Table 5-2
Switches common to all GDisk commands
Explanation
Switch
Mounts the specified vmdk, pqi, v2i, or iv2i image file ("add" the image
as a disk). Once added, the disk can be used in all normal operations.
/ad=image file
name
/addDisk=image
file name
Prevents GDisk from using extended disk access support. This may
result in GDisk not being aware of the full capacity of the disk.
/x
Prevents GDisk from using direct IDE disk access support. This may
result in GDisk not being aware of the full capacity of the disk.
/i
Prevents GDisk from using direct SCSI disk access support. This may
result in GDisk not being aware of the full capacity of the disk.
/s
Suppresses prompting to confirm the operation. If you do not use this
switch, you are not necessarily prompted before a partition is deleted
or another possibly destructive operation is executed.
/y
Suppresses prompting to confirm the operation and has the same
functionality as /y.
/sure
Causes GDisk to restart the computer if the operation is successful.
/r
Turns off Ultra Direct Memory Access (UDMA).
This switch works in DOS only.
/u
59
Managing partitions using GDisk
Overview of the main command-line switches
Summary of Contents for GHOST IMAGING FOUNDATION 7.1
Page 1: ...Symantec Ghost Imaging Foundation 7 1...
Page 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...
Page 78: ...Managing partitions using GDisk Support for large hard disks 78...
Page 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...
Page 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...
Page 122: ...GhostCasting from the command line GhostCast Server command line options 122...
Page 130: ...GDisk disk wipe specifications Determining disk size 130...
Page 166: ...Ghost for Linux Symantec Ghost utility support 166...
Page 170: ...Configuring firewalls Symantec Ghost port configuration 170...
Page 180: ...Troubleshooting Problems running Symantec Ghost 180...