?
Solved

HDD imaging/cloning

Posted on 2005-03-27
10
Medium Priority
?
456 Views
Last Modified: 2016-10-27
Lets say you use a product like Acronis Drive Image or similar to clone your HDD...is there any sort of filter on these products to stop viruses and malware all being tranferred over to the new hard disk as well?


{Who ever gives the most concise answer will get the points}
0
Comment
Question by:jetsonx
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +2
10 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 400 total points
ID: 13639680
No, there is no filter. You'll copy the partition with all malware. So you should make sure your system is malware free before cloning (or run antimalware immediately after having restored a cloned partition.
0
 
LVL 13

Expert Comment

by:Watzman
ID: 13639752
No.  If the source was infected, the clone will be infected also.
0
 
LVL 11

Assisted Solution

by:huntersvcs
huntersvcs earned 160 total points
ID: 13639802
No.  The majority of imaging software that I am aware of work outside the 32-Bit level, and make virus detection (at this time) during imaging/cloning impossible and may cause more harm than help.
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 3

Assisted Solution

by:charlietou
charlietou earned 80 total points
ID: 13656938
No.



I challenge anyone to get more concise than that.  :-)


Charlie T.
0
 
LVL 13

Expert Comment

by:Watzman
ID: 13657913
Well, you were doing ok until you put in your challenge and your name, thus making my previous post still the most concise.
0
 
LVL 88

Expert Comment

by:rindi
ID: 13658653
At the moment there just doesn't exist any cloning software that filters out malware, so there isn't a positive answer to your question. Appart from that, as such cloning software often is used for backup purposes (you can create an image file), and a lot of new malware may only be reqognized as such somewhat later, it is quite possible that a new virus or similar would not be be reqognizable yet at the time the archiving / cloning occurs, there sometimes may not be a point in trying to clean such things out. This would only cause the user to falsly think the image is completly clean.

What you can do with trueimage of acronis is, once you have the image, you can mount this on a running system, then you can run antimalware on this image which would allow you to identify which files you'd have to get rid of, once you have restored that image later...
0
 

Author Comment

by:jetsonx
ID: 13688621
Thank u everyone for those helpful replies.

Charlietou - taking brevity to the extremes!
0
 
LVL 88

Expert Comment

by:rindi
ID: 13688830
thanx
0
 
LVL 11

Expert Comment

by:huntersvcs
ID: 13695769
Thanks for the points.
0
 
LVL 3

Expert Comment

by:charlietou
ID: 13697033
Glad I could help.  :-)

0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Suggested Courses
Course of the Month7 days, 23 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question