Software Usage Part 1 - Mode Setting
Mode Setting is the second set of options on the left of the main SD window. This is one of the most important parts of the program, the place where users can define which volumes will be protected. Select it and this screen will be shown:
There is a RAM used as Write Cache feature here as well. If your system has an adequate helping of RAM, you can assign a part of it to be used for the SD write cache. The benefits of this are obvious. When the virtual system runs in RAM the whole process will be faster and your protected volumes won't take any write hits until you choose to manually commit data to them (more on that later). This is especially beneficial to devices like SSDs, memory cards, flash sticks etc.
No disk hits also means no disk traces of deleted data left behind. It all stays in RAM and gets flushed at the next reboot, which is perfect for the more paranoid among us. Where is my tinfoil hat...?
When adding a RAM value, remember to always leave enough RAM available for the system. For example: If your system has 4GB of RAM (which translates to 4096MB), you can assign 1024MB for the SD write cache and leave the rest for Windows. If you only have 2GB of RAM installed you should not use this option. In this case leave the RAM cache at zero (default).
When the assigned RAM cache fills-up the program will automatically switch back to disk buffering mode. Personally I keep a close eye on Shadow Defender's RAM cache usage (through the System Status screen), making sure to reboot the system before the RAM cache fills-up completely. This way the program never switches into disk buffering mode and my SSDs don't get any write hits while in Shadow Mode.
Let's return to the Current volume status list. All volumes are ticked by default, ready to be placed in Shadow Mode. It is up to the user to decide which volumes to put under Shadow Mode at any given time; just untick the ones you don't want to protect at this point.
As a rule I usually enable Shadow Mode only for C: in order to protect my Windows partition from any changes. This way I can still save my data on my other volumes and those changes will not be undone when I reboot. I have already moved my User folders to a non-protected volume; so any changes I make to those frequently modified folders will always stick regardless if C: is in Shadow Mode or not. Details on how to move the User folders to a different disk/partition have been provided within the LV/IRS technology introduction article. The introduction contains a comprehensive list of other useful Light Virtualization tips as well.
Once you untick the volumes that you want to exclude from SD protection, you can then click the Schedule button, which will affect all volumes that remain ticked. Two options will drop down. The first one is Enter Shadow Mode on Boot. This option will schedule Shadow Mode to auto-start for all ticked volumes every time the computer starts. Scheduled SD protection for ticked volumes won't kick-in until you restart the computer.
The second option on the Schedule drop-down list is Exit Shadow Mode on Shutdown. This essentially undoes the previous option: It disables the scheduling of Shadow Mode for any ticked volumes.
If you are interested in trying or buying Shadow Defender, you can visit this website.
PRICING: You can find products similar to this one for sale below.
United States: Find other tech and computer products like this over at Amazon's website.
United Kingdom: Find other tech and computer products like this over at Amazon UK's website.
Canada: Find other tech and computer products like this over at Amazon Canada's website.
- Page 1 [Overview and History]
- Page 2 [Program Functionality Analysis]
- Page 3 [The Importance of Multi-Layered System Protection]
- Page 4 [System Requirements, Installation and Registration]
- Page 5 [Software Usage Part 1 - Mode Setting]
- Page 6 [Software Usage Part 2 - Mode Setting Continued]
- Page 7 [Software Usage Part 3]
- Page 8 [Software Usage Part 4]
- Page 9 [Important Shadow Defender Usage Tips - Part 1]
- Page 10 [Important Shadow Defender Usage Tips - Part 2]
- Page 11 [Final Thoughts]
Recommended for You
- We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here.
Latest News Posts
- Nintendo reveals foldable New 2DS XL for $149
- AMD's new Ryzen Balanced Power Plan drivers are here
- Switch to get 'continuous stream' of third-party games
- Nintendo 3DS isn't going anywhere
- Messenger Lite now available in 150 additional countries
- GIGABYTE Xtreme Gaming XTC700 CPU Cooler Review
- ASRock 990fx Extreme9 and NVMe support
- HDD to SSD
- Lenovo IdeaCentre Y710 Cube Gaming PC Review
- Synology RT2600ac Wireless Router Review
- Get ready for Intel Optane memory with ASRock 200 series motherboards!
- Acer unleashes the Predator Triton 700, a thin yet powerful gaming notebook without compromise
- Acer's new Predator monitors with quantum dot technology deliver spectacular gameplay experiences
- Acer expands its gaming notebook line with the powerful Predator Helios 300
- Western Digital ships fourth-generation Helium Hard Drive platform with Ultrastar He12 12TB advanced storage hard drives