Dataman Vali-Flash 4.1 User Manual
Page 2
- 2 -
Introduction
Thank you for purchasing Dataman Vali-Flash for your CompactFlash® validation needs. Dataman Vali-Flash is a PC
based validator designed for calculating the CRC-32
and SHA-1
signatures for CompactFlash® memory cards. Vali-
Flash offers many exciting and advanced features including:
•
Support for complete range of CompactFlash® devices both Type I and Type II with the supplied card reader
•
Signature compatibility with all Dataman Validator products
•
Full database features including search and edit of all records
•
Encrypted database and visual CRC32 checksum to thwart tampering
•
Protected Program File (.exe) to prevent tampering
•
Supports Microsoft Windows® 2000 and XP
•
Full logging to aid in auditing
•
On-the-fly support for resizing/padding images to fit larger CompactFlash® cards while burning new images
•
Better license management featuring online registration
•
Use Vali-Flash without administrative privileges. This option is selected during installation
•
New user-friendly design that incorporates context sensitive help and tool-tips (bubble hints)
•
Fully supported fast USB 2.0 CompactFlash® card reader
Table of Contents
For quick reference to section headers please refer to the page numbers below.
INTRODUCTION .......................................................................................................................................................................................................... 2
QUICK START GUIDE ................................................................................................................................................................................................ 4
.................................................................................................................................................................................................................... 4
Installation – New Install........................................................................................................................................................................................ 4
Installation – Upgrade............................................................................................................................................................................................ 4
Registration............................................................................................................................................................................................................. 5
REGISTRATION – SUPPLEMENTAL INFORMATION ........................................................................................................................................ 6
....................................................................................................................................................................................................... 7
....................................................................................................................................................................................................... 7
MISCELLANEOUS INFORMATION......................................................................................................................................................................... 8
............................................................................................................................................................................. 8
.............................................................................................................................................................. 9
................................................................................................................................................................................................ 9
SOFTWARE OPERATION ........................................................................................................................................................................................ 10
DATABASE OPERATION ......................................................................................................................................................................................... 13
FREQUENTLY ASKED QUESTIONS...................................................................................................................................................................... 16
1
The Dataman CRC-32 algorithm is proprietary to Dataman. This is not the same as the CCITT CRC32 algorithm.
2
The SHA-1 hash algorithm refers to a published standard, please see the Federal Information Processing Standards Publication 180-1: Secure Hash Standard.