1, what is the Shadow System (official):
Shadow systems are primarily used to protect your system, building virtual images of existing operating systems (that is, shadow mode), which is exactly the same as a real system where users can choose to enable or exit this virtual image at any time. After the user enters Shadow mode, all operations are virtual and do not have an impact on the real system, and all changes will disappear after exiting shadow mode. So all viruses, Trojans, rogue software can not infringe the real operating system, all of their operations are just illusion.
After you start shadow mode, still use exactly the same as the original system, but before the next boot if you are infected with a virus, Trojan, damaged your system, you do not have to worry, all the operation is directed at your original system shadow. All of your operations, including the installation program in the next use of the original system, is also invalid, which is very useful to do the program installation test, will not be due to the loading and unloading of garbage files! The shadow system is different from the restoration software and does not need to do any mirror image. Powershadow is also not a virtual system, it is the "shadow system" of your original operating system.
The above is the official description of the shadow system, I personally used the test, it is true that the shadow system can be launched at any time, after the launch, the shadow system into the current settings, you can continue to operate seamlessly. The only difference is that after entering the shadow system, all operations will be restored at the next reboot. Include deleting files, installing software, even running viruses and installing Trojans.
2, the characteristics of the Shadow System (official):
Fan unknown new virus
In the past, after the new virus out, first of all by anti-virus software companies to find countermeasures, users to upgrade anti-virus software, during this period there will always be a group of people to become victims of new viruses. Now we do not have to fear this threat, in shadow mode, any virus, variant virus, Trojan, rogue software can be multiplied.
Allow you to confidently run the online download program
We often download the installation software from the Internet, although using anti-virus software scan the virus, but the system is still often destroyed or even crash, the shadow system can solve such problems, so that you worry-free trial of any software.
Protect your privacy and use your computer without leaving any traces
The shadow system protects your personal privacy to the fullest extent possible. Using a computer in shadow mode, restarting the system, or exiting Shadow mode will leave no traces. Shadow mode you can also safely open the suspicious attachment in the message.
System Maintenance-Free expert
Shadow systems provide the strongest protection for your operating system. Computer use for a period of time will inevitably appear a variety of problems, or even crash, with the shadow system so that your computer is often new, no longer spend a lot of time to maintain or reinstall the operating system.
This type of application has been encountered by both individuals and business users. For example, you need to install a new software. We cannot foresee the consequences of the installation. Especially some of the Chinese package. D version software. Or a newly developed software. After each installation, if there is a problem to unload clean. You can only ghost or reload the system. Or you might be forced to install an ax control in order to see a streaming media when browsing a Web site like this. And there's no way to know if there's a security risk to your system. We can use shadow software to get into shadow mode at this time. The last reboot is restored to its original state.