User`s guide
24.3.1 Functioning principles of Information wiping methods ........................................................................... 188
24.3.2 Information wiping methods used by Acronis .......................................................................................... 189
25 Startup Parameters ............................................................................................................ 190
25.1 Description .............................................................................................................................190
26 Index ................................................................................................................................. 192