer: RAID Group is automatically created when you create storage pool. check post here (https://community.emc.com/thread/118037?tstart=0)for more clarification.

    Exchange 2007 Distribution Lists Question

    Answer by Edward Pamias

    Question: This is regarding Exchange 2007 and its Distributions lists. I know it is possible to allow external senders to send to a distribution list by simply unchecking the box to allow anyone to email it I need to know is there a way to only allow one specific external domain to email a distribution group. I see nothing in the GUI to do this, however is there a power-shell command that can accomplish this? Thanks

    Answer: It still looks like transport rules is your best bet. From what I am seeing you can create a new rule where you can block email from outside your organization. I am reading if you go to mail flow and select create a new rule, then select the condition the sender is outside this organization, select audit, select enforce and then more options. From here you can configure the way you want. Other than that you may have to wait for one of our exchange experts to chime in here.

    201601-LO-Qu-076

    Extend your technology team with the Experts Exchange community.

    — trusted by —

    Who answers my questions?Our community has technology experts around the world.

    Anna Zvizda

    3

    Articles

    David Willis

    13

    Articles

    2

    Solutions

    Expert in:

    • Exclaimer
    • Office 365

    Carlos Ijalba

    3

    Articles

    129

    Solutions

    Expert in:

    • Storage-Other

    Carbonite

    3

    Articles

    1

    Solutions

    SelfGovern

    616

    Solutions

    Expert in:

    • Storage Software
    • Storage-Other
    • Disaster Recovery
    • Hardware-Other
    • Server Hardware

    Aaron Tomosky

    1,960

    Solutions

    Expert in:

    • Hardware Firewalls
    • MS SQL Server
    • MySQL Server
    • Networking Hardware-Other
    • Networking-Other

    Mahesh

    2

    Articles

    1,374

    Solutions

    Expert in:

    • Active Directory
    • Windows Server 2008
    • Windows Server 2012
    • DNS
    • Exchange

    Tony Giangreco

    1,214

    Solutions

    Expert in:

    • Storage Software
    • Windows Server 2008
    • Active Directory
    • Anti-Virus Apps
    • Components

    yo_bee

    1

    Articles

    577

    Solutions

    Expert in:

    • Active Directory
    • Windows Server 2008
    • Exchange
    • MS Server OS
    • Outlook

    RELATED TOPICS view all topics

    1. Storage-Other
      (41,032)
    2. Exchange
      (196,385)
    3. Windows Server 2003
      (128,727)
    4. Disaster Recovery
      (7,217)
    5. Windows Server 2008
      (81,303)
    6. SBS
      (58,241)
    7. Storage Hardware
      (17,064)
    8. Server Hardware
      (26,199)
    9. Windows XP
      (118,152)
    10. VMware
      (31,382)