Wednesday, 23 January 2019


How it works




With In-File Delta technology, it is now possible to backup very large files daily. There are two different modes of operation available (“Differential” and “Incremental”) for In-File Delta backups. Both modes will use approximately the same amount of disk space storage on the server.

Differential Delta Mode

“Differential Delta” will facilitate ease of restore. The delta is generated by comparing with the latest uploaded “Full” file so the delta file can grow daily and uses more bandwidth during backup. For restoration, the full file and a single delta file is required to restore the file to a specific point-in-time.

Incremental Delta Mode 

“Incremental Delta” will facilitate ease of backup. The delta is generated by comparing with the latest uploaded “Full” or “Delta” file so the delta file is the smallest possible and uses the least bandwidth during backup. For restoring, the full file and all delta files up to the required point-in-time is required to restore the file to a specific point-in-time.


The major differences are summarized in the following table:

In-File Delta Technology




Always use the latest uploaded “Full” file to generate the delta file.

For restore, just need the full and a delta to recover to a specific point-in-time.

The daily delta file will be larger than incremental delta and needs more bandwidth to upload.


Always use the latest uploaded file (whether “Full” or “Delta”) to generate the delta file.

Daily delta file only shows the difference between the current file and previous upload file. The incremental delta file will be smaller than the differential delta file and so should upload faster.

For restore, need to use the full and all deltas up to the point-in-time to recover to a specific point-in-time. If any delta file is corrupted, the file can only be recovered up to the point-in-time before the corrupted delta.

During Backup

Assume the initial full file is 100MB and grows daily by 10MB. The files uploaded to the server and the approximate storage space required is as follows:





Daily Upload to Server

Storage Space Required (MB)*







Full File = 100MB

Full File = 100MB

(Full) 100

Total = 100

(Full) 100

Total = 100



Delta = 10MB

Delta1 = 10MB

(Full) 100

+ (Delta) 10

Total = 110

(Full) 100

+ (Delta1) 10

Total = 110



Delta = 20MB

Delta2 = 10MB

(Full) 100

+ (Delta) 20

Total = 120

(Full) 100

+ (Delta1) 10

+ (Delta2) 10

Total = 120



Delta = 30MB

Delta3 = 10MB

(Full) 100

+ (Delta) 30

Total = 130

(Full) 100

+ (Delta1) 10

+ (Delta2) 10

+ (Delta3) 10

Total = 130

* Storage space is approximate



1 BackUPMotion  – “Secure, Robust and Reliable”

Secure 128bit SSL communication



All communications between BackUP Motion Server and your computer are transported in a 128 or 256-bit SSL (Secure Socket Layer) channel. Although all your backup files travel through a public network (internet), eavesdroppers have no knowledge of what has been exchanged.


Backup data are securely encrypted


All of your files are first compressed and encrypted with your defined encrypting key before they are sent to BackUP Motion server. Only you can decrypt the data.



Encryption key is well protected

The encrypting key used to encrypt your files resides only on your computer and is known only to you. It is never transmitted anywhere across the network. Thus, even the system administrators will not be able to decrypt and view the content of your files stored on the backup server without your permission. This unfortunately means if the encrypting key is lost, you will never be able to recover your backup files.

technical details

The encrypting key for the different backup sets are stored the config.sys file, which is encoded by a proprietary algorithm:

(Windows)        C:\Documents and Settings\administrator\.obm\config\config.sys

(Linux)              ~/.obm/config/config.sys

(Mac OS X)      ~/.obm/config/config.sys


The best algorythm is used

Currently, the algorithm that we are using to encrypt your files is 256-bit Twofish. It is a block cipher designed by Counterpane Labs. It was also one of the five Advanced Encryption Standard (AES) finalists chosen by National Institute of Standard and Technology (NIST). It subjects to frequent public reviews but no known attack against this algorithm has been reported.


 It requires 8.77 x 1017 years to crack the 128-bit encryption

A 128-bit key size has 2128 or around 3.4 x 1038 possible combination. Even if you have the world best super computer, ASCI White, SP Power3 375 MHz manufactured by IBM as of November 2000, it would take 8.77 x 1017years to test all combinations. Assuming your have the super computer, ASCI White, SP Power3 375 MHz has 8192 processors which totals a capability of 12.3 teraflops (trillions of operations/second), available to you. Also it just needs one computer operation to test a possible combination (which is already faster than what it can do). To use brute force attack (checking all combinations) on this encryption algorithm. It would take:

3.4 x 1038
-------------- seconds ~ 2.76 x 1025sec 
12.3 x 1012

i.e. 876530835323573935 years or 8.77 x 1017 years

to successfully try all combinations. Let alone ASCI White cannot process as fast as what described here. You can be sure that your data stored on our server is 100% secured.


Buy Secured with SSL

Secure Payments
Secure shopping
Comprehensive Service
Top Service