User’s Guide Acronis® True Image 10.
Copyright © Acronis, Inc., 2000-2007. All rights reserved. “Acronis”, "Acronis Compute with Confidence", “Acronis Snap Restore”, “Acronis Recovery Manager, “Acronis Secure Zone” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. Acronis® True Image Home (the Software) is Copyright © Acronis, Inc., 2000-2007. All rights are reserved. The original purchaser is granted a license to use the software only, subject to the following restrictions and limitations. 1.
Table of Contents Chapter 1. Introduction...........................................................................................7 1.1 What is Acronis® True Image Home? ................................................................................. 7 1.2 New in Acronis True Image 10.0 Home ............................................................................... 7 1.3 System requirements and supported media ......................................................................... 8 1.3.1 1.3.
.3.7 File-level security settings.......................................................................................... 34 5.3.8 Media components.................................................................................................... 34 5.3.9 Additional settings .................................................................................................... 35 Chapter 6. Restoring the backup data ..................................................................36 6.
Chapter 12. Exploring archives and mounting images .........................................67 12.1 Exploring an archive ...................................................................................................... 67 12.2 Mounting an image........................................................................................................ 69 12.3 Unmounting an image ................................................................................................... 70 Chapter 13.
Chapter 1. Introduction 1.1 What is Acronis® True Image Home? Acronis True Image Home solves all backup problems, ensuring the safety of all information on your PC. Using it, you can back up selected files and folders, Windows applications settings, settings and messages of Microsoft e-mail clients or entire disks and partitions.
• Acronis Secure Zone password protection – restrict unauthorized access to data in your Acronis Secure Zone backups and F11 boot • E-mail notifications and alerts confirm backup tasks and results. 1.3 System requirements and supported media 1.3.1 Minimum system requirements Acronis True Image Home requires the following hardware: • Pentium processor or higher • 128 MB RAM • FDD or CD-RW drive for bootable media creation • Mouse (recommended). 1.3.
you change the source computer firewall settings to open Ports 20 and 21 for both TCP and UDP protocols and disable the Routing and Remote Access Windows service. ** Burned write-once discs cannot be read in Windows NT 4 without third-party software. Burned rewritable discs cannot be read in Linux without kernel patch. 1.4 Technical support Users of legally purchased copies of Acronis True Image Home are entitled to free technical support.
Chapter 2. Acronis True Image Home installation and startup 2.1 Installing Acronis True Image Home To install Acronis True Image Home: • Run the Acronis True Image Home setup file. • In the Install Menu, select the program to install: Acronis True Image Home. • Follow the install wizard instructions on the screen. Typical, Custom and Complete installation is available. Having pressed Custom, you can choose to install, besides Acronis True Image Home, Rescue Media Builder and Bart PE plug-in.
2.2 Extracting Acronis True Image Home When installing Acronis True Image Home, you can save the setup (.msi) file on a local or network drive. This will help when modifying or recovering the existing component installation. To save a setup file: • Run the Acronis True Image Home setup file. • In the Install Menu, right-click on the program name and select Extract. • Select a location for the setup file and click Save. 2.
Chapter 3. General information proprietary Acronis technologies and 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this guide “backups”), that contains a copy of selected file/folder data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
A standalone full backup might be an optimal solution if you often roll back the system to the initial state (like in a gaming club or Internet café, to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial, and the restore time will be minimal. Or, if you are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup.
3.4 Acronis Startup Recovery Manager 3.4.1 How it works The Acronis Startup Recovery Manager lets you start Acronis True Image Home without loading the operating system. With this feature, if the operating system won't load for some reason, you can run Acronis True Image Home by itself to restore damaged partitions. As opposed to booting from Acronis removable media, you will not need a separate media or network connection to start Acronis True Image Home. 3.4.
Another problem is that, as operating systems, applications and user files, such as music or videos, become ever larger, archive files eat up a lot of disk space. Therefore, it becomes important to get rid of old backups, at the same time preserving as many up-to-date backups as possible. You might spend hours exploring multiple files in your backup archives trying to guess which of the outdated backups can be deleted without losing important data.
3.6 Acronis Snap Restore With this feature, you can boot the OS on a crashed computer before the system is completely restored from an image, and start work seconds after the restoration is launched. The restoration will continue in the background. 3.6.1 Limitations in using Acronis Snap Restore 1. Acronis Snap Restore is currently available for images located in the Acronis Secure Zone only. 2. Acronis Snap Restore does not support images of Windows Vista.
If failure occurs, boot the computer from the bootable media or using F11. Start the recovery procedure (see 6.3 Restoring disks/partitions or files from images), select the system disk image from Acronis Secure Zone, choose Use Snap Restore and in the next window, click Proceed. In a few seconds, the computer will reboot to the restored system. Log in and start work – no more reboots or other actions are required.
Chapter 4. Using Acronis True Image Home 4.1 Main program window The main program window contains the menu, the toolbar, the sidebar and the main area. The main area contains operation icons, while the sidebar features the Category, Tools and Help panels. Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.
• Manage Hard Disks – clone disk (i.e.
4.2 Available operations You can perform the following operations on the computer. • Back up and restore data, including system disks/partitions Click Backup or Recovery, then follow the wizard’s instructions. See details in Chapter 5. Creating backup archives and Chapter 6. Restoring the backup data. • Schedule backup operations Click Tasks in the Manage Tasks group or select the Task Scheduling category on the sidebar to navigate to the Scheduled Tasks window.
• Validate backup archives wherever they reside, be it local, network or removable media Click Validate Backup Archive in the Tools group on the sidebar, then follow the wizard’s instructions. You can also access this wizard via the Backup Archives category. See details in 11.1 Validating backup archives. • Activate Acronis Startup Recovery Manager Click Activate Acronis Startup Recovery Manager in the Tools group on the sidebar, then follow the wizard’s instructions. See details in 3.
Chapter 5. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire-system backup file. 5.1 What data to back up? If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file-level backup.
3. Go to 5.2.5 Selecting the backup . 5.2.2 My Data backup Back up categories of files: documents, finance, images, music, video. Each default category represents all files of associated types found on the computer’s hard drives. You can add any number of custom categories containing files and folders. The new categories will be remembered and displayed along with the above. You can change contents of any custom or default file category (edit the category) or delete it.
To add a custom data category, click Create, select the folder (data source) and provide a name for the category. You can include all files in the selected folder in the category or apply filters to select the specific types of files that you wish or do not wish to back up. To set a filter, select its type: Back up files of the following types only or Back up files of all types in the source except the following. Then click Add new and select the desired file types in the appearing window.
You can select file types 1. By name. Enter the file name in the upper Name field. You can use wildcards and the common Windows masking rules. For example, My???.exe mask will reject all .exe files with names consisting of five symbols and starting with “my”. 2. By type. Tick off the desired file types in the list. 3. By extension. Enter the extensions (semicolon separated) in the bottom Extensions field.
You can apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .tmp, add *.tmp mask. These filter settings will take effect for the current task. For information on how to set the default filters that will be called each time you select folders to back up, see 5.3.2 Source files exclusion. 3. Go to 5.2.5 Selecting the backup . 5.2.3 My Application Settings backup Back up custom settings of Windows applications.
3. Go to 5.2.5 Selecting the backup . 5.2.4 My E-mail backup Acronis True Image Home offers a straightforward way to back up messages, accounts and settings for Microsoft Outlook 2000, 2002, 2003 and Microsoft Outlook Express. E-mail backup is a subset of file-level backup that backs up predefined folders and requires minimum user selections. However, if need be, you can select Microsoft Outlook components and folders individually. The list of supported e-mail clients will be gradually built up.
You can select the following items: Messages contained in.PST/.DBX Database Files E-mail accounts For Microsoft Office Outlook 2000, 2002, 2003 Mail Folders Calendar Contacts Tasks Notes Signatures News Folders User Settings Address Book For Microsoft Outlook Express Mail Folders Address Book (select Windows Address Book). Acronis True Image Home provides backup of IMAP (Internet Messages Access Protocol) mail folders for Microsoft Outlook. It means that you can back up folders stored on a mail server.
case, all incremental and differential files appended to the old full backup will get corrupted. It is recommended that you delete these files. If you are going to append an incremental or differential file to the existing archive, select any of the target archive files. It doesn't matter which one you select if the files are stored in the same folder, as the program recognizes them as a single archive.
5.2.7 Selecting the backup options Select the backup options (that is, backup file-splitting, compression level, password protection etc.). You can Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Or, you can edit the default options from the current screen. Then your settings will be saved as the defaults. See 5.3 Setting backup options for more information. 5.2.8 Providing a comment Provide a comment for the archive.
You may want to adjust the backup process priority. To do so, click on the process icon in the System Tray and select Low, Normal, or High priority from the menu that appears. For information on how to set the default priority, see 5.3.5 Backup priority. If you burn an archive to several removable media, be sure to number them, since you will have to insert them in order during the restoration. You might want to see the log when the task is completed.
5.3.1 Archive protection The preset is no password. An archive can be protected with a password. To protect the archive from being restored by anybody except you, enter a password and its confirmation in the text fields. A password should consist of at least eight symbols and contain both letters (upper and lower case, preferably) and numbers to make it more difficult to guess.
Please do not try to execute interactive commands, i.e. commands that require user input (for example, “pause”). These are not supported. Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the backup process to run concurrently with your commands execution. 5.3.4 Compression level The preset is Normal. If you select None, the data will be copied without any compression, which may significantly increase the backup file size.
Or, you can select Fixed size and enter the desired file size or select it from the drop-down list. The backup will then be split into multiple files of the specified size. That comes in handy when backing up to a hard disk with a view to burning the archive to CD-R/RW or DVD+R/RW later on. Creating images directly on CD-R/RW or DVD+R/RW might take considerably more time than it would on a hard disk. 5.3.
case the full version does not load. If you have other Acronis products, such as Acronis Disk Director Suite, installed on your computer, the bootable versions of these programs’ components will be offered as Advanced as well. 5.3.9 Additional settings 1. Validate backup archive upon operation completion The preset is disabled. When enabled, the program will check integrity of the just created or supplemented archive immediately after backup.
Chapter 6. Restoring the backup data 6.1 Restore under Windows or boot from CD? As mentioned above (see 2.3 Running Acronis True Image Home), Acronis True Image Home can be run in several ways. We recommend that you first try to restore data running Acronis True Image Home under Windows, because this method provides more functionality. Boot from the bootable media or use the Startup Recovery Manager (see 3.4 Acronis Startup Recovery Manager) only if Windows does not load.
6.2 Restoring files and folders from file archives Here we describe how to restore file/folders from a file backup archive. You can restore the desired files/folders from a disk/partition image as well. To do so, mount the image (see Chapter 12. Exploring archives and mounting images) or start the image restoration and select Restore specified files or folders (see 6.3 Restoring disks/partitions or files from images). 1.
4. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to its original location or choose another folder, if necessary. 5. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 6. Select the options for the restoration process (that is, restoration process priority, file-level security settings etc.).
• Overwrite existing file – this will give the archived file unconditional priority over the file on the hard disk • Overwrite existing file if it is older – this will give the priority to the most recent file modification, whether it be in the archive or on the disk • Do not overwrite existing file – this will give the file on the hard disk unconditional priority over the archived file 8. At the final step, the restoration summary is displayed.
If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when the Restore Data Wizard prompts you. Data recovery directly from an FTP server requires the archive to consist of files of no more than 2GB. If you suspect that some of the files are larger, first copy the entire archive (along with the initial full backup) to a local hard disk or network share disk. See notes and recommendations for supporting FTP server in 1.3.
Restore specified files or folders With this selection, you will be further asked to select where to restore selected folders/files (original or new location), choose files/folders to be restored and so on. These steps look like those in file archive restore. However, watch your selection: if you are to restore files instead of disk/partition, uncheck the unnecessary folders. Otherwise you will restore a lot of excess files. Then you will be taken directly to Restoration Summary screen (6.3.
Disk and partition images contain a copy of track 0 along with MBR (master boot record). It appears in this window in a separate line. You can choose whether to restore MBR and track 0 by checking the respective box. Restore MBR if it is critical to your system boot. 6.3.5 Selecting a target disk/partition 1. Select a target disk or partition where you want to restore the selected image. You can restore data to its initial location, to another disk/partition or to an unallocated space.
If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Yes, I want to delete all the partitions on the destination hard disk before restoring – all existing partitions will be deleted and all their data will be lost. • No, I do not want to delete partitions – no existing partition will be deleted, discontinuing the recovery operation.
Using this feature, you can redistribute the disk space between partitions being restored. In this case, you will have to restore the partition to be reduced first. These changes might be useful if you are to copy your hard disk to a new high-capacity one by creating its image and restoring it to a new disk with larger partitions. 6.3.9 Assigning a letter to the restored partition Acronis True Image Home will assign an unused letter to a restored partition.
6.3.12 Restoration summary and executing restoration At the final step, the restoration summary is displayed. Up to this point, you can click Back to make changes in the created task. If you click Cancel, no changes will be made to disk(s). Clicking Proceed will launch the task execution. The task progress will be shown in a special window. You can stop the procedure by clicking Cancel.
input the command, its arguments and working directory or browse folders to find a batch file. Please do not try to execute interactive commands, i.e. commands that require user input. These are not supported. Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the restore procedure to run concurrently with your commands execution. 6.4.3 Restoration priority The preset is Low.
Chapter 7. Backup location management This section covers creation and deletion of backup locations, setting rules for backup locations and viewing archives contained in backup locations. Before you start managing backup locations, be sure to read section 3.5 Acronis backup locations, stating their purpose and basic principles. 7.
7.1.2 Setting the backup rules The rules include: 1) maximum size This is the maximum storage space allowed for a backup location. To estimate the location size, you can start a backup and select all data you are going to copy to the location. At the Set Backup Options step, choose Set the options manually, then set the compression level.
7.3 Deleting a backup location To invoke the Delete Backup Location wizard, click Create and Configure Backup Locations in the Tools group or select the Backup Locations category on the sidebar to navigate to the Manage Backup Locations window. Then select Delete Backup Location. Select a location. Expanding it in the folder tree will display the location contents. If you want to delete all archives stored there, check Remove Archive Contents.
Chapter 8. Scheduling tasks Acronis True Image Home allows you to schedule periodic backup tasks. Doing so will give you peace of mind, knowing that your data is safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week. All the scheduled tasks appear in the Scheduled Tasks window, where you can start, stop, edit, delete and rename them.
3) create full backups with specified number of differential backups At first backup on a schedule, a full backup will be created. If the choice was (2) or (3), the next backups will be incremental (or differential) until the specified number of incremental (differential) backups is reached. Then again a full backup and a set of subsequent incremental (differential) backups is created, then again a full backup and so on.
• Do not start automatically – the task will be saved, but not launched automatically.
In the upper field, enter a user name. Enter a password twice in the fields below. 9. At the final step, the task configuration is displayed. Up to this point, you can click Back to make changes in the created task. If you click Cancel, all settings will be lost. Click Finish to save the task. 10. The task schedule and default name appear in the Scheduled Tasks window. You are prompted to rename the task just now. If you do not want to do so, press the Esc key. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.2 Setting up weekly execution If you select weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check the days on which to execute the task.
8.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: • Day – on the specified date • The – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists. If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 8.2 Managing scheduled tasks To navigate to the Scheduled Tasks window, click Tasks in the Manage Tasks group or select the Task Scheduling category on the sidebar. The Scheduled tasks window displays all scheduled tasks along with their Status, Schedule, Last Run Time and Last Result.
Chapter 9. Managing Acronis Secure Zone The Acronis Secure Zone is a special partition for storing archives on the computer system itself. It is necessary for using Acronis Startup Recovery Manager. For more information about these functions, see 3.3 Acronis Secure Zone and 3.4 Acronis Startup Recovery Manager. When you click Manage Acronis Secure Zone in the menu, the program searches for the zone on all local drives.
4. In the next window, enter the Acronis Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum size is about 35 MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step. When creating the zone, the program will first use the unallocated space. If there is not enough unallocated space, the selected partitions will be decreased.
images or validating archives on the zone, rescue boot with the F11 key, resizing and deleting the zone. Acronis True Image Home repair or update will not affect the password. However, if the program is removed and then installed again while keeping the Acronis Secure Zone on the disk, the password to the zone will be reset. 6. After this, you will be prompted to activate Acronis Recovery Manager, which will enable you to start Acronis True Image Home at boot time by pressing the F11 key.
3. Enter the new password and confirm it or select Do not use password protection. You can also select a secret question that will be asked in case you forget the password. 4. To perform the password change operation, click Proceed in the final wizard window. 9.4 Deleting Acronis Secure Zone 1. When prompted by the wizard, select Remove Acronis Secure Zone. 2. Select the partitions to which you want to add the space freed from the zone.
Chapter 10. Creating bootable media You can run Acronis True Image Home on a bare metal system or crashed computer that cannot boot. You can even back up disks on a non-Windows computer, copying all its data, sector-by-sector, into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Home version.
Includes support of USB, PC Card (formerly PCMCIA) and SCSI interfaces along with the storage devices connected via them, and therefore is highly recommended • Acronis True Image Home safe version Does not include USB, PC Card, or SCSI drivers. Recommended for use in cases where problems running the full version occur To find more about components of other Acronis products, see their respective user guides. 3. Select the type of bootable media (CD-R/RW, DVD+R/RW or 3.5” diskettes) to create.
Chapter 11. Other operations 11.1 Validating backup archives To be certain that your archives are not damaged, you can check their integrity. 1. To invoke the Backup Archive Validation Wizard, click Validate Backup Archive on the toolbar. You can also access this wizard via the Backup Archives category. 2. Select the archive to validate. The Acronis Secure Zone can be selected only as a whole because all its contents is considered as a single archive. 3.
Provide the email address to which notifications will be sent and the outgoing SMTP server name. A user name and a password might also be needed if the SMTP server requires authentication.
Below, in this window, you can choose whether you want to get notifications: • when the operation is completed successfully • when the operation failed • during the operation when user interaction is required 11.3 Viewing logs Acronis True Image Home allows you to view its working logs. They can provide information about scheduled backup task results, including reasons for failure, if any. To invoke the log window, select Show log on the toolbar or from the Tools menu.
11.4 Managing System Restore Microsoft Windows System Restore tool, available in Windows XP, is used to undo harmful changes to the system without losing recently changed or created user data. To run the System Restore tool or find out more about it, select Start -> Programs -> Accessories > System Tools -> System Restore. (Please be aware that older Windows versions do not feature System Restore; therefore, the Manage System Restore tool is unavailable in these operating systems.
Chapter 12. Exploring mounting images archives and Acronis True Image Home offers two kinds of archive contents management: mounting for images and exploring for both images and file-level archives. Both operations are performed via the Backup Archives category. Exploring images and file-level archives lets you view their contents and copy the selected files to the hard disk. Mounting images as virtual drives lets you access them as though they were physical drives.
If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Home will ask for it. Further steps will not be enabled until you enter the correct password. 3. The program opens a Windows Explorer window displaying the archive or the backup location contents.
12.2 Mounting an image 1. Invoke the Mount Image Wizard by selecting Operations -> Mount Image in the main program menu. 2. Select the archive from the drives tree. If the archive is located in Acronis Secure Zone, select it to choose the archive at the next step. The mount operation does not support backup locations, so they are not displayed in the tree. If you added a comment to the archive, it will be displayed to the right of the drives tree.
5. Select whether you want to mount image in Read-only or Read/Write mode. 6. If you select Read/Write mode, the program assumes that the connected image will be modified, and creates an incremental archive file to capture the changes. It is strongly recommended that you list the forthcoming changes in the Comment section to this file. 7. The program displays a summary containing a single operation. Click Proceed to connect the selected partition image as a virtual disk. 8.
Chapter 13. new disk Transferring the system to a 13.1 General information Sooner or later, most computer users find that their hard disk is too small. If you just don’t have space for more data, you can add another disk just for data storage as described in the following chapter. However, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software.
13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 13.3.3 Selecting destination disk After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
• Keep data – leave the old disk partitions and data intact • Destroy data – destroy all data on the old disk If you are going to sell or give away your old disk, we recommend that you make sure you destroy the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 13.3.
unallocated. Further, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools, such as Acronis Disk Director Suite. As a rule, "as is" transfers not recommended as they leave much unallocated space on the new disk. Using the "as is" method, Acronis True Image Home transfers unsupported and damaged file systems.
If you selected manual partition creation earlier, the partition layout will look different. This partitioning method is described below. 13.3.11 Cloning summary In the next window, you will see a list of briefly described operations to be performed on the disks. Cloning a disk containing the currently active operating system will require a reboot. In that case, after clicking Proceed you will be asked to confirm the reboot. Canceling the reboot will cancel the entire procedure.
To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Clicking Next, you will proceed to the cloning summary window. Be careful! Clicking Back in this window will reset all size and location changes that you've selected, so you will have to specify them again. First, select a partition to resize. It will be underlined in red. Resize and relocate it on the next step.
Chapter 14. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk only to store data, leaving the system on the old disk. If the computer has space for another disk, it would be easier to add a data disk drive than to clone a system one. To add a new disk, you must first install it in your computer. 14.
unallocated space near it). Having provided the new partition location and size, you can input a label for the new partition. If you make a mistake at partitioning, click Back to redo the process. Finally, you will be taken back to the partition layout screen. Check the resulting partitions layout and start creating another partition or move on by unchecking Create new partition in unallocated space and clicking Next. 14.
Appendix A. Partitions and file systems A.1 Hard disk partitions The mechanism that allows you to install several operating systems on a single PC or to carve up a single physical disk drive into multiple “logical” disk drives is called partitioning. Partitioning is performed by special applications. In MS-DOS and Windows, these are FDISK and Disk Administrator.
The FAT16 file system has a 2GB limit that permits a maximum 65,507 clusters that are 32KB in size. (Windows NT/2000/XP support partitions up to 4GB with up to 64KB clusters). Usually the smallest cluster size is used to make the total cluster amount within the 65,507 range. The larger a partition is, the larger its clusters are. Usually the larger the cluster size, the more disk space is wasted. A single byte of data could use up one cluster, whether the cluster size is 32KB or 64KB.
A.2.6 Linux ReiserFS ReiserFS was officially introduced to Linux in 2001. ReiserFS overcomes many Ext2 disadvantages. It is a 64-bit journaling file system that dynamically allocates space for data substructures. 84 Copyright © Acronis, Inc.
Appendix B. Hard disks and BIOS setup The appendices below provide you with extra information on the hard disk organization, how information is stored on disks, how disks should be installed in the computer and plugged into the motherboard, configuring disks with BIOS, partitions and file systems, and how operating systems interact with disks. B.1 B.1.
Hard disks with an IDE (Integrated Drive Electronics) interface are connected to the motherboard via a 40- or 80-thread flat marked cable: one of the threads of the cable is red. Two IDE hard disks can be connected to each of the sockets, i.e. there can be up to four hard disks of this type installed in the PC. (There are three plugs on each IDE cable: two for hard disks and one for the motherboard socket.
The hard disk with the jumper in master position is treated by the basic input/output system (BIOS) as bootable. The jumpers on hard disks that are connected to the same cable can be in the cable select for master/slave position. In this case, BIOS will deem as «master» the disk that is connected to the IDE cable closer to the motherboard than the other one. Unfortunately, hard disk markings were never standardized. You might well find that markings on your hard disk differ from the ones described above.
Large PC manufacturers like Dell and Hewlett-Packard produce motherboards themselves, and develop their own BIOS versions. You should always refer to the documentation that came with your computer for instructions on proper BIOS configuration. B.2.2 Standard CMOS setup menu Parameters in the standard CMOS setup menu usually define the geometry of the hard disk.
In BIOS setup, you can set the Type parameter to User Type HDD (user-defined type). In this case, you also have to specify the value of the translation mode parameter, which can be Auto/Normal/LBA/Large. Translation mode is how sector addresses are translated. This parameter appeared because in BIOS versions, there were limitations to the maximum address capacity of disks, which is 504 MB (1024 cylinders x 16 heads x 63 sectors x 512 bytes).
The BIOS numbers disks according to the order in which they are connected to IDE controllers (primary master, primary slave, secondary master, secondary slave); next go the SCSI hard disks. This order is broken if you change the boot sequence in BIOS setup. If, for example, you specify that booting has to be done from hard disk E:, numbering starts with the hard disk that would be the third in usual circumstances (it is usually the secondary master).
[User Type HDD] allows you to set each entry on your own. Warning: Ultra DMA Mode 3/4/5 can be enabled only when BIOS detects Shielded 80-pin cable.
Manual New versions of AwardBIOS menu have the Boot item. The screen of the Boot menu, which is responsible for adjusting the boot sequence, looks like this: AwardBIOS Setup Utility Main Advanced Power Boot Exit 1. ATAPI CD-ROM 2. Removable Device [None] [Legacy Floppy] Boot Sequence: 3. IDE Hard Drive 4. Other Boot Drive [IBM-DTLA-307020] [Disabled] Plug & Play O/S Boot Virus Detection [No] [Enabled] to select the device To select the boot sequence, use up or down arrow.
Quick Power On Self Test Boot up Floppy Seek Full Screen Logo [Enabled] [Enabled] [Enabled] Press <+> to move the Device up the list, or <-> to move it down the list F1 Help ↓ Select Item -/+ Change Values F5 Setup Defaults Esc Exit ←→ Select Menu Enter Select Sub-Menu F10 Save and Exit After setting the specified parameters, use the Left or Right keys to select the Exit menu item. Reply positively to the prompt on saving the specified parameters.
PRESS A KEY TO REBOOT This error message is not directly related to errors during hard disk initialization. However, it appears, for example, when the boot program finds no operating system on the hard disk, or when the primary partition of the hard disk is not set as active. DISK BOOT FAILURE, INSERT SYSTEM DISK AND PRESS ENTER This message appears when the boot program finds no available boot device, be it a floppy or a hard disk, or a CD-ROM.