User's Manual

Table Of Contents
178 Copyright © Acronis International GmbH, 2003-2020
No.
Algorithm (writing method)
Passes
Record
sector for 6
th
to 4
th
security level systems.
Randomly selected symbols (numbers) to each byte
of each sector for 3
rd
to 1
st
security level systems.
6.
Peter Gutmann's method
35
Peter Gutmann's method is very sophisticated. It's
based on his theory of hard disk information wiping
(see Secure Deletion of Data from Magnetic and
Solid-State Memory).
7.
Bruce Schneier's method
7
Bruce Schneier offers a seven-pass overwriting
method in his Applied Cryptography book. 1
st
pass
0xFF, 2
nd
pass 0x00, and then five times with a
cryptographically secure pseudo-random sequence.
8.
Fast
1
Logical zeros (0x00 numbers) to all sectors to wipe.
13.8 Mounting an image
Mounting images as virtual drives lets you access them as though they were physical drives. You can
mount local backups that contain partitions or entire disk drives, and then select which partitions to
mount. After mounting:
A new disk appears in your system for every mounted partition.
You can view the image contents in File Explorer and other file managers in read-only mode.
The operations described in this section are supported only for the FAT and NTFS file systems.
You cannot mount a disk backup, if it is stored on an FTP server.
How to mount an image
1. In File Explorer, right-click the image file that you want to mount, and then click Mount image.
The Mount wizard opens.
2. Select the backup for mounting by its creation date/time. Thus, you can explore the data state at
a certain moment.