From 59cc0005a3f654ebdcedc689eeb486c7c1a00200 Mon Sep 17 00:00:00 2001 From: Kenneth Skovhede Date: Fri, 29 Jan 2016 10:47:39 +0100 Subject: Removed unused references and updated most libraries to come from NuGet sources instead of being provided in the thirdparty library --- thirdparty/AWS SDK/AWSSDK.dll | Bin 6146048 -> 0 bytes thirdparty/CoCoL/CoCoL.dll | Bin 61952 -> 0 bytes thirdparty/Json.NET/Newtonsoft.Json.dll | Bin 430080 -> 0 bytes thirdparty/MegaApi/MegaApiClient.dll | Bin 57856 -> 0 bytes thirdparty/SSH.NET/Renci.SshNet.dll | Bin 420352 -> 0 bytes thirdparty/SSH.NET/Upgrade-readme.txt | 7 - thirdparty/SharpAESCrypt/SharpAESCrypt.exe | Bin 20992 -> 0 bytes .../WindowsAzureStorage/Microsoft.Data.Edm.dll | Bin 659120 -> 0 bytes .../WindowsAzureStorage/Microsoft.Data.OData.dll | Bin 1518256 -> 0 bytes .../Microsoft.Data.Services.Client.dll | Bin 659120 -> 0 bytes .../Microsoft.WindowsAzure.Configuration.dll | Bin 17560 -> 0 bytes .../Microsoft.WindowsAzure.Storage.dll | Bin 928400 -> 0 bytes thirdparty/agsXMPP/agsXMPP.dll | Bin 532480 -> 0 bytes thirdparty/alphavss/Bin/AlphaFS.XML | 6780 ----------------- thirdparty/alphavss/Bin/AlphaFS.dll | Bin 270336 -> 0 bytes thirdparty/alphavss/Bin/AlphaFS.dll.config | 3 - thirdparty/alphavss/Bin/AlphaVSS.Common.dll | Bin 73216 -> 0 bytes thirdparty/alphavss/Bin/AlphaVSS.Common.dll.config | 3 - thirdparty/alphavss/Bin/AlphaVSS.Common.xml | 8009 -------------------- thirdparty/alphavss/platform/AlphaVSS.51.x86.dll | Bin 176128 -> 0 bytes thirdparty/alphavss/platform/AlphaVSS.52.x64.dll | Bin 223744 -> 0 bytes thirdparty/alphavss/platform/AlphaVSS.52.x86.dll | Bin 190464 -> 0 bytes thirdparty/alphavss/platform/AlphaVSS.60.x64.dll | Bin 243712 -> 0 bytes thirdparty/alphavss/platform/AlphaVSS.60.x86.dll | Bin 208384 -> 0 bytes 24 files changed, 14802 deletions(-) delete mode 100644 thirdparty/AWS SDK/AWSSDK.dll delete mode 100755 thirdparty/CoCoL/CoCoL.dll delete mode 100755 thirdparty/Json.NET/Newtonsoft.Json.dll delete mode 100644 thirdparty/MegaApi/MegaApiClient.dll delete mode 100644 thirdparty/SSH.NET/Renci.SshNet.dll delete mode 100644 thirdparty/SSH.NET/Upgrade-readme.txt delete mode 100755 thirdparty/SharpAESCrypt/SharpAESCrypt.exe delete mode 100644 thirdparty/WindowsAzureStorage/Microsoft.Data.Edm.dll delete mode 100644 thirdparty/WindowsAzureStorage/Microsoft.Data.OData.dll delete mode 100644 thirdparty/WindowsAzureStorage/Microsoft.Data.Services.Client.dll delete mode 100644 thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Configuration.dll delete mode 100644 thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Storage.dll delete mode 100644 thirdparty/agsXMPP/agsXMPP.dll delete mode 100755 thirdparty/alphavss/Bin/AlphaFS.XML delete mode 100755 thirdparty/alphavss/Bin/AlphaFS.dll delete mode 100755 thirdparty/alphavss/Bin/AlphaFS.dll.config delete mode 100755 thirdparty/alphavss/Bin/AlphaVSS.Common.dll delete mode 100644 thirdparty/alphavss/Bin/AlphaVSS.Common.dll.config delete mode 100755 thirdparty/alphavss/Bin/AlphaVSS.Common.xml delete mode 100755 thirdparty/alphavss/platform/AlphaVSS.51.x86.dll delete mode 100755 thirdparty/alphavss/platform/AlphaVSS.52.x64.dll delete mode 100755 thirdparty/alphavss/platform/AlphaVSS.52.x86.dll delete mode 100755 thirdparty/alphavss/platform/AlphaVSS.60.x64.dll delete mode 100755 thirdparty/alphavss/platform/AlphaVSS.60.x86.dll (limited to 'thirdparty') diff --git a/thirdparty/AWS SDK/AWSSDK.dll b/thirdparty/AWS SDK/AWSSDK.dll deleted file mode 100644 index 0f4caf8f6..000000000 Binary files a/thirdparty/AWS SDK/AWSSDK.dll and /dev/null differ diff --git a/thirdparty/CoCoL/CoCoL.dll b/thirdparty/CoCoL/CoCoL.dll deleted file mode 100755 index b12a69b36..000000000 Binary files a/thirdparty/CoCoL/CoCoL.dll and /dev/null differ diff --git a/thirdparty/Json.NET/Newtonsoft.Json.dll b/thirdparty/Json.NET/Newtonsoft.Json.dll deleted file mode 100755 index 6bc6b887f..000000000 Binary files a/thirdparty/Json.NET/Newtonsoft.Json.dll and /dev/null differ diff --git a/thirdparty/MegaApi/MegaApiClient.dll b/thirdparty/MegaApi/MegaApiClient.dll deleted file mode 100644 index 96764caa8..000000000 Binary files a/thirdparty/MegaApi/MegaApiClient.dll and /dev/null differ diff --git a/thirdparty/SSH.NET/Renci.SshNet.dll b/thirdparty/SSH.NET/Renci.SshNet.dll deleted file mode 100644 index dd776d0d7..000000000 Binary files a/thirdparty/SSH.NET/Renci.SshNet.dll and /dev/null differ diff --git a/thirdparty/SSH.NET/Upgrade-readme.txt b/thirdparty/SSH.NET/Upgrade-readme.txt deleted file mode 100644 index fb079c6b7..000000000 --- a/thirdparty/SSH.NET/Upgrade-readme.txt +++ /dev/null @@ -1,7 +0,0 @@ -The file Renci.SshNet has been signed with Signer.exe to give it a strong name. -If you want to upgrade Renci.SshNet to a new version, please run: - -Signer.exe -k Duplicati.snk -a Renci.SshNet -outdir out - -Unfortunately, this gives errors with the "dynamic" keyword, -so you must use the .Net 3.5 version. \ No newline at end of file diff --git a/thirdparty/SharpAESCrypt/SharpAESCrypt.exe b/thirdparty/SharpAESCrypt/SharpAESCrypt.exe deleted file mode 100755 index 7501d33d1..000000000 Binary files a/thirdparty/SharpAESCrypt/SharpAESCrypt.exe and /dev/null differ diff --git a/thirdparty/WindowsAzureStorage/Microsoft.Data.Edm.dll b/thirdparty/WindowsAzureStorage/Microsoft.Data.Edm.dll deleted file mode 100644 index 12d07d3b7..000000000 Binary files a/thirdparty/WindowsAzureStorage/Microsoft.Data.Edm.dll and /dev/null differ diff --git a/thirdparty/WindowsAzureStorage/Microsoft.Data.OData.dll b/thirdparty/WindowsAzureStorage/Microsoft.Data.OData.dll deleted file mode 100644 index 884b52a61..000000000 Binary files a/thirdparty/WindowsAzureStorage/Microsoft.Data.OData.dll and /dev/null differ diff --git a/thirdparty/WindowsAzureStorage/Microsoft.Data.Services.Client.dll b/thirdparty/WindowsAzureStorage/Microsoft.Data.Services.Client.dll deleted file mode 100644 index 65c265c4b..000000000 Binary files a/thirdparty/WindowsAzureStorage/Microsoft.Data.Services.Client.dll and /dev/null differ diff --git a/thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Configuration.dll b/thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Configuration.dll deleted file mode 100644 index c5e779735..000000000 Binary files a/thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Configuration.dll and /dev/null differ diff --git a/thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Storage.dll b/thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Storage.dll deleted file mode 100644 index 9079214f7..000000000 Binary files a/thirdparty/WindowsAzureStorage/Microsoft.WindowsAzure.Storage.dll and /dev/null differ diff --git a/thirdparty/agsXMPP/agsXMPP.dll b/thirdparty/agsXMPP/agsXMPP.dll deleted file mode 100644 index 3513792b6..000000000 Binary files a/thirdparty/agsXMPP/agsXMPP.dll and /dev/null differ diff --git a/thirdparty/alphavss/Bin/AlphaFS.XML b/thirdparty/alphavss/Bin/AlphaFS.XML deleted file mode 100755 index dac372e63..000000000 --- a/thirdparty/alphavss/Bin/AlphaFS.XML +++ /dev/null @@ -1,6780 +0,0 @@ - - - - AlphaFS - - - - - Specifies the type of a file. - - - - - The type of the specified file is unknown. - - - - - The specified file is a disk file. - - - - - The specified file is a character file, typically an LPT device or a console. - - - - - The specified file is a socket, a named pipe, or an anonymous pipe. - - - - - Unused. - - - - - Represents information about free and used space on a disk. - - - - - Initializes the structure - - The free bytes available - The total number of bytes - The total number of free bytes - - - - Indicates whether this instance and a specified object are equal. - - Another object to compare to. - - true if and this instance are the same type and represent the same value; otherwise, false. - - - - - Returns the hash code for this instance. - - - A 32-bit signed integer that is the hash code for this instance. - - - - - Implements the operator ==. - - A. - B. - The result of the operator. - - - - Implements the operator !=. - - A. - B. - The result of the operator. - - - - Gets or sets the free bytes available. - - The free bytes available. - - - - Gets or sets the total number of bytes. - - The total number of bytes. - - - - Gets or sets the total number of free bytes. - - The total number of free bytes. - - - - Represents information about a volume. - - - - - Gets the name of the volume. - - The name of the volume. - - - - Gets a value indicating whether the file system preserves the case of file names when it places a name on disk.. - - true if the file system preserves the case of file names when it places a name on disk.]; otherwise, false. - - - - Gets a value indicating whether the file system supports case-sensitive file names.. - - - true if the file system supports case-sensitive file names; otherwise, false. - - - - - Gets a value indicating whether the file system supports file-based compression. - - - true if the file system supports file-based compression; otherwise, false. - - - - - Gets a value indicating whether the file system supports named streams. - - - true if the file system supports named streams; otherwise, false. - - - - - Gets a value indicating whether the file system preserves and enforces access control lists (ACL). - - - true if the file system preserves and enforces access control lists (ACL); otherwise, false. - - For example, the NTFS file system preserves and enforces ACLs, and the FAT file system does not. - - - - Gets a value indicating whether the specified volume is read-only.. - - - true if the specified volume is read-only.; otherwise, false. - - This value is not supported on Windows 2000/NT and Windows Me/98/95. - - - - Gets a value indicating whether the file system supports the Encrypted File System (EFS). - - true if the file system supports the Encrypted File System (EFS); otherwise, false. - - - - Gets a value indicating whether the file system supports object identifiers. - - - true if the file system supports object identifiers; otherwise, false. - - - - - Gets a value indicating whether he file system supports re-parse points. - - - true if he file system supports re-parse points; otherwise, false. - - - - - Gets a value indicating whether the file system supports sparse files. - - true if the file system supports sparse files; otherwise, false. - - - - Gets a value indicating whether the file system supports Unicode in file names as they appear on disk. - - - true if the file system supports Unicode in file names as they appear on disk; otherwise, false. - - - - - Gets a value indicating whether the specified volume is a compressed volume, for example, a DoubleSpace volume. - - - true if the specified volume is a compressed volume; otherwise, false. - - - - - Gets a value indicating whether the file system supports disk quotas. - - true if the file system supports disk quotas; otherwise, false. - - - - Gets the volume serial number that the operating system assigns when a hard disk is formatted. - - The volume serial number that the operating system assigns when a hard disk is formatted. - - - - Gets the maximum length of a file name component that the file system supports. - - The maximum length of a file name component that the file system supports. - - - - Gets the name of the file system, for example, the FAT file system or the NTFS file system. - - The name of the file system. - - - - Specifies how the operating system should open a file. - - - - - None of the options specified. - - - - - The file should be archived. Applications use this attribute to mark files for backup or removal. - - - - - The file or directory is encrypted. For a file, this means that all data in the file is encrypted. For a directory, this means that encryption is the default for newly created files and subdirectories. - - - - - The file is hidden. Do not include it in an ordinary directory listing. - - - - - The file does not have other attributes set. This attribute is valid only if used alone. - - - - - The data of a file is not immediately available. This attribute indicates that file data is physically moved to offline storage. This attribute is used by Remote Storage, the hierarchical storage management software. Applications should not arbitrarily change this attribute. - - - - - The file is read only. Applications can read the file, but cannot write to or delete it. - - - - - The file is part of or used exclusively by an operating system. - - - - - The file is being used for temporary storage. - - - - - The file is being opened or created for a backup or restore operation. The system ensures that the calling process - overrides file security checks when the process has SE_BACKUP_NAME and SE_RESTORE_NAME privileges. - You must set this flag to obtain a handle to a directory. A directory handle can be passed to some functions instead of a file handle. - - - - - The file is to be deleted immediately after all of its handles are closed, which includes the specified handle and any other open or duplicated handles. - If there are existing open handles to a file, the call fails unless they were all opened with the share mode. - Subsequent open requests for the file fail, unless the share mode is specified. - - - - - There are strict requirements for successfully working with files opened with the flag, for - details see the section on "File Buffering" in the online MSDN documentation. - - - - - The file data is requested, but it should continue to be located in remote storage. It should not be transported back to local storage. This flag is for use by remote storage systems. - - - - - Normal reparse point processing will not occur; an attempt to open the reparse point will be made. - When a file is opened, a file handle is returned, whether or not the filter that controls the reparse - point is operational. See MSDN documentation for more information. - - - - - The file or device is being opened or created for asynchronous I/O. - - - - - Access will occur according to POSIX rules. This includes allowing multiple files with names, differing only in case, for file systems that support that naming. Use care when using this option, because files created with this flag may not be accessible by applications that are written for MS-DOS or 16-bit Windows. - - - - - Access is intended to be random. The system can use this as a hint to optimize file caching. - - - - - Access is intended to be sequential from beginning to end. The system can use this as a hint to optimize file caching. - - - - - Write operations will not go through any intermediate cache, they will go directly to disk. - - - - - Provides the base class for both FileInfo and DirectoryInfo objects. - - - - - Indicator of file existence. It refreshes each time Refresh() has been called. - - - - - Represents extended file information. - - - - - Represents the fully qualified path of the directory or file. - - - Notes to Inheritors: - Classes derived from FileSystemInfo can use the FullPath field to determine the full path of the object being manipulated. - - - - - The path originally specified by the user, whether relative or absolute. - - - - - Deletes a file or directory. - - - - - Refreshes the state of the object. - - - FileSystemInfo.Refresh takes a snapshot of the file from the current file system. Refresh cannot correct the underlying file system even if the file system returns incorrect or outdated information. This can happen on platforms such as Windows 98. - Calls must be made to Refresh before attempting to get the attribute information, or the information will be outdated. - - - - - Returns a String that represents the current Object. - - String - - - - Throws the does not exists exception. - - - - - Initializes the specified file name. - - Name of the file. - - - - Gets a full path string representing the file's parent directory. - - A string representing the parent directory full path. - - - - Gets or sets the of the current . - - - - - Gets or sets the creation time of the current object. - - The creation date and time of the current System.IO.FileSystemInfo object. - - - - Gets or sets the creation time, in coordinated universal time (UTC), of the current FileSystemInfo object. - - - - - Gets a value indicating whether the file or directory exists. - - - - - The Extension property returns the FileSystemInfo extension, including the period (.). For example, for a file c:\NewFile.txt, this property returns ".txt". - - - - - A string containing the name with full path. - - - - - Gets the system info. - - The system info. - - - - Gets or sets the time the current file or directory was last accessed. - - When first called, calls Refresh and returns the cached information on APIs to get attributes and so on. On subsequent calls, you must call Refresh to get the latest copy of the information. - If the file described in the object does not exist, this property will return 12:00 midnight, January 1, 1601 A.D. (C.E.) Coordinated Universal Time (UTC), adjusted to local time. - - - - - Gets or sets the time, in coordinated universal time (UTC), that the current file or directory was last accessed - - When first called, calls Refresh and returns the cached information on APIs to get attributes and so on. On subsequent calls, you must call Refresh to get the latest copy of the information. - If the file described in the object does not exist, this property will return 12:00 midnight, January 1, 1601 A.D. (C.E.) Coordinated Universal Time (UTC), adjusted to local time. - - - - - Gets or sets the time when the current file or directory was last written to. - - - - - Gets or sets the time, in coordinated universal time (UTC), when the current file or directory was last written to. - - - - - For files, gets the name of the file. For directories, gets the name of the last directory in the hierarchy if a hierarchy exists. Otherwise, the Name property gets the name of the directory. - - - For a directory, Name returns only the name of the parent directory, such as Dir, not c:\Dir. For a subdirectory, Name returns only the name of the subdirectory, such as Sub1, not c:\Dir\Sub1. - For a file, Name returns only the file name and file name extension, such as MyFile.txt, not c:\Dir\Myfile.txt. - - - - - Defines values that are used with the GetFileAttributes function to specify the information level of the returned data. - - - - - The GetFileAttributes function retrieves a standard set of attribute information. The data is returned in a WIN32_FILE_ATTRIBUTE_DATA structure. - - - - - One greater than the maximum value. Valid values for this enumeration will be less than this value. - - - - - Note: for some marshalling reason WIN32_FIND_DATA whould be declared as class not a struct. - - - - - Reserved for future use - - - - - Class used to represent the SECURITY_ATTRIBUES native win32 structure. - It provides initialization function from an ObjectSecurity object. - - - - - Initializes the SecurityAttributes structure from an instance of . - - A handle that will refer to the memory allocated by this object for storage of the - security descriptor. As long as this object is used, the memory handle should be kept alive, and afterwards it - should be disposed as soon as possible. - The security descriptor to assign to this object. This parameter may be . - - - - This value is not supported until Windows Server 2008 R2 and Windows 7. - - - - - A representation of a path, providing convenient access to the individual components - of the path. - - Note that no methods in this class verifies whether the path actually exists or not. - - - - - Initializes a new instance of the class. - - - The path. - is - The path is not a legal path in the Win32 file system. - - - - Initializes a new instance of the class specifying whether wildcards - should be accepted or not. - - The path. - if set to true wildcards are allowed in the file - name part of the path. If set to false, wildcards are not allowed and an - will be thrown if they are present. - is - - Note that under no circumstances will this class accept wildcards in - the directory part of the path, only in the file-name, i.e. the component - after the last backslash or separator. - - - Extended length unicode paths (also referred to as long paths) (those starting with \\?\) will not be - parsed for wildcards etc., regardless of the setting of this parameter. - In such a path any character is valid and backslashes alone are considered - to be separators. - - - - - - Initializes a new instance of the class. - - The path. - The indices. - Position of the beginning of the file extension in the path. - - - - Retrieves the full long (or extended) unicode version of the path represented by this instance. - - - - This method takes care of different path conversions to be usable in Unicode - variants of the Win32 funcitons (which are internally used throughout AlphaFS). - - - Regular paths are changed like the following: - - - C:\Somewhere\Something.txt - \\?\C:\Somewhere\Something.txt - - - \\Somewhere\Something.txt - \\?\UNC\Somewhere\Something.txt - - - - - Already processed paths are preserved untouched so to avoid mistakes of double prefixing. - - - If the path represented by this instance is not an absolute path, or is not rooted, the path of the - current directory (and drive) is combined with this path to form - an absolute path. - - - The long or extended unicode version of the specified path. - - - - - - Gets the full absolute path of the path represented by this instance. - This is done by "applying" the path to the current directory if the path - does not contain a root, or the volume of the current directory if the - path does not contain any drive information. - - The full absolute path. - - - - Returns a that represents the current . - - - A that represents the current . - - - - - Performs a lexiographical comparison of the string representations of this and - the other path, ignoring case. - - A to compare with this object. - - A 32-bit signed integer that indicates the relative order of the objects being compared. The return value has the following meanings: Value Meaning Less than zero This object is less than the parameter.Zero This object is equal to . Greater than zero This object is greater than . - - - - - Performs a lexiographical comparison for equality of the string representations of this and - the other path, ignoring case. - - An object to compare with this object. - - true if the current object is equal to the parameter; otherwise, false. - - - - - Performs a lexiographical comparison for equality of the string representations of this and - the other path, ignoring case. - - The to compare with the current . - - true if the specified is equal to the current ; otherwise, false. - - The parameter is null. - - - - Serves as a hash function for a particular type. - - - A hash code for the current . - - - - - Combines two paths. - - The first path. - The second path. - A string containing the combined paths. If one of the specified paths is a zero-length string, this method returns the other path. If path2 contains an absolute path, this method returns path2. - - - - Combines two paths. - - The first path. - The second path. - A string containing the combined paths. If one of the specified paths is a zero-length string, this method returns the other path. If path2 contains an absolute path, this method returns path2. - - - - Implements the operator ==. - - The path1. - The path2. - The result of the operator. - - - - Implements the operator !=. - - The path1. - The path2. - The result of the operator. - - - - Implements the operator <. - - The path1. - The path2. - The result of the operator. - - - - Implements the operator >. - - The path1. - The path2. - The result of the operator. - - - - Retrieves the parent directory of the specified path, including both absolute and relative paths. - - The parent directory, or if path is the root directory, including the root of a UNC server or share name. - - - - Gets the full normalized path, with a trailing backslash if the path denotes a directory. - - The full normalized path, with a trailing backslash if the path denotes a directory. - - - - - Gets the full normalized path. - - The full path. - - - - - Gets the file name part of the path. - - The file name part of the path, or an empty string if the path does not contain a file name. - - - - Gets the root of the path. - - The root of the path, which may be a drive (eg. "C:\"), a remote computer as part of - an UNC path (eg. "\\OtherComputer\"), a unique volume name - (eg. "\\?\Volume{c00fa7c5-63eb-11dd-b6ed-806e6f6e6963}\") or a single directory - separator ("\") if no drive or volume is present in the path. If does not contain - any root, an empty string is returned. - - - - Gets a value indicating whether the path is rooted. - - true if this instance is rooted; otherwise, false. - - - - Gets a value indicating whether this instance has file name. - - - true if this instance has file name; otherwise, false. - - - - - Gets the extension of the file name of this path. - - The extension of the file name of this path, or an empty string if the path does - not contain a file name or the file name does not have an extension. - - - - Gets a value indicating whether the file name in this path has an extension. - - - true if the file name in this path has an extension; otherwise, false. - - - - - Gets the file name without extension. - - The file name without extension or an empty string if the - path does not contain a file name. - - - - Returns the directory information for the path with a trailing directory separator. - - The name of the suffixed directory with a trailing directory separator. - - - - - Returns the directory information for the path without the root information, and with a trailing backslash. - - The path without the root and file name part (if any) and with a trailing backslash. - - - - - - - Returns the directory information for the path. - - The path without the file name part (if any). - - - - - Returns the directory information for the path with the root stripped off. - - The path without the root and file name part (if any). - - - - Gets a list exposing the individual components of the directory part of this path. - - The directory components of this path. - - - - Determines the index of a specific item in the . - - The object to locate in the . - - The index of if found in the list; otherwise, -1. - - - - - Inserts an item to the at the specified index. - - The zero-based index at which should be inserted. - The object to insert into the . - - is not a valid index in the . - The is read-only. - - - - Removes the item at the specified index. - - The zero-based index of the item to remove. - - is not a valid index in the . - The is read-only. - - - - Adds an item to the . - - The object to add to the . - The is read-only. - - - - Removes all items from the . - - The is read-only. - - - - Determines whether the contains a specific value. - - The object to locate in the . - - true if is found in the ; otherwise, false. - - - - - Copies the elements of the to an , starting at a particular index. - - The one-dimensional that is the destination of the elements copied from . The must have zero-based indexing. - The zero-based index in at which copying begins. - - is null. - - is less than 0. - - is multidimensional.-or- is equal to or greater than the length of .-or-The number of elements in the source is greater than the available space from to the end of the destination . - - - - Removes the first occurrence of a specific object from the . - - The object to remove from the . - - true if was successfully removed from the ; otherwise, false. This method also returns false if is not found in the original . - - The is read-only. - - - - Returns an enumerator that iterates through the collection. - - - A that can be used to iterate through the collection. - - - - - Returns an enumerator that iterates through a collection. - - - An object that can be used to iterate through the collection. - - - - - Gets the at the specified index. - - The component of the directory at the specified index - If is out of range. - - - - Gets the number of elements contained in the . - - - The number of elements contained in the . - - - - Gets a value indicating whether the is read-only. - - - true - - - - Removes a reference to the parent directory ("..") if possible. - This must be called *before* the reference to the parent directory has been - added. - - true if the reference was removed, and false if it was kept. - - - - Represents the encryption status of the specified file. - - - - - The file can be encrypted. - - - - - The file is encrypted. - - - - - The file is a read-only file. - - - - - The file is a root directory. Root directories cannot be encrypted. - - - - - The file is a system file. System files cannot be encrypted. - - - - - The file is a system directory. System directories cannot be encrypted. - - - - - The file system does not support file encryption. - - - - - The encryption status is unknown. The file may be encrypted. - - - - - Reserved for future use. - - - - - The exception that is thrown when an attempt to create a directory or file that already exists was made. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The data for serializing or deserializing the object. - The source and destination for the object. - - - - The requested operation could not be completed because the device was not ready. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The data for serializing or deserializing the object. - The source and destination for the object. - - - - The exception that is thrown when an attempt to create a directory or file that already exists was made. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The data for serializing or deserializing the object. - The source and destination for the object. - - - - It is too late to perform the requested operation, since the Transaction has already been aborted. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The info. - The context. - - - - The function attempted to use a name that is reserved for use by another transaction. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The info. - The context. - - - - IntPtr wrapper which can be used as result of - Marshal.AllocHGlobal operation. - Calls Marshal.FreeHGlobal when disposed or finalized. - - - - - Creates new instance with zero IntPtr - - - - - Copies data from a one-dimensional, managed 8-bit unsigned integer array to the unmanaged memory pointer referenced by this instance- - - The one-dimensional array to copy from. - The zero-based index into the array where Copy should start. - The number of array elements to copy. - - - - Called when object is disposed or finalized. - - - - - Represents information retrieved by . - - - - - Gets the file attributes. - - The file attributes. - - - - Gets a structure that specified when a file or directory was created. - - A structure that specified when a file or directory was created. - - - - Gets a structure. - For a file, the structure specifies the last time that a file is read from or written to. - For a directory, the structure specifies when the directory is created. - For both files and directories, the specified date is correct, but the time of day is always set to midnight. - If the underlying file system does not support the last access time, this member is zero (0). - - A structure that specified when a file was last written to or the directory created. - - - - Gets a structure. - For a file, the structure specifies the last time that a file is written to. - For a directory, the structure specifies when the directory is created. - If the underlying file system does not support the last access time, this member is zero (0). - - A structure that specified when a file was last written to or the directory created. - - - - Gets the the serial number of the volume that contains a file. - - The serial number of the volume that contains a file. - - - - Gets the size of the file. - - The size of the file. - - - - Gets the number of links to this file. For the FAT file system this member is always 1. For the NTFS file system, it can be more than 1. - - The number of links to this file. - - - - Gets the unique identifier associated with the file. The identifier and the volume serial number uniquely identify a - file on a single computer. To determine whether two open handles represent the same file, combine the identifier - and the volume serial number for each file and compare them. - - The unique identifier of the file. - - - - Defines constants for read, write, or read/write access to a file. - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - No access to the file. - - - - - Read access to the file. Data can be read from the file. Combine with Write for read/write access. - - - - - Write access to the file. Data can be written to the file. Combine with Read for read/write access. - - - - - Read and write access to the file. Data can be written to and read from the file. - - - - - Represents a wrapper class for a handle used by the FindFirstFile/FindNextFile methods of the Win32 API - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The handle. - if set to true [owns handle]. - - - - When overridden in a derived class, executes the code required to free the handle. - - - true if the handle is released successfully; otherwise, in the event of a catastrophic failure, false. In this case, it generates a ReleaseHandleFailed Managed Debugging Assistant. - - - - - Exposes instance methods for creating, moving, and enumerating through directories and subdirectories. This class cannot be inherited. - - - - - Initializes a new instance of the class on the specified dirPath. - - A string specifying the path on which to create the DirectoryInfo. - - - - Refreshes the state of the object. - - - FileSystemInfo.Refresh takes a snapshot of the file from the current file system. Refresh cannot correct the underlying file system even if the file system returns incorrect or outdated information. This can happen on platforms such as Windows 98. - Calls must be made to Refresh before attempting to get the attribute information, or the information will be outdated. - - - - - Deletes a file or directory. - - - - - Deletes this instance of a DirectoryInfo, specifying whether to delete subdirectories and files. - - true to remove directories, subdirectories, and files in path; otherwise, false. - - If the DirectoryInfo has no files or subdirectories, this method deletes the DirectoryInfo even if recursive is false. Attempting to delete a DirectoryInfo that is not empty when recursive is false throws an IOException. - For a list of common I/O tasks, see Common I/O Tasks. - - - - - Deletes this instance of a DirectoryInfo, specifying whether to delete subdirectories and files. - - true to remove directories, subdirectories, and files in path; otherwise, false. - if set to true ignores read only attribute of files and directories. - - If the DirectoryInfo has no files or subdirectories, this method deletes the DirectoryInfo even if recursive is false. Attempting to delete a DirectoryInfo that is not empty when recursive is false throws an IOException. - For a list of common I/O tasks, see Common I/O Tasks. - - - - - Returns the original path that was passed by the user. - - Returns the original path that was passed by the user. - - - - Gets a DirectorySecurity object that encapsulates the access control list (ACL) entries for the directory described by the current DirectoryInfo object. - - A DirectorySecurity object that encapsulates the access control rules for the directory. - - - - Gets a DirectorySecurity object that encapsulates the specified type of access control list (ACL) entries for the directory described by the current DirectoryInfo object. - - One of the AccessControlSections values that specifies the type of access control list (ACL) information to receive. - A DirectorySecurity object that encapsulates the access control rules for the file described by the path parameter. - - - - Applies access control list (ACL) entries described by a DirectorySecurity object to the directory described by the current DirectoryInfo object. - - A DirectorySecurity object that describes an ACL entry to apply to the directory described by the path parameter. - - - - Returns the subdirectories of the current directory. - - An array of DirectoryInfo objects. - If there are no subdirectories, this method returns an empty array. This method is not recursive. - - - - Returns an array of directories in the current DirectoryInfo matching the given search criteria. - - The search string, such as "System*", used to search for all directories beginning with the word "System". - An array of type DirectoryInfo matching searchPattern. - - Wildcards are permitted. For example, the searchPattern string "*t" searches for all directory names in path ending with the letter "t". The searchPattern string "s*" searches for all directory names in path beginning with the letter "s". - The string ".." can only be used in searchPattern if it is specified as a part of a valid directory name, such as in the directory name "a..b". It cannot be used to move up the directory hierarchy. - If there are no subdirectories, or no subdirectories match the searchPattern parameter, this method returns an empty array. - For a list of common I/O tasks, see Common I/O Tasks. - - - - - Returns an array of directories in the current DirectoryInfo matching the given search criteria and using a value to determine whether to search subdirectories. - - The search string, such as "System*", used to search for all directories beginning with the word "System". - One of the values of the SearchOption enumeration that specifies whether the search operation should include only the current directory or should include all subdirectories. - - An array of type DirectoryInfo matching searchPattern. - - - Wildcards are permitted. For example, the searchPattern string "*t" searches for all directory names in path ending with the letter "t". The searchPattern string "s*" searches for all directory names in path beginning with the letter "s". - The string ".." can only be used in searchPattern if it is specified as a part of a valid directory name, such as in the directory name "a..b". It cannot be used to move up the directory hierarchy. - If there are no subdirectories, or no subdirectories match the searchPattern parameter, this method returns an empty array. - For a list of common I/O tasks, see Common I/O Tasks. - - - - - Returns a file list from the current directory. - - An array of type FileInfo. - - - - Returns a file list from the current directory matching the given searchPattern. - - The search string, such as "*.txt". - An array of type FileInfo. - - - - Returns a file list from the current directory matching the given searchPattern and using a value to determine whether to search subdirectories. - - The search string, such as "System*", used to search for all directories beginning with the word "System". - One of the values of the SearchOption enumeration that specifies whether the search operation should include only the current directory or should include all subdirectories. - An array of type FileInfo. - - The following wildcard specifiers are permitted in searchPattern: "*" and "?". - The order of the returned file names is not guaranteed; use the Sort()()() method if a specific sort order is required. - Wildcards are permitted. For example, the searchPattern string "*.txt" searches for all file names having an extension of "txt". - The searchPattern string "s*" searches for all file names beginning with the letter "s". If there are no files, or no files that match the searchPattern string in the DirectoryInfo, this method returns an empty array. - - - - - Returns an array of strongly typed FileSystemInfo entries representing all the files and subdirectories in a directory. - - An array of strongly typed FileSystemInfo entries. - - This method is not recursive. - For subdirectories, the FileSystemInfo objects returned by this method can be cast to the derived class DirectoryInfo. Use the FileAttributes value returned by the FileSystemInfo.Attributes property to determine whether the FileSystemInfo represents a file or a directory. - Wild cards are permitted. For example, the searchPattern string "*t" searches for all directory names in path ending with the letter "t". The searchPattern string "s*" searches for all directory names in path beginning with the letter "s". - The string ".." can only be used in searchPattern if it is specified as a part of a valid directory name, such as in the directory name "a..b". It cannot be used to move up the directory hierarchy. If there are no files or directories, or no files or directories that match the searchPattern string in the DirectoryInfo, this method returns an empty array. - For a list of common I/O tasks, see Common I/O Tasks. - - - - - Retrieves an array of strongly typed FileSystemInfo objects representing the files and subdirectories matching the specified search criteria. - - The search string, such as "System*", used to search for all directories beginning with the word "System". - An array of strongly typed FileSystemInfo objects matching the search criteria. - - This method is not recursive. - For subdirectories, the FileSystemInfo objects returned by this method can be cast to the derived class DirectoryInfo. Use the FileAttributes value returned by the FileSystemInfo.Attributes property to determine whether the FileSystemInfo represents a file or a directory. - Wild cards are permitted. For example, the searchPattern string "*t" searches for all directory names in path ending with the letter "t". The searchPattern string "s*" searches for all directory names in path beginning with the letter "s". - The string ".." can only be used in searchPattern if it is specified as a part of a valid directory name, such as in the directory name "a..b". It cannot be used to move up the directory hierarchy. If there are no files or directories, or no files or directories that match the searchPattern string in the DirectoryInfo, this method returns an empty array. - For a list of common I/O tasks, see Common I/O Tasks. - - - - - Moves a DirectoryInfo instance and its contents to a new path. - - The name and path to which to move this directory. - The destination cannot be directory with the identical name. It can be an existing directory to which you want to add this directory as a subdirectory. - - This method throws an IOException if, for example, you try to move c:\mydir to c:\public, and c:\public already exists. You must specify "c:\\public\\mydir" as the destDirName parameter, or specify a new directory name such as "c:\\newdir". - This method permits moving a directory to a read-only directory. The read/write attribute of neither directory is affected. - For a list of common I/O tasks, see Common I/O Tasks. - - - - - Gets a value indicating whether the file or directory exists. - - true if the file exists; otherwise, false. - - - - Gets the name of the last directory in the hierarchy if a hierarchy exists. Otherwise, the Name property gets the name of the directory. - - - - For a directory, Name returns only the name of the parent directory, such as Dir, not c:\Dir. For a subdirectory, Name returns only the name of the subdirectory, such as Sub1, not c:\Dir\Sub1. - - - - - Gets the parent directory of a specified subdirectory. - - The parent directory, or nullNothingnullptra null reference (Nothing in Visual Basic) if the path is null or if the file path denotes a root (such as "\", "C:", or * "\\server\share"). - - - - Gets the root portion of a path. - - A DirectoryInfo object representing the root of a path. - - - - Callback used by MoveFile and CopyFile to report progress about the - operation. - - - - - The requested operation was made in the context of a transaction that is no longer active. - - - - - The requested operation is not valid on the Transaction object in its current state. - - - - - The function attempted to use a name that is reserved for use by another transaction. - - - - - The remote server or share does not support transacted file operations. - - - - - Static class providing utility methods for working with Microsoft Windows devices and volumes. Most - of the methods in this class is simple convenience methods for native Win32 API-calls to make them - simpler to use from managed languages. - - - - - Retrieves the name of all volumes on the computer. - - Requires Windows Vista, Windows XP, or Windows 2000 Professional. - An array containing the volume names on the computer. - - - - Retrieves the names of all volume mount points on the specified volume. - - Requires Windows Vista, Windows XP, or Windows 2000 Professional. - The unique volume name of the volume to scan for volume mount points. A trailing backslash is required. - The names of all volume mount points on the specified volume. - - - - Determines whether a disk drive containing the current directory is a removable, fixed, CD-ROM, RAM disk, or network drive. - - Requires Windows Vista, Windows XP, or Windows 2000 Professional. - A value indicating whether a disk drive containing the current directory is a removable, fixed, CD-ROM, RAM disk, or network drive. - - - - Determines whether a disk drive is a removable, fixed, CD-ROM, RAM disk, or network drive. - - Requires Windows Vista, Windows XP, or Windows 2000 Professional. - The root directory for the drive. A trailing backslash is required. - A value indicating whether a disk drive is a removable, fixed, CD-ROM, RAM disk, or network drive. - - - - Returns an array of strings that specify valid drives in the system. - - Each string in the buffer may be used wherever a root directory is required, such as for the GetDriveType and GetDiskFreeSpace functions. - An array of strings that specify valid drives in the system. - - - - Retrieves information about the file system and volume associated with the specified root directory. - - The root directory of the volume to be described. - A instance describing the volume associatied with the specified root directory - was not a valid volume name - - - - Retrieves information about the file system and volume associated with the specified . - - The file. - A instance describing the volume associatied with the specified root directory - was not a valid volume name - - - - Sets the label of a file system volume. - - The root directory of a file system volume. This is the volume the function will label. A trailing backslash is required. - A name for the volume. - or is a reference. - - - - Sets the label of the file system volume that is the root of the current directory - - A name for the volume. - is a reference. - - - - Deletes the label of a file system volume. - - The root directory of a file system volume. This is the volume the function will label. A trailing backslash is required. - is a reference. - - - - Deletes the label of the file system volume that is the root of the current directory - - - - - Mounts the specified volume at the specified volume mount point. - - The volume mount point where the volume is to be mounted. This may be a root directory (X:\) or a directory on a volume (X:\mnt\). The string must end with a trailing backslash ('\'). - The volume to be mounted. This string must be a unique volume name of the form "\\?\Volume{GUID}\" where GUID is a GUID that identifies the volume. The \\?\ turns off path parsing and is ignored as part of the path. For example, "\\?\C:\myworld\private" is seen as "C:\myworld\private". - - - - Unmounts the volume from the specified volume mount point. - - The volume mount point to be unmounted. This may be a root directory (X:\, in which case the DOS drive letter assignment is removed) or a directory on a volume (X:\mnt\). A trailing backslash is required. - is - It is not an error to attempt to unmount a volume from a volume mount point when there is no volume actually mounted at that volume mount point. - - - - Defines or redefines MS-DOS device names. - - A MS-DOS path string that will implement this device. - An MS-DOS device name string specifying the device the function is - defining or redefining. The device name string must not have a trailing colon, unless a drive - letter (C or D, for example) is being defined or redefined. In no case is a trailing backslash allowed. - true upon success, or false otherwise. - Call Marshal.GetLastWin32Error() to receive additional error information if this method fails. - - - - Deletes an MS-DOS device name. - - An MS-DOS device name string specifying the device the function is - deleting. The device name string must not have a trailing colon, unless a drive - letter (C or D, for example) is being deleted. In no case is a trailing backslash allowed. - true upon success, or false otherwise. - Call Marshal.GetLastWin32Error() to receive additional error information if this method fails. - - - - Retrieves information about MS-DOS device names. - The function can obtain the current mapping for a particular MS-DOS device name. - The function can also obtain a list of all existing MS-DOS device names. - - The device. - An MS-DOS device name string specifying the target of the query. The device name cannot have a - trailing backslash. This parameter can be . In that case, the QueryDosDevice function - will return an array of all existing MS-DOS device names - See documentation on MSDN for the Windows QueryDosDevice() method for more information. - - - - Retreives a list of all existing MS-DOS device names. - - A list of all existing MS-DOS device names. - - This is equivalent to calling QueryDosDevice(null) - See documentation on MSDN for the Windows QueryDosDevice() method for more information. - - - - Gets the shortest display name for the specified . - - The volume name. - The shortest display name for the specified volume found, or if no display names were found. - is a reference - An error occured during a system call, such as the volume name specified was invalid or did not exist. - This method basically returns the shortest string returned by - - - - Retrieves a list of path names for the specified volume name. - - The volume name. - An array containing the path names for the specified volume. - is a reference - The volume name specified was invalid, did not exist or was not ready. - For more information about this method see the MSDN documentation on GetVolumePathNamesForVolumeName(). - - - - Determines whether the specified volume name is a defined volume on the current computer. - - A string representing the path to a volume (eg. "C:\", "D:", "P:\Mountpoint\Backup", "\\?\Volume{c0580d5e-2ad6-11dc-9924-806e6f6e6963}\"). A trailing backslash is required. - - true if the specified volume is a defined volume; otherwise, false. - - The trailing backslash is optional - is a reference - Upon error retreiving the volume name - - - - Retrieves the unique volume name for the specified volume mount point or root directory. - - The path of a volume mount point (with or without a trailing backslash, "\") or a drive letter indicating a root directory (eg. "C:" or "D:\"). A trailing backslash is required. - The unique volume name of the form "\\?\Volume{GUID}\" where GUID is the GUID that identifies the volume. - is a reference - is an empty string - Upon error retreiving the volume name - See the MSDN documentation on the method GetVolumeNameForVolumeMountPoint() for more information. - - - - Retrieves the unique name of the volume mount point where the specified path is mounted. - - The input path. Both absolute and relative file and - directory names, for example ".", are acceptable in this path. - If you specify a relative directory or file name without a volume qualifier, - GetUniqueVolumeNameForPath returns the drive letter of the boot volume. A trailing backslash is required. - The unique name of the volume mount point where the specified path is mounted - See the MSDN documentation on the method GetVolumePathName() for more information. - is a reference - is an empty string - Upon error retreiving the volume name - - - - Retreives the Win32 device name from the volume name - - Name of the volume. A trailing backslash is not allowed. - The Win32 device name from the volume name - - - - Retrieves information about the amount of space that is available on a disk volume, - which is the total amount of space, the total amount of free space, and the total amount of - free space available to the user that is associated with the calling thread. - - A directory on the disk. - If this parameter is NULL, the function uses the root of the current disk. - If this parameter is a UNC name, it must include a trailing backslash, for example, "\\MyServer\MyShare\". - This parameter does not have to specify the root directory on a disk. The function accepts any directory on a disk. - - The calling application must have FILE_LIST_DIRECTORY access rights for this directory. - - A object containing the requested information. - - - - Represents a wrapper class for a handle used by the FindFirstVolume/FindNextVolume methods of the Win32 API - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The handle. - if set to true [owns handle]. - - - - When overridden in a derived class, executes the code required to free the handle. - - - true if the handle is released successfully; otherwise, in the event of a catastrophic failure, false. In this case, it generates a ReleaseHandleFailed Managed Debugging Assistant. - - - - - A strongly-typed resource class, for looking up localized strings, etc. - - - - - Returns the cached ResourceManager instance used by this class. - - - - - Overrides the current thread's CurrentUICulture property for all - resource lookups using this strongly typed resource class. - - - - - Looks up a localized string similar to AlphaFS Internal Error: - . - - - - - Looks up a localized string similar to Argument must not be empty. - - - - - Looks up a localized string similar to Incorrectly implemented function attempting to generate exception from successful operation. - . - - - - - Looks up a localized string similar to Buffer is not large enough for the requested operation.. - - - - - Looks up a localized string similar to Count must not be negative.. - - - - - Looks up a localized string similar to Directory not empty. - - - - - Looks up a localized string similar to Directory not found. - - - - - Looks up a localized string similar to Error code was: {0}. - - - - - Looks up a localized string similar to Creating hard-links on non-NTFS partitions is not supported. - - - - - Looks up a localized string similar to Illegal path: {0}. - - - - - Looks up a localized string similar to Incomplete header read.. - - - - - Looks up a localized string similar to Invalid directory name. - - - - - Looks up a localized string similar to Invalid file name: {0}. - - - - - Looks up a localized string similar to Invalid handle. - - - - - Looks up a localized string similar to Invalid search pattern. - - - - - Looks up a localized string similar to Invalid security descriptor returned from system.. - - - - - Looks up a localized string similar to Invalid transaction object. - - - - - Looks up a localized string similar to Invalid transaction request. - - - - - Looks up a localized string similar to The file or directory is not a reparse point. - - - - - Looks up a localized string similar to Offset must not be negative.. - - - - - Looks up a localized string similar to Path already exists. - - - - - Looks up a localized string similar to This stream does not support seeking.. - - - - - Looks up a localized string similar to Transactional conflict. - - - - - Looks up a localized string similar to Transaction already aborted. - - - - - Looks up a localized string similar to Transaction already committed. - - - - - Looks up a localized string similar to Transaction not active. - - - - - Looks up a localized string similar to Transaction not requested. - - - - - Specifies the type of a symbolic link - - - - - The symbolic link is absolute - - - - - The symbolic link is relative - - - - - The function should return one of the following values. - - - - - Continue the copy operation. - - - - - Cancel the copy operation and delete the destination file. - - - - - Stop the copy operation. It can be restarted at a later time. - - - - - Continue the copy operation, but stop invoking to report progress. - - - - - The transaction handle associated with this operation is not valid. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The data for serializing or deserializing the object. - The source and destination for the object. - - - - Used to enable one or more privileges. The privileges specified will be enabled during the - lifetime of the instance. Users create an instance of this object in a using statement - to ensure that it is properly disposed when the elevated privileges are no longer needed. - - - - - Initializes a new instance of the class. This will enable the - privileges specified (unless already enabled), and ensure that they are disabled again when - the object is disposed. (Any privileges already enabled will not be disabled). - - The privilege to enable. - Additional privileges to enable. - - - - Makes sure any privileges enabled by this instance are disabled. - - - - - Gets the enabled privileges. Note that this might not contain all privileges specified - to the constructor. Only the privileges actually enabled by this instance is returned. - - The enabled privileges. - - - - The move options for a file move operation. - - - - - If the destination file name already exists, the function replaces its contents with the contents of the - source file. - - This value cannot be used if either source or destination names a directory. - - - - If the file is to be moved to a different volume, the function simulates the move by using the CopyFile and DeleteFile functions. - - This value cannot be used with . - - - - The system does not move the file until the operating system is restarted. The system moves the file immediately after AUTOCHK is executed, but before creating any paging files. Consequently, this parameter enables the function to delete paging files from previous startups. - This value can only be used if the process is in the context of a user who belongs to the administrators group or the LocalSystem account. - - This value cannot be used with . - - - - The function does not return until the file has actually been moved on the disk. - Setting this value guarantees that a move performed as a copy and delete operation is flushed - to disk before the function returns. The flush occurs at the end of the copy operation. - - This value has no effect if is set. - - - - Reserved for future use. - - - - - The function fails if the source file is a link source, but the file cannot be tracked after the move. - This situation can occur if the destination is a volume formatted with the FAT file system. - - - - - The exception that is thrown when a pathname or filename is illegal. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The path. - - - - Initializes a new instance of the class. - - The path. - The inner exception. - - - - Initializes a new instance of the class. - - The data for serializing or deserializing the object. - The source and destination for the object. - - - - Represents information about a symbolic link. - - - - - Information about the target of a symbolic link or mount point. - - - - - The substitute name - - - - - The print name - - - - - Gets the type of the link. - - The type of the link. - - - - The structure contains stream header data. - - - - - - Initializes a new instance of the class. - - The stream ID. - The name. - - - - Gets the size of the data in the substream, in bytes. - - The size of the data in the substream, in bytes. - - - - Gets a string that specifies the name of the alternative data stream. - - A string that specifies the name of the alternative data stream. - - - - Gets the type of the data in the stream. - - The type of the data in the stream. - - - - Gets the attributes of the data to facilitate cross-operating system transfer. - - Attributes of the data to facilitate cross-operating system transfer. - - - - This object is used to enable a specific privilege for the currently running process during its lifetime. - It should be disposed as soon as the elevated privilege is no longer needed. - For more information see the documentation on AdjustTokenPrivileges on MSDN. - - - - - Initializes a new instance of the class and enabling the specified privilege - for the currently running process. - - The name of the privilege. - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - In this case the privilege previously enabled will be disabled. - - - - - Adjusts the privilege. - - if set to true the privilege will be enabled, otherwise disabled. - - - - The function attempted to use a name that is reserved for use by another transaction. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The info. - The context. - - - - Attributes of data to facilitate cross-operating system transfer. - - - - - - Attribute set if the stream contains data that is modified when read. Allows the backup application to know that verification of data will fail. - - - - - Stream contains security data (general attributes). Allows the stream to be ignored on cross-operations restore. - This attribute applies only to backup stream of type . - - - - - Reserved. - - - - - This backup stream has no special attributes. - - - - - The backup stream is part of a sparse file stream. This attribute applies only to backup stream of - type , , and . - - - - - Defines the access rights to use when creating access and audit rules. - - - This enumeration has a attribute that allows a bitwise combination of its member values. - - - - - Specifies the right to open and copy folders or files as read-only. This right includes the - right, right, right, - and right. - - - - - Specifies the right to create folders and files, and to add or remove data from files. This right includes the - right, right, right, and right. - - - - - Specifies the right to open and copy folders or files as read-only, and to run application files. - This right includes the right and the right. - - - - - Specifies the right to read, write, list folder contents, delete folders and files, and run application files. - This right includes the right, the right, and the right. - - - - - Specifies the right to open and copy a file or folder. This does not include the right to read file system attributes, extended file system attributes, or access and audit rules. - - - - - Specifies the right to read the contents of a directory. - - - - - Specifies the right to open and write to a file or folder. This does not include the right to open and write file system attributes, extended file system attributes, or access and audit rules. - - - - - Specifies the right to create a file. - - - - - Specifies the right to append data to the end of a file. - - - - - Specifies the right to create a folder. - - - - - Specifies the right to open and copy extended file system attributes from a folder or file. For example, this value specifies the right to view author and content information. This does not include the right to read data, file system attributes, or access and audit rules. - - - - - Specifies the right to open and write extended file system attributes to a folder or file. This does not include the ability to write data, attributes, or access and audit rules. - - - - - Specifies the right to run an application file. - - - - - Specifies the right to list the contents of a folder and to run applications contained within that folder. - - - - - Specifies the right to delete a folder and any files contained within that folder. - - - - - Specifies the right to open and copy file system attributes from a folder or file. For example, this value specifies the right to view the file creation or modified date. This does not include the right to read data, extended file system attributes, or access and audit rules. - - - - - Specifies the right to open and write file system attributes to a folder or file. This does not include the ability to write data, extended attributes, or access and audit rules. - - - - - Specifies the right to delete a folder or file. - - - - - Specifies the right to open and copy access and audit rules from a folder or file. This does not include the right to read data, file system attributes, and extended file system attributes. - - - - - Specifies the right to change the security and audit rules associated with a file or folder. - - - - - Specifies the right to change the owner of a folder or file. Note that owners of a resource have full access to that resource. - - - - - Specifies whether the application can wait for a file handle to synchronize with the completion of an I/O operation. - - - - - Specifies the right to exert full control over a folder or file, and to modify access control and audit rules. - This value represents the right to do anything with a file and is the combination of all rights in this enumeration except - for - - - - - The access right controls the ability to get or set the SACL in an object's security - descriptor. The system grants this access right only if the privilege is enabled in the - access token of the requesting thread (see ). - - - - - The provides access to data associated with a specific file or directory, including security information - and alternative data streams, for backup and restore operations. - - This class uses the BackupRead, - BackupSeek and - BackupWrite functions from the Win32 API to provide - access to the file or directory. - - - - - Initializes a new instance of the class with the specified path, creation mode, access rights - and sharing permission, additional file options, access control and audit security. - - The transaction. - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - A constant that determines how the file will be shared by processes. - A constant that specifies additional file options. - A constant that determines the access control and audit security for the file. This parameter may be . - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class with the specified path, creation mode, access rights - and sharing permission, and additional file options. - - The transaction. - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - A constant that determines how the file will be shared by processes. - A constant that specifies additional file options. - - - - Initializes a new instance of the class with the specified path, creation mode, access rights - and sharing permission. - - The transaction. - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - A constant that determines how the file will be shared by processes. - - - - Initializes a new instance of the class with the specified path, creation mode and access rights. - - The transaction. - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - The file will be opened for exclusive access. - - - - Initializes a new instance of the class with the specified path and creation mode. - - The transaction. - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - The file will be opened for exclusive access for both reading and writing. - - - - Initializes a new instance of the class with the specified path, creation mode, access rights - and sharing permission, additional file options, access control and audit security. - - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - A constant that determines how the file will be shared by processes. - A constant that specifies additional file options. - A constant that determines the access control and audit security for the file. This parameter may be . - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class with the specified path, creation mode, access rights - and sharing permission, and additional file options. - - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - A constant that determines how the file will be shared by processes. - A constant that specifies additional file options. - - - - Initializes a new instance of the class with the specified path, creation mode, access rights - and sharing permission. - - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - A constant that determines how the file will be shared by processes. - - - - Initializes a new instance of the class with the specified path, creation mode and access rights. - - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - A constant that determines the access rights to use when creating access and audit rules for the file. - The file will be opened for exclusive access. - - - - Initializes a new instance of the class with the specified path and creation mode. - - A relative or absolute path for the file that the current object will encapsulate. - A constant that determines how to open or create the file. - The file will be opened for exclusive access for both reading and writing. - - - - Initializes a new instance of the class for the specified file handle, with the specified read/write permission. - - A file handle for the file that this object will encapsulate. - A constant that gets the and properties - of the object. - - - - Releases unmanaged resources and performs other cleanup operations before the - is reclaimed by garbage collection. - - - - - Reads a sequence of bytes from the current stream and advances the position within - the stream by the number of bytes read. - - An array of bytes. When this method returns, the buffer contains the specified byte array with the values - between and ( + - 1) replaced by the bytes read from the current source. - The zero-based byte offset in at which to begin storing the data read from the current stream. - The maximum number of bytes to be read from the current stream. - - The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not - currently available, or zero (0) if the end of the stream has been reached. - - The sum of and is larger than the buffer length. - - is null. - - or is negative. - An I/O error occurs. - The stream does not support reading. - Methods were called after the stream was closed. - This method will not backup the access-control list (ACL) data for the file or directory. - - - - When overridden in a derived class, reads a sequence of bytes from the current stream and advances the position within - the stream by the number of bytes read. - - An array of bytes. When this method returns, the buffer contains the specified byte array with the values - between and ( + - 1) replaced by the bytes read from the current source. - The zero-based byte offset in at which to begin storing the data read from the current stream. - The maximum number of bytes to be read from the current stream. - Indicates whether the function will backup the access-control list (ACL) data for the file or directory. - - The total number of bytes read into the buffer. This can be less than the number of bytes requested if that many bytes are not - currently available, or zero (0) if the end of the stream has been reached. - - The sum of and is larger than the buffer length. - - is null. - - or is negative. - An I/O error occurs. - The stream does not support reading. - Methods were called after the stream was closed. - - - - Skips ahead the specified number of bytes from the current stream. - - - - This method represents the Win32 API implementation of BackupSeek. - - - Applications use the method to skip portions of a data stream that cause errors. This function does not - seek across stream headers. For example, this function cannot be used to skip the stream name. If an application - attempts to seek past the end of a substream, the function fails, the return value indicates the actual number of bytes - the function seeks, and the file position is placed at the start of the next stream header. - - - The number of bytes to skip. - The number of bytes actually skipped. - - - - When overridden in a derived class, sets the position within the current stream. - - A byte offset relative to the parameter. - A value of type indicating the reference point used to obtain the new position. - - The new position within the current stream. - - - - - - This stream does not support seeking using this method, and calling this method will always throw - . See for an alternative way of seeking forward. - - - - - The stream does not support seeking. - - - - Applies access control list (ACL) entries described by a object to the file described by the - current object. - - A object that describes an ACL entry to apply to the current file. - - - - When overridden in a derived class, sets the length of the current stream. - - The desired length of the current stream in bytes. - This method is not supported by the class, and calling it will always - generate a . - Always thrown by this class. - - - - Writes a sequence of bytes to the current stream and advances the current position - within this stream by the number of bytes written. - - - Writes a sequence of bytes to the current stream and advances the current position within this stream by the number of bytes written. - - An array of bytes. This method copies bytes from to the current stream. - The zero-based byte offset in at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - The sum of and is greater than the buffer length. - - is null. - - or is negative. - An I/O error occurs. - The stream does not support writing. - Methods were called after the stream was closed. - This method will not process the access-control list (ACL) data for the file or directory. - - - - When overridden in a derived class, writes a sequence of bytes to the current stream and advances the current position - within this stream by the number of bytes written. - - An array of bytes. This method copies bytes from to the current stream. - The zero-based byte offset in at which to begin copying bytes to the current stream. - The number of bytes to be written to the current stream. - Specifies whether the function will restore the access-control list (ACL) data for the file or directory. - If this is , you need to specify and access when - opening the file or directory handle. If the handle does not have those access rights, the operating system denies - access to the ACL data, and ACL data restoration will not occur. - The sum of and is greater than the buffer length. - - is null. - - or is negative. - An I/O error occurs. - The stream does not support writing. - Methods were called after the stream was closed. - - - - Allows access by other processes to all or part of a file that was previously locked. - - The beginning of the range to unlock. - The range to be unlocked. - - or is negative. - The file is closed. - - - - Clears all buffers for this stream and causes any buffered data to be written to the underlying device. - - An I/O error occurs. - - - - Gets a object that encapsulates the access control list (ACL) entries for the file described by the - current object. - - A object that encapsulates the access control list (ACL) entries for the file described by the - current object. - - - - Reads a stream header from the current . - - The stream header read from the current , or if the end-of-file - was reached before the required number of bytes of a header could be read. - The stream must be positioned at where an actual header starts for the returned object to represent valid - information. - - - - Prevents other processes from changing the while permitting read access. - - The beginning of the range to lock. The value of this parameter must be equal to or greater than zero (0). - The range to be locked. - or is negative. - The file is closed. - The process cannot access the file because another process has locked a portion of the file. - - - - Releases the unmanaged resources used by the and optionally releases the managed resources. - - true to release both managed and unmanaged resources; false to release only unmanaged resources. - - - - Gets a value indicating whether the current stream supports reading. - - - true if the stream supports reading; otherwise, false. - - - - Gets a value indicating whether the current stream supports seeking. - - This method always returns . - - - - Gets a value indicating whether the current stream supports writing. - - - true if the stream supports writing; otherwise, false. - - - - When overridden in a derived class, gets the length in bytes of the stream. - - This method always throws an exception. - This exception is always thrown if this property is accessed on a . - - - - When overridden in a derived class, gets or sets the position within the current stream. - - This method always throws an exception. - This exception is always thrown if this property is accessed on a . - - - - Gets a object that represents the operating system file handle for the file that - the current object encapsulates. - - A object that represents the operating system file handle for the file that - the current object encapsulates. - - - - Provides static methods for the creation, copying, deletion, moving, and opening of files, and aids in the creation of objects. - As opposed to the corresponding class, this class supports the use of extended length unicode paths, such as - \\?\Volume{c00fa7c5-63eb-11dd-b6ed-806e6f6e6963}\autoexec.bat. In addition, support for transacted file operation using the - kernel transaction manager is provided. (See also ). - - Note that no methods in this class perform any validation of the supplied paths. They are passed as is to the corresponding - native kernel functions, meaning that invalid paths may result in exceptions of a type other than the expected for a certain operation. - - - - - Opens a file, appends the specified string to the file, and then closes the file. - - - If the file does not exist, this method creates a file, writes the specified string to the file, then closes the file. - - - - Opens a file, appends the specified string to the file, and then closes the file. If the file does not exist, this method creates a file, writes the specified string to the file, then closes the file. - - The file to append the specified string to. - The string to append to the file. - - - - Appends the specified string to the file, creating the file if it does not already exist. - - The file to append the specified string to. - The string to append to the file. - The character encoding to use. - - - - Opens a file as part of a transaction, appends the specified string to the file, and then closes the file. If the file does not exist, this method creates a file, writes the specified string to the file, then closes the file. - - The transaction. - The file to append the specified string to. - The string to append to the file. - - - - Appends the specified string to the file as part of a transaction, creating the file if it does not already exist. - - The transaction. - The file to append the specified string to. - The string to append to the file. - The character encoding to use. - - - - Creates a that appends UTF-8 encoded text to an existing file. - - - Creates a that appends UTF-8 encoded text to an existing file. - - The path to the file to append to. - A that appends UTF-8 encoded text to an existing file. - - - - Creates a , that is part of a transaction, that appends UTF-8 encoded text to an existing file. - - The transaction. - The path to the file to append to. - - A that appends UTF-8 encoded text to an existing file. - - - - - Copies an existing file to a new file. - - - Copies an existing file to a new file. Overwriting a file of the same name is not allowed. - - The file to copy. - The name of the destination file. This cannot be a directory or an existing file. - - - - Copies an existing file to a new file. - - The file to copy. - The name of the destination file. This cannot be a directory or an existing file. - true if the destination file can be overwritten; otherwise, false. - - - - Copies an existing file to a new file. - - The name of an existing file. - The name of the new file. - Flags that specify how the file is to be copied. - true if the file was completely copied, or false if the copy operation was aborted. - - - - Copies an existing file to a new file. - - The name of an existing file. - The name of the new file. - Flags that specify how the file is to be copied. - true if original Timestamps must be preserved, otherwise false - - true if the file was completely copied, or false if the copy operation was aborted. - - - - - Copies an existing file to a new file, notifying the application of its progress through a callback function. - - The name of an existing file. - The name of the new file. - Flags that specify how the file is to be copied. - A callback function that is called each time another portion of the file has been copied. This parameter can be . - The argument to be passed to the callback function. This parameter can be . - true if original Timestamps must be preserved, otherwise false - - true if the file was completely copied, or false if the copy operation was aborted. - - - - - Copies an existing file to a new file as a transacted operation. Overwriting a file of the same name is not allowed. - - The transaction. - The file to copy. - The name of the destination file. This cannot be a directory or an existing file. - - - - Copies an existing file to a new file as a transacted operation. - - The transaction. - The file to copy. - The name of the destination file. This cannot be a directory or an existing file. - true if the destination file can be overwritten; otherwise, false. - - - - Copies an existing file to a new file as a transacted operation. - - The name of an existing file. - The name of the new file. - Flags that specify how the file is to be copied. - The transaction to use. - true if the file was completely copied, or false if the copy operation was aborted. - - - - Copies an existing file to a new file as a transacted operation, notifying the application of its progress through a callback function. - - The name of an existing file. - The name of the new file. - Flags that specify how the file is to be copied. - A callback function that is called each time another portion of the file has been copied. This parameter can be . - The argument to be passed to the callback function. This parameter can be . - The transaction to use. - true if the file was completely copied, or false if the copy operation was aborted. - - - - Creates, overwrites or opens a file or directory in the specified path. - - - Creates or overwrites a file in the specified path. - - The path and name of the file to create. - A that provides read/write access to the file specified in path. - - - - Creates or overwrites a file in the specified path. - - The path and name of the file to create. - The number of bytes buffered for reads and writes to the file. - - A that provides read/write access to the file specified in path. - - - - - Creates or overwrites the specified file, specifying a buffer size and a value that describes how to create or overwrite the file. - - The name of the file. - The number of bytes buffered for reads and writes to the file. - One of the values that describes how to create or overwrite the file. - - A new file with the specified buffer size. - - - - - Creates or overwrites the specified file, specifying a buffer size, a value that describes how to create or overwrite the file and a specified . - - The name of the file. - The number of bytes buffered for reads and writes to the file. - One of the values that describes how to create or overwrite the file. - A instance that determines the access control and audit security for the file. - - A new file with the specified buffer size and security options. - - - - - Creates or overwrites the specified file, - specifying advanced options , , , , and a buffer size. - - The name of the file. - The option gives you more precise control over how you want to create a file. - The allow you additionaly specify to default redwrite capability - just write, bypassing any cache. - The option controls how you would like to share created file with other requesters. - The additional advanced options to create a file. - A instance that determines the access control and audit security for the file. - Size of the buffer. - A new file with the specified options and buffer size. - - - - Creates or overwrites a file in the specified path as part of a transaction. - - The transaction. - The path and name of the file to create. - - A that provides read/write access to the file specified in path. - - - - - Creates or overwrites a file in the specified path as part of a transaction. - - The transaction. - The path and name of the file to create. - The number of bytes buffered for reads and writes to the file. - - A that provides read/write access to the file specified in path. - - - - - Creates or overwrites the specified file as part of a transaction, specifying a buffer size and a value that describes how to create or overwrite the file. - - The transaction. - The name of the file. - The number of bytes buffered for reads and writes to the file. - One of the values that describes how to create or overwrite the file. - - A new file with the specified buffer size. - - - - - Creates or overwrites the specified file as part of a transaction, specifying a buffer size, a value that describes how to create or overwrite the file and a specified . - - The transaction. - The name of the file. - The number of bytes buffered for reads and writes to the file. - One of the values that describes how to create or overwrite the file. - A instance that determines the access control and audit security for the file. - - A new file with the specified buffer size and security options. - - - - - Creates or opens a file for writing UTF-8 encoded text. - - - Creates or opens a file for writing UTF-8 encoded text. - - The file to be opened for writing. - A that writes to the specified file using UTF-8 encoding. - - - - Creates or opens a file for writing UTF-8 encoded text as part of a transaction. - - The transaction. - The file to be opened for writing. - - A that writes to the specified file using UTF-8 encoding. - - - - - - Deletes the specified file. - - - An exception is not thrown if the specified file does not exist. - - - - Deletes the specified file. An exception is not thrown if the specified file does not exist. - - The name of the file to be deleted. - - - - Deletes the specified file. An exception is not thrown if the specified file does not exist. - - The name of the file to be deleted. - if set to true overrides read only attribute of the file. - - - - Deletes the specified file as part of a transaction. An exception is not thrown if the specified file does not exist. - - The transaction. - The name of the file to be deleted. - - - - Deletes the specified file as part of a transaction. An exception is not thrown if the specified file does not exist. - - The transaction. - The name of the file to be deleted. - if set to true overrides read only attribute of the file. - - - - Decrypts a file that was encrypted by the current account using the Encrypt method. - - A path that describes a file to decrypt. - - - - Encrypts a file so that only the account used to encrypt the file can decrypt it. - - A path that describes a file to encrypt. - - - - Retrieves the encryption status of the specified file. - - The name of the file. - The of the specified . - - - - Determines whether the specified file exists. - - - Determines whether the specified file exists. - - The file to check. Note that this files may contain wildcards, such as '*'. - true if the caller has the required permissions and path contains the name of an existing file; otherwise, false. This method also returns false if path is nullNothingnullptra null reference (Nothing in Visual Basic), an invalid path, or a zero-length string. If the caller does not have sufficient permissions to read the specified file, no exception is thrown and the method returns false regardless of the existence of path. - - - - Determines whether the specified file exists as part of a transaction. - - The transaction. - The file to check. Note that this files may contain wildcards, such as '*'. - - true if the caller has the required permissions and path contains the name of an existing file; otherwise, false. This method also returns false if path is nullNothingnullptra null reference (Nothing in Visual Basic), an invalid path, or a zero-length string. If the caller does not have sufficient permissions to read the specified file, no exception is thrown and the method returns false regardless of the existence of path. - - - - - Gets a object that encapsulates access control list (ACL) entries for a particular file. - - - Gets a object that encapsulates the specified type of access control list (ACL) entries for a particular file. - - The path to a file containing a object that describes the file's access control list (ACL) information. - - A object that encapsulates the access control rules for the file described by the parameter. - - - - - Gets a object that encapsulates the specified type of access control list (ACL) entries for a particular file. - - The path to a file containing a object that describes the file's access control list (ACL) information. - One (or more) of the values that specifies the type of access control list (ACL) information to receive. - A object that encapsulates the access control rules for the file described by the parameter. - - - - Applies access control list (ACL) entries described by a FileSecurity object to the specified file. - - Note that unlike this method does not automatically - determine what parts of the specified instance has been modified. Instead, the - parameter is used to specify what entries from to - apply to . - A file to add or remove access control list (ACL) entries from. - A object that describes an ACL entry to apply to the file described by the parameter. - One or more of the values that specifies the type of access control - list (ACL) information to set. - - - - Gets the of the file on the path. - - The path to the file. - The of the file on the path. - - - - Gets the of the file on the path. - - The transaction. - The path to the file. - The of the file on the path. - - - - Gets the of the file on the path. - - - Gets the of the file on the path. - - The path to the file. - The of the file on the path. - - - - Gets the of the file on the path as part of a transaction. - - The transaction. - The path to the file. - - The of the file on the path. - - - - - Sets the attributes for a file or directory. - - - Sets the attributes for a file or directory. - - The name of the file whose attributes are to be set. - The file attributes to set for the file. Note that all other values override . - - - - Sets the attributes for a file or directory as part of a transaction. - - The transaction. - The name of the file whose attributes are to be set. - The file attributes to set for the file. Note that all other values override . - - - - Returns the creation date and time of the specified file or directory. - - - Returns the creation date and time of the specified file or directory. - - The file or directory for which to obtain creation date and time information. - A structure set to the creation date and time for the specified file or directory. This value is expressed in local time. - - - - Returns the creation date and time, in coordinated universal time (UTC), of the specified file or directory. - - - Returns the creation date and time, in coordinated universal time (UTC), of the specified file or directory. - - The file or directory for which to obtain creation date and time information. - A structure set to the creation date and time for the specified file or directory. This value is expressed in UTC time. - - - - Returns the date and time the specified file or directory was last accessed. - - - Returns the date and time the specified file or directory was last accessed. - - The file or directory for which to obtain creation date and time information. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last accessed. - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last accessed. - - The path. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in UTC time. - - - - Returns the date and time the specified file or directory was last written to. - - - Returns the date and time the specified file or directory was last written to. - - The path. - A structure set to the date and time that the specified file or directory was last written to. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last written to. - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last written to. - - The file or directory for which to obtain write date and time information. - A structure set to the date and time that the specified file or directory was last written. This value is expressed in UTC time. - - - - Returns the creation date and time of the specified file or directory as part of a transaction. - - The transaction to use. - The file or directory for which to obtain creation date and time information. - - A structure set to the creation date and time for the specified file or directory. This value is expressed in local time. - - - - - Returns the creation date and time, in coordinated universal time (UTC), of the specified file or directory as part of a transaction. - - The file or directory for which to obtain creation date and time information. - The transaction to use. - A structure set to the creation date and time for the specified file or directory. This value is expressed in UTC time. - - - - Returns the date and time the specified file or directory was last accessed as part of a transaction. - - The file or directory for which to obtain creation date and time information. - The transaction to use. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last accessed as part of a transaction. - - The path. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in UTC time. - The transaction to use. - - - - Returns the date and time the specified file or directory was last written to as part of a transaction. - - The path. - The transaction to use. - A structure set to the date and time that the specified file or directory was last written to. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last written to as part of a transaction. - - The file or directory for which to obtain write date and time information. - The transaction to use. - A structure set to the date and time that the specified file or directory was last written. This value is expressed in UTC time. - - - - Retrieves file information for the specified file. - - - Retrieves file information for the specified file. - - A connected to the open file from which to retrieve the information. - A object containing the requested information. - - - - Retrieves file information for the specified file. - - A connected to the open file from which to retrieve the information. - A object containing the requested information. - - - - Moves a specified file to a new location, providing the option to specify a new file name. - - - Moves a specified file to a new location, providing the option to specify a new file name. - - The name of the file to move. - The new path for the file. - This method works across disk volumes, and it does not throw an exception if the source and destination are - the same. Note that if you attempt to replace a file by moving a file of the same name into that directory, you - get an IOException. You cannot use the Move method to overwrite an existing file. - - - - Moves a file or directory, including its children. - - The name of the existing file or directory on the local computer. - If specifies , the file cannot exist on - a remote share because delayed operations are performed before the network is available. - - The new name of the file or directory on the local computer. - When moving a file, can be on a different file system or volume. - If is on another drive, you must set the - flag in . - - When moving a directory, and must be on the same drive. - - The move options. - - - - Moves a file or directory, including its children. You can provide a callback function that receives - progress notifications. - - The name of the existing file or directory on the local computer. - If specifies , the file cannot exist on - a remote share because delayed operations are performed before the network is available. - - The new name of the file or directory on the local computer. - When moving a file, can be on a different file system or volume. - If is on another drive, you must set the - flag in . - - When moving a directory, and must be on the same drive. - - The move options. - A callback function that is called each time another - portion of the file has been moved. The callback function can be useful if you provide a user interface that displays - the progress of the operation. This parameter can be . - An argument to be passed to the callback function. This parameter can be . - true if the file was completely moved, false if the operation was aborted. - - - - Moves a specified file to a new location as part of a transaction, providing the option to specify a new file name. - - The transaction. - The name of the file to move. - The new path for the file. - This method works across disk volumes, and it does not throw an exception if the source and destination are - the same. Note that if you attempt to replace a file by moving a file of the same name into that directory, you - get an IOException. You cannot use the Move method to overwrite an existing file. - - - - Moves a file or directory as part of a transaction, including its children. - - The transaction. - The name of the existing file or directory on the local computer. - If specifies , the file cannot exist on - a remote share because delayed operations are performed before the network is available. - The new name of the file or directory on the local computer. - When moving a file, can be on a different file system or volume. - If is on another drive, you must set the - flag in . - - When moving a directory, and must be on the same drive. - The move options. - - - - Moves a file or directory as part of a transaction, including its children. You can provide a callback function that receives - progress notifications. - - The transaction. - The name of the existing file or directory on the local computer. - If specifies , the file cannot exist on - a remote share because delayed operations are performed before the network is available. - The new name of the file or directory on the local computer. - When moving a file, can be on a different file system or volume. - If is on another drive, you must set the - flag in . - - When moving a directory, and must be on the same drive. - The move options. - A callback function that is called each time another - portion of the file has been moved. The callback function can be useful if you provide a user interface that displays - the progress of the operation. This parameter can be . - An argument to be passed to the callback function. This parameter can be . - - true if the file was completely moved, false if the operation was aborted. - - - - - Opens a on the specified path. - - - Opens a on the specified path with read/write access. - - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A opened in the specified mode and path, with read/write access and not shared. - - - - Opens a on the specified path, with the specified mode and access. - - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies the operations that can be performed on the file. - An unshared that provides access to the specified file, with the specified mode and access. - - - - Opens a on the specified path, having the specified mode with read, write, or - read/write access and the specified sharing option. - - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value specifying the type of access other threads have to the file. - A on the specified path, having the specified mode with read, write, or read/write access and the specified sharing option. - - - - Opens a on the specified path, having the specified mode with read, write, or - read/write access, the specified sharing option and additional options specified. - - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies whether a file is created if one does not exist, - and determines whether the contents of existing files are retained or overwritten along with additional options. - A value specifying the type of access other threads have to the file. - Advanced options for this file. - - A on the specified path, having the specified mode with read, write, or read/write access and the specified sharing option. - - - - - Opens a on the specified path, having the specified mode with read, write, or - read/write access, the specified sharing option and additional options specified. - - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies whether a file is created if one does not exist, - and determines whether the contents of existing files are retained or overwritten along with additional options. - A value specifying the type of access other threads have to the file. - Advanced options for this file. - - A on the specified path, having the specified mode with read, write, or read/write access and the specified sharing option. - - - - - Opens the specified file for reading purposes bypassing security attributes. - This method is simpler to use then BackupFileStream to read only file's data stream. - - The file path to open. - A on the specified path, having the read-only mode and sharing options. - - - - Opens a FileStream on the specified path with read/write access as part of a transaction. - - The transaction. - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - - A opened in the specified mode and path, with read/write access and not shared. - - - - - Opens a on the specified path as part of a transaction, with the specified mode and access. - - The transaction. - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies the operations that can be performed on the file. - - An unshared that provides access to the specified file, with the specified mode and access. - - - - - Opens a on the specified path as part of a transaction, having the specified mode with read, write, or - read/write access and the specified sharing option. - - The transaction. - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value specifying the type of access other threads have to the file. - - A on the specified path, having the specified mode with read, write, or read/write access and the specified sharing option. - - - - - Opens a on the specified path, having the specified mode with read, write, or - read/write access, the specified sharing option and additional options specified. - - The transaction to use. - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies whether a file is created if one does not exist, - and determines whether the contents of existing files are retained or overwritten along with additional options. - A value specifying the type of access other threads have to the file. - Advanced options for this file. - - A on the specified path, having the specified mode with read, write, or read/write access and the specified sharing option. - - - - - Opens a on the specified path, having the specified mode with read, write, or - read/write access, the specified sharing option and additional options specified. - - The transaction to use. - The file to open. - A value that specifies whether a file is created if one does not exist, and determines whether the contents of existing files are retained or overwritten. - A value that specifies whether a file is created if one does not exist, - and determines whether the contents of existing files are retained or overwritten along with additional options. - A value specifying the type of access other threads have to the file. - Advanced options for this file. - - A on the specified path, having the specified mode with read, write, or read/write access and the specified sharing option. - - - - - Opens an existing file for reading. - - - Opens an existing file for reading. - - The file to be opened for reading. - A read-only on the specified path. - - - - Opens an existing file for reading as part of a transaction. - - The transaction. - The file to be opened for reading. - - A read-only on the specified path. - - - - - Opens an existing UTF-8 encoded text file for reading. - - - Opens an existing UTF-8 encoded text file for reading. - - The file to be opened for reading. - A StreamReader on the specified path. - - - - Opens an existing UTF-8 encoded text file for reading as part of a transaction. - - The transaction. - The file to be opened for reading. - A StreamReader on the specified path. - - - - Opens an existing file for writing. - - - Opens an existing file for writing. - - The file to be opened for writing. - An unshared object on the specified path with Write access. - - - - Opens an existing file for writing as part of a transaction. - - The transaction. - The file to be opened for writing. - - An unshared object on the specified path with Write access. - - - - - Transfers the time stamps for files and directories. - - The source path. - The destination path. - - This method uses BackupSemantics flag to get Timestamp changed for folders. - This method does not change last access time for the source file. - - - - - Opens a binary file, reads the contents of the file into a byte array, and then closes the file. - - - Opens a binary file, reads the contents of the file into a byte array, and then closes the file. - - The file to open for reading. - A byte array containing the contents of the file. - - - - Opens a binary file, reads the contents of the file into a byte array, and then closes the file as part of a transaction. - - The transaction. - The file to open for reading. - - A byte array containing the contents of the file. - - - - - Opens a text file, reads all lines of the file, and then closes the file. - - - Opens a text file, reads all lines of the file, and then closes the file. - - The file to open for reading. - A string array containing all lines of the file. - - - - Opens a file, reads all lines of the file with the specified encoding, and then closes the file. - - The file to open for reading. - The encoding applied to the contents of the file. - A string array containing all lines of the file. - - - - Opens a text file as part of a transaction, reads all lines of the file, and then closes the file. - - The transaction. - The file to open for reading. - - A string array containing all lines of the file. - - - - - Opens a file as part of a transaction, reads all lines of the file with the specified encoding, and then closes the file. - - The transaction. - The file to open for reading. - The encoding applied to the contents of the file. - - A string array containing all lines of the file. - - - - - Opens a text file, reads all lines of the file, and then closes the file. - - - Opens a text file, reads all lines of the file, and then closes the file. - - The file to open for reading. - A string containing all lines of the file. - - - - Opens a file, reads all lines of the file with the specified encoding, and then closes the file. - - The file to open for reading. - The encoding applied to the contents of the file. - A string containing all lines of the file. - - - - Opens a text file as part of a transaction, reads all lines of the file, and then closes the file. - - The transaction. - The file to open for reading. - - A string containing all lines of the file. - - - - - Opens a text file as part of a transaction, reads all lines of the file with the specified encoding, and then closes the file. - - The transaction. - The file to open for reading. - The encoding applied to the contents of the file. - - A string containing all lines of the file. - - - - - Replaces one file with another file, with the option of creating a backup copy of the original file. The replacement file assumes the name of the replaced file and its identity. - - - Replaces one file with another file, with the option of creating a backup copy of the original file. The replacement file assumes the name of the replaced file and its identity. - - The name of a file that replaces the file specified by . - The name of the file being replaced. - The name of the backup file. - - - - Replaces one file with another file, with the option of creating a backup copy of the original file. The replacement file assumes the name of the replaced file and its identity. - - The name of a file that replaces the file specified by . - The name of the file being replaced. - The name of the backup file. - set to true to ignore merge errors (such as attributes and access control lists (ACLs)) from the replaced file to the replacement file; otherwise, false. - - - - Internal method for setting file times on a file. - - The path. - The creation time. - The last access time. - The last write time. - This method uses FileOptions.BackupSemantics flag to write Timestamps to folders as well. - - - - Sets the date and time the file was created. - - - Sets the date and time the file was created. - - The file for which to set the creation date and time information. - A containing the value to set for the creation date and time of path. This value is expressed in local time. - - - - Sets the date and time, in coordinated universal time (UTC), that the file was created. - - - Sets the date and time, in coordinated universal time (UTC), that the file was created. - - The file for which to set the creation date and time information. - A containing the value to set for the creation date and time of path. This value is expressed in UTC time. - - - - Sets the date and time, in local time, that the file was last accessed. - - - Sets the date and time, in local time, that the file was last accessed. - - The file for which to set the last access date and time information. - A containing the value to set for the last access date and time of path. This value is expressed in local time. - - - - Sets the date and time, in coordinated universal time (UTC), that the file was last accessed. - - - Sets the date and time, in coordinated universal time (UTC), that the file was last accessed. - - The file for which to set the last access date and time information. - A containing the value to set for the last access date and time of path. This value is expressed in UTC time. - - - - Sets the date and time, in local time, that the file was last modified. - - - Sets the date and time, in local time, that the file was last modified. - - The file for which to set the last modification date and time information. - A containing the value to set for the last modification date and time of path. This value is expressed in local time. - - - - Sets the date and time, in coordinated universal time (UTC), that the file was last modified. - - - Sets the date and time, in coordinated universal time (UTC), that the file was last modified. - - The file for which to set the last modification date and time information. - A containing the value to set for the last modification date and time of path. This value is expressed in UTC time. - - - - Sets all the time stamps at once. - - - Sets the time stamps at once. - - The path. - The creation time. - The last access time. - The last write time. - - - - Sets all the time stamps at once in UTC. - - - Sets all the time stamps at once in UTC. - - - This method is redundant, because NTFS driver converts any dates in UTC format anyways. - - The path. - The creation time. - The last access time. - The last write time. - - - - Internal method for setting file times on a file as part of a transaction. - - The transaction. - The path. - The creation time. - The last access time. - The last write time. - - - - Sets the date and time the file was created as part of a transaction. - - The transaction. - The file for which to set the creation date and time information. - A containing the value to set for the creation date and time of path. This value is expressed in local time. - - - - Sets the date and time as part of a transaction, in coordinated universal time (UTC), that the file was created. - - The transaction. - The file for which to set the creation date and time information. - A containing the value to set for the creation date and time of path. This value is expressed in UTC time. - - - - Sets the date and time as part of a transaction, in local time, that the file was last accessed. - - The transaction. - The file for which to set the last access date and time information. - The last access time. - - - - Sets the date and time as part of a transaction, in coordinated universal time (UTC), that the file was last accessed. - - The transaction. - The file for which to set the last access date and time information. - The last access time. - - - - Sets the date and time as part of a transaction, in local time, that the file was last modified. - - The transaction. - The file for which to set the last modification date and time information. - The last write time. - - - - Sets the date and time as part of a transaction, in coordinated universal time (UTC), that the file was last modified. - - The transaction. - The file for which to set the last modification date and time information. - The last write time. - - - - Sets the time stamps at once. - - The transaction. - The path. - The creation time. - The last access time. - The last write time. - - - - Sets the time stamps at once in UTC. But it's redundant, because NTFS driver converts any dates in UTC format anyways. - - The transaction. - The path. - The creation time. - The last access time. - The last write time. - - - - Creates a new file, writes the specified byte array to the file, and then closes the file. If the target file already exists, it is overwritten. - - - Creates a new file, writes the specified byte array to the file, and then closes the file. If the target file already exists, it is overwritten. - - The file to write to. - The bytes to write to the file. - - - - Creates a new file as part of a transaction, writes the specified byte array to the file, and then closes the file. If the target file already exists, it is overwritten. - - The transaction. - The file to write to. - The bytes to write to the file. - - - - Creates a new file, write the specified string array to the file, and then closes the file. If the target file already exists, it is overwritten. - - - Creates a new file, write the specified string array to the file, and then closes the file. If the target file already exists, it is overwritten. - - The file to write to. - The string array to write to the file. - - - - Creates a new file, writes the specified string array to the file using the specified encoding, and then closes the file. If the target file already exists, it is overwritten. - - The file to write to. - he string array to write to the file. - An object that represents the character encoding applied to the string array. - - - - Creates a new file as part of a transaction, write the specified string array to the file, and then closes the file. If the target file already exists, it is overwritten. - - The transaction. - The file to write to. - The string array to write to the file. - - - - Creates a new file as part of a transaction, writes the specified string array to the file using the specified encoding, and then closes the file. If the target file already exists, it is overwritten. - - The transaction. - The file to write to. - he string array to write to the file. - An object that represents the character encoding applied to the string array. - - - - Creates a new file, write the contents to the file, and then closes the file. If the target file already exists, it is overwritten. - - - Creates a new file, write the contents to the file, and then closes the file. If the target file already exists, it is overwritten. - - The file to write to. - The string to write to the file. - - - - Creates a new file, writes the specified string to the file using the specified encoding, and then closes the file. If the target file already exists, it is overwritten. - - The file to write to. - The string to write to the file. - An object that represents the encoding to apply to the string. - - - - Creates a new file as part of a transaction, write the contents to the file, and then closes the file. If the target file already exists, it is overwritten. - - The transaction. - The file to write to. - The string to write to the file. - - - - Creates a new file as part of a transaction, writes the specified string to the file using the specified encoding, and then closes the file. If the target file already exists, it is overwritten. - - The transaction. - The file to write to. - The string to write to the file. - An object that represents the encoding to apply to the string. - - - - Establishes a hard link between an existing file and a new file. This function is only supported on the NTFS file system, and only for files, not directories. - - - Establishes a hard link between an existing file and a new file. This function is only supported on the NTFS file system, and only for files, not directories. - - The source file. - The destination file. - The destination file already exists. - An attempt to create a hard-link on a non-supported filesystem - could not be found - - - - Establishes a hard link between an existing file and a new file. This function is only supported on the NTFS file system, and only for files, not directories. - - The source file. - The destination file. - The transaction to use. - The destination file already exists. - An attempt to create a hard-link on a non-supported filesystem - could not be found - - - - Creates a symbolic link. - - - Creates a symbolic link. - - The name of the target for the symbolic link to be created. - The symbolic link to be created. - Indicates whether the link target, , is a file or directory. - - - - Creates a symbolic link as part of a transaction. - - The name of the target for the symbolic link to be created. - The symbolic link to be created. - Indicates whether the link target, , is a file or directory. - The transaction to use. - - - - Gets information about the target of a mount point or symbolic link on an NTFS file system. - - The path to the reparse point. - An instance of or containing - information about the symbolic link or mount point pointed to by . - - - - Gets information about the target of a mount point or symbolic link on an NTFS file system as part of a transaction. - - The transaction. - The path to the reparse point. - - An instance of or containing - information about the symbolic link or mount point pointed to by . - - - - - Enumerates all hard links to the specified file. - - - Creates an enumeration of all the hard links to the specified . - - Required Windows Vista or later. - The name of the file. - An enumeration of all the hard links to the specified - - - - Creates an enumeration of all the hard links to the specified as part - of the specified . - - The transaction to use. - The name of the file. - - An enumeration of all the hard links to the specified - - Required Windows Vista or later. - - - - Retrieves the actual number of bytes of disk storage used to store a specified file. - - - Retrieves the actual number of bytes of disk storage used to store a specified file. - - - If the file is located on a volume that - supports compression and the file is compressed, the value obtained is the compressed size of the specified file. - If the file is located on a volume that supports sparse files and the file is a sparse file, the value obtained is the sparse - size of the specified file. - - The name of the file. - Do not specify the name of a file on a nonseeking device, such as a pipe or a communications device, as its file size has no meaning. - - the actual number of bytes of disk storage used to store the specified file. - - - - - Retrieves the actual number of bytes of disk storage used to store a specified file as part of a transaction. If the file is located on a volume that - supports compression and the file is compressed, the value obtained is the compressed size of the specified file. - If the file is located on a volume that supports sparse files and the file is a sparse file, the value obtained is the sparse - size of the specified file. - - The transaction. - The name of the file. - Do not specify the name of a file on a nonseeking device, such as a pipe or a communications device, as its file size has no meaning. - - the actual number of bytes of disk storage used to store the specified file. - - - - - Represents a privilege for an access token. The privileges available on the local machine are available as - static instances from this class. To create a representing a privilege on another system, - use the constructor specifying a system name together with one of these static instances. - - - - - - Required to assign the primary token of a process. User Right: Replace a process-level token. - - - - - Required to generate audit-log entries. Give this privilege to secure servers. User Right: Generate security audits. - - - - - Required to perform backup operations. This privilege causes the system to grant all read access control to any file, regardless of the access control list (ACL) specified for the file. Any access request other than read is still evaluated with the ACL. User Right: Back up files and directories. - - - - - Required to receive notifications of changes to files or directories. This privilege also causes the system to skip all traversal access checks. It is enabled by default for all users. User Right: Bypass traverse checking. - - - - - Required to create named file mapping objects in the global namespace during Terminal Services sessions. This privilege is enabled by default for administrators, services, and the local system account. User Right: Create global objects. - - Windows XP/2000: This privilege is not supported. Note that this value is supported starting with Windows Server 2003, Windows XP SP2, and Windows 2000 SP4. - - - - Required to create a paging file. User Right: Create a pagefile. - - - - - Required to create a permanent object. User Right: Create permanent shared objects. - - - - - Required to create a symbolic link. User Right: Create symbolic links. - - - - - Required to create a primary token. User Right: Create a token object. - - - - - Required to debug and adjust the memory of a process owned by another account. User Right: Debug programs. - - - - - Required to mark user and computer accounts as trusted for delegation. User Right: Enable computer and user accounts to be trusted for delegation. - - - - - Required to impersonate. User Right: Impersonate a client after authentication. - - Windows XP/2000: This privilege is not supported. Note that this value is supported starting with Windows Server 2003, Windows XP SP2, and Windows 2000 SP4. - - - - Required to increase the base priority of a process. User Right: Increase scheduling priority. - - - - - Required to increase the quota assigned to a process. User Right: Adjust memory quotas for a process. - - - - - Required to allocate more memory for applications that run in the context of users. User Right: Increase a process working set. - - - - - Required to load or unload a device driver. User Right: Load and unload device drivers. - - - - - Required to lock physical pages in memory. User Right: Lock pages in memory. - - - - - Required to create a computer account. User Right: Add workstations to domain. - - - - - Required to enable volume management privileges. User Right: Manage the files on a volume. - - - - - Required to gather profiling information for a single process. User Right: Profile single process. - - - - - Required to modify the mandatory integrity level of an object. User Right: Modify an object label. - - - - - Required to shut down a system using a network request. User Right: Force shutdown from a remote system. - - - - - Required to perform restore operations. This privilege causes the system to grant all write access control to any file, regardless of the ACL specified for the file. Any access request other than write is still evaluated with the ACL. Additionally, this privilege enables you to set any valid user or group SID as the owner of a file. User Right: Restore files and directories. - - - - - Required to perform a number of security-related functions, such as controlling and viewing audit messages. This privilege identifies its holder as a security operator. User Right: Manage auditing and security log. - - - - - Required to shut down a local system. User Right: Shut down the system. - - - - - Required for a domain controller to use the LDAP directory synchronization services. This privilege enables the holder to read all objects and properties in the directory, regardless of the protection on the objects and properties. By default, it is assigned to the Administrator and LocalSystem accounts on domain controllers. User Right: Synchronize directory service data. - - - - - Required to modify the nonvolatile RAM of systems that use this type of memory to store configuration information. User Right: Modify firmware environment values. - - - - - Required to gather profiling information for the entire system. User Right: Profile system performance. - - - - - Required to modify the system time. User Right: Change the system time. - - - - - Required to take ownership of an object without being granted discretionary access. This privilege allows the owner value to be set only to those values that the holder may legitimately assign as the owner of an object. User Right: Take ownership of files or other objects. - - - - - This privilege identifies its holder as part of the trusted computer base. Some trusted protected subsystems are granted this privilege. User Right: Act as part of the operating system. - - - - - Required to adjust the time zone associated with the computer's internal clock. User Right: Change the time zone. - - - - - Required to access Credential Manager as a trusted caller. User Right: Access Credential Manager as a trusted caller. - - - - - Required to undock a laptop. User Right: Remove computer from docking station. - - - - - Required to read unsolicited input from a terminal device. User Right: Not applicable. - - - - - Create a new representing the specified privilege on the specified system. - - Name of the system. - The privilege to copy the privilege name from. - - - - Retrieves the display name that represents this privilege. - - The display name that represents this privilege. - - - - Retrieves the locally unique identifier (LUID) used on to represent this privilege (on the system from which it originates). - - the locally unique identifier (LUID) used on to represent this privilege (on the system from which it originates). - - - - Indicates whether the current object is equal to another object of the same type. - - An object to compare with this object. - - true if the current object is equal to the parameter; otherwise, false. - - - - - Determines whether the specified is equal to the current . - - The to compare with the current . - - true if the specified is equal to the current ; otherwise, false. - - The parameter is null. - - - - Serves as a hash function for a particular type. - - - A hash code for the current . - - - - - Returns the system name for this privilege. - - This is equivalent to . - - A that represents the current . - - - - - Initializes a new instance of the class, representing a privilege - with the specified name on the local system. - - The name. - - - - Gets the system name identifying this privilege. - - The system name identifying this privilege. - - - - Indicates whether the link target is a file or directory. - - - - - The link target is a file. - - - - - The link target is a directory. - - - - - The type of the data contained in the backup stream. - - - - - This indicates an error. - - - - - Standard data - - - - - Extended attribute data - - - - - Security descriptor data - - - - - Alternative data streams - - - - - Hard Link Information - - - - - Property data - - - - - Object identifiers - - - - - Reparse points - - - - - Sparse file - - - - - Specifies how the operating system should open a file. - - - - - Specifies that the operating system should create a new file. If the file already exists, an exception is thrown. - - - - - Specifies that the operating system should create a new file. If the file already exists, it will be overwritten. - Create is equivalent to requesting that if the file does not exist, use ; otherwise, use . - - - - - Specifies that the operating system should open an existing file. The ability to open the file is dependent on the value specified by . A is thrown if the file does not exist. - - - - - Specifies that the operating system should open a file if it exists; otherwise, a new file should be created. - - - - - Specifies that the operating system should open an existing file. Once opened, the file should be truncated so that its size is zero bytes. Attempts to read from a file opened with Truncate cause an exception. - - - - - Provides instance methods for the creation, copying, deletion, moving, and opening of files, and aids in the creation of FileStream objects. - This class cannot be inherited. - - - - - Initializes a new instance of the FileInfo class, which acts as a wrapper for a file path. - - The path to the file. - is a reference. - - You can specify either the fully qualified or the relative file name, but the security check gets the fully qualified name. - - - - - Refreshes the state of the object. - - - FileSystemInfo.Refresh takes a snapshot of the file from the current file system. Refresh cannot correct the underlying file system even if the file system returns incorrect or outdated information. This can happen on platforms such as Windows 98. - Calls must be made to Refresh before attempting to get the attribute information, or the information will be outdated. - - - - - Deletes a file. - - - - - Returns the path as a string. - - A string representing the path. - - - - Creates a that appends text to the file represented by this instance of the . - - A that appends UTF-8 encoded text to an existing file. - - - - Copies an existing file to a new file, disallowing the overwriting of an existing file. - - The name of the new file to copy to. - A new file with a fully qualified path. - - - - Copies an existing file to a new file, allowing the overwriting of an existing file. - - The name of the new file to copy to. - true to allow an existing file to be overwritten; otherwise, false. - A new file, or an overwrite of an existing file if overwrite is true. If the file exists and overwrite is false, an IOException is thrown. - - - - Creates a file. - - A new file. - - - - Creates a that writes a new text file. - - A new - - - - Decrypts a file that was encrypted by the current account using the method. - - The Decrypt method allows you to decrypt a file that was encrypted using the Encrypt method. - The Decrypt method can decrypt only files that were encrypted using the current user account. - Both the Encrypt method and the Decrypt method use the cryptographic service provider (CSP) installed on the computer and the file encryption keys of the process calling the method. - The current file system must be formatted as NTFS and the current operating system must be Microsoft Windows NT or later. - - - - - Encrypts a file so that only the account used to encrypt the file can decrypt it. - - - The Encrypt method allows you to encrypt a file so that only the account used to call this method can decrypt it. Use the Decrypt method to decrypt a file encrypted by the Encrypt method. - Both the Encrypt method and the Decrypt method use the cryptographic service provider (CSP) installed on the computer and the file encryption keys of the process calling the method. - The current file system must be formatted as NTFS and the current operating system must be Microsoft Windows NT or later. - - - - - Gets a object that encapsulates the access control list (ACL) entries for the file described by the current object. - - A FileSecurity object that encapsulates the access control rules for the current file. - - - - Gets a object that encapsulates the specified type of access control list (ACL) entries for the file described by the current FileInfo object. - - The include sections. - object that encapsulates the specified type of access control list (ACL) entries for the file described by the current FileInfo object. - - - - Moves a specified file to a new location, providing the option to specify a new file name. - - The path to move the file to, which can specify a different file name. - This method works across disk volumes. For example, the file c:\MyFile.txt can be moved to d:\public and renamed NewFile.txt. - - - - Opens a file in the specified mode. - - A FileMode constant specifying the mode (for example, Open or Append) in which to open the file. - A file opened in the specified mode, with read/write access and unshared. - - - - Opens a file in the specified mode with read, write, or read/write access. - - A FileMode constant specifying the mode (for example, Open or Append) in which to open the file. - A FileAccess constant specifying whether to open the file with Read, Write, or ReadWrite file access. - A file opened in the specified mode, with read/write access and unshared. - - - - Opens a file in the specified mode with read, write, or read/write access. - - A FileMode constant specifying the mode (for example, Open or Append) in which to open the file. - A FileAccess constant specifying whether to open the file with Read, Write, or ReadWrite file access. - A FileShare constant specifying the type of access other FileStream objects have to this file. - A file opened in the specified mode, with read/write access and unshared. - - - - Creates a read-only FileStream. - - A new read-only FileStream object. - - - - Creates a StreamReader with UTF8 encoding that reads from an existing text file. - - A new StreamReader with UTF8 encoding. - - - - Creates a write-only FileStream. - - A new write-only unshared FileStream object. - - - - Replaces the contents of a specified file with the file described by the current FileInfo object, deleting the original file, and creating a backup of the replaced file. - - The name of a file to replace with the current file. - The name of a file with which to create a backup of the file described by the destFileName parameter. - A FileInfo object that encapsulates information about the file described by the destFileName parameter. - The Replace method replaces the contents of a specified file with the contents of the file described by the current FileInfo object. It also creates a backup of the file that was replaced. Finally, it returns a new FileInfo object that describes the overwritten file. - - - - Replaces the specified destination file name. - - The name of a file to replace with the current file. - The name of a file with which to create a backup of the file described by the destFileName parameter. - true to ignore merge errors (such as attributes and ACLs) from the replaced file to the replacement file; otherwise false. - A FileInfo object that encapsulates information about the file described by the destFileName parameter. - The Replace method replaces the contents of a specified file with the contents of the file described by the current FileInfo object. It also creates a backup of the file that was replaced. Finally, it returns a new FileInfo object that describes the overwritten file. - The last parameter is not supported yet. - - - - - Applies access control list (ACL) entries described by a FileSecurity object to the file described by the current FileInfo object. - - A FileSecurity object that describes an access control list (ACL) entry to apply to the current file. - The SetAccessControl method applies access control list (ACL) entries to the current file that represents the noninherited ACL list. - Use the SetAccessControl method whenever you need to add or remove ACL entries from a file. - - - - - Gets an instance of the parent directory. - - A object representing the parent directory of this file. - To get the parent directory as a string, use the DirectoryName property. - - - - - Gets a value indicating whether the file or directory exists. - - true if the file exists; otherwise, false. - - - - Gets or sets a value that determines if the current file is read only. - - - true if the current file is read only; otherwise, false. - - - - - Gets the name of the file with extension. - - File name with extension. - - For a file, Name returns only the file name and file name extension, such as MyFile.txt, not c:\Dir\Myfile.txt. - - - - - Gets the file size. - - The file size. - - - - Flags that specify how a file is to be copied. - - - - - None of the other flags. - - - - - The copy operation fails immediately if the target file already exists. - - - - - Progress of the copy is tracked in the target file in case the copy fails. - The failed copy can be restarted at a later time by specifying the same values for - existing file name and new file name as those used in the call that failed. - - - - - The file is copied and the original file is opened for write access. - - - - - An attempt to copy an encrypted file will succeed even if the destination copy cannot be encrypted. - - - - Windows 2000: - This value is not supported - - - - - - If the source file is a symbolic link, the destination file is also a symbolic link pointing to the same file that the source symbolic link is pointing to. - - - - Windows Server 2003 and Windows XP/2000: - This value is not supported - - - - - - The exception that is thrown when an attempt to create a directory or file that already exists was made. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The path. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The message. - The path. - The inner exception. - - - - Initializes a new instance of the class. - - The data for serializing or deserializing the object. - The source and destination for the object. - - - - The reason that was called. - - - - - Another part of the data file was copied. - - - - - Another stream was created and is about to be copied. This is the callback reason given when the callback routine is first invoked. - - - - - The collection of values that should return in case of traversal failure. - - - - - - - - - - - - - - - - - - - - - - - - - Performs operations on String instances that contain file or directory path information. - - - - - Provides standard Windows UNC path prefix - - - - - Provides standard Windows long path prefix - - - - - Provides standard Windows long path UNC prefix - - - - - Changes the extension of a path string. - - The path information to modify. The path cannot contain any of the characters defined in GetInvalidPathChars. - The new extension (with a leading period). Specify to remove an existing extension from path. - The specified with the extension of the file name changed to the specified . - - - - Combines two path strings. - - The path1. - The path2. - A string containing the combined paths. If one of the specified paths is a zero-length string, this method returns the other path. If contains an absolute path, this method returns . - - - - Returns the directory information for the specified with a trailing directory separator. - - The path. - The directory information for the specified with a trailing directory separator. - - - - - - - Returns the directory information for the specified without the root and with a trailing directory separator. - - The path. - The directory information for the specified without the root and with a trailing directory separator. - - - - - - - Returns the directory information for the specified path string. - - The path. - The path without the file name part (if any). - - - - Returns the directory information for the specified path string without the root information. - - The path. - The path without the file name part and without the root information (if any). - - - - Returns the extension of the specified path string. - - The path string from which to get the extension. - The extension of the specified , or an empty string - if the path contains no extension. If the path is , this method - returns . - - - - Returns the file name and extension of the specified path string. - - The path string from which to obtain the file name and extension. - A String consisting of the characters after the last directory character in path. - If the last character of path is a directory or volume separator character, - this method returns Empty. If path is a null reference, this method returns - . - - - - Returns the file name without extension of the specified path string. - - The path string from which to obtain the file name. - A String consisting of the characters after the last directory character in path - up to the extension. - If the last character of path is a directory or volume separator character, - this method returns an empty string. If path is a null reference, this method returns - . - - - - Returns the absolute path for the specified path string. - - The file or directory for which to obtain absolute path information. - A string containing the fully qualified location of path, such as "C:\MyFile.txt". - - - - Retrieves the short 8.3 type path form of the specified path. - - The existing path. Can be regualr and long paths. Otherwise throws an error. - A path that has 8.3 type names. - Hasn't been tested on NTFS volumes with disabled 8.3 name generation. Suspect some weirdness. - - - - Converts the specified existing path to its regular long form. - - The existing path. - The full path - - - - Gets an array containing the characters that are not allowed in file names. - - An array containing the characters that are not allowed in file names. - See also - - - - Gets an array containing the characters that are not allowed in path names. - - An array containing the characters that are not allowed in path names. - See also - - - - Gets the path root. - - The path. - A string containing the root directory of path, such as "C:\", or - if is , or an empty string if path does not - contain root directory information. - - - - Returns a random folder name or file name. - - A random folder name or file name. - This is equivalent to . - - - - Creates a uniquely named, zero-byte temporary file on disk and returns the full path of that file. - - A containing the full path of the temporary file. - This is equivalent to - - - - Returns the path of the current system's temporary folder. - - A containing the path information of a temporary directory. - This is equivalent to - - - - Gets the connection name of the locally mapped drive. - - The local path with drive name. This method does not support long path prefixes. - String which has the following format \\servername\sharename. - - - - Gets the UNC name from the locally mapped path. - - The local path with drive name. - String in which drive name being replaced with it's UNC connection name. - - - - Gets the mapped info internal. - This method uses NativeMethods.RemoteNameInfo level to retieve more info :) - - The local path with drive name. - - - - - Determines whether a path includes a file name extension. - - The path to search for an extension. - - true if the specified path has extension; otherwise, false. - - - - - Gets a value indicating whether the specified path string contains absolute or relative path information. - - The path to test. - - true if contains an absolute path; otherwise, false. - - - - - Check if file or folder name has any invalid characters. - - File or folder name. - True or False - - - - Verifies that the specified is valid and does not contain any wildcards. - - The string to test if it contains a valid path. - if is a valid path, otherwise. - - - - Verifies that the specified is valid and optionally may contain wildcards. - - The string to test if it contains a valid path. - if set to true wildcards are allowed in the filename part of the path, otherwise the - presence of wildcards will render the path invalid. - - if is a valid path, otherwise. - - - - - Check if the given path is has the specific long path prefix. - - File or folder full path. - true if has long path prefix, otherwise false. - - - - Retrieves the full long (or extended) unicode version of the specified . - - - - This method takes care of different path conversions to be usable in Unicode - variants of the Win32 funcitons (which are internally used throughout AlphaFS). - - - Regular paths are changed like the following: - - - C:\Somewhere\Something.txt - \\?\C:\Somewhere\Something.txt - - - \\Somewhere\Something.txt - \\?\UNC\Somewhere\Something.txt - - - - - Already processed paths are preserved untouched so to avoid mistakes of double prefixing. - - - If the is not an absolute path, or is not rooted, the path of the - current directory (and drive) is combined with the specified to form - an absolute path. - - - File or Folder name to sanitize and prefix with proper standard. - The full long (or extended) unicode version of the specified . - - - - Gets the regular path from long prefixed one. i.e. \\?\C:\Temp\file.txt to C:\Temp\file.txt - \\?\UNC\Server\share\file.txt to \\Server\share\file.txt - - The path. - Regular form path string. - This method does not handle paths with volume names, eg. \\?\Volume{c00fa7c5-63eb-11dd-b6ed-806e6f6e6963}\Folder\file.txt - - - - Determines whether the specified path is UNC path. - Supports long path prefix. - - The path. - - true if the specified path is UNC; otherwise, false. - - - - - Provides a platform-specific alternate character used to separate directory levels in a path string that reflects a hierarchical file system organization. - - The alt directory separator char. - Equivalent to - - - - Provides a platform-specific character used to separate directory levels in a path string that reflects a hierarchical file system organization. - - The directory separator char. - Equivalent to - - - - A platform-specific separator character used to separate path strings in environment variables.. - - The path separator. - Equivalent to - - - - Provides a platform-specific volume separator character. - - The volume separator char. - Equivalent to - - - - The file or directory was not a reparse point. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The info. - The context. - - - - Contains constants for controlling the kind of access other FileStream objects can have to the same file. - This enumeration has a FlagsAttribute attribute that allows a bitwise combination of its member values. - - - - - Declines sharing of the current file. Any request to open the file (by this process or another process) will fail until the file is closed. - - - - - Allows subsequent opening of the file for reading. If this flag is not specified, any request to open the file for reading (by this process or another process) will fail until the file is closed. However, even if this flag is specified, additional permissions might still be needed to access the file. - - - - - Allows subsequent opening of the file for writing. If this flag is not specified, any request to open the file for writing (by this process or another process) will fail until the file is closed. However, even if this flag is specified, additional permissions might still be needed to access the file. - - - - - Allows subsequent opening of the file for reading or writing. If this flag is not specified, any request to open the file for reading or writing (by this process or another process) will fail until the file is closed. However, even if this flag is specified, additional permissions might still be needed to access the file. - - - - - Allows subsequent deleting of a file. - - - - - Contains information about files in the specified directory. - - - - - - The byte offset of the file within the parent directory. - This member is undefined for file systems, such as NTFS, in which the position of a file within the parent directory is not fixed - and can be changed at any time to maintain sort order. - - - - - The time that the file was created. - - - - - The time that the file was last accessed. - - - - - The time that the file was last written to. - - - - - The time that the file was last changed. - - - - - The absolute new end-of-file position as a byte offset from the start of the file to the end of the file. - Because this value is zero-based, it actually refers to the first free byte in the file. In other words, EndOfFile is the offset to - the byte that immediately follows the last valid byte in the file. - - - - - The number of bytes that are allocated for the file. This value is usually a multiple of the sector or cluster size of the underlying physical device. - - - - - The file attributes. - - - - - The size of the extended attributes for the file. - - - - - The short 8.3 file naming convention (for example, FILENAME.TXT) name of the file. - - - - - The file ID. - - - - - The name of the file. - - - - - It is too late to perform the requested operation, since the Transaction has already been committed. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The object that holds the serialized object data. - The contextual information about the source or destination. - - - - A KTM transaction object for use with the transacted operations in - - - - - Initializes a new instance of the class, internally using the - specified . This method allows the usage of methods accepting a - with an instance of . - - The transaction to use for any transactional operations. - - - - Initializes a new instance of the class with a default security descriptor, - infinite timeout and no description. - - - - - Initializes a new instance of the class with a default security descriptor. - - The time, in milliseconds, when the transaction will be aborted if it has not already reached the prepared state. - A user-readable description of the transaction. May be null. - - - - Initializes a new instance of the class. - - The security descriptor. - The time, in milliseconds, when the transaction will be aborted if it has not already reached the prepared state. - Specify 0 to provide an infinite timeout. - A user-readable description of the transaction. May be null. - - - - Requests that the specified transaction be committed. - - The transaction was already committed. - The transaction was already aborted. - An error occured - - - - Requests that the specified transaction be rolled back. This function is synchronous. - - The transaction was already committed. - An error occured - - - - Performs application-defined tasks associated with freeing, releasing, or resetting unmanaged resources. - - - - - Gets the safe handle. - - The safe handle. - - - - IntPtr wrapper which can be used as result of - Marshal.AllocHGlobal operation. - Calls Marshal.FreeHGlobal when disposed or finalized. - - - - - Creates new instance with zero IntPtr - - - - - Creates new instance which allocates unmanaged memory of given size - Can throw OutOfMemoryException - - - - - Copies data from a one-dimensional, managed 8-bit unsigned integer array to the unmanaged memory pointer referenced by this instance- - - The one-dimensional array to copy from. - The zero-based index into the array where Copy should start. - The number of array elements to copy. - - - - Called when object is disposed or finalized. - - - - - Represents information about a file system entry. Used together with . - - - - - Initializes a new instance of the class. - - The WIN32 find data structure. - - - - Gets internal WIN32 FIND Data - - - - - Gets the attributes. - - The attributes. - - - - Gets the name of the file. - - The name of the file. - - - - Gets the size of the file. - - The size of the file. - - - - Gets the 8.3 version of the filename. - - the 8.3 version of the filename. - - - - Gets the time this entry was created. - - The time this entry was created. - - - - Gets the time this entry was last accessed. - - The time this entry was last accessed. - - - - Gets the time this entry was last modified. - - The time this entry was last modified. - - - - Gets a value indicating whether this instance represents a directory. - - - true if this instance represents a directory; otherwise, false. - - - - - Gets a value indicating whether this instance is definitely a file. - - true if this instance is file; otherwise, false. - Definite file is NOT a directory and NOT a device. - - - - Gets a value indicating whether this instance is a reparse point. - - - true if this instance is a reparse point; otherwise, false. - - - - - Gets a value indicating whether this instance is a mount point. - - - true if this instance is a mount point; otherwise, false. - - - - - Gets a value indicating whether this instance is a symbolic link. - - - true if this instance is a symbolic link; otherwise, false. - - - - - Gets the reparse point tag of this entry. - - The reparse point tag of this entry. - - - - The real full path of the file system object/entry. - - - - - This property is intended to be used with in the future versions of the library - to store a full path that is relative to a parent symbolic link or junction point. - It will be correctly set by enumerating methods. - - Parent Symbolic Directory Link Pointed - From: C:\Users\Novels\Application Data - To: C:\Users\Novels\AppData\Roaming - so the entryu info for vlc-qt-interface.ini file will have following values - FullPath: C:\Users\Novels\AppData\Roaming\vlc\vlc-qt-interface.ini - VirtualFullPath: C:\Users\Novels\Application Data\vlc\vlc-qt-interface.ini - - - - - - Provides a concrete implementation of SafeHandle supporting transactions. - - - - - Initializes a new instance of the class. - - - - - When overridden in a derived class, executes the code required to free the handle. - - - true if the handle is released successfully; otherwise, in the event of a catastrophic failure, false. In this case, it generates a ReleaseHandleFailed Managed Debugging Assistant. - - - - - Enumerator used to enumerate file system entries (i.e. files and directories). - - The enumerator can only be used to enumerate through the items once, - and cannot be reset. - - - - Initializes a new instance of the class. - - A search string, the path which has wildcard characters, - for example, an asterisk (*) or a question mark (?). - Note that no validation is done whether or not the path specified in searchString actually exists when - the enumerator is constructed. This instead occurs during the first call to . - - - - Initializes a new instance of the class. - - The directory or searchString, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - if set to true enumerates only directories. - Note that no validation is done whether or not the searchString actually exists when - the enumerator is constructed. This instead occurs during the first call - to . - - - - Initializes a new instance of the for - enumeration as part of a transaction. - - The kernel transaction object. - The directory or searchString, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - Note that no validation is done whether or not the searchString actually exists when - the enumerator is constructed. This instead occurs during the first call - to . - If is , this constructor is equivalent - to , leading to non-transacted call. - - - - Initializes a new instance of the for - enumeration as part of a transaction. - - The kernel transaction object. - The directory or searchString, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - if set to true enumerate only directories. - Note that no validation is done whether or not the searchString actually exists when - the enumerator is constructed. This instead occurs during the first call - to . - If is , this constructor is equivalent - to , leading to non-transacted call. - - - - Advances the enumerator to the next file system entry matching the specified pattern. - - - if the enumerator was successfully advanced to the next element; - if the enumerator has passed the end of the collection. - - The collection was modified after the enumerator was created. - - - - Filters the current and parent folders WIN32 notation ("." and ".."). - - - - - This method is not supported. - - always. - - - - Performs application-defined tasks associated with freeing, releasing, or - resetting unmanaged resources. - - - - - Gets the representing the file system entry - at the current position of the enumerator. - - the representing the file system entry - at the current position of the enumerator. - The element in the collection at the current position of the enumerator. - - - - Gets the element in the collection at the current position of the enumerator. - - - The element in the collection at the current position of the enumerator. - - - - Gets or sets a value indicating whether to enumerate only folders. - - true if only folders should be enumerated; otherwise, false. - - - - The file attributes of a file. - - - - - No attributes set. - - - - - The file or directory is an archive file or directory. Applications use this attribute to mark files for backup or removal. - - - - - The file or directory is compressed. - For a file, this means that all of the data in the file is compressed. - For a directory, this means that compression is the default for newly created files and subdirectories. - - - - - Reserved; do not use. - - - - - The handle identifies a directory. - - - - - The file or directory is encrypted. - For a file, this means that all data in the file is encrypted. - For a directory, this means that encryption is the default for newly created files and subdirectories. - - - - - The file or directory is hidden. It is not included in an ordinary directory listing. - - - - - The file or directory does not have other attributes set. This attribute is valid only when used alone. - - - - - The file is not to be indexed by the content indexing service. - - - - - The file data is not available immediately. - This attribute indicates that the file data is physically moved to offline storage. - This attribute is used by Remote Storage, which is the hierarchical storage management software. - Note Applications should not arbitrarily change this attribute. - - - - - The file or directory is read-only. - For a file, applications can read the file, but cannot write to it or delete it. - For a directory, applications cannot delete it. - - - - - The file or directory has an associated reparse point. - - - - - The file is a sparse file. - - - - - The file or directory is part of the operating system, or the operating system uses the file or directory exclusively. - - - - - The file is being used for temporary storage. - File systems attempt to keep all of the data in memory for quick access, rather than flushing it back to mass storage. - An application should delete a temporary file as soon as it is not needed. - - - - - The file is a virtual file. - - - - - Specifies the type of a drive. - - - - - The drive type cannot be determined. - - - - - The root path is invalid; for example, there is no volume is mounted at the path. - - - - - The drive has removable media; for example, a floppy drive, thumb drive, or flash card reader. - - - - - The drive has fixed media; for example, a hard drive or flash drive. - - - - - The drive is a remote (network) drive. - - - - - The drive is a CD-ROM drive. - - - - - The drive is a RAM disk. - - - - - Callback delegate used by some of the Directory methods to obtain a of what to do in case of enumeration traversal failure. - - The path of failed directory of file - The exception that occured during operation - - - - - The remote server or share does not support transacted file operations. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The object that holds the serialized object data. - The contextual information about the source or destination. - - - - Enumeration specifying the different reparse point tags. - - - - - The entry is not a reparse point - - - - - Dfs - - - - - Dfsr - - - - - Hsm - - - - - Hsm2 - - - - - The entry is a mount point - - - - - Sis - - - - - The entry is a symbolic link - - - - - Exposes static methods for creating, moving, and enumerating through directories and subdirectories. - - - As opposed to this class supports the use of extenden length unicode paths, such as - \\?\Volume{c00fa7c5-63eb-11dd-b6ed-806e6f6e6963}\Program Files\Internet Explorer. In addition, support for transacted file operation - using the kernel transaction manager is provided. (See also ). - Note that no methods in this class perform any validation of the supplied paths. They are passed as is to the corresponding - native kernel functions, meaning that invalid paths may result in exceptions of a type other than the expected for a certain operation. - - - - - - Creates a new directory. - - - Creates a new directory. If the underlying file system supports security on files and directories, the function applies a default security descriptor to the new directory. - - The path of the directory to be created. - - - - Creates a new directory. If the underlying file system supports security on files and directories, the function applies a security descriptor to the new directory. - - The path of the directory to be created. - The seurity descriptor to apply to the directory - - - - Creates a new directory with the attributes of a specified template directory. - If the underlying file system supports security on files and directories, the function - applies a default security descriptor to the new directory. The new directory retains - the other attributes of the specified template directory. - - The path of the directory to use as a template when creating the new directory. - The path of the directory to be created. - - - - Creates a new directory with the attributes of a specified template directory. - If the underlying file system supports security on files and directories, the function - applies the specified security descriptor to the new directory. The new directory retains - the other attributes of the specified template directory. - - The path of the directory to use as a template when creating the new directory. - The path of the directory to be created. - The seurity descriptor to apply to the directory. - The specified directory already exists. - One or more intermediate directories do not exist; this function will only create the final directory in the path. - - - - Creates a new directory with the attributes of a specified template directory (if one is specified). - If the underlying file system supports security on files and directories, the function - applies the specified security descriptor to the new directory. The new directory retains - the other attributes of the specified template directory. - - The path of the directory to use as a template when creating the new directory. May be to indicate - that no template should be used. - The path of the directory to be created. - The security descriptor to apply to the newly created directory. May be in which case a default - security descriptor will be applied. - - - - Creates a new directory as a transacted operation. - If the underlying file system supports security on files and directories, the function applies a - default security descriptor to the new directory. - - The transaction to use. - The path of the directory to be created. - - - - Creates a new directory as a transacted operation. - If the underlying file system supports security on files and directories, the function - applies a specified security descriptor to the new directory. - - The transaction to use. - The path of the directory to be created. - - - If is , the directory gets a default security descriptor. - The access control lists (ACL) in the default security descriptor for a directory are inherited from its parent directory. - - - The target file system must support security on files and directories for this parameter to have an effect. - This is indicated when returns an object with - set to true. - - - - - - Creates a new directory as a transacted operation, with the attributes of a specified template directory. - If the underlying file system supports security on files and directories, the function applies a default security descriptor to the new directory. - The new directory retains the other attributes of the specified template directory. - - - The path of the directory to use as a template when creating the new directory. This parameter can be . - The directory must reside on the local computer; otherwise, the an exception of type is thrown. - - The transaction to use. - The path of the directory to be created. - - - - Creates a new directory as a transacted operation, with the attributes of a specified template directory. If the underlying file system supports security on files and directories, the function applies a specified security descriptor to the new directory. The new directory retains the other attributes of the specified template directory. - - - The path of the directory to use as a template when creating the new directory. This parameter can be . - The directory must reside on the local computer; otherwise, the an exception of type is thrown. - - The transaction to use. - The path of the directory to be created. - - - If is , the directory gets a default security descriptor. - The access control lists (ACL) in the default security descriptor for a directory are inherited from its parent directory. - - - The target file system must support security on files and directories for this parameter to have an effect. - This is indicated when returns an object with - set to true. - - - - - - Counts files in a given directory. Uses method. - It's way faster than using lots of memory through method. - - The directory path. - The search option. Either top only directory, or subfolders too. - if set to true skip on access errors resulted from ACLs protected directories or not accessible reparse points, otherwise a will be thrown. - The counted number of files. - - - - - Deletes an existing directory. - - - - Deletes an existing empty directory. - - The path of the directory to be removed. This path must specify an empty directory, and the calling process must have delete access to the directory. - is - - - - Deletes the specified directory and, if indicated, any subdirectories in the directory. - - The name of the directory to remove. - true to remove directories, subdirectories, and files in path; otherwise, false. - - - - Deletes the specified directory and, if indicated, any subdirectories in the directory. - - The name of the directory to remove. - true to remove all subdirectories and files recursively; otherwise, false only the top level empty directory. - if set to true overrides read only attribute of files and directories. - - - - Deletes an existing empty directory as a transacted operation. - - - The path of the directory to be removed. - The path must specify an empty directory, and the calling process must have delete access to the directory. - The path of the directory to be removed. This path must specify an empty directory, and the calling process must have delete access to the directory. - The directory must reside on the local computer; otherwise, the function throws . - - The transaction to use - or is - The directory does not reside on the local computer. - The transaction object is not valid for this operation. - - - - - Determines whether the given path refers to an existing directory on disk. - - - - Determines whether the given path refers to an existing directory on disk. - - The path to test. - true if path refers to an existing directory; otherwise, false. - Possible performance improvement may be achieved by utilizing FINDEX_SEARCH_OPS.FindExSearchLimitToDirectories. - - - - Determines whether the given path refers to an existing directory on disk as part of a transaction. - - The transaction. - The path to test. - - true if path refers to an existing directory; otherwise, false. - - - - - - Gets a object that encapsulates the access control list (ACL) entries for a specified directory. - - - - Gets a object that encapsulates the access control list (ACL) entries for the specified directory. - - The path to a directory containing a object that describes the file's access control list (ACL) information. - A object that encapsulates the access control rules for the file described by the parameter. - - - - Gets a object that encapsulates the specified type of access control list (ACL) entries for a particular directory. - - The path to a directory containing a object that describes the directory's access control list (ACL) information. - One (or more) of the values that specifies the type of access control list (ACL) information to receive. - A object that encapsulates the access control rules for the directory described by the parameter. - - - - - Gets the creation date and time, in local time, of a directory. - - - - Gets the creation date and time, in local time, of a directory. - - The path of the directory. - A structure set to the creation date and time for the specified directory. This value is expressed in local time. - - - - - Gets the creation date and time, in Coordinated Universal Time (UTC) format, of a directory. - - - - Gets the creation date and time, in Coordinated Universal Time (UTC) format, of a directory. - - The path of the directory. - A structure set to the creation date and time for the specified directory. This value is expressed in UTC time. - - - - Returns the date and time the specified file or directory was last accessed. - - - Returns the date and time the specified file or directory was last accessed. - - The file or directory for which to obtain creation date and time information. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last accessed. - - The path. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in UTC time. - - - - Returns the date and time the specified file or directory was last written to. - - - Returns the date and time the specified file or directory was last written to. - - The path. - A structure set to the date and time that the specified file or directory was last written to. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last written to. - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last written to. - - The file or directory for which to obtain write date and time information. - A structure set to the date and time that the specified file or directory was last written. This value is expressed in UTC time. - - - - Returns the creation date and time of the specified file or directory as part of a transaction. - - The transaction to use. - The file or directory for which to obtain creation date and time information. - - A structure set to the creation date and time for the specified file or directory. This value is expressed in local time. - - - - - Returns the creation date and time, in coordinated universal time (UTC), of the specified file or directory as part of a transaction. - - The file or directory for which to obtain creation date and time information. - The transaction to use. - A structure set to the creation date and time for the specified file or directory. This value is expressed in UTC time. - - - - Returns the date and time the specified file or directory was last accessed as part of a transaction. - - The file or directory for which to obtain creation date and time information. - The transaction to use. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last accessed as part of a transaction. - - The path. - A structure set to the date and time that the specified file or directory was last accessed. This value is expressed in UTC time. - The transaction to use. - - - - Returns the date and time the specified file or directory was last written to as part of a transaction. - - The path. - The transaction to use. - A structure set to the date and time that the specified file or directory was last written to. This value is expressed in local time. - - - - Returns the date and time, in coordinated universal time (UTC), that the specified file or directory was last written to as part of a transaction. - - The file or directory for which to obtain write date and time information. - The transaction to use. - A structure set to the date and time that the specified file or directory was last written. This value is expressed in UTC time. - - - - Gets the current working directory of the application. - - A string containing the path of the current working directory. - The caller does not have the required permission. - - - - Sets the application's current working directory to the specified directory. - - The path to which the current working directory is set. - An IO error occurred. - is a zero-length string, contains only white space, or contains one or more invalid characters as defined by InvalidPathChars. - is - The specified path, file name, or both exceed the system-defined maximum length. For example, on Windows-based platforms, paths must be less than 248 characters and file names must be less than 260 characters. - The caller does not have the required permission to access unmanaged code. - The specified path was not found. - The specified directory was not found. - - - - Applies access control list (ACL) entries described by a DirectorySecurity object to the specified directory. - - Note that unlike this method does not automatically - determine what parts of the specified instance has been modified. Instead, the - parameter is used to specify what entries from to - apply to . - A directory to add or remove access control list (ACL) entries from. - A object that describes an ACL entry to apply to the directory described by the parameter. - One or more of the values that specifies the type of access control - list (ACL) information to set. - - - - Moves a file or a directory and its contents to a new location. - - - Moves a file or a directory and its contents to a new location. - - The path of the file or directory to move. - The path to the new location for . If is a file, then must also be a file name. - For more options, see the Move methods of . - - - - Moves a file or a directory and its contents to a new location as part of a transaction. - - The transaction. - The path of the file or directory to move. - The path to the new location for . If is a file, then must also be a file name. - For more options, see the Move methods of . - - - - Gets the names of subdirectories in the specified directory. - - The directory to search. - - An array of type String containing the names of subdirectories in . - - - - - Gets an array of directories matching the specified search pattern from the current directory. - - The directory to search. - The search string to match against the names of directories in . The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - - A String array of directories matching the search pattern. Directory names include the full path. - - - - - Gets an array of directories contained within a directory or drive. - - - Gets an array of directories matching the specified search pattern from the current directory, using a value to determine whether to search subdirectories. - - The directory to search. - The search string to match against the names of directories in . The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - One of the values that specifies whether the - search operation should include all subdirectories or only the current directory. - - A String array of directories matching the search pattern. Directory names include the full path. - - This method may consume a lot of memory if a large tree of files, directories and subdirectories - are searched. Consider using instead if possible. - - - - Gets the names of subdirectories in the specified directory. The search is performed as part of a transaction. - - The transaction. - The directory to search. - - An array of type String containing the names of subdirectories in . - - - - - Gets an array of directories matching the specified search pattern from the current directory. The search is performed as part of a transaction. - - The transaction. - The directory to search. - The search string to match against the names of directories in . The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - - A String array of directories matching the search pattern. Directory names include the full path. - - - - - Gets an array of directories matching the specified search pattern from the current directory, - using a value to determine whether to search subdirectories. The search is performed as part of a transaction. - - The transaction. - The directory to search. - The search string to match against the names of directories in . The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - One of the values that specifies whether the - search operation should include all subdirectories or only the current directory. - - A String array of directories matching the search pattern. Directory names include the full path. - - This method may consume a lot of memory if a large tree of files, directories and subdirectories - are searched. Consider using instead if possible. - - - - Returns the names of files in the specified directory. - - The directory from which to retrieve the files. - A String array of file names in the specified directory. - - - - Returns the names of files in the specified directory that match the specified search pattern. - - The directory to search. - The search string to match against the names of files in path. The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - A String array containing the names of files in the specified directory that match the specified search pattern. - - - - Retrieves the names of files contained within a directory. - - - Returns the names of files in the specified directory that match the specified search pattern, using a - value to determine whether to search subdirectories. - - The directory to search. - The search string to match against the names of files in path. The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - One of the values that specifies whether the - search operation should include all subdirectories or only the current directory. - A String array containing the names of files in the specified - directory that match the specified search pattern. File names include the full path. - This method may consume a lot of memory if a large tree of files, directories and subdirectories - are searched. Consider using instead if possible. - - - - Returns the names of files in the specified directory. The search will be performed as part of a transaction. - - The transaction. - The directory from which to retrieve the files. - - A String array of file names in the specified directory. - - - - - Returns the names of files in the specified directory that match the specified search pattern. The search will be performed as part of a transaction. - - The transaction. - The directory to search. - The search string to match against the names of files in path. The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - - A String array containing the names of files in the specified directory that match the specified search pattern. - - - - - Returns the names of files in the specified directory that match the specified search pattern, using a - value to determine whether to search subdirectories. The search will be performed as part of a transaction. - - The transaction. - The directory to search. - The search string to match against the names of files in path. The parameter cannot - end in two periods ("..") or contain two periods ("..") followed by or - , nor can it contain any of the characters in . - One of the values that specifies whether the - search operation should include all subdirectories or only the current directory. - - A String array containing the names of files in the specified - directory that match the specified search pattern. File names include the full path. - - This method may consume a lot of memory if a large tree of files, directories and subdirectories - are searched. Consider using instead if possible. - - - - Returns the volume information, root information, or both for the specified path. - - The path of a file or directory. - A string containing the volume information, root information, or both for the specified path. - - - - Returns the names of all files and subdirectories in the specified directory. - - The directory for which file and subdirectory names are returned. - - A String array containing the names of file system entries in the specified directory. - - - - - Returns an array of file system entries matching the specified search criteria. - - The directory for which file and subdirectory names are returned. - The search string to match against the names of files in path. - The parameter cannot end in two periods ("..") or - contain two periods ("..") followed by or - , nor can it contain any of the characters in - . - - A String array containing the names of file system entries matching the specified pattern - in the specified directory. - - - - - Returns an array of file system entries matching the specified search criteria. - - The directory for which file and subdirectory names are returned. - The search string to match against the names of files in path. - The parameter cannot end in two periods ("..") or - contain two periods ("..") followed by or - , nor can it contain any of the characters in - . - The search option. - - A String array containing the names of file system entries matching the specified pattern - in the specified directory. - - - - - Returns the names of all files and subdirectories in the specified directory. - The file system entries are retrieved as part of a transaction. - - The transaction. - The directory for which file and subdirectory names are returned. - - A String array containing the names of file system entries in the specified directory. - - - - - Returns the names of all files and subdirectories in the specified directory. - The file system entries are retrieved as part of a transaction. - - The transaction. - The directory for which file and subdirectory names are returned. - The search pattern. - - A String array containing the names of file system entries in the specified directory. - - - - - Returns an array of file system entries matching the specified search criteria. - The file system entries are retrieved as part of a transaction. - - The transaction. - The directory for which file and subdirectory names are returned. - The search string to match against the names of files in path. - The parameter cannot end in two periods ("..") or - contain two periods ("..") followed by or - , nor can it contain any of the characters in - . - The search option. - - A String array containing the names of file system entries matching the specified pattern - in the specified directory. - - - - - Enumerates file system entries contained in a specified directory as instances. - - - Enumerates all file system entries as instances - in the specified . - - This is a convenience method for using the for enumeration. - The directory path containing the file system entries to enumerate. - An enumerable containing the file system entries for the specified - - - - Enumerates the file system entries in the specified matching - the specified as instances. - - This is a convenience method for using the for enumeration. - The directory or path, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - The search string to match against the names of files in path. - The parameter cannot end in two periods ("..") or - contain two periods ("..") followed by or - , nor can it contain any of the characters in - . - An enumerable containing the file system entries for the specified - - - - Enumerates all file system entries as instances - in the specified , optionally enumerating - directories only. - - The directory or path, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - The search pattern. - The search option. - - An enumerable containing the file system entries for the specified - - This is a convenience method for using the for enumeration. - - - - Enumerates the file system entries in the specified matching - the specified as instances, - optionally enumerating directories only. - - The directory or path, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - The search string to match against the names of files in path. - The parameter cannot end in two periods ("..") or - contain two periods ("..") followed by or - , nor can it contain any of the characters in - . - if set to true enumerate only directories. - The search options. - - An enumerable containing the file system entries for the specified - - This is a convenience method for using the for enumeration. - - - - Enumerates all file system entries as instances - in the specified as part of a transaction. - - The transaction. - The directory or path containing the file system entries to enumerate. - - An enumerable containing the file system entries for the specified - - This is a convenience method for using the for enumeration. - - - - Enumerates the file system entries in the specified matching - the specified as instances as part - of a transaction. - - The transaction. - The directory or path, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - The search string to match against the names of files in path. - The parameter cannot end in two periods ("..") or - contain two periods ("..") followed by or - , nor can it contain any of the characters in - . - - An enumerable containing the file system entries for the specified - - This is a convenience method for using the for enumeration. - - - - Enumerates all file system entries as instances - in the specified as part of a transaction, optionally enumerating - directories only. - - The transaction. - The directory path - The search pattern. - The search option. - - An enumerable containing the file system entries for the specified - - This is a convenience method for using the for enumeration. - - - - Enumerates the file system entries in the specified matching - the specified as instances as part - of a transaction, optionally enumerating directories only. - - The transaction. - The directory or path, and the file name, which can include - wildcard characters, for example, an asterisk (*) or a question mark (?). - The search string to match against the names of files in path. - The parameter cannot end in two periods ("..") or - contain two periods ("..") followed by or - , nor can it contain any of the characters in - . - if set to true enumerate only directories. - The search option. - - An enumerable containing the file system entries for the specified - - This is a convenience method for using the for enumeration. - - - - Enumerates the file system entries in the specified matching entries - with the as instances. This method gives more control over - the progress and exception handling. - - Optional kernel transaction object. Pass NULL for non-transacted call. - The directory path where to start enumeration. Use to get beyond 254 chars limit. - The search pattern prefix, wildcards, or a mixture. - Whether to search files in the specified directory only, or all subdirectories recursively. - if set to true [directories only]. - Optional enumeration exception handler. You can subscribe to exceptions and make decisions about them on the fly. - The list of exceptions to skip. Useful when dealing with protected directories. - - - - - Retrieves the parent directory of the specified path, including both absolute and relative paths. - - The path for which to retrieve the parent directory. - The parent directory or a reference if the path is the root. - - - - Gets the properties of the particular folder without following any symbolic links or mount points. - Properties include aggregated info from of each encountered file system object. - Plus additional ones: Total, File, Size, Error - Total: is the total number of enumerated objects. - File: is the total number of files. File is considered when object is neither nor . - Size: is the total size of enumerated objects. - Error: is the total number of errors encountered during request. - - Directory: is an object which has attribute without one. - The transaction. For a non transacted operation pass NULL. - The target directory. - The search option. Either top level or subfolders too. - if set to true continue on errors. - A dictionary mapping the keys mentioned above to their respective aggregated values. - - - - Enables encryption of the specified directory and the files in it. It does not affect encryption of subdirectories below the indicated directory. - - The name of the directory for which to enable encryption. - - - - Disables encryption of the specified directory and the files in it. It does not affect encryption of subdirectories below the indicated directory. - - The name of the directory for which to disable encryption. - - - - Retrieves information about files in the directory specified by . - - - - No specific access rights is required to query this information. - - - File reference numbers, also called file IDs, are guaranteed to be unique only within a static file system. - They are not guaranteed to be unique over time, because file systems are free to reuse them. Nor are they guaranteed to remain constant. - For example, the FAT file system generates the file reference number for a file from the byte offset of the file's directory entry record - (DIRENT) on the disk. Defragmentation can change this byte offset. Thus a FAT file reference number can change over time. - - - Requires Windows Vista or Windows Server 2008 or later. - - - A path to a directory from which to retrieve information. - An enumeration of records for each file system entry in the specified diretory. - - - - Retrieves information about files in the directory specified by using the specified - - - - No specific access rights is required to query this information. - - - File reference numbers, also called file IDs, are guaranteed to be unique only within a static file system. - They are not guaranteed to be unique over time, because file systems are free to reuse them. Nor are they guaranteed to remain constant. - For example, the FAT file system generates the file reference number for a file from the byte offset of the file's directory entry record - (DIRENT) on the disk. Defragmentation can change this byte offset. Thus a FAT file reference number can change over time. - - - Requires Windows Vista or Windows Server 2008 or later. - - - A path to a directory from which to retrieve information. - The transaction to use for this operation. - An enumeration of records for each file system entry in the specified diretory. - - - - Retrieves information about files in the directory specified by using the specified and - share mode. - - - - No specific access rights is required to query this information. - - - File reference numbers, also called file IDs, are guaranteed to be unique only within a static file system. - They are not guaranteed to be unique over time, because file systems are free to reuse them. Nor are they guaranteed to remain constant. - For example, the FAT file system generates the file reference number for a file from the byte offset of the file's directory entry record - (DIRENT) on the disk. Defragmentation can change this byte offset. Thus a FAT file reference number can change over time. - - - Requires Windows Vista or Windows Server 2008 or later. - - - A path to a directory from which to retrieve information. - The transaction to use for this operation. - The sharing mode with which to open a handle to the directory. - An enumeration of records for each file system entry in the specified diretory. - - - - Retrieves information about files in the directory specified by using the specified - share mode. - - - - No specific access rights is required to query this information. - - - File reference numbers, also called file IDs, are guaranteed to be unique only within a static file system. - They are not guaranteed to be unique over time, because file systems are free to reuse them. Nor are they guaranteed to remain constant. - For example, the FAT file system generates the file reference number for a file from the byte offset of the file's directory entry record - (DIRENT) on the disk. Defragmentation can change this byte offset. Thus a FAT file reference number can change over time. - - - Requires Windows Vista or Windows Server 2008 or later. - - - A path to a directory from which to retrieve information. - The sharing mode with which to open a handle to the directory. - An enumeration of records for each file system entry in the specified diretory. - - - - Retrieves information about files in the directory handle specified. - - - - No specific access rights is required to query this information. - - - File reference numbers, also called file IDs, are guaranteed to be unique only within a static file system. - They are not guaranteed to be unique over time, because file systems are free to reuse them. Nor are they guaranteed to remain constant. - For example, the FAT file system generates the file reference number for a file from the byte offset of the file's directory entry record - (DIRENT) on the disk. Defragmentation can change this byte offset. Thus a FAT file reference number can change over time. - - - Requires Windows Vista or Windows Server 2008 or later. - - - An open handle to the directory from which to retrieve information. - An enumeration of records for each file system entry in the specified diretory. - - - diff --git a/thirdparty/alphavss/Bin/AlphaFS.dll b/thirdparty/alphavss/Bin/AlphaFS.dll deleted file mode 100755 index 9f23f5354..000000000 Binary files a/thirdparty/alphavss/Bin/AlphaFS.dll and /dev/null differ diff --git a/thirdparty/alphavss/Bin/AlphaFS.dll.config b/thirdparty/alphavss/Bin/AlphaFS.dll.config deleted file mode 100755 index 73859b00e..000000000 --- a/thirdparty/alphavss/Bin/AlphaFS.dll.config +++ /dev/null @@ -1,3 +0,0 @@ - - - diff --git a/thirdparty/alphavss/Bin/AlphaVSS.Common.dll b/thirdparty/alphavss/Bin/AlphaVSS.Common.dll deleted file mode 100755 index 90e56e34a..000000000 Binary files a/thirdparty/alphavss/Bin/AlphaVSS.Common.dll and /dev/null differ diff --git a/thirdparty/alphavss/Bin/AlphaVSS.Common.dll.config b/thirdparty/alphavss/Bin/AlphaVSS.Common.dll.config deleted file mode 100644 index b7db28170..000000000 --- a/thirdparty/alphavss/Bin/AlphaVSS.Common.dll.config +++ /dev/null @@ -1,3 +0,0 @@ - - - diff --git a/thirdparty/alphavss/Bin/AlphaVSS.Common.xml b/thirdparty/alphavss/Bin/AlphaVSS.Common.xml deleted file mode 100755 index 4a26cc3cd..000000000 --- a/thirdparty/alphavss/Bin/AlphaVSS.Common.xml +++ /dev/null @@ -1,8009 +0,0 @@ - - - - AlphaVSS.Common - - - - - A class that allows a requester to examine the metadata of a specific writer instance. This metadata may come from a - currently executing (live) writer, or it may have been stored as an XML document. - - - A interface to a live writer's metadata is obtained by a call to - . - - - - - The method loads an XML document that contains a writer's metadata document into a - instance. - - String that contains an XML document that represents a writer's metadata document. - if the XML document was successfully loaded, or if the XML document could not - be loaded. - - - - The method saves the Writer Metadata Document that contains a writer's state information to a specified string. - This string can be saved as part of a backup operation. - - The Writer Metadata Document that contains a writer's state information. - - - - The is examined by a requester to determine from the - Writer Metadata Document the types of backup operations that a given writer can participate in. - - - - - The alternate location mappings of the file sets. - - A read-only list containing the alternate location mappings of the file sets. - - - - Information about how a writer wants its data to be restored. - - - - - Obtains the Writer Metadata Documents the components supported by this writer. - - the Writer Metadata Documents the components supported by this writer. - - - Information about files that have been explicitly excluded from backup. - a read-only list containing information about files that have been explicitly excluded from backup. - - - - The instance identifier of the writer - - The instance id. - - - The class ID of the writer - - - A string specifying the name of the writer - - - A enumeration value indicating how the data managed by the writer is used on the host system. - - - A enumeration value indicating the type of data managed by the writer. - - - - Gets the writer instance name. - - - - - Windows XP and Windows 2003: This property is not supported until Windows 2003 SP1 and will always return - on those systems. - - - - A string specifying the writer instance name. - - - - Gets the version information for a writer application. - - The version information for a writer application. - - - Only the and properties of the instance - are used by VSS. - - - Windows XP and Windows 2003: This property is not supported until Windows Vista, and will always return version 0.0.0.0 - - - - - - Obtains information about file sets that have been explicitly excluded from a given shadow copy. - - - - The property is intended to report information about file sets excluded from a - shadow copy. Requesters should not exclude files from backup based on the information returned by this method. - - - - Windows XP and Windows 2003: This property is not supported until Windows Vista and will always return an empty list. - - - - The exclude from snapshot files. - - - - Exception thrown to indicate that an unexpected error occurred during communication with writers. - - - The error code is logged in the error log file. - - - - - Base class for exceptions indicating an error occuring during a VSS operation. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class with the specified error message. - - The error message. - - - - Initializes a new instance of the class with the specified error message - and a reference to the inner exception that is the cause of this exception. - - The error message. - The inner exception. - - - - Initializes a new instance of the class with serialized data. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the system was unable to freeze the Distributed Transaction Coordinator (DTC) - or the Kernel Transaction Manager (KTM). - - - - Windows Server 2003 and Windows XP: This exception is not supported until Windows Vista. - - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Represents information about a Subcomponent associated with a given component. - - - - - Initializes a new instance of . - - The logical path of the Subcomponent. This can not be empty when working with Subcomponents. - The name of the Subcomponent. This can not be empty. - - - The logical path of the Subcomponent. This can not be empty when working with Subcomponents. - - - The name of the Subcomponent. This can not be empty. - - - - The interface contains methods used to obtain and modify component information - (in the form of instances) associated with a given writer but stored in a - requester's Backup Components Document. - - - - - A read-only collection of instances to the a given writer's - components explicitly stored in the Backup Components Document. - - A read-only collection of instances to the a given writer's - components explicitly stored in the Backup Components Document. This list - must not be accessed after the from which it was obtained has been disposed. - - - - - Identifier of the writer instance responsible for the components. - - - - - Identifier of the writer class responsible for the components. - - - - - Exception indicating that the writer is not responding. - - - - - Base class for exceptions thrown to indicate errors reported by VSS writers. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class with the specified error message. - - The error message. - - - - Initializes a new instance of the class with the specified error message - and a reference to the inner exception that is the cause of this exception. - - The error message. - The inner exception. - - - - Initializes a new instance of the class with serialized data. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - Exception thrown to indicate that the writer infrastructure is not operating properly. - - - Check that the Event Service and VSS have been started, and check for errors associated with those services in the error log. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception indicating that the volume was in use and could not be locked. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - The enumeration is used by a writer to indicate to a requester the - conditions under which it will handle events generated during a restore operation. - - - - It is not known whether the writer will perform special operations during the restore operation. - This state indicates a writer error. - - - - The writer does not require restore events. - - - - Indicates that the writer always expects to handle a PreRestore event, but expects to handle a - PostRestore event only if a restore fails when implementing either a - or - restore method () - - - - The writer always performs special operations during the restore operation. - - - - Allows additional attributes to be specified for a shadow copy. The context of a shadow copy (as set by the SetContext method in method) - may be modified by a bitmask that contains a valid combination of and - enumeration values. - - In the VSS API, these values are represented by the enumeration - - - - The shadow copy is persistent across reboots. - This attribute is automatically set for contexts of AppRollback - ClientAccessible, ClientAccessibleWriters and NasRollback. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - Auto-recovery is disabled for the shadow copy. - A requester can modify a shadow copy context with a bitwise OR of this attribute. By doing this, the requester instructs - VSS to make the shadow copy read-only immediately after it is created, without allowing writers or other applications to update - components in the shadow copy. - Disabling auto-recovery can cause the shadow copy to be in an inconsistent state if any of its components are involved in - transactional database operations, such as transactional read and write operations managed by Transactional NTFS (TxF). - This is because disabling auto-recovery prevents incomplete transactions from being rolled back. - Disabling auto-recovery also prevents writers from excluding files from the shadow copy. - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - - - The specified shadow copy is a client-accessible copy, supports Shadow Copies for Shared Folders, and should not be exposed. - This attribute is automatically set for ClientAccessible and ClientAccessibleWriters. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - The shadow copy is not automatically deleted when the shadow copy requester process ends. - The shadow copy can be deleted only by a call to or - . - This attribute is automatically set for contexts of Rollback, - ClientAccessible, ClientAccessibleWriters and Rollback. - - - - - No writers are involved in creating the shadow copy. - This attribute is automatically set for contexts of NasRollback, - FileShareBackup and ClientAccessible. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - The shadow copy is to be transported and therefore should not be surfaced locally. - This attribute can be used explicitly by requesters when setting the context of a shadow copy, if the provider for - shadow copy supports transportable shadow copies. - Windows Server 2003, Standard Edition, Windows Server 2003, Web Edition, and Windows XP: This attribute is not supported. - All editions of Windows Server 2003 SP1 support this attribute. - - - - - The shadow copy is not currently exposed. - Unless the shadow copy is explicitly exposed or mounted, this attribute is set for all shadow copies. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - The shadow copy is not transacted. - A requester can modify a shadow copy context with a bitwise OR of this attribute. By doing this, the requester instructs VSS to - disable built-in integration between VSS and transaction and resource managers. - Setting this attribute guarantees that the requester will not receive errors. However, it may - cause unwanted consequences, such as the loss of transactional integrity or even data loss. - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - - - Indicates that a given provider is a hardware-based provider. - This attribute is automatically set for hardware-based providers. - This enumeration value cannot be used to manually set the context (using the method) - of a shadow copy by a bit mask (or bitwise OR) of this enumeration value and a valid shadow copy context value from - . - - - - - Indicates that a given provider uses differential data or a copy-on-write mechanism to implement shadow copies. - A requester can modify a shadow copy context with a bitwise OR of this attribute. By doing this, the requester instructs providers - to create a shadow copy using a differential implementation. If no shadow copy provider installed on the system supports the - requested attributes, a error will be returned to . - - - - - Indicates that a given provider uses a PLEX or mirrored split mechanism to implement shadow copies. - A requester can modify a shadow copy context with a bitwise OR of this attribute. By doing this, the requester instructs the providers to create a shadow copy using a PLEX implementation. If no shadow copy provider installed on the system supports the requested - attributes, a error will be returned to . - - - - - The shadow copy of the volume was imported onto this machine using the method - rather than created using the method. - This attribute is automatically set if a shadow copy is imported. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - The shadow copy is locally exposed. If this bit flag and the ExposedRemotely bit flag are not set, - the shadow copy is hidden. - The attribute is automatically added to a shadow copy context upon calling the - method to expose a shadow copy locally. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - The shadow copy is remotely exposed. If this bit flag and the ExposedLocally bit flag are not set, the shadow copy is hidden. - The attribute is automatically added to a shadow copy context upon calling the - method to expose a shadow copy locally. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - Indicates that the writer will need to auto-recover the component in CVssWriter::OnPostSnapshot. - This attribute should not be used explicitly by requesters when setting the context of a shadow copy. - - - - - Indicates that the writer will need to auto-recover the component in CVssWriter::OnPostSnapshot if the shadow copy is being used - for rollback (for data mining, for example). - A requester would set this flag in the shadow copy context to indicate that the shadow copy is being created for a non-backup - purpose such as data mining. - - - - - Reserved for system use. - Windows Vista, Windows Server 2003, and Windows XP: This value is not supported until Windows Server 2008. - - - - - Indicates that TxF recovery should be enforced during shadow copy creation. - Windows Vista, Windows Server 2003, and Windows XP: This value is not supported until Windows Server 2008. - - - - - The enumeration is used by writers to indicate support for auto-recovery. - - For more information see MSDN documentation on VSS_COMPONENT_FLAGS Enumeration - - - - This value is reserved for operating systems that do not support the enumeration. - - - - - - The writer will need write access to this component after the shadow copy has been created. - - - This flag is incompatible with . - - - - - - - If this is a rollback shadow copy ( enumeration value of - ), the writer for this component will need - write access to this component after the shadow copy has been created. - - - This flag is incompatible with . - - - - - - - This component is not part of system state. - - - Windows Server 2003: This value is not supported until Windows Vista. - - - - - - Represents information about how a writer wants its data to be restored. - - This class is a container for the data returned by . - - - - Initializes a new instance of the class. - - The restore method. - The service. - The user procedure. - The writer restore. - if set to true a reboot is required. - The mappings. - This constructor is normally not used by application code. Rather instances of are - returned by various query methods. - - - - A value that specifies file overwriting, the use of alternate locations specifying the method that - will be used in the restore operation. - - - - - If the value of is , a pointer to a string containing the name - of the service that is started and stopped. Otherwise, the value is . - - - - - Pointer to the URL of an HTML or XML document describing to the user how the restore is to be performed. The value may be . - - - - - A value specifying whether the writer will be involved in restoring its data. - - - - A indicating whether a reboot will be required after the restore operation is complete. - if a reboot will be required and if it will not. - - - The number of alternate mappings associated with the writer. - - - - - The enumeration is used by writers to indicate their support of certain backup - operations—such as incremental or differential backup—on the basis of file sets (a specified file or files). - - - File sets stored in the Writer Metadata Document are tagged with a bit mask (or bitwise OR) of - values indicating the following: - - - - Whether the writer and the requester have to - evaluate a given file set for participation in the specified type of backup operations - - - - - Whether backing up the specified file will require a shadow copy - - - - - - - For more information see the MSDN documentation on - VSS_FILE_SPEC_BACKUP_TYPE Enumeration - - - - - Used on operating systems where this enumeration is not supported, i.e. Windows XP. - - - - - - A file set tagged with this value must be involved in all types of backup operations. - - - A writer tags a file set with this value to indicate to the requester that it expects a copy of the - current version of the file set to be available following the restore of any backup operation - with a of - . - - - - - - A writer tags a file set with this value to indicate to the requester that it - expects a copy of the current version of the file set to be available following - the restore of any backup operation with a of - . - - - - - A writer tags a file set with this value to indicate to the requester that it - expects a copy of the current version of the file set to be available following the - restore of any backup operation with a - of . - - - - - A writer tags a file set with this value to indicate to the requester that it - expects a copy of the current version of the file set to be available following the - restore of any backup operation with a - of . - - - - - A file set tagged with this value must be backed up from a shadow copy of a volume - (and never from the original volume) when participating in a backup operation with a - of . - - - - - A file set tagged with this value must be backed up from a shadow copy of a volume - (and never from the original volume) when participating in a backup operation with a - of . - - - - - A file set tagged with this value must be backed up from a shadow copy of a volume - (and never from the original volume) when participating in a backup operation with a - of . - - - - - A file set tagged with this value must be backed up from a shadow copy of a volume - (and never from the original volume) when participating in a backup operation with a - of . - - - - - The default file backup specification type. A file set tagged with this value must always participate in backup and restore operations. - - - - - The shadow copy requirement for backup. A file set tagged with this value must always be backed up - from a shadow copy of a volume (and never from the original volume) when participating in a backup operation. - - - - - The enumeration defines the set of statuses of a file restore operation performed on - the files managed by a selected component or component set. - - - See MSDN documentation on VSS_FILE_RESTORE_STATUS for more information. - - - - - - The restore state is undefined. - - - This value indicates an error, or indicates that a restore operation has not yet started. - - - - - - - No files were restored. - - - This value indicates an error in restoration that did not leave any restored files on disk. - - - - - - All files were restored. This value indicates success and should be set for each component that was restored successfully. - - - - - - The restore process failed. - - - This value indicates an error in restoration that did leave some restored files on disk. This means the components on disk are now corrupt. - - - - - - The class is a static utility class for accessing the platform specific - instances of the various VSS interfaces in a platform-independent manner. - - - Use the under normal circumstances to load - the correct assembly and create an instance of from that assembly. If you have - specific requirements on how the assembly should be loaded, or the instance created you are not required to use - these methods but can use the methods in this class for accessing the suggested assembly name to load, and load it manually. - In this case you need to create an instance of the class called Alphaleonis.Win32.Vss.VssImplementation from the platform specific - assembly. This class implements the interface, and has a public parameterless constructor. - - - - - Gets the short name of the platform specific assembly for the platform on which the assembly - is currently executing. - - the short name of the platform specific assembly for the platform on which the assembly - is currently executing. - The operating system could not be detected or is unsupported. - - - - Gets the full name of the platform specific assembly for the platform on which the assembly is currently executing. - - The full name of the platform specific assembly for the platform on which the assembly is currently executing. - The operating system could not be detected or is unsupported. - - - - Loads the assembly containing the correct implementation of the interface - for the operating system on which the assembly is currently executing. - - - Loads the assembly containing the correct implementation of the interface - for the operating system on which the assembly is currently executing, optionally allowing the specification - of an into which to load the assembly. - - - - The assembly will be loaded into the same as the calling assembly. - - - The assemblies are loaded using strong name lookup. They need to be present in the code base directory - of the executing assembly, or installed in the GAC for the lookup to succeed. - - - - An newly created instance of suitable for the - operating system on which the assembly is currently executing. - The operating system could not be detected or is unsupported. - - - - Exception thrown to indicate that the provider encountered an error that requires the user to restart the computer. - - - Windows Server 2003 and Windows XP:This exception is not supported until Windows Vista. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the volume has been added to the maximum number of shadow copy sets. - The specified volume was not added to the shadow copy set. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - The enumeration indicates which volume control or file I/O operations are disabled for the - volume that has been shadow copied. - - - None of the other flags. - - - The provider managing the shadow copies for a specified volume does not support defragmentation operations on that volume. - - - The provider managing the shadow copies for a specified volume does not support content index operations on that volume. - - - - - The enumeration represents error- and success codes that may be - returned by some Vss methods. - - - - - Indication of a successful operation. - - - - The asynchronous operation was cancelled. - - - - - The asynchronous operation was completed successfully. - - - - - The asynchronous operation is still running. - - - - - Unexpected error. The error code is logged in the error log file. - - - - - A method call was made when the object was in an incorrect state - for that method. - - - - - The provider has already been registered. - - - - - The specified identifier does not correspond to a registered provider. - - - - - The provider was unable to perform the request at this time. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - - The shadow copy provider is currently in use and cannot be unregistered. - - - - - The specified object was not found. - - - - - No VSS provider indicates that it supports the specified volume. - - - - - The volume is not supported by the specified provider. - - - - - The object already exists. - - - - - The provider returned an unexpected error code. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - - The given XML document is invalid. It is either incorrectly-formed XML or it does not match the schema. - - - - - The maximum number of volumes has been added to the shadow copy set. The specified volume was not added to the shadow copy set. - - - - - VSS encountered problems while sending events to writers. - - - - - Another shadow copy creation is already in progress. Please wait a few moments and try again. - - - - - The volume has been added to the maximum number of shadow copy sets. The specified volume was not added to the shadow copy set. - - - - - An error was detected in the Volume Shadow Copy Service (VSS). The problem occurred while trying to contact VSS writers. - Please verify that the Event System service and the VSS service are running and check for associated errors in the event logs. - - - - - A writer did not respond to a GatherWriterStatus call. The writer may either have terminated - or it may be stuck. Check the system and application event logs for more information. - - - - - The writer has already sucessfully called the Subscribe function. It cannot call - subscribe multiple times. - - - - - The shadow copy provider does not support the specified shadow copy type. - - - - - The specified shadow copy storage association is in use and so can't be deleted. - - - - - Maximum number of shadow copy storage associations already reached. - - - - - The system or provider has insufficient storage space. If possible delete any old or unnecessary persistent shadow copies and try again. - - - - - No shadow copies were successfully imported. - - - - - Some shadow copies were not succesfully imported. - - - - - Some shadow copies were not succesfully imported. - - - - - The maximum number of remote machines for this operation has been reached. - - - - - The remote server is unavailable. - - - - - The remote server is running a version of the Volume Shadow Copy Service that does not - support remote shadow-copy creation. - - - - - A revert is currently in progress for the specified volume. Another revert - cannot be initiated until the current revert completes. - - - - - The volume being reverted was lost during revert. - - - - - The provider encountered an error that requires the user to restart the computer. - Windows Server 2003 and Windows XP:This value is not supported until Windows Vista. - - - - - The system was unable to freeze the Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - Windows Server 2003 and Windows XP:This value is not supported until Windows Vista. - - - - - The system was unable to thaw the Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - Windows Server 2003 and Windows XP:This value is not supported until Windows Vista. - - - - - The shadow copy contains only a subset of the volumes needed by the writer to correctly back - up the application component. - - - - - The writer ran out of memory or other system resources. The recommended way to handle this error code is - to wait ten minutes and then repeat the operation, up to three times. - - - - - The writer operation failed because of a time-out between the Freeze and Thaw events. - The recommended way to handle this error code is to wait ten minutes and then repeat the operation, up to three times. - - - - - The writer failed due to an error that would likely not occur if the entire backup, restore, or shadow copy creation - process was restarted. The recommended way to handle this error code is to wait ten minutes and then repeat - the operation, up to three times. - - - - - The writer experienced a non-transient error. If the backup process is retried, - the error is likely to reoccur. - - - - - The writer experienced an error while trying to recover the shadow-copy volume. - - - - - The shadow copy set break operation failed because the disk/partition identities could not be reverted. - The target identity already exists on the machine or cluster and must be masked before this operation can succeed. - - - - - This version of the hardware provider does not support this operation. - - - - - At least one of the providers in this Shadow Copy Set failed the break operation for a snapshot. - - - - - There are too few disks on this computer or one or more of the disks is too small. - Add or change disks so they match the disks in the backup, and try the restore again. - - - - - Windows cannot create a disk on this computer needed to restore from the backup. - Make sure the disks are properly connected, or add or change disks, and try the restore again. - - - - - The computer needs to be restarted to finish preparing a hard disk for restore. To continue, restart your computer and run the restore again. - - - - - The backup failed due to a missing disk for a dynamic volume. Please ensure the disk is online and retry the backup. - - - - - Automated System Recovery failed the shadow copy, because a selected critical volume is located on a cluster shared disk. - This is an unsupported configuration. - - - - - A data disk is currently set as active in BIOS. Set some other disk as active or use the DiskPart utility to clean the - data disk, and then retry the restore operation. - - - - - The disk that is set as active in BIOS is too small to recover the original system disk. - Replace the disk with a larger one and retry the restore operation. - - - - - There is not enough disk space on the system to perform the restore operation. - Add another disk or replace one of the existing disks and retry the restore operation. - - - - - - The writer status is not available for one or more writers. A writer may have reached the maximum number of available backup - and restore sessions. - - - Windows Vista, Windows Server 2003, and Windows XP: This value is not supported. - - - - - - The system was unable to flush I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - - The system was unable to hold I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - - Represenation of the status for a specific writer. - - This class acts as a container for the information returned from - IVssBackupComponents.GetWriterStatus in the original - VSS API - - - - Initializes a new instance of the class. - - The writer instance id. - The writer class id. - Name of the writer. - The state. - The failure. - The application error code. - The application error message. - - - - Initializes a new instance of the class. - - The writer instance id. - The writer class id. - Name of the writer. - The state. - The failure. - - - - The instance id of the writer. - - - - - The identifier of the writer class. - - - - - The name of the writer. - - - - - A value containing the state of the writer. - - - - - A value indicating the failure code (if any) of the writer. - - - - The following are the supported values for : - - - Value - Meaning - - - - The writer was successful. - - - - The shadow copy contains only a subset of the volumes needed by the writer to correctly back up the application component. - - - - The writer ran out of memory or other system resources. The recommended way to handle this error code is to wait ten minutes and then repeat the operation, up to three times. - - - - The writer operation failed because of a time-out between the Freeze and Thaw events. The recommended way to handle this error code is to wait ten minutes and then repeat the operation, up to three times. - - - - The writer failed due to an error that would likely not occur if the entire backup, restore, or shadow copy creation process was restarted. The recommended way to handle this error code is to wait ten minutes and then repeat the operation, up to three times. - - - - The writer operation failed because of an error that might recur if another shadow copy is created. - - - - The writer is not responding. - - - - - - The writer status is not available for one or more writers. A writer may have reached the maximum number of available backup and restore sessions. - - - Windows Vista, Windows Server 2003 and Windows XP: This value is not supported. - - - - - - - - - - Gets the return code that the writer passed for the hrApplication parameter of the CVssWriterEx2::SetWriterFailureEx method. - - - This property requires Windows 7 or Windows Server 2008 R2 and will be on earlier operating systems. - - - - - Gets the application failure message that the writer passed for the wszApplicationMessage parameter of the SetWriterFailureEx method. - - - This property requires Windows 7 or Windows Server 2008 R2 and will be on earlier operating systems. - - - - - Defines the set of volume shadow copy protection levels. - - - - - Specifies that I/O to the original volume must be maintained at the expense of shadow copies. - This is the default protection level. Shadow copies might be deleted if both of the following conditions occur: - - - - A write to the original volume occurs. - - - - - The integrity of the shadow copy cannot be maintained for some reason, such as a failure to - write to the shadow copy storage area or a failure to allocate sufficient memory. - - - - - - - - Specifies that shadow copies must be maintained at the expense of I/O to the original volume. - All I/O to the original volume will fail if both of the following conditions occur: - - - - A write to the original volume occurs. - - - - - The corresponding write to the shadow copy storage area cannot be completed for some reason, - such as a failure to write to the shadow copy storage area or a failure to allocate sufficient memory. - - - - - - - - Defines shadow copy LUN flags. - - - Only supported on Windows Server 2008. - - - - - The shadow copy LUN will be masked from the host. - - - - - The shadow copy LUN will be exposed to the host as a read-write volume. - - - - - The disk identifiers of all of the shadow copy LUNs will be reverted to that of the - original LUNs. However, if any of the original LUNs are present on the system, the operation will - fail and none of the identifiers will be reverted. - - - - - None of the disk identifiers of the shadow copy LUNs will be reverted. - - - - - The shadow copy LUNs will be converted permanently to read-write. - This flag is set only as a notification for the provider; no provider action is required. - For more information, see the IVssHardwareSnapshotProviderEx::OnLunStateChange method. - - - - - The shadow copy LUNs will be converted temporarily to read-write and are about to undergo TxF recovery - or VSS auto-recovery. This flag is set only as a notification for the provider; no provider action is required. - For more information, see the IVssHardwareSnapshotProviderEx::OnLunStateChange method. - - - - - The shadow copy LUNs have just undergone TxF recovery or VSS auto-recovery and have been converted back to - read-only. This flag is set only as a notification for the provider; no provider action is required. - For more information, see the IVssHardwareSnapshotProviderEx::OnLunStateChange method. - - - - - The provider must mask shadow copy LUNs from this computer. - For more information, see the IVssHardwareSnapshotProviderEx::OnLunStateChange method. - - - - - The interface provides a method that returns an interface to further configure a shadow copy provider. - - - - - Gets an instance of the differential software snapshot management interface to further configure the system provider. - - - - - - Windows XP: This method is not supported until Windows 2003. - - - - - An instance of the differential software snapshot management interface to further configure the system provider. - - - - Returns the current minimum size of the shadow copy storage area. - - - - The shadow copy storage area minimum size is a per-computer setting. Prior to Windows Server 2003 Service Pack 1 (SP1), this - was fixed at 100 MB. With Windows Server 2003 SP1, the shadow copy storage area has a minimum size of 300 MB and can be - increased in 300 MB increments up to 3000 MB (3 GB). This setting is stored in the MinDiffAreaFileSize value of type - REG_DWORD in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\VolSnap (the value is the size, in MB). - - - - - Windows XP and Windows 2003: This method is not supported until Windows 2003 SP1. - - - - - The current minimum size of the shadow copy storage area. - - - - Exception thrown to indicate that the requested object did not exists. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate The system was unable to flush I/O writes. - - - This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception indicating that the resynchronization destination contained a volume that was not explicitly included. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - - The enumeration is used by a writer at restore time to - indicate how all the files included in a selected component, and all the files in any - component set it defines, are to be restored. - - - Setting a restore target modifies or overrides the restore method set during backup (see ). - - - For more information see the MSDN documentation on the VSS_RESTORE_TARGET enumeration. - - - - No target is defined. - This value indicates an error on the part of the writer. - - - - - - This is the default restore target. - - - This value indicates that the restoration of the files included in a selected component - (or the component set defined by that component) should proceed according to the original - restore method specified at backup time by a value. - - - - - - - The files are restored to a location determined from an existing alternate location mapping. - - - The restore target should be set to only when - alternate location mappings have been set for all the files managed by - a selected component or component set. - - - - - - - Use directed targeting by the writer at restore time to restore a file. - - - Directed targeting allows a writer to control, on a file-by-file basis, how a file is - restored—indicating how much of a file is to be restored and into which files the backed-up file is to be restored. - - - - - - - The files are restored to the location at which they were at backup time, even if the original restore - method that was specified at backup time was . - - - Windows Server 2003 and Windows XP: This value is not supported. - - - - - - - Interface containing methods for examining and modifying information about components contained in a requester's Backup Components Document. - - - - - objects can be obtained only for those components that have been explicitly added - to the Backup Components Document during a backup operation by the - method. - - - Information about components explicitly added during a restore operation using - are not available through the - interface. - - - For more information, see the MSDN documentation on - the IVssComponent Interface. - - - - - - The is used by a writer during incremental or differential restore - operations to determine whether a given component will require additional restore operations to completely retrieve it, - but can also be called by a requester. - - - If , additional restores will occur for the - current component. If , additional restores will not occur. - - - - - - The backup options specified to the writer that manages the currently selected component or component set - by a requester using . - - - The backup options for the current writer. - - - The backup stamp string stored by a writer for a given component. - The backup stamp indicating the time at which the component was backed up. - - - - The status of a complete attempt at backing up all the files of a selected component or component set as a - enumeration. - - - if the backup was successful and if it was not. - - - - The logical name of this component. - The logical name of this component. - - - The type of this component in terms of the enumeration. - The type of this component. - - - - The status of a completed attempt to restore all the files of a selected component or component set - as a enumeration. - - - A value of the enumeration that specifies whether all files were successfully restored. - - - - The logical path of this component. - The logical path of this component. - - - The failure message generated by a writer while handling the PostRestore event if one was set. - The failure message that describes an error that occurred while processing the PostRestore event. - - - The failure message generated by a writer while handling the PreRestore event if one was set. - The failure message that describes an error that occurred while processing the PreRestore event. - - - - A previous backup stamp loaded by a requester in the Backup Components Document. The value is used by a writer when - deciding if files should participate in differential or incremental backup operation. - - - The time stamp of a previous backup so that a differential or incremental backup can be correctly implemented. - - - - The restore options specified to the current writer by a requester using - . - The restore options of the writer. - - - The restore target (in terms of the enumeration) for the current component. Can only be called during a restore operation. - A value from the enumeration containing the restore target information. - - - Determines whether the current component has been selected to be restored. - If the returned value of this parameter is , the component has been selected to be restored. If , it has not been selected. - - - A collection of mapping information for the file set's alternate location for file restoration. - A read-only list containing the alternate location to which files were actually restored. This list must not be accessed after the from which it was obtained has been disposed. - See the MSDN documentation on the IVssComponent::GetAlternateLocationMapping method for more information. - - - - Information stored by a writer, at backup time, to the Backup Components Document to indicate that when a file is to be - restored, it (the source file) should be remapped. The file may be restored to a new restore target and/or ranges of its data - restored to different locations with the restore target. - - A read-only list containing the directed targets of this component. This list must not be accessed after the from which it was obtained has been disposed. - - - - The new file restoration locations for the selected component or component set. - - A read-only list contianing the new file restoration locations for the selected component or component set. This list must not be accessed after the from which it was obtained has been disposed. - - - - Information about any partial files associated with this component. - - A read-only list containing information about any partial files associated with this component. This list must not be accessed after the from which it was obtained has been disposed. - - - - Information about the file sets (specified file or files) to participate in an incremental or differential backup or restore as a - differenced file — that is, backup and restores associated with it are to be implemented as if entire files are copied to and from - backup media (as opposed to using partial files). - - Windows XP: This method requires Windows Server 2003 or later - - A read only list containing the diffrenced files associated with this component. This list must not be accessed after the from which it was obtained has been disposed. - - - - The subcomponents associated with this component. - A read only list containing the subcomponents associated with this component. This list must not be accessed after the from which it was obtained has been disposed. - - - - Gets a value indicating whether a requester has marked the restore of a component as authoritative for a replicated data store. - - - if the restore is authoritative; otherwise, . - - - - A writer indicates that it supports authoritative restore by setting the - flag in its backup schema mask. - - - For more information, see Setting VSS Restore Options. - - - - - Windows XP and Windows 2003: This property requires Windows Vista or later and will always return - on unsupported operating systems. - - - - - - - - Gets the PostSnapshot failure message string that a writer has set for a given component. - - - - Both writers and requesters can call this method. - - - - - Windows XP and Windows 2003: This property requires Windows Vista or later and will always return - on unsupported operating systems. - - - - - A string containing the failure message that describes an error that occurred while processing a PostSnapshot event, or - if no value was set or the method is not supported on the current operating system. - - - - Gets the PrepareForBackup failure message string that a writer has set for a given component. - - A string containing the failure message that describes an error that occurred while processing a PrepareForBackup event, - or if no failure message was set for this component, or if the property is not supported on the - current operating system. - - - Both writers and requesters can call this method. - - - - - Windows XP and Windows 2003: This property requires Windows Vista or later and will always return - on unsupported operating systems. - - - - - - - - Obtains the logical name assigned to a component that is being restored. - - - A string containing the restore name for the component, or if the operation - is not supported on the current operating system. - - - - The property can only be accessed during a restore operation. - - - A writer indicates that it supports this method by setting the - flag in its backup schema mask. - - - For more information, see - Setting VSS Restore Options. - - - - - Windows XP and Windows 2003: This property requires Windows Vista or later and will always return - on unsupported operating systems. - - - - - - - - Obtains the restore point for a partial roll-forward operation. - - - A string specifying the roll-forward restore point, - or if the property is not supported in the current context. - - - - The property can only be accessed during a restore operation. - - - A writer indicates that it supports this method by setting the - flag in its backup schema mask. - - - For more information, see - Setting VSS Restore Options. - - - - - Windows XP and Windows 2003: This property requires Windows Vista or later and will always return - on unsupported operating systems. - - - - - - - - Obtains the roll-forward operation type for a component. - - - A enumeration value indicating the type of roll-forward operation to be performed, - or if the property is not supported in the current context. - - - - The property can only be accessed during a restore operation. - - - A writer indicates that it supports this method by setting the - flag in its backup schema mask. - - - For more information, see - Setting VSS Restore Options. - - - - - Windows XP and Windows 2003: This property requires Windows Vista or later and will always return - on unsupported operating systems. - - - - - - - - VSS requesters read this property to retrieve component-level errors reported by writers. - VSS writers set this property to report errors at the component level. - - An instance of containing the information reported by the writer. - Minimum supported client: Windows 7, Minimum supported server: Windows Server 2008 R2 - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - Represents the status of an asynchronous operation performed by the VSS framework. - - - - - Cancels an incomplete asynchronous operation. - - - - - Exception indicating that the creation of a shadow copy is in progress, and only one shadow copy creation - operation can be in progress at one time. Either wait to try again or return with a failure. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception indicating that the writer operation failed because of an error that might recur if another shadow copy is created. - For more information, see Event and Error Handling Under VSS. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - IVssImplementation provides an interface to the global methods of the VSS API compiled for a specific - platform. - - - An instance of IVssImplementation can be obtained either by using the factory methods of - for dynamically loading the suitable assembly containing the correct implementation (preferred), - or by statically referencing the correct platform-specific assembly and manually creating an instance of VssImplementation - from that assembly. - - - - - - The CreateVssBackupComponents method creates an interface object - for the current implementation and returns a reference to it. - - - The calling application is responsible for calling Dispose" to release the - resources held by the instance when it is no longer needed. - - A reference to the newly created instance. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - - - - - The IsVolumeSnapshotted function determines whether any shadow copies exist for the specified volume. - - - Use to determine whether certain volume control or file I/O operations are - disabled for the given volume if a shadow copy of it exists. - - - Name of the volume. The name of the volume to be checked must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form \\?\Volume{GUID}\ (where GUID is the unique global identifier of the volume) with a backslash (\) - - - true if the volume has a shadow copy, and false if the volume does not have a shadow copy. - One of the parameters is not valid. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - Expected provider error. The provider logged the error in the event log. - The specified volume was not found. - Unexpected provider error. The error code is logged in the event log file. - - - - Determines whether certain volume control or file I/O operations are disabled for the given volume if a shadow copy of it exists. - - - Name of the volume. The name of the volume to be checked must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form \\?\Volume{GUID}\ (where GUID is the unique global identifier of the volume) with a backslash (\) - - - - A bit mask (or bitwise OR) of values that indicates whether certain - volume control or file I/O operations are disabled for the given volume if a shadow copy of it exists. - - - - Use to determine whether a snapshot exists for the specified volume or not. - - - If no volume control or file I/O operations are disabled for the selected volume, then the shadow copy capability of the - selected volume returned will . - - - - One of the parameters is not valid. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - Expected provider error. The provider logged the error in the event log. - The specified volume was not found. - Unexpected provider error. The error code is logged in the event log file. - - - - Checks the registry for writers that should block revert operations on the specified volume. - - - The name of the volume. The name must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form \\?\Volume{GUID}\ (where GUID is the unique global identifier of the volume) with a backslash (\) - - - - if the volume contains components from any writers that are listed in the registry as writers that should block - revert operations; otherwise, - - - - - The CreateVssExamineWriterMetadata function creates a new instance from an - XML document for the current implementation. - - A string containing a Writer Metadata Document with which to initialize the returned object. - - This method attempts to load the returned object with metadata previously stored by a call to - . Users should not tamper with this metadata document. - - a instance initialized with the specified XML document. - - - - Gets a snapshot management interface for the current implementation. - - A snapshot management interface for the current implementation. - - - The enumeration is used by a requester to indicate the type of restore operation it is about to perform. - - A requester sets the type of a restore operation using . - - - - - - No restore type is defined. - This indicates an error on the part of the requester. - - - - The default restore type: A requester restores backed-up data to the original volume from a backup medium. - - - - - A requester does not copy data from a backup medium, but imports a transportable shadow copy - and uses this imported volume for operations such as data mining. - - - Windows Server 2003, Standard Edition and Windows Server 2003, Web Edition: This value is not supported. All editions of Windows Server 2003 SP1 support this value. - - - - - A restore type not currently enumerated. This value indicates an application error. - - - - Exception indicating that this version of the hardware provider does not support this operation. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - The class contains the properties of a shadow copy source volume. - - - - - Initializes a new instance of the class. - - Name of the volume. - Display name of the volume. - - - - Gets the volume name, in \\?\Volume{GUID}\ format. - - The volume name, in \\?\Volume{GUID}\ format. - - - - Gets a string that can be displayed to the user containing the shortest mount point (for example C:\). - - A string that can be displayed to the user containing the shortest mount point (for example C:\). - - - - The structure describes a shadow copy storage area volume. - - - - - Initializes a new instance of the class. - - Name of the volume. - Display name of the volume. - The volume free space. - The volume total space. - - - - Gets the shadow copy storage area volume name, in \\?\Volume{GUID}\ format. - - The shadow copy storage area volume name, in \\?\Volume{GUID}\ format. - - - - Gets a string that can be displayed to a user, for example C:\, for the shadow copy storage area volume. - - A string that can be displayed to a user, for example C:\, for the shadow copy storage area volume. - - - - Gets the free space, in bytes, on the shadow copy storage area volume. - - The free space, in bytes, on the shadow copy storage area volume. - - - - Gets the total space, in bytes, on the shadow copy storage area volume. - - The total space, in bytes, on the shadow copy storage area volume.. - - - - Exception class indicating that the vss object referenced was not in a correct state for the requested operation. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class with the specified error message. - - The error message. - - - - Initializes a new instance of the class with the specified error message - and a reference to the inner exception that is the cause of this exception. - - The error message. - The inner exception. - - - - Initializes a new instance of the class with serialized data. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - The enumeration specifies the type of data that a writer manages. - - - The source of the data is not known.This indicates a writer error, and the requester should report it. - - - The source of the data is a database that supports transactions, such as Microsoft SQL Server. - - - The source of the data is a database that does not support transactions. - - - - Unclassified source type—data will be in a file group. - This is the default source type. - - - - - The enumeration enables a requester using to specify how a - shadow copy is to be created, queried, or deleted and the degree of writer involvement. - ::SetContext" method) may be modified by a bitmask that contains a valid combination of - and enumeration values. - - is defined as a static class defining the base - combination of values representing the VSS_CTX_XXXXXX constants defined in the VSS API. - - - - - - The standard backup context. Specifies an auto-release, nonpersistent shadow copy in which writers are involved in the creation. - - - - - Specifies a nonpersistent and auto-release shadow copy created without writer involvement. - - - - - Specifies a persistent and non-auto-release shadow copy without writer involvement. This context should be used when there is no need for writer involvement to ensure that files are in a consistent state at the time of the shadow copy. - Lightweight automated file rollback mechanisms or persistent shadow copies of file shares or data volumes that are not expected to contain any system-related files or databases might run under this context. For example, a requester could use this context for creating a shadow copy of a NAS volume hosting documents and simple user shares. Those types of data do not need writer involvement to create a consistent shadow copy. - - - - - Specifies a persistent and non-auto-release shadow copy with writer involvement. This context is designed to be used when writers are needed to ensure that files are in a well-defined state prior to shadow copy. - Automated file rollback mechanisms of system volumes and shadow copies to be used in data mining or restore operations might run under this context. This context is similar to VSS_CTX_BACKUP but allows a requester more control over the persistence of the shadow copy. - - - - - Specifies a read-only, client-accessible shadow copy supporting Shadow Copies for Shared Folders and created without writer involvement. Only the system provider (the default provider available on the system) can create this type of shadow copy. - Most requesters will want to use the context for persistent, non-auto-release shadow copies without writer involvement. - - - - - Specifies a read-only, client-accessible shadow copy supporting Shadow Copies for Shared Folders and created with writer involvement. Only the system provider (the default provider available on the system) can create this type of shadow copy. - Most requesters will want to use the context for persistent, non-auto-release shadow copies with writer involvement. - Windows Server 2003 and Windows XP: This context is not supported by Windows Server 2003 and Windows XP. - - - - - All types of currently live shadow copies are available for administrative operations, such as shadow copy queries - (see the Query method in ). is a valid context for all VSS interfaces except - ::StartSnapshotSet and ::DoSnapshotSet. - - - - The enumeration specifies the provider type. - - - - - The provider type is unknown. - - - This indicates an error in the application or the VSS service, or that no provider is available. - - - - - The default provider that ships with Windows. - - - A software-based provider. - - - A hardware-based provider. - - - - Used by a requester to specify how a resynchronization operation is to be performed. - - - - - No options. - - - - - After the resynchronization operation is complete, the signature of each target LUN should be identical to that of the original LUN that was used to create the shadow copy. - - - - - Volume safety checks should not be performed. - - - - - is used to determine the writer ID, logical path, and component name of components that must be restored or - backed up along with the target component. - Note that a dependency does not indicate an order of preference between the component with the documented dependencies and the components it depends on. A dependency merely indicates that the component and the components it depends on must always be backed up or restored together. - Windows XP: This class is not supported until Windows Server 2003 - - - - - - Initializes a new instance of the class. - - The writer id. - The logical path. - Name of the component. - - - - The class ID of a writer containing a component that the current component depends on. - - - - - The logical path of a component that the current component depends on. - - - - - Retrieves the name of a component that the current component depends on. - - - - - A strongly-typed resource class, for looking up localized strings, etc. - - - - - Returns the cached ResourceManager instance used by this class. - - - - - Overrides the current thread's CurrentUICulture property for all - resource lookups using this strongly typed resource class. - - - - - Looks up a localized string similar to AlphaVSS requires at least Windows XP.. - - - - - Looks up a localized string similar to Another LUN resynchronization operation is already in progress.. - - - - - Looks up a localized string similar to An unexpected error occurred. The error code is logged in the error log file.. - - - - - Looks up a localized string similar to An unexpected error occurred during communication with writers.. - - - - - Looks up a localized string similar to Deletion of snapshot failed. See inner exception for details. . - - - - - Looks up a localized string similar to Deletion of snapshots failed. - - - - - Looks up a localized string similar to Expected provider error. Check the event log for details.. - - - - - Looks up a localized string similar to Failed to detect architecture of running operating system.. - - - - - Looks up a localized string similar to IA64 architecture is not supported.. - - - - - Looks up a localized string similar to Invalid XML document. Check the event log for details.. - - - - - Looks up a localized string similar to The maximum number of shadow copy storage areas has been added to the shadow copy source volume.. - - - - - Looks up a localized string similar to The requested operation is not supported on the current operating system.. - - - - - Looks up a localized string similar to System was unable to freeze the Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - - - - - Looks up a localized string similar to The creation of a shadow copy is already in progress.. - - - - - Looks up a localized string similar to The maximum number of volumes has already been added to the shadow copy set.. - - - - - Looks up a localized string similar to The operation is not supported under the current context.. - - - - - Looks up a localized string similar to The provider encountered an error that requires the user to restart the computer.. - - - - - Looks up a localized string similar to The provider returned an unexpected error code.. - - - - - Looks up a localized string similar to The requested identifier does not correspond to a registered provider.. - - - - - Looks up a localized string similar to The requested object does not exist.. - - - - - Looks up a localized string similar to The requested object was a duplicate.. - - - - - Looks up a localized string similar to The system or provider has insufficient storage space. If possible delete any old or unnecessary persistent shadow copies and try again.. - - - - - Looks up a localized string similar to The system was unable to flush I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times.. - - - - - Looks up a localized string similar to The system was unable to hold I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - - Looks up a localized string similar to The volume already has a revert in progress.. - - - - - Looks up a localized string similar to The volume does not support the requested operation, or no provider supports it.. - - - - - Looks up a localized string similar to The volume has already been added to the maximum number of shadow copy sets.. - - - - - Looks up a localized string similar to The volume is not supported by the specified provider.. - - - - - Looks up a localized string similar to The volume was in use and could not be locked.. - - - - - Looks up a localized string similar to The VSS object was in an incorrect state for the requested operation.. - - - - - Looks up a localized string similar to The writer infrastructure is not operating properly. Check that the Event Service and VSS have been started, and check for errors associated with those services in the error log.. - - - - - Looks up a localized string similar to The writer is not responding.. - - - - - Looks up a localized string similar to This operation requires {0}{1}. Detected operating system was: {2}{3}.. - - - - - Looks up a localized string similar to This operation requires {0}{1} or later. Detected operating system was: {2}{3}.. - - - - - Looks up a localized string similar to This operation requires {0}. Detected operating system was: {1}.. - - - - - Looks up a localized string similar to This operation requires {0} or later. Detected operating system was: {1}.. - - - - - Looks up a localized string similar to This operation requires {0} with at least Service Pack {1}. Detected operating system was: {2}{3}.. - - - - - Looks up a localized string similar to This operation requires {0} with at least Service Pack {1}, or {2} with at least service pack {3}. Detected operating system was: {4}{5}.. - - - - - Looks up a localized string similar to This version of the hardware provider does not support this operation.. - - - - - Looks up a localized string similar to Unexpected system error.. - - - - - Looks up a localized string similar to The requested method is not supported on the current operating system, or the loaded assembly is targeted for a different operating system than the one on which it is running.. - - - - - Looks up a localized string similar to The MBR signature or GPT ID for one or more disks could not be set to the intended value. Check the Application event log for more information.. - - - - - Looks up a localized string similar to The shadow copy contains only a subset of the volumes needed by the writer to correctly back up the application component.. - - - - - Looks up a localized string similar to The writer operation failed because of an error that might recur if another shadow copy is created.. - - - - - Looks up a localized string similar to The writer ran out of memory or other system resources.. - - - - - Looks up a localized string similar to The writer is reporting one or more component-level errors.. - - - - - Looks up a localized string similar to The writer failed due to an error that would likely not occur if the entire backup, restore, or shadow copy creation process was restarted. - - - - - Looks up a localized string similar to The specified snapshot specifies a shadow copy that does not exist in the Backup Components Document.. - - - - - Looks up a localized string similar to The writer operation failed because of a time-out between the Freeze and Thaw events.. - - - - - Looks up a localized string similar to The resynchronization destination contained a volume that was not explicitly included.. - - - - - Looks up a localized string similar to Writer status is not available for one or more writers. A writer may have reached the maximum number of available backup and restore sessions.. - - - - - is a class that allows access to component information stored in a Writer Metadata Document. - Instances of are obtained by enumerating . - - - - - Gets a buffer containing the binary data for a displayable icon representing the component. - - - The buffer contents should use the same format as the standard icon (.ico) files. If the writer that created - the component did not choose to specify an icon, the value will be . - - A buffer containing the binary data for a displayable icon representing the component. - - - - The component type. - - - - - The logical path of the component. - - A string containing the logical path of the component, which may be . - There are no restrictions on the characters that can appear in a non-NULL logical path. - - - - The name of the component. A component name string cannot be . - - - - - The description of the component. A caption string can be . - - - - - Boolean that indicates whether there is private metadata associated with the restoration of the component. - - - The Boolean is if there is private metadata associated with the restoration - of the components, and if there is not. - - - - Reserved for future use. - - - - Boolean that indicates (for component mode operations) if the component is selectable for backup. - - - The value of helps determine whether a requester has the option of including or excluding - a given component in backup operations. - - - if the component is selectable for backup and if it is not. - - VSS_COMPONENTINFO structure on MSDN - - - - Boolean that indicates (for component-mode operations) whether the component is selectable for restore. - - - - allows the requester to determine whether this component can be individually selected - for restore if it had earlier been implicitly included in the backup. - - - - Windows XP: This requires Windows Server 2003 or later. It will always return false on earlier operating systems. - - - - - The Boolean is if the component is selectable for restore and if it is not. - - - - - A bit mask (or bitwise OR) of values of the enumeration, indicating the - features this component supports. - - - - Windows Server 2003 and Windows XP: Before Windows Server 2003 SP1, this member is reserved for system use and - will always return . - - - - - - The file descriptors associated with this component. - - This collection represents the method GetFile() of IVssWMComponent in the VSS API - - - - A list of instances containing information about the database backup component files. - - - - - A list of file descriptors for the log files associated with the specified database backup component. - - - - - A list of instances containing accessors for obtaining information about explicit writer-component - dependencies of one of the current components. - - This will always be an empty list on operating systems earlier than Windows Server 2003. - - - - The interface contains methods that allow applications to query and - manage shadow copy storage areas generated by the system shadow copy provider. - - - - - - Windows XP: This interface requires Windows Server 2003 or later. - - - - - - - - The method adds a shadow copy storage area association for the specified volume. - If the association is not supported, an exception will be thrown. - - - - Name of the volume that will be the source of shadow copies that is to be associated - with a shadow copy storage area on the volume. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - - Name of the volume that - will contain the shadow copy storage area to be associated with the - volume. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - - Specifies the maximum size, in bytes, of the shadow copy storage area on the volume. - This value must be at least 300 MB, up to the system-wide limit. - - - Windows Server 2003: Prior to - Windows Server 2003 SP1 the shadow copy storage area size was fixed at 100 MB. - - - - - - - Windows XP: This method is not supported until Windows Server 2003. - - - - - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - Unexpected error. The error code is logged in the error log file. - The association between the and volumes already exists. - Expected provider error. The provider logged the error in the event log. - The volume is not NTFS or has insufficient free space. - The maximum number of shadow copy storage areas has been added to the shadow copy source volume. The specified shadow copy storage volume was not associated with the specified shadow copy source volume. - - - - The method updates the shadow copy storage area maximum size - for a certain volume. This may not have an immediate effect. - - - Updates the shadow copy storage area maximum size - for a certain volume. This method has two overloads. - - - - Name of the volume that is the source of shadow copies that are associated with a shadow copy - storage area on the volume. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - - Name of the volume that contains the shadow copy storage area associated with - the volume. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - Specifies the maximum size, in bytes, for the shadow copy storage area to - use for the volume. If this value is zero, the shadow copy storage area will be disabled. - - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - Unexpected error. The error code is logged in the error log file. - The association between the and volumes was not found. - Expected provider error. The provider logged the error in the event log. - The volume does not have sufficient free space. - A shadow copy is currently using the shadow copy storage area. - - - - The method queries shadow copy storage areas in use by the - original volume associated with the input shadow copy. - - The snapshot id. - A list of describing the shadow copy storage areas in use by the - shadow copy specified. - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - Unexpected error. The error code is logged in the error log file. - Expected provider error. The provider logged the error in the event log. - - - - The method queries shadow copy storage areas in use by the volume specified. - - - - Name of the volume that contains shadow copy storage areas. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - A list containing objects describing the shadow - copy storage areas in use by the volume specified. - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - Unexpected error. The error code is logged in the error log file. - Expected provider error. The provider logged the error in the event log. - - - - The method queries shadow copy storage areas that physically - reside on the given volume - - - - Name of the volume that contains shadow copy storage areas. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - A list of objects describing the - shadow copy storage areas that physically reside on the given volume. - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - Unexpected error. The error code is logged in the error log file. - Expected provider error. The provider logged the error in the event log. - - - - The method queries volumes that support shadow copy storage - areas (including volumes with disabled shadow copy storage areas). - - - - Name of the original volume that is the source of the shadow copies. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - A list of describing the volumes that support shadow - copy storage areas (including volumes with disabled shadow copy storage areas). - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - Unexpected error. The error code is logged in the error log file. - Expected provider error. The provider logged the error in the event log. - - - - The method updates the shadow copy storage area maximum size - for a certain volume. This may not have an immediate effect. - - - - Name of the volume that is the source of shadow copies that are associated with a shadow copy - storage area on the volume. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - - Name of the volume that contains the shadow copy storage area associated with - the volume. - - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - Specifies the maximum size, in bytes, for the shadow copy storage area to - use for the volume. If this value is zero, the shadow copy storage area will be disabled. - - - - to indicate that the effect of calling the - method should not continue if - the computer is rebooted; otherwise, . - - - If the parameter is zero, the - parameter must be . - - - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - Unexpected error. The error code is logged in the error log file. - The association between the and volumes was not found. - Expected provider error. The provider logged the error in the event log. - The volume does not have sufficient free space. - A shadow copy is currently using the shadow copy storage area. - - - - Clears the protection fault state for the specified volume. - - - Name of the volume that will be the source of shadow copies that is to be associated - with a shadow copy storage area on the volume. - - - The name of the volume. This parameter is required and cannot be . - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - - The method dismounts the volume and resets the - volume's protection fault member to to allow normal I/O to continue - on the volume. If the volume is not in a faulted state, this method does nothing. - - - - - Windows XP, Windows Server 2003 and Windows Vista: This method requires Windows Server 2008. - - - - - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - The provider for the volume does not support shadow copy protection. - Expected provider error. The provider logged the error in the event log. - The specified volume was not found. - - - - Deletes all shadow copy storage areas (also called diff areas) on the specified volume that are not in use. - - - The name of the volume. This parameter is required and cannot be . - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - - Unused shadow copy storage area files are found on storage area volumes when the associated original - volume is offline due to a protection fault. In certain cases, the original volume may be - permanently lost, and calling the method is the only way to - recover the abandoned storage area space. - - - - - Windows XP, Windows Server 2003 and Windows Vista: This method requires Windows Server 2008. - - - - - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - The provider for the volume does not support shadow copy protection. - Expected provider error. The provider logged the error in the event log. - The specified volume was not found. - - - - Gets the shadow copy protection level and status for the specified volume. - - - The name of the volume. This parameter is required and cannot be . - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - A class instance that contains information about the volume's - shadow copy protection level. - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - The provider for the volume does not support shadow copy protection. - Expected provider error. The provider logged the error in the event log. - The specified volume was not found. - - - - Windows XP, Windows Server 2003 and Windows Vista: This method requires Windows Server 2008. - - - - - - The method gets information about the volume's current protection level. - If the volume is in a faulted state, the member of the - structure contains the current protection fault, - and the member contains the reason why the volume - is in a faulted state. If the volume is not in a faulted state, - the and - members will be zero. - - - - - - Sets the shadow copy protection level for an original volume or a shadow copy storage area volume. - - - The name of the volume. This parameter is required and cannot be . - - The name of the volume must be in one of the following formats: - - - - The path of a volume mount point with a backslash (\) - - - - - A drive letter with backslash (\), for example, D:\ - - - - - A unique volume name of the form \\?\Volume{GUID}\ (where - GUID is the unique global identifier of the volume) with a backslash (\) - - - - - - - A value from the enumeration that specifies the shadow - copy protection level. - - Caller does not have sufficient backup privileges or is not an administrator. - The caller is out of memory or other system resources. - One of the parameter values is not valid. - One of the arguments was - The provider for the volume does not support shadow copy protection. - Expected provider error. The provider logged the error in the event log. - The specified volume was not found. - - - The method checks the current shadow copy protection - level of the volume. If the volume is in a faulted state and - is specified for the - parameter, dismounts - the volume before setting the protection level. - - - If the current protection level of the volume is the same as the value of the - parameter, - does nothing. - - - - - Windows XP, Windows Server 2003 and Windows Vista: This method requires Windows Server 2008. - - - - - - - - The class is used by a requester to poll writers about file status and to run backup/restore operations. - - - - - - - A object can be used for only a single backup, restore, or Query operation. - - - After the backup, restore, or Query operation has either successfully finished or been explicitly terminated, a requester must - release the object by calling Dispose(). - A object must not be reused. For example, you cannot perform a backup or restore operation with the - same object that you have already used for a Query operation. - - - For information on how to retrieve an instance of for the current operating system, see - and . - - - - - - The AbortBackup method notifies VSS that a backup operation was terminated. - - This method must be called if a backup operation terminates after the creation of a shadow copy set with - and before returns. - - - If AbortBackup is called and no shadow copy or backup operations are underway, it is ignored. - - - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized. - - - - The AddAlternativeLocationMapping method is used by a requester to indicate that an alternate location - mapping was used to restore all the members of a file set in a given component. - - Globally unique identifier (GUID) of the writer class that exported the component. - Type of the component. - - String containing the logical path to the component. The logical path can be . - There are no restrictions on the characters that can appear in a non-null logical path. - - The component name. - - - The path to the directory that originally contained the - file to be relocated. This path must be local to the VSS machine. - - - The path can contain environment variables (for example, %SystemRoot%) but cannot contain wildcard characters. - UNC paths are not supported. - - - There is no requirement that the path end with a backslash ("\"). It is up to applications that retrieve - this information to check. - - - String containing the original file specification. A file specification cannot - contain directory specifications (for example, no backslashes) but can contain the ? and * wildcard characters. - - Boolean indicating whether the path specified by the parameter identifies only a single - directory or if it indicates a hierarchy of directories to be traversed recursively. The Boolean is true if the - path is treated as a hierarchy of directories to be traversed recursively and false if not. - - The name of the directory where the file will be relocated. This path must be local to the VSS machine. - UNC paths are not supported. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The XML document is not valid. Check the event log for details. - The specified component does not exist. - - - - The AddComponent method is used to explicitly add to the backup set in the Backup Components Document all required - components (nonselectable for backup components without a selectable for backup ancestor), and such optional - (selectable for backup) components as the requester considers necessary. Members of component sets (components with - a selectable for backup ancestor) are implicitly included in the backup set, but are not explicitly added to the Backup - Components Document. - - Identifies a specific instance of a writer. - Writer class identifier. - Identifies the type of the component. - - String containing the logical path of the selectable for backup component. - A logical path is not required when adding a component. Therefore, the value of this parameter can be . - There are no restrictions on the characters that can a logical path. - - - String containing the name of the selectable for backup component. - The value of this parameter cannot be . - There are no restrictions on the characters that can appear in a logical path. - - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The XML document is not valid. Check the event log for details. - The object is a duplicate. A component with the same logical path and component name already exists. - - - - The AddNewTarget method is used by a requester during a restore operation to indicate that the backup application plans - to restore files to a new location. - - Globally unique identifier (GUID) of the writer class containing the files that are to receive a new target. - Identifies the type of the component, see the documentation for for more information. - - String containing the logical path of the component containing the files that are to receive a new restore target. - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - The logical path can be . - There are no restrictions on the characters that can appear in a non-null logical path. - - - The name of the component containing the files that are to receive a new restore target. - The string should not be and should contain the same component name as was used when the - component was added to the backup set using . - There are no restrictions on the characters that can appear in a non-NULL logical path. - - - The name of the directory or directory hierarchy containing the files to receive a new restore target. - The path can contain environment variables (for example, %SystemRoot%) but cannot contain wildcard characters. - There is no requirement that the path end with a backslash ("\"). It is up to applications that retrieve this information to check. - - - The file specification of the files to receive a new restore target. - A file specification cannot contain directory specifications (for example, no backslashes) but can contain the ? and * wildcard characters. - - Boolean indicating whether only the files in the directory defined by and matching the file - specification provided by are to receive a new restore target, or if all files in the hierarchy defined - by and matching the file specification provided by are to receive a new restore target. - - The fully qualified path of the new restore target directory. - This method is not supported on Windows XP - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The component does not exist or the path and file specification do not match a component and file specification in the component. - The XML document is not valid. Check the event log for details. - The operation is not supported on the current operating system. - - - - The AddRestoreSubcomponent method indicates that a Subcomponent member of a component set, which had been marked as - nonselectable for backup but is marked selectable for restore, is to be restored irrespective of whether any other member - of the component set will be restored. - - Globally unique identifier (GUID) of the writer class containing the files that are to receive a new target. - Identifies the type of the component, see the documentation for for more information. - - String containing the logical path of the component in the backup document that defines the backup component set containing the Subcomponent to be added for restore. - The logical path can be . - There are no restrictions on the characters that can appear in a non-null logical path. - - - The logical path of the component in the backup document that defines the backup component set containing the Subcomponent to be added for restore. - The string should not be and should contain the same component name as was used when the - component was added to the backup set using . - There are no restrictions on the characters that can appear in a non-NULL component name. - - - The logical path of the Subcomponent to be added for restore. - A logical path is required when adding a Subcomponent. Therefore, the value of this parameter cannot be . - There are no restrictions on the characters that can appear in a non-NULL logical path. - - - The logical name of the Subcomponent to be added for restore. - The value of this parameter cannot be . - There are no restrictions on the characters that can appear in a non-NULL component name. - - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The component does not exist. - The XML document is not valid. Check the event log for details. - - - - The method adds an original volume to the shadow copy set. - - String containing the name of the volume to be shadow copied. The name must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form "\\?\Volume{GUID}\" (where GUID is the unique global identifier of the volume) with a backslash (\) - - - The provider to be used. can be used, in which case the default provider will be used. - Identifier of the added shadow copy. - - - The maximum number of shadow copies in a single shadow copy set is 64. - - If is , the default provider is selected according to the following algorithm: - - If any hardware-based provider supports the given volume, it is selected. - If there is no hardware-based provider available, if any software-based provider supports the given volume, it is selected. - If there is no hardware-based provider or software-based provider available, the system provider is selected. (There is only one preinstalled system provider, which must support all nonremovable local volumes.) - - - - Caller does not have sufficient backup privileges or is not an administrator. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The maximum number of volumes has been added to the shadow copy set. The specified volume was not added to the shadow copy set. - The volume has been added to the maximum number of shadow copy sets. The specified volume was not added to the shadow copy set. - does not correspond to an existing volume. - does not correspond to a registered provider. - Expected provider error. The provider logged the error in the event log. - The value of the parameter is and no VSS provider indicates that it supports the specified volume. - The volume is not supported by the specified provider. - The provider returned an unexpected error code. - - - - The method adds an original volume to the shadow copy set using the default provider. - - String containing the name of the volume to be shadow copied. The name must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form "\\?\Volume{GUID}\" (where GUID is the unique global identifier of the volume) with a backslash (\) - - - Identifier of the added shadow copy. - - - The maximum number of shadow copies in a single shadow copy set is 64. - - - Caller does not have sufficient backup privileges or is not an administrator. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The maximum number of volumes has been added to the shadow copy set. The specified volume was not added to the shadow copy set. - The volume has been added to the maximum number of shadow copy sets. The specified volume was not added to the shadow copy set. - does not correspond to an existing volume. - Expected provider error. The provider logged the error in the event log. - No VSS provider indicates that it supports the specified volume. - The volume is not supported by the specified provider. - The provider returned an unexpected error code. - - - - This method causes VSS to generate a BackupComplete event, which signals writers that the backup - process has completed. - - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - An unexpected error occurred during communication with writers. The error code is logged in the error log file. - - - - This method asynchronously causes VSS to generate a BackupComplete event, which signals writers that the backup - process has completed. - - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginBackupComplete or - in a callback passed to BeginBackupComplete. - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - - An instance that represents this asynchronous operation. - - - - - Waits for a pending asynchronous operation to complete. - - - EndBackupComplete can be called once on every from . - - The reference to the pending asynchronous request to finish. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - An unexpected error occurred during communication with writers. The error code is logged in the error log file. - - - - - The BreakSnapshotSet method causes the existence of a shadow copy set to be "forgotten" by VSS. - - - - The BreakSnapshotSet method causes the existence of a shadow copy set to be "forgotten" by VSS. - - Shadow copy set identifier. - BreakSnapshotSet can be used only for shadow copies created by a hardware shadow copy provider. This method makes these shadow copies regular volumes. - The caller does not have sufficient backup privileges or is not an administrator. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The shadow copy was created by a software provider and cannot be broken. - The specified shadow copy does not exist. - - - - The DeleteSnapshot method deletes a shadow copy.. - - Identifier of the shadow copy to be deleted. - If the value of this parameter is , the provider will do everything possible to delete the shadow copy. If it is , no additional effort will be made. - - - The requester is responsible for serializing the delete shadow copy operation. - - - During a backup, shadow copies are automatically released as soon as the instance is - disposed. In this case, it is not necessary to explicitly delete shadow copies. - - - The caller does not have sufficient backup privileges or is not an administrator. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The specified shadow copy does not exist. - Expected provider error. The provider logged the error in the event log. - Unexpected provider error. The error code is logged in the error log. - - - - The DeleteSnapshotSet method deletes a shadow copy set including any shadow copies in that set. - - Identifier of the shadow copy set to be deleted. - - If the value of this parameter is , the provider will do everything possible to - delete the shadow copies in a shadow copy set. If it is , no additional effort will be made. - - - - Multiple shadow copies in a shadow copy set are deleted sequentially. If an error occurs during one of these individual - deletions, DeleteSnapshotSet will throw an exception immediately; no attempt will be made to delete any remaining shadow copies. - The identifier of the undeleted shadow copy can be found in the instance of thrown. - - - The requester is responsible for serializing the delete shadow copy operation. - - - During a backup, shadow copies are automatically released as soon as the instance is - disposed. In this case, it is not necessary to explicitly delete shadow copies. - - - The deletion failed. This is the only exception actually thrown by this method. It - wraps one of the other exceptions listed in this section as its inner exception. - The caller does not have sufficient backup privileges or is not an administrator. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The specified shadow copy does not exist. - Expected provider error. The provider logged the error in the event log. - Unexpected provider error. The error code is logged in the error log. - The total number of snapshots that were deleted - - - - This method prevents a specific class of writers from receiving any events. - - An array containing one or more writer class identifiers. - The caller does not have sufficient backup privileges or is not an administrator. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - This method disables a specified writer instance or instances. - - An array containing one or more writer instance identifiers. - The caller does not have sufficient backup privileges or is not an administrator. - One of the parameters is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - Commits all shadow copies in this set simultaneously. - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object has not been initialized or the prerequisite calls for a given shadow copy context have not been made prior to calling DoSnapshotSet. - The system or provider has insufficient storage space. If possible delete any old or unnecessary persistent shadow copies and try again. - The system was unable to flush I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - The system was unable to hold I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - The provider was unable to perform the request at this time. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - The provider encountered an error that requires the user to restart the computer. - - - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - - - The system was unable to freeze the Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - - - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - - - The system was unable to freeze the Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - - - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - The provider returned an unexpected error code. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - Commits all shadow copies in this set simultaneously as an asynchronous operation. - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - An instance that represents this asynchronous operation. - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginDoSnapshotSet or - in a callback passed to BeginDoSnapshotSet. - - - - - Waits for a pending asynchronous operation to complete. - - - EndDoSnapshotSet can be called once on every from . - - The reference to the pending asynchronous request to finish. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object has not been initialized or the prerequisite calls for a given shadow copy context have not been made prior to calling DoSnapshotSet. - The system or provider has insufficient storage space. If possible delete any old or unnecessary persistent shadow copies and try again. - The system was unable to flush I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - The system was unable to hold I/O writes. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - The provider was unable to perform the request at this time. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - The provider encountered an error that requires the user to restart the computer. - - - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - - - The system was unable to freeze the Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - - - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - - - The system was unable to freeze the Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - - - Windows Server 2003 and Windows XP: This value is not supported until Windows Vista. - - - The provider returned an unexpected error code. This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - The EnableWriterClasses method enables the specified writers to receive all events. - - An array containing one or more writer class identifiers. - - - - Once this method is called, only enabled writer classes are subsequently called. - - - must be called prior to . To obtain information about the writers - currently running on the system, it may be necessary to call from another instance of the - class. - - - After is called, these calls have no effect. - - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The ExposeSnapshot method exposes a shadow copy either by mounting it as a device on a drive letter or mount point, or - as a file share. - - Shadow copy identifier. - - The path to the portion of the volume made available when exposing a shadow copy as a file share. The value of this parameter must be NULL when exposing a shadow copy locally; that is, by mounting to a drive letter or a mount point. - The path cannot contain environment variables (for example, %MyEnv%) or wildcard characters. - There is no requirement that the path end with a backslash ("\"). It is up to applications that retrieve this information to check. - - Attributes of the exposed shadow copy indicating whether it is exposed locally or remotely. The value must - be either the or the - value of . - When a shadow copy is exposed as a file share, the value of this parameter is the share name. If a shadow copy - is exposed by mounting it as a device, the parameter value is a drive letter followed by a colon, for example, "X:" or a mount point - path (for example, "X:\a\b"). If the value of this parameter is , then VSS determines the share name or drive - letter if the parameter is . - The exposed name of the shadow copy. This is either a share name, a drive letter followed by a colon, or a mount point. - - When exposing a persistent shadow copy, it remains exposed through subsequent boots. - When exposing a shadow copy of a volume, the shadow copy may be treated either as a mountable device or as a file system available for file sharing. - When it is exposed as a device, as with other mountable devices, the shadow copy of a volume is exposed at its mount point starting with its root. - When exposed as a file share, subsets (indicated by ) of the volume can be shared. - - One of the parameter values is not valid. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified shadow copy does not exist. - Expected provider error. The provider logged the error in the event log. - Unexpected provider error. The error code is logged in the error log. - - - - The FreeWriterMetadata method frees system resources allocated when was called. - - - - This method should never be called prior to the completion of . - The result of calling the method prior to completion of the metadata gather is undefined. - - - Once writer metadata has been freed, it cannot be recovered by the current instance of the class. - It will be necessary to create a new instance of , and call the - method again. - - - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The FreeWriterStatus method frees system resources allocated during the call to . - - The caller is out of memory or other system resources. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The method prompts each writer to send the metadata they have collected. The method will generate an Identify event to communicate with writers. - - should be called only once during the lifetime of a given object. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The writer infrastructure is not operating properly. Check that the Event Service and VSS have been started, and check for errors associated with those services in the error log. - - - - The method asynchronously prompts each writer to send the metadata they have collected. - The method will generate an Identify event to communicate with writers. - - - should be called only once during the lifetime of a given object. - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginGatherWriterMetadata or - in a callback passed to BeginGatherWriterMetadata. - - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - An instance that represents this asynchronous operation. - - - - Waits for a pending asynchronous operation to complete. - - - EndGatherWriterMetadata can be called once on every from . - - The reference to the pending asynchronous request to finish. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The writer infrastructure is not operating properly. Check that the Event Service and VSS have been started, and check for errors associated with those services in the error log. - - - - The method prompts each writer to send a status message. - - The caller of this method should also call after receiving the status of each writer. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The writer infrastructure is not operating properly. Check that the Event Service and VSS have been started, and check for errors associated with those services in the error log. - - - - The method asynchronously prompts each writer to send a status message. - - - The caller of this method should also call after receiving the status of each writer. - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginGatherWriterStatus or - in a callback passed to BeginGatherWriterStatus. - - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - An instance that represents this asynchronous operation. - - - - Waits for a pending asynchronous operation to complete. - - - EndGatherWriterStatus can be called once on every from . - - The reference to the pending asynchronous request to finish. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The writer infrastructure is not operating properly. Check that the Event Service and VSS have been started, and check for errors associated with those services in the error log. - - - - The method gets the properties of the specified shadow copy. - - The identifier of the shadow copy of a volume as returned by . - A instance containing the shadow copy properties. - The caller does not have sufficient backup privileges or is not an administrator. - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified shadow copy does not exist. - Expected provider error. The provider logged the error in the event log. - Unexpected provider error. The error code is logged in the error log. - - - - The ImportSnapshots method imports shadow copies transported from a different machine. - - This method is supported only on Windows Server operating systems. - - Only one shadow copy can be imported at a time. - The requester is responsible for serializing the import shadow copy operation. - For more information see the MSDN documentation on IIVssBackupComponents::ImportSnapshots Method - Requires Windows Server 2008, Windows Server 2003 SP1, Windows Server 2003, Enterprise Edition, or Windows Server 2003, Datacenter Edition. - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The method asynchronously imports shadow copies transported from a different machine. - - This method is supported only on Windows Server operating systems. - - Only one shadow copy can be imported at a time. - The requester is responsible for serializing the import shadow copy operation. - For more information see the MSDN documentation on IIVssBackupComponents::ImportSnapshots Method - Requires Windows Server 2008, Windows Server 2003 SP1, Windows Server 2003, Enterprise Edition, or Windows Server 2003, Datacenter Edition. - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginImportSnapshots or - in a callback passed to BeginImportSnapshots. - - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - An instance that represents this asynchronous operation. - - - - Waits for a pending asynchronous operation to complete. - - - EndImportSnapshots can be called once on every from . - - The reference to the pending asynchronous request to finish. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The method initializes the backup components metadata in preparation for backup. - - - - During imports of transported shadow copies, this parameter must be the original document generated when creating the saved - shadow copy and saved using . - - - This parameter may be - - - - The XML document supplied to this method initializes the object with metadata previously stored by - a call to . Users should not tamper with this metadata document. - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The XML document is not valid. Check the event log for details. - - - - The method initializes the IIVssBackupComponents interface in preparation for a restore operation. - - - XML string containing the Backup Components Document generated by a backup operation and saved by - . - - - The XML document supplied to this method initializes the object with metadata previously stored by a call to - . Users should not tamper with this metadata document. - - is - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The load operation of the specified XML document failed. - - - - The IsVolumeSupported method determines whether the specified provider supports shadow copies on the specified volume. - - - Provider identifier. If the value is , checks whether any provider - supports the volume. - - Name of the volume. The name of the volume to be checked must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form \\?\Volume{GUID}\ (where GUID is the unique global identifier of the volume) with a backslash (\) - - if shadow copies are supported on the specified volume. If the value is , shadow - copies are not supported on the specified volume. - - - will return if it is possible to create shadow copies on the given volume, - even if the current configuration does not allow the creation of shadow copies on that volume at the present time. - - - For example, if the maximum number of shadow copies has been reached on a given volume (and therefore no more shadow copies - can be created on that volume), the method will still indicate that the volume can be shadow copied. - - - is - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified volume was not found or was not available. - - - - The IsVolumeSupported method determines whether any provider supports shadow copies on the specified volume. - - Name of the volume. The name of the volume to be checked must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form \\?\Volume{GUID}\ (where GUID is the unique global identifier of the volume) with a backslash (\) - - if shadow copies are supported on the specified volume. If the value is , shadow - copies are not supported on the specified volume. - - - will return if it is possible to create shadow copies on the given volume, - even if the current configuration does not allow the creation of shadow copies on that volume at the present time. - - - For example, if the maximum number of shadow copies has been reached on a given volume (and therefore no more shadow copies - can be created on that volume), the method will still indicate that the volume can be shadow copied. - - - is - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified volume was not found or was not available. - - - - The method will cause VSS to generate a PostRestore event, signaling writers that the current - restore operation has finished. - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified volume was not found or was not available. - Expected provider error. The provider logged the error in the event log. - - - - The method will asynchronously cause VSS to generate a PostRestore event, signaling writers that the current - restore operation has finished. - - - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginPostRestore or - in a callback passed to BeginPostRestore. - - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - An instance that represents this asynchronous operation. - - - - Waits for a pending asynchronous operation to complete. - - - EndGatherWriterStatus can be called once on every from . - - The reference to the pending asynchronous request to finish. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified volume was not found or was not available. - Expected provider error. The provider logged the error in the event log. - - - - The method will cause VSS to generate a PrepareForBackup event, signaling writers to prepare for an upcoming - backup operation. This makes a requester's Backup Components Document available to writers. - - - - generates a PrepareForBackup event, which is handled by each instance of each writer - through the CVssWriter::OnPrepareBackup method. - - - Before PrepareForBackup can be called, must be called. - - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The method will asynchronously cause VSS to generate a PrepareForBackup event, signaling writers to prepare for an upcoming - backup operation. This makes a requester's Backup Components Document available to writers. - - - - generates a PrepareForBackup event, which is handled by each instance of each writer - through the CVssWriter::OnPrepareBackup method. - - - Before PrepareForBackup can be called, must be called. - - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginPrepareForBackup or - in a callback passed to BeginPrepareForBackup. - - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - An instance that represents this asynchronous operation. - - - - Waits for a pending asynchronous operation to complete. - - - EndGatherWriterStatus can be called once on every from . - - The reference to the pending asynchronous request to finish. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The method will cause VSS to generate a PreRestore event, signaling writers to prepare for a - coming restore operation. - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The method will asynchronously cause VSS to generate a PreRestore event, signaling writers to prepare for a - coming restore operation. - - - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginPreRestore or - in a callback passed to BeginPreRestore. - - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - An instance that represents this asynchronous operation. - - - - Waits for a pending asynchronous operation to complete. - - - EndGatherWriterStatus can be called once on every from . - - The reference to the pending asynchronous request to finish. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The method queries the completed shadow copies in the system that reside in the current context. - The method can be called only during backup operations. - - A list of objects representing the requested information. - - - Because returns only information on completed shadow copies, the only shadow copy state it can disclose - is . - - - The method may be called only during backup operations and must be preceded by calls to and - . - - - The method will return only information - about shadow copies with the current context (set by ). For instance, if the - context is set to , will not - return information on a shadow copy created with a context of . - - - One of the parameter values is not valid. - The caller is not an administrator or a backup operator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The queried object is not found. - Expected provider error. The provider logged the error in the event log. - Unexpected provider error. The error code is logged in the error log. - - - - The method queries providers on the system. - The method can be called only during backup operations. - - A list of objects representing the requested information. - - - The method may be called only during backup operations and must be preceded by calls to and - . - - - One of the parameter values is not valid. - The caller is not an administrator or a backup operator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The queried object is not found. - Expected provider error. The provider logged the error in the event log. - Unexpected provider error. The error code is logged in the error log. - - - - The method begins an asynchronous operation to determine the status of the revert operation. The - returned can be used to determine the outcome of the operation. - - An optional asynchronous callback, to be called when the operation is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - - An instance that represents this asynchronous operation. - - Name of the volume. The name of the volume to be checked must be in one of the following formats: - - The path of a volume mount point with a backslash (\) - A drive letter with backslash (\), for example, D:\ - A unique volume name of the form \\?\Volume{GUID}\ (where GUID is the unique global identifier of the volume) with a backslash (\) - - An instance that can be used to determine the status of the revert operation. - - The revert operation will continue even if the computer is rebooted, and cannot be canceled or undone, except by restoring a - backup created using another method. - Windows XP, Windows Server 2003 and Windows Vista: This method requires Windows Server 2008 or Windows Server 2003 SP1 - - - - - Waits for a pending asynchronous operation to complete. - - - EndQueryRevertStatus can be called once on every from . - - One of the parameter values is not valid. - The calling process has insufficient privileges. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified parameter is not a valid volume. - Revert is not supported on this volume. - The provider for the volume does not support revert operations. - This operation is not supported on the current operating system. - - - - The method reverts a volume to a previous shadow copy. Only shadow copies created with persistent - contexts (, , - or ) - are supported. - - The identifier of the shadow copy to revert - If this parameter is , the volume will be dismounted and reverted even if the volume is in use. - This operation cannot be canceled, or undone once completed. If the computer is rebooted during the revert operation, the revert process will continue when the system is restarted. - Windows XP, Windows Server 2003 and Windows Vista: This method requires Windows Server 2008 or Windows Server 2003 SP1 - - One of the parameter values is not valid. - The calling process has insufficient privileges. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The parameter is not a valid shadow copy. - The provider was not found. - The volume already has a revert in process. - Revert is only supported for persistent shadow copies. - The parameter was , and the volume could not be locked. - Revert is not supported on this volume. - The provider for the volume does not support revert operations. - This operation is not supported on the current operating system. - - - - The SaveAsXml method saves the Backup Components Document containing a requester's state information to a specified string. - This XML document, which contains the Backup Components Document, should always be securely saved as part of a backup operation. - - The Backup Components Document containing a requester's state information. - - For a typical backup operation, SaveAsXml should not be called until after both writers and the requester are finished modifying the Backup Components Document. - Writers can continue to modify the Backup Components Document until their successful return from handling the PostSnapshot event (CVssWriter::OnPostSnapshot), or equivalently upon the completion of . - Requesters will need to continue to modify the Backup Components Document as the backup progresses. In particular, a requester will store a component-by-component record of the success or failure of the backup through calls to the method. - Once the requester has finished modifying the Backup Components Document, the requester should use to save a copy of the document to the backup media. - A Backup Components Document can be saved at earlier points in the life cycle of a backup operation, for instance, to support the generation of transportable shadow copies to be handled on remote machines. - However, should never be called prior to , because the Backup Components Document will not have been filled by the requester and the writers. - - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - The SetAdditionalRestores method is used by a requester during incremental or differential restore operations to indicate - to writers that a given component will require additional restore operations to completely retrieve it. - - Writer identifier. - Type of the component. - - - The logical path of the component to be added. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - - - If the value of this parameter is , additional restores of the component will follow this restore. If the - value is , additional restores of the component will not follow this restore. - - - - - The information provided by the method is typically used by writers that support an explicit - recovery mechanism as part of their PostRestore event handler (CVssWriter::OnPostRestore)�for instance, the Exchange Server, and - database applications such as SQL Server. For these applications, it is often not possible to perform additional differential, - incremental, or log restores after such a recovery is performed. - - - Therefore, if for a component is set to , this means that such a writer - should not execute its explicit recovery mechanism and should expect that additional differential, incremental, or log restores - will be done. - - - When on a component is set to , then after the component is restored, - the application can complete its recovery operation and be brought back online. - - - This method must be called before . - - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - Sets a string of private, or writer-dependent, backup parameters for a component. - - Writer identifier. - Type of the component. - - - The logical path of the component to be added. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - - String containing the backup parameters to be set. - - - - The exact syntax and content of the backup options set by the wszBackupOptions parameter of the method - will depend on the specific writer being contacted. - - - This method must be called before . - - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - Defines an overall configuration for a backup operation. - - - - Indicates whether a backup or restore operation will be in component mode. - - - Operation in component mode supports selectively backing up designated individual components (which can allow their exclusion), - or only supports backing up all files and components on a volume. - - - The Boolean is if the operation will be conducted in component mode and if not. - - - - - Indicates whether a bootable system state backup is being performed. - - - - - A enumeration value indicating the type of backup to be performed. - - - - - If the value of this parameter is , partial file support is enabled. - The default value for this argument is . - - - - Applications must call prior to calling . - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The XML document is not valid. Check the event log for details. - - - - Indicates whether the backup of the specified component of a specific writer was successful. - - Globally unique identifier of the writer instance. - Globally unique identifier of the writer class. - Type of the component. - - - The logical path of the component to be added. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - The value of this parameter is if the component was successfully backed up, and if it was not. - - - When working in component mode (when is called with its select components argument set to ), - writers the state of each components backup using . - - - Therefore, a well-behaved backup application (requester) must call after each component has been - processed and prior to calling . - - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - Sets the context for subsequent shadow copy-related operations. - - - Sets the context for subsequent shadow copy-related operations. - - - The context to be set. The context must be one of the supported values of or a supported bit - mask (or bitwise OR) of with a valid . - - - - The default context for VSS shadow copies is . - - - Windows XP: The only supported context is the default context, . Therefore, calling - this method under Windows XP throws a . - - - This method be called only once, and it must be called prior to calling most VSS functions. - - - For details on how the context set by this method affects how a shadow copy is created and managed, see - Implementation Details for Creating Shadow Copies. - - - For a complete discussion of the permitted shadow copy contexts, see and . - - - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - Sets the context for subsequent shadow copy-related operations. - - - The context to be set. The context must be one of the supported values of or a supported bit - mask (or bitwise OR) of with a valid . - - - - The default context for VSS shadow copies is . - - - Windows XP: The only supported context is the default context, . Therefore, calling - this method under Windows XP throws a . - - - can be called only once, and it must be called prior to calling most VSS functions. - - - For details on how the context set by this method affects how a shadow copy is created and managed, see - Implementation Details for Creating Shadow Copies. - - - For a complete discussion of the permitted shadow copy contexts, see and . - - - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - Indicates whether some, all, or no files were successfully restored. - - Globally unique identifier of the writer class. - Type of the component. - - - The logical path of the component. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - - If all of the files were restored, the value of this parameter is . - If some of the files were restored, the value of this parameter is . If none of the files - were restored, the value of this parameter is . - - This method should be called between calls to and . - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - - Sets the backup stamp of an earlier backup operation, upon which a differential or - incremental backup operation will be based. - - - The method can be called only during a backup operation. - - - Writer identifier. - Type of the component. - - - The logical path of the component. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - The backup stamp to be set. - - This method should be called before . - Only requesters can call this method. - The backup stamp set by applies to all files in the component and any nonselectable Subcomponents it has. - Requesters merely store the backup stamps in the Backup Components Document. They cannot make direct use of the backup stamps, do not know their format, and do not know how to generate them. - Therefore, the value set with should either be retrieved from the stored Backup Components Document of an earlier backup operation (using for the correct component), or from information stored by the requester into its own internal records. - A writer will then obtain this value (using IVssComponent::GetPreviousBackupStamp) and using it will be able to mark the appropriate files for participation in an incremental or differential backup. - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - This method is used when a partial file operation requires a ranges file, and that file has been restored to a location other than its original one. - - Globally unique identifier (GUID) of the writer class containing the files involved in the partial file operation - Type of the component. - - - The logical path of the component containing the files that are participating in the partial file operation. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component containing the files that are participating in the partial file operation. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - - Index number of the partial file. The value of this parameter is an integer between 0 and n-1, - where n is the total number of partial files associated with a given component. The value of n is the number - of items in . - - - The fully qualified path of a ranges file. - - - Calling is not necessary if ranges files are restored in place. - Windows XP and Windows Vista: This method requires Windows Server 2008 or Windows Server 2003 - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - The operation is not supported by the current operating system. - - - - Sets a string of private, or writer-dependent, restore parameters for a writer component. - - Writer identifier. - Type of the component. - - - The logical path of the component. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - The private string of restore parameters. For more information see Setting VSS Restore Options. - - - This method must be called before . - - - The exact syntax and content of the restore options set by the parameter of the - method will depend on the specific writer being contacted. - - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - Defines an overall configuration for a restore operation. - - The type of restore to be performed. - - Typically, most restore operations will not need to override the default restore type . - If applications need to call , it should be called prior to calling . - Windows XP: This method requires Windows Vista, Windows Server 2008 or Windows Server 2003 - - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - Indicates whether the specified selectable component is selected for restoration. - - - Indicates whether the specified selectable component is selected for restoration. - - Writer identifier. - Type of the component. - - - The logical path of the component. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - - If the value of this parameter is , the selected component has been selected for - restoration. If the value is , the selected component has not been selected for restoration. - - - SetSelectedForRestore has meaning only for restores taking place in component mode. - can only be called for components that were explicitly added to the - backup document at backup time using . Restoring a component that was implicitly - selected for backup as part of a component set must be done by calling on the closest - ancestor component that was added to the document. If only this component's data is to be restored, - that should be accomplished through ; this can only be done if the component - is selectable for restore. - This method must be called before . - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - indicates whether the specified selectable component is selected for restoration. This method has two overloads. - - - - Creates a new, empty shadow copy set. - - Shadow copy set identifier. - This method must be called before during backup operations. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The creation of a shadow copy is in progress, and only one shadow copy creation operation can be in progress at one time. Either wait to try again or return with a failure error code. - - - - Indicates whether the specified selectable component is selected for restoration to a specified writer instance. - - Globally unique identifier (GUID) of the writer class. - Type of the component. - - - The logical path of the component. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - - If the value of this parameter is , the selected component has been selected for - restoration. If the value is , the selected component has not been selected for restoration. - - - GUID of the writer instance. - - - - SetSelectedForRestore, which moves a component to a different writer instance, can be called only for a - writer that supports running multiple writer instances with the same class ID and supports a requester moving a - component to a different writer instance at restore time. To determine whether a writer provides this support, call - the method. - - - SetSelectedForRestore has meaning only for restores taking place in component mode. - - - SetSelectedForRestore can be called only for components that were explicitly added to the backup document at backup - time using AddComponent. Restoring a component that was implicitly selected for backup as part of a component set must be - done by calling SetSelectedForRestore on the closest ancestor component that was added to the document. If only - this component's data is to be restored, that should be accomplished through the method; - this can be done only if the component is selectable for restore (see - Working with Selectability and Logical Paths). - - - This method must be called before the method. - - - The distinction between the and parameters is necessary because it is - possible that multiple instances of the same writer are running on the computer. - - - If the value of the parameter is , this is equivalent to calling the - . - - - The parameter is used to specify that the component is to be restored to a different writer - instance. If the value of the parameter is not , it must match the - instance ID of a writer instance with the same writer class ID specified in in the parameter. - - - A writer's class identifier, instance identifier, and instance name can be found - in the properties of . - - - Windows XP and Windows 2003: This method is not supported until Windows 2003 SP1. - - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The backup component does not exist. - The XML document is not valid. Check the event log for details. - - - - Breaks a shadow copy set according to requester-specified options. - - A shadow copy set identifier. - A bitmask of flags that specify how the shadow copy set is broken. - - - This method is similar to , except that is has an extra parameter to specify - how the shadow copy set is broken. - - - Like , this method can be used only for shadow copies that were created by - a hardware shadow copy provider. - - - After this method returns, the shadow copy volume is still a volume, but it is no longer a shadow copy. - For more information, see Breaking Shadow Copies. - - - - - - Begins an asynchronous operation to break a shadow copy set according to requester-specified options. - - A shadow copy set identifier. - A bitmask of flags that specify how the shadow copy set is broken. - - - This method is similar to , except that is has an extra parameter to specify - how the shadow copy set is broken. - - - Like , this method can be used only for shadow copies that were created by - a hardware shadow copy provider. - - - After this method returns, the shadow copy volume is still a volume, but it is no longer a shadow copy. - For more information, see Breaking Shadow Copies. - - - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - - An instance that represents this asynchronous operation. - - - - - Waits for an asynchronous operation to complete. - - - EndBreakSnapshotSet can be called once on every from . - - The reference to the pending asynchronous request to finish. - - - - Marks the restore of a component as authoritative for a replicated data store. - - The globally unique identifier (GUID) of the writer class. - Type of the component. - - - The logical path of the component to be added. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - to indicate that the restore of the component is authoritative; otherwise, . - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - This method was not called during a restore operation. - The specified component was not found. - - - - Windows XP and Windows 2003: This method requires Windows Vista or Windows Server 2008. - - - - - - - Assigns a new logical name to a component that is being restored. - - The globally unique identifier (GUID) of the writer class. - The type of the component. - - - A string containing the logical path of the component. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as the string that was used when - the component was added. - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a logical path. - - - - The name of the component. - - The string cannot be and should contain the same component name as was the component name - that was used when the component was added to the backup set using the method. - - - String containing the restore name to be set for the component. - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - This method was not called during a restore operation. - The specified component was not found. - - - - Windows XP and Windows 2003: This method requires Windows Vista or Windows Server 2008. - - - - - - - Sets the roll-forward operation type for a component and specifies the restore point for a partial roll-forward operation. - - The globally unique identifier (GUID) of the writer class. - Type of the component. - - - The logical path of the component. For more information, see - Logical Pathing of Components. - - - The value of the string containing the logical path used here should be the same as was used when the component was - added to the backup set using . - - - The logical path can be . - - - There are no restrictions on the characters that can appear in a non-null logical path. - - - - The name of the component. - - The value of the string should not be , and should contain the same component as was used when the - component was added to the backup set using . - - - A enumeration value indicating the type of roll-forward operation to be performed. - - A null-terminated wide character string specifying the roll-forward restore point. - The format of this string is defined by the writer, and can be a timestamp, a log sequence number (LSN), or any marker defined by the writer. - - One of the arguments that cannot be was - One of the parameter values is not valid. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - This method was not called during a restore operation. - The backup component does not exist. - - - - Windows XP and Windows 2003: This method requires Windows Vista or Windows Server 2008. - - - - - - - Unexposes a shadow copy either by deleting the file share or by removing the drive letter or mount point. - - The shadow copy identifier. The value of this identifier should be the same as the value that was used when the shadow copy was exposed. - One of the parameter values is not valid. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified shadow copy does not exist or is not exposed. - Expected provider error. The provider logged the error in the event log. - Unexpected provider error. The error code is logged in the error log. - - - - Windows XP and Windows 2003: This method requires Windows Vista or Windows Server 2008. - - - - - - - Specifies the volumes to be included in a LUN resynchronization operation. This method is supported only on Windows server operating systems. - - - The identifier of the shadow copy that was returned by the method during backup. - This parameter is required and cannot be Guid.Empty. - - - This parameter is optional and can be . - A value of means that the contents of the shadow copy volume are to be copied back to the original volume. - VSS identifies the original volume by the VDS_LUN_INFO information in the Backup Components Document. - - One of the parameter values is not valid. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - Either there is no hardware provider that supports the operation, or the requester did not successfully add any volumes to the recovery set. - This version of the hardware provider does not support this operation. - The parameter specifies a shadow copy that the hardware provider does not own. - Another LUN resynchronization operation is already in progress. - The parameter specifies a shadow copy that does not exist in the Backup Components Document. - LUN resynchronization is not supported on this volume, because it is a dynamic volume, - because the destination disk does not have a unique page 83 storage identifier, because the specified volume does not reside on a LUN managed - by a VSS hardware provider, or because the destination disk is a cluster quorum disk. - - - - Windows XP, Windows 2003, Windows Vista, Windows 2008, Windows 7: This method requires Windows Server 2008 R2. - - - - - - - Gets the requester's session identifier. - - - - The session identifier is an opaque value that uniquely identifies a backup or restore session. It is used to distinguish - the current session among multiple parallel backup or restore sessions. - - - As a best practice, writers and requesters should include the session ID in all diagnostics messages used for event logging and tracing. - - - - Windows XP, Windows 2003, Windows Vista, Windows 2008: This method requires Windows 7 or Windows Server 2008 R2. - - - - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The requester's session identifier. - - - - Initiates a LUN resynchronization operation. This method is supported only on Windows server operating systems. - - flags that specify how the resynchronization is to be performed. - One of the parameter values is not valid. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - The provider for the volume does not support LUN resynchronization. - Possible reasons for this return value include: - - There is no hardware provider that supports the operation. - The requester did not successfully add any volumes to the recovery set. - The method was called in WinPE or in Safe mode. - he caller did not call the method before calling this method. - - - This version of the hardware provider does not support this operation. - An unexpected provider error occurred. If this error code is returned, the error must be described in an entry in the application event log, giving the user information on how to resolve the problem. - The resynchronization destination contained a volume that was not explicitly included. - The MBR signature or GPT ID for one or more disks could not be set to the intended value. Check the Application event log for more information. - - - - Windows XP, Windows 2003, Windows Vista, Windows 2008, Windows 7: This method requires Windows Server 2008 R2. - - - - - - - Begins an asynchronous operation that initiates a LUN resynchronization operation. This method is supported only on Windows server operating systems. - - flags that specify how the resynchronization is to be performed. - An optional asynchronous callback, to be called when the read is complete. - A user-provided object that distinguishes this particular asynchronous read request from other requests. - - An instance that represents this asynchronous operation. - - - - Pass the value returned to the method to release operating system resources used for this asynchronous operation. - must be called once for every call to . You can do this either by using the same code that called BeginRecoverSet or - in a callback passed to BeginRecoverSet. - - - - Windows XP, Windows 2003, Windows Vista, Windows 2008, Windows 7: This method requires Windows Server 2008 R2. - - - - - - - Waits for a pending asynchronous operation to complete. - - - EndRecoverSet can be called once on every from . - - The reference to the pending asynchronous request to finish. - /// One of the parameter values is not valid. - The caller does not have sufficient backup privileges or is not an administrator. - Out of memory or other system resources. - The provider for the volume does not support LUN resynchronization. - Possible reasons for this return value include: - - There is no hardware provider that supports the operation. - The requester did not successfully add any volumes to the recovery set. - The method was called in WinPE or in Safe mode. - he caller did not call the method before calling this method. - - - This version of the hardware provider does not support this operation. - An unexpected provider error occurred. If this error code is returned, the error must be described in an entry in the application event log, giving the user information on how to resolve the problem. - The resynchronization destination contained a volume that was not explicitly included. - The MBR signature or GPT ID for one or more disks could not be set to the intended value. Check the Application event log for more information. - - - - Windows XP, Windows 2003, Windows Vista, Windows 2008, Windows 7: This method requires Windows Server 2008 R2. - - - - - - - A read-only list containing information about the components of each writer that has been stored in a requester's Backup Components Document. - - - - retrieves component information for a component stored in the Backup Components Document by earlier - calls to . - - - The information in the components stored in the Backup Components Document is not static. If a writer updates a component during a - restore, that change will be reflected in the component retrieved by . This is in contrast with - component information found in the object returned by . - That information is read-only and comes from the Writer Metadata Document of a writer process. - - - The instances that are returned should not be cached, because the following - methods cause the instances that are returned by to - be no longer valid: - - - - - - - - - - If you call one of these methods after you have retrieved a instance by calling - , you cannot reuse that instance, because it is no longer valid. Instead, you must call - again to retrieve a new instance. - - - - A read-only list containing information about the components of each writer that has been stored in a requester's Backup Components Document. - This list must not be accessed after the from which it - was obtained has been disposed. - - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - - - - A read-only list containing metadata for the writers running on the systsem. - - - A read-only list containing metadata for the writers running on the system. - This list must not be accessed after the from which it - was obtained has been disposed. - - - - A requester must call the asynchronous operation and wait for it - to complete prior to using . - - - Although must be called prior to either a restore or backup operation, - is not typically used for restores. - - - Component information retrieved (during backup operations) using , where the - instance has been returned by , comes from the Writer - Metadata Document of a live writer process. - - - This is in contrast to the information returned by (during restore operations), which was - stored in the Backup Components Document by calls to . - - - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The XML document is not valid. Check the event log for details. - The specified shadow copy does not exist. - - - - A read-only list containing the status of the writers. - - - A read-only list containing instances representing the returned status for each respective writer. - This list must not be accessed after the from which it - was obtained has been disposed. - - - - A requester must call the asynchronous operation and wait for it to - complete prior to using . - - - Out of memory or other system resources. - Unexpected VSS system error. The error code is logged in the event log. - The backup components object is not initialized, this method has been called during a restore operation, or this method has not been called within the correct sequence. - The specified shadow copy does not exist. - - - - Exception thrown to indicate that the provider returned an unexpected error code. This can be a transient problem. - - - It is recommended to wait ten minutes and try again, up to three times. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the requested identifier does not correspond to a registered provider. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the requested object was a duplicate. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the system or provider has insufficient storage space. - - - If possible delete any old or unnecessary persistent shadow copies and try again. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the requested deletion of snapshots did not complete successfully. - - - To get further information about the cause of the error, check the inner exception which is populated with the - original exception that caused the deletion to fail. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class with the specified error message. - - The error message. - - - - Initializes a new instance of the class with the specified error message and a reference - to the exception causing this exception to be thrown. - - The error message. - The inner exception. - - - - Initializes a new instance of the class, specifying the number of - successfully deleted snapshots, the id of the snapshot on which the delete operation failed and the exception - causing the delete operation to fail. - - The number of successfully deleted snapshots. - The id of the non deleted snapshot, or if such information is not available. - The inner exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Sets the with information about the exception. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is a null reference (Nothing in Visual Basic). - - - - - - - - Gets the number of successfully deleted snapshots. - - The number of successfully deleted snapshots. - - - - Gets the non id of the snapshot that failed to be deleted. - - The id of the snapshot that could not be deleted. - - - - The enumeration is used by requesters to identify an object as - a shadow copy set, shadow copy, or provider. - - - - - - The object type is not known. - - - This indicates an application error. - - - - - - - The interpretation of this value depends on whether it is used as an - input to a VSS method or returned as an output from a VSS method. - - - When used as an input to a VSS method, it indicates that the method is - not restricted to any particular object type, but should act on all - appropriate objects. In this sense, can be thought - of as a wildcard input. - - - When returned as an output, the object type is not known and means that - there has been an application error. - - - - - Shadow copy set. - - - Shadow copy. - - - Shadow copy provider. - - - - Exception indicating that the writer ran out of memory or other system resources. - The recommended way to handle this error code is to wait ten minutes and then repeat the operation, up to three times. - - - - - Exception indicating that the writer failed due to an error that would likely not occur if the entire backup, restore, or - shadow copy creation process was restarted. The recommended way to handle this error is to wait ten minutes and then - repeat the operation, up to three times. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - Exception indicating that the resynchronization destination contained a volume that was not explicitly included. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - The structure describes associations between volumes containing the original file data - and volumes containing the shadow copy storage area (also known as the diff area). - - - - - Initializes a new instance of the class. - - Name of the volume. - Name of the diff area volume. - The maximum diff space. - The allocated diff space. - The used diff space. - - - - Gets the original volume name. - - The original volume name. - - - - Gets the shadow copy storage area volume name. - - The shadow copy storage area volume name. - - - - Gets the maximum space used on the shadow copy storage area volume for this association. - - The maximum space used on the shadow copy storage area volume for this association. - - - - Gets the allocated space on the shadow copy storage area volume by this association. - This must be less than or equal to . - - The allocated space on the shadow copy storage area volume by this association. - - - - Gets the used space from the allocated area. This must be less than or equal to . - - The the used space from the allocated area. - - - - Exception indicating that the writer status is not available for one or more writers. - A writer may have reached the maximum number of available backup and restore sessions. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - Exception thrown to indicate that the maximum number of volumes has been added to the shadow copy set. - The specified volume was not added to the shadow copy set. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the operation is not supported under the current context. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception class indicating that an unexpected error occured. The error code is logged in the error log file. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class with the specified error message. - - The error message. - - - - Initializes a new instance of the class with the specified error message - and a reference to the inner exception that is the cause of this exception. - - The error message. - The inner exception. - - - - Initializes a new instance of the class with serialized data. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that another LUN resynchronization operation is already in progress. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is null or is zero (0). - - - - - Exception indicating that the the shadow copy contains only a subset of the volumes needed by the writer to correctly back up the application component. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - The VssRollForwardType enumeration is used by a requester to indicate the type of roll-forward operation it is about to perform. - - - A requester sets the roll-forward operation type and specifies the restore point for partial roll-forward operations - using . - - - - - - No roll-forward type is defined. - - - This indicates an error on the part of the requester. - - - - - - The roll-forward operation should not roll forward through logs. - - - - - The roll-forward operation should roll forward through all logs. - - - - - The roll-forward operation should roll forward through logs up to a specified restore point. - - - - - The class contains the properties of a shadow copy or shadow copy set. - - - - - Initializes a new instance of the class. - - The snapshot id. - The snapshot set id. - The snapshot count. - The snapshot device object. - Name of the original volume. - The originating machine. - The service machine. - Name of the exposed. - The exposed path. - The provider id. - The snapshot attributes. - The creation timestamp. - State of the snapshot. - - - A uniquely identifying the shadow copy identifier. - - - A uniquely identifying the shadow copy set containing the shadow copy. - - - - - Number of volumes included with the shadow copy in the shadow copy set when it was created. - Because it is possible for applications to release individual shadow copies without releasing the shadow copy - set, at any given time the number of shadow copies in the shadow copy set may be less than - - - The maximum number of shadow-copied volumes permitted in a shadow copy set is 64. - - - - - - - The name of the device object for the shadow copy of the volume. The device object can be thought of as - the root of a shadow copy of a volume. Requesters will use this device name when accessing files on a - shadow-copied volume that it needs to work with. - - - The device name does not contain a trailing "\". - - - - - The name of the volume that had been shadow copied. - - - The name of the machine containing the original volume. - - - The name of the machine running the Volume Shadow Copy Service that created the shadow copy. - - - The name of the shadow copy when it is exposed. This is a drive letter or mount point (if the shadow copy is exposed as a local volume), or a share name. - - - The portion of the shadow copy of a volume made available if it is exposed as a share. - - - A uniquely identifying the provider used to create this shadow copy. - - - - The attributes of the shadow copy expressed as a bit mask (or bitwise OR) of members of - the enumeration. - - - - Time stamp indicating when the shadow copy was created. The exact time is determined by the provider. - - - Current shadow copy creation status. See . - - - - Exception thrown to indicate that the volume already has a revert in progress. - - - - Windows XP and Windows 2003: This error is not supported until Windows Vista. - - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - The enumeration specifies how the host system uses the data managed by a writer involved in a VSS operation. - Requester applications that are interested in backing up system state should look for writers with the - or usage type. - - - The usage type is not known.This indicates an error on the part of the writer. - - - The data stored by the writer is part of the bootable system state. - - - The writer either stores data used by a system service or is a system service itself. - - - The data is user data. - - - Unclassified data. - - - This enumeration is used by a writer at backup time to specify through its Writer Metadata Document the default file restore - method to be used with all the files in all the components it manages. - - - - No restore method is defined. - This indicates an error on the part of the writer. - - - - - A requester will restore files of a selected component or component set only if there are no versions of those files currently on the disk. - - - Unless alternate location mappings are defined for file restoration, if a version of any file managed by a selected component or component set is currently on the disk, none of the files managed by the selected component or component set will be restored. - If a file's alternate location mapping is defined, and a version of the files is present on disk at the original location, files will be written to the alternate location as long as no version of the file exists at the alternate location. - - - - - A requester will restore files of a selected component or component set only if there are no versions of those files currently on the disk that cannot be overwritten. - - - Unless alternate location mappings are defined for file restoration, if there is a version of any file that cannot be overwritten of the selected component or component set on the disk, none of the files managed by the component or component set will be restored. - If a file's alternate location mapping is defined, files will be written to the alternate location. - - - - - This value is used by a writer to indicates that a given service must be stopped prior to the start of the restore. After the restore operation, the service will be restarted. - - - The service to be stopped is specified by an argument to IVssCreateWriterMetadata.SetRestoreMethod. - - - - - A requester must restore the files of a selected component or component set to the location specified by the alternate location mapping specified in the writer component metadata file. - - - - - A requester will restore the files of a selected component or component set following a reboot of the system. - - Files to be restored should be copied to a temporary location, and the requester should use File.Move with the DelayUntilReboot flag - to complete the restoration of these files to their proper location following reboot. (Using AlphaFS for file operations). - - - - - - If possible, a requester will restore the files of a selected component or component set to their correct location immediately. - - - If there are versions of any of the files managed by the selected component or component set on the disk that cannot be overwritten, then all the files managed by the selected component or component set will be restored following the reboot of the system. - In this case, files to be restored should be copied to a temporary location, and the requester should use File.Move with the DelayUntilReboot flag - to complete the restoration of these files to their proper location following reboot. (Using AlphaFS for file operations). - Windows XP: This value is not supported until Windows Server 2003 - - - - - This value indicates that a custom restore method will be used to restore the files managed by the selected component or component set. - - - - - The requester should perform the restore operation as follows: - - Send the PreRestore event and wait for all writers to process it. - Restore the files to their original locations. - Send the PostRestore event and wait for all writers to process it. - Stop the service. - Restart the service. - - The service to be stopped is specified by the writer beforehand when it calls the IVssCreateWriterMetadata::SetRestoreMethod method. - The requester can obtain the name of the service by examining the property. - - - - - Exception thrown to indicate that the volume does not support the requested operation, or that no provider supports it. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the system was unable to thaw the - Distributed Transaction Coordinator (DTC) or the Kernel Transaction Manager (KTM). - - - - Windows Server 2003 and Windows XP: This exception is not supported until Windows Vista. - - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the XML document is not valid. Check the event log for details. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception thrown to indicate that the system was unable to hold I/O writes. - - - This can be a transient problem. It is recommended to wait ten minutes and try again, up to three times. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception indicating that the writer operation failed because of a time-out between the Freeze and Thaw events. The recommended way to - handle this error code is to wait ten minutes and then repeat the operation, up to three times. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - The enumeration is returned by a provider to specify the state of a given shadow copy operation. - - - Reserved for system use.Unknown shadow copy state. - - - Reserved for system use.Shadow copy is being prepared. - - - Reserved for system use.Processing of the shadow copy preparation is in progress. - - - Reserved for system use.Shadow copy has been prepared. - - - Reserved for system use.Processing of the shadow copy precommit is in process. - - - Reserved for system use.Shadow copy is precommitted. - - - Reserved for system use.Processing of the shadow copy commit is in process. - - - Reserved for system use.Shadow copy is committed. - - - Reserved for system use.Processing of the shadow copy postcommit is in process. - - - Reserved for system use.Processing of the shadow copy file commit operation is underway. - - - Reserved for system use.Processing of the shadow copy file commit operation is done. - - - Reserved for system use.Processing of the shadow copy following the final commit and prior to shadow copy create is underway. - - - Shadow copy is created. - - - Reserved for system use.Shadow copy creation is aborted. - - - Reserved for system use.Shadow copy has been deleted. - - - Reserved value. - - - - Exception indicating that the maximum number of shadow copy storage areas has been added to - the shadow copy source volume. The specified shadow copy storage volume was not associated - with the specified shadow copy source volume. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Exception indicating that the requested method is not supported on the current operating system, or the loaded - assembly is targeted for a different operating system than the one on which it is running. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Enumeration used by to indicate the current - processor architecture for which the operating system is targeted and running. - - - - - The system is running a 32-bit version of Windows. - - - - - The system is running an Itanium processor. - - - - - The system is running a 64-bit version of Windows. - - - - - Unknown architecture. - - - - - Exception thrown to indicate that the volume is not supported by the specified provider. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - Representation of information on a partial file associated with a component. - - See MSDN documentation on IVssComponent::GetPartialFile Method for more information. - - - Initializes a new instance of the class - The path of the partial file. - The name of the partial file. - Either a listing of file offsets and lengths that make up the partial file support range - (the sections of the file that were backed up), or the name of a file containing such a list. - Any additional metadata required by a writer to validate a partial file restore operation. The information in this - metadata string will be opaque to requesters. May be - - - - - The path of the partial file. - - - Users of this public need to check to determine whether this path ends with a backslash ("\"). - - - - - The name of the partial file. - - - - Either a listing of file offsets and lengths that make up the partial file support range - (the sections of the file that were backed up), or the name of a file containing such a list. - - - - - - Any additional metadata required by a writer to validate a partial file restore operation. The information in this - metadata string will be opaque to requesters. - - - Additional metadata is not required, so may also be empty (zero length). - - - - - The enumeration is used by a writer to indicate the types of backup operations it can participate in. - The supported kinds of backup are expressed as a bit mask (or bitwise OR) of values. - - - - Windows XP: This enumeration is not available until Windows Server 2003 or later. - - - - Writer set their backup schemas with calls to IVssCreateWriterMetadata.SetBackupSchema". - - - Requesters use to determine the backup schema that a writer supports. - - - For a specific kind of backup operation to be supported, the writer must support the corresponding schema, and the - requester must set the corresponding backup type. - - - For example, to involve a writer in an incremental backup operation, the requester must set the backup type to - , and the writer should have a backup schema that includes . - - - A writer that does not support the backup schema corresponding to a requester's backup type should treat the backup operation - that is being performed as if it were a default (full) backup. If the desired backup type is not supported by the writer's - backup schema, the requester can either perform a full backup for this writer or exclude the writer from the backup operation. - A requester can exclude a writer by selecting none of the writer's components, or by disabling the writer - (see or - ). - - - - - - The writer supports a simple full backup and restoration of entire files (as defined by a value of ). - This backup scheme can be used as the basis of an incremental or differential backup. This is the default value. - - - - - The writer supports differential backups (corresponding to the value ). - Files created or changed since the last full backup are saved. Files are not marked as having been backed up. This setting does not preclude mixing of incremental and differential backups. - - - - - The writer supports incremental backups (corresponding to the value ). Files created or changed since the last full or incremental backup are saved. Files are marked as having been backed up. This setting does not preclude mixing of incremental and differential backups. - - - - - The writer supports both differential and incremental backup schemas, but only exclusively: for example, you cannot follow a differential backup with an incremental one. - A writer cannot support this schema if it does not support both incremental and differential schemas ( | ). - - - - - The writer supports backups that involve only the log files it manages (corresponding to a value of ). - - - - - Similar to the default backup schema (), the writer supports copy backup operations - (corresponding to ) where file access information (such as information as to when a file was - last backed up) will not be updated either in the writer's own state information or in the file system information. This type of - backup cannot be used as the basis of an incremental or differential backup. - - - - - - A writer supports using the VSS time-stamp mechanism when evaluating if a file should be included in - differential or incremental operations (corresponding to and - , respectively) using the , - setters, and the method. - - - A writer cannot support this schema if it does not support either differential or incremental backup schemas - ( or ). - - - - - - - - When implementing incremental or differential backups with differenced files, a writer can provide last modification - time information for files (using IVssComponent.AddDifferencedFileByLastModifyTime). - A requester then can use to obtain candidate files and information - about their last modification data. The requester can use this information (along with any records about - previous backup operations it maintains) to decide if a file should be included in incremental and differential backups. - - - This scheme does not apply to partial file implementations of incremental and differential backup operations. - - - A writer cannot support this schema if it does not support either incremental or differential backup - schemas ( or . - - - - - - Reserved for system use. - - - - - The writer supports a requester changing the target for file restoration using - . - - - - - - The writer supports running multiple writer instances with the same class ID, and it supports a - requester moving a component to a different writer instance at restore time using - . - - - Windows Server 2003: This value is not supported until Windows Server 2003 SP1. - - - - - - - The writer supports backing up data that is part of the system state, but that can also - be backed up independently of the system state. - - - Windows Server 2003: This value is not supported until Windows Vista. - - - - - - - The writer supports a requester setting a roll-forward restore point using . - - - Windows Server 2003: This value is not supported until Windows Vista. - - - - - - - The writer supports a requester setting a restore name using . - - - Windows Server 2003: This value is not supported until Windows Vista. - - - - - - - The writer supports a requester setting authoritative restore using . - - - Windows Server 2003: This value is not supported until Windows Vista. - - - - - - - The writer supports multiple unsynchronized restore events. - - - Windows Vista and Windows Server 2003: This value is not supported until Windows Server 2008. - - - - - - The class is returned to a calling application by a number of query methods. - It provides detailed information about a file or set of files (a file set). - - - The following methods return a instance: - - - - - - - - - - - - - - Initializes a new instance of the class. - - The alternate location. - The backup type mask. - The file specification. - The path. - if set to true this file description is recursive. - - - - Obtains the alternate backup location of the component files. - - - - - Obtains the file backup specification for a file or set of files. - - Windows XP: This value is not supported in Windows XP and will always return - - - - Obtains the file specification for the list of files provided. - - - - - Obtains the fully qualified directory path for the list of files provided. - - - - - Determines whether only files in the root directory or files in the entire directory hierarchy are considered for backup. - - VSS API reference: IVssWMFiledesc::GetRecursive() - - - - Represents a component-level error reported by writers. - - - - - Initializes a new instance of the class. - - The error code. - The application error code. - The application message. - - - - Gets the HRESULT failure code that the writer passed for the hr parameter of the IVssComponentEx2::SetFailure method. - - - - - Gets the additional error code if provided by the writer. - - - - - Gets an error message for the requester to display to the end user. The writer is responsible for localizing this string if necessary before using it in this method. This parameter is optional and can be or an empty string. - - - - The enumeration indicates the current state of the writer. - A requester determines the state of a writer through . - - - The writer's state is not known.This indicates an error on the part of the writer. - - - The writer has completed processing current shadow copy events and is ready to proceed, or CVssWriter::OnPrepareSnapshot has not yet been called. - - - The writer is waiting for the freeze state. - - - The writer is waiting for the thaw state. - - - The writer is waiting for the PostSnapshot state. - - - The writer is waiting for the requester to finish its backup operation. - - - The writer vetoed the shadow copy creation process at the writer identification state. - - - The writer vetoed the shadow copy creation process during the backup preparation state. - - - The writer vetoed the shadow copy creation process during the PrepareForSnapshot state. - - - The writer vetoed the shadow copy creation process during the freeze state. - - - The writer vetoed the shadow copy creation process during the thaw state. - - - The writer vetoed the shadow copy creation process during the PostSnapshot state. - - - The shadow copy has been created and the writer failed during the BackupComplete state. - A writer should save information about this failure to the error log. - - - The writer failed during the PreRestore state. - - - The writer failed during the PostRestore state. - - - The writer failed during the shutdown of the backup application. - - - - The enumeration indicates the type of backup to be performed using VSS writer/requester - coordination. - - - For more information see MSDN documentation on - VSS_BACKUP_TYPE Enumeration - - - - - - The backup type is not known. - - - This value indicates an application error. - - - - - - Full backup: all files, regardless of whether they have been marked as backed up or not, are saved. This is the default backup type and schema, and all writers support it. - Each file's backup history will be updated to reflect that it was backed up. - - - - - - Incremental backup: files created or changed since the last full or incremental backup are saved. Files are marked as having been backed up. - - - A requester can implement this sort of backup on a particular writer only if it supports the schema. - - - If a requester's backup type is and a particular writer's backup schema does not support that sort of backup, the requester will always perform a full () backup on that writer's data. - - - - - - - Differential backup: files created or changed since the last full backup are saved. Files are not marked as having been backed up. - - - A requester can implement this sort of backup on a particular writer only if it supports the schema. - - - If a requester's backup type is and a particular writer's backup schema does not support that sort of backup, the requester will always perform a full () backup on that writer's data. - - - - - - - The log file of a writer is to participate in backup or restore operations. - - - A requester can implement this sort of backup on a particular writer only if it supports the schema. - - - If a requester's backup type is and a particular writer's backup schema does not support that sort of backup, the requester will always perform a full () backup on that writer's data. - - - - - - - Files on disk will be copied to a backup medium regardless of the state of each file's backup history, and the backup history will not be updated. - - - A requester can implement this sort of backup on a particular writer only if it supports the schema. - - - If a requester's backup type is and a particular writer's backup schema does not support that sort of backup, the requester will always perform a full () backup on that writer's data. - - - - - Backup type that is not full, copy, log, incremental, or differential. - - - - The class specifies shadow copy provider properties. - - - - - Initializes a new instance of the class. - - The provider id. - Name of the provider. - Type of the provider. - The provider version. - The provider version id. - The class id. - - - Identifies the provider who supports shadow copies of this class. - - - The provider name. - - - The provider type. See for more information. - - - The provider version in readable format. - - - A uniquely identifying the version of a provider. - - - Class identifier of the component registered in the local machine's COM catalog. - - - - Contains information about a volume's shadow copy protection level. - - - - - Initializes a new instance of the class. - - The protection level. - if set to true the volume is offline for protection. - The protection fault. - The failure status. - if set to true the volume has unused diff area. - - - - Gets the target protection level for the volume. - - The target protection level for the volume. - - - - Gets a value indicating whether the volume is offline due to a protection fault. - - - true if the volume is offline due to a protection fault; otherwise, false. - - - - - Gets a value that describes the shadow copy protection fault that caused the volume to go offline. - - A value that describes the shadow copy protection fault that caused the volume to go offline. - - - - Gets the internal failure status code. - - The internal failure status code. - - - - Gets a value indicating whether the volume has unused shadow copy storage area files or not. - - - true if the volume has unused shadow copy storage area files; otherwise, false. - - - - - Information about a file set (a specified file or files) to participate in an incremental or differential backup - or restore as a differenced file, that is, backup and restores associated with it are to be implemented as if - entire files are copied to and from backup media (as opposed to using partial files). - - - - Initializes a new instance of the class. - The path to the differenced files. - The file specification of the differenced files. - The time of last modification for the difference files. - if the filespec for the differenced files should be interpreted recursively, otherwise. - - - - - The path to the differenced files. - - - Users of this method need to check to determine whether this path ends with a backslash (\). - - - - - The file specification of the differenced files. - - - - Boolean specifying whether the file specification for the differenced files should be interpreted recursively. - If , then the entire directory hierarchy will need to be searched for files matching the - file specification to find files to be handled as differenced files during incremental - or differential backups. If , only the root directory needs to be searched. - - - - - The writer specification of the time of last modification for the difference files. - - - - - Exception thrown to indicate an expected provider error. The provider logged the error in the event log. - - - - - Initializes a new instance of the - class with a system-supplied message describing the error. - - - - - Initializes a new instance of the class with a specified error message. - - The message that describes the error - - - - Initializes a new instance of the class with - a specified error message and a reference to the inner exception that is the cause of this exception. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - The parameter is . - The class name is or is zero (0). - - - - The enumeration is used by both the requester and the writer to specify the type of component being used - with a shadow copy backup operation. - - - - A writer sets a component's type when it adds the component to its Writer Metadata Document using - IVssCreateWriterMetadata.AddComponent - - - Writers and requesters can find the type information of components selected for inclusion in a Backup - Components Document through calls to to return a component type directly. - - - A requester can obtain the type of any component in a given writer's Writer Metadata Document by doing the following: - - Using to obtain a interface - Examining the Type member of the object - - - - - - Undefined component type. - This value indicates an application error. - - - - Database component. - - - File group component. This is any component other than a database. - - - - Exception thrown to indicate that the specified snapshot specifies a shadow copy that does not exist in the Backup Components Document. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message. - - - - Initializes a new instance of the class. - - The message. - The inner. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is null or is zero (0). - - - - - Exception indicating the writer is reporting one or more component-level errors. - To retrieve the errors, the requester must use the property. - - - - - Initializes a new instance of the class. - - - - - Initializes a new instance of the class. - - The message that describes the error - - - - Initializes a new instance of the class. - - The message that describes the error - The exception that is the cause of the current exception. - - - - Initializes a new instance of the class. - - The that holds the serialized object data about the exception being thrown. - The that contains contextual information about the source or destination. - - The parameter is . - - - The class name is or is zero (0). - - - - - Defines the set of shadow copy protection faults. - A shadow copy protection fault occurs when the VSS service is unable to perform a copy-on- - write operation to the shadow copy storage area (also called the diff area). - - - - - No shadow copy protection fault has occurred. - - - - - The volume that contains the shadow copy storage area could not be found. Usually this fault means that the volume has not yet arrived in the system. - - - - - The volume that contains the shadow copy storage area could not be brought online because an I/O failure occurred. - - - - - The shadow copy metadata for the shadow copy storage area has been corrupted. - - - - - A memory allocation failure occurred. This could be caused by a temporary low-memory condition that does not happen again after you clear the fault and restart the shadow copy operation. - - - - - A memory mapping failure occurred. This fault could mean that the page file is too small, or it could be caused by a low-memory condition. - - - - - A read failure occurred during the copy-on-write operation when data was being copied from the live volume to the shadow copy storage area volume. - - - - - A read or write failure occurred during the copy-on-write operation when data was being copied from the live volume to the shadow copy storage area volume. One possible reason is that the shadow copy storage area volume has been removed from the system. - - - - - This failure means that either the shadow copy storage area is full or the shadow copy storage area volume is full. - After clearing the protection fault, you can do one of the following: - - Delete unused shadow copy storage areas by calling the method. - Increase the shadow copy storage area maximum size for the volume by calling the method. - - - - - - The size of the shadow copy storage area could not be increased because there was no longer enough space on the shadow copy storage area volume. - - - - - The size of the shadow copy storage area could not be increased. - - - - - An unexpected error occurred. - - - - - Either the shadow copy storage area files could not be opened or the shadow copy storage area volume could not be mounted because of a file system operation failure. - - - - - A read or write failure occurred on the shadow copy storage area volume. - - - - - The shadow copy storage area volume was removed from the system or could not be accessed for some other reason. - - - - - Another application attempted to write to the shadow copy storage area. - - - - - Enumeration used to discriminate between the named windows versions. - - - The values of the enumeration are ordered so a later released operating system version - has a higher number, so comparisons between named versions are meaningful. - - - - - A windows version earlier than Windows 2000. - - - - - Windows 2000 (Server or Professional) - - - - - Windows XP - - - - - Windows Server 2003 - - - - - Windows Vista - - - - - Windows Server 2008 - - - - - Windows 7 - - - - - Windows Server 2008 R2 - - - - - A Windows version later than Windows Server 2008R2. - - - - - Represents information stored by a writer, at backup time, to the Backup Components Document to indicate that when a - file is to be restored, it (the source file) should be remapped. The file may be restored to a new restore target - and/or ranges of its data restored to different locations with the restore target. - - - - Initializes a new instance of the class. - The source path. - The source file name. - The source range list. - The destination path. - The destination file name. - The destination range list. - - - - The path to the directory that at backup time contained the file to be restored (the source file). This path should - match or be beneath the path of a file set already in the component or one of its Subcomponents - (if the component defines a component set). - - - - - The name of the file (at backup time) that is to be remapped during a restore (the source file). - The name of this file should not contain any wildcard characters, and must be a member of the same - file set as the source path (). - - - - - - A comma-separated list of file offsets and lengths indicating the source file - support range (the sections of the file to be restored). - - - The number and length of the source file support ranges must match the number and size of destination file support ranges. - - - - - - The path to which source file data will be remapped at restore time. - - - - - The name of the file to which source file data will be remapped at restore time. - - - - - - A comma-separated list of file offsets and lengths indicating the destination file support range (locations to which - the sections of the source file are to be restored). - - - The number and length of the destination file support ranges must match the number and size of source file support ranges. - - - - - - Static class providing access to information about the operating system under which the - assembly is executing. - - - - - Determines whether the current process is running under WOW64. - - - true if the current process is running under WOW64; otherwise, false. - - - - - Determines whether the operating system is of the specified version or later. - - The lowest version for which to return true. - - true if the operating system is of the specified or later; otherwise, false. - - - - - Determines whether operating system is of the specified version or later, allowing specification of - a minimum service pack that must be installed on the lowest version. - - The minimum required version. - The major version of the service pack that must be installed on the - minimum required version to return true. This can be 0 to indicate that no service pack is required. - - true if the operating system matches the specified with the specified service pack, or if the operating system is of a later version; otherwise, false. - - - - - Determines whether operating system is of the specified server version or later or if it is of the specified client - version or later and throws otherwise. - - The minimum server version. - The minimum server service pack version (applies only if the version exactly matches the specified server version). - The minimum client version. - The minimum client service pack version (applies only if the version exactly matches the specified client version). - - - - Determines whether the operating system is a server operating system of atleast the specified and - and throws an otherwise. - - The server version. - The server service pack version. - - - - Determines whether the assembly is executing on the specified operating system version or later. - If not, an exception is thrown. - - The minimum operating system version required. - The current operating system is of a version earlier than the specified - - - - Determines whether the assembly is executing on the specified operating system version with - the specified service pack installed or any later version of windows. If not, an exception is thrown. - - The minimum operating system version required. - The minimum service pack version required. - The current operating system is of a version earlier - than the specified or the versions match but the operating system does not - have at least the specified service pack version installed. - - - - Gets the named version of the operating system. - - The named version of the operating system. - - - - Gets a value indicating whether the operating system is a server os. - - - true if the current operating system is a server os; otherwise, false. - - - - - Gets the numeric version of the operating system. This is the same as returned by - . - - The numeric version of the operating system. - - - - Gets the version of the service pack currently installed on the operating system. - - The version of the service pack currently installed on the operating system. - Only the and fields are - used. - - - - Gets the processor architecture for which the operating system is targeted. - - The processor architecture for which the operating system is targeted. - If running under WOW64 this will return a 32-bit processor. Use to - determine if this is the case. - - - - diff --git a/thirdparty/alphavss/platform/AlphaVSS.51.x86.dll b/thirdparty/alphavss/platform/AlphaVSS.51.x86.dll deleted file mode 100755 index bb41a02d7..000000000 Binary files a/thirdparty/alphavss/platform/AlphaVSS.51.x86.dll and /dev/null differ diff --git a/thirdparty/alphavss/platform/AlphaVSS.52.x64.dll b/thirdparty/alphavss/platform/AlphaVSS.52.x64.dll deleted file mode 100755 index 00c4408ec..000000000 Binary files a/thirdparty/alphavss/platform/AlphaVSS.52.x64.dll and /dev/null differ diff --git a/thirdparty/alphavss/platform/AlphaVSS.52.x86.dll b/thirdparty/alphavss/platform/AlphaVSS.52.x86.dll deleted file mode 100755 index d4157be31..000000000 Binary files a/thirdparty/alphavss/platform/AlphaVSS.52.x86.dll and /dev/null differ diff --git a/thirdparty/alphavss/platform/AlphaVSS.60.x64.dll b/thirdparty/alphavss/platform/AlphaVSS.60.x64.dll deleted file mode 100755 index 50b0fcdd4..000000000 Binary files a/thirdparty/alphavss/platform/AlphaVSS.60.x64.dll and /dev/null differ diff --git a/thirdparty/alphavss/platform/AlphaVSS.60.x86.dll b/thirdparty/alphavss/platform/AlphaVSS.60.x86.dll deleted file mode 100755 index 08794366d..000000000 Binary files a/thirdparty/alphavss/platform/AlphaVSS.60.x86.dll and /dev/null differ -- cgit v1.2.3 From d45f07f10fb7ec826f16a199d46457bcf2cab20d Mon Sep 17 00:00:00 2001 From: Kenneth Skovhede Date: Mon, 27 Jun 2016 15:37:52 +0200 Subject: Updated some package versions and removed duplicate files --- thirdparty/AWS SDK/AWSSDK.Core.dll | Bin 572928 -> 0 bytes thirdparty/AWS SDK/AWSSDK.IdentityManagement.dll | Bin 300032 -> 0 bytes thirdparty/AWS SDK/AWSSDK.S3.dll | Bin 393728 -> 0 bytes thirdparty/CoCoL/CoCoL.dll | Bin 81920 -> 0 bytes thirdparty/SharpAESCrypt/SharpAESCrypt.exe | Bin 39936 -> 0 bytes 5 files changed, 0 insertions(+), 0 deletions(-) delete mode 100755 thirdparty/AWS SDK/AWSSDK.Core.dll delete mode 100755 thirdparty/AWS SDK/AWSSDK.IdentityManagement.dll delete mode 100755 thirdparty/AWS SDK/AWSSDK.S3.dll delete mode 100755 thirdparty/CoCoL/CoCoL.dll delete mode 100755 thirdparty/SharpAESCrypt/SharpAESCrypt.exe (limited to 'thirdparty') diff --git a/thirdparty/AWS SDK/AWSSDK.Core.dll b/thirdparty/AWS SDK/AWSSDK.Core.dll deleted file mode 100755 index d09e70257..000000000 Binary files a/thirdparty/AWS SDK/AWSSDK.Core.dll and /dev/null differ diff --git a/thirdparty/AWS SDK/AWSSDK.IdentityManagement.dll b/thirdparty/AWS SDK/AWSSDK.IdentityManagement.dll deleted file mode 100755 index 16d212172..000000000 Binary files a/thirdparty/AWS SDK/AWSSDK.IdentityManagement.dll and /dev/null differ diff --git a/thirdparty/AWS SDK/AWSSDK.S3.dll b/thirdparty/AWS SDK/AWSSDK.S3.dll deleted file mode 100755 index 16e65fd32..000000000 Binary files a/thirdparty/AWS SDK/AWSSDK.S3.dll and /dev/null differ diff --git a/thirdparty/CoCoL/CoCoL.dll b/thirdparty/CoCoL/CoCoL.dll deleted file mode 100755 index 2d2c9e196..000000000 Binary files a/thirdparty/CoCoL/CoCoL.dll and /dev/null differ diff --git a/thirdparty/SharpAESCrypt/SharpAESCrypt.exe b/thirdparty/SharpAESCrypt/SharpAESCrypt.exe deleted file mode 100755 index ca164b53a..000000000 Binary files a/thirdparty/SharpAESCrypt/SharpAESCrypt.exe and /dev/null differ -- cgit v1.2.3 From 8c7811ae89c77073bd975863f0e724d686696a68 Mon Sep 17 00:00:00 2001 From: Kenneth Skovhede Date: Tue, 28 Jun 2016 10:03:53 +0200 Subject: Updated SSH library to latest version, marked beta but should be stable. --- thirdparty/SSH.NET/Renci.SshNet.dll | Bin 439808 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 thirdparty/SSH.NET/Renci.SshNet.dll (limited to 'thirdparty') diff --git a/thirdparty/SSH.NET/Renci.SshNet.dll b/thirdparty/SSH.NET/Renci.SshNet.dll deleted file mode 100644 index 66e3d1a34..000000000 Binary files a/thirdparty/SSH.NET/Renci.SshNet.dll and /dev/null differ -- cgit v1.2.3