10.0

Table Of Contents
11 Copyright © Acronis, Inc., 2000-2011
It ranges from 0 to 9 and is set to 3 by default.
crypt:[AES128|AES192|AES256]
Specifies the key size for the AES algorithm encryption of the password-protected archive. The option
is used together with the /password (p. 9) option. For example:
/password:QWerTY123 /crypt:AES256
The randomly generated encryption key is then encrypted with AES-256 using a SHA-256 hash of the
password as a key. The password itself is not stored anywhere on the disk or in the backup file; the
password hash is used for verification purposes. With this two-level security, the backup data is
protected from any unauthorized access, but recovering a lost password is not possible.
If the /crypt option is not specified, the password-protected archive will be not encrypted.
split:[size in MB]
Split the backup into parts of the specified size, if the archive location is other than ASZ.
1.1.2.3 General options
oss_numbers
Declares that numbers of partitions in the /partition option are adjusted for the MBR partition table
rather than just as ascending numbers. This means that primary partitions have numbers 1-1, 1-2, 1-
3, 1-4; logical partitions numbers start with 1-5. For example, if the disk has one primary and two
logical partitions, their numbers can appear as follows:
/partition:1-1,1-2,1-3
or
/oss_numbers /partition:1-1,1-5,1-6
reboot
Reboot the machine before the operation (if required) or after the operation is completed.
Use this option when performing the following operations that require a reboot: recovering locked
files, creating/deleting Acronis Secure Zone on a system disk, cloning a system disk. The machine will
be rebooted automatically. To postpone the operation until a user reboots the system manually, add
the /later option. With this option, the operation will be performed after the user initiates a reboot.
The /reboot option can be used with operations that do not necessarily require a reboot. Examples
of such operations are: recovery under bootable media, recovering files that are not locked by the
operating system, archives validation, and most types of backup. In those cases a reboot will be
performed after the operation is completed. The /later option is not necessary.
The following table summarizes the software behavior with and without the /reboot and /later
options.
Reboot is necessary Reboot is not required