Technical Support
............................................................................................... 4
Chapter 1
Using Symantec Ghost as a stand-alone
program
........................................................................... 13
About Ghost.exe .......................................................................... 13
Using Ghost.exe on a stand-alone computer ...................................... 14
Starting Ghost.exe ........................................................................ 15
Using Ghost.exe with a mapped network drive ................................... 15
Establishing a peer-to-peer connection with Ghost.exe ........................ 16
About splitting images in a peer-to-peer operation ....................... 19
Creating a backup image file .......................................................... 19
Backing up a hard disk to an image file ....................................... 19
Backing up a partition to an image file ....................................... 21
Restoring from an image file .......................................................... 23
Restoring a hard disk from an image file .................................... 23
Restoring a partition from an image file ..................................... 25
Cloning disks and partitions ........................................................... 26
Cloning disk to disk ................................................................ 27
Cloning partition to partition ................................................... 28
Verifying integrity ....................................................................... 30
Adding switches to your Ghost.exe operation .................................... 30
Running Ghost32.exe in Windows ................................................... 31
Compatibility with Ghost.exe ................................................... 32
Chapter 2
Symantec Ghost support for image files and
disks
................................................................................. 33
About Symantec Ghost image files .................................................. 33
Image files and compression .......................................................... 34
Performance on a network ....................................................... 34
Image files and CRC32 .................................................................. 35
Image files and volume spanning .................................................... 36
Limitations on the image file size .............................................. 36
Size-limited image files ........................................................... 36
Spanned image files ................................................................ 36
Spanning across multiple volumes and limiting span sizes ............ 37
Contents
Summary of Contents for GHOST IMAGING FOUNDATION 7.1
Page 1: ...Symantec Ghost Imaging Foundation 7 1...
Page 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...
Page 78: ...Managing partitions using GDisk Support for large hard disks 78...
Page 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...
Page 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...
Page 122: ...GhostCasting from the command line GhostCast Server command line options 122...
Page 130: ...GDisk disk wipe specifications Determining disk size 130...
Page 166: ...Ghost for Linux Symantec Ghost utility support 166...
Page 170: ...Configuring firewalls Symantec Ghost port configuration 170...
Page 180: ...Troubleshooting Problems running Symantec Ghost 180...