
Copying files and directories
The syntax for the copy command is as follows:
copy <source> <destination>
Both the source and destination arguments must be specified as absolute paths.
For example, as follows:
copy a:\temp\test.txt 2:1\user\data.txt
Copy a file from a volume that is
accessible to the current operating
system to a folder test on a volume
that is inaccessible to it.
copy 2:1\user\data.txt a:\temp\test.txt
Copy a file from a volume that is
inaccessible to the current
operating system to a volume that
is accessible to it.
In both examples, the absolute path to the files must be valid.
If the source argument points to a directory, the copy operation copies all of the
files and subdirectories from the source location to the destination location. In
this case, the destination argument must point to a valid directory. The last portion
of the destination path is created if required.
If the first argument points to a file and the second argument points to a directory,
the file is created with the same name as the source file in the destination directory.
Renaming files and folders
The syntax for the rename command is as follows:
rename <source> <destination>
Both the source and destination arguments must be specified. The source argument
must be specified as an absolute path, and the destination argument must contain
the new name only. To move the file or folder to a new location use the copy
command.
For example:
rename 2:1\user\data.txt "my data.txt"
This renames 2:1\user\data.txt to 2:1\user\ my data.txt.
The following operation is illegal because the destination argument contains a
location:
rename 2:1\user\data.txt 2:1\temp\"my data.txt"
85
Manipulating files and directories using OmniFS
OmniFS operations
Summary of Contents for GHOST IMAGING FOUNDATION 7.1
Page 1: ...Symantec Ghost Imaging Foundation 7 1...
Page 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...
Page 78: ...Managing partitions using GDisk Support for large hard disks 78...
Page 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...
Page 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...
Page 122: ...GhostCasting from the command line GhostCast Server command line options 122...
Page 130: ...GDisk disk wipe specifications Determining disk size 130...
Page 166: ...Ghost for Linux Symantec Ghost utility support 166...
Page 170: ...Configuring firewalls Symantec Ghost port configuration 170...
Page 180: ...Troubleshooting Problems running Symantec Ghost 180...