Jump to content

Acronis True Image

From Wikipedia, the free encyclopedia
(Redirected from .tib)
Acronis True Image
Original author(s)Acronis
Stable release
  • Build #41393 (Windows)
  • Build #41396 (Mac)
/ July 16, 2024; 3 months ago (2024-07-16)[1]
Operating system
PlatformIA-32 and x86-64
Available inEnglish, French, German, Japanese, Italian, Spanish, Russian, Korean, Chinese Traditional, Chinese Simplified, Indonesian, Portuguese, Dutch
TypeData protection and backup software
LicenseProprietary software
Websitewww.acronis.com/en-us/products/true-image//

Acronis True Image is a proprietary backup, imaging, cloning and cybersecurity suite developed by Acronis International GmbH.[3] It can back up files, data, clone storage media and protects the system from ransomware.[4][5] In 2021, the product was renamed to Acronis Cyber Protect Home Office before being renamed back to True Image in 2024.[6][7]

Backup and restoration

[edit]

The product can back up a computer, selected disks or selected files to a local location or to a data center operated by Acronis.[3] Data is stored within a proprietary image file.

Backup

[edit]

Local backup

[edit]

It can create two types of backup archives: (1) files and folder backups (which consist of user-specified files and directories (but not the metadata of the disk or partition)) and (2) full system images (which consist of files, directories and disk metadata).

The software can perform full, differential and incremental backups:

  • Full: Creates a new backup archive every time and backs up everything specified by the user.
  • Differential: Backups only backup the changes made since the latest full backup.
  • Incremental: Only backs up the changes made since the last incremental backup. Incremental backups are a chain and loss of any one of the incremental backups renders the entire backup useless.[8]

Cloud backup

[edit]

Users can specify to store their backup archives in Acronis's data centers around the globe.[9]

Restoration

[edit]

Acronis True Image allows users to restore files from a full disk or a file-based archive using either a preinstallation media with Acronis on it or from within the user interface of the program.[10]

File system support

[edit]

The software can create full disk backup archives of several file systems including: NTFS (Windows); FAT32 (Windows 9x and removable media); Macintosh systems (HFS+ and APFS) and Linux systems (ext2, ext3, ext4; ReiserFS, and Linux Swap).[3] Acronis uses sector-by-sector copy when a non-supported filesystem is backed up.[11]

Encryption

[edit]

The backup archives can be encrypted to reduce the risk of unauthorized access using either: none, 128, 192, or 256-bit AES encryption.[12] On modern systems, higher bit encryption algorithms do not noticeably impact backup or restoration performance rendering the selection of weaker options pointless.[12]

Technical limitations

[edit]

Managing backup archives created using the Acronis Cyber Protect Home Office software can be challenging for expert users who want to use it in conjunction with other software to manage their backups.[8] The software does not recognize when backups have been deleted using external software.

The compatibility of backup archives is not guaranteed between products that are not within the same version.[13]

File format

[edit]

Prior to Acronis True Image 2020, the file format used for storing backup image or file data was the True Image Backup file format (TIB).[12] True Image 2020 added an additional format: TIBX that provides additional functionality.[6]

TIB

[edit]

The TIB (.tib) file format is used for storing the backup image data for all True Image versions especially prior to True Image 2020.[6]

The TIB file can be forensically identified by looking for a file signature of CE 24 B9 A2 20 00 00 00 or B4 6E 68 44.[14]

TIBX

[edit]

The TIBX file format, added in Acronis True Image 2020, addresses limitations with the TIB format such as replacing the MD5 hashed password with another mechanism to mitigate brute force attacks.[12]

Disk cloning

[edit]

The product supports cloning the contents of a SATA or NVMe storage media to another. The product will adjust the size of the partition(s) to ensure that they fit on the destination storage device.

Some hard disk manufacturers (including Western Digital,[15] Crucial and Seagate[16]) provide customized variants of Acronis True Image with their drives that allows the user to clone their existing disk to another disk but with the caveat that the disks typically have to be of the same manufacturer.

Cybersecurity

[edit]

In 2016, active ransomware countermeasures, blockchain-based notary services, and electronic signing (premium version only) were added to the product.

In 2020, security features (i.e., integrated advanced anti-malware features including real-time protection, vulnerability assessment, anti-virus scans, web filtering, and videotelephony app protection) were integrated into the product.

Naming

[edit]

Prior to Acronis True Image 9, their business-focused product Acronis Backup or Acronis Cyber Protect shared the same name as their home product (i.e., True Image) with the minor exception that the business versions were called Acronis True Image Server. Later server backup software was renamed Acronis Backup.

In 2021 Acronis renamed the home product to Acronis Cyber Protect Home Office. It was renamed back to True Image in 2024.[6][7]

See also

[edit]

References

[edit]
  1. ^ "Product Updates". www.acronis.com.
  2. ^ Windows 11 Support in Acronis Products | Knowledge Base|website=kb.acronis.com|accessdate= 22 Nov. 2021}}
  3. ^ a b c "Acronis True Image Review 2023: Is the High Cost Worth It?". Website Planet. 2021-05-10. Retrieved 2023-12-20.
  4. ^ Alawida, Moatsum; Omolara, Abiodun Esther; Abiodun, Oludare Isaac; Al-Rajab, Murad (2022-11-01). "A deeper look into cybersecurity issues in the wake of Covid-19: A survey". Journal of King Saud University - Computer and Information Sciences. 34 (10, Part A): 8176–8206. doi:10.1016/j.jksuci.2022.08.003. ISSN 1319-1578. PMC 9367180.
  5. ^ Alsagoff, Syed Nasir (2010). Malware self protection mechanism issues in conducting malware behaviour analysis in a virtual environment as compared to a real environment. 2010 International Symposium on Information Technology. Vol. 3. pp. 1326–1331. doi:10.1109/ITSIM.2010.5561600. Retrieved 2024-08-11 – via IEEE Xplore.
  6. ^ a b c d "TIB File - What is a .tib file and how do I open it?". fileinfo.com. Retrieved 2024-08-11.
  7. ^ a b "Acronis True Image returns: Reintroducing - ProQuest". Retrieved 2024-08-11.
  8. ^ a b Stone, W. Ross (2015). "Changing Backup Software [From the Screen of Stone]". IEEE Antennas and Propagation Magazine. 57 (6): 178–179. Bibcode:2015IAPM...57..178S. doi:10.1109/map.2015.2480085. Retrieved 2023-12-20.
  9. ^ Gill, Arshpreet Kaur; Zavarsky, Pavol; Swar, Bobby (2021). Automation of Security and Privacy Controls for Efficient Information Security Management. 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC). pp. 371–375. doi:10.1109/ICSCCC51823.2021.9478126. Retrieved 2024-08-11.
  10. ^ Warner, Gary; Nagy, Mike; Jones, Kyle; Mitchem, Kevin (2014-05-29). "Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus". Annual ADFSL Conference on Digital Forensics, Security and Law.
  11. ^ "Creating a Sector-By-Sector Backup with Acronis Products". Acronis Knowledge Base. Retrieved 15 June 2017.
  12. ^ a b c d "Targeting Backup Encryption: Acronis, Macrium, and Veeam". ElcomSoft blog. 2022-01-06. Retrieved 2024-08-11.
  13. ^ "Backup archive compatibility across different product versions". kb.acronis.com. Retrieved 2024-08-11.
  14. ^ "File Signatures". www.garykessler.net. Retrieved 2024-08-11.
  15. ^ "WD Support". Support.wdc.com. 2012-02-05. Archived from the original on 2014-11-18. Retrieved 2014-11-24.
  16. ^ "Seagate DiscWizard". Acronis.com. Retrieved 2016-02-20.