background image

 

Copyright (c) 2000-2009 Acronis. All rights reserved. 
Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.                                               9 

 

Chapter 12.  Exploring archives and mounting images ........................................ 85

 

12.1  Searching ........................................................................................................................85

 

12.2  Google Desktop and Windows Search integration ...............................................................87

 

12.3  Mounting an image ..........................................................................................................93

 

12.4  Unmounting an image ......................................................................................................95

 

Chapter 13.  Transferring the system to a new disk ............................................. 96

 

13.1  General information..........................................................................................................96

 

13.2  Security ...........................................................................................................................97

 

13.3  Executing transfers ..........................................................................................................97

 

13.3.1  Selecting Clone mode ................................................................................................97

 

13.3.2  Selecting source disk .................................................................................................97

 

13.3.3  Selecting destination disk ...........................................................................................98

 

13.3.4  Partitioned destination disk ........................................................................................99

 

13.3.5  Selecting partition transfer method .............................................................................99

 

13.3.6  Cloning with manual partitioning .............................................................................. 100

 

13.3.7  Cloning summary ..................................................................................................... 102

 

Chapter 14.  Adding a new hard disk .................................................................. 103

 

14.1  Selecting a hard disk ...................................................................................................... 103

 

14.2  Creating new partitions .................................................................................................. 103

 

14.3  Disk add summary ......................................................................................................... 104

 

Chapter 15.  Security and Privacy Tools ............................................................. 106

 

15.1  Using File Shredder ........................................................................................................ 106

 

15.2  BlackArmor DriveCleanser ............................................................................................... 107

 

15.3  Creating custom algorithms of data destruction ............................................................... 110

 

15.4  System Clean-up ............................................................................................................ 111

 

15.5  System Clean-up Wizard settings .................................................................................... 112

 

15.5.1  "Data Destruction Method" setting ............................................................................ 112

 

15.5.2  "Files" setting .......................................................................................................... 112

 

15.5.3  "Computers" setting ................................................................................................. 113

 

15.5.4  "Drive Free Space" setting ........................................................................................ 114

 

15.5.5  "Commands" setting ................................................................................................ 114

 

15.5.6  "Network Places Filter" setting .................................................................................. 115

 

15.6  Cleaning up separate system components ....................................................................... 115

 

Appendix A.  Partitions and file systems ............................................................ 116

 

A.1

 

Hard disk partitions ........................................................................................................ 116

 

A.2

 

File systems ................................................................................................................... 116

 

A.2.1

 

FAT16 ..................................................................................................................... 116

 

A.2.2

 

FAT32 ..................................................................................................................... 117

 

A.2.3

 

NTFS ...................................................................................................................... 117

 

A.2.4

 

Linux Ext2 ............................................................................................................... 117

 

A.2.5

 

Linux Ext3 ............................................................................................................... 117

 

A.2.6

 

Linux ReiserFS ......................................................................................................... 118

 

Appendix B.  Hard disks and BIOS setup ............................................................ 119

 

B.1

 

Installing hard disks in computers ................................................................................... 119

 

B.1.1

 

Installing a hard disk, general scheme ...................................................................... 119

 

B.1.2

 

Motherboard sockets, IDE cable, power cable ........................................................... 120

 

B.1.3

 

Configuring hard disk drives, jumpers ....................................................................... 120

 

B.2

 

BIOS ............................................................................................................................. 121

 

B.2.1

 

Setup utility ............................................................................................................ 121

 

B.2.2

 

Standard CMOS setup menu ..................................................................................... 122

 

B.2.3

 

Arranging boot sequence, advanced CMOS setup menu ............................................. 123

 

Содержание BlackArmor NAS 110

Страница 1: ......

Страница 2: ...ghts referred to are the property of their respective owners Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder Distribution of this work or derivative work in any standard paper book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder DOCUMENTATION IS PROVIDED A...

Страница 3: ...le trade secrets and confidential information of Seagate and its suppliers The Software is protected by copyright and other intellectual property laws and treaties including without limitation the copyright laws of the United States and other countries 2 Product License Subject to your compliance with the terms of this EULA Seagate grants you a personal non exclusive non transferable limited licen...

Страница 4: ... availability of an Update Seagate has no obligation to provide support maintenance Updates or modifications under this EULA 5 NO WARRANTY THE PRODUCT IS OFFERED ON AN AS IS BASIS AND NO WARRANTY EITHER EXPRESS OR IMPLIED IS GIVEN SEAGATE AND ITS SUPPLIERS EXPRESSLY DISCLAIM ALL WARRANTIES OF ANY KIND WHETHER STATUTORY EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTA...

Страница 5: ...ear weapons materials or facilities missiles or supporting missile projects or chemical or biological weapons You acknowledge that you are not a citizen national or resident of and are not under control of the government of Cuba Iran North Korea Sudan or Syria are not otherwise a restricted end user as defined by U S export control laws and are not engaged in proliferation activities Further you a...

Страница 6: ...his EULA and the Software agrees to all the EULA terms Any attempted assignment in violation of this Section is void Seagate the Seagate logo and other Seagate names and logos are the trademarks of Seagate The open source software is licensed to you under the terms of the applicable open source license agreements not this EULA Those licenses can be found in the applicable README file documentation...

Страница 7: ... Backup Secure Zone 18 3 5 Viewing disk and partition information 18 3 6 Try Decide 19 3 7 BlackArmor DriveCleanser File Shredder and System Clean up 19 3 8 Support for Zip format 19 Chapter 4 Getting to know Seagate BlackArmor Backup 21 4 1 BlackArmor One Click Protection 21 4 2 Program workspace 23 Chapter 5 Creating backup archives 27 5 1 Selecting what data to back up 27 5 2 Performing backup ...

Страница 8: ... 6 4 1 Files to preserve during restoration 52 6 4 2 Pre post commands 52 6 4 3 Restoration priority 53 6 4 4 File level security settings 53 6 4 5 Additional settings 53 Chapter 7 Try Decide 55 7 1 Using Try Decide 58 7 1 2 Try Decide options 58 7 2 Try Decide usage examples 58 Chapter 8 Scheduling tasks 60 8 1 Creating scheduled tasks 60 8 1 1 Setting up once only execution 61 8 1 2 Setting up u...

Страница 9: ...d Privacy Tools 106 15 1 Using File Shredder 106 15 2 BlackArmor DriveCleanser 107 15 3 Creating custom algorithms of data destruction 110 15 4 System Clean up 111 15 5 System Clean up Wizard settings 112 15 5 1 Data Destruction Method setting 112 15 5 2 Files setting 112 15 5 3 Computers setting 113 15 5 4 Drive Free Space setting 114 15 5 5 Commands setting 114 15 5 6 Network Places Filter setti...

Страница 10: ...disk initialization errors 124 B 3 Installing a SATA hard drive 125 B 3 1 Steps for installing a new internal SATA drive 125 Appendix C Hard Disk Wiping methods 127 C 1 Information wiping methods functioning principles 127 C 2 Information wiping methods used by Seagate BlackArmor Backup 128 Appendix D Startup Parameters 129 ...

Страница 11: ...ur identity as well Simply deleting old data will not remove it permanently from your computer Seagate BlackArmor Backup now includes BlackArmor DriveCleanser that permanently destroys files and wipes personal information from partitions and or entire disks as well as a wizard that cleans up your Windows system of all traces of user activity You can store backups on Seagate NAS and Seagate DAS dev...

Страница 12: ...of backups and maximum storage period for the archive files In case any of the preset limits are exceeded Seagate BlackArmor Backup will combine the first full backup with the next incremental one into one full backup which will be dated the later backup date Then if necessary this backup will be combined with the next until the occupied storage space or number of backups decreases to the preset l...

Страница 13: ...t supported or is corrupted Seagate BlackArmor Backup can copy data using a sector by sector approach The Ext2 Ext3 ReiserFS and Linux SWAP file systems are supported only for disk or partition backup restore operations You cannot use Seagate BlackArmor Backup for file level operations with these file systems file backup restore search as well as image mounting and file restoring from image as wel...

Страница 14: ... you experience problems installing or using Seagate products that you can t solve yourself by using this guide then please contact Seagate Technical Support More information about contacting Seagate Technical Support is available at the following link http www seagate com www en us support In order to open a support trouble ticket please fill out the Web form on the Seagate site support will only...

Страница 15: ...reating bootable media You might not need this tool if you purchased a boxed product that contains a bootable CD Installing the Bootable Rescue Media Builder will allow you to create bootable media or its ISO image at any time from the main program window or running Bootable Rescue Media Builder on its own When installed Seagate BlackArmor Backup creates a new device in the Device Manager list Con...

Страница 16: ... 2 3 Running Seagate BlackArmor Backup You can run Seagate BlackArmor Backup in Windows by selecting Start Programs Seagate BlackArmor Backup BlackArmor Backup or by clicking on the appropriate shortcut on the desktop If your disk data is totally corrupted and the operating system cannot boot load the standalone Seagate BlackArmor Backup version from the bootable media supplied with the retail box...

Страница 17: ...tition image includes all files and folders This includes all attributes including hidden and system files boot record and FAT file allocation table as well as files in the root directory and the zero track of the hard disk with master boot record MBR A disk image includes images of all disk partitions as well as the zero track with master boot record MBR By default files in all Seagate BlackArmor...

Страница 18: ... then step through each of the previous backups to retrieve all the updated files A differential backup on the other hand can be restored more quickly because the software must copy only the original backup and the most recent one An incremental or differential backup created after a disk is defragmented might be considerably larger than usual This is because the defragmentation program changes fi...

Страница 19: ...s as well as for erasing individual files and eliminating user system activity traces When replacing your old hard drive with a new higher capacity one you may unwittingly leave on the old disk lots of personal and confidential information that can be recovered even if you have reformatted it The BlackArmor DriveCleanser provides for the destruction of confidential information on hard disk drives ...

Страница 20: ...es for the zip format most of the functionality available for the tib format except password protection and encryption you can schedule backups validate zip backup archives restore files and folders from zip archives make incremental and differential backups and so on Seagate BlackArmor Backup can restore and validate only its own zip archives If a zip archive was created by a file archiver progra...

Страница 21: ...Windows Vista On the first run of the One Click Protection wizard after the NAS License Server creates the folder Backups on the NAS share Public if it did not exist before and sets it as a destination for One Click Protection The name of the backup is generated from the hostname of the machine user is to back up Seagate BlackArmor Backup will take stock of your computer s configuration and then o...

Страница 22: ...ation click the Specify destination link and select the storage location most suitable for you Clicking Protect will start the backup task But before proceeding with the backup the program will ask you under whose user credentials the subsequent scheduled backups will run Clicking Cancel will cancel One Click Protection If you decide to use this feature later click Home on the sidebar and then cho...

Страница 23: ...he selected task or function right away or make further selections All the features listed in the right pane are duplicated on the left side of the screen occupied by the so called sidebar The sidebar also provides easy access to all functionality of Seagate BlackArmor Backup The main functions are listed in the lower part of the sidebar If you choose an item in the lower part the upper part of th...

Страница 24: ...am window wizards also have the sidebar listing all the steps both required and optional needed for completing the operation For example see the Backup Wizard screenshot below The completed steps are marked with green checkmarks The green arrow shows the current step After you complete all the required steps the Summary button becomes available If you wish to omit the optional steps click Summary ...

Страница 25: ...nd Mount image backups by a single click on a button on the toolbar Clicking the button starts the appropriate wizard or performs the appropriate action On this screen you can assign ratings to your backups for instance you may want to assign a high rating to an important backup A backup rating is indicated by the number of stars in the Rating column more stars means higher rating The default rati...

Страница 26: ...or more information see 11 3 Viewing Tasks and Logs We will not bore you with a description of other screens because many of them are self explanatory and some are described in the appropriate chapters of this guide In addition all screens have brief descriptions of the features they allow to access or use and you can always open contextual help by clicking the corresponding button By the way you ...

Страница 27: ...is quite fast And the program can also back up incrementally or differentially so after the first time updating your image to reflect the current state of your hard disk requires only copying the files that are new or changed and will require much less time Because images can save you a lot of time when you need to recover the operating system it is recommended that you make them part of your back...

Страница 28: ...Create backup task item will be selected by default 3 Select what type of data you want to back up Seagate BlackArmor Backup offers you the following backup types My Computer image backup of any set of disks partitions My Data file level backup of any set of files folders or an entire file category System State file level backup of system files drivers etc My E mail file level backup of Microsoft ...

Страница 29: ...on on custom categories see 5 3 11 Creating a custom data category for backups If you do not want to keep custom contents of the current backup by creating a data category simply select the files folders from the tree This set will be effective only for the current backup task File filtering can be applied to manually added folders in the optional Source files exclusion step My Application Setting...

Страница 30: ... the path to the archive location and new archive file name in the Backup Location field below or click Browse select the archive location on the directory tree and enter the new file name in the File name line or use the file name generator a button to the right of the line When you have chosen the My Data backup type for backing up files and or folders you can select the zip archive type For mor...

Страница 31: ...on the Summary page For example when you want to proceed with backup right away you can omit the Scheduling step If you do not want to exclude any files from the backup you can omit the Source files exclusion step When you want to use the default backup options you can omit the Backup options step and so on Now let s see what optional steps you can set up while configuring a backup task 5 2 3 Sche...

Страница 32: ... backup policies 1 create full backups only 2 create full backups after a specified number of incremental backups 3 create full backups after a specified number of differential backups When the first backup on a schedule is executed a full backup will be created If you choose 2 or 3 by selecting the Create a new full backup after box the next backups will be incremental or differential until the s...

Страница 33: ...lidating all the previous backups the archive size quota violation remains the old backup archive will be deleted in order to correct the violation 5 if the new full backup file size exceeds the archive size limit the program will record a warning into the logs 5 2 5 Source files exclusion This step will be present only for the My Computer and My Data backup types It enables you to exclude unneces...

Страница 34: ...current task For information on how to set the default filters that will be used each time you select folders to back up see 5 3 2 Source files exclusion 5 2 6 Selecting the backup options Select the backup options that is backup file splitting compression level password protection etc The settings of the options will be applied only to the current backup task ...

Страница 35: ...olations such as exceeding a pre set maximum number of gigabytes set aside for backups and if any limitation is exceeded consolidates the oldest backups For example if you ve pre set your archive to store 50GB of backup files and your backups reach 55GB you have exceeded a quota and the system will respond automatically based on rules that you ve already set This operation creates a temporary file...

Страница 36: ...tions they will be queued after the current one 5 3 Fine tuning your backups You can fine tune your backups to specific tasks Such fine tuning is made by configuring backup options before starting a backup task You can set temporary backup options by editing the default backup options while creating a backup task In addition when backing up your data files you can create custom data categories for...

Страница 37: ...g the files to be backed up before the backup starts Click Edit to open the Edit Command window where you can easily input the command its arguments and working directory or browse folders to find a batch file Please do not try to execute interactive commands i e commands that require user input for example pause These are not supported Unselecting the Do not perform operations until the command s...

Страница 38: ...from the other currently running processes The effect will depend on total CPU usage and other factors 2 HDD writing speed The preset is Maximum Backing up in the background to an internal hard disk for example to BlackArmor Backup Secure Zone may slow other programs performance because of the large amounts of data transferred to the disk You can limit the hard disk usage by Seagate BlackArmor Bac...

Страница 39: ...ers encryption is set in Properties General Advanced Attributes Encrypt contents to secure data Check the option if there are encrypted files in the backup and you want them to be accessed by any user after restore Otherwise only the user who encrypted the files folders will be able to read them Decryption may also be useful if you are going to restore encrypted files on another computer These opt...

Страница 40: ...ups in a certain location each time when you choose the My Data backup type for backing up selected files and folders To enable creation of reserve copies select the Reserve my backups checkbox and then choose the method for making reserve copies You have three choices duplicate the backups as tib files make reserve copies as zip archives or simply copy the files and or folders to a specified loca...

Страница 41: ... You can use the common Windows wildcard characters For example My exe will select all exe files with names consisting of five symbols and starting with my 2 By type Select the desired file types in the list You can also search desired registered file types by entering their extension or description in the Search field 3 By extension Click the Edit custom file types link and enter the extensions s...

Страница 42: ...n the form of an incremental or differential backup even in tib format Also remember that you will pay for the enhanced convenience and increased security of your data by the time required for performing the task because normal backup and reserve copying are performed one at a time and not simultaneously Please be aware that built in support of zip files in Windows does not cover operations with m...

Страница 43: ...tifies drives For example the D drive identified in the standalone Seagate BlackArmor Backup might correspond to the E drive in Windows This is not an error with the software 6 1 1 Network settings in rescue mode When booted from removable media Seagate BlackArmor Backup might not detect the network That can happen if there is no DHCP server in your network or your computer address was not identif...

Страница 44: ...ackup will enable selecting one of the successive incremental backups by its creation date time Thus you can roll back the files folders state to a certain date To restore data from an incremental backup you must have all the previous backup files and the initial full backup If any of the successive backups are missing restoration is not possible To restore data from a differential backup you must...

Страница 45: ...hive contents and select the desired folders or files 6 The next step allows you to keep useful data changes made since the selected backup was created Choose what to do if the program finds a file with the same name as in the archive in the target folder By default the program will not overwrite any files and folders thus giving the files on the hard disk unconditional priority over the archived ...

Страница 46: ...les and folders are preserved from overwriting If you want to overwrite those files and folders too unselect the appropriate checkboxes In addition you can preserve from overwriting the files that meet the criteria you specify in this window 7 Select the options for the restoration process that is restoration process priority file level security settings etc The options you set on this page will b...

Страница 47: ...rget partition disk This means no other applications can access it at that time If you receive a message stating that the partition disk cannot be locked close applications that use this partition disk and start recovery once more If you cannot determine which applications use the partition disk close them all 6 3 1 Starting the Restore Wizard Start the Restore Wizard by selecting Operations Resto...

Страница 48: ...ntal backups Seagate BlackArmor Backup will enable selecting one of the successive incremental backups by its creation date time Thus you can roll back the disk partition state to a certain date To restore data from an incremental backup you must have all previous backup files and the initial full backup If any of the successive backups are missing restoration is not possible To restore data from ...

Страница 49: ...store However watch your selection if you are going to restore files instead of a disk partition unselect the unnecessary folders Otherwise you will restore a lot of excess files Then you will be able to go directly to the Restoration Summary screen 6 3 10 Restoration summary and executing restoration You can restore files from disk partition images only if they have the FAT or NTFS file systems 6...

Страница 50: ...res the loader changes the signature of the second disk which would be the clone disk Once this happens the clone disk would not be able to boot up independently of the original disk because the MountedDevices fields in the clone s registry reference the disk signature of the original disk which will not be available if the original disk is disconnected 6 3 5 Selecting a target disk partition 1 Se...

Страница 51: ... to make it bootable even if it was not restored to the original partition or disk If you restore a system partition to another hard disk with its own partitions and OS most likely you will need only the data In this case you can restore the partition as Logical to access the data only By default the original partition type is selected Selecting Active for a partition without an installed operatin...

Страница 52: ...ogress will be shown in a special window You can stop the procedure by clicking Cancel However it is critical to note that the target partition will be deleted and its space unallocated the same result you will get if the restoration is unsuccessful To recover the lost partition you will have to restore it from the image again 6 4 Setting restore options 6 4 1 Files to preserve during restoration ...

Страница 53: ...on priority will free more resources for other CPU tasks Raising restoration priority may speed up the restore process as it takes resources from other currently running processes The effect will depend on total CPU usage and other factors 6 4 4 File level security settings The preset is Restore files with their security settings If the file security settings were preserved during backup see 5 3 7...

Страница 54: ...ogy LLC All Rights Reserved Check of the file system is available only when restoring disk partitions using FAT16 32 and NTFS file systems The file system will not be checked if a reboot is required during restoration for example when restoring the system partition to its original place ...

Страница 55: ...cide mode and then decide to discard your changes those files document changes and mail will no longer exist If you use POP email make sure to change the settings in your e mail to leave your mail on the server before you activate the Try Decide mode This way you can always retrieve your email again Similarly save new files and or edited documents to a drive not protected by Try Decide After start...

Страница 56: ...mor Backup Secure Zone quite intensively even when your computer is idle This is due to Windows Vista s housekeeping activities such as indexing that run in the background When your computer reboots for whatever reason while working in the Try Decide mode before booting of the operating system starts you will be shown a dialog offering you two choices stop the mode and discard changes or continue ...

Страница 57: ...ou to keep the changes made to the system and choosing Discard changes will return your system to the state it was in before turning on the Try Decide mode Please note that while working in the Try Decide mode you will experience slowing down of the system performance Furthermore the process of applying changes could take considerable time Please be aware that the Try Decide cannot track changes i...

Страница 58: ... want to protect from unauthorized changes during a Try Decide session By default T D protects Disk C though you may choose to protect any other partition in your system Alert settings specify whether Try Decide should alert you when it uses up all the space allotted for saving virtual changes and after a specified time period has passed By default all alerts are On 7 2 Try Decide usage examples T...

Страница 59: ... Making any changes to the Try Decide options or turning off the Try Decide mode will require administrator authority 2 Log off and then log on using your kid s account 3 Let your kid use the computer When your kid is through with gaming or Internet surfing or when you think that it is time for the kid to go to bed return the system to the state it was in before your kid started using the computer...

Страница 60: ... necessary media ready If on the other hand you re backing up to a hard disk or network device that can stay connected all the time this problem is less likely to occur If you are performing a scheduled backup task to a USB flash drive the backup process will begin automatically when the device is plugged in but only when a scheduled backup has been missed The USB flash drive must be the same as t...

Страница 61: ...er However you can work on the computer while the task is running If the computer is off when the scheduled time comes the task won t be performed but you can force the missed task to run at the next system startup by selecting the If missed run the task at startup box If you schedule a task for performing backup to a USB flash drive one more checkbox appears on the scheduling screen If missed run...

Страница 62: ...the task System startup the task will be executed at every OS startup System shutdown the task will be executed before every system shutdown or reboot User logon the task will be executed each time the current user logs on to the OS User logoff the task will be executed each time the current user logs off of the OS If you want to run a task only at the first occurrence of the event on the current ...

Страница 63: ...cution If you choose daily execution set the Start time and days on which you want to execute the task Every day Every weekday Every х days once every several days specify the interval If you want the task to be repeated several times per day select Run the task every x hour s until the end of the day box and specify the interval in hours ...

Страница 64: ...periodicity in the Run the task every x week s on box every week every two weeks etc and select the days on which to execute the task 8 1 5 Setting up monthly execution If you select monthly execution set the Start time and days on which to execute the task On the specify a day on the specified day e g on second Tuesday or fourth Friday select this from the drop down lists On every x day of the mo...

Страница 65: ...only tasks created by a current user box You can change the task parameters by editing This is performed in the same way as creation however the earlier selected options will be set so you only have to enter the changes To edit a task select it and click Edit on the toolbar To delete a task with confirmation select it and click Delete on the toolbar To rename a task select it click Rename on the t...

Страница 66: ... reboot We do not recommend creating the BlackArmor Backup Secure Zone on external media USB drives etc because this may lead to problems with computer booting if that external storage is disconnected A computer can have only one secure zone To create a zone on another disk you must first delete the existing zone 1 Before creating the zone you need to estimate its size To do so start a backup and ...

Страница 67: ...e minimum and maximum ones The minimum size is about 50 MB depending on the geometry of the hard disk The maximum size is equal to the disk s unallocated space plus the total free space on all partitions selected at the previous step When creating the zone the program will first use the unallocated space If there is not enough unallocated space the selected partitions will be decreased Partition r...

Страница 68: ...e BlackArmor Backup Secure Zone on the disk the password to the zone will be reset 6 Then you will see a list of operations to be performed on the partitions disks After you click Proceed Seagate BlackArmor Backup will start creating the zone Progress will be reflected in a special window If necessary you can stop zone creation by clicking Cancel However the procedure will be canceled only after t...

Страница 69: ...tions may require a reboot When reducing the zone any unallocated space if the hard disk has any will be allocated to the selected partitions along with the space freed from the zone Thus no unallocated space will remain on the disk 5 Next you will see a list of briefly described operations to be performed on partitions disks After you click Proceed Seagate BlackArmor Backup will start resizing th...

Страница 70: ... Zone in the main menu and then choose Remove BlackArmor Backup Secure Zone 2 Select the partitions to which you want to add the space freed from the zone If you select several partitions the space will be distributed proportionally to each partition 3 Next you will see a list of briefly described operations to be performed on partitions disks After you click Proceed Seagate BlackArmor Backup will...

Страница 71: ...ard disk If you have other BlackArmor products you can include standalone versions of these programs on the same bootable disk as well If you have chosen not to install the Bootable Media Builder during Seagate BlackArmor Backup installation you will not be able to use this feature When booting from the Rescue Media you cannot perform backups to disks or partitions with Ext2 Ext3 ReiserFS and Linu...

Страница 72: ...ll only be able to write one component at a time for example the full version of Seagate BlackArmor Backup on a set of diskettes To write another component start Bootable Media Builder again 4 If you are creating a CD DVD or any removable media insert a blank disc so the program can determine its capacity If you choose to create a bootable disc ISO image specify the ISO file name and the folder in...

Страница 73: ...c 2000 2009 Acronis All rights reserved Copyright c 2009 Seagate Technology LLC All Rights Reserved 73 other hand backup archives encrypted using the Seagate BlackArmor Backup encryption feature can be recovered ...

Страница 74: ...ard 1 To start the Validate Wizard choose Operations Validate Backup Archive from the main program menu 2 Select the archive to validate Click Next to continue If the selected archive is protected with a password Seagate BlackArmor Backup will ask for the password in a dialog box The Next button will be disabled until you enter the correct password 3 After entering the correct password you will be...

Страница 75: ...n task now box will be unselected by default and the validation will proceed according to the schedule you set though you can also validate the backup right away by selecting this box After the validation is complete you will see the results window You can cancel validation by clicking Cancel To check archive data integrity you must have all incremental and differential backups belonging to the ar...

Страница 76: ... also duplicate messages issued during the operation or send you the full operation log after operation completion By default all notifications are disabled 11 2 1 Email notification To set up e mail notification select Tools Options Notifications E mail Provide the email address to which notifications will be sent as well as the outgoing SMTP server name and port A user name and a password might ...

Страница 77: ...u want to get notifications when the operation is completed successfully check Add full log to the notification to add the full operation log to the message if the operation failed check Add full log to the notification to add the full operation log to the message during the operation when user interaction is required After setting up e mail notifications you can send a test mail message by clicki...

Страница 78: ... BlackArmor Backup has a Tasks and Log screen that allows you to view its working logs and scheduled tasks The logs can provide information about scheduled backup or validation task results including reasons for failure if any To open the Tasks and Log screen click Tasks and Log on the sidebar By default the screen opens with the Scheduled Tasks tab selected The tab shows all scheduled tasks if an...

Страница 79: ... this date The buttons with the left and right arrows at the sides of the calendar allow you to browse the months being shown in the calendar If you have gone several months back or forward clicking the Today button will quickly return you to the current month and date Clicking any day in the past takes you to the Log tab and shows logs for the selected date If there are no logs for that date an a...

Страница 80: ...e Delete button on the toolbar To delete all log entries click the Delete all button You can also save a log entry to file by clicking the Save button To save all logs to file click Save all If any step shown in logs was terminated by an error the corresponding log will be marked with a red circle with a white cross inside The three buttons to the right control message filters the white cross in t...

Страница 81: ...ed The actual number of backups created can exceed the Maximum number of backups by one This enables the program to detect the fact of exceeding the number quota and start consolidation Backup will be prohibited until the consolidation finishes The file name based consolidation allows deleting the backups that you do not need anymore from any archive while maintaining the archive consistency You c...

Страница 82: ...ect the backups you want to keep 4 Choose the location and name for the archive copy By default the program suggests the same location and the original backup archive will be overwritten But you can choose a new location and in such a case the source archive will stay as is unless you choose to delete it by selecting the Delete original archive box This requires more disk space but ensures securit...

Страница 83: ...up2 is an incremental backup containing data as of November 25 2008 10 21 12 AM You can make sure of this by starting the consolidation wizard again selecting the archive MyBackup and proceeding to the next window 11 5 Removing backup archives You may want to remove backups and backup archives you no longer need Because Seagate BlackArmor Backup stores information on the backup archives in a metad...

Страница 84: ...nd click Remove on the toolbar or right click on the full backup of the backup archive and choose Remove in the shortcut menu To remove an incremental or a differential backup select it and click Remove on the toolbar or right click on the selected backup and choose Remove in the shortcut menu In this case all other successive incremental and differential backups created later than the selected in...

Страница 85: ... chapter are supported only for the FAT and NTFS file systems Please keep in mind that though both file archives and disk partition images have a default tib extension only images can be mounted If you want to view file archive contents use the Explore operation The following is a brief summary of the Explore vs Mount operation Explore Mount Archive type File level disk or partition image Partitio...

Страница 86: ...ng on a filename opens the file You can restore the file by right clicking on its filename and choosing Restore in the shortcut menu This shortcut menu also enables you to open the file or the parent folder that contains that file To help you better understand the search results here is some information on the algorithms used by the Search feature 1 When searching files in tib archives you can typ...

Страница 87: ...the All results tab shows the archive files whose comments satisfy the search criterion Double clicking on an archive opens it for exploring Search in the Help topics is performed after opening the Help by pressing the F1 key or clicking the help icon in any Seagate BlackArmor Backup window and entering a search string in the Search field Clicking on a found help topic title opens the correspondin...

Страница 88: ...les all Microsoft Office Outlook and Microsoft Outlook Express items and more The contents of password protected tib backup archives or archives protected by a password and encryption as well as the System State and My E mail backup archives will not be indexed though Google Desktop and Windows Search provide search for the tib files themselves and in the comments to such archives Furthermore Goog...

Страница 89: ...ur computer s hard disks and adding the indexing information to its index database The required time depends on the number of tib archives and the number of files they contain After for example an hour check whether Google Desktop has indexed the tib archives by entering in its query field the name of a file which you know for sure that you backed up If Google Desktop has completed indexing it wil...

Страница 90: ...le Desktop use Seagate BlackArmor Backup s Restore feature The following information may be of interest to you if you use any edition of Windows Vista that has built in Desktop Search functionality or Windows Desktop Search 3 0 or later and wish to enable Windows Search support for tib files Windows Search does not support indexing of zip files content To use Windows Search support 1 Verify that t...

Страница 91: ... and tib IFilter is shown in the Filter Description field Select Index Properties and File Contents 3 Click OK and while the Indexing Options window is open check that the disks where you store your tib backup archives are shown in the Included Locations list If the list does not contain those disks the tib files will not be indexed To include the disks click Modify and select them in the window t...

Страница 92: ...d UNC Location tab of Advanced Options Give Windows Search some time for indexing all tib files on your computer s hard disks and adding the indexing information to its index database The required time depends on the number of tib archives and the number of files they contain After completing the indexing the Desktop Search will be able to search files in tib backup archives The search engines in ...

Страница 93: ...al images you can select one of the successive incremental images also called slices by its creation date time Thus you can explore the data state at a certain moment To mount an incremental image you must have all previous images and the initial full image If any of the successive images are missing mounting is not possible By default the program will mount the latest incremental image To mount a...

Страница 94: ... be assigned to the virtual disk from the Mount letter drop down list If you do not want to mount the virtual drive select Do not mount in the list 4 If you select the Mount the partitions in the read write mode box the program assumes that the mounted image will be modified and creates an incremental archive file to capture the changes It is strongly recommended that you list the forthcoming chan...

Страница 95: ...you want to connect another partition image repeat the procedure 12 4 Unmounting an image We recommend that you unmount the virtual disk after all necessary operations are finished as maintaining virtual disks takes considerable system resources If you do not unmount the disk it will disappear after your computer is turned off To disconnect the virtual disk choose Operations Unmount Image select t...

Страница 96: ...matic mode you will only have to take a few simple actions to transfer all the data including partitions folders and files to a new disk making it bootable if the original disk was bootable There will be only one difference between these disks partitions on the newer disk will be larger Everything else including the installed operating systems data disk labels settings software and everything else...

Страница 97: ...d to the new disk the computer boots up from it and all applications work 13 3 Executing transfers 13 3 1 Selecting Clone mode You will see the Clone Mode window just after the welcome window We recommend using automatic mode in most cases The manual mode can be useful if you need to change the disk partition layout If the program finds two disks one partitioned and another unpartitioned it will a...

Страница 98: ...dow disk number capacity label partition and file system information 13 3 3 Selecting destination disk After you select the source disk you have to select the destination where the disk information will be copied The previously selected source becomes grayed out and disabled for selection If any disk is unpartitioned the program will automatically recognize it as the destination and bypass this st...

Страница 99: ... real changes or data destruction will be performed at this time For now the program will just map out cloning All changes will be implemented only when you click Proceed If you selected the automatic mode the program will not ask you anything else and will take you to the cloning summary window 13 3 5 Selecting partition transfer method When you select the manual cloning mode Seagate BlackArmor B...

Страница 100: ...upported and damaged file systems If you transfer data proportionally each partition will be enlarged according to the proportion of the old and new disk capacities FAT16 partitions are enlarged less than others as they have a 4GB size limit Depending on the selected combination you will proceed to either the cloning summary window or the Change disk layout step see below 13 3 6 Cloning with manua...

Страница 101: ...y dragging partition borders or the partition itself If the cursor turns into two vertical lines with left and right arrows it is pointed at the partition border and you can drag it to enlarge or reduce the partition s size If the cursor turns into four arrows it is pointed at the partition so you can move it to the left or right if there s unallocated space near it Having provided the new locatio...

Страница 102: ...licking Proceed you will be asked to confirm the reboot Canceling the reboot will cancel the entire procedure After the clone process finishes you will be offered an option to shut down the computer by pressing any key This enables you to change the position of master slave jumpers and remove one of the hard drives Cloning a non system disk or a disk containing an operating system but one that is ...

Страница 103: ...ed first so click OK to continue 14 2 Creating new partitions Next you will see the current partition layout Initially all disk space will be unallocated This will change after you add new partitions To create a partition click Create new partition and set the new partition location and size You can do this both by entering values in the Free space before Partition size Free space after fields and...

Страница 104: ...er partition by clicking Create new partition again You can also edit the new partition s settings by clicking Edit on the toolbar or delete it by clicking Delete If you allocate all unallocated space on the disk to the new partition the Create new partition button disappears 14 3 Disk add summary Clicking Next after creating a desired partition layout takes you to the disk add summary The disk ad...

Страница 105: ...All Rights Reserved 105 After you click Proceed Seagate BlackArmor Backup will start creating new partition s indicating the progress in a special window You can stop this procedure by clicking Cancel You will then have to repartition and format the new disk or repeat the disk add procedure ...

Страница 106: ...include user names and passwords If you need to securely destroy files or folders you select run File Shredder securely destroy data on selected partitions and or disks so it can t be recovered run BlackArmor DriveCleanser clean up Windows components folders files registry sections etc related to general system tasks which are capable of retaining user PC activity evidence run System Clean up 15 1...

Страница 107: ...llows you to select from a number of data destruction methods depending on the importance of your confidential information To start BlackArmor DriveCleanser select Tools BlackArmor DriveCleanser in the main program menu BlackArmor DriveCleanser allows you to do the following clean up selected hard disks or partitions using preset methods create and execute custom user methods of hard disk clean up...

Страница 108: ...partition you will see a warning window Be careful because clicking OK in this warning window and then Proceed in the Summary window will result in wiping the system partition containing your Windows operating system BlackArmor DriveCleanser utilizes a number of the most popular data destruction methods described in detail in Appendix C Hard Disk Wiping methods of this manual If you want to create...

Страница 109: ...ta and format partition default In this example the switch is set to Format This will allow you to see the results of partition and data destruction along with the reformatting of the partition After you select a post wiping action and click Next BlackArmor DriveCleanser will display the data destruction task summary Up to this point you can make changes in the created task Clicking Proceed will l...

Страница 110: ...ut what you actually see are disk sectors filled with either zeros or random symbols 15 3 Creating custom algorithms of data destruction BlackArmor DriveCleanser gives you the opportunity to create your own algorithms for wiping hard disks Although the software includes several levels of data destruction you can choose to create your own This is recommended only for users familiar with the princip...

Страница 111: ...aces of information previously stored on it Remove traces of file and computer searches on connected disks and computers in the local area network Clean the recently used documents list Clean the Windows Run list Clean the opened saved files history Clean the list of network places to which the user has connected using network credentials Clean the Windows prefetch directory where Windows stores i...

Страница 112: ...u can restore the default system clean up settings by clicking the Restore Defaults button in the Properties window 15 5 1 Data Destruction Method setting This setting defines the method of guaranteed data destruction to use for cleaning up a given component By default all components that have this setting have it set to Use common method You can change the common method by clicking the Click to c...

Страница 113: ...strings To do this click Show Files You will see a window with the names of found files These files will be cleaned 15 5 3 Computers setting The Computers setting is used for cleaning up the registry search strings you have used for finding computers in the local network These strings keep information on what has interested you in the network These items should also be deleted to maintain confiden...

Страница 114: ...free space on all available drives If you want to change the settings of this parameter you can use the Remove button to delete from the list the drives you don t need to clean free space on If you wish to add these drives to the list again use the Add button 15 5 5 Commands setting Here you can select the commands to remove during Windows Run List clean up This template can contain any command na...

Страница 115: ...ddresses you can use and wildcards To see the list of network places for which the stored network user credentials will be wiped according to your filter click Show Network Places 15 6 Cleaning up separate system components If you don t want to clean up all system components you can clean components of your choice or an individual component separately In this case all global settings of the System...

Страница 116: ...our PC Applications called disk managers support far more operating systems on disks A 2 File systems An operating system gives the user the ability to work with data by supporting a certain type of file system on a partition All file systems are made of structures that are necessary to store and manage data These structures are usually composed of operating system boot sectors folders and files F...

Страница 117: ...n evolved version of FAT16 Its main differences from FAT16 are 28 bit cluster numbers and a more flexible root whose size is unlimited The reasons FAT32 appeared are the support of large hard disks over 8GB in capacity and the impossibility of implementing any more complex file system into MS DOS which is still the basis for Windows 98 Me The maximum FAT32 disk size is 2 terabytes 1 terabyte or TB...

Страница 118: ...ext2 It has multiple journaling modes and broad cross platform compatibility in both 32 and 64 bit architectures A 2 6 Linux ReiserFS ReiserFS was officially introduced to Linux in 2001 ReiserFS overcomes many Ext2 disadvantages It is a 64 bit journaling file system that dynamically allocates space for data substructures ...

Страница 119: ...d on the motherboard plugging rules are described below The disk drive will have a designation on the connector or next to it that identifies Pin 1 The cable will have one red wire on the end that is designated for Pin 1 Make sure that you place the cable in the connector correctly Many cables also are keyed so that they can only go in one way 5 Turn your computer on and enter BIOS setup by pressi...

Страница 120: ... the power cable i e the marked thread connected to pin 1 of the socket A similar rule was used for connecting cables with the motherboard Incorrect connection of the cable with either the hard disk or the motherboard does not necessarily damage the electronics of the disk or the motherboard The hard disk is simply not detected or initialized by BIOS There are some models of hard disks especially ...

Страница 121: ...When you turn on your computer you often see a number of short text messages before you see the splash screen of your operating system These messages are from the POST power on self test program that belongs to BIOS and is executed by the processor BIOS or the basic input output system is a program that resides in the permanent memory chip ROM or flash BIOS on the motherboard of your computer and ...

Страница 122: ...ed in your PC Parameter Value Purpose Type 1 47 Not Installed Auto Type 0 or Not Installed is used when there is no hard disk installed to uninstall it Type 47 is reserved for user defined parameters or for parameters detected by the IDE Auto detection utility Auto value allows for automatic detection of IDE disk parameters during the boot sequence Cylinder Cyl 1 65535 The number of cylinders on a...

Страница 123: ...tion utility that is usually included in modern BIOS versions The utility is sometimes a separate BIOS menu item and is sometimes included in the standard CMOS setup menu Please note that in Appendix B Hard disks and BIOS setup we have described the general details of the physical hard disk structure Built in IDE hard disk controls mask the physical disk structure As a result the BIOS of the mothe...

Страница 124: ...he hard disk in your computer and have configured it in BIOS one can say that the PC or the motherboard knows about its existence and its main parameters However it is still not enough for an operating system to work with the hard disk In addition you have to create partitions on the new disk and format the partitions using Seagate BlackArmor Backup See Chapter 14 Adding a new hard disk B 2 4 Hard...

Страница 125: ... kits include a SATA interface cable and mounting screws Attach one end of the SATA interface cable to a SATA port on the motherboard or interface card and the other to the drive 2 Then plug the power supply lead or use a Molex to SATA adapter 3 Prepare your drive If you re installing a SATA 300 hard drive check your PC s or SATA host adapter s documentation to make sure it supports SATA 300 drive...

Страница 126: ...llow exclamation mark or any other error indication 8 After you have installed the hard disk in your computer and have configured it in BIOS one can say that the PC knows about its existence and its main parameters However it is still not enough for the operating system to work with the hard disk In addition you have to create partitions on the new disk and format the partitions using Seagate Blac...

Страница 127: ...alyzing magnetization of hard disk sectors residual magnetization of track sides and or by using current magnetic microscopes Writing to magnetic media leads to subtle effects summarized as follows every track of a disk stores an image of every record ever written to it but the effect of such records magnetic layer becomes more subtle as time passes C 1 Information wiping methods functioning princ...

Страница 128: ... random symbol sequences 4 verification 3 United States NAVSO P 5239 26 MFM 4 1st pass 0x01 to all sectors 2 0x7FFFFFFF 3 random symbol sequences 4 verification 4 German VSITR 7 1st 6th alternate sequences of 0x00 and 0xFF 7th 0xAA i e 0x00 0xFF 0x00 0xFF 0x00 0xFF 0xAA 5 Russian GOST P50739 95 1 Logical zeros 0x00 numbers to each byte of each sector for 6th to 4th security level systems Randomly ...

Страница 129: ...bles loading of USB modules nousb2 Disables USB 2 0 support USB 1 1 devices still work with this option This option allows using some USB drives in USB 1 1 mode if they do not work in USB 2 0 mode quiet This parameter is enabled by default and the startup messages are not displayed Deleting it will result in the startup messages being displayed as the Linux kernel is loaded and the command shell b...

Страница 130: ...f PCI BIOS only direct hardware access methods are allowed For instance this parameter may be used if you experience crashes upon boot up probably caused by the BIOS pci biosirq Uses PCI BIOS calls to get the interrupt routing table These calls are known to be buggy on several machines and they hang the machine when used but on other computers it is the only way to get the interrupt routing table ...

Отзывы: