Solved

How does putting a disk image over an encrypted drive work?

Posted on 2011-03-15
2
544 Views
Last Modified: 2012-06-21
Ok here is what we are doing. We have a bunch of these HP mini 1101 netbooks and we used TrueCrypt to fully encrypt the HD on them. When we did that it basically killed the batter so now we have to take it off. So completely redid one from the XP disc that came with it. then got all the updates and everything we wanted on it then i make a image of the HD with Clonezilla. My question is though is there going to be any issues with putting this image over a HD that has the encryption on it. How does Clonezilla reformat the drive because when it says formatting it took like 5 seconds then the reimage only took about 2 minutes to put one on there. I know when you use the XP disc and reformat a drive it normally takes a little longer then that.
0
Comment
Question by:Jthaya
2 Comments
 
LVL 25

Accepted Solution

by:
Dr. Klahn earned 500 total points
ID: 35140165
When a drive is cloned, there's essentially no "formatting" done as such.  The structure formatting was already done on the original drive, and that structure is duplicated onto the drive that is being cloned to.  All that the cloning program needs to do is minor structural adjustments that reflect things like the actual physical size of the drive.

The cloning process destroys whatever structure was previously on the target drive, so there should be no issues with the target drives regardless of what was on them originally.
0
 

Author Closing Comment

by:Jthaya
ID: 35140252
Thanks for the quick response we were thinking that might be the case but wanted to get it confirmed on how it worked. Thanks again
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
All of the resources available today make learning a new digital media easier than ever-- if you know where to begin. This is a clear, simple guide to a few of the basic digital art mediums and how to begin learning them on your own.
The viewer will learn how to successfully download and install the SARDU utility on Windows 8, without downloading adware.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question