Table A-3
Completeness of coverage (continued)
Description
Control
There may be storage on the disk that is not directly addressable
by GDisk. GDisk does not support the following features:
■
Bad sector remapping
The disk may have spare sectors available that are used to
automatically remap, or substitute, bad sectors by the disk
firmware. This is a potential security risk, for example, if a bad
sector may have been remapped and the original location on
the disk platter previously used by that sector becomes
inaccessible. However, it is possible that the bad sector may
still contain readable data that could be accessed by a skilled
hard-drive engineer.
■
Host Protected Area (HPA)
If the HPA is password protected, then this area of the disk is
not addressable by GDisk.
■
Inaccurate disk geometry detection
An error in determining the disk size could result in
non-accessibility.
■
Specialized disk commands
Specialized disk commands, such as those used to access
SMART logs, indicate that a disk may store data that is not
accessible using standard commands.
■
Wiping of locked sectors
The operating system may lock some of the sectors on the disk.
These sectors cannot be accessed by GDisk and are not wiped.
This is more likely to happen when you run GDisk in Windows
than in DOS. GDisk gives notification of which sectors were
not overwritten.
Non-addressable
locations
Determining disk size
The BIOS function calls, or disk commands, used for determining the size of the
disk are as follows:
■
Int13h, Get Drive Parameters (08h)
■
Extended Int13h, Get Drive Parameters (48h)
■
Direct IDE, IDENTIFY DEVICE(ECh)
■
Direct SCSI, READ CAPACITY (25h)
129
GDisk disk-wipe specifications
Determining disk size
Содержание GHOST IMAGING FOUNDATION 7.1
Страница 1: ...Symantec Ghost Imaging Foundation 7 1...
Страница 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...
Страница 78: ...Managing partitions using GDisk Support for large hard disks 78...
Страница 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...
Страница 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...
Страница 122: ...GhostCasting from the command line GhostCast Server command line options 122...
Страница 130: ...GDisk disk wipe specifications Determining disk size 130...
Страница 166: ...Ghost for Linux Symantec Ghost utility support 166...
Страница 170: ...Configuring firewalls Symantec Ghost port configuration 170...
Страница 180: ...Troubleshooting Problems running Symantec Ghost 180...