Working with storage mirroring snapshots, Working with storage mirroring snapshots -17 – HP Storage Mirroring V5 Software User Manual

Page 106

Advertising
background image

14

-

17

the mask corresponds to the attributes of a file.

1.

Each mask begins with 0x. Identify the hexadecimal number after the constant 0x. For example, if the mask is 0x23, then
the hexadecimal number you are interested in is 23. The hexadecimal number may be up to four digits.

2.

Convert the hexadecimal number to its 16-digit binary equivalent. You can use the Windows calculator for this
conversion.

a.

Select

Start

,

Programs

,

Accessories

,

Calculator

.

b.

Switch to scientific view, if it is not already in that view, by selecting

View

,

Scientific

.

c.

Select

Hex

.

d.

Enter the hexadecimal number, for example 23, as specified in your verification log.

e.

Select

Bin

and the hexadecimal number will change to the binary equivalent.

f.

Pad the beginning of the binary equivalent with zeroes (0) so that the number is 16 digits long. For example,
hexadecimal number 23 converts to 100011, so the 16-digit binary equivalent would be 0000000000100011.

3.

Determine what number appears in each position of the binary number. Because binary numbers count from right to
left, start with position 1 on the right. For example, hexadecimal number 23, which converted to 0000000000100011, is
broken out into the following positions.

4.

Using the same chart above, identify those attributes that are enabled by those positions equal to one (1). The positions
equal to zero (0) are disabled and that attribute does not apply. So hexadecimal number 23, which converted to
0000000000100011, indicates read only, hidden, and archive. Another example might be mask 0x827 which converted to
binary is 0000100000100111. Positions 1-3, 6, and 12 are all enabled which indicates the file is read only, hidden, archive,
and compressed.

Working with Storage Mirroring snapshots

A snapshot is an image of data taken at a single point in time. Snapshots allow you to view files and folders as they existed at
points of time in the past, so you can, for example, recover files that were accidentally deleted or overwritten. You could also

Position

(from right to

left)

Sample

Hexadecimal

Number 23

Enter Your

Hexadecimal

Number

Attribute

1

1

Read only

2

1

Hidden

3

0

None

4

0

System

5

0

Directory

6

1

Archive

7

0

Encrypted

8

0

Normal

9

0

Temporary

10

0

Sparse file

11

0

Reparse point

12

0

Compressed

13

0

Offline

14

0

Not content indexed

15

0

None

16

0

None

NOTE:

Files that were replicated with the Replicate NT Security by Name feature enabled, will be identified as different
in the log file because of the local name attribute. The files will be the same.

Advertising
This manual is related to the following products: