Any technical documentation that is made available by Symantec Corporation is the
copyrighted work of Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you AS-IS and
Symantec Corporation makes no warranty as to its accuracy or use. Any use of the
technical documentation or the information contained therein is at the risk of the user.
Documentation may include technical or other inaccuracies or typographical errors.
Symantec reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Trademarks
Symantec, the Symantec logo, Norton Ghost, Ghost Walker, Ghost Explorer, and GDisk
are trademarks of Symantec Corporation.
Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft
Corporation. IBM and PC-DOS are registered trademarks of International Business
Machines Corporation. 3Com and EtherLink are registered trademarks of 3Com
Corporation. Compaq is a registered trademark of Compaq Corporation. SuperDisk is a
trademark of Imation Enterprises Corporation. Zip and Jaz are registered trademarks of
Iomega Corporation. FireWire is a trademark of Apple Computer, Inc., registered in the
U.S. and other countries.
Other product names mentioned in this manual may be trademarks or registered
trademarks of their respective companies and are hereby acknowledged.
Printed in the United States of America.
10987654321
Page 3
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF
THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE
SOFTWARE. SYMANTEC CORPORATION AND/OR ITS
SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE
SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR
THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE
(REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE
CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS
LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE
CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING
THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE
"AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING
ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE,
YOU AGREE TO THE TERMS AND CONDITIONS OF THIS
AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND
CONDITIONS, CLICK ON THE "I DO NOT AGREE", "NO"
BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO
FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL
PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM
WHOM IT WAS ACQUIRED WITHIN SIXTY (60) DAYS OF
PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
1. LICENSE:
The software which accompanies this license (collectively the
"Software") is the property of Symantec or its licensors and is protected
by copyright law. While Symantec continues to own the Software, You
will have certain rights to use the Software after Your acceptance of this
license. This license governs any releases, revisions, or enhancements
to the Software that Symantec may furnish to You. Except as may be
modified by a Symantec license certificate, license coupon, or license
key (each a "License Module") which accompanies, precedes, or
follows this license, Your rights and obligations with respect to the use
of this Software are as follows:
YOU MAY:
A. use one copy of the Software on a single computer. If a License
Module accompanies, precedes, or follows this license, You may make
that number of copies of the Software licensed to You by Symantec as
provided in Your License Module. Your License Module shall
constitute proof of Your right to make such copies.
B. make one copy of the Software for archival purposes, or copy the
Software onto the hard disk of Your computer and retain the original
for archival purposes;
C. use the Software on a network, provided that You have a licensed
copy of the Software for each computer that can access the Software
over that network;
D. after written notice to Symantec, transfer the Software on a
permanent basis to another person or entity, provided that You retain
no copies of the Software and the transferee agrees to the terms of this
license; and
E. use the Software in accordance with any additional permitted uses
set forth in Section 9, below.
YOU MAY NOT:
A. copy the printed documentation which accompanies the Software;
B. sublicense, rent or lease any portion of the Software; reverse
engineer, decompile, disassemble, modify, translate, make any attempt
to discover the source code of the Software, or create derivative works
from the Software;
C. use a previous version or copy of the Software after You have
received a disk replacement set or an upgraded version. Upon
upgrading the Software, all copies of the prior version must be
destroyed;
D. use a later version of the Software than is provided herewith unless
You have purchased upgrade insurance or have otherwise separately
acquired the right to use such later version;
E. use, if You received the software distributed on media containing
multiple Symantec products, any Symantec software on the media for
which You have not received a permission in a License Module;
F. use the Software in any manner not authorized by this license; nor
G. use the Software in any manner that contradicts any additional
restrictions set forth in Section 9, below.
2. CONTENT UPDATES:
Certain Symantec software products utilize content that is updated
from time to time (antivirus products utilize updated virus definitions;
content filtering products utilize updated URL lists; firewall products
utilize updated firewall rules; vulnerability assessment products utilize
updated vulnerability data, etc.; collectively, these are referred to as
"Content Updates"). You may obtain Content Updates for any period
for which You have purchased a subscription for Content Updates for
the Software (including any subscription included with Your original
purchase of the Software), purchased upgrade insurance for the
Software, entered into a maintenance agreement that includes Content
Updates, or otherwise separately acquired the right to obtain Content
Updates. This license does not otherwise permit You to obtain and use
Content Updates.
3. SIXTY (60) DAY MONEY BACK GUARANTEE:
If You are the original licensee of this copy of the Software and are not
completely satisfied with it for any reason, please contact Symantec
Customer Service, for a refund of the money You paid for the Software
(less shipping, handling, and any applicable taxes) at any time during
the sixty (60) day period following the date of purchase.
.4. LIMITED WARRANTY:
Symantec warrants that the media on which the Software is distributed
will be free from defects for a period of sixty (60) days from the date of
delivery of the Software to You. Your sole remedy in the event of a
breach of this warranty will be that Symantec will, at its option, replace
any defective media returned to Symantec within the warranty period
or refund the money You paid for the Software. Symantec does not
warrant that the Software will meet Your requirements or that
operation of the Software will be uninterrupted or that the Software
will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL
OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,
INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY
RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL
RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM
STATE TO STATE AND COUNTRY TO COUNTRY.
5. DISCLAIMER OF DAMAGES:
SOME STATES AND COUNTRIES, INCLUDING MEMBER
COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT
ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW
LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW
AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL
SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY
SPECIAL, CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES,
INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT
Page 4
OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF
SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS' LIABILITY
EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The
disclaimers and limitations set forth above will apply regardless of
whether You accept the Software.
6. U.S. GOVERNMENT RESTRICTED RIGHTS:
RESTRICTED RIGHTS LEGEND. All Symantec products and
documentation are commercial in nature. The software and software
documentation are "Commercial Items", as that term is defined in 48
C.F.R. section 2.101, consisting of "Commercial Computer Software"
and "Commercial Computer Software Documentation", as such terms
are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R.
section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and
48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R.
section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section
227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other
relevant sections of the Code of Federal Regulations, as applicable,
Symantec's computer software and computer software documentation
are licensed to United States Government end users with only those
rights as granted to all other end users, according to the terms and
conditions contained in this license agreement. Manufacturer is
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA
95014.
7. EXPORT REGULATION:
Export, re-export of this Software is governed by the laws and
regulations of the United States and import laws and regulations of
certain other countries. Export or re-export of Software to any entity
on the Denied Parties List and other lists promulgated by various
agencies of the United States Federal Government is strictly prohibited.
8. GENERAL:
If You are located in North America or Latin America, this Agreement
will be governed by the laws of the State of California, United States of
America. Otherwise, this Agreement will be governed by the laws of
England. This Agreement and any related License Module is the entire
agreement between You and Symantec relating to the Software and: (i)
supersedes all prior or contemporaneous oral or written
communications, proposals and representations with respect to its
subject matter; and (ii) prevails over any conflicting or additional
terms of any quote, order, acknowledgment or similar
communications between the parties. This Agreement may only be
modified by a License Module or by a written document which has
been signed by both You and Symantec. This Agreement shall
terminate upon Your breach of any term contained herein and You
shall cease use of and destroy all copies of the Software. The
disclaimers of warranties and damages and limitations on liability shall
survive termination. Should You have any questions concerning this
Agreement, or if You desire to contact Symantec for any reason, please
write: (i) Symantec Customer Service, 555 International Way,
Springfield, OR 97477, USA, or (ii) Symantec Customer Service
Center, PO BOX 5689, Dublin 15, Ireland.
9. ADDITIONAL USES AND RESTRICTIONS:
Notwithstanding any of the terms and conditions contained in the
Symantec Corporation Software License Agreement, the following
additional terms apply to the product you have purchased. You may:
(i) use the Software on one computer to clone, or apply an image of, a
hard drive on that computer, or a portion thereof, to another hard
drive on the same computer, a replacement computer, secondary
media, or network drive. If a License Module accompanies, precedes,
or follows this license, you may make and use that number of copies of
the Software licensed to you by Symantec as provided in your License
Module on an equal number of individual computers pursuant to the
terms of this license. Your License Module shall constitute proof of
your right to make and use such copies;
(ii) use the Software on that same computer to create an image file of a
hard drive on that computer and store the image file on removable
media for disaster recovery purposes;
(iii) use the Software to create a boot disk as described in the
documentation for reapplying the hard drive image that was created
for disaster recovery purposes to the hard drive on that same
computer; and
(iv) use the Software to clone a hard drive from that same computer to
a replacement computer, in the manner described in the software
documentation, and to use the Software on the replacement computer
provided that the Software has been removed from the original
computer.
You may not use the Software commercially or non-commercially for
the purpose of creating multiple computers or hard drives not
connected to the original computer, with similar or identical
configurations to that of the original computer or hard drive.
Appendix HInstalling Norton Ghost from the command line
Choosing an interface type for installation ................................................. 206
Choosing an installation mode ....................................................................206
Installing from the command line ...............................................................207
Uninstalling from the command line ..........................................................208
Service and support solutions
Glossary
Index
CD Replacement Form
Page 12
12 Contents
Page 13
Chapter
About Norton Ghost
This chapter includes the following topics:
■Introducing Norton Ghost
■What’s new in Norton Ghost 2003
■How Norton Ghost works
■Norton Ghost components
1
Page 14
14 About Norton Ghost
Introducing Norton Ghost
Introducing Norton Ghost
Norton Ghost protects your data from computer disasters. The intuitive
Windows interface lets you create backup images of your hard disk or selected
partitions. You can clone directly between two computers using a network, USB,
or parallel connection. Norton Ghost is based on the robust cloning technology
of Symantec Ghost Enterprise.
Norton Ghost includes the following features:
■Backup flexibility: Back up directly to a wide range of hard drives and
removable media, including CD-R/RW drives, FireWire and USB hard
drives, DVD devices, Iomega, ZIP, and JAZ drives.
■Peer-to-peer communication: Fast peer-to-peer communication using high-
speed parallel, USB, or network IP connections.
■Operating system support: You can back up, restore, or clone computers
installed with DOS, Windows 2000/XP/NT/9x, OS/2, or Linux.
■File system support: You can back up, restore, or clone FAT, FAT32, NTFS,
and Linux Ext2/3 file systems.
■Image file editing: Ghost Explorer lets you edit FAT and FAT32 image files.
■Restore individual files: Ghost Explorer lets you restore individual files from
an image file.
■Disk and partition management: You can run GDisk from DOS or in a
command shell from within Windows to manage partitions and disks.
■Tutorials: A set of tutorials is included in Norton Ghost to provide a
demonstration of the most commonly used functions.
What’s new in Norton Ghost 2003
■Windows user interface: You can launch Norton Ghost directly from
Windows without having to restart your computer.
■Virtual Partition: Eliminates the need for a boot disk in most situations.
■Linux support: You can back up, restore, and clone EXT3 file systems.
■NTFS support: Norton Ghost now writes to NTFS partitions. You can store
an image file on an NTFS drive and restore from an image file located on an
NTFS drive.
Page 15
■Mapped network drives: A computer on a network can be mapped to a drive
letter. This lets Norton Ghost see the computer as a local drive and back up to
and restore from it.
■Ghost Walker: This utility lets you update Security Identifiers (SID) and
computer names. Ghost Walker was previously available only in Symantec
Ghost, the corporate version of Norton Ghost.
■Support for FireWire, USB 1.1, USB 2.0: You can now use Norton Ghost to
back up, restore, and clone to and from FireWire, USB 1.1, and 2.0 devices,
including hard disks and supported CD-R/RW and DVD drives.
■DVD support: You can use Norton Ghost to back up to and restore from
supported DVD+ R/RW and DVD-R/RW drives.
■Expanded CD-R/RW support: The CD-R/RW drives supported by Norton
Ghost have been increased to include most new drives.
■Large drive support: Norton Ghost supports backing up, restoring, and
cloning IDE drives larger than 128 GB.
How Norton Ghost works
How Norton Ghost works
15About Norton Ghost
Virtual Partition
The basis of Norton Ghost is a cloning function that creates an image file that
contains all of the information required to recreate a complete disk or partition.
Image files contain a backup copy of an entire drive or one or more partitions.
The image file can be restored to one or more partitions or disks, replacing
existing data.
The Virtual Partition is a partition that is created when you perform a backup,
restore, clone, or other operation from Windows. All the files required for the
backup, restore, or clone are automatically installed into the Virtual Partition and
the task performed. Most of the Virtual Partition operation is not apparent to
you. However, there may be some occasions when you must know what the
Virtual Partition is and what it does, such as if you want to run Ghost.exe or
another application from the Virtual Partition.
One primary partition slot must be available in the MBR for the Virtual Partition.
Page 16
16 About Norton Ghost
How Norton Ghost works
Hardware restrictions
Norton Ghost is designed to restore to and clone identical hardware. When
Microsoft Windows is installed, drivers necessary to support your hardware are
installed to the hard disk and recorded in the Windows Registry. If you move an
installation of Windows to another computer, either by directly moving the hard
disk or copying it using a Ghost operation, there is no guarantee that it will boot
or function correctly. Although Microsoft provides tools, such as Sysprep, that
may alleviate these problems to volume license holders, these tools are usually
unavailable to consumer or small business users.
A computer with Windows installed should be copied to a computer with
identical hardware. Moving or cloning file systems that do not contain an
operating system does not usually present a problem.
Preparing for an emergency
After you have installed Norton Ghost and created a backup image, you must
create and test a recovery boot disk for use in an emergency. If you experience a
critical failure and cannot start your computer, then you must have a recovery
boot disk. This lets you start your computer in DOS and run Norton Ghost to
restore your computer.
Note: If you saved your image file directly to CD or DVD, then you do not need a
recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to
CD or DVD.
Page 17
Norton Ghost components
There are two methods of restoring your computer:
■Norton Ghost
If you are able to start in Windows, then you may be able to run Norton
Ghost from Windows on your hard disk and restore your computer with the
latest backup image file that you have created.
See “Restoring your computer from an image file” on page 37.
■Ghost.exe
If you cannot start Windows, then you must start your computer from a
recovery boot disk or CD/DVD. This starts your computer and starts Norton
Ghost in DOS. From Norton Ghost, you can access your image file and
restore your computer to the latest backup image file.
See “Restoring from an image file” on page 101.
The Ghost Boot Wizard helps you create a recovery boot disk.
See “Creating boot disks and boot images” on page 75.
Warning: Create and test a recovery boot disk before you need it. If your
computer crashes and you do not have a recovery boot disk, then you will have to
find another computer on which to create a boot disk.
17About Norton Ghost
Norton Ghost components
Norton Ghost includes a number of products and utilities.
Norton Ghost wizards
Norton Ghost includes Windows wizards to guide you through the basic tasks.
Page 18
18 About Norton Ghost
Norton Ghost components
These wizards include:
Backup Wizard
The Backup Wizard lets you select a hard disk or partition to back up to an image
file.
Restore Wizard
The Restore Wizard lets you restore a hard disk or partition from an image file.
Page 19
Norton Ghost components
Clone Wizard
The Clone Wizard lets you clone a hard disk or partition directly from another
hard disk or partition.
Peer-to-Peer Wizard
The Peer-to-Peer Wizard starts Ghost.exe in the Virtual Partition with the peerto-peer drivers loaded.
19About Norton Ghost
Page 20
20 About Norton Ghost
Norton Ghost components
Create Virtual Partition Wizard
The Create Virtual Partition Wizard restarts your computer in the Virtual
Partition in DOS with files from a selected directory. This enables you to run
DOS applications.
Run Ghost Interactively Wizard
The Run Ghost Interactively Wizard restarts your computer in DOS and runs
Ghost.exe.
Integrity Check
The image integrity check runs an integrity check on backup image files.
Page 21
View Log
View Log lets you view logs created during Norton Ghost operations.
Norton Ghost executable
Ghost.exe runs in DOS and lets you back up, restore, and clone. Because the
executable is small with minimal conventional memory requirements, you can
run it easily from a DOS boot disk or hard drive.
Norton Ghost components
21About Norton Ghost
Page 22
22 About Norton Ghost
Norton Ghost components
Ghost Boot Wizard
The Ghost Boot Wizard is a Windows application that creates boot disks that
start Norton Ghost when you turn on your computer. You can create boot disks
for various cloning tasks. The wizard guides you through adding the drivers that
are needed to create a boot disk.
Ghost Explorer
Ghost Explorer is a Windows application that lets you view directories and files in
an image file. You can also add, recover, and delete individual directories and files
from a FAT16/32 file system image file.
Page 23
Norton Ghost components
Note: You can restore individual files from NTFS images, but you cannot update
NTFS images.
23About Norton Ghost
GDisk
GDisk is a complete replacement for the Microsoft FDISK and FORMAT utilities
that allows the following:
■FAT file system formatting
■Batch mode operation
■Hiding and unhiding of partitions
■Secure disk wiping to US Department of Defense standards
■Extensive partition reporting
■Boot.ini manipulation (GDisk32 only)
Two versions of GDisk are supplied:
■GDisk: Runs in DOS
■GDisk32: Runs from the command prompt in a Windows operating system
Page 24
24 About Norton Ghost
Norton Ghost components
Ghost Walker
Ghost Walker assigns a statistically unique security identifier (SID) and a unique
computer name to cloned Microsoft Windows NT/2000/XP workstations. The
SID is an important part of the Windows NT/2000/XP security architecture as it
provides a unique identifier when these computers are networked. If you are
cloning more than one computer using the multiuser pack, you can use Ghost
Walker to set up each computer on a network with a unique identification, which
is mandatory on a Microsoft network.
Page 25
Chapter
Installing Norton Ghost
This chapter includes the following topics:
■Minimum system requirements
■Installing Norton Ghost
■Updating Norton Ghost
■Uninstalling Norton Ghost
2
Page 26
26 Installing Norton Ghost
Minimum system requirements
Minimum system requirements
To install and run Norton Ghost, the minimum requirements are as follows:
■IBM computer or 100% compatible
■486 processor
■VGA monitor (Super VGA recommended)
■16 MB RAM (32 MB RAM recommended)
■Microsoft-compatible mouse recommended
■Microsoft Windows 98/2000/Me/XP or Microsoft Windows NT4 SP6a
■Internet Explorer 5
Ghost.exe
Ghost.exe must be installed on a computer with the Norton Ghost minimum
requirements. However, you can run Ghost.exe on a computer with the following
minimum requirements:
■IBM PC computer or 100% compatible
■486 processor
■16 MB RAM
■VGA monitor
■Microsoft-compatible mouse recommended
CD and DVD writing
■CD or DVD writer supported by Norton Ghost
Supported backup media
In addition to saving a backup to a secondary partition or an internal hard disk,
Norton Ghost can also save a backup to the following external media devices:
■CD-R/RW
■DVD+RW/-RW/+R/-R
■USB 1.1/2.0 hard drive and CD/DVD recordable devices
■FireWire (iEEE) 1394 hard drive and CD/DVD recordable devices
Page 27
Installing Norton Ghost
■Atapi tape (QIC157) devices
■SCSI tape
■A second computer using a peer-to-peer connection
■Mapped network drive
■ZIP drive
■JAZ drive
To determine whether your device is supported by Norton Ghost, check that your
device is listed on the Symantec support Web site.
http:\\www.ghost.com
File systems supported for backup, restore, and cloning tasks
■All FAT
■All NTFS
■EXT2/3
See “Cloning with Linux” on page 187.
27Installing Norton Ghost
Disaster recovery requirements
To restore a backup image in the event of an operating system or hard disk
failure, you must have one of the following recovery mechanisms in place before
the emergency occurs:
■Floppy disk drive and floppy disk with the correct drivers for the selected
backup device
■CD or DVD device and a bootable CD-ROM with the backup image created
by Norton Ghost
See “Preparing for an emergency” on page 16.
Installing Norton Ghost
The installation instructions for Norton Ghost differ depending on how you have
purchased Norton Ghost:
■As a part of Norton SystemWorks Pro
■Norton Ghost 2003
Page 28
28 Installing Norton Ghost
Installing Norton Ghost
Installing Norton Ghost if purchased with Norton SystemWorks Pro
If you have purchased Norton Ghost as part of Norton SystemWorks Pro, then
Norton Ghost is installed from the Norton SystemWorks Pro CD.
To install Norton Ghost from Norton SystemWorks
1Insert the Norton SystemWorks 2003 CD into the CD-ROM drive.
2In the Norton SystemWorks 2003 window, click Install Norton SystemWorks
2003.
3Click OK to accept the Virus detection message.
4Click Next.
5In the License Agreement window, click I accept the license agreement, and
then click Next.
If you select I do not accept the license agreement, you cannot continue with
the installation.
6Confirm the installation location.
To select a different location for the installed files, click Browse.
7Click Next.
8Select an installation type:
■Typical: The most common programs are installed. This is the best
choice for most users.
■Complete: All programs are installed. This is the best choice for users
who want to take advantage of all the product features.
■Express: The most common programs are installed with the default
settings and fewer prompts.
9In the Select Features window, select Norton Ghost 2003 and click one of the
following:
■Will be installed on local hard drive
■Entire feature will be installed on local hard drive
To install only Norton Ghost, click the other Norton SystemWorks
components and select Entire feature will be unavailable.
10 Click Next.
11 Continue with the type of installation you chose. After installation, you may
receive a prompt telling you that your computer needs to be restarted for the
updates to take effect.
Page 29
Installing Norton Ghost
If you have purchased Norton Ghost separately from Norton SystemWorks Pro,
then Norton Ghost is installed from the Norton Ghost CD.
To install Norton Ghost from the Norton Ghost CD
1Insert the Norton Ghost CD into the CD-ROM drive.
4In the License Agreement window, click I accept the license agreement, and
then click Next.
If you select I do not accept the license agreement, you cannot continue with
the installation.
5In the User name field, type a user name.
6In the Organization field, type an organization, if you belong to one.
7Click Next.
8Confirm the installation location.
To select a different location for the installed files, click Change.
Installing Norton Ghost
29Installing Norton Ghost
9Click Next.
10 Click Install to start the installation.
If the opening screen does not appear
Sometimes, a computer’s CD-ROM drive does not automatically start a CD.
To start the installation from the Norton Ghost CD
1On your desktop, double-click My Computer.
2In the My Computer dialog box, double-click the icon for your CD-ROM
drive.
3From the list of files, double-click Ncdstart.exe.
Registering Norton Ghost
To stay informed of upcoming Symantec products, please fill out the details for
registration of Norton Ghost. If you choose not to register the software using the
Information Wizard or if registration fails for some reason, you can register on
the Symantec Web site at www.symantec.com or by using the Product
Page 30
30 Installing Norton Ghost
Installing Norton Ghost
Registration option in the Help menu in the Norton Ghost window. On the Web
site, go to the Products page for the registration link.
To register Norton Ghost
1In the first Registration window, select the country from which you are
registering and the country in which you live (if different), and then click
Next.
2If you would like information from Symantec about Norton Ghost, select the
method by which you want to receive that information, and then click Next.
3Type your name and whether you want Norton Ghost registered to you or
your company, and then click Next.
4Type your address, and then click Next.
5Do one of the following:
■Answer the survey questions to help Symantec improve its products and
services, and then click Next.
■Skip the survey by clicking Next.
6Select whether you want to register Norton Ghost through the Internet or by
mail.
■If you want to register by mail, your computer must be connected to a
printer that the Information Wizard can use to print the registration
form.
■If you want to register using the Internet, you must be connected to the
Internet.
7Click Next.
If you submitted your registration through the Internet, the Information
Wizard displays the serial number for your product.
8Write down the serial number or click Print to get a copy of your registration
information for future reference.
9Click Next.
10 Select whether you want to use your existing profile the next time you
register a Symantec product or type the information as part of registration.
11 Click Finish.
Page 31
Updating Norton Ghost
Symantec may provide updates for Norton Ghost. Symantec does not charge for
these updates. However, your normal Internet access fees apply.
To update Norton Ghost using LiveUpdate
1On the Windows taskbar, click Start > Programs > Norton Ghost 2003 >
Norton Ghost.
2Click LiveUpdate.
3Follow the on-screen instructions.
Uninstalling Norton Ghost
Norton Ghost is uninstalled from the Control Panel in Windows.
To uninstall Norton Ghost
1On the Windows taskbar, click Start > Settings > Control Panel.
2In the Control Panel window, double-click Add/Remove Programs.
Updating Norton Ghost
31Installing Norton Ghost
3Click Norton Ghost.
4Click Remove.
Page 32
32 Installing Norton Ghost
Uninstalling Norton Ghost
Page 33
Chapter
Backing up, restoring,
and cloning from Norton
Ghost
This chapter includes the following topics:
■When to use Norton Ghost in Windows
■Starting Norton Ghost in Windows
3
■Creating a backup image file
■Restoring your computer from an image file
■Cloning a hard disk or partition
■Launching Ghost.exe peer-to-peer
■Identifying a hard disk
Page 34
34 Backing up, restoring, and cloning from Norton Ghost
When to use Norton Ghost in Windows
When to use Norton Ghost in Windows
Use Norton Ghost in Windows to do the following:
■Back up your computer
■Restore an image file onto your computer
You can use the Restore Wizard to restore an image file if you can still start
Windows.
■Clone a hard disk or partition directly to another hard disk or partition
Do not use Norton Ghost in Windows for the following tasks. Use Ghost.exe in
DOS for any of the following:
■If you cannot start Windows on your computer
See “Restoring from an image file” on page 101.
■Cloning a computer that does not have Windows installed
See “Cloning disks and partitions” on page 104.
Note: Sometimes the drive letter in Norton Ghost in DOS does not match the
drive letter in Windows.
For example:
You back up to a file, F:\test.gho. When you execute a backup task, the backup
appears in Ghost.exe as E:\test.gho.
Starting Norton Ghost in Windows
Before starting Norton Ghost, close all open programs.
Page 35
Starting Norton Ghost in Windows
To start Norton Ghost in Windows
◆Do one of the following:
■On the Windows taskbar, click Start > Programs > Norton Ghost 2003
> Norton Ghost.
■On the Windows XP taskbar, click Start > All Programs > Norton
Ghost 2003 > Norton Ghost.
35Backing up, restoring, and cloning from Norton Ghost
Starting Norton Ghost from the tray icon
By default, Norton Ghost displays a single Windows tray icon in the system
notification area at the end of the Windows 9x/Me/NT/2000/XP taskbar. Use the
tray icon as a shortcut to open the Backup, Restore, and Clone Wizards.
Page 36
36 Backing up, restoring, and cloning from Norton Ghost
Creating a backup image file
From the tray icon you can initiate any of the following tasks:
■Launch Norton Ghost
■Run the Restore Wizard
■Run the Backup Wizard
■View the task log
To start Norton Ghost from the tray icon
1Move your mouse cursor over the Norton Ghost tray icon.
2Right-click the tray icon.
3On the tray icon menu, click the option that you want.
Creating a backup image file
You can create a backup image file of your hard disk or one or more partitions
using the Backup Wizard.
To back up a hard disk or partition
1In the Ghost Basic window, click Backup, and then click Next.
2In the Backup Wizard window, in the Source pane, do one of the following:
■Select a whole disk to back up.
■Select one or more partitions to back up.
The partitions must reside on the same disk.
3Do one of the following:
■Click File to back up to a file.
■Click Recordable CD or DVD to back up to a CD or DVD drive.
Norton Ghost selects the CD or DVD drive that contains writable
media.
4Click Next.
5If you selected to back up to a file, click Browse to select a destination and file
name to which the disk or partition(s) is to be backed up.
6Click Next.
Page 37
Restoring your computer from an image file
7If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk.
See “Identifying a hard disk” on page 43.
If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
8If you want to set advanced settings for the backup, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
9Click Next.
10 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
11 In the Disaster Recovery dialog box, click Continue.
This dialog box warns you to ensure that you can run Ghost.exe and access
your image file once it has been created. You may need to create a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
12 Select one of the following:
■Run Now: Creates the backup image file.
Your computer is restarted and the backup image file is created.
■Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
37Backing up, restoring, and cloning from Norton Ghost
Restoring your computer from an image file
You can restore a hard disk or a partition from an image file stored on another
hard disk, partition, or external media using the Restore Wizard from within
Windows.
If you cannot start Windows, then you must use Ghost.exe to restore your hard
disk or partition.
See “Restoring from an image file” on page 101.
Page 38
38 Backing up, restoring, and cloning from Norton Ghost
Restoring your computer from an image file
To restore a disk or partition
1In the Ghost Basic window, click Restore, and then click Next.
2In the Restore Wizard window, click Browse, and find the image file from
which to restore.
3If you want to view the contents of the image file in Ghost Explorer, click
Open image in Ghost Explorer.
See “Viewing image files” on page 119.
4Click Next.
5In the left pane, select the image file or partition within the image file to
restore.
6In the right pane, select the destination hard disk or partition that is to be
overwritten.
7Click Next.
8The Overwrite partition warning dialog box appears if you are overwriting
any of the following:
■The current Windows partition
■The Ghost installation
Click Next to continue.
9If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk.
See “Identifying a hard disk” on page 43.
If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
10 If you want to set advanced settings for the restore, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
11 Click Next.
12 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
13 Click Run Now to restore the image file to the selected hard disk or partition.
Your computer is rebooted and the restore operation completed.
Warning: The destination disk or partition is completely overwritten with
no chance of recovering any data.
Page 39
Cloning a hard disk or partition
You can clone a hard disk directly to another hard disk or a partition directly to
another partition.
To create a clone task
1In the Ghost Advanced window, click Clone, and then click Next.
2In the Clone Wizard window, in the left pane, do one of the following:
■Click a disk to select it as the source for the clone operation.
■Click a partition to select it as the source for the clone operation.
3In the right pane, do one of the following:
■Click a disk to select it as the destination for the clone operation.
■Click a partition to select it as the destination for the clone operation.
Warning: The destination disk or partition is completely overwritten with
no chance of recovering any data.
4Click Next.
Cloning a hard disk or partition
39Backing up, restoring, and cloning from Norton Ghost
5The Overwrite partition warning dialog box appears if you are overwriting
any of the following:
■The current Windows partition
■The Ghost installation
Click Next to continue.
6If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk.
See “Identifying a hard disk” on page 43.
If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
7If you want to set advanced settings for the clone, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
8Click Next.
Page 40
40 Backing up, restoring, and cloning from Norton Ghost
Launching Ghost.exe peer-to-peer
9In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
10 Click Run Now to start the clone operation.
Ensure that all applications on your computer are closed before you run the
clone operation.
Your computer is restarted and the destination hard disk or partition is
cloned from the source hard disk or partition.
Launching Ghost.exe peer-to-peer
From Norton Ghost you can launch Ghost.exe over a USB, LPT, or TCP/IP peerto-peer connection. Once you have established the settings for the connection,
Ghost.exe launches ready for you to establish a connection.
Both computers must be running Ghost.exe for you to make the peer-to-peer
connection. On your second computer, you can run Norton Ghost as described
in this section, or you can restart it from a Peer-to-Peer Network Boot Disk or
Standard Boot Disk.
See “Boot disks with network support” on page 79 and “Standard boot disks” on
page 76.
To run Ghost.exe peer-to-peer
To run Ghost.exe peer-to-peer using USB
1In the Ghost Basic window, click Ghost Advanced, and then click Peer-to-
Peer.
2Click USB peer-to-peer.
3Click Next.
4If you want to set advanced settings, then click Advanced Settings.
See “Setting Norton Ghost options and defaults” on page 46.
5If you want to set advanced USB peer-to-peer settings, then click USB driver
settings.
See “Installing USB peer-to-peer drivers” on page 57.
6In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
Page 41
Launching Ghost.exe peer-to-peer
7In the Disaster Recovery window, select one of the following:
■Launch Tutorials: Opens the tutorial index.
From the tutorials, you can select a tutorial that demonstrates how to
create a recovery boot disk.
■Continue: Returns to the Create Task dialog box.
This dialog box warns you to ensure that you can run Ghost.exe and access
your image file once it has been created. You may need to create a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
8Select one of the following:
■Run Now: Restarts your computer into DOS and starts Ghost.exe.
■Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
To run Ghost.exe peer-to-peer using TCP
1In the Ghost Basic window, click Ghost Advanced, and then click Peer-to-
Peer.
41Backing up, restoring, and cloning from Norton Ghost
2Click TCP peer-to-peer.
3Click Next.
4If you want to set advanced settings, then click Advanced Settings.
See “Setting Norton Ghost options and defaults” on page 46.
5If you want to set TCP/IP driver settings, then click TCP/IP Driver Settings.
See “Setting TCP/IP drivers” on page 54.
6In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
Page 42
42 Backing up, restoring, and cloning from Norton Ghost
Launching Ghost.exe peer-to-peer
7In the Disaster Recovery window, select one of the following:
■Launch Tutorials: Opens the tutorial index.
From the tutorials, you can select a tutorial that demonstrates how to
create a recovery boot disk.
■Continue: Returns to the Create Task dialog box.
This dialog box warns you to ensure that you can run Ghost.exe and access
your image file once it has been created. You may need to create a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
8Select one of the following:
■Run Now: Restarts your computer into DOS and starts Ghost.exe.
■Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
To run Ghost.exe peer-to-peer using LPT
1In the Ghost Basic window, click Ghost Advanced, and then click Peer-to-
Peer.
2Click LPT peer-to-peer.
3Click Next.
4If you want to set advanced settings, then click Advanced Settings.
See “Setting Norton Ghost options and defaults” on page 46.
5If you want to set advanced LPT peer-to-peer driver settings, then click LPT
driver settings.
See “Setting LPT peer-to-peer drivers” on page 55.
6In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
Page 43
7In the Disaster Recovery window, select one of the following:
■Launch Tutorials: Opens the tutorial index.
From the tutorials you can select a tutorial that demonstrates how to
create a recovery boot disk.
■Continue: Returns to the Create Task dialog box.
This dialog box warns you to ensure that you can run Ghost.exe and access
your image file once it has been created. You may need to create a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
8Select one of the following:
■Run Now: Restarts your computer into DOS and starts Ghost.exe.
■Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
Identifying a hard disk
Before you can use Norton Ghost on a hard disk, Norton Ghost must identify the
disk. You can do this during any backup, restore, or clone operation.
Identifying a hard disk
43Backing up, restoring, and cloning from Norton Ghost
This dialog box appears during a backup, restore, or clone operation if you have
not previously identified the hard disk.
To identify a disk
◆In the Add Ghost Disk Identification dialog box, click OK to identify all hard
disks.
Page 44
44 Backing up, restoring, and cloning from Norton Ghost
Identifying a hard disk
Page 45
Chapter
Setting options and
defaults
This chapter includes the following topics:
■Setting Norton Ghost options and defaults
■Running your computer from the Virtual Partition
■Checking the integrity of an image file
■Viewing the task log
4
■Starting Ghost.exe
■What to do if a task fails
Page 46
46 Setting options and defaults
Setting Norton Ghost options and defaults
Setting Norton Ghost options and defaults
Norton Ghost lets you set defaults for the tasks that you run from the wizards.
You can change many of these defaults in the wizards as you create a task.
Norton Ghost
default options
Some options can only be set as you create the task in the wizard.
The options and defaults include the following:
■Adding command-line switches to a task
■Assigning a drive letter to a CD/DVD drive
■Setting the options for a mapped network drive
■Setting display options
■Setting the DOS version
■Setting the image integrity check default
■Setting a compression level
■Assigning a password to an image file
■Adding free space to the Virtual Partition
■Installing SCSI drivers
■Setting external storage device drivers
■Setting TCP/IP drivers
■Setting LPT peer-to-peer drivers
■Installing extra drivers
■Installing USB peer-to-peer drivers
Page 47
Adding command-line switches to a task
You can add command-line switches to a task to alter its operation.
To add command-line switches to a task
1Do one of the following:
■To set this option as a default, in the Ghost Basic window, click Options.
■To add command-line switches while running a Windows wizard task,
in the settings window, click Advanced Settings.
2On the Ghost Command Line tab, type the extra command-line switches.
See “Using Norton Ghost with switches” on page 154.
3Click OK.
Warning: The syntax of your command line is not checked when the task
runs. Therefore, review these instructions carefully to avoid errors. The
consequences of an error could be serious.
Assigning a drive letter to a CD/DVD drive
Setting Norton Ghost options and defaults
47Setting options and defaults
You can assign a drive letter to a CD or DVD drive. This lets you select a drive
letter when restoring an image file from a CD/DVD.
Use this option if you are restoring an image file that was written to a CD/DVD
using a tool other than Norton Ghost.
To assign a drive letter to a CD/DVD drive
1Do one of the following:
■To set this option as a default, in the Ghost Basic window, click Options.
■To assign a drive letter to a CD or DVD drive while running a Windows
wizard task, in the Advanced Settings window, click Advanced Settings.
2On the CD Driver tab, click Assign drive letters to CD/DVD drives.
3Click OK.
Setting the options for a mapped network drive
You can set the options for connecting to a mapped network drive.
Page 48
48 Setting options and defaults
Setting Norton Ghost options and defaults
To set the options for a mapped network drive
1While running a Windows wizard task, in the Advanced Settings window,
2Click Map network drive.
3Do one of the following:
4Select one of the following:
click Advanced Settings.
■Select a network card from the drop-down list.
Norton Ghost displays any installed drivers that it detects. Select the
network driver for the particular make and model of the network card
that is installed on the computer.
See “Selecting a template” on page 84.
■Click Browse to open the Ghost Boot Wizard and select a network card.
From the Ghost Boot Wizard, you can add a network card. If your
network card is not on the list, you can modify a network card template.
See “Selecting a template” on page 84 and “Adding network drivers to
the Ghost Boot Wizard” on page 86.
■Use DHCP: Use this option if your network contains a DHCP server.
■Static IP Address: Complete the fields below this option if your network
does not contain a DHCP server.
5In the Network resource field, type a network resource.
6In the User name field, type a user name.
7In the Domain field, type a domain name.
8Click OK.
Setting display options
You can set some default display options.
To set display options
1In the Ghost Basic window, click Options.
2Click Display.
3Check Show Norton Ghost tray icon on start up to display the Norton Ghost
icon in the taskbar.
4Check Show disaster recovery warning before running a Norton Ghost task
to display the Disaster Recovery dialog box before running a task.
Page 49
5Check Show information screen about the DOS version of Ghost to display
the warning that Norton Ghost restarts into DOS while running a task.
6Click OK.
Setting the DOS version
By default, Norton Ghost includes PC-DOS in the Virtual Partition. However,
some computer models may not start from a Virtual Partition that contains PCDOS. If your computer does not start from the Virtual Partition, set the default
option to MS-DOS.
You must provide MS-DOS on a floppy disk formatted on a Windows 95/98
computer before you can run Norton Ghost with MS-DOS.
See “Providing MS-DOS” on page 89.
To set DOS files
To select a DOS version
1In the Ghost Basic window, click Options.
Setting Norton Ghost options and defaults
49Setting options and defaults
2On the DOS Type tab, select one of the following:
■Use PC-DOS: Includes PC-DOS in the Virtual Partition.
■Use MS-DOS: Includes MS-DOS in the Virtual Partition.
3Click OK.
To install MS-DOS
1Insert the MS-DOS formatted floppy disk into drive A of the computer on
which Norton Ghost is running.
2In the DOS Type window, click Get MS-DOSFiles.
3Click OK.
To uninstall MS-DOS
1In the DOS Type window, click Remove MS-DOS Files.
2Click OK.
Installing MS-DOS Client files
If you are using the mapped network drive functionality and MS-DOS, you must
include the Microsoft DOS Client files. You must install the files on the computer
before you can include them in the Virtual Partition.
Page 50
50 Setting options and defaults
Setting Norton Ghost options and defaults
The following files are required:
■EMSBFR.EXE
■LMHOSTS
■NEMM.DOS
■NET.EXE
■NET.MSG
■NETBIND.COM
■NETH.MSG
■NETWORKS
■NMTSR.EXE
■PROTMAN.DOS
■PROTMAN.EXE
■PROTOCOL
■TCPDRV.DOS
■TCPTSR.EXE
■TCPUTILS.INI
■TINYRFC.EXE
■UMB.COM
■IFSHLP.SYS
■EMM386.EXE
■HIMEM.SYS
■WFWSYS.CFG
Page 51
To install the Microsoft DOS Client files
1In the Ghost Basic window, click Options.
2In the Norton Ghost 2003 Options dialog box, click DOS Type.
3Insert a floppy disk containing the MS-DOS LAN Client files into drive A,
and then click Supply MS-DOS LAN Client Files.
Setting the image integrity check default
You can set a default option for Norton Ghost to perform an integrity check of an
image file after it has been created and before it is restored.
Some CD-RW drives eject a CD once an image has been saved to it. If this is
preventing the integrity check, then ensure that this option is not selected, and
perform an integrity check using the Image Integrity Check Wizard.
See “Checking the integrity of an image file” on page 58.
To set Norton Ghost to perform an integrity check on an image file
3Check Always perform an image integrity check to set the default.
4Click OK.
Setting a compression level
A compression level can be set as a default or from a wizard. You can set the
compression level to None, Fast, or High. Compression is set to Fast by default.
See “Image files and compression” on page 62.
Page 52
52 Setting options and defaults
Setting Norton Ghost options and defaults
To set the compression level
1Do one of the following:
■To set the default compression level, in the Ghost Basic window, click
Options.
■To set the compression level while running a Windows wizard task, in
the Advanced Settings window, click Advanced Settings.
2On the Compression tab, select one of the following:
■None: No compression (high speed)
■Fast: Low compression (medium speed)
■High: High compression (slower speed)
3Click OK.
Assigning a password to an image file
You can assign a password to an image file. The password is entered when the
image file is created. Then, each time the image file is accessed in Ghost.exe, you
are prompted to enter the password.
To assign a password
1Do one of the following:
■To set the default to create an image password, in the Ghost Basic
window, click Options.
■To set the option to create an image password while running a Windows
wizard task, in the Advanced Settings window, click Advanced Settings.
2On the Image password tab, check Prompt for an image password to set the
option to prompt for a password when the image file is created.
Adding free space to the Virtual Partition
You can specify additional space to be added to the Virtual Partition. This is
added to the Virtual Partition when it is created.
Page 53
To specify additional free space in the Virtual Partition
1Do one of the following:
■To set the default to specify additional free space, in the Ghost Basic
window, click Options.
■To specify additional free space while running a Windows wizard task,
in the Advanced Settings window, click Advanced Settings.
2In the Norton Ghost 2003 Options window, on the Virtual Partition Free
Space tab, in the Required Free Space field, select an additional amount of
free space (in MB) to add to the Virtual Partition.
3Click OK.
Installing SCSI drivers
Norton Ghost automatically installs Adaptec SCSI drivers in the Virtual Partition
if it finds a SCSI hard disk. The SCSI drivers allow Norton Ghost to access any
SCSI device. If you want to install SCSI drivers manually, you can set this as a
default preference or install the drivers from a wizard. You can scan for Adaptec
SCSI cards and let Norton Ghost select the correct drives.
Setting Norton Ghost options and defaults
53Setting options and defaults
If you are using a card other than Adaptec, then you must manually install the
correct drivers.
See “Installing extra drivers” on page 56.
To install SCSI drivers
1Do one of the following:
■To set the default installation of SCSI drivers, in the Ghost Basic
window, click Options.
■To install the SCSI drivers while running a task, in the Advanced
Settings window, click Advanced Settings.
2Check the SCSI drivers that you want to install.
3To let Norton Ghost scan for Adaptec SCSI cards, click Auto-Detect for SCSI
drivers.
4Click OK.
Page 54
54 Setting options and defaults
Setting Norton Ghost options and defaults
Setting external storage device drivers
Norton Ghost usually installs USB and FireWire drivers in the Virtual Partition if
it finds a USB or FireWire external device. You may need to install these drivers
manually as a default option or while running a Windows wizard task.
Note: Do not use this option if you want to connect to another computer using
peer-to-peer.
See “Installing USB peer-to-peer drivers” on page 57.
To install external device drivers
1Do one of the following:
■To set the default installation of external drivers, in the Ghost Basic
window, click Options.
■To install the external device drivers while running a Windows wizard
task, in the Advanced Settings window, click Advanced Settings.
2On the External Storage tab, select one of the following:
■No USB Drivers: Does not install USB drivers
■USB 1.1 Drivers: Installs USB 1.1 drivers
Select this option if any of your cards or chipsets are USB 1.1.
■USB 2.0 Drivers: Installs USB 2.0 drivers
Do not select this option if any of your cards or chipsets are USB 1.1.
3If you want to install FireWire drivers to the Virtual Partition, then click
Firewire Support.
4If you want to assign a drive letter to the external storage device, then click
Assign drive letters.
By default, a drive letter is assigned to an external storage device. This option
assigns a drive letter to USB and FireWire devices in DOS.
5Click OK.
Setting TCP/IP drivers
Norton Ghost automatically searches for and installs the correct TCP/IP drivers
for your hardware setup. However, you can set the TCP/IP configuration
manually if your task fails or you need settings that are different from the
automatic setup. If your computer is running Windows NT 4 and you are using
TCP/IP, then you must manually set the network driver.
Page 55
Setting Norton Ghost options and defaults
To install TCP/IP drivers
1To set the default installation of TCP/IP drivers, in the Ghost Basic window,
Norton Ghost displays any detected installed drivers. Select the network
driver for the particular make and model of the network card that is
installed on the computer.
See “Selecting a template” on page 84.
■Click Browse to open the Ghost Boot Wizard and select a network card.
From the Ghost Boot Wizard you can add a network card. If your
network card is not on the list, you can modify a network card template.
See “Selecting a template” on page 84 and “Adding network drivers to
the Ghost Boot Wizard” on page 86.
4Select one of the following:
■Use DHCP: Use this option if your network contains a DHCP server.
■Static IP Address: Complete the fields below this option if your network
does not contain a DHCP server.
55Setting options and defaults
5Click OK.
Setting LPT peer-to-peer drivers
Norton Ghost automatically installs default LPT peer-to-peer drivers for your
hardware setup. However, you can set the LPT configuration manually if your
task fails or you need settings that are different from the automatic setup.
Page 56
56 Setting options and defaults
Setting Norton Ghost options and defaults
To install LPT peer-to-peer drivers
1To set the default installation of LPT drivers, in the Ghost Basic window, click
You can install drivers that are not included with Norton Ghost. You can also
modify Autoexec.bat and Config.sys, which are installed in the Virtual Partition.
Options.
The default mode for an LPT connection is ECP/EPP High Speed. If you are
having problems with your LPT connection, set the mode to Bidirectional
8bit or Bidirectional 4bit. The next time that you create a boot disk, the mode
is reset to the default, ECP/EPP High Speed.
If you have multiple parallel ports and want to connect using a port other
than the default LPT1, use the LPT port option to specify the port into which
your cable is plugged.
To install extra drivers
1Do one of the following:
■To set the default installation of extra drivers, in the Ghost Basic
window, click Options.
■To install the extra drivers while running a Windows wizard task, in the
2On the User files tab, click Add Files to add additional drivers.
3Click Add Directory to add additional directories.
4In the AUTOEXEC.BAT Additions field, type any additional Autoexec.bat
entries for the driver.
5In the CONFIG.SYS Additions field, type any additional Config.sys entries
for the driver.
6Click OK.
Page 57
Installing USB peer-to-peer drivers
You can select USB peer-to-peer drivers to install into the Virtual Partition. In
most cases, you do not need to alter the driver’s default. However, if you have
problems connecting using peer-to-peer, then select the other options and retry
the task.
To select USB peer-to-peer drivers
1Do one of the following:
■To set the default installation of extra drivers, in the Ghost Basic
window, click Options, and then click USB peer-to-peer settings.
■To install the USB drivers while running a Peer-to-Peer Wizard task, in
the Advanced Settings window, click USB peer-to-peer settings.
2Select one of the following:
■All drivers: Installs all USB peer-to-peer drivers into the Virtual
Partition.
■UHCI driver: Installs only UHCI drivers into the Virtual Partition.
■OHCI driver: Installs only OHCI drivers into the Virtual Partition.
Running your computer from the Virtual Partition
57Setting options and defaults
3Click OK.
Running your computer from the Virtual Partition
From Norton Ghost you can restart your computer into the Virtual Partition.
The Virtual Partition is created in DOS and includes the files that you have saved
in a selected folder. Once you have created a Virtual Partition from a folder, you
can run any application that you have provided in the selected folder.
The Virtual Partition is created with the following files:
■Ghreboot.exe
This executable file lets you restart your computer back into Windows.
■Selected driver settings
You can select drivers to include in the Virtual Partition that will let you
access external hardware.
■DOS applications stored in the selected folder
Any DOS applications that you provided in the selected folder are bundled
and included in the Virtual Partition.
If you include Autoexec.bat and Config.sys in the selected folder, then they are
modified by Norton Ghost when the Virtual Partition is created.
Page 58
58 Setting options and defaults
Checking the integrity of an image file
Before you create the Virtual Partition, you must create a folder that contains the
files that you want included in the Virtual Partition.
To create the Virtual Partition from a folder
1In the Ghost Basic window, click Ghost Advanced, and then click Create
2Click Next.
3Click Browse to select a directory from which to create the Virtual Partition.
4In the Required Free Space field, set the size in MB of the Virtual Partition.
5Click Next.
6If you want to set advanced driver settings, then click Advanced Settings.
7Click Next.
8Click Run Now to restart your computer in the Virtual Partition.
Virtual Partition.
See “Setting Norton Ghost options and defaults” on page 46.
The task summary displays the size of the folder that you have selected. The
Virtual Partition cannot be smaller than the folder size.
Restarting your computer from the Virtual Partition
To restart your computer back into Windows from the Virtual Partition, you
must run the Ghreboot executable.
You may also need to run Ghreboot if a task has failed and your computer is left
in the Virtual Partition.
To restart your computer in Windows
1At the command line, type ghreboot.
2Press Enter.
Checking the integrity of an image file
You can check the integrity of a Ghost image file. An integrity check ensures that
the data read from the image file is the same as the data written to the image file.
Norton Ghost performs a dummy restore of the image file. It does not check that
the data on the disk is the same as the data in the image file.
Page 59
Viewing the task log
To check the integrity of an image file
1In the Ghost Basic window, click Ghost Advanced, and then click Image
Integrity Check.
2Click Next.
3In the Create Image Integrity Check Wizard window, click Browse and find
the image file that you want to verify.
4If you want to view the contents of the image file in Ghost Explorer, click
Open image in Ghost Explorer.
See “Viewing image files” on page 119.
5Click Next.
6If you want to set advanced settings for the verification, then click Advanced
Settings.
See “Adding command-line switches to a task” on page 47.
7Click Next.
8In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
59Setting options and defaults
9Click Run Now to start the image verification.
Viewing the task log
The task log displays the tasks performed from the Norton Ghost wizards.
To view the task log
1In the Ghost Basic window, click View Log.
2In the Task Log Viewer window, select a log entry and click View Log.
Starting Ghost.exe
You can start Ghost.exe from Windows. This option restarts your computer in
DOS and opens Ghost.exe, which lets you run Norton Ghost interactively.
Page 60
60 Setting options and defaults
What to do if a task fails
To start Ghost.exe
1In the Ghost Basic window, click Ghost Advanced, and then click Run Ghost
2Click Next.
3If you want to set advanced settings for the backup, then click Advanced
4Click Next.
5In the Important Information dialog box, if you do not want to view this
6In the Disaster Recovery window, select one of the following:
Interactively.
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
warning again, click Don’t show this screen again, and then click Next.
■Launch Tutorials: Opens the tutorial index.
From the tutorials, you can select a tutorial that demonstrates how to
create a recovery boot disk.
■Continue: Returns to the Run Ghost Interactively Wizard.
This dialog box warns you to ensure that you can run Ghost.exe and access
your image file once it has been created. You may need to create a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
7Select one of the following:
■Run Now: Restarts your computer into DOS and launches Ghost.exe.
■Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
What to do if a task fails
If a Norton Ghost task fails, you are prompted to select one of the following
options:
■Exit to DOS: Closes Ghost.exe and returns to DOS.
■Return to Windows: Restarts your computer into Windows.
■Retry the operation: Executes the task again.
Page 61
Image file options
This chapter includes the following topics:
■About Norton Ghost image files
■Image files and compression
■Image files and CRC32
■Image files and volume spanning
■Image files and tape drives
■GoBack and Norton Ghost
Chapter
5
■Dynamic disks in Windows 2000/XP
■Hibernation and swap files
Page 62
62 Image file options
About Norton Ghost image files
About Norton Ghost image files
The image files created with Norton Ghost have a .gho or .ghs extension by
default. They contain the entire disk or partitions of the disk. Image files support
the following:
■Various levels of compression
■CRC32 data integrity checking
■Splitting of media files
■Spanning across volumes
Norton Ghost images contain only the actual data on a disk. If you have a 9 GB
drive with only 600 MB of data, the Norton Ghost image is approximately 600
MB, and is smaller if you use compression.
If you also use the Ghost Explorer application, an image file companion utility,
you can recover individual files selectively from these image files without
restoring the complete disk or partition.
Image files and compression
Image files created in Norton Ghost support several levels of data compression.
When Norton Ghost is in interactive mode, three compression options are
available: none, fast, and high. The Norton Ghost command-line switch -z
provides access to nine levels of compression.
See “Command-line switches” on page 153.
As a rule, the more compression you use, the slower Norton Ghost operates.
However, compression can improve speed when there is a data transfer
bottleneck. There is a big difference in speed between high compression and no
compression when creating an image file on a local disk. Over a network
connection, fast compression is often as fast as, or faster than, no compression.
Over a parallel cable, high compression is often faster than no compression
because fewer bytes are sent over the cable. Decompression of high-compressed
images is much faster than the original compression. The level of compression
that you select depends on your individual requirements.
Page 63
Performance expectations on a network
One advantage of Norton Ghost is speed. Many factors affect performance. There
are ways to gauge whether Norton Ghost is running optimally.
When you use Norton Ghost across a network, use the fast compression option.
If disk space is at a premium, you can use higher compression, but it can affect
speed.
Image files and CRC32
Cyclic Redundancy Checking (CRC) is a data error checking technique. CRC
ensures that the original data written to the image file is the same as the data on
the disk. CRC32 is a CRC technique that uses a 32-bit value to store error
checking information.
When an image file is created, CRC32 details are embedded into the file to ensure
that image file corruption is detected when the image is restored to disk. CRC32
is currently included on a file-by-file basis with FAT partitions and on a volume
basis for NTFS partitions.
In addition to image file error detection, the CRC values are used to verify that
image files and partitions or disks are identical. This offers an additional method
to detect bad sector writes and other drive anomalies that may be missed during
normal imaging checks.
Image files and CRC32
63Image file options
You can generate a text file that contains CRC values and associated file attributes
using the -CRC32 command-line switch.
See “Command-line switches” on page 153.
Image files and volume spanning
Images can be contained in a single file or spanned across a number of files.
Standard image files
Standard image files consist of a single file that contains the contents of the
complete disk or required partitions. This type of image file is stored on other
hard drives, tape, CD, or DVD drives where the volume is large enough to hold
the complete image file.
Page 64
64 Image file options
Image files and volume spanning
Limitations on the image file size
The default (and maximum) image file size is 2GB. However, by using
size-limited, multisegment image files, you can take an image of a disk or
partition that is larger than 2 GB.
Norton Ghost does support IDE drives larger than 128 GB. However, at the time
of this printing, no operating system supports these large drives.
Size-limited image files
There are situations in which it is not practical to have a standard image file.
Norton Ghost can split an image file into segments (known as spans) that are
limited to a user-specified size. This option is most commonly used to limit span
sizes to 620 MB for later transfer to a CD-ROM disc.
Spanned image files
Spanned image files are similar to size-limited image files. The difference is that
each segment file (or span) of the image file is limited by the actual volume size of
the media to which the image is being saved. This lets you specify a drive and file
name and lets Norton Ghost determine when to request another volume or
location for the remaining data. This is very useful when using ZIP, JAZ, LS120
Superdisk, CD-R/RW, and other drive types.
Spanning must be executed locally. If you try to span over a peer-to-peer
connection (LPT, USB, TCP/IP), a disk full error message appears. However, size
limiting can be used in all situations.
Norton Ghost also allows size limiting of spans when spanning volumes to ensure
that no span exceeds the maximum size.
With all image files, the only constraint on the selection of the destination volume
is that it must not be part of the source selection. For example, it cannot be on a
source disk or partition if that disk or partition is to be included in the image.
The spanned files are named according to Microsoft application guidelines. For
example:
■First file: Filename.gho
■Second file: Filen001.ghs
■Third file: Filen002.ghs
Page 65
Image files and volume spanning
You can use the -cns switch for an alternative naming standard. For example:
■First file: Image.gho
■Second file: Image.001
■Third file: Image.002
Spanning across multiple volumes and limiting span sizes
When you create an image file from a disk or partition, the destination drive
might have insufficient space to store the image file. If Norton Ghost determines
that this is the case, it alerts you and asks whether to enable spanning. Norton
Ghost assumes that compression reduces the size of the image by one-third when
it determines whether the image will fit. Alternatively, you can use the -span and
-split command-line switches to configure Norton Ghost to use image file size
limiting.
See “Command-line switches” on page 153.
Before it saves the disk contents to the image file, Norton Ghost shows the source
and destination details and offers a chance to cancel. The default is to cancel.
Once the process starts, the image file creation continues until the destination
volume is full.
65Image file options
If you started spanning onto a JAZ disk and want to span a 3.0 GB drive onto JAZ
disks, you can choose to continue on JAZ disks. If you want to span across
different forms of media, you can select a different type of media once the first
portion of the span has completed. You cannot mix CD/DVD media with other
types of media, such as JAZ or hard disk.
Record where the span segments are saved and the segment file names. Norton
Ghost does not record the locations and file names you selected.
Information about the partitions is stored at the start of the image file. This is
updated at the end of the Ghost process, which might require you to reinsert the
first disk in the span set. Norton Ghost prompts you for the first disk in the span
set and for subsequent volumes when restoring from an image.
Restoring from a spanned image
The process when restoring a disk or partition from a spanned image file is the
same as restoring from an unspanned image file. However, during the restoration
of the spanned image file, you are prompted for the locations of the image file
spans. You must know the span segment locations and file names.
Page 66
66 Image file options
Image files and tape drives
You can continue on the same form of media. For example, if you originally
spanned onto a JAZ disk and want to restore a 3.0 GB drive from JAZ disks, you
can replace the disk and continue from JAZ disks. Alternatively, you can restore
from different media types.
Norton Ghost automatically restores spanned images without prompting if it can
find the next span.
See “Adding switches to your Ghost operation” on page 108.
Image files and tape drives
The Backup, Restore, and Clone Wizards do not support tape drives. You can
back up, restore, and clone using Ghost.exe. Ghost.exe support of SCSI tape
drives allows the storage of a single image file on a tape. When the image is
written to the tape, Ghost.exe uses no associated file system, which means that
you are unable to access the tape from a drive letter as if it were another storage
drive. SCSI tapes do not support spanning to multiple tapes.
When you use tape drives with Ghost.exe, you can select the tape drive as the
source or destination device in the File Locator window. Each SCSI tape device is
shown as MTx, where x is a number starting at 0 and increasing incrementally for
each drive present. For example, the following screen shows a tape drive MT0
available for use.
For Ghost.exe to access SCSI tape drives, a DOS ASPI driver must be installed
prior to use.
See “Standard boot disks” on page 76.
Page 67
Ghost.exe in its default mode performs well with most SCSI tape devices. In some
situations with older SCSI tape devices and possibly with unreliable tapes,
Ghost.exe may need to be configured to slow down or alter the way it uses the
tape device.
See “Command-line switches” on page 153.
Note: Ghost Explorer cannot access an image stored on tape.
GoBack and Norton Ghost
If GoBack is installed on your computer, then you cannot directly create image
files or restore your computer.
You must disable GoBack before you use Norton Ghost wizards.
GoBack and Ghost.exe
To run Ghost.exe with GoBack, do one of the following:
GoBack and Norton Ghost
67Image file options
■Uninstall GoBack and then run Ghost.exe as usual to take an image or restore
a computer.
■To take an image of your computer, in the GoBack Boot Screen, select the
option to start your computer from a floppy disk with the GoBack drivers
loaded. You can then use a Ghost boot disk to start Ghost.exe and take an
image file.
See the GoBack user documentation.
See “Creating a backup image file” on page 97.
■To restore your computer, start your computer from a floppy disk. You can
then use a Ghost boot disk to start Ghost.exe and restore your computer.
See “Restoring from an image file” on page 101.
Page 68
68 Image file options
Dynamic disks in Windows 2000/XP
Dynamic disks in Windows 2000/XP
Norton Ghost supports backing up, restoring, and cloning simple or mirrored
volumes on dynamic disks. Spanned, striped, and RAID-5 volumes are not
supported by Norton Ghost. You can back up an image of a partition on a disk in
a dynamic disk set to an image file. If you back up a disk, then all of the partitions
that Ghost supports on the disk, and only those partitions, are backed up to an
image file.
Note: Norton Ghost supports simple volumes in a contiguous space. If a
partition is not of this type, then it is not included in the image file.
Operations that support dynamic disks are as follows:
■Partition to partition
■Partition to image
■Disk to disk
■Disk to image
■Check image
■Check disk
■CRC32
■CRC32 verify
You can restore an image of a dynamic disk only to a basic disk, not to a dynamic
disk. After you have restored the image file to a basic disk, you can then use
Windows 2000 Disk Manager to convert the disk to a dynamic disk.
To delete a dynamic disk, use GDisk. Use the switch gdisk /mbr /wipe to delete all
partitions from the disk. This method destroys all data on the disk.
See “Reinitializing the Master Boot Record” on page 132.
You can also take a disk image of a dynamic disk if you use the image all (-ia)
switch. The -ia switch performs a sector-by-sector copy of the entire disk. The
disk on which the image is to be restored must be identical to the source disk in
every way. This function is only useful for creating a backup. If you restore an
image created using -ia onto a drive with different geometry, Windows 2000
cannot interpret the dynamic disk.
Page 69
If you restore an -ia disk image of a dynamic disk onto a SCSI hard drive and you
see a Destination drive too small message, you must load the ASPI driver for the
SCSI card. Without an ASPI driver, Norton Ghost does not always detect the
correct size of the SCSI drive and cannot determine whether the drive is large
enough to hold the image.
Note: You should not take an image all of a dynamic disk because the method is
slow and the image file would be very large.
Hibernation and swap files
When Norton Ghost creates image files or clones, it does not include hibernation
and swap files. These files are valid only for one Windows session, and when they
are included in an image file, they make it significantly larger.
Norton Ghost implements file skipping differently for each type of file system.
■FAT file systems: Files are not included on the image file or destination disk.
■NTFS file systems: A file with the same name is created on the image file or
destination disk, but the contents of the file are not copied.
Hibernation and swap files
69Image file options
The following files are skipped on all file systems:
■386Spart.par
■Amizvsus.pmf
■Dos data.sf
■Ghost.dta
■Hiberfil.sys
■Hibrn8.dat
■Hybern8
■Navsysl.dat
■Navsysr.dat
■Pagefile.sys
■Pm_hiber.bin
■Save2dsk.bin
■Saveto.dsk
Page 70
70 Image file options
Hibernation and swap files
■Spart.par
■Swapper.dat
■To s h i b e r . d a t
■Virtpart.dat
■Win386.swp
Page 71
Chapter
Creating boot disks with
the Ghost Boot Wizard
This chapter includes the following topics:
■Introducing the Norton Ghost Boot Wizard
■What is a Ghost boot disk
■When to create a Ghost boot disk
■How to use a Ghost boot disk
6
■Files included on a Ghost boot disk
■Creating a recovery boot disk
■Opening the Ghost Boot Wizard
■Creating boot disks and boot images
■Selecting a template
■Multicard templates and the boot disk
■Adding network drivers to the Ghost Boot Wizard
■Adding command-line parameters to a boot package
■Providing MS-DOS
Page 72
72 Creating boot disks with the Ghost Boot Wizard
Introducing the Norton Ghost Boot Wizard
Introducing the Norton Ghost Boot Wizard
The Ghost Boot Wizard creates Ghost boot disks that let you complete various
Ghost tasks when starting Norton Ghost from DOS. For any task, the Ghost Boot
Wizard guides you through the different steps to select the settings and drivers
that are needed to create the boot disk.
What is a Ghost boot disk
A Ghost boot disk can be created using the Ghost Boot Wizard, a utility supplied
with Norton Ghost. A boot disk is a floppy disk that loads DOS and driver files to
let you run Ghost.exe on your computer.
Depending upon the driver files included on your boot disk, more than one
floppy disk may be required to create a boot disk set.
When to create a Ghost boot disk
If you start and run Norton Ghost from Windows, then the only boot disk you
need is a recovery boot disk. If you are running Norton Ghost from Windows,
then the system files and drivers required to perform the backup, restore, or clone
are provided for you.
Note: If you saved your image file directly to CD or DVD, then you do not need a
recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to
CD or DVD.
To use Ghost.exe you must have a Ghost boot disk. The following tasks require a
boot disk:
■Restoring your computer with Ghost.exe after software or hardware failure
■Cloning a computer that does not have Windows installed
How to use a Ghost boot disk
Once you have created the necessary boot disks, you can insert a boot disk into
your computer and restart your computer. This starts the computer in DOS and
starts Ghost.exe. You can then run Ghost.exe to back up, restore, and clone on
your computer from DOS.
See “Starting the Norton Ghost executable” on page 93.
Page 73
Files included on a Ghost boot disk
A Ghost boot disk contains the files required to run Ghost.exe. This includes the
following:
■Ghost.exe
The Norton Ghost for DOS executable.
■DOS system files
PC-DOS is supplied for the purpose of creating Ghost boot disks. The DOS
files are installed automatically when you create the boot disk in Ghost Boot
Wizard.
■Any files and drivers required to access the selected hardware
This includes CD-R/RW drivers, network protocol files, or network interface
card drivers.
Note: In previous versions of Norton Ghost, MSCDEX was required to read an
image from a CD. This is no longer necessary in Norton Ghost 2003.
Files included on a Ghost boot disk
73Creating boot disks with the Ghost Boot Wizard
When to include MS-DOS on a boot disk
By default, Norton Ghost includes PC-DOS on a Ghost boot disk. However,
some computer models may not start from a Ghost boot disk that contains PCDOS. If your computer does not start from a Ghost boot disk, create a new Ghost
boot disk from the Ghost Boot Wizard and include Windows 95/98 MS-DOS.
You must provide Windows 95/98 MS-DOS for the computer running the Ghost
Boot Wizard before you create an MS-DOS Ghost boot disk.
See “Providing MS-DOS” on page 89.
Creating a recovery boot disk
When you have created your first backup image, you must create a recovery boot
disk and ensure that you can start your computer and access the backup image
using the boot disk.
Note: If you saved your image file directly to CD or DVD, then you do not need a
recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to
CD or DVD.
Page 74
74 Creating boot disks with the Ghost Boot Wizard
Opening the Ghost Boot Wizard
See Table 6-1 to determine which type of boot disk you should create as a disaster
recovery disk.
Once you have created a recovery boot disk, ensure that your computer starts
with the boot disk or the CD/DVD.
To test your recovery boot disk or CD/DVD
1Turn off your computer.
2Insert the boot disk or CD/DVD into the disk drive of your computer and
start your computer.
3Ensure that Ghost.exe starts and that you can access your backup image file.
See “Restoring a hard disk from an image file” on page 101.
4Remove the disk from the disk drive of your computer and restart your
computer.
Opening the Ghost Boot Wizard
The procedures in this chapter assume that you know how to open the Ghost
Boot Wizard.
To open the Ghost Boot Wizard
1On the Windows taskbar, click Start > Programs > Norton Ghost.
2In the Ghost Basic window, click Ghost Utilities.
3In the Ghost Advanced window, click Norton Ghost Boot Wizard.
Page 75
Creating boot disks and boot images
The processes for creating boot images and disks can include any of the following
features:
■Support for CD-R/RW, DVD, LPT, USB, and FireWire
■Network support for TCP/IP peer-to-peer connections
■Support for reading an image from a CD-ROM
■Support for mapping network drives
See Table 6-1 to decide which boot disk you should make.
Table 6-1Boot disk types
Intended use of boot diskGhost Boot Wizard options to select
Creating boot disks and boot images
75Creating boot disks with the Ghost Boot Wizard
Local use of Norton Ghost:
■Disk-to-disk clone
■Partition-to-partition clone
■Disk or partition backup to local
disk or partition
■Disk or partition backup to local
JAZ or ZIP drive
■Disk or partition restore from local
disk or partition
■Disk or partition restore from local
JAZ or ZIP drive
■Clone, back up, or restore over peer-
to-peer connection between two
computers using LPT or USB cable.
■Clone, back up, or restore over TCP/
IP peer-to-peer connection with
network support between two
computers
■Back up a computer directly to an
image file on a CD-ROM on a CD
writer supported by Norton Ghost.
■Restore a computer from an image
file on a CD-ROM on a CD-R/RW
drive supported by Norton Ghost.
See “Image files and CD/DVD
writers” on page 112.
You can use either of the following options:
■Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
■Peer-to-Peer Network Boot Disk
See “Boot disks with network support”
on page 79.
Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
Peer-to-Peer Network Boot Disk
See “Boot disks with network support” on
page 79.
Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
Page 76
76 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
Table 6-1Boot disk types
Intended use of boot diskGhost Boot Wizard options to select
■Back up a computer directly to an
image file on a DVD on a DVD
writer supported by Norton Ghost.
■Restore a computer from an image
file on a DVD on a DVD drive
supported by Norton Ghost.
■Restore a computer from a Ghost
image file on a CD-ROM on a CDR/RW drive not supported by
Norton Ghost. The image file was
not stored on the CD-ROM using
Norton Ghost. Contains generic
CD-ROM drivers.
■Access files other than a Ghost image
file on a CD-ROM.
■Map a drive on a workstation to a
shared resource on a server and use
Norton Ghost to clone, back up, or
restore.
Standard boot disks
Standard Ghost Boot Disk
See “Standard boot disks” on page 76.
CD/DVD Startup Disk with Ghost
See “Boot disks with CD-ROM and DVD
support” on page 81.
CD/DVD Startup Disk with Ghost
See “Boot disks with CD-ROM and DVD
support” on page 81.
Drive Mapping Boot Disk
See “Boot disks with drive mapping network
support” on page 82.
The Ghost Boot Wizard creates a boot disk that does any one or a combination of
the following:
■Runs Ghost.exe for local operations.
■Lets you write Ghost images directly to a CD-R/RW on a CD writer
supported by Norton Ghost.
See “Image files and CD/DVD writers” on page 112.
■Lets you write Ghost images directly to a DVD on a DVD writer supported
by Norton Ghost.
Page 77
Creating boot disks and boot images
■Runs Ghost.exe on two computers connected by either an LPT or USB cable.
The default mode for an LPT connection is ECP/EPP High Speed. If you are
having problems with your LPT connection, set the mode to Bidirectional
8bit or Bidirectional 4bit. The next time that you create a boot disk, the
mode is reset to the default, ECP/EPP High Speed.
If you have multiple parallel ports and want to connect using a port other
than the default LPT1, use the LPT port option to specify the port into which
your cable is plugged.
■Lets you use Ghost.exe to back up to or restore from an external device
connected by USB or FireWire.
To create a boot disk to run Ghost.exe, or with support for LPT, USB, or
FireWire cables
1In the Ghost Boot Wizard window, click Standard Ghost Boot Disk.
2Click Next.
3Do one or more of the following:
■Check USB support to add support for USB peer-to-peer to the boot
disk.
■Click Advanced to set the USB peer-to-peer drivers.
See “Setting the USB peer-to-peer drivers” on page 79.
■Check LPT support to add support for LPT peer-to-peer to the boot
disk.
■Click Advanced to change the LPT mode or port.
■Click No USB support to exclude support for USB external devices.
■Click USB 1.1 support to add support for USB 1.1 external devices to the
boot disk.
If any of your USB cards/chipsets are USB 1.1, then you must select this
option.
■Click USB 2.0 support to add support for USB 2.0 external devices to the
boot disk.
If any of your USB cards/chipsets are USB 1.1, then do not select this
option. Select the USB 1.1 support option.
■Click Firewire Support to add support for FireWire external devices to
the boot disk.
77Creating boot disks with the Ghost Boot Wizard
Page 78
78 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
■Click Assign DOS drive letters to assign a DOS drive letter to a USB or
FireWire external device.
■Click Include Adaptec ASPI drivers to add Adaptec ASPI drivers to the
boot disk.
These drivers are required to write an image directly to a SCSI CD-R
that is supported by Norton Ghost.
4Click Next.
5Select one of the following:
■Use PC-DOS: Includes PC-DOS on the boot disk.
■Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
6Click Next.
7In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Norton Ghost.
The default path to the Norton Ghost executable appears in the Ghost.exe
field.
8In the Parameters field, type any required command-line parameters.
See “Adding command-line parameters to a boot package” on page 88.
9Click Next.
10 In the Floppy Disk Drive field, select the appropriate drive letter.
11 In the Number of disks to create field, select the number of disks that you
want to create.
12 Ensure that Format disk(s) first is checked to format the disks before disk
creation.
Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not
bootable.
13 Ensure that Quick Format is checked to perform a quick format.
14 Click Next.
15 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 79
Setting the USB peer-to-peer drivers
You can select USB peer-to-peer drivers to include on the boot disk. In most
cases, you do not need to alter the driver default. However, if you have problems
connecting using peer-to-peer, then select the other options and retry the task.
To select USB peer-to-peer drivers
1Select one of the following:
■All drivers: Includes all USB peer-to-peer drivers on the boot disk.
■UHCI driver: Includes only UHCI drivers on the boot disk.
■OHCI driver: Includes only OHCI drivers on the boot disk.
2Click OK.
Boot disks with network support
The Ghost Boot Wizard helps you create boot disks that provide network support
for TCP/IP peer-to-peer connections. You can use these boot disks to clone,
restore, or back up using Norton Ghost on computers that are connected over a
TCP/IP peer-to-peer connection.
Creating boot disks and boot images
79Creating boot disks with the Ghost Boot Wizard
Before you start this process, you need to know the types of network cards that
are installed on your client computers. Unless you use the multicard template,
you must create a boot disk for each network card.
3Select the network driver for the make and model of the network card
installed on the client computer.
See “Selecting a template” on page 84.
If the correct driver is not in the list, add the driver.
See “Adding network drivers to the Ghost Boot Wizard” on page 86.
You can add more than one driver to the boot package.
See “Multicard templates and the boot disk” on page 85.
4Click Next.
Page 80
80 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
5Select one of the following:
■Use PC-DOS: Includes PC-DOS on the boot disk.
■Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
6In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Ghost.
The default path to the Norton Ghost executable appears in the Ghost.exe
field.
7In the Parameters field, type any required command-line parameters.
See “Adding command-line parameters to a boot package” on page 88.
8Click Next.
9Do one of the following:
■Click DHCP will assign the IP settings if your network contains a
DHCP server.
■Click The IP settings will be statically defined and complete the fields
below this option if your network does not contain a DHCP server.
If you create more than one boot disk, then the static IP address
incrementally increases as each boot disk is created.
10 Click Next.
11 In the Floppy Disk Drive field, select the appropriate drive letter.
12 In the Number of disks to create field, select the number of disks that you
want to create.
13 Ensure that Format disk(s) first is checked to format the disks before disk
creation.
Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not
bootable.
14 Ensure that Quick Format is checked to perform a quick format.
15 Click Next.
16 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 81
Boot disks with CD-ROM and DVD support
A boot disk with CD-ROM and DVD support lets you access images and other
files stored on CD-R/RW and DVD drives that are not supported by Norton
Ghost.
This kind of disk also contains the DOS system files and Norton Ghost.
To create a boot disk with CD-ROM and DVD support
1In the Ghost Boot Wizard window, click CD/DVD Startup Disk with Ghost.
2Click Next.
3Select one of the following:
■Use PC-DOS: Includes PC-DOS on the boot disk.
■Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
4Click Next.
5In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Ghost.
The default path to the Ghost executable appears in the Ghost.exe field.
Creating boot disks and boot images
81Creating boot disks with the Ghost Boot Wizard
6In the Parameters field, type any required command-line parameters.
See “Adding command-line parameters to a boot package” on page 88.
7Click Next.
8In the Floppy Disk Drive field, select the appropriate drive letter.
9In the Number of disks to create field, select the number of disks that you
want to create.
10 Ensure that Format disk(s) first is checked to format the disks before disk
creation.
Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not
bootable.
11 Ensure that Quick Format is checked to perform a quick format.
12 Click Next.
13 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 82
82 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
Boot disks with drive mapping network support
When your computers need to access a network drive, use the Ghost Boot Wizard
to create boot disks that map a drive letter to a shared resource on a network
server. This lets you use the local option in Ghost.exe to access a network drive.
To create a boot disk that supports mapping network drives
3Select the network driver for the particular make and model of the network
card installed on the computer.
See “Selecting a template” on page 84.
If the correct driver is not in the list, add the driver.
See “Adding network drivers to the Ghost Boot Wizard” on page 86.
You can add more than one driver to the boot package.
See “Multicard templates and the boot disk” on page 85.
4Click Next.
5Select one of the following:
■Use PC-DOS: Includes PC-DOS on the boot disk.
■Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
6Click Get MS Client and browse to the MS-DOS Client files to include the
Microsoft Client files if you are using MS-DOS.
If you are using MS-DOS, you must include the Microsoft DOS Client files.
You must install the files on the Ghost Boot Wizard computer before you can
include them in the boot package.
See “Installing MS-DOS Client files” on page 49.
7Click Next.
8In the Computer Name field, type the name of the client computer.
This specifies the name of the computer after it starts from the floppy disk
and does not have to be the same name given to the computer in Windows. If
you create more than one disk, a number is added to the computer name so
that the names for subsequent disks are unique.
9In the User Name field, type the user name that the boot disk will use to log
on to the network.
This user must exist on the network and have sufficient access rights to the
files and directories that you want to use.
Page 83
Creating boot disks and boot images
10 In the Domain field, type the domain to which the user belongs.
11 In the Drive Letter field, select a drive letter to access a network share through
a mapped drive.
Select a drive letter greater than any existing drive letter.
12 If you want to prevent the boot package from mapping a drive when the
computer starts, click None.
In this case, map a drive from the DOS prompt after the computer has
started.
13 In the Maps To field, type the complete UNC path to the network share.
For example, to access a shared folder named Ghost on a computer named
Boss, the UNC path is \\Boss\Ghost.
14 Click Next.
15 Do one of the following:
■Click DHCP will assign the IP settings if your network contains a
DHCP server.
■Click The IP settings will be statically defined and complete the fields
below this option if your network does not contain a DHCP server. Your
network administrator can provide the values for these fields.
83Creating boot disks with the Ghost Boot Wizard
16 Click Next.
17 In the Floppy Disk Drive field, select the appropriate drive letter.
18 In the Number of disks to create field, select the number of disks that you
want to create.
19 Ensure that Format disk(s) first is checked to format the disks before disk
creation.
Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not
bootable.
20 Ensure that Quick Format is checked to perform a quick format.
21 Click Next.
22 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Page 84
84 Creating boot disks with the Ghost Boot Wizard
Selecting a template
Selecting a template
For the boot disk to work correctly, it is important that you select the correct
template. When you create a boot disk for client computers, the template that
you select must be suitable for the network cards installed in the computers that
are to start from the package.
To determine which network interface card is installed in a computer, find the
name of the driver from Network Properties within Windows. This must be done
on the client computer for which you are preparing the boot disk.
To determine which network interface card is installed
To determine which network interface card is installed on a Windows 98
computer
1On the Windows taskbar, click Start > Settings > Control Panel.
2Double-click System.
3Click Device Manager.
4Expand Network Adapter.
The make and model of the installed network interface card are listed.
To determine which network interface card is installed on a Windows NT 4
computer
1On the Windows taskbar, click Start > Settings > Control Panel.
2Double-click Network.
The make and model of the installed network interface card are listed on the
Adapters tab.
To determine which network interface card is installed on a Windows 2000
computer
1On the Windows taskbar, click Start > Settings > Control Panel.
2Double-click System.
3On the Hardware tab, click Device Manager.
4Expand Network adapters.
The make and model of the installed network interface card are listed.
The name of the network interface card as shown in Windows may not exactly
match the name of the correct template in the Ghost Boot Wizard.
Page 85
Multicard templates and the boot disk
For example, Windows may list the card as 3Com Fast EtherLink XL 10/100Mb
TX Ethernet NIC (3C905B-TX). In this case the text in paraenthesis is the actual
model number of the card, which indicates that the Ghost Boot Wizard template
named 3COM 3C90X (which works for all 3C90- cards) is the correct template.
In some cases you may have a choice between an NDIS2 driver and a packet
driver version of the same template. Both templates should work, but you may
find that one gives better performance. Experiment to see which one works
better.
It is possible that there is no existing template in the Ghost Boot Wizard that is
suitable for the network interface card installed in your computer. In this case,
obtain the DOS drivers for the network interface card either from the disk
supplied with the card or from the manufacturer's Web site, and add a new
template to the Ghost Boot Wizard.
See “Adding network drivers to the Ghost Boot Wizard” on page 86.
If you have different network interface cards installed in client computers, then
you may be able to use the multicard template to create a single boot package that
works on each of your computers without modification.
85Creating boot disks with the Ghost Boot Wizard
Multicard templates and the boot disk
You can use multicard templates to create a boot disk package containing several
NDIS2 drivers. When the computer starts from the boot disk, a special multicard
driver checks the computer’s hardware to see if any of the NDIS2 drivers can be
used to access the installed network card.
Multicard templates are useful because several makes and models of network
cards are often used in a single LAN. You can create a single boot disk for use with
all of your computers without modification.
Refer to the Software License Agreement for use restrictions.
The Network Interface Card window is available when creating a
Network Boot D
To create a multicard template
1In the Network Interface Card window, click Multicard Template.
2Click Next.
3Select the required drivers from the list of NDIS2 drivers.
Select no more than four or five drivers, as space is limited on a floppy disk.
4Click Next to continue creating the boot disk.
isk or a Drive Mapping Boot Disk.
Peer-to-Peer
Page 86
86 Creating boot disks with the Ghost Boot Wizard
Adding network drivers to the Ghost Boot Wizard
Adding network drivers to the Ghost Boot Wizard
The Ghost Boot Wizard includes drivers for over 130 network interface cards. If
your driver is not in the list, you can add it to the wizard so that it is set up the
next time that you need it.
The Network Interface Card window is available when creating a Peer-to-Peer
Network Boot Disk or a Drive Mapping Boot Disk.
To begin adding a network driver to the Ghost Boot Wizard
1In the Network Interface Card window, click Add.
2Select one of the following:
■Packet Driver
■NDIS2 Driver
Many manufacturers ship both drivers with their network cards so you
have a choice of which one to use.
3Click OK to continue creating the boot disk.
Adding packet drivers to the Ghost Boot Wizard
Packet drivers are usually DOS executables (with .com or .exe file extensions) that
load from the Autoexec.bat file before Norton Ghost loads. Norton Ghost
communicates directly with the packet driver to use the services provided by the
network card.
To add a packet driver to the Ghost Boot Wizard
1In the Template Properties window, on the Packet Driver tab, in the Driver
Executable field, click Browse to locate the packet driver so that the Ghost
Boot Wizard can copy the file to the current template.
Packet drivers are usually included on the driver disk supplied with the
network card. If you are installing the packet driver from the original disks
that came with your network interface card, the packet driver should be in a
directory called Packet or Pktdrv.
2In the Parameters field, type the command-line parameters if the network
card requires them.
These parameters vary from driver to driver and are usually optional with
plug-and-play network cards. Consult the documentation that came with the
network card. This is often in the form of a Readme.txt file in the same
directory as the driver itself.
Page 87
Adding network drivers to the Ghost Boot Wizard
3Click Select Automatically to let Ghost determine the best multicasting
mode based on the information in the packet driver.
If the Select Automatically mode does not work, try Receive Mode 5. If that
does not work, try Receive Mode 6.
Adding NDIS2 drivers to the Ghost Boot Wizard
NDIS2 drivers work with the Microsoft Network Client. NDIS2 drivers are DOS
drivers that load from the DOS Config.sys file.
To add an NDIS2 driver to the Ghost Boot Wizard
1In the Template Properties window, on the NDIS Driver tab, click Setup.
2Locate the NDIS2 driver.
In many cases Ghost can automatically determine the other parameters for
your network.When locating the directory that contains the driver, look for a
folder named Ndis or Ndis2. If you have a choice between DOS and OS2
folders, select DOS.
3Click OK.
If the setup fails to complete the driver properties, then complete the
following fields manually:
■Filename: Type the DOS file name for the NDIS2 driver.
■Driver Name: Type the internal name of the driver.
The internal name of the driver is used when generating the Protocol.ini
configuration file and must always end with a $ character. Read the
sample Protocol.ini file in the same directory as the driver itself to find
the driver name.
■Parameters: Type the parameters for the Protocol.ini configuration file.
If you use Setup to automatically fill in this page, you will see the parameters
that you need to adjust. For the majority of plug-and-play cards, all of the
parameters are optional, so you can either accept the defaults or leave this
field empty.
87Creating boot disks with the Ghost Boot Wizard
4Click OK.
When you have created the template that you require, you can continue creating
a boot disk.
Page 88
88 Creating boot disks with the Ghost Boot Wizard
Adding command-line parameters to a boot package
Customizing the template
You may require additional drivers and programs in order to use the network
device attached to your computer. For example, many USB network devices must
load an extra driver for the USB port before the driver for the network device.
You can add files to the template and customize the Autoexec.bat and Config.sys
files of the resulting boot disk. Usually these are either DOS drivers or executable
programs, but you can add any type of file. Files added to the template appear in
the list to the right of the button.
If this template is used as a multicard template, then any additional files or
modifications are overridden by its settings.
The Template Properties window is available when creating a
Boot Disk or a Drive Mapping Boot Disk.
To modify a template
1In the Template Properties window, on the Advanced tab, click New.
2Click Delete to delete the selected file from the list.
3In the Autoexec.bat field, type any additional Autoexec.bat entries for the
driver.
The entries appear before any network-related commands, such as
Netbind.com or the packet driver executable.
4In the Config.sys field, type any additional Config.sys entries for the driver.
The entries appear before any driver-related devices to ensure that the
enabling drivers load before the main network device drivers specified on the
network driver page.
Peer-to-Peer Network
Adding command-line parameters to a boot package
You can add command-line parameters to a boot package to instruct Norton
Ghost to perform certain actions.
See “Command-line switches” on page 153.
Command-line parameters can be added while creating a Standard Boot Disk, a
Peer-to-Peer Network Boot Disk, or a CD/DVD Startup Disk with Ghost boot
disk in the Ghost executable location window.
Page 89
In the following example, the parameters instruct Norton Ghost to back up your
main disk to an image on another drive.
dst=D:\Backups\Maindrv.ghoSaves the image to the file D:\Backups\Maindrv.gho
Providing MS-DOS
The Ghost Boot Wizard includes PC-DOS on boot disks. However, a boot disk
that includes PC-DOS might not start all computers. When you create a boot
disk, you can include MS-DOS instead of PC-DOS.
If you use MS-DOS, then you must provide MS-DOS files on the computer on
which you are creating the boot disk. Using an MS-DOS system disk that was
formatted on a Windows 95/98 computer, you can install the MS-DOS files
during the creation of the boot disk.
Providing MS-DOS
89Creating boot disks with the Ghost Boot Wizard
To install MS-DOS on your computer
To create an MS-DOS system disk on a Windows 95/98 computer
1Insert a blank floppy disk into drive A of a Windows 95/98 computer.
2Click Start > Program Files > Windows Explorer.
3Right-click drive A.
Warning: Do not right-click drive C.
4Click Format.
5Check Copy System Files.
6Click Start to format the disk.
You can install or uninstall MS-DOS while you are creating a boot disk.
Page 90
90 Creating boot disks with the Ghost Boot Wizard
Providing MS-DOS
To install MS-DOS on your computer
1Insert the formatted floppy disk into drive A of the computer on which the
Ghost Boot Wizard is running.
2In the DOS Version window, click Get MS-DOS.
3Click OK.
To uninstall MS-DOS from your computer
1In the DOS Version window, click Remove MS-DOS.
2Click OK.
Page 91
Chapter
Backing up, restoring,
and cloning from DOS
This chapter includes the following topics:
■An overview of using Ghost.exe
■Starting the Norton Ghost executable
■Navigating without a mouse
■Establishing a peer-to-peer connection with Ghost.exe
7
■Creating a backup image file
■Restoring from an image file
■Cloning disks and partitions
■Verifying image integrity
■Adding switches to your Ghost operation
Page 92
92 Backing up, restoring, and cloning from DOS
An overview of using Ghost.exe
An overview of using Ghost.exe
You can use the Norton Ghost executable, Ghost.exe, to clone a computer, create
a backup, and restore a computer. You can add switches to the cloning task in the
Options window or as parameters to Ghost.exe. Ghost.exe is run within DOS.
The following is an overview of the process of using Ghost.exe.
To use Norton Ghost
1Start Ghost.exe.
Add command-line switches, if necessary.
See “Command-line switches” on page 153.
2If you want to establish a peer-to-peer connection, then set up the
connection.
3Select the Norton Ghost operation:
■Disk or partition to image file
■Disk or partition from image file
■Disk to disk
■Partition to partition
4Do one of the following:
■Select the source hard disk or partitions.
■Select the image file.
5Do one of the following:
■Select the destination hard disk or partition.
■Select the image file.
Make sure that you select the correct destination to overwrite. The
destination disk is completely overwritten with no chance of recovering any
data.
6Complete the Ghost operation.
Note: On the Ghost.exe main menu, the option of GhostCast is not supported.
The GhostCast functionality is available only with Symantec Ghost Enterprise
Edition. If you require GhostCast functionality, see “Service and support
solutions” on page 209.
Page 93
Starting the Norton Ghost executable
Starting the Norton Ghost executable
The Norton Ghost executable is a DOS-based application and runs in DOS mode
outside of Windows. If you run the Norton Ghost executable (Ghost.exe) within
Windows 95/98/Me, note the following:
■Files may be in an open or changing state. If these files are cloned or backed
up, the resulting destination files are left in an inconsistent state.
■The partition on which Windows is installed must not be overwritten.
■If you overwrite a disk or partition, the computer must be restarted.
■Ghost.exe does not automatically restart the system.
■Hard disk sizes may appear smaller than their actual sizes. The Norton Ghost
executable can only access the shown destination size. The remaining space is
not used.
■The Norton Ghost executable fails if you try to overwrite any of the
following:
■Windows swap files
■Registry files
■Open files
93Backing up, restoring, and cloning from DOS
You cannot run Ghost.exe within Windows NT, Windows 2000/XP, Linux, OS/2,
or other non-DOS operating systems. To run Ghost.exe on a computer that runs
a non-DOS operating system, start the computer in DOS using a Ghost boot disk.
Page 94
94 Backing up, restoring, and cloning from DOS
Navigating without a mouse
To start the Norton Ghost executable
◆Do one of the following:
■Insert a Ghost boot disk into the floppy disk drive of your computer and
start your computer.
See “Creating boot disks and boot images” on page 75.
■For Windows 98 computers, start your computer in DOS. At the DOS
prompt, type:
C:> \progra~1\symantec \Norton~1\ghost.exe
Running Norton Ghost in DOS may require additional DOS drivers to
let Norton Ghost access and use some hardware. If you cannot access
some hardware, such as a CD-R/RW drive, then create a boot disk that
contains the drivers to access the hardware in DOS.
See “Creating boot disks and boot images” on page 75.
■Use the Run Ghost Interactively Wizard.
See “Starting Ghost.exe” on page 59.
Marking your disks
The first time that you run Ghost.exe on your computer, the License agreement
warning dialog box appears. When you click OK, Norton Ghost marks all hard
disks to ensure that you do not see this message again.
To mark your disks
◆In the License agreement warning dialog box, click OK to mark your hard
disks.
Navigating without a mouse
If you have mouse drivers loaded, then you can use the mouse to navigate in
Norton Ghost. You can also use the keyboard.
■Use arrow keys to navigate the menu.
■Press Tab to move from button to button.
■Press Enter to activate the selected button.
■Press Enter to select an item in a list.
Page 95
Establishing a peer-to-peer connection with Ghost.exe
Establishing a peer-to-peer connection with
Ghost.exe
If you are using an LPT, USB, or TCP peer-to-peer connection, then you must set
up the connection between your computers before a clone, backup or restore
operation.
The computers must be physically connected using one of the following:
■LPT: A parallel connection cable
■USB: A USB 1.1 cable
■TCP peer-to-peer: A network connection
See “TCP/IP connections” on page 178.
In a peer-to-peer operation, one computer is designated the master computer,
and the other is designated the slave computer. This table describes the possible
Norton Ghost processes and the master/slave relationships that exist between two
computers.
Table 7-1Master and slave computers
95Backing up, restoring, and cloning from DOS
ActionMasterSlave
Disk-to-disk cloneComputer containing source
disk
Back up disk to image
file
Restore disk from
image file
Partition-to-partition
clone
Back up partition to
image file
Restore partition from
image file
Computer containing source
disk
Computer containing
destination disk
Computer containing source
partition
Computer containing source
partition
Computer containing
destination partition
Computer containing
destination disk
Computer receiving
destination image file
Computer containing source
image file
Computer containing
destination partition
Computer receiving
destination image file
Computer containing source
image file
Select which computer is the master (the computer from which you control the
connection), and which is the slave (the other computer participating in the
connection). All operator input must occur on the master computer.
Page 96
96 Backing up, restoring, and cloning from DOS
Establishing a peer-to-peer connection with Ghost.exe
You must have two Ghost boot disks with which to start your computers. Create
the boot disks using the Ghost Boot Wizard.
Note: Ensure that both boot disks are created with the same version of Norton
Ghost. You cannot use one boot disk created in Norton Ghost 2002 and one boot
disk created in Norton Ghost 2003 in the same task.
See “Creating boot disks and boot images” on page 75.
To connect two computers peer-to-peer
1Insert a Ghost Boot Disk into the floppy disk drive of each computer.
2Restart each computer.
3On the slave computer, on the main menu, do one of the following:
■Click Peer to peer > USB > Slave to start the computer as the slave
computer in a USB connection.
■Click Peer to peer > LPT > Slave to start the computer as the slave
computer in an LPT connection.
■Click Peer to peer > TCP/IP > Slave to start the computer as the slave
computer in a TCP/IP connection.
Take note of the IP address displayed in the Slave Connect dialog box.
4On the master computer, on the main menu, do one of the following:
■Click Peer to peer > USB > Master to start the computer as the master
computer in a USB connection.
■Click Peer to peer > LPT > Master to start the computer as the master
computer in an LPT connection.
■Click Peer to peer > TCP/IP > Master to start the computer as the
master computer in a TCP/IP connection and type the IP address
displayed on the slave computer.
Page 97
Creating a backup image file
You can create a backup of either of the following:
■A hard disk
■A partition
The backup is saved as an image file, which you can store on one of the following:
■A second hard disk
■A second partition on your hard disk (partition backup only)
■LS120 Superdisk, JAZ, or ZIP disk
■CD-R/RW or DVD-R/RW
See “Saving an image file directly to a CD-R/RW or DVD-R/RW drive” on
page 113.
■Ta p e
■Locally mapped network file server
■Another computer using peer-to-peer
Creating a backup image file
97Backing up, restoring, and cloning from DOS
Compression may affect the speed of operations. When you select a compression
level, Norton Ghost estimates the amount of space available for the destination
image file. If there is insufficient space, Norton Ghost prompts you to enable
spanning of image files.
Backing up a hard disk to an image file
When you back up a hard disk, a copy of the entire disk is saved as an image file.
Page 98
98 Backing up, restoring, and cloning from DOS
Creating a backup image file
To back up a disk to an image file
1On the Norton Ghost main menu, do one of the following:
■Local: Click Local > Disk > To Im ag e .
■Peer-to-peer connection: Click Disk > To I ma g e.
2In the Source Drive dialog box, select the source disk.
The Source Drive dialog box shows details of every disk that Norton Ghost
finds on the local computer.
3In the File Locator dialog box, type the image file destination and name.
4In the Image file description dialog box, type a description of the image file.
You can modify this description in Ghost Explorer when the image file has
been created.
5Click Save.
6In the Compress Image? dialog box, do one of the following:
■Click No for no compression (high speed).
■Click Fast for low compression (medium speed).
■Click High for high compression (slower speed).
See “Image files and compression” on page 62.
7When the “Proceed with Image File Creation?” question appears, check the
details and ensure that the correct options are selected.
Page 99
8Do one of the following:
■Click Ye s to proceed with the image file creation.
The system performs an integrity check of the file structure on the
source disk and then copies the source disk to the destination image file.
If you need to abort the process, press Ctrl+C, but be aware that this
leaves the destination image file in an unknown state.
■Click No to return to the menu.
9If spanning is enabled and required, click Ye s and type the location of the
next span of the image file.
See “Image files and volume spanning” on page 63.
Note: If the image file reaches the size of 2 GB and there is not enough space to
continue, you are prompted to insert the next media to continue.
Verify the integrity of the image file when it has been created.
See “Verifying image integrity” on page 107.
Backing up a partition to an image file
Creating a backup image file
99Backing up, restoring, and cloning from DOS
You can create an image file from one or more partitions to use as a backup or to
clone onto another partition or disk.
To back up a partition to an image file
1On the main menu, do one of the following:
■Local: Click Local > Partition > To Ima ge.
■Peer-to-peer connection: Click Partition > To I ma g e.
2In the Source Drive dialog box, select the source drive.
The Source Drive dialog box contains the details of every disk that Norton
Ghost finds on the local computer.
3In the Source Partition dialog box, select the source partitions to include in
the destination image file.
The Source Partition dialog box contains the details of all the partitions on
the selected source disk. Multiple partitions may be selected.
4Click OK.
5In the File Locator dialog box, select the image file destination and name.
Page 100
100 Backing up, restoring, and cloning from DOS
Creating a backup image file
6In the Image file description dialog box, type a description of the image file.
You can modify this description in Ghost Explorer when the image file has
been created.
7Click Save.
8In the Compress Image? dialog box, do one of the following:
■Click No for no compression (high speed).
■Click Fast for low compression (medium speed).
■Click High for high compression (slower speed).
See “Image files and compression” on page 62.
9In the Proceed with partition image creation? dialog box, ensure that the
correct options are selected.
10 Do one of the following:
■Click Ye s to proceed with the image file creation.
The system performs a quick integrity check of the file structure on the
source partitions and then copies the source partitions to the destination
image file. If you need to abort the process, press Ctrl+C, but be aware
that this leaves the destination image file in an unknown state.
■ClickNo to return to the menu.
11 If spanning is enabled and required, click Ye s and type the location of the
next span of the image file.
See “Image files and volume spanning” on page 63.
Note: If the image file reaches the size of 2 GB and there is not enough space to
continue, you are prompted to insert the next media to continue.
Verify the integrity of the image file when it has been created.
See “Verifying image integrity” on page 107.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.