Verification Algorithm

Discussion in 'Acronis True Image Product Line' started by writedom, Dec 28, 2006.

Thread Status:
Not open for further replies.
  1. writedom

    writedom Registered Member

    Joined:
    Feb 7, 2006
    Posts:
    57
    What type of verification algorithm is used to check the backup files? It it CRC, MD5, etc.?

    I am curious to know how much corruption if any is allowed by the verification proccess.
     
  2. seekforever

    seekforever Registered Member

    Joined:
    Oct 31, 2005
    Posts:
    4,751
    Don't know the algorithm but I would say no corruption is allowed - there is no way of knowing whether a bad bit is in an important area or a meaningless portion of the archive.
     
  3. foghorne

    foghorne Registered Member

    Joined:
    Sep 27, 2005
    Posts:
    1,389
    Location:
    Leeds, Great Britain
    Zero corruption.

    F.
     
  4. shieber

    shieber Registered Member

    Joined:
    Oct 27, 2004
    Posts:
    3,710
    Isn't is just based on checksums put into the backup file? While corruption is highly improbable, it's not actually ruled out. And there's no comparison to the original source data except, perhaps, when the checksums are created. The only way to guaranty every bit would be to have a way to compare every bit against a standard -- such as the original data or a second copy -- generally an ungainly and impractical method of data verification.
     
  5. seekforever

    seekforever Registered Member

    Joined:
    Oct 31, 2005
    Posts:
    4,751
    The checksum method could be MD5 or CRC etc. You are right, it is not totally ruled out and the most obvious problem is hardware.
     
  6. Acronis Support

    Acronis Support Acronis Support Staff

    Joined:
    Apr 28, 2004
    Posts:
    25,885
Thread Status:
Not open for further replies.