Paragon Hard Disk Manager 2010 Suite review
A broad collection of useful utilities that would be an asset to any techie's toolbox
Review Date: 9 Mar 2010
Reviewed By: Darien Graham-Smith
Price when reviewed: £26 (£30 inc VAT)
Features & Design
Value for Money
Ease of Use
The name’s a little vague, but that reflects the breadth of Hard Disk Manager 2010 Suite’s abilities. It offers disk imaging, partition management and resizing, boot repair and configuration, secure deletion and even on-demand backup — all for a comparatively low price.
Of course, it wouldn’t be a good buy if the tools themselves were rubbish, but happily the main features are up to par. Cloning disks is the work of a couple of clicks, and when it comes to imaging you get plenty of options such as encryption, file splitting, and – nicely – filters to include and exclude certain files. New in this version, there’s also support for “hot processing”, using either the Microsoft Volume Shadow Copy Service or Paragon’s own technology, so you can image a drive that’s in use.
And crucially, when you come to restore an image, partitions and drives can be resized on the fly to suit the destination — a feature typically missing from freeware imaging software.
As with Norton Ghost, images don’t have to be of entire disks or partitions: you can create a backup image that contains only specific files and folders. These can be saved to a local or network drive, or, as with previous Paragon products, stored in a hidden partition dubbed the “backup capsule”. It lacks the versatility of a dedicated backup service, but for what it is it works well.
The supporting tools are well-conceived too. Plug in a hard disk containing a Windows installation from a different machine and the “Adjust OS” utility will update the drivers so the drive can be booted on the host PC. If the OS still won’t start up, the boot corrector can fix problems with the MBR, partition table or BCD.
- Diaspora: we can't stop spread of beheading videos
- Sony Xperia Z3 specs leak online
- iPhone 6 and iPhone 6L pictures leak online
- Bug hunters paid to target Oculus Rift
- Meet the "scarecrows" and "snipers" slaying Twitter spam
- Google gets one million DMCA piracy takedowns a day
- What's on this week's PC Pro podcast?
- Twitter bans beheading video, lets family members remove death photos
- HTC launches One M8 for Windows... but only in the US
- Nokia Lumia 530 UK release date and price revealed
- 20 years of PC Pro: our greatest review mistakes
- 20 years of PC Pro: our first A-List
- Wikipedia's "right to be forgotten" protest hits the wrong note
- 3D printing hits the high street for plastic selfies
- 20 years of PC Pro: What amazed us in our first issue
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Windows Easy Transfer – not so "easy" in Windows 8.1
- Formula 1: what a difference virtualisation makes
- Office of the future: comfy chairs and tablets everywhere
- What’s the best 4G network in the UK?
- How to set up a wireless hotspot for your business: give customers free or paid for internet access
- How to download YouTube videos: save YouTube videos to your iPhone, iPad, laptop or Android device
- How to access iCloud on a PC
- Nexus 5 vs Moto G 4G (2014 model)
- Chromecast vs Roku Streaming Stick vs Apple TV: what's the best TV streaming device?
- The 8 best small tablets of 2014: what's the best compact tablet?
- How to edit PDFs: make change to a PDF
- Building a patently better future
- How to update Android apps individually: stop Google Play apps from auto-updating
- 10 ways to make your business more secure
- Top five VoIP mistakes
- How to add in-app purchasing to an iPhone, Android or Windows app
- Remote-control ransomware: TeamViewer and software hardball
- Why laptops with serial ports matter to the Internet of Things
- Make your mobile battery last longer
- Small steps into handling Big Data
- Nexus 5: does it really run stock Android?
- How to get broadband to a garden office
- How to write your company's IT security policy