- A -
Apple CoreStorage/FileVault/Fusion Drive Volumes
- B -
Bad Sectors settings
Set default read retries count for all drives
Binary (byte to byte copy)
BitLocker System Drive Encryption
Broken File Name
Rename and change all invalid symbols to:
Broken File Name options
Button
Buttons
Create virtual volume sets or RAIDs
- C -
Connect to R-Studio settings
Allow connection from any address
Allow connection from the host
Connecting to DeepSpar Disk Imager™ manually
Contact information and technical support
Create menu
Create Virtual Block RAID & Autodetect
Creating and saving your own RAID configuration
Creating Startup Disks for Mac and Linux Computers
- D -
Data Copy in Text/hexadecimal editor
Data Recovery on HFS/HFS+ File System
Connect to the remote computer
Description Files for RAID Configuration
Devices to Store Recovered Files
Dialog box
Dialog boxes
Edit Block RAID Layout Presets
Please configure R-Studio Agent for Mac
Please configure R-Studio Agent for Windows
R-Studio Agent for Linux Configuration
There is not enough space on the disk
Drive menu
- E -
Edit menu
Find Template Signature Previous
Editor tabs
Exclusive Region options
- F -
Fast Search for Lost Partitions
File Already Exists
File Information (R-Studio Technician/T80+)
File mask options
File menu
File Systems settings
Default encoding for Ext2/Ext3/Ext4/UFS volumes
Default encoding for HFS volumes
File Type Signature Specification
File Types
Find options
Find/mark objects only in real paths, ignore links to folders
Find/Mark options
Finding Previous File Versions
Forensic Data Collection Audit Log
- H -
Help menu
Hidden Attribute
- I -
Image options
Image type:
Byte to byte image to a physical disk
Compressed image (R-Drive Image compatible)
VMDK (VmWare Virtual Machine Disk)
- K -
Known File Types settings
- L -
Log settings
Maximum messages in the Event Log
- M -
Main settings
Reset all hidden notifications
Limit usage of the process memory by
Messages
Double-click a logical disk...
Mount options
Mounting Virtual Objects in the System
- N -
Nested and Non-Standard RAID Levels
- O -
Opening several disks/partitions in one tab
- P -
Panels
Panes
Portable version of R-Studio Technician
Properties tab
- Q -
- R -
Recover options
Condense successful restoration events:
Do not recover duplicate files from Extra Found Files
Open local folder (folders) when done
Recover alternative data streams:
Recover real folders structure
Recovered only masked marked files
Region options
Contact information and technical support
Installing R-Studio Agent Emergency Startup Media Creator
Starting a Computer with the R-Studio Agent Emergency Startup Disk
R-Studio Agent for Mac main panel
R-Studio Agent for Windows main panel
Contact Informaiton and Technical Support
Installing R-Studio Emergency Startup Media Creator
Properties and Text/Hexadecimal Viewer
Starting a Computer with the R-Studio Emergency Startup Disks
R-Studio Emergency Startup Media Creator
- S -
Scan options
Search options
Settings
Shortcut menu
Find Previous Versions of the File
Find Template Signature Previous
Remove All Scanned Information
Smart drive copy
Copy all partitions onto original places
Expand/Shrink partition to whole drive
Smart partition copy
Startup Media Troubleshooting Options
Don't show symbolic links by default (Technician version)
Recovery as it is (Technician version)
Show folder symbolic links as links to their targets, without target content (Technician version)
Symbolic links display settings
Symbolic links recovery options
Syntaxis of a Description File for RAID Configurations
- T -
Tabs
Technical Information and Troubleshooting
Tools menu
- U -
- V -
View menu
Virtual Disk Formats
Volume Sets, Stripe Sets, and Mirrors
- W -
Window
Working with RAID 6 Presets
Disk objects can be wiped in order to completely destroy its data.
Supported Wipe Algorithms
File wiping is necessary only for files stored on conventional hard drives. Files stored on new SSD storage devices cannot be effectively wiped out due to the principles of operation of these devices.
Currently R‑Studio supports 6 wiping algorithms:
Zeroes |
The disk object or file is filled with zeroes through 1 pass. The fastest but the least secure algorithm. Also it does not conceal the fact that the disk or file has been wiped. |
Pseudo-random numbers |
The disk object or file is filled with pseudo-random numbers through 1 pass. A slower but little bit more secure algorithm than the Zeroes algorithm and it also conceals to some degree the fact that the disk or file has been wiped. |
DoD 5220.22-M(3) |
The disk object or file is wiped using Department of Defense standard 5220.22-M(3). Provides high-grade data wiping filling the unused space or file with a special digital pattern through 3 passes This algorithm is very secure, but slow. |
DoD 5200.28-STD(7) |
The disk object or file is wiped using Department of Defense standard 5200.28-STD(7). Provides high-grade data wiping filling the unused space or file with a special digital pattern through 7 passes. This algorithm is very secure, but very slow. |
Bruce Schneier(7) |
The disk object or file is wiped using the Bruce Schneier(7) algorithm. The first pass overwrites the drive with the bit pattern "00", the second with "11", and the next five with a randomly generated bit pattern. This algorithm is very secure, but very slow. |
Peter Gutmann (35) |
The disk object or file is wiped using the Peter Gutmann's algorithm . Provides high-grade data wiping filling the unused space or file with a special digital pattern through 35 passes. This algorithm is military-level secure, but horribly slow. |
What algorithm is to choose, depends on your specific needs. All of these wiping algorithms make recovery of wiped data with any software-based data recover utility impossible. So if you want to protect your information from a casual snooper, you may safely choose either the Zeroes or Pseudo-random numbers algorithm. The latter also conceals the fact that you wiped the data.
If you want more security , you need to know the following:
There are some techniques for recovery of wiped data. These techniques are based on the fact that magnetic medium on the hard drive's platters "store" some information about previously written data. Such information cannot be completely removed. Wiped data may be recovered even from mechanically damaged platters. So the only safe way to completely remove data from a hard drive is to mechanically grind the magnetic medium off the drive platters or dissolve them in special chemical solvents.
But in order to recover the wiped data using one of these techniques, a hard drive must be disassembled, its platters placed in a precise magnetic field measurement system, and the results of such measurement statistically processed. All that is very expensive and requires a very qualified and experienced personnel and a specially developed equipment. Only a very advanced organization such as a law enforcement or intelligence agency of a developed nation, or a special high-tech firm can afford this. Moreover, each successive wiping pass makes such data recovery much and much harder. So, the DoD 5220.22-M(3) clearing and sanitizing standard overwriting the data with a special pattern through 3 passes is a rather reliable and safe choice for this case.
If you need the ultimate security, use the DoD 5220.22-M(7) clearing and sanitizing standard, the Bruce Schneier(7) , or even the Peter Gutmann (35 ) wiping algorithms. They render data almost unrecoverable, but they are extremely slow.
Wiping Disk Objects:
To wipe a disk object,
1 | Right-click the disk object in the Device view pane and select Wipe... |
> | The Wipe an object dialog box will appear. |
2 | Select the desired wiping algorithms and click the OK button. |
You may wipe only unused space on the object.
> | R‑Studio will start wiping the object. |