Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved. ―Acronis‖, "Acronis Compute with Confidence" and the Acronis logo are trademarks of Acronis, Inc. Linux is a registered trademark of Linus Torvalds. Windows and MS-DOS are registered trademarks of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners.
END USER LICENSE AGREEMENT FOR SEAGATE SOFTWARE PLEASE READ THIS END USER LICENSE AGREEMENT (―EULA‖) CAREFULLY.
3. Restrictions. You are not entitled to do any of the following: a. Create derivative works based on the Product or any part or component thereof, including, but not limited to, the Software; b. Reproduce the Product, in whole or in part; c. Except as expressly authorized by Section 10 below, sell, assign, license, disclose, or otherwise transfer or make available the Product, in whole or in part, to any third party; d.
7. LIMITATION OF LIABILITY. NOTWITHSTANDING ANY DAMAGES THAT YOU MIGHT INCUR FOR ANY REASON WHATSOEVER, THE ENTIRE LIABILITY OF SEAGATE AND ANY OF ITS SUPPLIERS UNDER ANY PROVISION OF THIS EULA AND YOUR EXCLUSIVE REMEDY HEREUNDER SHALL BE LIMITED TO, AND IN NO EVENT WILL SEAGATE OR ITS SUPPLIERS TOTAL CUMULATIVE DAMAGES EXCEED, THE FEES PAID BY YOU TO SEAGATE FOR THE PRODUCT. 8. Indemnification.
time, permanent transfer of this EULA and the Software to another end user, provided that (i) you do not retain any copies of the Software, the Hardware, the media and printed materials, Upgrades (if any), and this EULA, and (ii) prior to the transfer, the end user receiving this EULA and the Software agrees to all the EULA terms. Any attempted assignment in violation of this Section is void. Seagate, the Seagate logo, and other Seagate names and logos are the trademarks of Seagate.
Table of Contents Chapter 1. Introduction ....................................................................................... 11 1.1 What is Seagate BlackArmor Backup? ..................................................................................11 1.2 Advantages .......................................................................................................................11 1.3 System requirements and supported media .........................................................................
5.3.11 Creating a custom data category for backups ..............................................................41 5.4 Making reserve copies of your backups ...............................................................................41 Chapter 6. Restoring backup data ....................................................................... 43 6.1 Restore under Windows or boot from CD? ...........................................................................43 6.1.1 Network settings in rescue mode ..
Chapter 12. Exploring archives and mounting images ........................................ 85 12.1 12.2 12.3 12.4 Searching ........................................................................................................................85 Google Desktop and Windows Search integration ...............................................................87 Mounting an image ..........................................................................................................93 Unmounting an image ....
B.2.4 Hard disk initialization errors .................................................................................... 124 B.3.1 Steps for installing a new internal SATA drive. ........................................................... 125 B.3 Installing a SATA hard drive ............................................................................................ 125 Appendix C. Hard Disk Wiping methods ............................................................ 127 C.1 C.
Chapter 1. Introduction 1.1 What is Seagate BlackArmor Backup? Seagate BlackArmor Backup is an integrated software suite that ensures security of all information on your PC. It can backup the operating system, applications, settings and all of your data, while also securely destroying any confidential data you no longer need.
File search using Google Desktop and Windows Search – If you use one of these search engines, you will be able to search for files through multiple archives by name or by a part of the name and then restore individual files easily and quickly. In addition, they provide Seagate BlackArmor Backup with the ability to perform full-text indexing of the files in tib archives, so you will be able to perform searches of the files content.
Seagate BlackArmor Backup also enables the creation of a bootable CD-R/DVD-R that can back up and restore a disk/partition on a computer running any Intel- or AMD- based PC operating system, including Linux®. The only exception is the Intel-based Apple Macintosh, which is not supported in native mode at this time. 1.3.
1.5 Technical support Users of legally purchased and registered copies of Seagate BlackArmor Backup are entitled to free technical support. If you experience problems installing or using Seagate products that you can’t solve yourself by using this guide, then please contact Seagate Technical Support. More information about contacting Seagate Technical Support is available at the following link: http://www.seagate.com/www/en-us/support.
Chapter 2. Seagate BlackArmor Backup installation and startup 2.1 Installing Seagate BlackArmor Backup 2.1.1 Installing boxed version To install Seagate BlackArmor Backup: Run the Seagate BlackArmor Backup setup file. In the Install Menu, select the program to install: Seagate BlackArmor Backup. Follow the install wizard instructions on the screen. Typical, Custom and Complete installation is available. Having pressed Custom, you can choose not to install Rescue Media Builder.
To save the setup file: Run the Seagate BlackArmor Backup setup file. In the Install Menu, right-click on the program name and select Extract. Select a location for the setup file and click Save. Recovering or updating the existing Seagate BlackArmor Backup installation with use of the .msi file must be done from the command line as follows: 1. Choose Start -> Run 2. Type cmd. 3. When the command-line interpreter window opens, type the following command: msiexec /i path_to_msi_file\msi_file_name.
Chapter 3. General information 3.1 The difference between file archives and disk/partition images A backup archive is a file or a group of files (also called ―backups‖ in this guide), that contains a copy of selected file/folder data or a copy of all information stored on selected disks/partitions. When you back up files and folders, only the data, along with the folder tree, is compressed and stored.
last full backup. Generally, a differential backup will be restored faster than an incremental one, as it does not have to process through a long chain of previous backups. A standalone full backup might be an optimal solution if you often roll back the system to its initial state or if you do not like to manage multiple files. If you are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup.
button, you can also change the display order of columns using the Move Up and Move Down buttons. If you click the i (Display the properties of the selected item) button, you will see the selected partition or disk properties window. This window contains two panels. The left panel contains the properties tree and the right describes the selected property in detail. The disk information includes its physical parameters (connection type, device type, size, etc.
The Zip format is available when backing up files and/or folders as well as when making reserve copies of your backups. Seagate BlackArmor Backup provides for the zip format most of the functionality available for the tib format, except password protection and encryption – you can schedule backups, validate zip backup archives, restore files and folders from zip archives, make incremental and differential backups, and so on. Seagate BlackArmor Backup can restore and validate only its own zip archives.
Chapter 4. Getting BlackArmor Backup to know Seagate 4.1 BlackArmor One-Click Protection BlackArmor One-Click Protection tool allows you to begin protecting your computer as soon as you install Seagate BlackArmor Backup. During the first start of the just installed Seagate BlackArmor Backup, the program will offer you to protect your computer by immediately backing up its system volume and Master Boot Record (MBR) as well as scheduling subsequent full backups.
If the hard drive has several partitions (not counting hidden ones), then the program will use a non-system partition with maximum free space If the drive has only one non-hidden partition, namely, the system partition: o If the program detects any internal hidden partition (non-BlackArmorSZ), it will back up to the system partition After applying this algorithm to your computer configuration, Seagate BlackArmor Backup will offer the optimum place for storing your backups.
4.2 Program workspace Starting Seagate BlackArmor Backup takes you to the Welcome screen. This screen provides quick access to practically all the program's functionality. Clicking the items in the right pane takes you to the corresponding wizard or screen where you can either start the selected task or function right away or make further selections. All the features listed in the right pane are duplicated on the left side of the screen occupied by the so called sidebar.
Status bar At the bottom of the main window, there is a status bar that briefly describes the selected operation or screen. If you select a backup archive, task or log, the status bar will show information on the selected item. Taskbar notification area icon During most of the operations, a special indicator icon appears in the Windows taskbar notification area (the right portion of the status bar with the clock). If you mouse over the icon, you will see a tool tip indicating the operation’s progress.
backup archives, as well as the date and time of the last backup, number of scheduled tasks and the last task result, and state of the Try&Decide mode. The screen also shows information on the state of your hard disks (total capacity, free space, space occupied by backup archives from Try&Decide and other files), information on the state of the BlackArmor Backup Secure Zone (free and occupied space). To go to one more screen of interest, click Backup and Restore -> Manage and restore on the sidebar.
Another useful screen shows logs of program operations and scheduled tasks. A calendar provides quick access to the logs (for past dates) or tasks (for future dates). You just click on a desired date. For more information see 11.3 Viewing Tasks and Logs. We will not bore you with a description of other screens, because many of them are selfexplanatory and some are described in the appropriate chapters of this guide.
Chapter 5. Creating backup archives 5.1 Selecting what data to back up As operating systems and application software become ever larger (for example, Windows Vista x64 requires 15GB of free space on a hard disk), usually it will take you several hours to reinstall your operating system and application software from original CDs or DVDs on a new hard disk. Furthermore, the practice of buying application software by downloading from the Internet is becoming more and more popular.
essential part of a good backup strategy. But file-level backups alone are not sufficient for two main reasons: 1) If your startup hard drive completely fails, you won’t be able to do any work at all until you’ve replaced it; and 2) Reinstalling an operating system and applications from their original CDs or DVDs is a lengthy and arduous procedure that you could avoid (or speed up greatly) with an image of your hard disk. You should create images of your primary disk and any other volume you normally use.
Selecting a hard drive results in selecting all partitions on that drive. If a hard drive has more than one partition, you may want to select individual partitions for backing up. To do so, click on the Down arrow at the right of the drive's line. Select the desired partition(s) in the displayed partition list. By default the program copies only the hard disk sectors that contain data. However, sometimes it might be useful to make a full sector-by-sector backup.
For Microsoft Office Outlook 2000, 2002, 2003, 2007 Mail Folders Calendar Contacts Tasks Notes Signatures News Folders User Settings Address Book For Microsoft Outlook Express Mail Folders Address Book (select Windows Address Book). Seagate BlackArmor Backup provides backup of IMAP (Internet Messages Access Protocol) mail folders for Microsoft Outlook. This means that you can back up folders stored on a mail server.
After selecting the archive location and naming the backup archive to be created, you have completed all the required steps for a backup task and this is confirmed by the fact that the Summary button becomes selectable. All the remaining steps are optional and in many cases you may omit them and just click Summary and then Proceed on the Summary page. For example, when you want to proceed with backup right away, you can omit the Scheduling step.
For more information see Chapter 8. Scheduling tasks. 5.2.4 Backup method Select whether you want to create a full, incremental or differential backup. If you have not backed up the selected data yet, or the full archive is old and you want to create a new master backup file, choose full backup. Otherwise it is recommended that you create an incremental or differential backup (see 3.2 Full, incremental and differential backups). If you select the Full method, the Automatic consolidation step (see 5.2.
If you decide to keep old backups (by not selecting the Remove old archives box) and creation of a new full backup results in violation(s) of the limits set for automatic consolidation, the program will use the following algorithm: 1) if the actual number of backups exceeds the maximum number of backups, the program automatically consolidates the old full backup with the oldest incremental (differential) one to correct this quota violation; 2) if after correcting the number of backups limit violation there
These filter settings will take effect for the current task. For information on how to set the default filters that will be used each time you select folders to back up, see 5.3.2 Source files exclusion. 5.2.6 Selecting the backup options Select the backup options (that is, backup file-splitting, compression level, password protection, etc.). The settings of the options will be applied only to the current backup task. 34 Copyright (c) 2000-2009 Acronis. All rights reserved.
Or, you can edit the default backup options if you want to save the current settings for future tasks or from the main menu, Options. See 5.3 Fine-tuning your backups for more information. 5.2.7 Setting automatic consolidation Automatic consolidation of a backup archive is enabled by setting the overall limitations for the archive.
5.2.8 Providing a comment Provide a comment for the archive. This can help identify the backup and prevent you from restoring the wrong data. However, you can choose not to make any notes. The backup file size and creation date are automatically appended to the description, so you do not need to enter this information. 5.2.9 The operation summary and the backup process At the final step, the backup task summary is displayed.
If you try to restore data from a password-protected archive, or append an incremental/differential backup to such an archive, Seagate BlackArmor Backup will ask for the password in a special window, allowing access only to those who know the password. 5.3.2 Source files exclusion By default, the program excludes files with the following extensions from backups: .bak, .~, .tmp, and .tib.
5.3.5 Backup performance The three options below might have a more or less noticeable effect on the backup process speed. This depends on overall system configuration and the physical characteristics of the devices. 1. Backup priority The preset is Low. The priority of any process running in a system determines the amount of CPU usage and system resources allocated to that process. Decreasing the backup priority will free more resources for other CPU tasks.
5.3.6 Archive splitting Sizeable backups can be split into several files that together form the original backup. A backup destined for the BlackArmor Backup Secure Zone cannot be split. 5.3.7 File-level security settings Preserve files' security settings in archives By default, files and folders are saved in the archive with their original Windows security settings (i.e. permissions for read, write, execute and so on for each user or user group, set in file Properties -> Security).
You can enable this setting to ignore errors during backup operations. This feature was mainly designed for unattended backups when you cannot control the backup process. In this mode no notifications will be displayed to you if errors occur during backup. Instead you can view the detailed log of all operations after the task finishes by selecting Tools -> Show Log. You may use this option when configuring a backup task to be run during the night. 5.3.9 Additional settings 1.
5.3.11 Creating a custom data category for backups To add a custom data category, click Create in the Choose files to back up screen of the Backup Wizard, select the folder (data source) and provide a name for the category. You can include in the category all files in the selected folder or apply filters to select the specific types of files that you wish or do not wish to back up.
A reserve copy always contains all the files selected for backup, that is, when creating a reserve copy the program always makes a full backup of the source data. You cannot make a reserve copy in the form of an incremental or differential backup, even in tib format. Also remember that you will pay for the enhanced convenience and increased security of your data by the time required for performing the task, because normal backup and reserve copying are performed one at a time and not simultaneously.
Chapter 6. Restoring backup data 6.1 Restore under Windows or boot from CD? As mentioned above (see 2.3 Running Seagate BlackArmor Backup), Seagate BlackArmor Backup can be used in several ways. We recommend that you first try to restore data using Seagate BlackArmor Backup under Windows, because this provides more functionality. Boot from the bootable media only if Windows does not start up.
Please note that before restoring Microsoft Outlook mail messages, accounts, contacts, settings, etc. from My E-mail backup on a new computer with a newly installed Microsoft Outlook, you should launch Outlook at least once. If Microsoft Outlook is launched for the first time after restoring the E-mail information, it may malfunction. If you use Microsoft Outlook Express and restore its mail folders, accounts, etc.
5. Select files and folders to restore. You can choose to restore all data or browse the archive contents and select the desired folders or files. 6. The next step allows you to keep useful data changes made since the selected backup was created. Choose what to do if the program finds a file with the same name as in the archive, in the target folder. By default, the program will not overwrite any files and folders, thus giving the files on the hard disk unconditional priority over the archived files.
Selecting the Overwrite existing files checkbox will give the archived files unconditional priority over the files on the hard disk, though, by default, the system, hidden files and folders, as well as more recent files and folders are preserved from overwriting. If you want to overwrite those files and folders too, unselect the appropriate checkboxes. In addition, you can preserve from overwriting the files that meet the criteria you specify in this window. 7.
8. At the final step, the restoration summary is displayed. Up to this point, you can make changes in the created task by choosing the step you want to change and by editing its settings. Clicking Proceed will launch the task execution. 9. The task progress will be shown in a special window. You can stop the procedure by clicking Cancel. Please keep in mind that the aborted procedure may still cause changes in the destination folder. 6.
If the archive was protected with a password, Seagate BlackArmor Backup will ask for it. The partitions layout and the Next button will be unavailable until you enter the correct password. 2. If you are going to restore data from an archive containing incremental backups, Seagate BlackArmor Backup will enable selecting one of the successive incremental backups by its creation date/time. Thus, you can roll back the disk/partition state to a certain date.
Having chosen a disk and partition recovery type, you may need to select the following option. Sector-by-sector The program will restore both used and unused sectors of disks or partitions. This option will appear only when you choose to restore a sector-by-sector backup. Restore chosen files or folders If you are not going to recover the system, but only want to repair damaged files, select Restore chosen files or folders.
track 0 by selecting the corresponding box. Restore the MBR if it is critical to your system booting. When MBR restoration is chosen, there will be the "Restore disk signature" box in the bottom left corner at the next step. Restoring disk signature may be desirable due to the following reasons: 1) Seagate BlackArmor Backup creates scheduled tasks using the signature of the source hard disk. If you restore the same disk signature, you don't need to re-create or edit the tasks created previously.
6.3.6 Changing the restored partition type When restoring a partition, you can change its type, though it is not required in most cases. To illustrate why you might need to do this, let’s imagine that both the operating system and data were stored on the same primary partition on a damaged disk. If you are restoring a system partition to the new (or the same) disk and want to load the operating system from it, you will select Active.
These changes might be useful if you are going to copy your hard disk to a new highcapacity one by creating its image and restoring it to a new disk with larger partitions. 6.3.8 Assigning a letter to the restored partition Seagate BlackArmor Backup will assign an unused letter to a restored partition. You can select the desired letter from a drop-down list or let the program assign a letter automatically by selecting the Auto setting.
input the command, its arguments and working directory or browse folders to find a batch file. Please note that interactive commands, i.e. commands that require user input, are not supported. Unselecting the Do not perform operations until the commands execution is complete box, selected by default, will permit the restore procedure to run concurrently with your commands execution.
Check of the file system is available only when restoring disk/partitions using FAT16/32 and NTFS file systems. The file system will not be checked if a reboot is required during restoration, for example, when restoring the system partition to its original place. 54 Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.
Chapter 7. Try&Decide The Try&Decide feature allows creating a secure, controlled temporary workspace on your computer without requiring you to install special virtualization software. You can perform various system operations not worrying that you might damage your operating system, programs or data. After making virtual changes, you may apply them to your original system. If you make changes that you want to keep, you might want to commit those changes to the system.
You can leave the Try&Decide mode turned on as long as you like (may be days on end, however in such a case applying changes may take a long time), since this mode "survives" across reboots of your operating system. If you use Windows Vista, please, be aware that in the Try&Decide mode the program may use the free space in the BlackArmor Backup Secure Zone quite intensively, even when your computer is idle. This is due to Windows Vista's housekeeping activities such as indexing that run in the background.
The moment comes eventually when you decide to turn the mode off by clicking the Stop button. After clicking the button, the program will show a dialog where you should decide what to do with the changes to your system made in the Try&Decide mode - apply or discard: Choosing Apply changes will allow you to keep the changes made to the system, and choosing Discard changes will return your system to the state it was in before turning on the Try&Decide mode.
disk defragmentation or disk error checking utilities at the same time, because this can irreparably corrupt the file system, as well as make the system disk unbootable. Seagate BlackArmor Backup will track changes until the BlackArmor Backup Secure Zone is almost full. Then the program will alert you that the time has come to make a decision on whether to apply or discard the changes made so far.
worse than before trying to recover them. Here’s one way you could try to recover the lost files: 1. Turn on the Try&Decide mode. 2. Launch the file undelete utility. 3. After the utility scans your disk in search of the deleted file or folder entries, it will present you the deleted entries it has found (if any) and offer you the opportunity to save whatever it is able to recover.
Chapter 8. Scheduling tasks Seagate BlackArmor Backup allows you to schedule periodic backup and validation tasks. Doing so will give you peace of mind, knowing that your data is safe. You can create more than one independently scheduled task. For example, you can back up your current project daily and back up the system disk once a week. One consideration in choosing a backup schedule is media management.
Once only – the task will be executed once at the specified time and day Upon event – the task will be executed on an event to be selected in the right pane: Periodically – the task will be executed periodically with a frequency to be specified in the Run this task periodically pane, where you specify the time between runs for the task being scheduled.
8.1.2 Setting up upon event execution If you choose the upon event execution option, set the event upon which to execute the task: System startup – the task will be executed at every OS startup System shutdown – the task will be executed before every system shutdown or reboot User logon – the task will be executed each time the current user logs on to the OS User logoff – the task will be executed each time the current user logs off of the OS.
8.1.3 Setting up daily execution If you choose daily execution, set the Start time and days on which you want to execute the task: Every day Every weekday Every х days – once every several days (specify the interval). If you want the task to be repeated several times per day, select Run the task every x hour(s) until the end of the day box and specify the interval in hours. Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.
8.1.4 Setting up weekly execution If you choose weekly execution, set the Start time, specify the task execution periodicity in the Run the task every x week(s) on: box (every week, every two weeks, etc.) and select the days on which to execute the task. 8.1.5 Setting up monthly execution If you select monthly execution, set the Start time and days on which to execute the task: On the – on the specified day (e.g. on second Tuesday or fourth Friday); select this from the drop-down lists.
8.2 Managing scheduled tasks To manage the scheduled tasks, click Tasks and Log on the sidebar and you will go to the Manage Tasks and Log screen with the Scheduled tasks tab selected by default in the right pane. The tab displays all scheduled tasks along with their name, status, schedule, last run time, last result, and owner. To view the other task details, mouse over their names. By default you see only your own tasks, but you have the option to view or manage tasks of other users.
Chapter 9. Managing BlackArmor Backup Secure Zone The BlackArmor Backup Secure Zone is a special partition for storing archives on the same computer that created the archive. For more information about these functions see 3.3 BlackArmor Backup Secure Zone. When you select Tools -> Manage BlackArmor Backup Secure Zone in the main menu, the program searches for the zone on all local drives. If a zone is found, the wizard will offer to manage it (resize or change the password) or delete it.
4. In the next window, enter the BlackArmor Backup Secure Zone size or drag the slider to select any size between the minimum and maximum ones. The minimum size is about 50 MB, depending on the geometry of the hard disk. The maximum size is equal to the disk’s unallocated space plus the total free space on all partitions selected at the previous step. When creating the zone, the program will first use the unallocated space.
Reducing a system partition to the minimum size might prevent your operating system from booting. 5. You can set a password to restrict access to the zone. The program will ask for the password at any operation relating to it, such as resizing and deleting the zone. Seagate BlackArmor Backup repair or update will not affect the password. However, if the program is removed and then installed again while keeping the BlackArmor Backup Secure Zone on the disk, the password to the zone will be reset. 6.
2. Select to increase or decrease the zone size. You might need to increase it to provide more space for archives. The opposite situation may arise if any partition lacks free space. 3. Select partitions from which free space will be used to increase BlackArmor Backup Secure Zone or that will receive free space after the zone is reduced. 4. Enter the new size of the zone or drag the slider to select the size. When increasing the BlackArmor Backup Secure Zone, the program will first use unallocated space.
3. Enter the new password and confirm it or select Do not use password protection. You can also select a secret question that will be asked in case you forget the password. 4. To perform the password change operation, click Proceed in the final wizard window. 9.4 Deleting BlackArmor Backup Secure Zone 1. If you want to remove the BlackArmor Backup Secure Zone, select Tools -> Manage BlackArmor Backup Secure Zone in the main menu and then choose Remove BlackArmor Backup Secure Zone. 2.
Chapter 10. Creating bootable media You can run Seagate BlackArmor Backup from an emergency boot disk on a bare-metal system or a crashed computer that cannot boot. You can even back up disks on a nonWindows computer, copying all its data into the backup archive by imaging the disk one sector at a time. To do so, you will need bootable media that has a copy of the standalone Seagate BlackArmor Backup version installed on it.
In the next window you can set Bootable Media Startup Parameters in order to configure rescue media boot options for better compatibility with different hardware. Several options are available (nousb, nomouse, noapic, etc.). All the available startup parameters are listed in Appendix D. Startup Parameters. These parameters are provided for advanced users. If you encounter any hardware compatibility problems while testing boot from the rescue media, it may be best to contact Seagate Technical Support.
other hand, backup archives encrypted using the Seagate BlackArmor Backup encryption feature can be recovered. Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.
Chapter 11. Other operations 11.1 Validating backup archives You can check the integrity of your backups to be certain that your archives are not damaged. You may perform such validations using the Validate Wizard. 1. To start the Validate Wizard, choose Operations -> Validate Backup Archive from the main program menu. 2. Select the archive to validate. Click Next to continue. If the selected archive is protected with a password, Seagate BlackArmor Backup will ask for the password in a dialog box.
4. Clicking Proceed in the summary window will launch the validation procedure if you leave the Run task now box selected. If you have decided to validate the backup archive on schedule, the Run task now box will be unselected by default and the validation will proceed according to the schedule you set, though you can also validate the backup right away by selecting this box. After the validation is complete, you will see the results window. You can cancel validation by clicking Cancel.
11.2 Operation results notification Sometimes a backup or restore procedure can last for 30 minutes or more. Seagate BlackArmor Backup can notify you when it is finished using the WinPopup service or via email. The program can also duplicate messages issued during the operation or send you the full operation log after operation completion. By default all notifications are disabled. 11.2.
If the outgoing SMTP server requires logging on to an incoming mail server before it allows sending outgoing messages, enter the necessary information for the incoming mail server.
Provide the name of the computer to which notifications will be sent. At the bottom of this window you can choose whether you want to get notifications: when the operation is completed successfully when the operation failed during the operation when user interaction is required 11.3 Viewing Tasks and Logs Seagate BlackArmor Backup has a Tasks and Log screen that allows you to view its working logs and scheduled tasks.
The color marks in the calendar show information about the days with scheduled tasks, tasks completed with errors, and successfully completed tasks. The current day is highlighted in bold font. Clicking a day marked with a scheduled task shows a task(s) scheduled for this date. The buttons with the left and right arrows at the sides of the calendar allow you to browse the months being shown in the calendar.
To view the logs for a specific period, select the period by clicking the right arrow buttons in the From: and To: fields of the Show for the period area. Clicking the arrow in the From: field opens a pop-up calendar where you can set the start day of the period by doubleclicking the appropriate day number. Then set the end day using the same procedure for the To: field. You can change months and years in the pop-up calendars using the left and right arrows in the month name area.
11.4 Consolidating backups There are two kinds of backup consolidation procedures in Seagate BlackArmor Backup: automatic consolidation and file name-based consolidation. In the case of automatic consolidation, the program uses the rules set for backup archives. After creating a backup, the program checks the backup archive for quota violations, such as exceeding a preset maximum number of gigabytes set aside for backups and, if any limitation is exceeded, consolidates the oldest backups.
3. The program displays a list of backups belonging to the selected archive with their creation date and time. The upper backup is the full backup; the rest are incremental backups. Select the backups you want to keep. 4. Choose the location and name for the archive copy. By default, the program suggests the same location and the original backup archive will be overwritten.
5. The program displays the summary window. Click Proceed to start consolidation. In our example, when consolidation is complete, disk G will contain two new archives MyBackup and MyBackup2. MyBackup is a full backup containing data as of November 25, 2008, 9:40:23 AM. MyBackup2 is an incremental backup containing data as of November 25, 2008, 10:21:12 AM. You can make sure of this by starting the consolidation wizard again, selecting the archive MyBackup and proceeding to the next window. 11.
consider that they still exist. This will result in errors when the program tries to perform operations on the backups that no longer exist. So you must only remove obsolete backups and backup archives using the tool provided by Seagate BlackArmor Backup. To remove the entire backup archive, select it and click Remove on the toolbar or right-click on the full backup of the backup archive and choose Remove in the shortcut menu.
Chapter 12. Exploring mounting images archives and Seagate BlackArmor Backup offers two kinds of archive contents management: mounting for images and exploring for both images and file-level archives. Exploring images and file-level archives lets you view their contents and copy the selected files to a hard disk. To explore a backup archive, double-click on the corresponding tib file. You can also right-click on the file and choose Explore in the shortcut menu.
2. By default the search is performed in all the sources where Seagate BlackArmor Backup can search information. You can select an information source of interest by choosing the appropriate tab among Backups and Backup content. The Backups tab shows the results of the search for tib and zip archives by archive filename. Double-clicking on a filename opens the corresponding archive in Windows Explorer where you can explore the archive contents.
When a file is included in several backups and it has not been modified, the search results will show it only once in the oldest backup file. If such a file has been changed, the search results will show all backup files containing differing versions of the file. 2. Search in the Help topics and comments to backup archives is carried out differently. First of all, you cannot use "*" and "?" as Windows wildcard characters.
See in which archive a given file is stored and restore that archive Google Desktop has a "Quick Find" window. This window is filled with the most relevant results from your computer. The results change as you type, so you can quickly get to what you want on your computer. Windows Search provides similar functionality.
3. Right-click on the Google Desktop icon in your system tray once more and select Indexing -> Re-Index. Click Yes in the confirmation window that appears. Google Desktop will add all the new content to the existing index. Give Google Desktop some time for indexing all tib files on your computer's hard disks and adding the indexing information to its index database. The required time depends on the number of tib archives and the number of files they contain.
Clicking in the browser window on a line related to the desired file version opens a small dialog with just two options: View and Restore. Choosing View starts the application associated with this file type and opens the file. Choosing Restore starts Seagate BlackArmor Backup and you can then restore the file to a desired location.
2. Click Advanced, select the File Types tab and then make sure that the tib extension is selected and ".tib IFilter" is shown in the Filter Description field. Select Index Properties and File Contents. 3. Click OK and while the Indexing Options window is open, check that the disks where you store your tib backup archives are shown in the "Included Locations" list. If the list does not contain those disks, the tib files will not be indexed.
If you store backups on a network share, Windows Search can index them too. You just have to add the share to the Indexed Locations list by typing the appropriate UNC path after selecting the Add UNC Location tab of Advanced Options. Give Windows Search some time for indexing all tib files on your computer's hard disks and adding the indexing information to its index database. The required time depends on the number of tib archives and the number of files they contain.
Windows Search results 12.3 Mounting an image 1. Start the Mount Wizard by selecting Operations -> Mount Image in the main program menu or by right-clicking on an image archive and selecting Mount in the Windows Explorer shortcut menu. 2. Select the archive for mounting. If you selected an archive containing incremental images, you can select one of the successive incremental images (also called "slices") by its creation date/time. Thus, you can explore the data state at a certain moment.
If you added a comment to the archive, it will be displayed in the Description column. If the archive was protected with a password, Seagate BlackArmor Backup will ask for the password in a dialog box. Neither the partitions layout will be shown, nor will the Next button be enabled until you enter the correct password. You can also select a letter to be assigned to the virtual disk from the Mount letter dropdown list. If you do not want to mount the virtual drive, select Do not mount in the list. 4.
6. After the image is connected, the program will run Windows Explorer, showing its contents. Now you can work with files or folders as if they were located on a real disk. You can connect multiple partition images. If you want to connect another partition image, repeat the procedure. 12.4 Unmounting an image We recommend that you unmount the virtual disk after all necessary operations are finished, as maintaining virtual disks takes considerable system resources.
Chapter 13. new disk Transferring the system to a 13.1 General information Sooner or later, most computer users find that their hard disk is too small. If you just don’t have space for more data, you can add another disk just for data storage as described in the following chapter. However, you might find that your hard disk does not have enough space for the operating system and installed applications, preventing you from updating your software or installing new applications.
13.2 Security Please note the following: if the power goes out or you accidentally press RESET during the transfer, the procedure will be incomplete and you will have to partition and format or clone the hard disk again. No data will be lost because the original disk is only being read (no partitions are changed or resized).
You can determine the source and destination using the information provided in this window (disk number, capacity, label, partition, and file system information). 13.3.3 Selecting destination disk After you select the source disk, you have to select the destination where the disk information will be copied. The previously selected source becomes grayed-out and disabled for selection. If any disk is unpartitioned, the program will automatically recognize it as the destination and bypass this step.
13.3.4 Partitioned destination disk At this point, the program checks to see if the destination disk is free. If not, you will be prompted by the Conformation window stating that the destination disk contains partitions, perhaps with useful data. To confirm deletion of the partitions, click OK. Note that no real changes or data destruction will be performed at this time! For now, the program will just map out cloning. All changes will be implemented only when you click Proceed.
If you elect to transfer information "as is," a new partition will be created for every old one with the same size and type, file system and label. The unused space will become unallocated. Afterwards, you will be able to use the unallocated space to create new partitions or to enlarge the existing partitions with special tools. As a rule, "as is" transfers are not recommended as they leave a lot of unallocated space on the new disk.
First, select a partition to resize and click Edit on the toolbar. This will open the Partition Settings window, where you can resize and relocate the partition. You can do this by entering values in the Free space before, Partition size, Free space after fields, by dragging partition borders or the partition itself. If the cursor turns into two vertical lines with left and right arrows, it is pointed at the partition border and you can drag it to enlarge or reduce the partition’s size.
13.3.7 Cloning summary The cloning summary window graphically (as rectangles) illustrates information about the source disk (partitions and unallocated space) and the destination disk layout. Along with the disk number, some additional information is provided: disk capacity, label, partition and file system information. Partition types — primary, logical and unallocated space — are marked with different colors. Cloning a disk containing the currently active operating system will require a reboot.
Chapter 14. Adding a new hard disk If you don't have enough space for your data, you can either replace the old disk with a new higher-capacity one (data transfers to new disks are described in the previous chapter), or add a new disk only to store data, leaving the system on the old disk. If the computer has a bay for another disk, it would be easier to add a data disk drive than to clone a system drive. To add a new disk, you must first install it in your computer. 14.
Click the Accept button and you will be taken back to the Partition Creation screen. Check the resulting partition's settings and start creating another partition by clicking Create new partition again. You can also edit the new partition's settings by clicking Edit on the toolbar or delete it by clicking Delete. If you allocate all unallocated space on the disk to the new partition, the Create new partition button disappears. 14.
After you click Proceed, Seagate BlackArmor Backup will start creating new partition(s), indicating the progress in a special window. You can stop this procedure by clicking Cancel. You will then have to repartition and format the new disk or repeat the disk add procedure. Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.
Chapter 15. Security and Privacy Tools Seagate BlackArmor Backup includes tools for secure destruction of data on an entire hard disk drive, individual partitions, as well as for erasing individual files and eliminating user system activity traces. These tools ensure the security of your confidential information, as well as maintain your privacy when you work with a PC, because they clean-up the evidence showing your actions (records in various system files) that you don’t even know about.
2. On the next wizard's step select the desired data destruction method. By default the program will use the Fast method (see Appendix C. Hard Disk Wiping methods of this manual). You can also choose one of the other preset data destruction methods from the drop-down list. 3. To permanently destroy the selected files using the desired method, click Proceed in the next window. 15.
You can select at one time several partitions located on different hard disks or on several disks. Click Next to continue. If the disks and/or partitions you have selected include the system disk or partition, you will see a warning window. Be careful, because clicking OK in this warning window and then Proceed in the Summary window will result in wiping the system partition containing your Windows operating system.
In the Post-wiping Actions window you can select actions to be performed on the partitions selected for data destruction. BlackArmor DriveCleanser offers you three choices: Leave partition(s) as is — just destroy data using the method selected below Delete partition(s) — destroy data and delete partition Format — destroy data and format partition (default) In this example, the switch is set to Format.
BlackArmor DriveCleanser offers you another useful capability — to estimate the results of executing a data destruction method on a hard disk or partition. To view the state of your cleaned disks or partitions, choose Utilities in the lower part of the sidebar and then Disk clean-up in the upper part. The BlackArmor DriveCleanser area in the right pane contains the View disks link. Click on the link and then choose the partition whose cleaning results you wish to view.
Each custom algorithm is stored in a separate file with its own name. If you try to write a new algorithm to an pre-existing file, the existing file’s contents will be erased. If you created and saved your algorithm for data destruction while working with BlackArmor DriveCleanser, you can use it later in the following way: In the Algorithm Selection window, choose Load from file… from the drop-down list and select the file with custom data destruction algorithm parameters. By default, such files have a *.
You can view the search results and manually select the items you wish to remove. 15.5 System Clean-up Wizard settings If you want to change the default system clean-up settings, click the corresponding link in the first window of the System Clean-up Wizard. To enable or disable any System Clean-up component, check or uncheck its Enable this component flag. In the System Clean-up Wizard Properties window you can also set clean-up parameters for each system component.
Under the Windows operating system, a search string can represent a full or partial filename. A search string can contain any alphanumeric symbols, including commas and Windows wildcard symbols, and can have values similar to the following: *.* – to clean all files with any file names and extensions *.doc – to clean all files with a specific extension – Microsoft document files in this case read*.
the window with full and partial computer names searched for in the network. These items will be deleted. 15.5.4 "Drive Free Space" setting Here you can manually specify physical and/or logical drives to clean up free space on. By default, the System Clean-up Wizard cleans up free space on all available drives. If you want to change the settings of this parameter, you can use the Remove button to delete from the list the drives you don't need to clean free space on.
15.5.6 "Network Places Filter" setting Here you can enter (separated by semicolons) any hostnames or IP addresses of network places, servers, FTP servers, network shares, etc. to which you have made connection by supplying network credentials (a user name and password). While entering hostnames and IP addresses you can use * and ? wildcards. To see the list of network places for which the stored network user credentials will be wiped according to your filter, click Show Network Places. 15.
Appendix A. Partitions and file systems A.1 Hard disk partitions The mechanism that allows you to install several operating systems on a single PC or to carve up a single physical disk drive into multiple ―logical‖ disk drives is called partitioning. Partitioning is performed by special applications. In MS-DOS and Windows, these are FDISK and Disk Administrator.
number of sectors. FAT stores information about what clusters are free, what clusters are bad, and also defines in which clusters files are stored. The FAT16 file system has a 2GB limit that permits a maximum 65,507 clusters that are 32KB in size. (Windows NT/2000/XP/Vista support partitions up to 4GB with up to 64KB clusters). Usually the smallest cluster size is used to make the total cluster amount within the 65,507 range. The larger a partition, the larger its clusters.
Linux ext2. It has multiple journaling modes and broad cross-platform compatibility in both 32- and 64-bit architectures. A.2.6 Linux ReiserFS ReiserFS was officially introduced to Linux in 2001. ReiserFS overcomes many Ext2 disadvantages. It is a 64-bit journaling file system that dynamically allocates space for data substructures. 118 Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved.
Appendix B. Hard disks and BIOS setup The appendices below provide you with extra information on how the hard disk is organized, how information is stored on disks, how disks should be installed in the computer and plugged into the motherboard, configuring disks with BIOS, partitions and file systems, and how operating systems interact with disks. B.1 B.1.
B.1.2 Motherboard sockets, IDE cable, power cable There are two slots on the motherboard to which the hard disks can be connected: primary IDE and secondary IDE. Hard disks with an IDE (Integrated Drive Electronics) interface are connected to the motherboard via a 40- or 80-thread flat marked cable: one of the threads of the cable is red. Two IDE hard disks can be connected to each of the sockets, i.e. there can be up to four hard disks of this type installed in the PC.
SP – slave (or no jumper required) CS – cable select for master/slave: the purpose of the hard disk is determined by its physical position with respect to the motherboard PK – jumper parking position: the position where one can put the jumper if it is not necessary in the existing configuration The hard disk with the jumper in master position is treated by the basic input/output system (BIOS) as bootable.
The menu can differ in appearance, sets of items and their names, depending on the BIOS manufacturer. The most widely known BIOS makers for PC motherboards are Award/Phoenix and AMI. Moreover, while items in the standard setup menu are mostly the same for various BIOSes, items of the extended setup heavily depend on the computer and BIOS version. Below we describe the general principles of initial hard disk configuration.
Heads (Hd) 64 Sectors (Sec) 63 Mode Auto CHS 1707 MB Maximum LBA Capacity 1707 MB In BIOS setup, you can set the Type parameter to User Type HDD (user-defined type). In this case, you also have to specify the value of the translation mode parameter, which can be Auto/Normal/LBA/Large. Translation mode is how sector addresses are translated.
disks installed in your computer labeled as C:, D:, E:, and F:, you can adjust the boot sequence so that an operating system is booted from, for example, disk E:. In this case, you have to set the boot sequence to look like E:, CD-ROM:, A:, C:, D:. This does not mean that booting is done from the first disk in this list; it only means that the first attempt to boot an operating system is to boot it from this disk. There may be no operating system on disk E:, or it may be inactive.
It is also possible that the device is out of order, or the hard disk is not formatted. B.3 Installing a SATA hard drive Most recently manufactured PCs use the SATA interface for hard drives. In general, installing a SATA hard drive is easier than an IDE drive, as it is not necessary to configure master-slave jumpers. SATA drives use a thin interface cable with sevenpin keyed connectors. This improves airflow through the PC case. Power is supplied to SATA drives through 15-pin connectors.
SATA controllers usually appear under the SCSI and RAID controllers section of Device Manager, while hard drives are listed under the Disk drives section. The SATA controller and SATA hard drive must not be displayed in the Device Manager with a yellow exclamation mark or any other error indication. 8. After you have installed the hard disk in your computer and have configured it in BIOS, one can say that the PC "knows" about its existence and its main parameters.
Appendix C. Hard Disk Wiping methods Information removed from a hard disk drive by non-secure means (for example, by simple Windows delete) can easily be recovered. Utilizing specialized equipment, it is possible to recover even repeatedly overwritten information. Therefore, guaranteed data wiping is more important now than ever before. The guaranteed wiping of information from magnetic media (e.g.
C.2 Information wiping methods used by Seagate BlackArmor Backup The table below briefly describes information wiping methods used by Seagate. Each description features the number of hard disk sector passes along with the number(s) written to each sector byte. The description of built-in information wiping methods No. 1. 2. 3. 4. 5. 128 Algorithm (writing Passes method) United States 4 Department of Defense 5220.
Appendix D. Startup Parameters Additional parameters that can be applied prior to booting Linux kernel Description The following parameters can be used to load Linux kernel in a special mode: acpi=off Disables ACPI and may help with a particular hardware configuration. noapic Disables APIC (Advanced Programmable Interrupt Controller) and may help with a particular hardware configuration. nousb Disables loading of USB modules. nousb2 Disables USB 2.0 support. USB 1.1 devices still work with this option.
pci=bios Forces to use PCI BIOS, and not access the hardware device directly. For instance, this parameter may be used if the machine has a non-standard PCI host bridge. pci=nobios Disallows use of PCI BIOS; only direct hardware access methods are allowed. For instance, this parameter may be used if you experience crashes upon boot-up, probably caused by the BIOS. pci=biosirq Uses PCI BIOS calls to get the interrupt routing table.