Boot Wizard hidden swap partition Novell DOS secured Solaris boot NTFT Corrupted FAT16 volume RISC boot loader single-volume large small MBR DBR FAT extended virtual disk manager DOS secured extended partition

Files Recovery Software
Home Contact Details Customer Support Download Demo Products  

 
 

File system Indicator  Byte in Hexadecimal

Partition/ File system Description

b8H

BSDI BSD/386 swap partition (secondarily file system)
(BSDI (Berkeley Software Design, Inc.) was founded by former CSRG (UCB Computer Systems Research Group) members. Their operating system, based on Net/2, was called BSD/386.)

bbH

Boot Wizard hidden

beH

Solaris 8 boot partition

c0H

DR-DOS/Novell DOS secured partition

C0H

CTOS

c0H

REAL/32 secure small partition

c0H

NTFT Partition

c1H

DR DOS 6.0 LOGIN.EXE-secured 12-bit FAT partition

c2H

Reserved for DR-DOS 7+

c2H

Hidden Linux

c3H

Hidden Linux swap

c4H

DR DOS 6.0 LOGIN.EXE-secured 16-bit FAT partition

c5H

DRDOS/secured (Extended)

c6H

DRDOS/secured (FAT-16, >= 32M)
(DR-DOS 6.0 will add C0H to the partition type for a LOGIN.EXE - secured partition so that User can not avoid the password check by booting from an MS-DOS floppy. Otherwise it seems that the types C1H, C4H, C5H, C6H and D1H, D4H, D5H, D6H are used precisely like 1H, 4H, 5H, and 6H.)

c6H

Corrupted FAT16 volume/stripe set (Windows NT)
(NTFS will add C0H to the partition type for disabled parts of a Fault Tolerant set. Thus, one gets types C6H, C7H.)

c7H

Windows NT corrupted NTFS volume/stripe set

c7H

Syrinx boot

c8H

Officially listed as Reserved

c9H

Officially listed as Reserved

caH

Officially listed as Reserved

cbH

Reserved for DR-DOS secured FAT32

ccH

Reserved for DR-DOS secured FAT32 (LBA)

cdH

CTOS Memdump

ceH

Reserved for DR-DOS secured FAT16 (LBA)

d0H

REAL/32 secure big partition
(REAL/32 is a continuation of DR Multi-user DOS.)

d1H

Old Multi-user DOS secured FAT12

d4H

Old Multi-user DOS secured FAT16 <32M

d5H

Old Multi-user DOS secured extended partition

d6H

Old Multi-user DOS secured FAT16 >=32M

d8H

CP/M-86

daH

Non-FS Data

dbH

Digital Research CP/M, Concurrent CP/M, Concurrent DOS

dbH

CTOS (Convergent Technologies OS -Unisys)

dbH

KDG Telemetry SCPU boot
(KDG Telemetry uses ID DBH to store a protected-mode binary image of the code to be run on a 'x86-based SCPU (Supervisory CPU) module from the DT800 range.)

ddH

Hidden CTOS Memdump

deH

Dell PowerEdge Server utilities (FAT)

dfH

DG/UX virtual disk manager partition

dfH

BootIt EMBRM
(The boot manager BootIt manages its own partition table, with up to 255 primary partitions.)

e0H

Reserved by ST Microelectronics for a file system called ST AVFS.

e1H

DOS access or SpeedStor 12-bit FAT extended partition
(It is a SSTOR partition on cylinders more than 1023.)

E2H

DOS Read-Only

e3H

Storage Dimensions

e4H

SpeedStor 16-bit FAT extended partition < 1024 cylinders

e5H

Officially listed as Reserved

e5H

Tandy DOS with logical sectored FAT

e6H

Officially listed as Reserved

ebH

BeOS BFS (BFS1)
(BeOS is an operating system that runs on Power PCs)

edH

Reserved for Matthias Paul’s Sprytix

eeH

Indication that this legacy MBR is followed by an EFI Header

efH

Partition that contains an EFI file system

f0H

Linux/PA-RISC boot loader

f1H

Storage Dimensions

f2H

DOS 3.3+ secondary partition

f2H

Unisys DOS with logical sectored FAT

f3H

Officially listed as Reserved

f4H

SpeedStor large partition

F4H

Prologue single-volume partition



Previous page

page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20


page 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35

Next page
 
 
Data Recovery Book
 
Chapter 1 An Overview of Data Recovery
Chapter 2 Introduction of Hard Disks
Chapter 3 Logical Approach to Disks and OS
Chapter 4 Number Systems
Chapter 5 Introduction of C Programming
Chapter 6 Introduction to Computer Basics
Chapter 7 Necessary DOS Commands
Chapter 8 Disk-BIOS Functions and Interrupts Handling With C
Chapter 9 Handling Large Hard Disks
Chapter 10 Data Recovery From Corrupted Floppy
Chapter 11 Making Backups
Chapter 12 Reading and Modifying MBR with Programming
Chapter 13 Reading and Modifying DBR with Programming
Chapter 14 Programming for “Raw File” Recovery
Chapter 15 Programming for Data Wipers
Chapter 16 Developing more Utilities for Disks
Appendix Glossary of Data Recovery Terms
 
 
Pro Data Doctor

Home

Products

Contact Details

Customer Support

Download Demo

Terms and Conditions

 
Pro Data Doctor