Copy Options
- Use Windows Volume Shadow Copy Service (VSS) to copy open files
- Identify the process that is blocking access to a file
- Transfer access permissions of files and folders
- Move source files to destination folder
- Transfer attributes of source files to existing destination files
- Transfer upper- and lowercasing of the source files to existing destination files
- Transfer file date and time after copying
- Activate the NTFS file compression for the copied destination file
- Delete destination file when the source file can't be copied without any errors
- Before copying a file monitor the file size for any changes
- Verification Check (of the content of copied files)
- Method for Comparing Contents
Use Windows Volume Shadow Copy Service (VSS) to copy open files
This option enables all open files to be copied for which error 32 or 33 would be returned in the log. The option is available from the AllSync Professional Edition.Please note the following when using this option:
- AllSync must be started with full administrator rights.
Windows Volume Shadow Copy Service (VSS)
may not be deactivated. The startup mode of the service must be set tomanual
orautomatic
.- Only the open files of local drives can be copied. Network drives, removable disks and other connected drives are not supported.
- The open files must be located in a source folder.
- Drives formatted with FAT32 are not supported unless another local NTFS drive is present.
Identify the process that is blocking access to a file
This option automatically determines the Windows process that is blocking access to a file if error 32 or 33 occurs while copying a file or error 103 occurs while compressing a file. When copying a file, the source file is checked first. If this is not blocked, then the destination file is checked next. When compressing a file, only the source file is checked. The following information about the blocking process is displayed in the log immediately after the error message:- The name of the process
- The process ID
- The complete file path of the process
Transfer access permissions of files and folders
This option enables you to transfer the access permissions of files and folders to their destination counterparts. To this end, the partitioning of the source and destination data items has to be done using NTFS. When theonly when creating and copying files
option is activated, permissions are not transferred unless a file/folder is copied to the destination.
The option is available from the AllSync Business Edition.
- If you want to transfer access permissions on the local machine, you have to be logged on as the administrator and possess the requisite read and write permissions for the source and destination items.
- If you want to transfer access permissions between two computers in the network the computers have to be registered in the same domain. You also have to be logged on as the domain administrator and possess the requisite read and write permissions for the source and destination items.
Move source files to destination folder
This causes the source files being copied to be moved to the destination folder. You can also specify that empty source folders are to be deleted:- Delete all source folders that are empty after being moved
- Delete all source folders that were empty prior to being moved
Transfer attributes of source files to existing destination files
This option enables you to transfer the attributes of a source file to an existing destination file during a copy operation. The attributes aren't transferred unless the source and destination files are identical on the basis of the copy rules.Transfer upper- and lowercasing of the source files to existing destination files
This option enables you to transfer the modified upper- and lowercasing of a source file to an existing destination file during a copy operation. The modification is not made unless the source and destination files are identical on the basis of the copy rules.Transfer file date and time after copying
This option causes the created and modified date of the source file to be transferred to the destination file after copying.Delete destination file when the source file can't be copied without any errors
This option causes the destination file to be deleted when an error occurs while copying the source file or the Verification Check fails.Activate the NTFS file compression for the copied destination file
This option activates the NTFS file compression for the copied destination file.Before copying a file monitor the file size for any changes
This option causes the file to be copied to be monitored for any change in its size in a specified interval. The file isn't copied until no more changes in the file size have been detected.Verification Check (of the content of copied files)
With this option, a content comparison between the source and target files is carried out after copying. An error message will show in the log if the two files are not identical in content. In addition, you can specify that no content comparison should be carried out above a certain file size. The option is available from the AllSync Professional Edition.Method for Comparing Contents
This option enables you to specify the method used for performing a content check comparison between two files. Comparison is subject to the two files having the same file size.Automatically determine the most optimal method
This option enables the best comparison method to be automatically determined for each source and destination folder pair. Thebyte-by-byte
comparison method is used when the source or destination folder is recognized as a network folder.
Otherwise, the SHA copy method is always used.
Comparison Methods
Method | Description |
---|---|
byte-by-byte | A comparison of the entire file is done by reading data packets one by one and comparing them. |
CRC32 (32-bit) | This causes a CRC32 checksum of the contents of each file to be computed and then compared. |
MD5 (128-bit) | This causes an MD5 checksum of the contents of each file to be computed and then compared. |
SHA (160-Bit) SHA (256-Bit) SHA (384-Bit) SHA (512-Bit) | This causes an SHA checksum of the contents of each file to be computed and then compared. |
byte-by-byte
method provides for the highest degree of certainty and reliability when it comes to a content comparison.
The accuracy of other methods decreases in keeping with the decreasing bit rate.