C
H
A
P
T
E
R
21
3
Using Norton Ghost
This chapter describes how to perform operations. The procedures assume
that all hardware is configured properly and communication methods are
established. See
“Setting up transfer methods”
on page 17 for more
information.
Information on the following tasks is provided:
■
Starting Norton Ghost
■
Navigating in Norton Ghost without a mouse
■
Cloning disks
■
Cloning partitions
■
Managing image files
What you need to do
The following section gives a quick overview of the ways you can use
Norton Ghost to perform everyday tasks.
1
Identify what you want Norton Ghost to do and how many
machines are involved.
■
Disk duplication
■
Disk image file creation
■
Disk creation from image file
■
Partition duplication
■
Partition image file creation
■
Partition creation from image file
2
Select the hardware setup method you will use to perform the
operation.
Internal disk drives and:
Summary of Contents for NORTON GHOST
Page 1: ...Norton Ghost Personal Edition User s Guide ...
Page 12: ...Chapter 1 About Norton Ghost Personal Edition 12 ...
Page 20: ...Chapter 2 Setting up Norton Ghost 20 ...
Page 46: ...Chapter 3 Using Norton Ghost 46 ...
Page 76: ...Disk Replacement Form 76 ...
Page 80: ...Index 80 ...