User manual MAXTOR BLACKARMOR BACKUP 2009

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual MAXTOR BLACKARMOR BACKUP. We hope that this MAXTOR BLACKARMOR BACKUP user guide will be useful to you.


MAXTOR BLACKARMOR BACKUP 2009: Download the complete user guide (3704 Ko)

You may also download the following manuals related to this product:

   MAXTOR BLACKARMOR BACKUP REV B 9-2009 (8197 ko)

Manual abstract: user guide MAXTOR BLACKARMOR BACKUP2009

Detailed instructions for use are in the User's Guide.

[. . . ] Acronis, "Acronis Compute with Confidence" and the Acronis logo are trademarks of Acronis, Inc. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. [. . . ] 57 disk defragmentation or disk error checking utilities at the same time, because this can irreparably corrupt the file system, as well as make the system disk unbootable. Seagate BlackArmor Backup will track changes until the BlackArmor Backup Secure Zone is almost full. Then the program will alert you that the time has come to make a decision on whether to apply or discard the changes made so far. If you choose to not heed the alert message, the program will automatically restart the system when the zone is full, discarding the changes in the process of rebooting. If you have chosen Discard Changes and rebooted the computer with multiple operating systems installed, you won't be able to boot other operating systems, except the one used for working in the Try&Decide mode. The second reboot will restore the original MBR and make other operating systems bootable. 7. 1 Using Try&Decide Now let's see how to use this feature. First of all, you should decide for yourself which part of your system you want to protect and set the Try&Decide options correspondingly. Those options also provide other settings for the Try&Decide mode. 7. 1. 2. Try&Decide options You can configure Try&Decide options as required. Partition protected by T&D ­ specify the partition you want to protect from unauthorized changes during a Try&Decide session. By default, T&D protects Disk C, though you may choose to protect any other partition in your system. Alert settings ­ specify whether Try&Decide should alert you when it uses up all the space allotted for saving virtual changes and after a specified time period has passed. By default all alerts are On. 7. 2 Try&Decide usage examples The Try&Decide feature can help you in a variety of ways; here are some examples: There are cases when the installation of antivirus software cripples functionality of some applications; in fact, some programs might even refuse to start after antivirus installation. Try to work with the applications installed on your computer performing your usual tasks. If everything works without any snags, you can be reasonably sure that there will be no incompatibility problems and can buy the antivirus software. If you encounter any problems, discard the changes in your system and try antivirus software from another vendor. Here's another example: You have accidentally deleted some files and then emptied the Recycle Bin. Then you have remembered that the deleted files contained important data and now you are going to try to undelete them using an undelete software program. However, sometimes you may do something wrong while trying to recover deleted files, making things 58 Copyright (c) 2000-2009 Acronis. After the utility scans your disk in search of the deleted file or folder entries, it will present you the deleted entries it has found (if any) and offer you the opportunity to save whatever it is able to recover. There is always a chance that you might pick the wrong file and while recovering it the utility may overwrite the very file you are trying to recover. If not for Try&Decide, this error would be fatal and the file would be lost irretrievably. [. . . ] Please see: http://www. cs. auckland. ac. nz/~pgut001/pubs/secure_del. html. Copyright (c) 2000-2009 Acronis. 127 C. 2 Information wiping methods used by Seagate BlackArmor Backup The table below briefly describes information wiping methods used by Seagate. Each description features the number of hard disk sector passes along with the number(s) written to each sector byte. Algorithm (writing Passes method) United States 4 Department of Defense 5220. 22M United States: 4 NAVSO P-5239-26 (RLL) United States: 4 NAVSO P-5239-26 (MFM) German: VSITR 7 Russian: GOST P50739-95 1 Record 1st pass ­ randomly selected symbols to each byte of each sector, 2 ­ complementary to written during the 1st pass; 3 ­ random symbols again; 4 ­ writing verification. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE MAXTOR BLACKARMOR BACKUP




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual MAXTOR BLACKARMOR BACKUP will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.