Overview and History
In one of our recent articles we have explored the benefits of Light Virtualization (LV). This is a unique software technology that sandboxes whole disks/partitions, protecting their contents against unwanted changes.
Shadow Defender (or SD for short as it is known among its dedicated fans) has been enjoying a great reputation among Light Virtualization fans during the last few years. There has been a barren period of two and a half years where development was interrupted, leaving v22.214.171.1245 (which was released back in February 2010) as the last known good version.
Amazingly this version is still doing its job perfectly three years later, keeping pretty much everything at bay. It is basically a three year old piece of code that is still able to fully isolate and contain malicious code which is much newer than itself. This unique feature is what has cemented the Shadow Defender reputation among its dedicated fans.
The SD project was put back on track a few months ago with the developer coming back and picking it up once again. Tony (as he is known among SD fans) is the author and owner of Shadow Defender. We don't know what real life issues may have forced Tony to abandon the project for two and a half years. What is important is that the break is now over. In the last five months the program has evolved and important new features have been added. The latest version of SD includes full SSD/TRIM compatibility, introduces Windows 8 support, and also includes write cache encryption plus a configurable RAM Cache option.
If you are interested in trying or buying Shadow Defender, you can visit this website.
PRICING: You can find products similar to this one for sale below.
United States: Find other tech and computer products like this over at Amazon's website.
United Kingdom: Find other tech and computer products like this over at Amazon UK's website.
Canada: Find other tech and computer products like this over at Amazon Canada's website.
- Page 1 [Overview and History]
- Page 2 [Program Functionality Analysis]
- Page 3 [The Importance of Multi-Layered System Protection]
- Page 4 [System Requirements, Installation and Registration]
- Page 5 [Software Usage Part 1 - Mode Setting]
- Page 6 [Software Usage Part 2 - Mode Setting Continued]
- Page 7 [Software Usage Part 3]
- Page 8 [Software Usage Part 4]
- Page 9 [Important Shadow Defender Usage Tips - Part 1]
- Page 10 [Important Shadow Defender Usage Tips - Part 2]
- Page 11 [Final Thoughts]
Recommended for You
- We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here.
Latest News Posts
- Volkswagen fraud settlement biggest in US history, hits $15 billion
- Dell's new 70-inch touchscreen for schools unveiled, costs $5000
- Battlefield 1 will have DX12 support, current alpha runs very smooth
- How the PS4 Neo and Xbox Scorpio are frustrating and confusing gamers
- Nintendo explains why its so secretive about the NX console
- Deleted driver software
- MSI GeForce GTX 1070 Gaming X 8G - Silent Gaming Major OC Headroom
- New Gaming Build - Looking fro feedback
- Fractal Design CORE 500 Mini-ITX Small Form Factor Chassis Review
- H110M-ITX loses USB and PS1 when WIN 7 loads
- ADATA launches the Premier SP550 M.2 2280 SATA 6Gb/s SSD
- Mangstor's NX-Series storage arrays accelerate HPC throughput with new burst buffer capabilities
- Swiftech unveils new Komodo Waterblocks for NVIDIA GeForce GTX1080 and GTX1070 flagship video cards
- ADATA releases the HD700 and HV620S external hard drives
- BIOSTAR teams up with Apacer and Thermaltake to showcase high-end gaming machines