User's Guide Acronis True Image 9.0 Home Compute with confidence www.acronis.
Copyright © Acronis, Inc., 2000-2006. All rights reserved. “Acronis”, "Acronis Compute with Confidence", “Acronis Snap Restore”, “Acronis Recovery Manager, “Acronis Secure Zone” and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
END-USER LICENSE AGREEMENT BY ACCEPTING, YOU (ORIGINAL PURCHASER) INDICATE YOUR ACCEPTANCE OF THESE TERMS. IF YOU DO NOT WISH TO ACCEPT THE PRODUCT UNDER THESE TERMS, YOU CAN CHOOSE NOT TO ACCEPT BY SELECTING "I decline..." AND NOT INSTALLING THE SOFTWARE. Acronis True Image Home (the Software) is Copyright © Acronis, Inc., 2000-2006. All rights are reserved. The ORIGINAL PURCHASER is granted a LICENSE to use the software only, subject to the following restrictions and limitations. 1.
Table of Contents Chapter 1. Introduction...........................................................................................7 1.1 What is Acronis True Image Home? .................................................................................... 7 1.2 New in Acronis True Image 9.0 Home................................................................................. 7 1.4 System requirements and supported media ......................................................................... 8 1.4.1 1.4.
6.3.4 Selecting a disk/partition to restore ............................................................................ 36 6.3.5 Selecting a target disk/partition.................................................................................. 36 6.3.6 Changing the restored partition type .......................................................................... 37 6.3.7 Changing the restored partition file system ................................................................. 38 6.3.
13.1 Selecting a hard disk ..................................................................................................... 67 13.2 Creating new partitions .................................................................................................. 67 13.3 Disk add summary......................................................................................................... 68 Appendix A. Partitions and file systems................................................................69 A.1 A.2 A.
Chapter 1. Introduction 1.1 What is Acronis True Image Home? Acronis True Image Home solves all backup problems, ensuring the safety of all information on your PC. Using it, you can back up selected files and folders, or entire disks and partitions. If failures occur that block access to information or affect system operation, or if you accidentally delete necessary files, you'll be able to easily restore the system and lost data.
1.4 System requirements and supported media 1.4.1 Minimum system requirements Acronis True Image Home requires the following hardware: • Pentium processor or higher • 128 MB RAM • FDD or CD-RW drive for bootable media creation • Mouse (recommended). 1.4.2 Supported operating systems • Windows® 98 SE • Windows® Me • Windows® NT 4.
1.5 Technical support Users of legally purchased copies of Acronis True Image Home are entitled to free technical support from Acronis. If you experience problems installing or using Acronis products that you can’t solve yourself by using this guide, then please contact Acronis Technical Support. More information about contacting Acronis Technical Support is available at the following link: http://www.acronis.com/homecomputing/support/ Copyright © Acronis, Inc.
Chapter 2. Acronis True Image Home installation and starting 2.1 Installing Acronis True Image Home To install Acronis True Image Home: • run the Acronis True Image Home setup file • in the Install Menu, select the program to install: Acronis True Image Home • follow the Install Wizard instructions on the screen. Typical, Custom and Complete installation is available. Having pressed Custom, you can choose to install, besides Acronis True Image Home, Rescue Media Builder and Bart PE plug-in.
2.2 Extracting Acronis True Image Home When installing Acronis True Image Home, you can save the setup (.msi) file on a local or network drive. This will help when modifying or recovering the existing component installation. To save a setup file: • run the Acronis True Image Home setup file; • in the Install Menu, right-click on the program name and select Extract; • select a location for the setup file and click Save. 2.
Chapter 3. General information proprietary Acronis technologies and 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called in this Guide “backups”), that contains a copy of selected files/folders data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, are compressed and stored.
A standalone full backup may be an optimal solution if you often roll back the system to the initial state (like in a gaming club or Internet café, to undo changes made by the guests). In this case, you need not re-create the initial full image, so the backup time is not crucial, and the restore time will be minimal. Alternatively, if you are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup.
3.4 Acronis Startup Recovery Manager 3.4.1 How it works The Acronis Startup Recovery Manager enables starting Acronis True Image Home without loading the operating system. With this feature, if the operating system won't load for some reason, you can run Acronis True Image Home by itself to restore damaged partitions. As opposed to booting from Acronis removable media, you will not need a separate media or network connection to start Acronis True Image Home. 3.4.
OS, the user sees the folder tree with files, though file contents still is not recovered. Nevertheless, the user can start working. 2. Writes on the hard disk its own drivers, which intercept system queries to the files. When the user opens files or launches applications, the drivers receive the system queries and restore the sectors that are necessary for the current operation. 3. At the same time, Acronis True Image Home proceeds with the complete sector-by-sector image restoration in the background.
To select columns to view, right-click the headers line or left-click the Choose Details button. Then flag the columns you want to display. If you click the i (Display the properties of the selected item) button, you will see the selected partition or disk properties window. This window contains two panels. The left panel contains the properties tree and the right describes the selected property in detail. The disk information includes its physical parameters (connection type, device type, size, etc.
Chapter 4. Using Acronis True Image Home 4.1 Main program window The main program window contains the menu, the toolbar, the sidebar, the Active Tasks pane and the main area. The main area contains operation icons, while the sidebar features Tools and Help panels. Most of the operations are represented two or even three times in different window areas, providing several ways to select them for more convenience.
• Manage System Restore – turn on/off Microsoft Windows System Restore tool and set its options directly from Acronis True Image Home Program menu The program menu bar features the Operations, View, Tools and Help items. The Operations menu contains a list of the available operations, including scheduling tasks.
Click Backup or Recovery, then follow the Wizard’s instructions. See details in Chapter 5. Creating backup archives and Chapter 6. Restoring the backup data. • Schedule backup operations Click the very left button on a tasks pane toolbar, then follow the Wizard’s instructions. See details in Chapter 7. Scheduling tasks. • Set up backup/restore options, such as backup process priority or files overwriting mode.
Chapter 5. Creating backup archives To be able to restore the lost data or roll back your system to a predetermined state, you should first create a data or entire-system backup file. If you are not concerned about restoration of your operating system along with all settings and applications, but plan to keep safe only certain data (the current project, for example), choose file/folder backup. This will reduce the archive size, thus saving disk space and possibly reducing removable media costs.
6. Set filters for the specific types of files you do not wish to back up. For example, you may want hidden and system files and folders, as well as files with .~, .tmp and .bak extensions, not to be stored in the archive. You can also apply custom filters, using the common Windows masking rules. For example, to exclude all files with extension .exe, add *.exe mask. My???.exe mask will reject all .exe files with names consisting of five symbols and starting with “my”.
The “farther” you store the archive from the original folders, the safer it will be in case of data damage. For example, saving the archive to another hard disk will protect your data if the primary disk is damaged. Data saved to a network disk or removable media will survive even if all your local hard disks are down. You can also use Acronis Secure Zone (see details in 3.3 Acronis Secure Zone) for storing backups. In that case, you need not provide the file name. 9. Click Next. 10.
12. Select the backup options (that is, backup file splitting, compression level, password protection etc.). You may Use default options or Set the options manually. If the latter is the case, the settings will be applied only to the current backup task. Alternatively, you can edit the default options from the current screen. Then your settings will be saved as the defaults. See 5.3 Setting backup options for more information. 13. Click Next. 14. Provide a comment for the archive.
5.2 Backing up disks and partitions (image backup) 1. Invoke the Create Backup Wizard by clicking on the backup operation icon in the main program window. 2. Click Next. 3. Select Backup disks and click Next. 4. Select disks or partitions to back up. You can select a random set of disks and partitions. 5. Click Next. 6. Select the name and location of the archive file.
8. Select whether you want to create a full or incremental backup. If you have not backed up the selected disks/partitions yet, or the full archive seems too old to append incremental changes to it, choose full backup. Otherwise it is recommended that you create an incremental or differential backup (see 3.2 Full, incremental and differential backup). 9. Click Next. 10. Select the backup options (that is, backup file splitting, compression level, password protection etc.).
5.3.1 Archive protection The default setting – no password. An archive can be protected with a password. To protect the archive from being restored by anybody except you, enter a password and its confirmation into the text fields. A password should consist of at least eight symbols and contain both letters (in the upper and lower cases preferably) and numbers to make it more difficult to guess.
Unchecking the Do not perform operations until the commands execution is complete box, checked by default, will permit the backup process to run concurrently with your commands execution. 5.3.4 Compression level The default setting – Normal. If you select None, the data will be copied without any compression, which may significantly increase the backup file size. However, if you select Maximum compression, the backup will take longer to create.
Creating images directly on CD-R/RW or DVD+R/RW might take considerably more time than it would on a hard disk. 5.3.7 File-level security settings Preserve files’ security settings in archives By default, files and folders are saved in the archive with their original Windows security settings (i.e. permissions for read, write, execute and so on for each user or user group, set in file Properties -> Security).
In case you check Do not place additional components if there is no free space box, the program will try to write at least Acronis True Image Home to media, short of space. 5.3.9 Additional settings 1. Validate backup archive upon operation completion The default setting – disabled. You can choose to check the backup data integrity. Verification will be performed immediately after the archive is created.
Chapter 6. Restoring the backup data 6.1 Restore under Windows or boot from CD? As mentioned above (see 2.3 Running Acronis True Image Home), Acronis True Image Home can be run in several ways. We recommend that you first try to restore data running Acronis True Image Home under Windows, because this method provides more functionality. Boot from the bootable media or use the Startup Recovery Manager (see 3.4 Acronis Startup Recovery Manager) only if Windows does not load.
2. Click Next. 3. Select the archive. If the archive is located in Acronis Secure Zone, select it to choose the archive on the next step. If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard prompts. If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Home will ask for it.
6. Click Next. 7. Select a folder on your computer where you want to restore selected folders/files (a target folder). You can restore data to their original location or choose another folder, if necessary. 8. Click Next. 9. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 10. Click Next. 11. Select the options for the restoration process (that is, restoration process priority, filelevel security settings etc.).
12. Click Next. 13. The next selection allows you to keep useful data changes made since the selected backup was created. Choose what to do if the program finds in the target folder a file with the same name as in the archive. Overwrite existing file – this will give the archived file unconditional priority over the file on the hard disk.
6.3.2 Archive selection 1. Select the archive. If the archive is located in Acronis Secure Zone, select it to choose the archive at the next step. If the archive is located on removable media, e.g. CD, first insert the last CD and then insert disks in reverse order when Restore Data Wizard prompts. If you added a comment to the archive, it will be displayed to the right of the drives tree. If the archive was protected with a password, Acronis True Image Home will ask for it.
Restore specified files or folders With this selection, you will be further offered to select where to restore selected folders/files (original or new location), choose files/folders to be restored and so on. These steps look like those in file archive restore. However, watch your selection: if you are to restore files instead of disk/partition, uncheck the unnecessary folders. Otherwise you will restore a lot of excessive files. Then you will be taken directly to Restoration Summary screen (6.3.
6.3.4 Selecting a disk/partition to restore 1. The selected archive file can contain images of several partitions or even disks. Select which disk/partition to restore. Disks and partitions images contain a copy of track 0 along with MBR (Master Boot Record). It appears in this window in a separate line. You can choose whether to restore MBR and track 0 by checking the respective box. Restore MBR if it is critical to your system boot. 2. Click Next. 6.3.5 Selecting a target disk/partition 1.
If there are partitions on the target disk, you will be prompted by the Nonempty Destination Hard Disk Drive window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Yes, I want to delete all the partitions on the destination hard disk before restoring – all existing partitions will be deleted and all their data will be lost. • No, I do not want to delete partitions – no existing partition will be deleted, discontinuing the recovery operation.
2. Click Next. 6.3.7 Changing the restored partition file system 1. Though seldom required, you can change the partition file system during its restoration. Acronis True Image Home can make the following file system conversions: FAT 16 -> FAT 32, Ext2 -> Ext3. For partitions with other native file systems this option is not available. Let us imagine you are to restore a partition from an old, low-capacity FAT16 disk to a newer disk.
6.3.9 Assigning a letter to the restored partition 1. In Windows NT SP6/2000/XP, Acronis True Image Home will assign an unused letter to a restored partition. You can select the desired letter from a drop-down list. If you set the switch to No, no letters will be assigned to the restored partition, hiding it from OS. Under Windows 98/Me, this step is bypassed since letters are assigned automatically.
6.4.1 Files overwriting mode This option allows you to keep useful data changes made since the backup being restored was done. Choose what to do if the program finds in the target folder a file with the same name as in the archive. Overwrite existing file – this will give the archived file unconditional priority over the file on the hard disk. Overwrite existing file if it is older – this will give the priority to the most recent file modification, whether it be in the archive or on the disk.
6.4.4 File-level security settings The default setting – Restore files with their security settings. If the files’ security settings were preserved during backup (see 5.3.7 File-level security settings), you can choose whether to restore files’ security settings or let the files inherit the security settings of the folder where they will be restored. This option is effective only when restoring files from file/folders archives. 6.4.5 Additional settings 1.
Chapter 7. Scheduling tasks Acronis True Image Home allows you to schedule periodic backup tasks. Doing so will give you peace of mind, knowing that your data are safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the application disk once a week. All the scheduled tasks appear in the Active Tasks area of the main window. You can start, stop, edit, delete and rename the scheduled tasks. 7.1 Creating scheduled tasks 1.
• When my computer shuts down – the task will be executed before every computer shutdown or reboot • When I log off – the task will be executed each time the current user logs off of the OS. Some of these options might be disabled depending on the operating system. 5. Click Next. 6. Specify the task start time and other schedule parameters, according to the selected periodicity (see 7.1.1 - 7.1.4). 7. Click Next. 8.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.1.2 Setting up weekly execution If you select weekly execution, set the Start time, specify the task execution periodicity in the Every x weeks box (every week, every two weeks, etc.) and check the days on which to execute the task.
7.1.3 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: • Day – on the specified date • The – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists. If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.1.
If the computer is off when the scheduled time comes, the task won’t be performed, but you can force the missed task to launch at the next system startup by checking a box under the Start time fields. 7.2 Managing scheduled tasks The task Status, Schedule, Last Run Time and Last Result are shown on the Active tasks pane of the main window. To view the other task details, right-click on its name. There are two ways of changing the task parameters. Editing allows you to change any task parameters.
Chapter 8. Managing Acronis Secure Zone The Acronis Secure Zone is a special partition for storing archives on the computer system itself. Acronis Secure Zone is necessary for using Acronis Startup Recovery Manager. For more information about these functions see 3.3 Acronis Secure Zone and 3.4 Acronis Startup Recovery Manager. 8.1 Creating Acronis Secure Zone Acronis Secure Zone can be located on any local disk.
6. After this, you will be prompted to activate Acronis Recovery Manager, which will enable you to start Acronis True Image Home at boot time by pressing F11 key. Alternatively, you can activate this feature later from main program window. 7. Then you will see a list of operations to be performed on partitions (disks). After you click Proceed, Acronis True Image Home will start creating the zone. Progress will be reflected in a special window. If necessary, you can stop zone creation by clicking Cancel.
8.3 Deleting Acronis Secure Zone 1. When prompted by the wizard, select Remove Acronis Secure Zone. 2. If the ASZ is password protected, the proper password must be entered before any operation can take place. 3. Select the partitions to which you want to add the space freed from the secure zone. If you select several partitions, the space will be distributed proportionally to each partition’s size. 4. Next, you will see a list of briefly described operations to be performed on partitions (disks).
Chapter 9. Creating bootable media You can run Acronis True Image Home on a bare metal or on a crashed computer that cannot boot. You can even back up disks on a non-Windows computer, copying all its data sector-by-sector into the backup archive. To do so, you will need bootable media with the standalone Acronis True Image Home version.
Includes support of USB, PC Card and SCSI interfaces along with the storage devices connected via them, and therefore is highly recommended. • Acronis True Image Home safe version Does not include USB, PC Card, or SCSI drivers. Recommended for use in case of problems with running Full version To find more about components of other Acronis products, see the respective user guides. 3. Select the type of bootable media (CD-R/RW, DVD+R/RW or 3.5” diskettes) to create.
Chapter 10. Other operations 10.1 Validating backup archives To be certain that your archives are not damaged, you can check their integrity. 1. To invoke the Backup Archive Validation Wizard, select Validate Backup Archive in the main window or in the Tools group or click Validate Backup Archive on the toolbar. 2. Click Next. 3. Select the archive to validate. If the archive is located in Acronis Secure Zone, select it to choose the archive on the next step. 4. Click Next. 5.
The left panel can contain up to 50 logs. If there are more, you can browse the list using the More and Less buttons with the left and right arrows. To delete a log, select it and click Delete. If any step was terminated by an error, the corresponding log will be marked with a red circle with a white cross inside. The right window features the list of steps contained in the selected log.
2. Click Next. 3. Now you can turn on/off System Restore on all your hard disk(s) partitions at once or do it individually for each partition. Note that you cannot turn off System Restore on the system disk (partition), yet keep it on other disks (partitions). 4. Click Next. 5. The program lists the configured changes. You can click Back to choose different settings. If you click Cancel, all new settings will be lost. Click Proceed to apply the changes.
Chapter 11. Mounting an image as a virtual drive Acronis True Image Home can mount partition images as virtual drives, thus letting you access them as though they were physical drives.
the partitions layout, nor the Next button will be enabled until you enter the correct password. 4. Click Next. 5. If you selected an archive containing incremental images, Acronis True Image Home will suggest that you select one of the successive incremental images by its creation date/time. Thus, you can explore the partition state to a certain moment. To mount an incremental image, you must have all previous incremental images and the initial full image.
11.2 Unmounting an image We recommend that you unmount the virtual disk after all necessary operations are finished, as keeping up virtual disks takes considerable system resources. If you do not, the virtual disk will disappear after your computer is turned off. To disconnect the virtual disk, click Unmount Image and select the disk to unmount. You can also unmount the disk in Windows Explorer by right-clicking on its icon and selecting Unmount. Copyright © Acronis, Inc.
Chapter 12. new disk Transferring the system to a 12.1 General information Sooner or later any computer user finds out that the hard disk is too small. If you just don’t have space for more data, you can add another disk just for data storage as described in the following chapter. However, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software.
No data will be lost because the original disk is only being read (no partitions are changed or resized) until data transfer is completed. Nevertheless, we do not recommend that you delete data from the old disk until you are sure it is correctly transferred to the new disk, the computer boots up from it and all applications work. 12.3 Executing transfers 12.3.1 Selecting Clone mode You will see the Clone mode window just after the welcome window. We recommend using automatic mode in most cases.
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition and file system information). 12.3.3 Selecting destination disk After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If either disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
12.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Nonempty Destination Hard Disk window stating that the destination disk contains partitions, perhaps with data. You will have to select between: • Delete partitions on the destination hard disk – all existing partitions will be deleted during cloning and all their data will be lost.
• Keep data – leave the old disk partitions and data intact • Destroy data – destroy all data on the old disk. If you are going to sell or give away your old disk, we recommend that you make sure you destroyed the data on it. If you are going to keep it for data storage, you can create a new partition layout on it. In this case, the disk will be ready right after cloning is complete.
The second method takes more time, but makes it impossible to recover data afterwards, even with special equipment. The first method is less secure, but is still suitable for most cases. 12.3.
unallocated. Further, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools, such as Acronis Disk Director Suite. As a rule, "as is" transfers are inexpedient, as they leave much unallocated space on the new disk. Using the "as is" method, Acronis True Image Home transfers unsupported and damaged file systems.
If you selected manual partition creation earlier, the partition layout will look different. This partitioning method is described below. 12.3.11 Cloning summary In the next window, you will see a list of briefly described operations to be performed on the disks. Cloning a disk containing the currently active operating system will require a reboot. In that case, after clicking Proceed you will be asked to confirm the reboot. Canceling the reboot will cancel the entire procedure.
To resize either partition, check the Proceed relayout box. If you are satisfied with the partition layout shown, uncheck this box (if checked). Clicking Next, you will proceed to the cloning summary window. Be careful! Clicking Back in this window will reset all size and location changes that you've selected, so you will have to specify them again. First, select a partition to resize. It will be underlined in red. Resize and relocate it on the next step.
Chapter 13. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk only to store data, leaving the system on the old disk. If the computer has space for another disk, it would be easier to add a data disk drive than to clone a system one. To add a new disk, you must first install it in your computer. 13.
unallocated space near it). Having provided the new partition location and size, you can input a label for the new partition. If you make a mistake at partitioning, click Back to redo the process. Finally, you will be taken back to the partition layout screen. Check the resulting partitions layout and start creating another partition or move on by unchecking Create new partition in unallocated space and clicking Next. 13.
Appendix A. Partitions and file systems A.1 Hard disk partitions The mechanism that allows you to install several operating systems on a single PC or to carve up a single physical disk drive into multiple “logical” disk drives is called partitioning. Partitioning is performed by special applications. In MS-DOS and Windows, these are FDISK and Disk Administrator.
The FAT16 file system has a 2GB limit that permits a maximum 65,507 clusters that are 32Kb in size. (Windows NT/2000/XP support partitions up to 4GB with up to 64Kb clusters). Usually the smallest cluster size is used to make the total cluster amount within the 65,507 range. The larger a partition is, the larger its clusters are. Usually the larger the cluster size, the more disk space is wasted. A single byte of data could use up one cluster, whether the cluster size is 32Kb or 64Kb.
A.2.6 Linux ReiserFS ReiserFS was officially introduced to Linux in 2001. ReiserFS overcomes many Ext2 disadvantages. It is a 64-bit journaling file system that dynamically allocates space for data substructures. Copyright © Acronis, Inc.
Appendix B. Hard disks and BIOS setup The appendices below provide you with extra information on the hard disk organization, how information is stored on disks, how disks should be installed in the computer and plugged into the motherboard, configuring disks with BIOS, partitions and file systems, and how operating systems interact with disks. B.1 B.1.
Hard disks with an IDE (Integrated Drive Electronics) interface are connected to the motherboard via a 40- or 80-thread flat marked cable: one of the threads of the cable is red. Two IDE hard disks can be connected to each of the sockets, i.e. there can be up to four hard disks of this type installed in the PC. (There are three plugs on each IDE cable: two for hard disks and one for the motherboard socket.
The hard disk with the jumper in master position is treated by the basic input/output system (BIOS) as bootable. The jumpers on hard disks that are connected to the same cable can be in the cable select for master/slave position. In this case, BIOS will deem as «master» the disk that is connected to the IDE cable closer to the motherboard than the other one. Unfortunately, hard disk markings were never standardized. You might well find that markings on your hard disk differ from the ones described above.
Large PC manufacturers like Dell and Hewlett-Packard produce motherboards themselves, and develop their own BIOS versions. You should always refer to the documentation that came with your computer for instructions on proper BIOS configuration. B.2.2 Standard CMOS setup menu Parameters in the standard CMOS setup menu usually define the geometry of the hard disk.
Translation mode is how sector addresses are translated. This parameter appeared because in BIOS versions, there were limitations to the maximum address capacity of disks, which is 504 MB (1024 cylinders x 16 heads x 63 sectors x 512 bytes). There are two ways to bypass this limitation: (1) switch from physical to logical sector addresses (LBA), (2) use mathematics to reduce the number of addressed sectors (cylinders) and increase the number of heads; this method is called Large Disk (Large).
starts with the hard disk that would be the third in usual circumstances (it is usually the secondary master). After you have installed the hard disk in your computer and have configured it in BIOS, one can say that the PC (or the motherboard) «knows» about its existence and its main parameters. However, it is still not enough for an operating system to work with the hard disk. B.2.4 AwardBIOS Below, we provide an example of configuring hard disks in AwardBIOS.
Shielded 80-pin cable.
2. Removable Device [Legacy Floppy] 3. IDE Hard Drive 4. Other Boot Drive [IBM-DTLA-307020] [Disabled] Plug & Play O/S Boot Virus Detection [No] [Enabled] Quick Power On Self Test Boot up Floppy Seek Full Screen Logo [Enabled] [Enabled] [Enabled] to select the device To select the boot sequence, use up or down Arrow.
F1 Help ↓ Select Item -/+ Change Values F5 Setup Defaults Esc Exit ←→ Select Menu Enter Select Sub-Menu F10 Save and Exit After setting the specified parameters, use the Left or Right keys to select the Exit menu item. Reply positively to the prompt on saving the specified parameters. For AwardBIOS for motherboards for Pentium, Pentium Pro processors (i.
This message appears when the boot program finds no available boot device, be that a floppy or a hard disk, or a CD-ROM. C: DRIVE ERROR C: DRIVE FAILURE ERROR ENCOUNTERED INITIALIZATION HARD DRIVE This message appears when it is not possible to access the C: disk.