Comparison review of Data Copy King and Ninja duplicator
The comparison table will help the potential customer to compare and make a choice with one single sight between Data copy king and Ninja duplicator.
| Data copy king | Ninja | |||
Review results | |||||
General | |||||
Picture | | | |||
Time to market | March 2010 | September 2009 | |||
Price | 1,998USD | 1,590 USD | |||
Target drive | One to one | One to one | |||
Potable design | Stand-alone/ PC connection | Stand alone/PC connection | |||
Drive capacity supported | TB-level hard drives( up to 131072TB) | Mostly target to small capacity hard drives | |||
Drive supported | IDE/SATARAID/external hard drive / SSD / flash storage device with optional adaptor | IDE/SATA | |||
Duplication features | |||||
Coping rate | 7.0GB/min | 4GB/min | |||
Smart drive reset/reboot | Yes | N/A⑨ | |||
Test, wipe repair features | |||||
Data wiping | Yes | Optional(charge $700 to forensic version with hdd test) | |||
Erasing transfer rate | 8.0GB/min | 2-5 GB/min | |||
HDD test | Yes | Optional (charge $400 to ninja kaze together with data wiping) | |||
Data erasing standard | DoD–5220.22-M/PRC– BMB21-2007⑥ | N/A | |||
Test without altering HDD data | Yes | No | |||
Control the imaging process | Yes | Yes | |||
Data recovery features | |||||
Bad sector repair | Yes | N/A | |||
DD image | Available in upgrade | N/A | |||
Clicking noises handling | Yes | N/A | |||
Physical read-only | Yes | Yes | |||
Multi-pass imaging | Yes | Yes | |||
Forensic features | |||||
Access to HPA and doc hidden area | Yes | Yes | |||
Backdoor design ⑩ | N/A | N/A | |||
verification | CRC32 /SHA-256 | CRC | |||
MD5 hash calculation | Available in upgrade | N/A | |||
Log auto generation | Yes | Yes | |||
Log export and print | Yes | N/A | |||
Others | |||||
Touch Screen User Interface | Yes | Yes | |||
User authority | Three-level password | N/A | |||
Language | English (Customable language) | Only English | |||
Upgradable | Free lifelong software upgrade | N/A | |||
Technique support | Free lifelong support | Limited free support | |||
Warranty | One year with 3 year optional | One year |
All the info referred in the review comes from the website of SalvationDATA Technology and JI2.
SalvationDATA Technology
Ji2
⑩ A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.
没有评论:
发表评论