Solved

How does putting a disk image over an encrypted drive work?

Posted on 2011-03-15
2
546 Views
Last Modified: 2012-06-21
Ok here is what we are doing. We have a bunch of these HP mini 1101 netbooks and we used TrueCrypt to fully encrypt the HD on them. When we did that it basically killed the batter so now we have to take it off. So completely redid one from the XP disc that came with it. then got all the updates and everything we wanted on it then i make a image of the HD with Clonezilla. My question is though is there going to be any issues with putting this image over a HD that has the encryption on it. How does Clonezilla reformat the drive because when it says formatting it took like 5 seconds then the reimage only took about 2 minutes to put one on there. I know when you use the XP disc and reformat a drive it normally takes a little longer then that.
0
Comment
Question by:Jthaya
2 Comments
 
LVL 26

Accepted Solution

by:
Dr. Klahn earned 500 total points
ID: 35140165
When a drive is cloned, there's essentially no "formatting" done as such.  The structure formatting was already done on the original drive, and that structure is duplicated onto the drive that is being cloned to.  All that the cloning program needs to do is minor structural adjustments that reflect things like the actual physical size of the drive.

The cloning process destroys whatever structure was previously on the target drive, so there should be no issues with the target drives regardless of what was on them originally.
0
 

Author Closing Comment

by:Jthaya
ID: 35140252
Thanks for the quick response we were thinking that might be the case but wanted to get it confirmed on how it worked. Thanks again
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
HELP!  Encrypted data on client's laptop 8 83
Software for IT quotations, invoices, delivery orders 2 56
Samsung S5 - Bricked?? 5 63
Pay to 支付宝 12 56
SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
This guide will walk you through the essential considerations and tech stack for building scalable websites. Know how to grow your business the smart way!
The viewer will learn how to create multiple layers to apply various filters and how to delete areas from each layer’s filter.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question