Symantec NORTON GHOST PERSONAL EDITION User Manual

Hide thumbs Also See for NORTON GHOST PERSONAL EDITION:
Table of Contents

Advertisement

Norton Ghost
Personal Edition
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for Symantec NORTON GHOST PERSONAL EDITION

  • Page 1 ™ Norton Ghost Personal Edition User’s Guide...
  • Page 2 Corporation. NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors.
  • Page 3 The software which accompanies this license (the "Software") is the property of Symantec or its licensors and is protected by copyright law. While Symantec continues to own the Software, you will have certain rights to use the Software after your acceptance of this license. Except as may be modified by a license...
  • Page 4 (60) days from the date of delivery of the Software to you. Your sole remedy in the event of a breach of this warranty will be that Symantec will, at its option, replace any defective media returned to Symantec within the warranty period or refund the money you paid for the Software.
  • Page 5: Table Of Contents

    Setting up Norton Ghost Minimum system requirements ............13 Hardware requirements for Norton Ghost transfer modes ..14 Installing Norton Ghost Personal Edition ........14 Installing Norton Ghost in Windows ........14 Installing Norton Ghost in DOS ..........15 Uninstalling Norton Ghost ............. 16 Uninstalling Norton Ghost in Windows ........
  • Page 6 Appendix D Diagnostics Hard drive detection and diagnostic information ......69 Norton Ghost abort error file (ghost.err) ......... 69 Hard disk geometry diagnostics ..........70 Full diagnostic statistics dump summary ........70 Symantec Service and Support Solutions Disk Replacement Form Index...
  • Page 7: Chapter 1 About Norton Ghost Personal Edition

    PC to a new PC. Caution: Norton Ghost Personal Edition is a powerful utility program that performs complex operations on your computer. It is recommended for experienced and highly skilled PC users only.
  • Page 8: How Norton Ghost Works

    Chapter 1: About Norton Ghost Personal Edition partitions, Norton Ghost positions each partition or logical drive on the target disk using the same rules as FDISK, copying the partitions on a file- by-file basis. An image file can be stored on a CD, Superdisk, JAZ or ZIP drive, or other removable media.
  • Page 9: Save And Load Image Files To And From Removable Media

    How Norton Ghost works Norton Ghost usage, both the source and destination must be free from file corruption and physical hard disk drive problems prior to cloning. Note: When cloning an entire hard disk drive, the existing partition configuration is overwritten and need not be set in advance. Internal transfer operations are one of the fastest methods of cloning, and offer a simple quick hard disk drive backup or migration tool.
  • Page 10: Clone Hard Disk Drives And Partitions Peer-To-Peer

    Chapter 1: About Norton Ghost Personal Edition For restoration purposes, once the device is working and has a drive letter, Norton Ghost can use that drive to perform the required task. Clone hard disk drives and partitions peer-to-peer Peer-to-peer connections are typically used when there are two computers that you wish to connect.
  • Page 11 How Norton Ghost works These components can be loaded from a boot disk to allow Norton Ghost to use NetBIOS to communicate and clone between master and slave. Master Crossover Ethernet Cable Slave Using the parallel (LPT) port With two computers and a parallel data transfer cable (not provided with Norton Ghost) you can clone two computers, master to slave.
  • Page 12 Chapter 1: About Norton Ghost Personal Edition...
  • Page 13: Chapter 2 Setting Up Norton Ghost

    Setting up Norton Ghost Minimum system requirements The system requirements to run Norton Ghost are: 386SX processor (486 or above recommended) 4 MB RAM (8 MB RAM for NTFS), 16 MB recommended DOS 5.0 or above VGA monitor...
  • Page 14: Hardware Requirements For Norton Ghost Transfer Modes

    Windows or DOS. Installing Norton Ghost in Windows To install Norton Ghost in Windows: Insert the Norton Ghost Personal Edition CD in your CD-ROM drive. After a moment, the Norton Ghost setup program starts automatically.
  • Page 15: Installing Norton Ghost In Dos

    Replacement form in this guide for information about getting floppy disks. Follow the instructions that appear on the screen. The setup program places a Norton Ghost Personal Edition program group in your Start menu and installs the files necessary to run Norton Ghost Personal Edition.
  • Page 16: Uninstalling Norton Ghost

    Chapter 2: Setting up Norton Ghost Uninstalling Norton Ghost Uninstalling Norton Ghost in Windows To uninstall Norton Ghost in Windows: Click the Start button, then select Settings > Control Panel. Double-click Add/Remove programs. In the list of installed programs, select Norton Ghost Personal Edition.
  • Page 17: Setting Up Transfer Methods

    Setting up transfer methods Use the following DOS command to copy the system files to the formatted disk: C:\> sys c: a: Use the following DOS command to format and copy the system files to the unformatted disk: C:\> format a: /s Copy GHOSTPE.EXE onto the boot disk.
  • Page 18: Peer-To-Peer Connections

    All operator input will be on the master computer. Use the previous table to choose which machine will be the master and which will be slave. Peer-to-peer NetBIOS network connections NetBIOS is only available for peer-to-peer connections. Sample third-party files are available on the Symantec FTP site at: ftp://ftp.symantec.com/public/english_us_canada/products/ ghost/...
  • Page 19 Setting up transfer methods Sourcing NetBIOS The following steps explain the NetBIOS setup procedure. Install network interface cards. Once the network interface cards are installed, the two peer machines need to be connected using cabling. The type and setup of the connection will depend on your individual network requirements.
  • Page 20 Chapter 2: Setting up Norton Ghost...
  • Page 21: Chapter 3 Using Norton Ghost

    Using Norton Ghost This chapter describes how to perform operations. The procedures assume that all hardware is configured properly and communication methods are established. See “Setting up transfer methods” on page 17 for more information. Information on the following tasks is provided: Starting Norton Ghost Navigating in Norton Ghost without a mouse Cloning disks...
  • Page 22 Chapter 3: Using Norton Ghost No other devices. Other peripheral devices not needing additional setup (for example, Jaz or Zip drive). SCSI tape drive requiring DOS ASPI driver setup. Third-party device requiring DOS driver setup. Peer-to-peer connection using LPT printer port. Peer-to-peer connection using NetBIOS and network interface cards connection.
  • Page 23: Starting Norton Ghost

    Starting Norton Ghost Select source hard disk drive, partitions, or image file. Select destination hard disk drive, partition, or image file. Warning: Choose carefully. Make sure you select the correct destination to overwrite. In most cases, you will not be able to recover from an incorrectly selected destination drive.
  • Page 24: Navigating Without A Mouse

    Chapter 3: Using Norton Ghost Ghost to access and use some hardware. See “Setting up transfer methods” on page 17 for more information. Navigating without a mouse Depending upon how Norton Ghost is started, mouse support may not be available. To use Norton Ghost without a mouse: Use arrow keys to navigate the menu.
  • Page 25: Cloning From Disk To Disk

    Cloning disks LPT > Master NetBIOS > Master Cloning from disk to disk To clone disk to disk: From the main menu, select Disk > To Disk. The Source Drive dialog box displays. Select the source drive. The Source Drive dialog box displays the details of every disk Norton Ghost can find on the local machine.
  • Page 26 Chapter 3: Using Norton Ghost Confirm or change the destination drive partition layout. The Destination Drive Details dialog box displays a suggested partition layout for the destination drive. By default Norton Ghost allocates any extra space that the new disk has to the first FAT or NTFS partition that it discovers.
  • Page 27: Cloning A Disk To Image File

    Cloning disks Select Yes to proceed with the disk cloning. The system performs a quick integrity check of the file structure on the source disk and then copies the source disk to the destination. If you need to abort the process use Ctrl-C, but be aware that this leaves the destination disk in an unknown state.
  • Page 28 Chapter 3: Using Norton Ghost Specify the drive or device, and specify the full pathname. The image file may reside on a local drive (but not the one that is being copied from). When using peer-to-peer connections, the image file will be created on the slave machine. On pressing Enter, the compress image question displays.
  • Page 29: Cloning A Disk From An Image File

    Cloning disks Norton Ghost displays the final “Proceed with disk dump?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the image file creation. The system performs a quick integrity check of the file structure on the source disk and then copies the source disk to the destination image file.
  • Page 30 Chapter 3: Using Norton Ghost Specify the drive or device and select the full pathname. Note that the image file may reside on a local drive (but not the one that is being copied to). When using peer-to-peer connections, the file will be located on the slave machine.
  • Page 31 Cloning disks held in the source partition. On selecting OK, Norton Ghost displays the final “Proceed with disk load?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the disk cloning.
  • Page 32: Cloning Partitions

    Chapter 3: Using Norton Ghost Cloning partitions Partition cloning procedures are accessed from the main menu. To specify a transfer method, select one of the following: Local LPT > Master NetBIOS > Master The source and destination partitions must be correctly configured before cloning partitions.
  • Page 33 Cloning partitions Select the source partition. The Source Partition dialog box displays the details of all the partitions on the selected source drive. On selection of the source partition, the Destination Drive dialog box displays. Select the destination drive. The Destination Drive dialog box displays the details of every disk Norton Ghost can find on the destination machine.
  • Page 34: Cloning From Partition To Image File

    Chapter 3: Using Norton Ghost Warning: Choose carefully as this is the partition that is going to be overwritten. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the partition copy. If you need to abort the process use Ctrl-C, but be aware that this leaves the destination drive in an unknown state.
  • Page 35 Cloning partitions The Source Drive dialog box displays the details of every disk Norton Ghost can find on the local machine. On selection of the source drive, the Source Partition dialog box displays. Select the source partitions to be included in the destination image file.
  • Page 36: Cloning A Partition From An Image File

    Chapter 3: Using Norton Ghost Norton Ghost displays the final “Proceed with partition dump?” question. This is the last chance to back out. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the image file creation.
  • Page 37 Cloning partitions Select the source partition from the image file. The Source Partition dialog box displays the details of all the partitions in the image file. On selection of the source partition, the Destination Drive dialog box displays. Select the destination drive. The Destination Drive dialog box displays the details of every disk Norton Ghost can find on the local machine.
  • Page 38 Chapter 3: Using Norton Ghost Warning: Choose carefully as this is the partition that is going to be overwritten. Check the details displayed and ensure the correct options have been selected. Do one of the following: Select Yes to proceed with the partition cloning. Norton Ghost overwrites the destination partition using the partition details contained in the image file.
  • Page 39: Managing Image Files

    Managing image files Managing image files Norton Ghost can create an image file that contains all the information required to recreate a complete disk or partition. Image files are a useful way to store and reliably compress images of model system configurations, or to create backup copies of complete drives or partitions.
  • Page 40: Image Files And Crc32

    Chapter 3: Using Norton Ghost Image files and CRC32 Cyclic Redundancy Checking (CRC) is a data error checking technique. CRC ensures that the original data that was written to the image file is the same as the data that is being used from the image file. The 32 value in CRC32 indicates the CRC technique uses a 32-bit value to store error checking information.
  • Page 41 Managing image files Spanned image files Spanned image files are similar to size-limited multi-segment image files. The difference is that each segment file (or span) of the image file is limited by the actual volume size of the media the image is being saved to. This allows you to specify a drive and filename and let Norton Ghost sort out when to request another volume or location for the remaining data.
  • Page 42 Chapter 3: Using Norton Ghost If you select compression and there is still a possibility of insufficient space, the following message displays: If spanning is not enabled, an error message displays: Before starting to save the disk contents to the image file, Norton Ghost displays the source and destination details and gives you a chance to back out.
  • Page 43: Image Files And Tape Drives

    Managing image files The screen below shows how Norton Ghost will prompt you for span set disk one and for subsequent volumes. How to load from a spanned image When loading a disk or partition from an image file, the process is the same as loading from an unspanned image file.
  • Page 44: Viewing Image File Content And Selective File Restoration

    Chapter 3: Using Norton Ghost When using tape drives with Norton Ghost, the tape drive can be selected as the source or destination device in the File Locator window. Each SCSI tape device is shown as MTx, where x is a number starting at 0 and increases incrementally for each drive present.
  • Page 45 Managing image files boxes to prompt for the disk and partition to save. A sample screen is shown below: Norton Ghost creates an index in the image file as it works that allows Ghost Explorer to create a display of files very quickly. For more information on Ghost Explorer, see the Ghost Explorer online help.
  • Page 46 Chapter 3: Using Norton Ghost...
  • Page 47: Appendix A Norton Ghost Command-Line Switches

    Norton Ghost command-line switches Norton Ghost can be run: Interactively with no command-line switches Interactively with selected switches The Norton Ghost command-line switches are used to alter Norton Ghost’s behavior and automate procedures. To list Norton Ghost’s command-line switches, type: ghostpe.exe -h.
  • Page 48 Appendix A: Norton Ghost command-line switches -clone,mode=pdump,src=1:2,dst=g:\part2.gho -fcr -afile=filename Overrides the default abort error log file (ghost.err) to the directory and file given in filename. -autoname Automatically names spanned image files during creation. Avoids the user prompt asking for confirmation of the next destination location for the remainder of the image file.
  • Page 49 Command-line switches MODE={copy | load | dump | pcopy | pload | pdump} MODE defines the type of clone command: copy - disk-to-disk copy load - file-to-disk load dump - disk-to-file dump pcopy - partition-to-partition copy pload - file-to-partition load pdump - partition-to-file dump SRC={drive | file | drive:partition | @MTx}...
  • Page 50 Appendix A: Norton Ghost command-line switches dump Disk image filename, for example g:\images\system2.img. If using a tape drive set to @MTx(x=0...). pcopy/pload Destination partition, For example, 2:2 indicates the LOAD second partition on drive two. pdump Partition image filename e.g, g:\images\part1.img:2. SZE{E | F | L | n={nnnnM | nnP| F | V}} SZE is used to set the size of the destination partitions for either a disk load or disk copy operation.
  • Page 51 Command-line switches Rule 2: If the destination disk is smaller than the original source disk (but still large enough to accommodate the data from the source disk), the free space left over after the data space has been satisfied will be distributed between the destination partitions in proportion to the data usage in the source partitions.
  • Page 52 Appendix A: Norton Ghost command-line switches dst=1,szeL -CRC32 The -CRC32 switch allows making a list of the files on a disk or partition, or in an image file with CRC values for each, and to verify that list against the original or a clone.
  • Page 53 Command-line switches dcreate Create an ASCII CRC32 file from an image file. dverify Verify an image file from an ASCII CRC32 file. Examples of -CRC32 usage To create a CRC32 file (called ghost.crc) while making an image file: ghostpe.exe -fcr To create a list of files and CRC32 values for a disk: ghostpe.exe -CRC32,action=create,src=1,crcfile=ghost.crc To verify the list against an image file:...
  • Page 54 Appendix A: Norton Ghost command-line switches Same as previous but specify the disk, CRC file, and list file. This example uses disk 1 as the source drive, myfile.txt as the ASCII CRC32 file, and myfile.out as the verification list file. To verify the contents of the primary drive against a CRC32 file: ghostpe.exe -CRC32,action=verify,src=1, crcfile=myfile.txt,vlist=myfile.out,vexcept=myfile.exc...
  • Page 55 Command-line switches Files specified before the first [Partition:x] heading will be used to match files in any partition. A directory of * matches any subdirectory, regardless of nesting. The above exclusion file will match any file with an extension of .1 in any subdirectory on the second partition.
  • Page 56 Appendix A: Norton Ghost command-line switches Norton Ghost. This switch may also assist when tape drives are incorrectly reported as drives. Valid values for number are 128 to 255. -f32 Allows Norton Ghost to convert all FAT16 volumes to FAT32 volumes when the destination partition is larger than 2047 MB in size.
  • Page 57 Command-line switches Displays the fingerprint details written on a hard disk drive created by Norton Ghost. The fingerprint displays the process used to create the drive or partition and the time, date, and disk the operation was performed on. -fnf Disables the creation of a fingerprint when cloning hard disk drives or partitions.
  • Page 58 Appendix A: Norton Ghost command-line switches image file or to another disk, Norton Ghost examines the source partition and decides whether to copy just the files and directory structure, or to do a sector-by-sector copy. If it understands the internal format of the partition, it defaults to copying the files and directory structure.
  • Page 59 Command-line switches main menu. See “Peer-to-peer connections” on page 18, for more information. -lps LPT slave mode. This switch causes Norton Ghost to automatically go into LPT slave mode, and is the equivalent of selecting LPT Slave in the main menu.
  • Page 60 Appendix A: Norton Ghost command-line switches Ignores the NTFS volume CHKDSK bit. Norton Ghost checks the CHKDSK bit on a NTFS volume before performing operations. When Norton Ghost indicates the CHDSK bit is set, we recommend running CHKDSK on the volume to ensure the drive is in a sound state before cloning.
  • Page 61 Command-line switches Override. Allows the override of internal space and integrity checks. Use of this switch should be avoided. -pwd and -pwd=x Specifies password protection to be used when creating an image file. x indicates the password for the image file. If no password is given in the switch Norton Ghost will prompt for one.
  • Page 62 Appendix A: Norton Ghost command-line switches Skips files as outlined in the skipfile.txt file. For example, the skipfile.txt contains: *\*.tmt [partition:1] \windows\ *\*.exe [Partition:2] *\*me.txt This would skip all *.tmt files on any partition, the windows directory and any *.exe files on the first partition, and any file that ended with the me.txt on the second partition.
  • Page 63 Command-line switches Sets the ASPI driver to report a read/write as successful only when the data has been transferred to the physical medium. Useful when using older or unreliable tape devices or sequential media. -tapespeed=x Allows control of tape speed. Where x equals 0 to F. 0 is default, 1-F increases tape speed.
  • Page 64 Appendix A: Norton Ghost command-line switches -z or -z1 low compression (fast) -z2 high compression (medium) -z3 thru -z9 higher compression (slower)
  • Page 65: Appendix B Frequently Asked Questions

    Frequently asked questions When I compare the contents of the original source disk to the disk Norton Ghost created there is a difference in the number of files. Why? In addition to files skipped using the -skip switch, some temporary files are not included when cloning a FAT volume.
  • Page 66 Appendix B: Frequently asked questions Can Norton Ghost compress an image file? Yes. Norton Ghost includes several levels of compression that offer a range of performance and storage gains. After cloning and restarting Windows 95, Windows 95 keeps finding a new NIC card.
  • Page 67: Appendix C Troubleshooting

    “Diagnostics” on page 69 for information on the ghost.err file generated when an abort error occurs. Further information is available on Symantec’s Norton Ghost technical support website. See “Symantec Service and Support Solutions.” 8005, 8012 Norton Ghost is being run in a non-DOS environment. Either boot the system to DOS or create a DOS boot disk with required device drivers to start the system and run Norton Ghost.
  • Page 68 Norton Ghost to continue. You can locate the offender by looking at the drive:\path\filename at the bottom of the Norton Ghost window when this error occurs. Visit the Symantec website at www.symantec.com for details on how to purchase Norton Ghost. 15150 Probable corrupt image file.
  • Page 69: Appendix D Diagnostics

    Diagnostics This appendix contains information that may be helpful for diagnostic purposes. Hard drive detection and diagnostic information Norton Ghost has the ability to generate several different diagnostic reports outlining the hard drive devices detected, other system-related information, and error conditions when they are detected. Norton Ghost abort error file (ghost.err) An error message consists of an error number, a description, and possibly a suggestion of what can be done to remedy the problem.
  • Page 70: Hard Disk Geometry Diagnostics

    Appendix D: Diagnostics Hard disk geometry diagnostics A list of all detected hard drives on the system and their associated geometry values can be reported to screen using the command line switch -di. To generate a file containing the details, the DOS redirect output can be used as shown in the following example: c:\ >...
  • Page 71: Symantec Service And Support Solutions

    Symantec Service and Support Solutions Symantec is committed to excellent service worldwide. Our goal is to provide you with professional assistance in the use of our software and services, wherever you are located. Technical Support and Customer Service solutions vary by country. If you have questions about the services described below, please refer to the section “Worldwide Service and Support”...
  • Page 72 Symantec online support technicians. File downloads Point your web browser to http://service.symantec.com to search for and download technical notes and software updates. You can also click the LiveUpdate button in programs enabled with this feature to automatically download and install software updates and virus definitions.
  • Page 73 Technical information may still be available through online support. When Symantec announces that a product will no longer be marketed or sold, telephone support will be discontinued 60 days later. Support will only be available for discontinued products through online services.
  • Page 74 +61 (2) 9817 4550 Most International Partners provide Customer Service and Technical Support for Symantec products in your local language. For more information on other Symantec and International Partner locations, please call our Technical Support automated fax retrieval service, in the United States at +1 (541) 984-2490, choose Option 2, and request document 1400.
  • Page 75: Disk Replacement Form

    Street Address (No P.O. Boxes, Please) _______________________________________________________________________________________ City ________________________________________________________________________State _______ Zip/Postal Code _________________ Country* __________________________________________________________Daytime Phone _______________________________________ Software Purchase Date___________________________________________________________________________________________________ *This offer limited to U.S., Canada, and Mexico. Outside North America, contact your local Symantec office or distributer. Briefly describe the problem:_______________________________________________________________________________________________ _____________________________________________________________________________________________________________________ Disk Replacement Price $ 10.00...
  • Page 76 Disk Replacement Form...
  • Page 77 conversion from FAT16, 56 NTFS abort log, 48, 69 switches, 59–60 ASPI driver, 17, 22 files automation skipping, 61 clone switch and examples, 48 fingerprint. See Ghost close on completion, 57 format NetBIOS, 59 logical, 7 reboot on completion, 61 switches, 47–63 version checking, 63 Ghost...
  • Page 78: Index

    Index See also image files multi-segment See also slave See also image files spanned partition features, 39 cloning, 7 loading, 43 peer to peer connection multi-segment, 40–43, 48, 62 LPT. See parallel port transfer password, 61 procedures, 21–23 SCSI tape, 43 disk, 24–31 size limited.
  • Page 79 Index tape drive See image files See SCSI tape uninstalling, 16 Windows - running Ghost inside, 23 Zip drive. See image files spanned...
  • Page 80 Index...

Table of Contents