260:
Educational institutions and businesses can often need to buy or replace computer systems in large numbers. Disk imaging is commonly used to rapidly deploy the same configuration across workstations. Disk imaging software is used to create an image of a completely-configured system (such an image is
356:
frequently use disk images to emulate floppy disks that have been preserved. This is usually simpler to program than accessing a real floppy drive (particularly if the disks are in a format not supported by the host operating system), and allows a large library of software to be managed. Emulation
179:
Forensic imaging is the process of creating a bit-by-bit copy of the data on the drive, including files, metadata, volume information, filesystems and their structure. Often, these images are also hashed to verify their integrity and that they have not been altered since being created. Unlike disk
377:
Disk imaging can be slow, especially for older storage devices. A typical 4.7 GB DVD can take an average of 18 minutes to duplicate. Floppy disks read and write much slower than hard disks. Therefore, despite their small size, it can take several minutes to copy a single disk. In some cases, disk
368:
Other limitations can be the lack of access to software required to read the contents of the image. For example, prior to
Windows 8, third party software was required to mount disk images. When imaging multiple computers with only minor differences, much data is duplicated unnecessarily, wasting
113:
Disk image creation is called disk imaging and is often time consuming, even with a fast computer, because the entire disk must be copied. Typically, disk imaging requires a third party disk imaging program or backup software. The software required varies according to the type of disk image that
165:
is a computer program that emulates an actual disc authoring device such as a CD writer or DVD writer. Instead of writing data to an actual disc, it creates a virtual disk image. A virtual burner, by definition, appears as a disc drive in the system with writing capabilities (as opposed to
180:
imaging for other purposes, digital forensic applications take a bit-by-bit copy to ensure forensic soundness. The purposes of imaging the disk is to not only discover evidence preserved in digital information but also to examine the drive to gather clues of how the crime was committed.
296:
Network-based image deployment reduces the need to maintain and update individual systems manually. Imaging is also easier than automated setup methods because an administrator does not need to have knowledge of the prior configuration to copy it.
106:, which ran as large as 200 megabytes per reel. Disk images became much more popular when floppy disk media became popular, where replication or storage of an exact structure was necessary and efficient, especially in the case of
480:
252:). Virtual hard disk images tend to be stored as either a collection of files (where each one is typically 2GB in size), or as a single file. Virtual machines treat the image set as a physical drive.
44:
Traditionally, disk images were bit-by-bit copies of every sector on a hard disk often created for digital forensic purposes, but it is now common to only copy allocated data to reduce storage space.
289:
tend to be used to restore an image to many computers simultaneously. These approaches do not work well if one or more computers experience packet loss. As a result, some imaging solutions use the
273:
server to boot an operating system over a computer network that contains the necessary components to image or restore storage media in a computer. This is usually used in conjunction with a
1868:
Convention: Any item in this table that has the form of "A+B" or "A+B+C" indicates a disk format that spans multiple files, where A contains the bulk of the data, and B and C are
445:
365:
Disk imaging is time consuming, the space requirements are high and reading from them can be slower than reading from the disk directly because of a performance overhead.
71:
strategy. Disk images can be made in a variety of formats depending on the purpose. Virtual disk images (such as VHD and VMDK) are intended to be used for cloud computing,
1487:
531:. Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries. New York, NY, USA: Association for Computing Machinery. pp. 57–66.
744:. Proceedings of the 6th International Conference on Security of Information and Networks. New York, NY, USA: Association for Computing Machinery. pp. 425–428.
1413:
2021:
357:
also allows existing disk images to be put into a usable form even though the data contained in the image is no longer readable without emulation.
166:
conventional disc authoring programs that can create virtual disk images), thus allowing software that can burn discs to create virtual discs.
261:
sometimes called a golden image). This image is then written to a computer's hard disk (which is sometimes described as restoring an image).
1901:
1656:
1072:
1037:
757:
714:
628:
554:
1480:
82:
Despite the benefits of disk imaging the storage costs can be high, management can be difficult and they can be time consuming to create.
1130:
274:
1677:
1625:
500:
409:
41:
is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device.
2041:
2046:
1473:
352:
Libraries and museums are typically required to archive and digitally preserve information without altering it in any manner.
204:. This can also be faster than reading from the physical optical medium. Further, there are less issues with wear and tear. A
2026:
1184:
337:
1096:
1162:
2031:
270:
1421:
1910:
1785:
588:
419:
995:
818:
Day, Michael; Pennock, Maureen; May, Peter; Davies, Kevin; Whibley, Simon; Kimura, Akiko; Halvarsson, Edith (2016).
691:. 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering. pp. 73–84.
344:. Typically, disk imaging can be used to quickly restore an entire system to an operational state after a disaster.
1853:
1059:. 2010 Second International Workshop on Education Technology and Computer Science. Vol. 1. pp. 405–408.
1894:
1859:
1649:
953:
282:
2016:
1443:
1233:
1258:
Shiau, Steven J. H.; Huang, Yu-Chiang; Tsai, Yu-Chin; Sun, Chen-Kai; Yen, Ching-Hsuan; Huang, Chi-Yo (2021).
2036:
378:
imaging can fail due to bad sectors or physical wear and tear on the source device. Unix utilities (such as
1027:
1931:
1805:
1775:
1722:
1698:
1693:
1359:
1614:
2011:
1887:
1707:
1642:
1566:
1271:
68:
64:
820:"The preservation of disk-based content at the British Library: Lessons from the Flashback project"
785:
79:
are used for forensic purposes. Proprietary formats are typically used by disk imaging software.
1936:
1833:
1770:
1712:
1609:
1508:
1297:
1078:
847:
763:
720:
664:
615:, SpringerBriefs in Computer Science, Cham: Springer International Publishing, pp. 125–126,
560:
321:
310:
229:
49:
382:) are not designed to cope with failures, causing the disk image creation process to fail. When
1843:
1838:
1795:
1765:
1760:
1732:
1703:
1518:
1395:
1341:
1289:
1215:
1122:
1068:
1033:
929:
888:
839:
753:
710:
624:
550:
496:
456:
225:
217:
209:
123:
115:
76:
56:
1755:
1599:
1584:
1331:
1279:
1060:
919:
878:
831:
791:
745:
700:
692:
656:
616:
540:
532:
488:
154:
45:
908:"Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures"
819:
790:. 2004 American Society for Engineering Education Annual Conference. Salt Lake City, Utah.
1823:
1747:
341:
213:
205:
197:
189:
139:
60:
1318:
Shiau, Steven J. H.; Sun, Chen-Kai; Tsai, Yu-Chin; Juang, Jer-Nan; Huang, Chi-Yo (2018).
1275:
979:
528:
Extending digital repository architectures to support disk image preservation and access
2051:
1918:
317:
269:
Image restoration can be done using network-based image deployment. This method uses a
193:
143:
107:
1100:
2005:
1959:
1574:
1528:
1301:
383:
325:
103:
1082:
851:
824:
Alexandria: The
Journal of National and International Library and Information Issues
1926:
1869:
1727:
1685:
1589:
1579:
1551:
767:
724:
668:
564:
414:
306:
277:
server to automate the configuration of network parameters including IP addresses.
95:
1188:
386:
is the end goal, it is instead recommended to use more specialised tools (such as
1388:"Digital forensics on a shoestring: a case study from the University of Victoria"
1203:
620:
587:
Pullakandam, R.; Lin, X.; Hibler, M.; Eide, E.; Ricci, R. (October 23–26, 2011).
1815:
1668:
1320:"The Design and Implementation of a Novel Open Source Massive Deployment System"
1284:
1259:
1157:
1152:
883:
866:
440:
430:
1054:
686:
650:
608:
1974:
1951:
1879:
1790:
1536:
1460:
1387:
660:
404:
399:
290:
233:
1399:
1345:
1293:
1219:
933:
892:
843:
835:
492:
1941:
1828:
749:
536:
451:
424:
379:
278:
201:
135:
131:
72:
31:
924:
907:
655:. 2008 IEEE International Symposium on Consumer Electronics. pp. 1–3.
479:
Colloton, Eddy; Farbowitz, Jonathan; Rodríguez, Caroline Gil (2022-11-02).
1634:
1064:
1002:
739:
696:
526:
17:
1964:
1737:
1717:
1604:
1594:
1556:
1513:
1465:
1056:
Construction of the
Practical Teaching System on Operating Systems Course
981:
Need for speed : A study of the speed of forensic disk imaging tools
867:"A Novel Approach to Address Interoperability Concern in Cloud Computing"
387:
353:
99:
954:"Towards Best Practices In Disk Imaging: A Cross-Institutional Approach"
796:
596:. 23rd ACM Symposium on Operating Systems Principles. Cascais, Portugal.
1977:
1336:
1319:
705:
545:
286:
221:
1260:"A BitTorrent Mechanism-Based Solution for Massive System Deployment"
738:
Kazim, Muhammad; Masood, Rahat; Shibli, Muhammad Awais (2013-11-26).
435:
241:
119:
91:
27:
Computer file containing the contents and structure of a disk volume
1541:
1496:
688:
Automating Disk
Forensic Processing with SleuthKit, XML and Python
147:
67:, as part of a backup strategy, and legacy emulation as part of a
525:
Woods, Kam; Lee, Christopher A.; Garfinkel, Simson (2011-06-13).
1990:
1800:
1780:
613:
Guide to
Digital Forensics: A Concise and Practical Introduction
249:
245:
237:
127:
1883:
1638:
1469:
114:
needs to be created. For example, RawWrite and WinImage create
1546:
1053:
Li, Hongwei; Yin, Changhong; Xu, Yaping; Guo, Qingjun (2010).
333:
52:
are commonly used to reduce the size of the image file set.
952:
Colloton, E.; Farbowitz, J.; Fortunato, F.; Gil, C. (2019).
865:
Arunkumar, G.; Venkataraman., Neelanarayanan (2015-01-01).
336:, etc.), and allows the exact and efficient recovery after
329:
90:
Disk images were originally (in the late 1960s) used for
55:
Disk imaging is done for a variety of purposes including
30:"CD image" redirects here. For ISO 9660 image files, see
324:
state). For this reason, it is also used for backing up
906:
Barrowclough, John
Patrick; Asif, Rameez (2018-06-11).
590:
High-performance Disk
Imaging With Deduplicated Storage
157:
can generate and load disk images for optical media. A
102:
and as large as 330 megabytes, and the copy medium was
98:
of mainframe disk media. Early ones were as small as 5
741:
Securing the virtual machine images in cloud computing
446:
Protected Area Run Time
Interface Extension Services
188:
Creating a virtual disk image of optical media or a
1973:
1950:
1917:
1852:
1814:
1746:
1684:
1565:
1527:
649:Lee, Sang Su; Kyong, Un Sung; Hong, Do Won (2008).
607:Kävrestad, Joakim (2017), Kävrestad, Joakim (ed.),
481:"Disk Imaging as a Backup Tool for Digital Objects"
192:is typically done to make the content available to
784:Blackham, N.; Higby, C.; Bailey, M. (June 2004).
316:A disk image contains all files and data (i.e.,
216:is implemented as a disk image (i.e. either the
138:program can be used to create raw disk images.
150:systems to create and write disk image files.
1895:
1650:
1481:
1386:Durno, John; Trofimchuk, Jerry (2015-01-21).
8:
873:. Big Data, Cloud and Computing Challenges.
427:, an archive file of an optical media volume
1420:. Microsoft. 30 August 2011. Archived from
1902:
1888:
1880:
1657:
1643:
1635:
1488:
1474:
1466:
1360:"Fast, Scalable Disk Imaging with Frisbee"
787:Re-Imaging Computers For Multipurpose Labs
75:are intended to emulate optical media and
1335:
1283:
923:
882:
795:
704:
544:
978:Stewart, Dawid; Arvidsson, Alex (2022).
153:Authoring software for CDs/DVDs such as
1123:"Virtual CD - The original for your PC"
468:
1461:Software repository including RAWRITE2
1133:from the original on 24 September 2011
947:
945:
943:
1414:"Accessing data in ISO and VHD files"
1381:
1379:
1313:
1311:
1253:
1251:
1249:
1247:
1165:from the original on 17 February 2011
973:
971:
200:emulate a CD/DVD drive by reading an
7:
2022:Compact Disc and DVD copy protection
1099:. Phantombility, Inc. Archived from
813:
811:
809:
807:
779:
777:
680:
678:
582:
580:
578:
576:
574:
520:
518:
516:
514:
512:
485:Conservation of Time-Based Media Art
474:
472:
912:Security and Communication Networks
293:protocol to overcome this problem.
1418:Building Windows 8 (TechNet Blogs)
1204:"Clonezilla: build, clone, repeat"
340:with modifications to a system or
25:
1678:Comparison of disc image software
1626:Comparison of disc image software
996:"IBM Mainframe Operating Systems"
410:Comparison of disc image software
1234:"Create a golden image in Azure"
1202:Bowling, Jeramiah (2011-01-01).
652:A high speed disk imaging system
1153:"Virtual CD/DVD-Writer Device"
1032:. Prentice Hall Professional.
265:Network-based image deployment
1:
1029:Integrating Linux and Windows
685:Garfinkel, Simson L. (2009).
313:(for Windows Vista and later)
621:10.1007/978-3-319-67450-6_12
194:one or more virtual machines
1911:Pirated movie release types
1285:10.1109/ACCESS.2021.3052525
1185:"pcguide.com - Access Time"
884:10.1016/j.procs.2015.04.083
420:El Torito (CD-ROM standard)
256:Rapid deployment of systems
220:format used by Microsoft's
2068:
304:
29:
1866:
1860:Disc Description Protocol
1675:
1623:
1504:
1097:"Phantom Burner Overview"
871:Procedia Computer Science
661:10.1109/ISCE.2008.4559553
244:virtual machines, or the
836:10.1177/0955749016669775
493:10.4324/9781003034865-17
2042:Hardware virtualization
958:Electronic Media Review
750:10.1145/2523514.2523576
537:10.1145/1998076.1998088
2047:Optical disc authoring
2027:Computer file formats
1129:. H+H Software GmbH.
1065:10.1109/ETCS.2010.184
1026:McCune, Mike (2000).
697:10.1109/SADFE.2009.12
65:system administration
2032:Disk image emulators
1567:Proprietary software
1392:The Code4Lib Journal
925:10.1155/2018/1681908
487:. pp. 204–222.
348:Digital preservation
69:digital preservation
1276:2021IEEEA...921043S
1238:learn.microsoft.com
1191:on 10 January 2019.
797:10.18260/1-2--14125
159:virtual disk writer
1610:Virtual CloneDrive
1509:Virtual disk image
1337:10.3390/app8060965
1127:Virtual CD website
322:file fragmentation
311:Backup and Restore
230:Oracle Corporation
1999:
1998:
1877:
1876:
1632:
1631:
1444:"Mount-DiskImage"
1103:on 19 August 2011
1074:978-1-4244-6388-6
1039:978-0-13-030670-8
759:978-1-4503-2498-4
716:978-0-7695-3792-4
630:978-3-319-67450-6
556:978-1-4503-0744-4
457:Software cracking
373:Speed and failure
210:solid-state drive
175:Digital forensics
124:Microsoft Windows
116:floppy disk image
57:digital forensics
16:(Redirected from
2059:
1904:
1897:
1890:
1881:
1659:
1652:
1645:
1636:
1615:VirtualDrive Pro
1585:DiskImageMounter
1490:
1483:
1476:
1467:
1448:
1447:
1440:
1434:
1433:
1431:
1429:
1424:on 19 April 2012
1410:
1404:
1403:
1383:
1374:
1373:
1371:
1370:
1356:
1350:
1349:
1339:
1324:Applied Sciences
1315:
1306:
1305:
1287:
1255:
1242:
1241:
1230:
1224:
1223:
1199:
1193:
1192:
1187:. Archived from
1181:
1175:
1174:
1172:
1170:
1161:. Geeknet, Inc.
1149:
1143:
1142:
1140:
1138:
1119:
1113:
1112:
1110:
1108:
1093:
1087:
1086:
1050:
1044:
1043:
1023:
1017:
1016:
1014:
1013:
1007:
1001:. Archived from
1000:
992:
986:
985:
975:
966:
965:
949:
938:
937:
927:
903:
897:
896:
886:
862:
856:
855:
815:
802:
801:
799:
781:
772:
771:
735:
729:
728:
708:
682:
673:
672:
646:
640:
639:
638:
637:
604:
598:
597:
595:
584:
569:
568:
548:
522:
507:
506:
476:
240:format used for
198:Virtual machines
155:Nero Burning ROM
21:
2067:
2066:
2062:
2061:
2060:
2058:
2057:
2056:
2017:Archive formats
2002:
2001:
2000:
1995:
1969:
1946:
1913:
1908:
1878:
1873:
1862:
1848:
1810:
1742:
1680:
1671:
1663:
1633:
1628:
1619:
1561:
1523:
1500:
1494:
1457:
1452:
1451:
1442:
1441:
1437:
1427:
1425:
1412:
1411:
1407:
1385:
1384:
1377:
1368:
1366:
1364:www.cs.utah.edu
1358:
1357:
1353:
1317:
1316:
1309:
1270:: 21043–21058.
1257:
1256:
1245:
1232:
1231:
1227:
1201:
1200:
1196:
1183:
1182:
1178:
1168:
1166:
1151:
1150:
1146:
1136:
1134:
1121:
1120:
1116:
1106:
1104:
1095:
1094:
1090:
1075:
1052:
1051:
1047:
1040:
1025:
1024:
1020:
1011:
1009:
1005:
998:
994:
993:
989:
977:
976:
969:
951:
950:
941:
905:
904:
900:
864:
863:
859:
817:
816:
805:
783:
782:
775:
760:
737:
736:
732:
717:
684:
683:
676:
648:
647:
643:
635:
633:
631:
606:
605:
601:
593:
586:
585:
572:
557:
524:
523:
510:
503:
478:
477:
470:
465:
396:
375:
363:
350:
342:virtual machine
318:file attributes
314:
303:
301:Backup strategy
267:
258:
248:format used by
228:format used by
214:virtual machine
206:hard disk drive
190:hard disk drive
186:
177:
172:
142:can be used on
140:Apple Disk Copy
132:similar systems
88:
77:raw disk images
61:cloud computing
35:
28:
23:
22:
15:
12:
11:
5:
2065:
2063:
2055:
2054:
2049:
2044:
2039:
2037:Hacker culture
2034:
2029:
2024:
2019:
2014:
2004:
2003:
1997:
1996:
1994:
1993:
1988:
1982:
1980:
1971:
1970:
1968:
1967:
1962:
1956:
1954:
1948:
1947:
1945:
1944:
1942:Workprint (WP)
1939:
1934:
1932:Screener (SCR)
1929:
1923:
1921:
1915:
1914:
1909:
1907:
1906:
1899:
1892:
1884:
1875:
1874:
1867:
1864:
1863:
1858:
1856:
1850:
1849:
1847:
1846:
1841:
1836:
1831:
1826:
1820:
1818:
1812:
1811:
1809:
1808:
1803:
1798:
1793:
1788:
1783:
1778:
1773:
1768:
1763:
1758:
1752:
1750:
1744:
1743:
1741:
1740:
1735:
1730:
1725:
1720:
1715:
1710:
1701:
1696:
1690:
1688:
1682:
1681:
1676:
1673:
1672:
1664:
1662:
1661:
1654:
1647:
1639:
1630:
1629:
1624:
1621:
1620:
1618:
1617:
1612:
1607:
1602:
1597:
1592:
1587:
1582:
1577:
1571:
1569:
1563:
1562:
1560:
1559:
1554:
1549:
1544:
1539:
1533:
1531:
1525:
1524:
1522:
1521:
1516:
1511:
1505:
1502:
1501:
1495:
1493:
1492:
1485:
1478:
1470:
1464:
1463:
1456:
1455:External links
1453:
1450:
1449:
1435:
1405:
1375:
1351:
1307:
1243:
1225:
1194:
1176:
1144:
1114:
1088:
1073:
1045:
1038:
1018:
987:
967:
939:
898:
857:
830:(3): 216–234.
803:
773:
758:
730:
715:
674:
641:
629:
599:
570:
555:
508:
501:
467:
466:
464:
461:
460:
459:
454:
449:
443:
438:
433:
428:
422:
417:
412:
407:
402:
395:
392:
374:
371:
362:
359:
349:
346:
302:
299:
266:
263:
257:
254:
185:
184:Virtualization
182:
176:
173:
171:
168:
163:virtual burner
144:Classic Mac OS
110:floppy disks.
108:copy protected
87:
84:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2064:
2053:
2050:
2048:
2045:
2043:
2040:
2038:
2035:
2033:
2030:
2028:
2025:
2023:
2020:
2018:
2015:
2013:
2010:
2009:
2007:
1992:
1989:
1987:
1984:
1983:
1981:
1979:
1976:
1972:
1966:
1965:Telesync (TS)
1963:
1961:
1958:
1957:
1955:
1953:
1949:
1943:
1940:
1938:
1937:Telecine (TC)
1935:
1933:
1930:
1928:
1925:
1924:
1922:
1920:
1916:
1912:
1905:
1900:
1898:
1893:
1891:
1886:
1885:
1882:
1871:
1870:sidecar files
1865:
1861:
1857:
1855:
1851:
1845:
1842:
1840:
1839:IMG, IMA, IMZ
1837:
1835:
1832:
1830:
1827:
1825:
1822:
1821:
1819:
1817:
1813:
1807:
1804:
1802:
1799:
1797:
1794:
1792:
1789:
1787:
1784:
1782:
1779:
1777:
1774:
1772:
1769:
1767:
1764:
1762:
1759:
1757:
1754:
1753:
1751:
1749:
1745:
1739:
1736:
1734:
1731:
1729:
1726:
1724:
1721:
1719:
1716:
1714:
1711:
1709:
1705:
1702:
1700:
1697:
1695:
1692:
1691:
1689:
1687:
1686:Optical discs
1683:
1679:
1674:
1670:
1667:
1660:
1655:
1653:
1648:
1646:
1641:
1640:
1637:
1627:
1622:
1616:
1613:
1611:
1608:
1606:
1603:
1601:
1598:
1596:
1593:
1591:
1588:
1586:
1583:
1581:
1578:
1576:
1573:
1572:
1570:
1568:
1564:
1558:
1555:
1553:
1550:
1548:
1545:
1543:
1540:
1538:
1535:
1534:
1532:
1530:
1529:Free software
1526:
1520:
1517:
1515:
1512:
1510:
1507:
1506:
1503:
1498:
1497:Virtual drive
1491:
1486:
1484:
1479:
1477:
1472:
1471:
1468:
1462:
1459:
1458:
1454:
1445:
1439:
1436:
1423:
1419:
1415:
1409:
1406:
1401:
1397:
1393:
1389:
1382:
1380:
1376:
1365:
1361:
1355:
1352:
1347:
1343:
1338:
1333:
1329:
1325:
1321:
1314:
1312:
1308:
1303:
1299:
1295:
1291:
1286:
1281:
1277:
1273:
1269:
1265:
1261:
1254:
1252:
1250:
1248:
1244:
1239:
1235:
1229:
1226:
1221:
1217:
1213:
1209:
1208:Linux Journal
1205:
1198:
1195:
1190:
1186:
1180:
1177:
1164:
1160:
1159:
1154:
1148:
1145:
1132:
1128:
1124:
1118:
1115:
1102:
1098:
1092:
1089:
1084:
1080:
1076:
1070:
1066:
1062:
1058:
1057:
1049:
1046:
1041:
1035:
1031:
1030:
1022:
1019:
1008:on 2014-07-01
1004:
997:
991:
988:
983:
982:
974:
972:
968:
963:
959:
955:
948:
946:
944:
940:
935:
931:
926:
921:
917:
913:
909:
902:
899:
894:
890:
885:
880:
876:
872:
868:
861:
858:
853:
849:
845:
841:
837:
833:
829:
825:
821:
814:
812:
810:
808:
804:
798:
793:
789:
788:
780:
778:
774:
769:
765:
761:
755:
751:
747:
743:
742:
734:
731:
726:
722:
718:
712:
707:
702:
698:
694:
690:
689:
681:
679:
675:
670:
666:
662:
658:
654:
653:
645:
642:
632:
626:
622:
618:
614:
610:
603:
600:
592:
591:
583:
581:
579:
577:
575:
571:
566:
562:
558:
552:
547:
542:
538:
534:
530:
529:
521:
519:
517:
515:
513:
509:
504:
502:9781003034865
498:
494:
490:
486:
482:
475:
473:
469:
462:
458:
455:
453:
450:
447:
444:
442:
439:
437:
434:
432:
429:
426:
423:
421:
418:
416:
413:
411:
408:
406:
403:
401:
398:
397:
393:
391:
389:
385:
384:data recovery
381:
372:
370:
366:
360:
358:
355:
347:
345:
343:
339:
338:experimenting
335:
331:
327:
326:optical media
323:
319:
312:
308:
300:
298:
294:
292:
288:
284:
280:
276:
272:
264:
262:
255:
253:
251:
247:
243:
239:
235:
231:
227:
223:
219:
215:
211:
207:
203:
199:
195:
191:
183:
181:
174:
169:
167:
164:
160:
156:
151:
149:
145:
141:
137:
133:
129:
125:
121:
117:
111:
109:
105:
104:magnetic tape
101:
97:
93:
85:
83:
80:
78:
74:
70:
66:
62:
58:
53:
51:
50:deduplication
47:
42:
40:
33:
19:
1985:
1816:Floppy disks
1669:file formats
1665:
1590:Disk Utility
1580:Daemon Tools
1575:Alcohol 120%
1446:. Microsoft.
1438:
1426:. Retrieved
1422:the original
1417:
1408:
1391:
1367:. Retrieved
1363:
1354:
1327:
1323:
1267:
1263:
1237:
1228:
1214:(201): 6:6.
1211:
1207:
1197:
1189:the original
1179:
1167:. Retrieved
1156:
1147:
1135:. Retrieved
1126:
1117:
1105:. Retrieved
1101:the original
1091:
1055:
1048:
1028:
1021:
1010:. Retrieved
1003:the original
990:
980:
961:
957:
918:: e1681908.
915:
911:
901:
874:
870:
860:
827:
823:
786:
740:
733:
687:
651:
644:
634:, retrieved
612:
609:"Vocabulary"
602:
589:
527:
484:
415:Disk cloning
376:
367:
364:
351:
315:
307:System image
295:
283:broadcasting
279:Multicasting
268:
259:
187:
178:
162:
158:
152:
112:
96:disk cloning
89:
81:
54:
43:
38:
36:
2012:Disk images
1919:Pre-release
1600:Roxio Toast
1264:IEEE Access
1158:SourceForge
877:: 554–559.
706:10945/44249
546:10945/44252
441:no-CD crack
431:Loop device
361:Limitations
46:Compression
2006:Categories
1986:Disk image
1975:Home video
1829:DC42, DART
1748:Hard disks
1666:Disk image
1537:AcetoneISO
1369:2023-01-12
1330:(6): 965.
1012:2014-06-17
636:2023-01-12
463:References
405:Card image
400:Boot image
309: and
305:See also:
291:BitTorrent
287:unicasting
234:VirtualBox
118:files for
86:Background
73:ISO images
39:disk image
18:Virtual CD
1952:In-cinema
1400:1940-5758
1346:2076-3417
1302:231851821
1294:2169-3536
1220:1075-3583
934:1939-0114
893:1877-0509
844:0955-7490
452:ROM image
448:(PARTIES)
425:ISO image
354:Emulators
202:ISO image
100:megabytes
32:ISO image
1824:ADF, ADZ
1605:UltraISO
1595:MagicISO
1557:WinCDEmu
1514:RAM disk
1499:software
1428:27 April
1163:Archived
1131:Archived
1083:15706012
852:63617004
394:See also
388:ddrescue
320:and the
1978:ripping
1723:MDF+MDS
1708:CCD+SUB
1694:BIN+CUE
1272:Bibcode
1169:19 July
1137:19 July
1107:19 July
768:2474546
725:1624033
669:5932241
565:2628912
369:space.
222:Hyper-V
1398:
1394:(27).
1344:
1300:
1292:
1218:
1081:
1071:
1036:
932:
891:
850:
842:
766:
756:
723:
713:
667:
627:
563:
553:
499:
436:Mtools
242:VMware
236:, the
224:, the
120:MS-DOS
92:backup
2052:Warez
1552:mount
1542:CDemu
1519:Mount
1298:S2CID
1079:S2CID
1006:(PDF)
999:(PDF)
848:S2CID
764:S2CID
721:S2CID
665:S2CID
594:(PDF)
561:S2CID
212:in a
148:macOS
126:. In
1991:PDTV
1854:CDDA
1801:VMDK
1786:UDIF
1781:QCOW
1776:NDIF
1430:2012
1396:ISSN
1342:ISSN
1290:ISSN
1216:ISSN
1212:2011
1171:2011
1139:2011
1109:2011
1069:ISBN
1034:ISBN
930:ISSN
916:2018
889:ISSN
840:ISSN
754:ISBN
711:ISBN
625:ISBN
551:ISBN
497:ISBN
334:DVDs
332:and
275:DHCP
250:QEMU
246:QCOW
238:VMDK
170:Uses
146:and
134:the
128:Unix
122:and
94:and
48:and
1960:Cam
1844:VFD
1834:DMS
1806:WIM
1796:VHD
1791:VDI
1771:ISO
1766:IMG
1761:FVD
1756:DMG
1738:UIF
1733:NRG
1728:MDX
1718:ISZ
1713:ISO
1704:IMG
1699:DAA
1547:K3b
1332:doi
1280:doi
1061:doi
920:doi
879:doi
832:doi
792:doi
746:doi
701:hdl
693:doi
657:doi
617:doi
541:hdl
533:doi
489:doi
390:).
330:CDs
285:or
271:PXE
232:'s
226:VDI
218:VHD
208:or
161:or
130:or
2008::
1927:R5
1416:.
1390:.
1378:^
1362:.
1340:.
1326:.
1322:.
1310:^
1296:.
1288:.
1278:.
1266:.
1262:.
1246:^
1236:.
1210:.
1206:.
1155:.
1125:.
1077:.
1067:.
970:^
960:.
956:.
942:^
928:.
914:.
910:.
887:.
875:50
869:.
846:.
838:.
828:26
826:.
822:.
806:^
776:^
762:.
752:.
719:.
709:.
699:.
677:^
663:.
623:,
611:,
573:^
559:.
549:.
539:.
511:^
495:.
483:.
471:^
380:dd
281:,
196:.
136:dd
63:,
59:,
37:A
1903:e
1896:t
1889:v
1872:.
1706:+
1658:e
1651:t
1644:v
1489:e
1482:t
1475:v
1432:.
1402:.
1372:.
1348:.
1334::
1328:8
1304:.
1282::
1274::
1268:9
1240:.
1222:.
1173:.
1141:.
1111:.
1085:.
1063::
1042:.
1015:.
984:.
964:.
962:6
936:.
922::
895:.
881::
854:.
834::
800:.
794::
770:.
748::
727:.
703::
695::
671:.
659::
619::
567:.
543::
535::
505:.
491::
328:(
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.