- . -
- A -
- B -
Backup Options
|
|
Ignore disk read errors (bad sectors)
|
|
|
|
|
|
|
|
|
|
Windows Volume Snapshot Service
|
BitLocker
BitLocker System Drive Encryption
- C -
configure startup media troubleshooting options
Contact information and technical support
Context menu
Create a script from an existing task
Create a script from R-Drive Image
Create Partition Parameters
Creating consistent point-in-time bakups
Custom rotation schemes options
Maximum size of all image files
- D -
Dialog boxes
- E -
- F -
File systems
Format partition options
- G -
Grandfather-Father-Son schemes options
Maximum size of all image files
- H -
HDD Copy Method
Copy all partitions onto original places
Expand/Shrink partition to whole disk
- I -
Image file format
Image Options
Volume size for multi-volume image
Image Options options
Compare file contents even for matching files
Remove files in the destination that have no matching files in the source
Shutdown computer when completed
Imaging Options
- K -
- L -
Linux Logical Volume Manager Volumes
List of Hardware Devices Supported in the Startup Mode
Load Computer into Startup Mode
- M -
Mail Notification Options
Media Options
Include R-Drive Image bootable version
Message
Messages
Choose drive(s) to umount them
Error: Another partitioner is active
Image selected is larger than destination
Insert a blank CD-R/RW disk...
Insert the next blank CD-R/RW disk...
Insert the next blank floppy disk...
ISO-image created successfully
|
Startup disks created successfully
Virtual disk(s) mounted successfully
You have selected several partitions...
Mount
Drive letter for the selected partition
Mount an image as a virtual logical disk
- N -
Notifications options
- O -
OEM Client Media Options
Automatically reboot on successful restore
Client will search image on all disks
Perform restoration without confirmation
- P -
Panels
|
Choose destination of new image
Choose image to check integrity
Choose image to mount drive(s) from
Mail Notification/Aux Applications
Removable Media Device Selection
Removable Storage Device Selection
Select disk(s) to create image
Partition layouts
Partition Manager
- R -
RAIDs, and Various Disk and Volume Managers
Restore Options
Drive letter for the selected partition
File system for the selected partitions
- S -
Scheduled actions, command line operations, and scripting
Scheduler and unattended actions
Script commands and parameters
Scripting and command line operations
Simple rotation scheme options
Maximum size of all image files
Create an image using the startup disks
Restore data to a system or another locked disk
Support for Various non-MBR/GPT Partition Layouts
Supported CD and DVD recorders
- T -
Task execution schedule options
Run missed task as soon as possible
Wake the computer to run this task
Tower-of-Hanoi schemes options
- U -
- V -
- W -
Windiows explorer shortcut menu
Windows Software Spanned Volumes
Windows Storage Spaces
Wiping algorithms
Data wiping is necessary only for files stored on conventional hard drives. Data stored on SSD storage devices cannot be effectively wiped out due to the principles of operation of these devices.
Currently R-Drive Image supports 5 wiping algorithms:
Zeroes |
The disk is filled with zeroes through 1 pass. The fastest but the least secure algorithm. Also it does not conceal the fact that the disk or file has been wiped. |
Pseudo-random numbers |
The disk is filled with pseudo-random numbers through 1 pass. A slower but little bit more secure algorithm than the Zeroes algorithm and it also conceals to some degree the fact that the disk or file has been wiped. |
DoD 5220.22-M(3) |
The disk is wiped using Department of Defense standard 5220.22-M(3). Provides high-grade data wiping filling the unused space or file with a special digital pattern through 3 passes This algorithm is very secure, but slow. |
DoD 5200.28-STD(7) |
The disk is wiped using Department of Defense standard 5200.28-STD(7). Provides high-grade data wiping filling the unused space or file with a special digital pattern through 7 passes. This algorithm is very secure, but very slow. |
Bruce Schneier(7) |
The disk is wiped using the Bruce Schneier's algorithm . Provides high-grade data wiping filling the unused space or file with a special digital pattern through 7 passes. This algorithm is very secure, but very slow. |
Peter Gutmann (35) |
The disk is wiped using the Peter Gutmann's algorithm . Provides high-grade data wiping filling the unused space or file with a special digital pattern through 35 passes. This algorithm is military-level secure, but horribly slow. |
What algorithm is to choose, depends on your specific needs. All of these wiping algorithms make recovery of wiped data with any software-based data recover utility impossible. So if you want to protect your information from a casual snooper, you may safely choose either the Zeroes or Pseudo-random numbers algorithm. The latter also conceals the fact that you wiped the data.
If you want more security , you need to know the following:
There are some techniques for recovery of wiped data. These techniques are based on the fact that magnetic medium on the hard drive's platters "store" some information about previously written data. Such information cannot be completely removed. Wiped data may be recovered even from mechanically damaged platters. So the only safe way to completely remove data from a hard drive is to mechanically grind the magnetic medium off the drive platters or dissolve them in special chemical solvents.
But in order to recover the wiped data using one of these techniques, a hard drive must be disassembled, its platters placed in a precise magnetic field measurement system, and the results of such measurement statistically processed. All that is very expensive and requires a very qualified and experienced personnel and a specially developed equipment. Only a very advanced organization such as a law enforcement or intelligence agency of a developed nation, or a special high-tech firm can afford this. Moreover, each successive wiping pass makes such data recovery much and much harder. So, the DoD 5220.22-M(3) clearing and sanitizing standard overwriting the data with a special pattern through 3 passes is a rather reliable and safe choice for this case.
If you need the ultimate security, use the DoD 5220.22-M(7) clearing and sanitizing standard, or even the Peter Gutmann (35 ) wiping algorithm. They render data almost unrecoverable, but they are extremely slow.