Comparison review of Data Copy King and Ninja duplicator
The comparison table will help the potential customer to compare and make a choice with one single sight between Data copy king and Ninja duplicator.
| 
 
 
 | Data copy king | Ninja | |||
| Review results | |||||
| General | |||||
| Picture |  |  | |||
| Time to market | March 2010 | September 2009 | |||
| Price | 1,998USD | 1,590 USD | |||
| Target drive | One to one | One to one | |||
| Potable design   | Stand-alone/ PC connection |  Stand alone/PC connection | |||
| Drive capacity supported | TB-level hard drives( up to 131072TB) | Mostly target to small capacity hard drives | |||
| Drive supported | IDE/SATARAID/external hard drive / SSD / flash   storage  device with optional adaptor | IDE/SATA | |||
| Duplication features | |||||
| Coping rate | 7.0GB/min | 4GB/min | |||
| Smart drive reset/reboot  | Yes | N/A⑨ | |||
| Test, wipe repair features | |||||
| Data wiping | Yes | Optional(charge $700 to forensic version with hdd test) | |||
| Erasing transfer rate | 8.0GB/min | 2-5 GB/min | |||
| HDD test | Yes | Optional (charge $400 to ninja kaze together with data   wiping) | |||
| Data erasing standard | DoD–5220.22-M/PRC– BMB21-2007⑥ | N/A | |||
| Test without altering HDD data | Yes | No | |||
| Control the imaging process | Yes | Yes | |||
| Data recovery features | |||||
| Bad sector repair | Yes | N/A | |||
| DD image | Available in upgrade | N/A | |||
| Clicking noises handling | Yes | N/A | |||
| Physical read-only | Yes | Yes | |||
| Multi-pass imaging | Yes | Yes | |||
| Forensic features | |||||
| Access to HPA and doc hidden   area | Yes | Yes | |||
| Backdoor design ⑩ | N/A | N/A | |||
| verification | CRC32 /SHA-256 | CRC | |||
| MD5 hash calculation | Available in upgrade | N/A | |||
| Log auto generation | Yes | Yes | |||
| Log export and print | Yes | N/A | |||
| Others | |||||
| Touch Screen User Interface | Yes | Yes | |||
| User authority | Three-level password | N/A | |||
| Language | English (Customable language) | Only English | |||
| Upgradable | Free lifelong software upgrade | N/A | |||
| Technique support | Free lifelong support | Limited free support | |||
| Warranty | One year with 3 year optional | One year | |||
All the info referred in the review comes from the website of SalvationDATA Technology and JI2.
SalvationDATA Technology          
Ji2           
⑩ A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.
 
 
没有评论:
发表评论