624465
4
Verklein
Vergroot
Pagina terug
1/59
Pagina verder
Acronis
PowerUtilities
User’s Guide
Copyright © Acronis, Inc., 2000-2004
Copyright © Acronis, Inc., 2000-2004. All rights reserved.
Linux is a registered trademark of Linus Torvalds.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their
respective owners.
Distribution of substantively modified versions of this document is prohibited
without the explicit permission of the copyright holder.
Distribution of the work or derivative work in any standard (paper) book form
for commercial purposes is prohibited unless prior permission is obtained
from the copyright holder.
DOCUMENTATION IS PROVIDED «AS IS» AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
4.9 MANUAL UPGRADE ....................................................................... 35
CHAPTER 5. HARD DISK ERROR CORRECTION ...........................................36
5.1 BEGINNING TO WORK WITH THE PROGRAM ACRONIS DISKEDITOR36
5.2 MAIN WINDOW OF THE PROGRAM ................................................37
5.3 WORKING IN MULT-IWINDOWS MODE.......................................... 38
5.4 EDIT HARD DISKS.......................................................................... 40
5.5 WRITE BLOCK TO A FILE AND READ FROM A FILE........................ 42
5.6 VIEW.............................................................................................. 43
5.7 SEARCH .........................................................................................44
5.8 WORKING WITH DIFFERENT ENCODINGS...................................... 45
5.9 OTHER ACRONIS DISKEDITOR CAPABILITIES ............................... 46
CHAPTER 6. DISK DATA WIPING .................................................................. 47
6.1 CONFIDENTIAL INFORMATION ON HARD DISKS: STORAGE AND ACCESS
.......................................................................................................47
6.1.1 CONFIDENTIAL INFORMATION: DESTRUCTION..........................................47
6.1.2 DATA DELETION BY MEANS OF AN OPERATING SYSTEMS........................48
6.1.3 GUARANTEED DESTRUCTION OF CONFIDENTIAL INFORMATION: STANDARDS
.................................................................................................................49
6.2 WORKING WITH ACRONIS DRIVECLEANSER SOFTWARE.............. 50
6.2.1 RESULTS OF THE WIPING SCRIPT EXECUTION...........................................55
6.3 CREATING CUSTOM ALGORITHMS ................................................ 56
APPENDIX A. HARD DISK WIPING ALGORITHMS..........................................57
A.1 INFORMATION WIPING ALGORITHMS FUNCTIONING PRINCIPLES.57
A.2 ALGORITHMS USED BY ACRONIS PRIVACYEXPERT AND
DRIVECLEANSER .....................................................................................58
4
Table of Contents
Chapter 1. Acronis PowerUtilities
1.1 About Acronis PowerUtilities
Acronis PowerUtilities, the long-anticipated utilities suite from the technology
leader Acronis, includes four of the most popular system utilities available in
one box:
Acronis PrivacyExpert, the powerful privacy utility that keeps
computing and surfing history completely private.
Acronis MigrateEasy, the preeminent hard disk drive migration tool
available today.
Acronis DiskEditor, the technically advanced tool designed to edit
your hard disk and its partition data manually.
Acronis DriveCleanser, the proven solution to securely obliterate hard
disks clean.
Compute and Surf Without a Trace!
Acronis PrivacyExpert provides you with complete confidentiality while
working with a stand-alone or networked personal computer (PC). The
confidentiality that Acronis PrivacyExpert delivers allows you to clean-up
trace data and Windows by removing any evidence of your work or Internet
activities.
Unlike other software Acronis PrivacyExpert also increases PC performance
by cleaning out temporary files.
Acronis PrivacyExpert is PC performance improvement as a result of hard
disk cleanup from numerous temporary files.
Upgrade Your Hard Disk Drive in Minutes!
Its finally time youve put it off as long as possible, but it’s now time to
upgrade to a new larger hard disk drive. And if you’re like most, you’re not
excited. You think you’re in for a large project spanning several days of
tedious work. Luckily for you, there’s Acronis MigrateEasy, the award-winning
solution that migrates all your computer data and system files to a new hard
disk drive in minutes, while keeping all operating systems and applications
fully functional. Why take days upgrading, when you can use Acronis
MigrateEasy and be finished in minutes?
With Acronis MigrateEasy, you don’t have to be a computer scientist to
upgrade to a new hard disk drive. Simply make a few choices when
prompted, and Acronis MigrateEasy will take care of everything
Acronis PowerUtilities
5
automatically. It will even show you a preview of the migration can be
completely assured of file and system transfer. Within minutes, your data,
including applications and operating systems, will be safely on your new
large hard disk drive and ready to go!
Hard Disk Problem? Not Any More
Quite often problems can arise with hard disk drives that cannot be solved
without a technically advanced disk editor. Such problems include: back-up,
copying, and/or recover important data areas of a hard drive; search and/or
extraction of information that was removed by accident or lost due to
different soft- and hardware failures or virus attack. Acronis DiskEditor, with
booting up from a diskette, works even if your operating system does not.
Securely Obliterate Your Hard Disks
Getting rid of an old PC, upgrading to a new hard drive, returning a leased
computer, or redeploying a PC within your company? It is truly imperative to
completely destroy all data from the old hard disk.
Your confidential data should not only be safeguarded according to the strict
rules, but it should also be reliably and completely destroyed when needed.
You think you have deleted all the financial, corporate, and personal files,
and even formatted and deleted hard disk partitions – but are they really
gone from the drive? The answer is NO!
Acronis DriveCleanser guarantees the complete destruction of data on
selected partitions and/or entire disks with extremely simple Windows XP-
style interface and straight-forward actions.
1.2 About the Acronis PowerUtilities User’s Guide
This Guide briefly describes the main features of Acronis PowerUtilities suite
components, including the following chapters:
Chapter 2 «Installing and Starting to Work with Acronis
PowerUtilities» - installing, recovering and removing various suite
components;
Chapter 3 «Cleaning User Activity Traces From a Computer» -
working with Acronis PrivacyExpert: setting up and executing variants
of complex PC and system cleanup;
Chapter 4 «Migrating Data to a New Hard Disk» - working with
Acronis MigrateEasy: preparing a hard disk for installation and
automatic migration of the complete data set, including operating
system, applications, documents, etc.;
Chapter 5 «Hard Disk Error Correction» - working with Acronis
DiskEditor: low-level access to hard disk sectors, searching disk for
6
Chapter 1 : Acronis PowerUtilities
data, operating with sector byte blocks, browsing and editing the
Master Boot Record and boot sectors, File Allocation Table;
Chapter 6 «Disk Data Wiping» - working with Acronis DriveCleanser:
guaranteed wiping of confidential data on an obsolete or unused disk,
data wiping algorithms;
Appendix A. «Hard Disk Wiping Algorithms» - the necessity of strict
hard disk data wiping algorithms and the detailed description of
algorithms integrated into Acronis PrivacyExpert and Acronis
DriveCleanser.
1.3 Software Usage Conditions
The conditions of Acronis PowerUtilities software usage are described in the
«License agreement», included in this package. The supplied registration
card is the confirmation of your legal purchase and usage of Acronis
PowerUtilities software. Each registration card has its own unique registration
number.
Based on current legislation the «License agreement» is considered a
contract between a user and a software manufacturer. This contract has the
legal effect and its violation may entail a court examination.
Illegal use and distribution of software will be prosecuted.
1.4 Technical Support
Users of legally purchased and registered copies of Acronis PowerUtilities
receive free technical support from the Acronis Inc. In case you have
problems with installation or using the software, that cannot be solved with
this guide or readme, please e-mail the technical support. You will also need
to send us you the registration number for Acronis PowerUtilities. This
number is written on a registration card, supplied with this package.
Support URL:
http://www.acronis.com/support/
E-mail: support@acronis.com
Acronis PowerUtilities
7
Installing and Starting to Work with Acronis PowerUtilities
Chapter 2. Installing and Starting to Work
with Acronis PowerUtilities
2.1 Acronis PowerUtilities System Package
Acronis PowerUtilities system package includes:
an installation disc,
this guide,
license agreement,
registration card,
advertising materials.
2.2 Hardware and Software Requirements
To take a full advantage of Acronis PowerUtilities one should have:
a PC-compatible computer with a Pentium CPU or similar,
32 MB RAM,
VGA monitor,
a mouse (recommended),
free disk space for archive files.
2.3 Installing Acronis PowerUtilities Components
To install Acronis PowerUtilities suite component, please, insert the CD-ROM
into the drive, select the needed component and run the installer. Please,
carefully follow all the instructions.
Having answered Acronis PowerUtilities component installation wizard
questions, you will be prompted to create a bootable CD-R/W or diskettes (if
you purchased Acronis PowerUtilities on a bootable CD, you can skip this
step).
2.4 Recovering Acronis PowerUtilities Components
If a component of Acronis PowerUtilities failed to install or run, please,
execute the installation program again. The software will determine that the
8
Chapter 2 :
component has already been installed to your PC and prompt you to recover
(update) or completely remove it from the disk.
In the component installation wizard select Recover/update Acronis
<component> and click Next. All necessary files will be copied to your hard
disk again to properly restore software.
2.5 Removing Acronis PowerUtilities Components
To remove a component select Acronis Æ <component> Æ Remove
<component> from the Programs menu. You will see a prompt to confirm
removal of the software from your PC hard disk.
Click Yes to confirm removal. The selected component of Acronis
PowerUtilities suite will be completely removed from the PC hard disk.
2.6 Acronis PowerUtilities Suite Interface
The user interface of Acronis PowerUtilities suite features standard Windows
graphical user interface (GUI) elements. Please pay close attention to setting
and executing clean-up variants.
2.7 Running a Suite Component
To run a suite component select Programs Æ Acronis Æ <component> from
the Start menu. For example, select Programs Æ Acronis Æ Acronis
PrivacyExpert to run Acronis PrivacyExpert.
In some cases you will be prompted to load a component from a bootable
diskette or CD-R/W, that was created during the component installation.
Acronis PowerUtilities
9
Cleaning User Activity Traces From a Computer
Chapter 3. Cleaning User Activity Traces
From a Computer
Clean-up of user PC activity traces is performed by Acronis PrivacyExpert, a
part of Acronis PowerUtilities suite.
Acronis PrivacyExpert is controlled from the main window. It is shown on the
screen after selecting Acronis Æ PrivacyExpert Æ PrivacyExpert from the
Programs menu. The Acronis PrivacyExpert main window is a Windows dialog
box split into two parts:
The right part contains grouped lists of main PC cleanup variants
user may execute with Acronis PrivacyExpert;
The left part of the window, or sidebar, is an element, that was
introduced in the Windows XP. It contains grouped actions that can
be performed on objects in the right part of the window.
Main window Acronis PrivacyExpert
Clean-up variants are executed, set, scheduled, and renamed with the help
of corresponding items of the main menu, toolbar, sidebar, and context
menus.
3.1 Software Logical Organization: Sections
Logically Acronis PrivacyExpert consists of several parts, each enabling the
user to perform (1) specific variants of complex PC clean-up from PC activity
evidence or (2) clean-up separate system components.
10
Chapter 3 :
3.1.1 Complex PC Clean-up
In the One Click Clean-up section, shown by default in the right part of the
Acronis PrivacyExpert main window, the user has access to icons of three
pre-defined complex PC clean-up.
If you need to perform:
1. entire PC clean-up, including Windows system section and sections related
to working on the Internet, execute Entire PC Clean-up;
2. clean-up of sections related to working on the Internet only, execute Internet
Clean-up;
3. Windows system section and user files/folders cleanup, execute System
Cleanup.
Attention! Described clean-up variants are fully set-up by default and ready for
immediate work once Acronis PrivacyExpert is installed. They were specifically created
for the ma
j
ority of users to take advanta
g
e of them without understandin
g
all the
complex settin
g
details. Any of these variants can be executed by a click of the
mouse!
3.1.2 Cleaning Separate System Components
Internet Components and System Components sections allow you to
perform a quick clean-up of separate system components once you have
taken specific actions on your PC.
For example, you need to clean-up the browser cache from garbage after
visiting a dubious content site and remove its URL from the list of visited
sites, etc. This will not take much time compare to a full, complex clean-up.
If you need to perform:
1. a quick clean-up of only separate components of Windows system
sections and separate user files/folders, execute one of the clean-up
variants from the Components section;
2. a quick clean-up of only separate Windows components, related to
working on the Internet, execute a variant from the Internet
Components section.
Separate components clean-up takes less time than complex cleanup of
entire Windows sections.
All PC clean-up variants as well as separate components cleanup are
executed manually or by schedule and are set universally (see 3.2
«Executing PC Clean-up Manually», 3.5 «Executing Scheduled PC Clean-up»,
3.3 «Clean-up Settings») and differ only by the number of settings..
Acronis PowerUtilities
11
3.2 Executing PC Clean-up Manually
There are three ways of manually executing complex PC and component
clean-up.
PC or separate component clean-up, previously selected from the right part
of the Acronis PrivacyExpert main window, can be executed by:
1. mouse-clicking Start Now! in the Acronis PrivacyExpert main window
sidebar;
2. selecting Clean-up Æ Start Now! from the main menu;
3. selecting Start Now! from the task context menu.
If you are unable to see the clean-up variant or components to clean in the
workspace, please scroll down to make it visible.
3.3 Clean-up Settings
3.3.1 Clean-up Settings
By changing clean-up settings, you can set Acronis PrivacyExpert for your
personal needs. For example: you can select an algorithm of guaranteed
data destruction that suits you by speed and reliability, enter the type of
temporary files to clean, directly select browser used, disable separate
component clean-up, etc. This will enable Acronis PrivacyExpert to clean your
PC at maximum speed and performance.
Settings are described below.
3.3.2 Clean-up Settings Editor
Having selected a clean-up variant by mouse-clicking from the right part of
the Acronis PrivacyExpert main window, and then Properties from the sidebar
Edit list, you invoke the settings editor. You can also do this by selecting a
clean-up variant and Clean-up Æ Properties from the main menu. Finally, the
settings editor can be invoked from the context menu of a clean-up variant
by selecting Properties.
3.3.3 Setting PC Component Clean-up with the Editor
Below you can see the opened settings editor featuring two groups of
components to clean that belong to the Entire PC Clean-up. There are two
of such groups:
Internet Clean-up – this group includes clean-up of sections related to
working in the Internet,
12
Chapter 3 : Cleaning User Activity Traces From a Computer
System Clean-up – this group includes Windows system section and
user files/folders clean-up.
If you need to set up component clean-up:
1. select the component from the left part of the editor and check the
Enable <component name> box;
The description of a component to clean
2. set component clean-up; for this consecutively select each component
clean-up setting or set-up as necessary (selecting/entering clean-up
algorithm, file type, Internet browser, etc.);
«Files» setting
3. to save your settings click Apply. To discard changes click Cancel.
Acronis PowerUtilities
13
If you need to:
1. clean-up Internet cache (last visited pages list) from all files (lists,
elements), downloaded from specific Internet address (site), enter
addresses or their parts separated by semicolon, for example like:
*cnn*;*formula1*
As a result all files downloaded from
www.cnn.com, www.formula1.com
will be deleted.
2. clean-up Internet cache from only specific file types downloaded from
specific Internet address (site), enter addresses separated by semicolon,
for example like:
*cnn*.jpg;*cnn*.gif;*formula1*.jpg;*formula1*.gif
As a result only *.jpg, *.gif files will be deleted, and, for example, *.html
files will remain in cache.
Entering the Internet addresses list, you can browse files (visited pages)
selected according to the list. To do this click
Show URLs. You will see the
window with selected addresses. They will be deleted during at the selected
component clean-up.
3.4.2 System Component Clean-up Settings
«Data Destruction Algorithm» and «Files» settings are common for system
component cleanup.
«Data destruction algorithm» Setting
Having selected «Data Destruction Algorithm» setting you can change the
security level provided by PC clean-up and clean-up speed.
For detailed information about data destruction algorithms see 3.7 «Data
Clean-up Algorithms» and Appendix A. «Hard Disk Wiping Algorithms».
The highest level security algorithms are always very slow, and vice versa,
the quickest algorithms provide less reliability and security.
16
Chapter 3 : Cleaning User Activity Traces From a Computer
Having mouse-clicked a setting name, you will see its available element in
the right part of the editor – the selection of data destruction algorithms.
Selecting a data destruction algorithm
Mouse-clicking the drop-down list in the right part of the editor, you will see
all data destruction algorithms available in Acronis PrivacyExpert.
If you need to ensure:
1. the top security for wiping PC activity evidence, select Peter Gutmann’s
algorithm (35 data destruction cycles), but remember that it’s very slow;
2. the medium level of security at an average speed of clean-up, select VSITR
or Bruce Schneier’s algorithm (7 data destruction cycles);
3. the fast PC clean-up, with less security in mind, select any of 1-3-pass
algorithms (see A.2 «Algorithms Used by Acronis PrivacyExpert and »).
«Files» Setting
The «Files» setting is meant to provide temporary file names to clean with
Acronis PrivacyExpert (from Windows Recycle Bin and from system and user
folders) and is actually a search string.
In the Windows operating system, a search string might represent a full or
partial file name. A search string may contain any alphanumeric symbols,
including comma, * and ? symbols, and can have values similar to the
following :
*.* – to delete all files from the Recycle Bin – with any file names
and extensions;
*.doc – to delete files with specific extension – Microsoft document
files in this case;
Acronis PowerUtilities
17
read*.* – to delete all files with any extensions, and names beginning
with «read»;
read?.* – to delete all files having 5-letter names and any extensions,
names beginning with «read», the fifth letter is random.
For example, the last search string will result in removal of read1.txt,
ready.doc files, but readyness.txt will remain since it has a longer pre-fix
name (excluding the extension).
You can enter several different search strings separated by semicolon, for
example:
*.bak; *.tmp; *.~~~;
and so on. All files with names corresponding to at least one of the search
strings will be deleted.
Attention! The length of a search string with full or partial names is almost infinite!
You may enter any number of filenames or their parts like *.tmp, read?.* separated
by semicolon.
The «Files» setting has four system components to clean: Recycle Bin,
Temporary Files, Custom Folders/Files, and Find Files List.
«Files» setting
18
Chapter 3 : Cleaning User Activity Traces From a Computer
If you need to:
1. delete only specific file types from the Recycle Bin (system or user
folder), enter filenames separated by semicolon, for example, as follows:
*.jpg; *.gif;
2. delete only specific filenames from the Recycle Bin (system or user
folder), enter names, for example, as follows:
read*.txt.
This will result in removal of read!.txt, readme.txt, read1.txt, etc. files,
while read.doc, readme.doc, etc. will remain.
3. delete only specific length filenames from the Recycle Bin (system or
user folder), enter filename, for example, as follows:
read?.txt.
As a result files read!.txt, read1.txt, read2.txt, etc. will be deleted, while
read.doc, readme.doc, etc. will remain.
By entering filenames, you can browse the files selected by Acronis
PrivacyExpert. To do this click
Show Files. You will see a window containing
selected files. These files are set for destruction when you invoke the clean-up.
«Computers» Setting
The «Computers» setting is meant to clean-up the registry from search
strings for finding computers in the local network. These strings keep
information on what interested you in the network. So they should also be
deleted to maintain full confidentiality.
«Computers» setting is the same as «Files». «Computers» setting is a string
that can contain any number of full or partial computer names separated by
semicolons. The deletion of computer search strings is based on a comparison
with the «Computers» setting according to Windows rules (see ««File
Setting»).
If you simply need to delete all local network computer search strings (suitable
for the most cases):
1. select Find Computer List;
2. check the Enable the Find Computer List cleaning box;
3. select «Computers» setting; leave its default value unchanged – *.
Acronis PowerUtilities
19
As a result all computer search strings will be deleted from the registry.
«Computers» setting
On entering «Computers» setting value you can browse the search strings
kept in the registry selected by Acronis PrivacyExpert. To do this click
Show
Computers. You will see the window with full and partial computer names
searched for in the network. They will be deleted at the registry clean-up.
3.5 Executing Scheduled PC Clean-up
Each PC clean-up variant of Acronis PrivacyExpert can be executed either
manually or automatically as scheduled.
Having set PC clean-up as a daily procedure, to be performed for example, at
the end of workday before powering the PC off, you can be sure that all
evidence of your PC and Internet activity will be reliably removed each day.
Acronis PrivacyExpert features a built-in scheduler.
20
Chapter 3 : Cleaning User Activity Traces From a Computer
3.5.1 Invoking the Scheduler
Having mouse-clicked a cleanup variant in the right part of the Acronis
PrivacyExpert main window, and selected Schedule in the sidebar Clean-up
list, you invoke the scheduler. You can also do this by selecting a clean-up
variant and Clean-up Æ Schedule from the main menu. Finally, you can invoke
the scheduler from the clean-up variant context menu-selecting Schedule.
Scheduler
3.5.2 Scheduler Settings
Scheduler provides the user with flexible capabilities for automatic execution
of any PC clean-up variant.
If you need to perform automatic PC clean-up:
1. daily at specific time, only during workdays or periodically – over several
days, set the switch on the 1
st
scheduler page to Daily;
2. weekly at specific time and weekdays, say Tuesday and Friday, or
periodically – in two or three weeks, etc., set the switch on the 1
st
scheduler page to Weekly;
3. monthly at specific time and day; the ability to execute clean-up on, for
example, the <first, second, third, fourth, last> <weekday> (Monday,
Tuesday, Wednesday, Thursday, Friday, Saturday, Sunday), set the switch
on the 1
st
scheduler page to Monthly;
4. once at specific time (hours: minutes) and date (day-month-year), set
the switch on the 1
st
scheduler page to One time only;
Acronis PowerUtilities
21
5. in all of the above click Next and set additional execution settings on the
2
nd
scheduler page.
If you need automatic PC clean-up:
1. at PC start-up, set the switch on the 1
st
scheduler page to When my
computer starts;
2. at shutdown, the switch on the 1
st
scheduler page to When my computer
shuts down.
If you need to disable automatic scheduled execution:
1. invoke the scheduler again;
2. on the 1
st
scheduler page set the switch to Disable scheduled clean-up.
3.6 Renaming Clean-up Variants
Enabling/disabling separate component clean-up and selecting clean-up
settings, you set-up and customize your PC clean-up variant(s) as needed.
That said, you may want to rename a variant to better represent PC clean-up
contents.
If you want to rename a PC (or separate component) clean-up variant you can do
this by following one of three methods:
1. mouse-clicking Rename on the sidebar;
2. selecting Clean-up Æ Rename from the main menu;
3. selecting Rename from the context menu of a PC (component) cleanup
variant.
As a result of any of these actions you will see the Rename Item window
enabling you to enter a new name for PC or component clean-up variant.
3.7 Data Clean-up Algorithms
Unlike most software providing the confidentiality of PC and Internet activity,
Acronis PrivacyExpert not only deletes Windows sections (files, folders,
registry components, etc.), it also performs a thorough low-level clean-up of
hard disk sectors containing Windows components selected for cleaning.
Trace Windows data and files are cleaned with the help of integrated data
destruction algorithms. Acronis PrivacyExpert provides the user with eight
algorithms. Five of the eight meet the most popular national data destruction
standards:
(1) American: DoD 5220.22-M,
(2) American: NAVSO P-5239-26 (RLL),
22
Chapter 3 : Cleaning User Activity Traces From a Computer
7. clean the last visited pages and last used documents list;
8. delete the evidence of searching for files on connected disks, for
networked computers, for information on the Internet;
9. clean Internet cache;
10. delete cookies
11. delete downloaded components;
12. clean Internet history and last visited pages list.
Entire PC clean-up is executed by a mouse-click on its name in the right part
of the main window (for other execution methods see sections 3.2, 3.5).
3.8.2 System Clean-up
If you need to wipe the evidence of your PC activity from its system sections,
use the System clean-up. Executing it allows you to:
1. clean Windows registry from user activity traces;
2. delete temporary files from standard Windows folders;
3. delete any file types from user folders on any disks connected to a PC;
4. clean Windows Recycle Bin;
5. clean Windows swap file;
6. clean hard disk free space;
7. clean last used documents list;
8. delete the evidence of searching for files on connected disks, for
networked computers, for information on the Internet.
System cleanup can be executed by mouse-clicking the cleanup variant in the
right part of the main window (for other execution methods see sections 3.2, 3.5).
3.8.3 Internet Clean-up
If you need to wipe the evidence of your Internet activity, use Internet
cleanup. This variant allows you:
1. clean-up Internet cache;
2. delete cookies;
3. delete downloaded components;
4. clean Internet history and last visited pages list.
Internet clean-up can be executed by mouse-clicking its name in the right
part of the main window (for other execution methods see sections 3.2, 3.5).
24
Chapter 3 : Cleaning User Activity Traces From a Computer
3.9 A Fast Cleanup of Separate System Components
Acronis PrivacyExpert enables you to perform a fast clean-up of separate system
components. For example, you can clean just the Last Visited Pages or cookies.
A separate component is cleaned faster than a complex PC clean-up.
Separate component clean-up is performed from Internet Components and
System Components sections (see 3.1.2 «Cleaning Separate System
Components»). Setting up and executing the clean-up is similar to complex
clean-up set-up and execution.
Please note that the detailed description of Acronis PrivacyExpert actions for
each specific component clean-up case (how and what files and folders,
system or registry sections are cleaned from what data types) are included in
the .pdf file on the installation CD-ROM.
Acronis PowerUtilities
25
Migrating Data to a New Hard Disk
Chapter 4. Migrating Data
to a New Hard Disk
You can migrate your data from the old hard disk to a new one with the help
of Acronis MigrateEasy, a part or the Acronis PowerUtilities suite.
4.1 Preparing for Migration
To use the Acronis MigrateEasy application effectively you have to know at
least the basics of hard disks and how the computer works with them. Below
we will provide only the most necessary information, without covering the
technical details of inner structure of hard disks.
If you have difficulties with understanding what the application does to hard
disks, please refer to Appendices at the end of this Guide. Those appendices
contain both information on hard disk organization and on how data are
stored on it.
At the end of the Guide you will find a Glossary with explanations of terms
from this Guide that may be unknown or unclear to you.
4.2 Hard Disk Partitions and File Systems.
It would be quite inconvenient if you could only access the entire hard disk,
so a mechanism was created that allows you to divide the hard disk into
several parts for storing different types data or operating systems. This is
done by partitioning hard disks into partitions.
An operating system provides the user with ability to work with data by
supporting some type of file system on a partition. Most operating systems
support several file systems. For example, Windows 98/Me support FAT16
and FAT32 file systems, Windows NT/2000/XP support both FAT16/32 and
NTFS file systems. The popular Linux operating system supports Ext2, Ext3,
and ReiserFS (and some other) file systems.
26 Chapter 4 :
Acronis MigrateEasy works only with hard disks and the partitions contained on
them. This means that:
1. You will never see files, nor folders while working with MigrateEasy, but
only hard disks, their partitions, and the properties of both (disk
numbers, letters, capacities and sizes, etc);
2. When moving all your data to a new disk, MigrateEasy works not with
files and folders, but with more basic disk structure elements.
For more details on hard disk partitions and their usa
g
e by operatin
g
systems, see
the Guide Appendix in the .pdf file on the installation CD-ROM.
4.3 Installing a Hard Disk on Your Computer
To upgrade the disk subsystem of your computer you need to install the new
disk in the PC case and plug it into power supply block and mother board.
Before installing and fixing the hard disk you have to install a jumper on a
special connector of the disk board to which power and data cables attach.
Usually the jumper on your old disk is installed in the Master position. To
upgrade the disk first you have to install the new disk as Slave and later
position the jumper based on how you are going to use it (Master if the disk
will be the boot disk, or Slave if it will be just an extra storage).
More details of hard disk hardware installation can be found in the Guide Appendix in
the .pdf file on the installation CD-ROM.
4.4 BIOS Set-up
It is not enough to properly position jumpers on the hard disk and connect it
to power supply and data cables, you must also properly configure your hard
disk in BIOS (Basic Input/Output System).
You can enter the BIOS setup program by pressing the key combination that
is displayed right after you turn on your computer.
Hard disks can be configured in the Standard CMOS Set-up section of the
BIOS set-up menu. If you have set the hard disk jumper to Slave and have
connected the data cable to the Primary IDE plug of the motherboard, it may
only be necessary to set the TYPE and MODE parameters for the Primary
Slave disk to Auto (this information is usually sufficient for BIOS to properly
detect and configure modern hard disks.)
Acronis PowerUtilities
27
After the new disk is configured in BIOS, save the settings.
For more details about BIOS set-up and possible errors (including error messa
g
es)
see the Guide Appendix in the .pdf file on the installation CD-ROM.
4.5 Starting Work with Acronis MigrateEasy
To start a migration process under Windows, select Start Æ Programs Æ
Acronis Æ MigrateEasy Æ Acronis MigrateEasy.
If you do not have a Windows operating system installed, you should create
a bootable diskette or CD-R/W, and re-boot your PC from it, to start a
migration process. Further steps will be the same.
All operations with hard disks are done according to scenarios that are
created as a result of user’s choices and actions. Before you actually run a
scenario, no real changes are made to the existing configuration. You can
return to previous stages of scenario creation and change the parameters at
any stage of the program.
The program can work only if two or more hard disks are installed on your
computer. This means that if you have only one hard disk, you get the
following message:
The next Wizard page is the page that actually starts the work on
transferring data to the new hard disk. Let us first describe the main
scenarios of working with MigrateEasy.
28 Chapter 4 : Migrating Data to a New Hard Disk
4.6 Migration Scenarios
Before starting the program, you have to know for sure, what you can expect
from it. Below we describe the details of each of possible work scenarios.
Here we will list only the main scenarios and their outcomes.
4.6.1 Auto Upgrade
The results of auto upgrade scenario are as follows:
1. An exact copy of the source disk is created on the destination disk. It
means that literally everything is copied:
Disk partitions, file system types, volume labels;
All folders and files, installed operating systems and applications.
If the capacity of the new disk is larger than that of the old one,
partitions from the old disk are transferred to the new one with
proportional increase in size.
2. Destination disk is made bootable (if of course the source disk was
bootable in the first place) and active.
3. All data remains intact on the source disk!
4.6.2 Manual Upgrade
Manual upgrade provides you with more flexibility. You can choose how to use the
new disk and what to do with data on the old hard disk drive.
1. First you can choose from one of two main ways to configure the new
hard disk:
The disk is installed as a boot disk;
The disk is installed as additional data storage.
2. Next you have to define the way to transfer partitions and data.
MigrateEasy offers you the following options:
Partitions and data are transferred «as is»;
Disk space on the new disk is distributed proportionally among the
partitions that are transferred from the old disk;
Manual.
3. You can also choose what to do with the old disk:
Leave partitions (and data) on the old disk;
Delete partitions (and data) from the old disk.
Acronis PowerUtilities
29
If you decide to transfer partitions to the new disk and delete them from the
old one, you can repartition the old disk to use it for some other purposes.
Transferring partitions «as is» means that for each partition of the old disk
an exact copy is created on the new disk, i.e. the type, size, file system, and
label of the partition remain the same.
«Disk space on the new disk is distributed proportionally» means that if the
capacity of the new disk is larger than that of the old one, a copy is created
on the new disk for each of partitions on the old disk, but the size of each
partition is increased proportionally to the ratio between the new and old
disk capacities, so that the partitions occupy all the destination disk.
4.7 Auto Upgrade
The automatic upgrade will make an exact copy of your old hard disk by
proportionally resizing all partitions to match your new hard disk size. This
function is suitable for most users.
You get to the Upgrade Mode page right after the welcome page.
Select upgrade mode (Auto/Manual)
Switch the radio button on this page to the Auto position and press the
Next button.
30 Chapter 4 : Migrating Data to a New Hard Disk
Then you must specify which disk the data is transferred from.
Select source hard disk
Markings on this page help you to understand which disk should be the
source and which the destination one (check for disk numbers, volume
labels, partitions and file systems on disks).
In the lower part of the window you see the graphical representation (as
rectangles of various sizes) of the partitions of the selected hard disk, and
also the unallocated space. Along with the number of the disk you see some
additional information: partition number, volume label (e.g. SYSTEM), file
system type (e.g. FAT16 or FAT32), size of partition in gigabytes (GB).
Partition types (Primary and Logical) and unallocated space are shown in
different colors. All this information prevents you from being confused as to
where from and where to you are transferring your data.
Select the disk to which the data will be transferred on the Destination disk
page.
On this page you cannot select the disk that you have designated as the
source disk on the previous page, so it is grayed.
Acronis PowerUtilities
31
4

Hulp nodig? Stel uw vraag in het forum

Spelregels

Misbruik melden

Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.

Product:

Bijvoorbeeld antisemitische inhoud, racistische inhoud, of materiaal dat gewelddadige fysieke handelingen tot gevolg kan hebben.

Bijvoorbeeld een creditcardnummer, een persoonlijk identificatienummer, of een geheim adres. E-mailadressen en volledige namen worden niet als privégegevens beschouwd.

Spelregels forum

Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:

Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.

Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.

Abonneren

Abonneer u voor het ontvangen van emails voor uw Acronis Power Utilities 2006 bij:


U ontvangt een email met instructies om u voor één of beide opties in te schrijven.


Ontvang uw handleiding per email

Vul uw emailadres in en ontvang de handleiding van Acronis Power Utilities 2006 in de taal/talen: Engels als bijlage per email.

De handleiding is 1,62 mb groot.

 

U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.

Stel vragen via chat aan uw handleiding

Stel uw vraag over deze PDF

Andere handleiding(en) van Acronis Power Utilities 2006

Acronis Power Utilities 2006 Gebruiksaanwijzing - Deutsch - 62 pagina's


Uw handleiding is per email verstuurd. Controleer uw email

Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.

Er is een email naar u verstuurd om uw inschrijving definitief te maken.

Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken

U heeft geen emailadres opgegeven

Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.

Uw vraag is op deze pagina toegevoegd

Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.



Info