Global Information Lookup Global Information

Target Disk Mode information


Apple G3 iMac booted in Target Mode

Target Disk Mode (sometimes referred to as TDM or Target Mode) is a boot mode unique to Macintosh computers.

When a Mac that supports Target Disk Mode[1] is started with the 'T' key held down, its operating system does not boot. Instead, the Mac's firmware enables its drives to behave as a SCSI, FireWire, Thunderbolt, or USB-C external mass storage device.

A Mac booted in Target Mode can be attached to the port of any other computer, Mac or PC, where it will appear as an external device. Hard drives within the target Mac, for example, can be formatted or partitioned exactly like any other external drive. Some computers will also make their internal CD/DVD drives and other internal and external peripheral hardware available to the host computer.[2]

Target Disk Mode is useful for accessing the contents of a Mac which cannot load its own operating system. Target Disk Mode is the preferred form of old-computer to new-computer interconnect used by Apple's Migration Assistant. Migration Assistant supports Ethernet (wired) or Wi-Fi, which TDM does not. Neither supports USB; however, Thunderbolt-to-Firewire, Thunderbolt-to-Gigabit-Ethernet, and USB-3.0-to-Gigabit-Ethernet adapters are an option when one of the computers does not have Firewire or Thunderbolt.

  1. ^ Apple Inc (16 January 2002). "Target Disk Mode". Apple Developer Connection. Retrieved 13 July 2007.
  2. ^ Griffiths, Rob (March 27, 2007). "Borrow an optical drive from another Mac". Macworld. Retrieved October 21, 2023.

and 25 Related for: Target Disk Mode information

Request time (Page generated in 0.8074 seconds.)

Target Disk Mode

Last Update:

Target Disk Mode (sometimes referred to as TDM or Target Mode) is a boot mode unique to Macintosh computers. When a Mac that supports Target Disk Mode...

Word Count : 1027

TDM

Last Update:

The Yamaha TDM, a motorcycle model Target Disk Mode, a boot mode on certain Macintosh computers Team deathmatch, a mode of gameplay in video games Technical...

Word Count : 176

Disk encryption theory

Last Update:

block cipher in CTR mode to generate the IVs. ESSIV is a method for generating initialization vectors for block encryption to use in disk encryption. The...

Word Count : 3504

Sleep mode

Last Update:

with standby mode, hibernation mode saves the computer's state on the hard disk, which requires no power to maintain, whereas standby mode saves the computer's...

Word Count : 1444

Disk encryption

Last Update:

people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used...

Word Count : 2141

QEMU

Last Update:

cross-compilation and cross-debugging are the main targets for user-mode emulation. System emulation In this mode QEMU emulates a full computer system, including...

Word Count : 3854

History of IBM magnetic disk drives

Last Update:

magnetic disk storage devices from 1956 to 2003, when it sold its hard disk drive business to Hitachi. Both the hard disk drive (HDD) and floppy disk drive...

Word Count : 9377

OS X Lion

Last Update:

software that allows OS X to be installed using the Remote Disk feature. Using Target Disk Mode, users can circumvent this omission. This is replaced by...

Word Count : 6162

SCSI

Last Update:

peripheral devices, best known for its use with storage devices such as hard disk drives. SCSI was introduced in the 1980s and has seen widespread use on servers...

Word Count : 3710

Master boot record

Last Update:

Computing Group (TCG) BIOS extensions in Trusted mode to access otherwise invisible PARTIES partitions, disk image files located via the Boot Engineering...

Word Count : 8699

Mac OS X Leopard

Last Update:

a supported Mac, then installed on an unsupported Mac via Firewire Target Disk Mode. Leopard is only compiled for AltiVec-enabled PowerPC processors (G4...

Word Count : 5132

History of the floppy disk

Last Update:

A floppy disk is a disk storage medium composed of a thin and flexible magnetic storage medium encased in a rectangular plastic carrier. It is read and...

Word Count : 7044

Hard disk drive performance characteristics

Last Update:

Higher performance in hard disk drives comes from devices which have better performance characteristics. These performance characteristics can be grouped...

Word Count : 4180

Secure copy protocol

Last Update:

operate in one of two modes: source mode, which reads files (usually from disk) and sends them back to the client, or sink mode, which accepts the files...

Word Count : 995

VirtualBox

Last Update:

SATA, SCSI and SAS raw disks and partitions SATA disk hotplugging Pass-through mode for solid-state drives Pass-through mode for CD/DVD/BD drives – allows...

Word Count : 4600

Direct memory access

Last Update:

usually sound card 8-bit DMA Floppy disk controller Hard disk (obsoleted by PIO modes, and replaced by UDMA modes), Parallel Port (ECP capable port),...

Word Count : 3889

GUID Partition Table

Last Update:

partitions defined on the target device, the OS may refuse to manipulate the partition table. If the actual size of the disk exceeds the maximum partition...

Word Count : 2924

Symbolic link

Last Update:

link's target, and the file mode bits indicated that the type of the file is a symbolic link. This method was slow and an inefficient use of disk-space...

Word Count : 3884

Context switch

Last Update:

access disk storage, freeing up CPU time for other tasks. Some operating systems also require a context switch to move between user mode and kernel mode tasks...

Word Count : 1885

Commodore 128

Last Update:

there is a CP/M disk in the drive, if there are any C64/C128 cartridges present, or if the Commodore key (which serves as the C64-mode selector) is being...

Word Count : 7351

BitLocker

Last Update:

(XEX)-based Tweaked codebook mode with ciphertext Stealing" (XTS) mode with a 128-bit or 256-bit key. CBC is not used over the whole disk; it is applied to each...

Word Count : 3322

FileVault

Last Update:

Legacy FileVault used the CBC mode of operation (see disk encryption theory); FileVault 2 uses stronger XTS-AES mode. Another issue is storage of keys...

Word Count : 1537

Rootkit

Last Update:

attempts to read the boot sector, and redirected these to elsewhere on the disk, where a copy of the original boot sector was kept. Over time, DOS-virus...

Word Count : 7087

UEFI

Last Update:

on PC-class machines could support booting in legacy BIOS mode from MBR-partitioned disks through the Compatibility Support Module (CSM) that provides...

Word Count : 9773

USB flash drive

Last Update:

supplementary back-ups, and transferring of computer files. Compared with floppy disks or CDs, they are smaller, faster, have significantly more capacity, and...

Word Count : 9396

PDF Search Engine © AllGlobal.net