Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Extract Directly from Time Machine

Normally you use Time Machine to restore lost data in a file like this: within the Time Machine interface, you go back to the time the file was not yet messed up, and you restore it to replace the file you have now.

You can also elect to keep both, but the restored file takes the name and place of the current one. So, if you have made changes since the backup took place that you would like to keep, they are lost, or you have to mess around a bit to merge changes, rename files, and trash the unwanted one.

As an alternative, you can browse the Time Machine backup volume directly in the Finder like any normal disk, navigate through the chronological backup hierarchy, and find the file which contains the lost content.

Once you've found it, you can open it and the current version of the file side-by-side, and copy information from Time Machine's version of the file into the current one, without losing any content you put in it since the backup was made.

Submitted by
Eolake Stobblehouse

 

 

Related Articles

 

 

Apple Shareholder Proposal to Lock Spies Out Fails

Send Article to a Friend

On 28 February 2014, Apple’s shareholders voted down a measure to harden the company’s defenses against intelligence agencies, with the proposal earning less than 1 percent of votes. The proposal was drafted with the help of the Electronic Frontier Foundation, encryption expert Bruce Schneier, and Lavabit attorney Ian Samuel; it suggested stronger encryption measures, immediate and frequent revocation of potentially compromised SSL keys, more transparency, and the removal of equipment that was used for mass surveillance.Generic Globefollow link

Check out the Take Control ebooks that expand on the topic in this article:

Do you have anything to hide? Whether or not you think you do, your online activities are being tracked and analyzed—and not always to your benefit. Author Joe Kissell explains who wants your data (and why!) and helps you develop a personalized privacy strategy. You'll learn how to manage privacy with your Internet connection, browsing the Web, email, chatting, social media, and sharing files.