Software Usage Part 1 - Mode Setting
Mode Setting is the second set of options on the left of the main SD window. This is one of the most important parts of the program, the place where users can define which volumes will be protected. Select it and this screen will be shown:
There is a RAM used as Write Cache feature here as well. If your system has an adequate helping of RAM, you can assign a part of it to be used for the SD write cache. The benefits of this are obvious. When the virtual system runs in RAM the whole process will be faster and your protected volumes won't take any write hits until you choose to manually commit data to them (more on that later). This is especially beneficial to devices like SSDs, memory cards, flash sticks etc.
No disk hits also means no disk traces of deleted data left behind. It all stays in RAM and gets flushed at the next reboot, which is perfect for the more paranoid among us. Where is my tinfoil hat...?
When adding a RAM value, remember to always leave enough RAM available for the system. For example: If your system has 4GB of RAM (which translates to 4096MB), you can assign 1024MB for the SD write cache and leave the rest for Windows. If you only have 2GB of RAM installed you should not use this option. In this case leave the RAM cache at zero (default).
When the assigned RAM cache fills-up the program will automatically switch back to disk buffering mode. Personally I keep a close eye on Shadow Defender's RAM cache usage (through the System Status screen), making sure to reboot the system before the RAM cache fills-up completely. This way the program never switches into disk buffering mode and my SSDs don't get any write hits while in Shadow Mode.
Let's return to the Current volume status list. All volumes are ticked by default, ready to be placed in Shadow Mode. It is up to the user to decide which volumes to put under Shadow Mode at any given time; just untick the ones you don't want to protect at this point.
As a rule I usually enable Shadow Mode only for C: in order to protect my Windows partition from any changes. This way I can still save my data on my other volumes and those changes will not be undone when I reboot. I have already moved my User folders to a non-protected volume; so any changes I make to those frequently modified folders will always stick regardless if C: is in Shadow Mode or not. Details on how to move the User folders to a different disk/partition have been provided within the LV/IRS technology introduction article. The introduction contains a comprehensive list of other useful Light Virtualization tips as well.
Once you untick the volumes that you want to exclude from SD protection, you can then click the Schedule button, which will affect all volumes that remain ticked. Two options will drop down. The first one is Enter Shadow Mode on Boot. This option will schedule Shadow Mode to auto-start for all ticked volumes every time the computer starts. Scheduled SD protection for ticked volumes won't kick-in until you restart the computer.
The second option on the Schedule drop-down list is Exit Shadow Mode on Shutdown. This essentially undoes the previous option: It disables the scheduling of Shadow Mode for any ticked volumes.
If you are interested in trying or buying Shadow Defender, you can visit this website.
PRICING: You can find products similar to this one for sale below.
United States: Find other tech and computer products like this over at Amazon's website.
United Kingdom: Find other tech and computer products like this over at Amazon UK's website.
Australia: Find other tech and computer products like this over at PLE Computer's website.
Canada: Find other tech and computer products like this over at Amazon Canada's website.
- Page 1 [Overview and History]
- Page 2 [Program Functionality Analysis]
- Page 3 [The Importance of Multi-Layered System Protection]
- Page 4 [System Requirements, Installation and Registration]
- Page 5 [Software Usage Part 1 - Mode Setting]
- Page 6 [Software Usage Part 2 - Mode Setting Continued]
- Page 7 [Software Usage Part 3]
- Page 8 [Software Usage Part 4]
- Page 9 [Important Shadow Defender Usage Tips - Part 1]
- Page 10 [Important Shadow Defender Usage Tips - Part 2]
- Page 11 [Final Thoughts]
- We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here.
Recommended for You
Latest News Posts
- The Mad Max game looks absolutely stunning in 8K
- OSVR updates its hardware, delivers 1080p 120Hz display and more
- WhatsApp is now home to 900 million users
- Toyota pledges $50 million into autonomous car research centers at MIT
- PowerColor's new dual-GPU has 16GB of VRAM, requires 1000W of power
- Reset BIOS on ASRock Beebox N3150 w/o mouse/keyb.
- Gigabyte GA-170-DH3
- TP-LINK Archer C3200 Tri-Band AC3200 Wireless Router Review
- Does my motherbord support this RAM ?
- Windows 10 Pro 64bit on GA990FXA-UD3 R5 advice for USB3 problem
- SEAGATE DELIVERS INDUSTRY'S BROADEST PORTFOLIO OF 8TB HARD DRIVES
- CYBERTRONPC ANNOUNCES SMALL FORM FACTOR SYSTEM WITH AMD R9 NANO GRAPHICS CARD
- SilverStone Storage Devices - Mobile Series - MS08
- ASRock Z170 OC Formula Sets More Records at IDF 2015 San Francisco!
- ATTO Technology to Display Network and Storage Connectivity Portfolio at VMworld 2015