Knowledge

Disk image

Source 📝

260:
Educational institutions and businesses can often need to buy or replace computer systems in large numbers. Disk imaging is commonly used to rapidly deploy the same configuration across workstations. Disk imaging software is used to create an image of a completely-configured system (such an image is
356:
frequently use disk images to emulate floppy disks that have been preserved. This is usually simpler to program than accessing a real floppy drive (particularly if the disks are in a format not supported by the host operating system), and allows a large library of software to be managed. Emulation
179:
Forensic imaging is the process of creating a bit-by-bit copy of the data on the drive, including files, metadata, volume information, filesystems and their structure. Often, these images are also hashed to verify their integrity and that they have not been altered since being created. Unlike disk
377:
Disk imaging can be slow, especially for older storage devices. A typical 4.7 GB DVD can take an average of 18 minutes to duplicate. Floppy disks read and write much slower than hard disks. Therefore, despite their small size, it can take several minutes to copy a single disk. In some cases, disk
368:
Other limitations can be the lack of access to software required to read the contents of the image. For example, prior to Windows 8, third party software was required to mount disk images. When imaging multiple computers with only minor differences, much data is duplicated unnecessarily, wasting
113:
Disk image creation is called disk imaging and is often time consuming, even with a fast computer, because the entire disk must be copied. Typically, disk imaging requires a third party disk imaging program or backup software. The software required varies according to the type of disk image that
165:
is a computer program that emulates an actual disc authoring device such as a CD writer or DVD writer. Instead of writing data to an actual disc, it creates a virtual disk image. A virtual burner, by definition, appears as a disc drive in the system with writing capabilities (as opposed to
180:
imaging for other purposes, digital forensic applications take a bit-by-bit copy to ensure forensic soundness. The purposes of imaging the disk is to not only discover evidence preserved in digital information but also to examine the drive to gather clues of how the crime was committed.
296:
Network-based image deployment reduces the need to maintain and update individual systems manually. Imaging is also easier than automated setup methods because an administrator does not need to have knowledge of the prior configuration to copy it.
106:, which ran as large as 200 megabytes per reel. Disk images became much more popular when floppy disk media became popular, where replication or storage of an exact structure was necessary and efficient, especially in the case of 480: 252:). Virtual hard disk images tend to be stored as either a collection of files (where each one is typically 2GB in size), or as a single file. Virtual machines treat the image set as a physical drive. 44:
Traditionally, disk images were bit-by-bit copies of every sector on a hard disk often created for digital forensic purposes, but it is now common to only copy allocated data to reduce storage space.
289:
tend to be used to restore an image to many computers simultaneously. These approaches do not work well if one or more computers experience packet loss. As a result, some imaging solutions use the
273:
server to boot an operating system over a computer network that contains the necessary components to image or restore storage media in a computer. This is usually used in conjunction with a
1868:
Convention: Any item in this table that has the form of "A+B" or "A+B+C" indicates a disk format that spans multiple files, where A contains the bulk of the data, and B and C are
445: 365:
Disk imaging is time consuming, the space requirements are high and reading from them can be slower than reading from the disk directly because of a performance overhead.
71:
strategy. Disk images can be made in a variety of formats depending on the purpose. Virtual disk images (such as VHD and VMDK) are intended to be used for cloud computing,
1487: 531:. Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries. New York, NY, USA: Association for Computing Machinery. pp. 57–66. 744:. Proceedings of the 6th International Conference on Security of Information and Networks. New York, NY, USA: Association for Computing Machinery. pp. 425–428. 1413: 2021: 357:
also allows existing disk images to be put into a usable form even though the data contained in the image is no longer readable without emulation.
166:
conventional disc authoring programs that can create virtual disk images), thus allowing software that can burn discs to create virtual discs.
261:
sometimes called a golden image). This image is then written to a computer's hard disk (which is sometimes described as restoring an image).
1901: 1656: 1072: 1037: 757: 714: 628: 554: 1480: 82:
Despite the benefits of disk imaging the storage costs can be high, management can be difficult and they can be time consuming to create.
1130: 274: 1677: 1625: 500: 409: 41:
is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device.
2041: 2046: 1473: 352:
Libraries and museums are typically required to archive and digitally preserve information without altering it in any manner.
204:. This can also be faster than reading from the physical optical medium. Further, there are less issues with wear and tear. A 2026: 1184: 337: 1096: 1162: 2031: 270: 1421: 1910: 1785: 588: 419: 995: 818:
Day, Michael; Pennock, Maureen; May, Peter; Davies, Kevin; Whibley, Simon; Kimura, Akiko; Halvarsson, Edith (2016).
691:. 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering. pp. 73–84. 344:. Typically, disk imaging can be used to quickly restore an entire system to an operational state after a disaster. 1853: 1059:. 2010 Second International Workshop on Education Technology and Computer Science. Vol. 1. pp. 405–408. 1894: 1859: 1649: 953: 282: 2016: 1443: 1233: 1258:
Shiau, Steven J. H.; Huang, Yu-Chiang; Tsai, Yu-Chin; Sun, Chen-Kai; Yen, Ching-Hsuan; Huang, Chi-Yo (2021).
2036: 378:
imaging can fail due to bad sectors or physical wear and tear on the source device. Unix utilities (such as
1027: 1931: 1805: 1775: 1722: 1698: 1693: 1359: 1614: 2011: 1887: 1707: 1642: 1566: 1271: 68: 64: 820:"The preservation of disk-based content at the British Library: Lessons from the Flashback project" 785: 79:
are used for forensic purposes. Proprietary formats are typically used by disk imaging software.
1936: 1833: 1770: 1712: 1609: 1508: 1297: 1078: 847: 763: 720: 664: 615:, SpringerBriefs in Computer Science, Cham: Springer International Publishing, pp. 125–126, 560: 321: 310: 229: 49: 382:) are not designed to cope with failures, causing the disk image creation process to fail. When 1843: 1838: 1795: 1765: 1760: 1732: 1703: 1518: 1395: 1341: 1289: 1215: 1122: 1068: 1033: 929: 888: 839: 753: 710: 624: 550: 496: 456: 225: 217: 209: 123: 115: 76: 56: 1755: 1599: 1584: 1331: 1279: 1060: 919: 878: 831: 791: 745: 700: 692: 656: 616: 540: 532: 488: 154: 45: 908:"Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures" 819: 790:. 2004 American Society for Engineering Education Annual Conference. Salt Lake City, Utah. 1823: 1747: 341: 213: 205: 197: 189: 139: 60: 1318:
Shiau, Steven J. H.; Sun, Chen-Kai; Tsai, Yu-Chin; Juang, Jer-Nan; Huang, Chi-Yo (2018).
1275: 979: 528:
Extending digital repository architectures to support disk image preservation and access
2051: 1918: 317: 269:
Image restoration can be done using network-based image deployment. This method uses a
193: 143: 107: 1100: 2005: 1959: 1574: 1528: 1301: 383: 325: 103: 1082: 851: 824:
Alexandria: The Journal of National and International Library and Information Issues
1926: 1869: 1727: 1685: 1589: 1579: 1551: 767: 724: 668: 564: 414: 306: 277:
server to automate the configuration of network parameters including IP addresses.
95: 1188: 386:
is the end goal, it is instead recommended to use more specialised tools (such as
1388:"Digital forensics on a shoestring: a case study from the University of Victoria" 1203: 620: 587:
Pullakandam, R.; Lin, X.; Hibler, M.; Eide, E.; Ricci, R. (October 23–26, 2011).
1815: 1668: 1320:"The Design and Implementation of a Novel Open Source Massive Deployment System" 1284: 1259: 1157: 1152: 883: 866: 440: 430: 1054: 686: 650: 608: 1974: 1951: 1879: 1790: 1536: 1460: 1387: 660: 404: 399: 290: 233: 1399: 1345: 1293: 1219: 933: 892: 843: 835: 492: 1941: 1828: 749: 536: 451: 424: 379: 278: 201: 135: 131: 72: 31: 924: 907: 655:. 2008 IEEE International Symposium on Consumer Electronics. pp. 1–3. 479:
Colloton, Eddy; Farbowitz, Jonathan; Rodríguez, Caroline Gil (2022-11-02).
1634: 1064: 1002: 739: 696: 526: 17: 1964: 1737: 1717: 1604: 1594: 1556: 1513: 1465: 1056:
Construction of the Practical Teaching System on Operating Systems Course
981:
Need for speed : A study of the speed of forensic disk imaging tools
867:"A Novel Approach to Address Interoperability Concern in Cloud Computing" 387: 353: 99: 954:"Towards Best Practices In Disk Imaging: A Cross-Institutional Approach" 796: 596:. 23rd ACM Symposium on Operating Systems Principles. Cascais, Portugal. 1977: 1336: 1319: 705: 545: 286: 221: 1260:"A BitTorrent Mechanism-Based Solution for Massive System Deployment" 738:
Kazim, Muhammad; Masood, Rahat; Shibli, Muhammad Awais (2013-11-26).
435: 241: 119: 91: 27:
Computer file containing the contents and structure of a disk volume
1541: 1496: 688:
Automating Disk Forensic Processing with SleuthKit, XML and Python
147: 67:, as part of a backup strategy, and legacy emulation as part of a 525:
Woods, Kam; Lee, Christopher A.; Garfinkel, Simson (2011-06-13).
1990: 1800: 1780: 613:
Guide to Digital Forensics: A Concise and Practical Introduction
249: 245: 237: 127: 1883: 1638: 1469: 114:
needs to be created. For example, RawWrite and WinImage create
1546: 1053:
Li, Hongwei; Yin, Changhong; Xu, Yaping; Guo, Qingjun (2010).
333: 52:
are commonly used to reduce the size of the image file set.
952:
Colloton, E.; Farbowitz, J.; Fortunato, F.; Gil, C. (2019).
865:
Arunkumar, G.; Venkataraman., Neelanarayanan (2015-01-01).
336:, etc.), and allows the exact and efficient recovery after 329: 90:
Disk images were originally (in the late 1960s) used for
55:
Disk imaging is done for a variety of purposes including
30:"CD image" redirects here. For ISO 9660 image files, see 324:
state). For this reason, it is also used for backing up
906:
Barrowclough, John Patrick; Asif, Rameez (2018-06-11).
590:
High-performance Disk Imaging With Deduplicated Storage
157:
can generate and load disk images for optical media. A
102:
and as large as 330 megabytes, and the copy medium was
98:
of mainframe disk media. Early ones were as small as 5
741:
Securing the virtual machine images in cloud computing
446:
Protected Area Run Time Interface Extension Services
188:
Creating a virtual disk image of optical media or a
1973: 1950: 1917: 1852: 1814: 1746: 1684: 1565: 1527: 649:Lee, Sang Su; Kyong, Un Sung; Hong, Do Won (2008). 607:Kävrestad, Joakim (2017), Kävrestad, Joakim (ed.), 481:"Disk Imaging as a Backup Tool for Digital Objects" 192:is typically done to make the content available to 784:Blackham, N.; Higby, C.; Bailey, M. (June 2004). 316:A disk image contains all files and data (i.e., 216:is implemented as a disk image (i.e. either the 138:program can be used to create raw disk images. 150:systems to create and write disk image files. 1895: 1650: 1481: 1386:Durno, John; Trofimchuk, Jerry (2015-01-21). 8: 873:. Big Data, Cloud and Computing Challenges. 427:, an archive file of an optical media volume 1420:. Microsoft. 30 August 2011. Archived from 1902: 1888: 1880: 1657: 1643: 1635: 1488: 1474: 1466: 1360:"Fast, Scalable Disk Imaging with Frisbee" 787:Re-Imaging Computers For Multipurpose Labs 75:are intended to emulate optical media and 1335: 1283: 923: 882: 795: 704: 544: 978:Stewart, Dawid; Arvidsson, Alex (2022). 153:Authoring software for CDs/DVDs such as 1123:"Virtual CD - The original for your PC" 468: 1461:Software repository including RAWRITE2 1133:from the original on 24 September 2011 947: 945: 943: 1414:"Accessing data in ISO and VHD files" 1381: 1379: 1313: 1311: 1253: 1251: 1249: 1247: 1165:from the original on 17 February 2011 973: 971: 200:emulate a CD/DVD drive by reading an 7: 2022:Compact Disc and DVD copy protection 1099:. Phantombility, Inc. Archived from 813: 811: 809: 807: 779: 777: 680: 678: 582: 580: 578: 576: 574: 520: 518: 516: 514: 512: 485:Conservation of Time-Based Media Art 474: 472: 912:Security and Communication Networks 293:protocol to overcome this problem. 1418:Building Windows 8 (TechNet Blogs) 1204:"Clonezilla: build, clone, repeat" 340:with modifications to a system or 25: 1678:Comparison of disc image software 1626:Comparison of disc image software 996:"IBM Mainframe Operating Systems" 410:Comparison of disc image software 1234:"Create a golden image in Azure" 1202:Bowling, Jeramiah (2011-01-01). 652:A high speed disk imaging system 1153:"Virtual CD/DVD-Writer Device" 1032:. Prentice Hall Professional. 265:Network-based image deployment 1: 1029:Integrating Linux and Windows 685:Garfinkel, Simson L. (2009). 313:(for Windows Vista and later) 621:10.1007/978-3-319-67450-6_12 194:one or more virtual machines 1911:Pirated movie release types 1285:10.1109/ACCESS.2021.3052525 1185:"pcguide.com - Access Time" 884:10.1016/j.procs.2015.04.083 420:El Torito (CD-ROM standard) 256:Rapid deployment of systems 220:format used by Microsoft's 2068: 304: 29: 1866: 1860:Disc Description Protocol 1675: 1623: 1504: 1097:"Phantom Burner Overview" 871:Procedia Computer Science 661:10.1109/ISCE.2008.4559553 244:virtual machines, or the 836:10.1177/0955749016669775 493:10.4324/9781003034865-17 2042:Hardware virtualization 958:Electronic Media Review 750:10.1145/2523514.2523576 537:10.1145/1998076.1998088 2047:Optical disc authoring 2027:Computer file formats 1129:. H+H Software GmbH. 1065:10.1109/ETCS.2010.184 1026:McCune, Mike (2000). 697:10.1109/SADFE.2009.12 65:system administration 2032:Disk image emulators 1567:Proprietary software 1392:The Code4Lib Journal 925:10.1155/2018/1681908 487:. pp. 204–222. 348:Digital preservation 69:digital preservation 1276:2021IEEEA...921043S 1238:learn.microsoft.com 1191:on 10 January 2019. 797:10.18260/1-2--14125 159:virtual disk writer 1610:Virtual CloneDrive 1509:Virtual disk image 1337:10.3390/app8060965 1127:Virtual CD website 322:file fragmentation 311:Backup and Restore 230:Oracle Corporation 1999: 1998: 1877: 1876: 1632: 1631: 1444:"Mount-DiskImage" 1103:on 19 August 2011 1074:978-1-4244-6388-6 1039:978-0-13-030670-8 759:978-1-4503-2498-4 716:978-0-7695-3792-4 630:978-3-319-67450-6 556:978-1-4503-0744-4 457:Software cracking 373:Speed and failure 210:solid-state drive 175:Digital forensics 124:Microsoft Windows 116:floppy disk image 57:digital forensics 16:(Redirected from 2059: 1904: 1897: 1890: 1881: 1659: 1652: 1645: 1636: 1615:VirtualDrive Pro 1585:DiskImageMounter 1490: 1483: 1476: 1467: 1448: 1447: 1440: 1434: 1433: 1431: 1429: 1424:on 19 April 2012 1410: 1404: 1403: 1383: 1374: 1373: 1371: 1370: 1356: 1350: 1349: 1339: 1324:Applied Sciences 1315: 1306: 1305: 1287: 1255: 1242: 1241: 1230: 1224: 1223: 1199: 1193: 1192: 1187:. Archived from 1181: 1175: 1174: 1172: 1170: 1161:. Geeknet, Inc. 1149: 1143: 1142: 1140: 1138: 1119: 1113: 1112: 1110: 1108: 1093: 1087: 1086: 1050: 1044: 1043: 1023: 1017: 1016: 1014: 1013: 1007: 1001:. Archived from 1000: 992: 986: 985: 975: 966: 965: 949: 938: 937: 927: 903: 897: 896: 886: 862: 856: 855: 815: 802: 801: 799: 781: 772: 771: 735: 729: 728: 708: 682: 673: 672: 646: 640: 639: 638: 637: 604: 598: 597: 595: 584: 569: 568: 548: 522: 507: 506: 476: 240:format used for 198:Virtual machines 155:Nero Burning ROM 21: 2067: 2066: 2062: 2061: 2060: 2058: 2057: 2056: 2017:Archive formats 2002: 2001: 2000: 1995: 1969: 1946: 1913: 1908: 1878: 1873: 1862: 1848: 1810: 1742: 1680: 1671: 1663: 1633: 1628: 1619: 1561: 1523: 1500: 1494: 1457: 1452: 1451: 1442: 1441: 1437: 1427: 1425: 1412: 1411: 1407: 1385: 1384: 1377: 1368: 1366: 1364:www.cs.utah.edu 1358: 1357: 1353: 1317: 1316: 1309: 1270:: 21043–21058. 1257: 1256: 1245: 1232: 1231: 1227: 1201: 1200: 1196: 1183: 1182: 1178: 1168: 1166: 1151: 1150: 1146: 1136: 1134: 1121: 1120: 1116: 1106: 1104: 1095: 1094: 1090: 1075: 1052: 1051: 1047: 1040: 1025: 1024: 1020: 1011: 1009: 1005: 998: 994: 993: 989: 977: 976: 969: 951: 950: 941: 905: 904: 900: 864: 863: 859: 817: 816: 805: 783: 782: 775: 760: 737: 736: 732: 717: 684: 683: 676: 648: 647: 643: 635: 633: 631: 606: 605: 601: 593: 586: 585: 572: 557: 524: 523: 510: 503: 478: 477: 470: 465: 396: 375: 363: 350: 342:virtual machine 318:file attributes 314: 303: 301:Backup strategy 267: 258: 248:format used by 228:format used by 214:virtual machine 206:hard disk drive 190:hard disk drive 186: 177: 172: 142:can be used on 140:Apple Disk Copy 132:similar systems 88: 77:raw disk images 61:cloud computing 35: 28: 23: 22: 15: 12: 11: 5: 2065: 2063: 2055: 2054: 2049: 2044: 2039: 2037:Hacker culture 2034: 2029: 2024: 2019: 2014: 2004: 2003: 1997: 1996: 1994: 1993: 1988: 1982: 1980: 1971: 1970: 1968: 1967: 1962: 1956: 1954: 1948: 1947: 1945: 1944: 1942:Workprint (WP) 1939: 1934: 1932:Screener (SCR) 1929: 1923: 1921: 1915: 1914: 1909: 1907: 1906: 1899: 1892: 1884: 1875: 1874: 1867: 1864: 1863: 1858: 1856: 1850: 1849: 1847: 1846: 1841: 1836: 1831: 1826: 1820: 1818: 1812: 1811: 1809: 1808: 1803: 1798: 1793: 1788: 1783: 1778: 1773: 1768: 1763: 1758: 1752: 1750: 1744: 1743: 1741: 1740: 1735: 1730: 1725: 1720: 1715: 1710: 1701: 1696: 1690: 1688: 1682: 1681: 1676: 1673: 1672: 1664: 1662: 1661: 1654: 1647: 1639: 1630: 1629: 1624: 1621: 1620: 1618: 1617: 1612: 1607: 1602: 1597: 1592: 1587: 1582: 1577: 1571: 1569: 1563: 1562: 1560: 1559: 1554: 1549: 1544: 1539: 1533: 1531: 1525: 1524: 1522: 1521: 1516: 1511: 1505: 1502: 1501: 1495: 1493: 1492: 1485: 1478: 1470: 1464: 1463: 1456: 1455:External links 1453: 1450: 1449: 1435: 1405: 1375: 1351: 1307: 1243: 1225: 1194: 1176: 1144: 1114: 1088: 1073: 1045: 1038: 1018: 987: 967: 939: 898: 857: 830:(3): 216–234. 803: 773: 758: 730: 715: 674: 641: 629: 599: 570: 555: 508: 501: 467: 466: 464: 461: 460: 459: 454: 449: 443: 438: 433: 428: 422: 417: 412: 407: 402: 395: 392: 374: 371: 362: 359: 349: 346: 302: 299: 266: 263: 257: 254: 185: 184:Virtualization 182: 176: 173: 171: 168: 163:virtual burner 144:Classic Mac OS 110:floppy disks. 108:copy protected 87: 84: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2064: 2053: 2050: 2048: 2045: 2043: 2040: 2038: 2035: 2033: 2030: 2028: 2025: 2023: 2020: 2018: 2015: 2013: 2010: 2009: 2007: 1992: 1989: 1987: 1984: 1983: 1981: 1979: 1976: 1972: 1966: 1965:Telesync (TS) 1963: 1961: 1958: 1957: 1955: 1953: 1949: 1943: 1940: 1938: 1937:Telecine (TC) 1935: 1933: 1930: 1928: 1925: 1924: 1922: 1920: 1916: 1912: 1905: 1900: 1898: 1893: 1891: 1886: 1885: 1882: 1871: 1870:sidecar files 1865: 1861: 1857: 1855: 1851: 1845: 1842: 1840: 1839:IMG, IMA, IMZ 1837: 1835: 1832: 1830: 1827: 1825: 1822: 1821: 1819: 1817: 1813: 1807: 1804: 1802: 1799: 1797: 1794: 1792: 1789: 1787: 1784: 1782: 1779: 1777: 1774: 1772: 1769: 1767: 1764: 1762: 1759: 1757: 1754: 1753: 1751: 1749: 1745: 1739: 1736: 1734: 1731: 1729: 1726: 1724: 1721: 1719: 1716: 1714: 1711: 1709: 1705: 1702: 1700: 1697: 1695: 1692: 1691: 1689: 1687: 1686:Optical discs 1683: 1679: 1674: 1670: 1667: 1660: 1655: 1653: 1648: 1646: 1641: 1640: 1637: 1627: 1622: 1616: 1613: 1611: 1608: 1606: 1603: 1601: 1598: 1596: 1593: 1591: 1588: 1586: 1583: 1581: 1578: 1576: 1573: 1572: 1570: 1568: 1564: 1558: 1555: 1553: 1550: 1548: 1545: 1543: 1540: 1538: 1535: 1534: 1532: 1530: 1529:Free software 1526: 1520: 1517: 1515: 1512: 1510: 1507: 1506: 1503: 1498: 1497:Virtual drive 1491: 1486: 1484: 1479: 1477: 1472: 1471: 1468: 1462: 1459: 1458: 1454: 1445: 1439: 1436: 1423: 1419: 1415: 1409: 1406: 1401: 1397: 1393: 1389: 1382: 1380: 1376: 1365: 1361: 1355: 1352: 1347: 1343: 1338: 1333: 1329: 1325: 1321: 1314: 1312: 1308: 1303: 1299: 1295: 1291: 1286: 1281: 1277: 1273: 1269: 1265: 1261: 1254: 1252: 1250: 1248: 1244: 1239: 1235: 1229: 1226: 1221: 1217: 1213: 1209: 1208:Linux Journal 1205: 1198: 1195: 1190: 1186: 1180: 1177: 1164: 1160: 1159: 1154: 1148: 1145: 1132: 1128: 1124: 1118: 1115: 1102: 1098: 1092: 1089: 1084: 1080: 1076: 1070: 1066: 1062: 1058: 1057: 1049: 1046: 1041: 1035: 1031: 1030: 1022: 1019: 1008:on 2014-07-01 1004: 997: 991: 988: 983: 982: 974: 972: 968: 963: 959: 955: 948: 946: 944: 940: 935: 931: 926: 921: 917: 913: 909: 902: 899: 894: 890: 885: 880: 876: 872: 868: 861: 858: 853: 849: 845: 841: 837: 833: 829: 825: 821: 814: 812: 810: 808: 804: 798: 793: 789: 788: 780: 778: 774: 769: 765: 761: 755: 751: 747: 743: 742: 734: 731: 726: 722: 718: 712: 707: 702: 698: 694: 690: 689: 681: 679: 675: 670: 666: 662: 658: 654: 653: 645: 642: 632: 626: 622: 618: 614: 610: 603: 600: 592: 591: 583: 581: 579: 577: 575: 571: 566: 562: 558: 552: 547: 542: 538: 534: 530: 529: 521: 519: 517: 515: 513: 509: 504: 502:9781003034865 498: 494: 490: 486: 482: 475: 473: 469: 462: 458: 455: 453: 450: 447: 444: 442: 439: 437: 434: 432: 429: 426: 423: 421: 418: 416: 413: 411: 408: 406: 403: 401: 398: 397: 393: 391: 389: 385: 384:data recovery 381: 372: 370: 366: 360: 358: 355: 347: 345: 343: 339: 338:experimenting 335: 331: 327: 326:optical media 323: 319: 312: 308: 300: 298: 294: 292: 288: 284: 280: 276: 272: 264: 262: 255: 253: 251: 247: 243: 239: 235: 231: 227: 223: 219: 215: 211: 207: 203: 199: 195: 191: 183: 181: 174: 169: 167: 164: 160: 156: 151: 149: 145: 141: 137: 133: 129: 125: 121: 117: 111: 109: 105: 104:magnetic tape 101: 97: 93: 85: 83: 80: 78: 74: 70: 66: 62: 58: 53: 51: 50:deduplication 47: 42: 40: 33: 19: 1985: 1816:Floppy disks 1669:file formats 1665: 1590:Disk Utility 1580:Daemon Tools 1575:Alcohol 120% 1446:. Microsoft. 1438: 1426:. Retrieved 1422:the original 1417: 1408: 1391: 1367:. Retrieved 1363: 1354: 1327: 1323: 1267: 1263: 1237: 1228: 1214:(201): 6:6. 1211: 1207: 1197: 1189:the original 1179: 1167:. Retrieved 1156: 1147: 1135:. Retrieved 1126: 1117: 1105:. Retrieved 1101:the original 1091: 1055: 1048: 1028: 1021: 1010:. Retrieved 1003:the original 990: 980: 961: 957: 918:: e1681908. 915: 911: 901: 874: 870: 860: 827: 823: 786: 740: 733: 687: 651: 644: 634:, retrieved 612: 609:"Vocabulary" 602: 589: 527: 484: 415:Disk cloning 376: 367: 364: 351: 315: 307:System image 295: 283:broadcasting 279:Multicasting 268: 259: 187: 178: 162: 158: 152: 112: 96:disk cloning 89: 81: 54: 43: 38: 36: 2012:Disk images 1919:Pre-release 1600:Roxio Toast 1264:IEEE Access 1158:SourceForge 877:: 554–559. 706:10945/44249 546:10945/44252 441:no-CD crack 431:Loop device 361:Limitations 46:Compression 2006:Categories 1986:Disk image 1975:Home video 1829:DC42, DART 1748:Hard disks 1666:Disk image 1537:AcetoneISO 1369:2023-01-12 1330:(6): 965. 1012:2014-06-17 636:2023-01-12 463:References 405:Card image 400:Boot image 309: and 305:See also: 291:BitTorrent 287:unicasting 234:VirtualBox 118:files for 86:Background 73:ISO images 39:disk image 18:Virtual CD 1952:In-cinema 1400:1940-5758 1346:2076-3417 1302:231851821 1294:2169-3536 1220:1075-3583 934:1939-0114 893:1877-0509 844:0955-7490 452:ROM image 448:(PARTIES) 425:ISO image 354:Emulators 202:ISO image 100:megabytes 32:ISO image 1824:ADF, ADZ 1605:UltraISO 1595:MagicISO 1557:WinCDEmu 1514:RAM disk 1499:software 1428:27 April 1163:Archived 1131:Archived 1083:15706012 852:63617004 394:See also 388:ddrescue 320:and the 1978:ripping 1723:MDF+MDS 1708:CCD+SUB 1694:BIN+CUE 1272:Bibcode 1169:19 July 1137:19 July 1107:19 July 768:2474546 725:1624033 669:5932241 565:2628912 369:space. 222:Hyper-V 1398:  1394:(27). 1344:  1300:  1292:  1218:  1081:  1071:  1036:  932:  891:  850:  842:  766:  756:  723:  713:  667:  627:  563:  553:  499:  436:Mtools 242:VMware 236:, the 224:, the 120:MS-DOS 92:backup 2052:Warez 1552:mount 1542:CDemu 1519:Mount 1298:S2CID 1079:S2CID 1006:(PDF) 999:(PDF) 848:S2CID 764:S2CID 721:S2CID 665:S2CID 594:(PDF) 561:S2CID 212:in a 148:macOS 126:. In 1991:PDTV 1854:CDDA 1801:VMDK 1786:UDIF 1781:QCOW 1776:NDIF 1430:2012 1396:ISSN 1342:ISSN 1290:ISSN 1216:ISSN 1212:2011 1171:2011 1139:2011 1109:2011 1069:ISBN 1034:ISBN 930:ISSN 916:2018 889:ISSN 840:ISSN 754:ISBN 711:ISBN 625:ISBN 551:ISBN 497:ISBN 334:DVDs 332:and 275:DHCP 250:QEMU 246:QCOW 238:VMDK 170:Uses 146:and 134:the 128:Unix 122:and 94:and 48:and 1960:Cam 1844:VFD 1834:DMS 1806:WIM 1796:VHD 1791:VDI 1771:ISO 1766:IMG 1761:FVD 1756:DMG 1738:UIF 1733:NRG 1728:MDX 1718:ISZ 1713:ISO 1704:IMG 1699:DAA 1547:K3b 1332:doi 1280:doi 1061:doi 920:doi 879:doi 832:doi 792:doi 746:doi 701:hdl 693:doi 657:doi 617:doi 541:hdl 533:doi 489:doi 390:). 330:CDs 285:or 271:PXE 232:'s 226:VDI 218:VHD 208:or 161:or 130:or 2008:: 1927:R5 1416:. 1390:. 1378:^ 1362:. 1340:. 1326:. 1322:. 1310:^ 1296:. 1288:. 1278:. 1266:. 1262:. 1246:^ 1236:. 1210:. 1206:. 1155:. 1125:. 1077:. 1067:. 970:^ 960:. 956:. 942:^ 928:. 914:. 910:. 887:. 875:50 869:. 846:. 838:. 828:26 826:. 822:. 806:^ 776:^ 762:. 752:. 719:. 709:. 699:. 677:^ 663:. 623:, 611:, 573:^ 559:. 549:. 539:. 511:^ 495:. 483:. 471:^ 380:dd 281:, 196:. 136:dd 63:, 59:, 37:A 1903:e 1896:t 1889:v 1872:. 1706:+ 1658:e 1651:t 1644:v 1489:e 1482:t 1475:v 1432:. 1402:. 1372:. 1348:. 1334:: 1328:8 1304:. 1282:: 1274:: 1268:9 1240:. 1222:. 1173:. 1141:. 1111:. 1085:. 1063:: 1042:. 1015:. 984:. 964:. 962:6 936:. 922:: 895:. 881:: 854:. 834:: 800:. 794:: 770:. 748:: 727:. 703:: 695:: 671:. 659:: 619:: 567:. 543:: 535:: 505:. 491:: 328:( 34:. 20:)

Index

Virtual CD
ISO image
Compression
deduplication
digital forensics
cloud computing
system administration
digital preservation
ISO images
raw disk images
backup
disk cloning
megabytes
magnetic tape
copy protected
floppy disk image
MS-DOS
Microsoft Windows
Unix
similar systems
dd
Apple Disk Copy
Classic Mac OS
macOS
Nero Burning ROM
hard disk drive
one or more virtual machines
Virtual machines
ISO image
hard disk drive

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.