ACCOUNT LOGIN
A Brief History of Reboot to Restore Technology

A Brief History of Reboot to Restore Technology

Reboot to Restore TechnologyWhat’s the first thing you’re told to do if something goes wrong with your computer? Reboot it. Sometimes it can be this simple. Other times, not so much.

Reboot to Restore technology takes this concept to a whole new level. They are designed so that you don’t have to fix the system after settings get changed. When used correctly, a simple reboot will return your entire computer back to its original shape.

This goal can be reached in a number of ways:

  1. Disk Imaging Technology
    The entire hard drive or a specific partition can be overwritten with a new image. Once reimaged, the computer boots as brand new. The all of the hard drive sectors get completely overwritten.
  2. Buffer File
    Changes are not being written to the hard drive permanently, but rather to a huge file on the hard drive. This huge file serves as a buffer. It lets you decide what changes get written to the drive permanently, and which ones won’t.
  3. Virtual Machine
    Similar to a Buffer File is a virtualization approach. In this case the entire client VM can be reset. This allows for a reboot into the original settings.
  4. File Synchronization
    A master (perfect) snapshot of files is compared with what’s available on the computer and any files that have changed are rewritten.
  5. Block Level Protection
    Unlike other technologies, this approach doesn’t work with individual files. Instead it works with specific sectors on the hard drive. Entire sectors are protected, so no changes stick to those protected partitions. This allows for fresh image upon restart.
  6. Read Only File Systems
    Some operating systems allow for mounting file systems in read only mode. When a file system is attached this way, no changes can be saved to this partition.
  7. Hardware Solutions
    This is an physical card that plugs into the motherboard. It serves as a “read only” switch for a specific hard drive. Remember those 3.5″ disks from years ago? You could “write-protect” those by locking the pin. This card works the same way.

Stay tuned for the next segment where I’ll start to discuss the pros and cons of each of these solutions.

About The Author

Dmitry Shesterin

Dmitry has done everything. From sales and marketing in mobile telecommunications and printing (in Russia and Germany) to sales engineer and marketing lead (at Faronics). Dmitry has an unrivaled love of Excel and his sense of humor resembles Ambrose Bierce, his favorite writer.

Sign Up For A 30-Day Trial

BOXAE

Deep Freeze Enterprise

Centralized deployment and management as well as a host of configuration options for the Enterprise.

  • This field is for validation purposes and should be left unchanged.

Ready to find out more about Faronics? Let us know how to reach you.

We're here to help you in any way possible.