Software Usage Part 1 - Mode Setting
Mode Setting is the second set of options on the left of the main SD window. This is one of the most important parts of the program, the place where users can define which volumes will be protected. Select it and this screen will be shown:
There is a RAM used as Write Cache feature here as well. If your system has an adequate helping of RAM, you can assign a part of it to be used for the SD write cache. The benefits of this are obvious. When the virtual system runs in RAM the whole process will be faster and your protected volumes won't take any write hits until you choose to manually commit data to them (more on that later). This is especially beneficial to devices like SSDs, memory cards, flash sticks etc.
No disk hits also means no disk traces of deleted data left behind. It all stays in RAM and gets flushed at the next reboot, which is perfect for the more paranoid among us. Where is my tinfoil hat...?
When adding a RAM value, remember to always leave enough RAM available for the system. For example: If your system has 4GB of RAM (which translates to 4096MB), you can assign 1024MB for the SD write cache and leave the rest for Windows. If you only have 2GB of RAM installed you should not use this option. In this case leave the RAM cache at zero (default).
When the assigned RAM cache fills-up the program will automatically switch back to disk buffering mode. Personally I keep a close eye on Shadow Defender's RAM cache usage (through the System Status screen), making sure to reboot the system before the RAM cache fills-up completely. This way the program never switches into disk buffering mode and my SSDs don't get any write hits while in Shadow Mode.
Let's return to the Current volume status list. All volumes are ticked by default, ready to be placed in Shadow Mode. It is up to the user to decide which volumes to put under Shadow Mode at any given time; just untick the ones you don't want to protect at this point.
As a rule I usually enable Shadow Mode only for C: in order to protect my Windows partition from any changes. This way I can still save my data on my other volumes and those changes will not be undone when I reboot. I have already moved my User folders to a non-protected volume; so any changes I make to those frequently modified folders will always stick regardless if C: is in Shadow Mode or not. Details on how to move the User folders to a different disk/partition have been provided within the LV/IRS technology introduction article. The introduction contains a comprehensive list of other useful Light Virtualization tips as well.
Once you untick the volumes that you want to exclude from SD protection, you can then click the Schedule button, which will affect all volumes that remain ticked. Two options will drop down. The first one is Enter Shadow Mode on Boot. This option will schedule Shadow Mode to auto-start for all ticked volumes every time the computer starts. Scheduled SD protection for ticked volumes won't kick-in until you restart the computer.
The second option on the Schedule drop-down list is Exit Shadow Mode on Shutdown. This essentially undoes the previous option: It disables the scheduling of Shadow Mode for any ticked volumes.
If you are interested in trying or buying Shadow Defender, you can visit this website.
PRICING: You can find products similar to this one for sale below.
United States: Find other tech and computer products like this over at Amazon's website.
United Kingdom: Find other tech and computer products like this over at Amazon UK's website.
Canada: Find other tech and computer products like this over at Amazon Canada's website.
- Page 1 [Overview and History]
- Page 2 [Program Functionality Analysis]
- Page 3 [The Importance of Multi-Layered System Protection]
- Page 4 [System Requirements, Installation and Registration]
- Page 5 [Software Usage Part 1 - Mode Setting]
- Page 6 [Software Usage Part 2 - Mode Setting Continued]
- Page 7 [Software Usage Part 3]
- Page 8 [Software Usage Part 4]
- Page 9 [Important Shadow Defender Usage Tips - Part 1]
- Page 10 [Important Shadow Defender Usage Tips - Part 2]
- Page 11 [Final Thoughts]
Recommended for You
- We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here.
Latest News Posts
- Star Wars Battlefront, Need for Speed sequels teased
- Corsair One: a new line of tiny, but powerful gaming PCs
- WikiLeaks: Apple Mac, iPhone firmware hacked by CIA
- AMD Ryzen 5 processors hit some retailers, 3 weeks early
- Madcatz delisted from New York Stock Exchange
- NZXT Kraken X42 Liquid CPU Cooler Review
- Corsair ONE Pro SFF Gaming PC Review
- AnyRactive GoTouch Portable Whiteboard Review
- Download "ScanPST.exe tool
- Gamdias Hermes P1 RGB Mechanical Gaming Keyboard Review
- Elgato Stream Deck brings tactile control to live content creation
- COLORFUL wins innovation award from Intel
- Composer Olivier Deriviere pioneers real-time generated interactive music for GET EVEN
- BIOSTAR launches compact high-speed storage solution with M200 M.2 SSD
- EpicGear launches MORPHA X RGB fully modular gaming mouse