Knowledge

Disk image

Source đź“ť

249:
Educational institutions and businesses can often need to buy or replace computer systems in large numbers. Disk imaging is commonly used to rapidly deploy the same configuration across workstations. Disk imaging software is used to create an image of a completely-configured system (such an image is
345:
frequently use disk images to emulate floppy disks that have been preserved. This is usually simpler to program than accessing a real floppy drive (particularly if the disks are in a format not supported by the host operating system), and allows a large library of software to be managed. Emulation
168:
Forensic imaging is the process of creating a bit-by-bit copy of the data on the drive, including files, metadata, volume information, filesystems and their structure. Often, these images are also hashed to verify their integrity and that they have not been altered since being created. Unlike disk
366:
Disk imaging can be slow, especially for older storage devices. A typical 4.7 GB DVD can take an average of 18 minutes to duplicate. Floppy disks read and write much slower than hard disks. Therefore, despite their small size, it can take several minutes to copy a single disk. In some cases, disk
357:
Other limitations can be the lack of access to software required to read the contents of the image. For example, prior to Windows 8, third party software was required to mount disk images. When imaging multiple computers with only minor differences, much data is duplicated unnecessarily, wasting
102:
Disk image creation is called disk imaging and is often time consuming, even with a fast computer, because the entire disk must be copied. Typically, disk imaging requires a third party disk imaging program or backup software. The software required varies according to the type of disk image that
154:
is a computer program that emulates an actual disc authoring device such as a CD writer or DVD writer. Instead of writing data to an actual disc, it creates a virtual disk image. A virtual burner, by definition, appears as a disc drive in the system with writing capabilities (as opposed to
169:
imaging for other purposes, digital forensic applications take a bit-by-bit copy to ensure forensic soundness. The purposes of imaging the disk is to not only discover evidence preserved in digital information but also to examine the drive to gather clues of how the crime was committed.
285:
Network-based image deployment reduces the need to maintain and update individual systems manually. Imaging is also easier than automated setup methods because an administrator does not need to have knowledge of the prior configuration to copy it.
95:, which ran as large as 200 megabytes per reel. Disk images became much more popular when floppy disk media became popular, where replication or storage of an exact structure was necessary and efficient, especially in the case of 469: 241:). Virtual hard disk images tend to be stored as either a collection of files (where each one is typically 2GB in size), or as a single file. Virtual machines treat the image set as a physical drive. 33:
Traditionally, disk images were bit-by-bit copies of every sector on a hard disk often created for digital forensic purposes, but it is now common to only copy allocated data to reduce storage space.
278:
tend to be used to restore an image to many computers simultaneously. These approaches do not work well if one or more computers experience packet loss. As a result, some imaging solutions use the
262:
server to boot an operating system over a computer network that contains the necessary components to image or restore storage media in a computer. This is usually used in conjunction with a
1857:
Convention: Any item in this table that has the form of "A+B" or "A+B+C" indicates a disk format that spans multiple files, where A contains the bulk of the data, and B and C are
354:
Disk imaging is time consuming, the space requirements are high and reading from them can be slower than reading from the disk directly because of a performance overhead.
60:
strategy. Disk images can be made in a variety of formats depending on the purpose. Virtual disk images (such as VHD and VMDK) are intended to be used for cloud computing,
520:. Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries. New York, NY, USA: Association for Computing Machinery. pp. 57–66. 733:. Proceedings of the 6th International Conference on Security of Information and Networks. New York, NY, USA: Association for Computing Machinery. pp. 425–428. 1402: 434: 1603: 1476: 346:
also allows existing disk images to be put into a usable form even though the data contained in the image is no longer readable without emulation.
155:
conventional disc authoring programs that can create virtual disk images), thus allowing software that can burn discs to create virtual discs.
250:
sometimes called a golden image). This image is then written to a computer's hard disk (which is sometimes described as restoring an image).
2010: 71:
Despite the benefits of disk imaging the storage costs can be high, management can be difficult and they can be time consuming to create.
1119: 30:
is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device.
341:
Libraries and museums are typically required to archive and digitally preserve information without altering it in any manner.
193:. This can also be faster than reading from the physical optical medium. Further, there are less issues with wear and tear. A 1890: 1645: 1173: 1061: 1026: 746: 703: 617: 543: 1085: 1469: 1151: 1410: 263: 577: 1666: 1614: 984: 489: 398: 807:
Day, Michael; Pennock, Maureen; May, Peter; Davies, Kevin; Whibley, Simon; Kimura, Akiko; Halvarsson, Edith (2016).
680:. 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering. pp. 73–84. 333:. Typically, disk imaging can be used to quickly restore an entire system to an operational state after a disaster. 2030: 1048:. 2010 Second International Workshop on Education Technology and Computer Science. Vol. 1. pp. 405–408. 2035: 1462: 942: 2015: 1832: 326: 1432: 1222: 2020: 1247:
Shiau, Steven J. H.; Huang, Yu-Chiang; Tsai, Yu-Chin; Sun, Chen-Kai; Yen, Ching-Hsuan; Huang, Chi-Yo (2021).
259: 367:
imaging can fail due to bad sectors or physical wear and tear on the source device. Unix utilities (such as
1016: 1899: 1774: 408: 1348: 1842: 1883: 1848: 1638: 271: 2005: 809:"The preservation of disk-based content at the British Library: Lessons from the Flashback project" 774: 68:
are used for forensic purposes. Proprietary formats are typically used by disk imaging software.
2025: 604:, SpringerBriefs in Computer Science, Cham: Springer International Publishing, pp. 125–126, 371:) are not designed to cope with failures, causing the disk image creation process to fail. When 1920: 1794: 1111: 1779: 1764: 1711: 1687: 1682: 2000: 1876: 1696: 1631: 1555: 1260: 897:"Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures" 808: 779:. 2004 American Society for Engineering Education Annual Conference. Salt Lake City, Utah. 57: 53: 1726: 8: 1307:
Shiau, Steven J. H.; Sun, Chen-Kai; Tsai, Yu-Chin; Juang, Jer-Nan; Huang, Chi-Yo (2018).
1264: 968: 517:
Extending digital repository architectures to support disk image preservation and access
1925: 1822: 1759: 1716: 1701: 1598: 1497: 1286: 1067: 836: 752: 709: 653: 549: 310: 299: 258:
Image restoration can be done using network-based image deployment. This method uses a
218: 38: 1089: 1827: 1784: 1754: 1749: 1721: 1692: 1507: 1384: 1330: 1290: 1278: 1204: 1057: 1022: 918: 877: 828: 742: 699: 613: 539: 485: 445: 214: 206: 198: 112: 104: 65: 45: 1071: 840: 813:
Alexandria: The Journal of National and International Library and Information Issues
1744: 1588: 1573: 1320: 1268: 1049: 908: 867: 820: 780: 756: 734: 713: 689: 681: 657: 645: 605: 553: 529: 521: 477: 266:
server to automate the configuration of network parameters including IP addresses.
143: 34: 1177: 375:
is the end goal, it is instead recommended to use more specialised tools (such as
1812: 1736: 1377:"Digital forensics on a shoestring: a case study from the University of Victoria" 1192: 609: 576:
Pullakandam, R.; Lin, X.; Hibler, M.; Eide, E.; Ricci, R. (October 23–26, 2011).
330: 202: 194: 186: 178: 128: 49: 1309:"The Design and Implementation of a Novel Open Source Massive Deployment System" 1273: 1248: 1141: 872: 855: 2040: 1907: 1043: 675: 639: 597: 306: 182: 132: 96: 1868: 1706: 1449: 1376: 649: 1994: 1948: 1563: 1517: 1388: 1334: 1282: 1208: 922: 881: 832: 824: 481: 372: 314: 92: 738: 525: 1915: 1858: 1674: 1578: 1568: 1540: 913: 896: 644:. 2008 IEEE International Symposium on Consumer Electronics. pp. 1–3. 468:
Colloton, Eddy; Farbowitz, Jonathan; RodrĂ­guez, Caroline Gil (2022-11-02).
403: 295: 84: 1623: 1053: 991: 728: 685: 515: 1804: 1657: 1454: 1146: 1045:
Construction of the Practical Teaching System on Operating Systems Course
970:
Need for speed : A study of the speed of forensic disk imaging tools
856:"A Novel Approach to Address Interoperability Concern in Cloud Computing" 429: 419: 943:"Towards Best Practices In Disk Imaging: A Cross-Institutional Approach" 785: 585:. 23rd ACM Symposium on Operating Systems Principles. Cascais, Portugal. 1963: 1940: 1525: 1325: 1308: 694: 534: 393: 388: 279: 222: 1930: 1817: 1249:"A BitTorrent Mechanism-Based Solution for Massive System Deployment" 727:
Kazim, Muhammad; Masood, Rahat; Shibli, Muhammad Awais (2013-11-26).
440: 413: 368: 267: 190: 124: 120: 61: 20: 16:
Computer file containing the contents and structure of a disk volume
1953: 1593: 1583: 1545: 1502: 376: 342: 88: 677:
Automating Disk Forensic Processing with SleuthKit, XML and Python
56:, as part of a backup strategy, and legacy emulation as part of a 1966: 514:
Woods, Kam; Lee, Christopher A.; Garfinkel, Simson (2011-06-13).
275: 210: 602:
Guide to Digital Forensics: A Concise and Practical Introduction
424: 230: 108: 103:
needs to be created. For example, RawWrite and WinImage create
80: 1042:
Li, Hongwei; Yin, Changhong; Xu, Yaping; Guo, Qingjun (2010).
1530: 1485: 940: 136: 41:
are commonly used to reduce the size of the image file set.
941:
Colloton, E.; Farbowitz, J.; Fortunato, F.; Gil, C. (2019).
1979: 1789: 1769: 854:
Arunkumar, G.; Venkataraman., Neelanarayanan (2015-01-01).
325:, etc.), and allows the exact and efficient recovery after 238: 234: 226: 116: 467: 1535: 322: 79:
Disk images were originally (in the late 1960s) used for
44:
Disk imaging is done for a variety of purposes including
19:"CD image" redirects here. For ISO 9660 image files, see 575: 313:
state). For this reason, it is also used for backing up
895:
Barrowclough, John Patrick; Asif, Rameez (2018-06-11).
579:
High-performance Disk Imaging With Deduplicated Storage
318: 146:
can generate and load disk images for optical media. A
91:
and as large as 330 megabytes, and the copy medium was
87:
of mainframe disk media. Early ones were as small as 5
853: 730:
Securing the virtual machine images in cloud computing
435:
Protected Area Run Time Interface Extension Services
177:
Creating a virtual disk image of optical media or a
806: 772: 638:Lee, Sang Su; Kyong, Un Sung; Hong, Do Won (2008). 596:Kävrestad, Joakim (2017), Kävrestad, Joakim (ed.), 470:"Disk Imaging as a Backup Tool for Digital Objects" 181:is typically done to make the content available to 1306: 1246: 773:Blackham, N.; Higby, C.; Bailey, M. (June 2004). 726: 513: 253: 1992: 966: 894: 305:A disk image contains all files and data (i.e., 205:is implemented as a disk image (i.e. either the 1898: 1374: 127:program can be used to create raw disk images. 244: 139:systems to create and write disk image files. 1884: 1639: 1470: 1375:Durno, John; Trofimchuk, Jerry (2015-01-21). 862:. Big Data, Cloud and Computing Challenges. 637: 416:, an archive file of an optical media volume 1653: 1409:. Microsoft. 30 August 2011. Archived from 1891: 1877: 1646: 1632: 1484: 1477: 1463: 1349:"Fast, Scalable Disk Imaging with Frisbee" 1041: 776:Re-Imaging Computers For Multipurpose Labs 64:are intended to emulate optical media and 1324: 1272: 912: 871: 784: 693: 673: 595: 533: 967:Stewart, Dawid; Arvidsson, Alex (2022). 142:Authoring software for CDs/DVDs such as 1190: 1112:"Virtual CD - The original for your PC" 336: 1993: 1450:Software repository including RAWRITE2 1122:from the original on 24 September 2011 1014: 936: 934: 932: 1872: 1627: 1458: 1403:"Accessing data in ISO and VHD files" 1370: 1368: 1302: 1300: 1242: 1240: 1238: 1236: 1154:from the original on 17 February 2011 962: 960: 189:emulate a CD/DVD drive by reading an 2011:Compact Disc and DVD copy protection 1088:. Phantombility, Inc. Archived from 802: 800: 798: 796: 768: 766: 669: 667: 571: 569: 567: 565: 563: 509: 507: 505: 503: 501: 474:Conservation of Time-Based Media Art 463: 461: 361: 163: 929: 901:Security and Communication Networks 282:protocol to overcome this problem. 13: 1407:Building Windows 8 (TechNet Blogs) 1365: 1297: 1233: 1193:"Clonezilla: build, clone, repeat" 957: 329:with modifications to a system or 289: 14: 2052: 1667:Comparison of disc image software 1615:Comparison of disc image software 1443: 985:"IBM Mainframe Operating Systems" 793: 763: 664: 560: 498: 458: 399:Comparison of disc image software 172: 1223:"Create a golden image in Azure" 1191:Bowling, Jeramiah (2011-01-01). 641:A high speed disk imaging system 1425: 1395: 1341: 1215: 1184: 1166: 1134: 1104: 1078: 1035: 1008: 977: 888: 847: 1142:"Virtual CD/DVD-Writer Device" 1021:. Prentice Hall Professional. 720: 631: 589: 349: 254:Network-based image deployment 1: 1018:Integrating Linux and Windows 674:Garfinkel, Simson L. (2009). 451: 302:(for Windows Vista and later) 74: 610:10.1007/978-3-319-67450-6_12 183:one or more virtual machines 7: 1900:Pirated movie release types 1274:10.1109/ACCESS.2021.3052525 1174:"pcguide.com - Access Time" 873:10.1016/j.procs.2015.04.083 409:El Torito (CD-ROM standard) 382: 245:Rapid deployment of systems 209:format used by Microsoft's 10: 2057: 293: 18: 1962: 1939: 1906: 1855: 1849:Disc Description Protocol 1841: 1803: 1735: 1673: 1664: 1612: 1554: 1516: 1493: 1086:"Phantom Burner Overview" 860:Procedia Computer Science 650:10.1109/ISCE.2008.4559553 233:virtual machines, or the 825:10.1177/0955749016669775 482:10.4324/9781003034865-17 2031:Hardware virtualization 947:Electronic Media Review 739:10.1145/2523514.2523576 526:10.1145/1998076.1998088 158: 2036:Optical disc authoring 2016:Computer file formats 1118:. H+H Software GmbH. 1054:10.1109/ETCS.2010.184 1015:McCune, Mike (2000). 686:10.1109/SADFE.2009.12 54:system administration 2021:Disk image emulators 1556:Proprietary software 1381:The Code4Lib Journal 914:10.1155/2018/1681908 476:. pp. 204–222. 337:Digital preservation 58:digital preservation 1265:2021IEEEA...921043S 1227:learn.microsoft.com 1180:on 10 January 2019. 786:10.18260/1-2--14125 148:virtual disk writer 1599:Virtual CloneDrive 1498:Virtual disk image 1326:10.3390/app8060965 1116:Virtual CD website 311:file fragmentation 300:Backup and Restore 219:Oracle Corporation 1988: 1987: 1866: 1865: 1621: 1620: 1433:"Mount-DiskImage" 1092:on 19 August 2011 1063:978-1-4244-6388-6 1028:978-0-13-030670-8 748:978-1-4503-2498-4 705:978-0-7695-3792-4 619:978-3-319-67450-6 545:978-1-4503-0744-4 446:Software cracking 362:Speed and failure 199:solid-state drive 164:Digital forensics 113:Microsoft Windows 105:floppy disk image 46:digital forensics 2048: 1893: 1886: 1879: 1870: 1869: 1648: 1641: 1634: 1625: 1624: 1604:VirtualDrive Pro 1574:DiskImageMounter 1479: 1472: 1465: 1456: 1455: 1437: 1436: 1429: 1423: 1422: 1420: 1418: 1413:on 19 April 2012 1399: 1393: 1392: 1372: 1363: 1362: 1360: 1359: 1345: 1339: 1338: 1328: 1313:Applied Sciences 1304: 1295: 1294: 1276: 1244: 1231: 1230: 1219: 1213: 1212: 1188: 1182: 1181: 1176:. Archived from 1170: 1164: 1163: 1161: 1159: 1150:. Geeknet, Inc. 1138: 1132: 1131: 1129: 1127: 1108: 1102: 1101: 1099: 1097: 1082: 1076: 1075: 1039: 1033: 1032: 1012: 1006: 1005: 1003: 1002: 996: 990:. Archived from 989: 981: 975: 974: 964: 955: 954: 938: 927: 926: 916: 892: 886: 885: 875: 851: 845: 844: 804: 791: 790: 788: 770: 761: 760: 724: 718: 717: 697: 671: 662: 661: 635: 629: 628: 627: 626: 593: 587: 586: 584: 573: 558: 557: 537: 511: 496: 495: 465: 229:format used for 187:Virtual machines 144:Nero Burning ROM 2056: 2055: 2051: 2050: 2049: 2047: 2046: 2045: 2006:Archive formats 1991: 1990: 1989: 1984: 1958: 1935: 1902: 1897: 1867: 1862: 1851: 1837: 1799: 1731: 1669: 1660: 1652: 1622: 1617: 1608: 1550: 1512: 1489: 1483: 1446: 1441: 1440: 1431: 1430: 1426: 1416: 1414: 1401: 1400: 1396: 1373: 1366: 1357: 1355: 1353:www.cs.utah.edu 1347: 1346: 1342: 1305: 1298: 1259:: 21043–21058. 1245: 1234: 1221: 1220: 1216: 1189: 1185: 1172: 1171: 1167: 1157: 1155: 1140: 1139: 1135: 1125: 1123: 1110: 1109: 1105: 1095: 1093: 1084: 1083: 1079: 1064: 1040: 1036: 1029: 1013: 1009: 1000: 998: 994: 987: 983: 982: 978: 965: 958: 939: 930: 893: 889: 852: 848: 805: 794: 771: 764: 749: 725: 721: 706: 672: 665: 636: 632: 624: 622: 620: 594: 590: 582: 574: 561: 546: 512: 499: 492: 466: 459: 454: 385: 364: 352: 339: 331:virtual machine 307:file attributes 303: 292: 290:Backup strategy 256: 247: 237:format used by 217:format used by 203:virtual machine 195:hard disk drive 179:hard disk drive 175: 166: 161: 131:can be used on 129:Apple Disk Copy 121:similar systems 77: 66:raw disk images 50:cloud computing 24: 17: 12: 11: 5: 2054: 2044: 2043: 2038: 2033: 2028: 2026:Hacker culture 2023: 2018: 2013: 2008: 2003: 1986: 1985: 1983: 1982: 1977: 1971: 1969: 1960: 1959: 1957: 1956: 1951: 1945: 1943: 1937: 1936: 1934: 1933: 1931:Workprint (WP) 1928: 1923: 1921:Screener (SCR) 1918: 1912: 1910: 1904: 1903: 1896: 1895: 1888: 1881: 1873: 1864: 1863: 1856: 1853: 1852: 1847: 1845: 1839: 1838: 1836: 1835: 1830: 1825: 1820: 1815: 1809: 1807: 1801: 1800: 1798: 1797: 1792: 1787: 1782: 1777: 1772: 1767: 1762: 1757: 1752: 1747: 1741: 1739: 1733: 1732: 1730: 1729: 1724: 1719: 1714: 1709: 1704: 1699: 1690: 1685: 1679: 1677: 1671: 1670: 1665: 1662: 1661: 1651: 1650: 1643: 1636: 1628: 1619: 1618: 1613: 1610: 1609: 1607: 1606: 1601: 1596: 1591: 1586: 1581: 1576: 1571: 1566: 1560: 1558: 1552: 1551: 1549: 1548: 1543: 1538: 1533: 1528: 1522: 1520: 1514: 1513: 1511: 1510: 1505: 1500: 1494: 1491: 1490: 1482: 1481: 1474: 1467: 1459: 1453: 1452: 1445: 1444:External links 1442: 1439: 1438: 1424: 1394: 1364: 1340: 1296: 1232: 1214: 1183: 1165: 1133: 1103: 1077: 1062: 1034: 1027: 1007: 976: 956: 928: 887: 846: 819:(3): 216–234. 792: 762: 747: 719: 704: 663: 630: 618: 588: 559: 544: 497: 490: 456: 455: 453: 450: 449: 448: 443: 438: 432: 427: 422: 417: 411: 406: 401: 396: 391: 384: 381: 363: 360: 351: 348: 338: 335: 291: 288: 255: 252: 246: 243: 174: 173:Virtualization 171: 165: 162: 160: 157: 152:virtual burner 133:Classic Mac OS 99:floppy disks. 97:copy protected 76: 73: 15: 9: 6: 4: 3: 2: 2053: 2042: 2039: 2037: 2034: 2032: 2029: 2027: 2024: 2022: 2019: 2017: 2014: 2012: 2009: 2007: 2004: 2002: 1999: 1998: 1996: 1981: 1978: 1976: 1973: 1972: 1970: 1968: 1965: 1961: 1955: 1954:Telesync (TS) 1952: 1950: 1947: 1946: 1944: 1942: 1938: 1932: 1929: 1927: 1926:Telecine (TC) 1924: 1922: 1919: 1917: 1914: 1913: 1911: 1909: 1905: 1901: 1894: 1889: 1887: 1882: 1880: 1875: 1874: 1871: 1860: 1859:sidecar files 1854: 1850: 1846: 1844: 1840: 1834: 1831: 1829: 1828:IMG, IMA, IMZ 1826: 1824: 1821: 1819: 1816: 1814: 1811: 1810: 1808: 1806: 1802: 1796: 1793: 1791: 1788: 1786: 1783: 1781: 1778: 1776: 1773: 1771: 1768: 1766: 1763: 1761: 1758: 1756: 1753: 1751: 1748: 1746: 1743: 1742: 1740: 1738: 1734: 1728: 1725: 1723: 1720: 1718: 1715: 1713: 1710: 1708: 1705: 1703: 1700: 1698: 1694: 1691: 1689: 1686: 1684: 1681: 1680: 1678: 1676: 1675:Optical discs 1672: 1668: 1663: 1659: 1656: 1649: 1644: 1642: 1637: 1635: 1630: 1629: 1626: 1616: 1611: 1605: 1602: 1600: 1597: 1595: 1592: 1590: 1587: 1585: 1582: 1580: 1577: 1575: 1572: 1570: 1567: 1565: 1562: 1561: 1559: 1557: 1553: 1547: 1544: 1542: 1539: 1537: 1534: 1532: 1529: 1527: 1524: 1523: 1521: 1519: 1518:Free software 1515: 1509: 1506: 1504: 1501: 1499: 1496: 1495: 1492: 1487: 1486:Virtual drive 1480: 1475: 1473: 1468: 1466: 1461: 1460: 1457: 1451: 1448: 1447: 1434: 1428: 1412: 1408: 1404: 1398: 1390: 1386: 1382: 1378: 1371: 1369: 1354: 1350: 1344: 1336: 1332: 1327: 1322: 1318: 1314: 1310: 1303: 1301: 1292: 1288: 1284: 1280: 1275: 1270: 1266: 1262: 1258: 1254: 1250: 1243: 1241: 1239: 1237: 1228: 1224: 1218: 1210: 1206: 1202: 1198: 1197:Linux Journal 1194: 1187: 1179: 1175: 1169: 1153: 1149: 1148: 1143: 1137: 1121: 1117: 1113: 1107: 1091: 1087: 1081: 1073: 1069: 1065: 1059: 1055: 1051: 1047: 1046: 1038: 1030: 1024: 1020: 1019: 1011: 997:on 2014-07-01 993: 986: 980: 972: 971: 963: 961: 952: 948: 944: 937: 935: 933: 924: 920: 915: 910: 906: 902: 898: 891: 883: 879: 874: 869: 865: 861: 857: 850: 842: 838: 834: 830: 826: 822: 818: 814: 810: 803: 801: 799: 797: 787: 782: 778: 777: 769: 767: 758: 754: 750: 744: 740: 736: 732: 731: 723: 715: 711: 707: 701: 696: 691: 687: 683: 679: 678: 670: 668: 659: 655: 651: 647: 643: 642: 634: 621: 615: 611: 607: 603: 599: 592: 581: 580: 572: 570: 568: 566: 564: 555: 551: 547: 541: 536: 531: 527: 523: 519: 518: 510: 508: 506: 504: 502: 493: 491:9781003034865 487: 483: 479: 475: 471: 464: 462: 457: 447: 444: 442: 439: 436: 433: 431: 428: 426: 423: 421: 418: 415: 412: 410: 407: 405: 402: 400: 397: 395: 392: 390: 387: 386: 380: 378: 374: 373:data recovery 370: 359: 355: 347: 344: 334: 332: 328: 327:experimenting 324: 320: 316: 315:optical media 312: 308: 301: 297: 287: 283: 281: 277: 273: 269: 265: 261: 251: 242: 240: 236: 232: 228: 224: 220: 216: 212: 208: 204: 200: 196: 192: 188: 184: 180: 170: 156: 153: 149: 145: 140: 138: 134: 130: 126: 122: 118: 114: 110: 106: 100: 98: 94: 93:magnetic tape 90: 86: 82: 72: 69: 67: 63: 59: 55: 51: 47: 42: 40: 39:deduplication 36: 31: 29: 22: 1974: 1805:Floppy disks 1658:file formats 1654: 1579:Disk Utility 1569:Daemon Tools 1564:Alcohol 120% 1435:. Microsoft. 1427: 1415:. Retrieved 1411:the original 1406: 1397: 1380: 1356:. Retrieved 1352: 1343: 1316: 1312: 1256: 1252: 1226: 1217: 1203:(201): 6:6. 1200: 1196: 1186: 1178:the original 1168: 1156:. Retrieved 1145: 1136: 1124:. Retrieved 1115: 1106: 1094:. Retrieved 1090:the original 1080: 1044: 1037: 1017: 1010: 999:. Retrieved 992:the original 979: 969: 950: 946: 907:: e1681908. 904: 900: 890: 863: 859: 849: 816: 812: 775: 729: 722: 676: 640: 633: 623:, retrieved 601: 598:"Vocabulary" 591: 578: 516: 473: 404:Disk cloning 365: 356: 353: 340: 304: 296:System image 284: 272:broadcasting 268:Multicasting 257: 248: 176: 167: 151: 147: 141: 101: 85:disk cloning 78: 70: 43: 32: 27: 25: 2001:Disk images 1908:Pre-release 1589:Roxio Toast 1253:IEEE Access 1147:SourceForge 866:: 554–559. 695:10945/44249 535:10945/44252 430:no-CD crack 420:Loop device 350:Limitations 35:Compression 1995:Categories 1975:Disk image 1964:Home video 1818:DC42, DART 1737:Hard disks 1655:Disk image 1526:AcetoneISO 1358:2023-01-12 1319:(6): 965. 1001:2014-06-17 625:2023-01-12 452:References 394:Card image 389:Boot image 298: and 294:See also: 280:BitTorrent 276:unicasting 223:VirtualBox 107:files for 75:Background 62:ISO images 28:disk image 1941:In-cinema 1389:1940-5758 1335:2076-3417 1291:231851821 1283:2169-3536 1209:1075-3583 923:1939-0114 882:1877-0509 833:0955-7490 441:ROM image 437:(PARTIES) 414:ISO image 343:Emulators 191:ISO image 89:megabytes 21:ISO image 1813:ADF, ADZ 1594:UltraISO 1584:MagicISO 1546:WinCDEmu 1503:RAM disk 1488:software 1417:27 April 1152:Archived 1120:Archived 1072:15706012 841:63617004 383:See also 377:ddrescue 309:and the 1967:ripping 1712:MDF+MDS 1697:CCD+SUB 1683:BIN+CUE 1261:Bibcode 1158:19 July 1126:19 July 1096:19 July 757:2474546 714:1624033 658:5932241 554:2628912 358:space. 211:Hyper-V 1387:  1383:(27). 1333:  1289:  1281:  1207:  1070:  1060:  1025:  921:  880:  839:  831:  755:  745:  712:  702:  656:  616:  552:  542:  488:  425:Mtools 231:VMware 225:, the 213:, the 109:MS-DOS 81:backup 2041:Warez 1843:CD-DA 1541:mount 1531:CDemu 1508:Mount 1287:S2CID 1068:S2CID 995:(PDF) 988:(PDF) 837:S2CID 753:S2CID 710:S2CID 654:S2CID 583:(PDF) 550:S2CID 201:in a 137:macOS 115:. In 1980:PDTV 1790:VMDK 1775:UDIF 1770:QCOW 1765:NDIF 1419:2012 1385:ISSN 1331:ISSN 1279:ISSN 1205:ISSN 1201:2011 1160:2011 1128:2011 1098:2011 1058:ISBN 1023:ISBN 919:ISSN 905:2018 878:ISSN 829:ISSN 743:ISBN 700:ISBN 614:ISBN 540:ISBN 486:ISBN 323:DVDs 321:and 264:DHCP 239:QEMU 235:QCOW 227:VMDK 159:Uses 135:and 123:the 117:Unix 111:and 83:and 37:and 1949:Cam 1833:VFD 1823:DMS 1795:WIM 1785:VHD 1780:VDI 1760:ISO 1755:IMG 1750:FVD 1745:DMG 1727:UIF 1722:NRG 1717:MDX 1707:ISZ 1702:ISO 1693:IMG 1688:DAA 1536:K3b 1321:doi 1269:doi 1050:doi 909:doi 868:doi 821:doi 781:doi 735:doi 690:hdl 682:doi 646:doi 606:doi 530:hdl 522:doi 478:doi 379:). 319:CDs 274:or 260:PXE 221:'s 215:VDI 207:VHD 197:or 150:or 119:or 1997:: 1916:R5 1405:. 1379:. 1367:^ 1351:. 1329:. 1315:. 1311:. 1299:^ 1285:. 1277:. 1267:. 1255:. 1251:. 1235:^ 1225:. 1199:. 1195:. 1144:. 1114:. 1066:. 1056:. 959:^ 949:. 945:. 931:^ 917:. 903:. 899:. 876:. 864:50 858:. 835:. 827:. 817:26 815:. 811:. 795:^ 765:^ 751:. 741:. 708:. 698:. 688:. 666:^ 652:. 612:, 600:, 562:^ 548:. 538:. 528:. 500:^ 484:. 472:. 460:^ 369:dd 270:, 185:. 125:dd 52:, 48:, 26:A 1892:e 1885:t 1878:v 1861:. 1695:+ 1647:e 1640:t 1633:v 1478:e 1471:t 1464:v 1421:. 1391:. 1361:. 1337:. 1323:: 1317:8 1293:. 1271:: 1263:: 1257:9 1229:. 1211:. 1162:. 1130:. 1100:. 1074:. 1052:: 1031:. 1004:. 973:. 953:. 951:6 925:. 911:: 884:. 870:: 843:. 823:: 789:. 783:: 759:. 737:: 716:. 692:: 684:: 660:. 648:: 608:: 556:. 532:: 524:: 494:. 480:: 317:( 23:.

Index

ISO image
Compression
deduplication
digital forensics
cloud computing
system administration
digital preservation
ISO images
raw disk images
backup
disk cloning
megabytes
magnetic tape
copy protected
floppy disk image
MS-DOS
Microsoft Windows
Unix
similar systems
dd
Apple Disk Copy
Classic Mac OS
macOS
Nero Burning ROM
hard disk drive
one or more virtual machines
Virtual machines
ISO image
hard disk drive
solid-state drive

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑