Any technical documentation that is made available by Symantec Corporation is the
copyrighted work of Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you AS-IS and
Symantec Corporation makes no warranty as to its accuracy or use. Any use of the
technical documentation or the information contained therein is at the risk of the user.
Documentation may include technical or other inaccuracies or typographical errors.
Symantec reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Trademarks
Symantec, the Symantec logo, Norton Ghost, Ghost Walker, Ghost Explorer, and GDisk
are trademarks of Symantec Corporation.
Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft
Corporation. IBM and PC-DOS are registered trademarks of International Business
Machines Corporation. 3Com and EtherLink are registered trademarks of 3Com
Corporation. Compaq is a registered trademark of Compaq Corporation. SuperDisk is a
trademark of Imation Enterprises Corporation. Zip and Jaz are registered trademarks of
Iomega Corporation. FireWire is a trademark of Apple Computer, Inc., registered in the
U.S. and other countries.
Other product names mentioned in this manual may be trademarks or registered
trademarks of their respective companies and are hereby acknowledged.
Printed in the United States of America.
10987654321
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF
THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE
SOFTWARE. SYMANTEC CORPORATION AND/OR ITS
SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE
SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR
THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE
(REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE
CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS
LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE
CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING
THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE
"AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING
ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE,
YOU AGREE TO THE TERMS AND CONDITIONS OF THIS
AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND
CONDITIONS, CLICK ON THE "I DO NOT AGREE", "NO"
BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO
FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL
PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM
WHOM IT WAS ACQUIRED WITHIN SIXTY (60) DAYS OF
PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
1. LICENSE:
The software which accompanies this license (collectively the
"Software") is the property of Symantec or its licensors and is protected
by copyright law. While Symantec continues to own the Software, You
will have certain rights to use the Software after Your acceptance of this
license. This license governs any releases, revisions, or enhancements
to the Software that Symantec may furnish to You. Except as may be
modified by a Symantec license certificate, license coupon, or license
key (each a "License Module") which accompanies, precedes, or
follows this license, Your rights and obligations with respect to the use
of this Software are as follows:
YOU MAY:
A. use one copy of the Software on a single computer. If a License
Module accompanies, precedes, or follows this license, You may make
that number of copies of the Software licensed to You by Symantec as
provided in Your License Module. Your License Module shall
constitute proof of Your right to make such copies.
B. make one copy of the Software for archival purposes, or copy the
Software onto the hard disk of Your computer and retain the original
for archival purposes;
C. use the Software on a network, provided that You have a licensed
copy of the Software for each computer that can access the Software
over that network;
D. after written notice to Symantec, transfer the Software on a
permanent basis to another person or entity, provided that You retain
no copies of the Software and the transferee agrees to the terms of this
license; and
E. use the Software in accordance with any additional permitted uses
set forth in Section 9, below.
YOU MAY NOT:
A. copy the printed documentation which accompanies the Software;
B. sublicense, rent or lease any portion of the Software; reverse
engineer, decompile, disassemble, modify, translate, make any attempt
to discover the source code of the Software, or create derivative works
from the Software;
C. use a previous version or copy of the Software after You have
received a disk replacement set or an upgraded version. Upon
upgrading the Software, all copies of the prior version must be
destroyed;
D. use a later version of the Software than is provided herewith unless
You have purchased upgrade insurance or have otherwise separately
acquired the right to use such later version;
E. use, if You received the software distributed on media containing
multiple Symantec products, any Symantec software on the media for
which You have not received a permission in a License Module;
F. use the Software in any manner not authorized by this license; nor
G. use the Software in any manner that contradicts any additional
restrictions set forth in Section 9, below.
2. CONTENT UPDATES:
Certain Symantec software products utilize content that is updated
from time to time (antivirus products utilize updated virus definitions;
content filtering products utilize updated URL lists; firewall products
utilize updated firewall rules; vulnerability assessment products utilize
updated vulnerability data, etc.; collectively, these are referred to as
"Content Updates"). You may obtain Content Updates for any period
for which You have purchased a subscription for Content Updates for
the Software (including any subscription included with Your original
purchase of the Software), purchased upgrade insurance for the
Software, entered into a maintenance agreement that includes Content
Updates, or otherwise separately acquired the right to obtain Content
Updates. This license does not otherwise permit You to obtain and use
Content Updates.
3. SIXTY (60) DAY MONEY BACK GUARANTEE:
If You are the original licensee of this copy of the Software and are not
completely satisfied with it for any reason, please contact Symantec
Customer Service, for a refund of the money You paid for the Software
(less shipping, handling, and any applicable taxes) at any time during
the sixty (60) day period following the date of purchase.
.4. LIMITED WARRANTY:
Symantec warrants that the media on which the Software is distributed
will be free from defects for a period of sixty (60) days from the date of
delivery of the Software to You. Your sole remedy in the event of a
breach of this warranty will be that Symantec will, at its option, replace
any defective media returned to Symantec within the warranty period
or refund the money You paid for the Software. Symantec does not
warrant that the Software will meet Your requirements or that
operation of the Software will be uninterrupted or that the Software
will be error-free.
THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL
OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,
INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY
RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL
RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM
STATE TO STATE AND COUNTRY TO COUNTRY.
5. DISCLAIMER OF DAMAGES:
SOME STATES AND COUNTRIES, INCLUDING MEMBER
COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT
ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW
LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW
AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL
SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY
SPECIAL, CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES,
INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT
OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF
SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS' LIABILITY
EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The
disclaimers and limitations set forth above will apply regardless of
whether You accept the Software.
6. U.S. GOVERNMENT RESTRICTED RIGHTS:
RESTRICTED RIGHTS LEGEND. All Symantec products and
documentation are commercial in nature. The software and software
documentation are "Commercial Items", as that term is defined in 48
C.F.R. section 2.101, consisting of "Commercial Computer Software"
and "Commercial Computer Software Documentation", as such terms
are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R.
section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and
48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R.
section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section
227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other
relevant sections of the Code of Federal Regulations, as applicable,
Symantec's computer software and computer software documentation
are licensed to United States Government end users with only those
rights as granted to all other end users, according to the terms and
conditions contained in this license agreement. Manufacturer is
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA
95014.
7. EXPORT REGULATION:
Export, re-export of this Software is governed by the laws and
regulations of the United States and import laws and regulations of
certain other countries. Export or re-export of Software to any entity
on the Denied Parties List and other lists promulgated by various
agencies of the United States Federal Government is strictly prohibited.
8. GENERAL:
If You are located in North America or Latin America, this Agreement
will be governed by the laws of the State of California, United States of
America. Otherwise, this Agreement will be governed by the laws of
England. This Agreement and any related License Module is the entire
agreement between You and Symantec relating to the Software and: (i)
supersedes all prior or contemporaneous oral or written
communications, proposals and representations with respect to its
subject matter; and (ii) prevails over any conflicting or additional
terms of any quote, order, acknowledgment or similar
communications between the parties. This Agreement may only be
modified by a License Module or by a written document which has
been signed by both You and Symantec. This Agreement shall
terminate upon Your breach of any term contained herein and You
shall cease use of and destroy all copies of the Software. The
disclaimers of warranties and damages and limitations on liability shall
survive termination. Should You have any questions concerning this
Agreement, or if You desire to contact Symantec for any reason, please
write: (i) Symantec Customer Service, 555 International Way,
Springfield, OR 97477, USA, or (ii) Symantec Customer Service
Center, PO BOX 5689, Dublin 15, Ireland.
9. ADDITIONAL USES AND RESTRICTIONS:
Notwithstanding any of the terms and conditions contained in the
Symantec Corporation Software License Agreement, the following
additional terms apply to the product you have purchased. You may:
(i) use the Software on one computer to clone, or apply an image of, a
hard drive on that computer, or a portion thereof, to another hard
drive on the same computer, a replacement computer, secondary
media, or network drive. If a License Module accompanies, precedes,
or follows this license, you may make and use that number of copies of
the Software licensed to you by Symantec as provided in your License
Module on an equal number of individual computers pursuant to the
terms of this license. Your License Module shall constitute proof of
your right to make and use such copies;
(ii) use the Software on that same computer to create an image file of a
hard drive on that computer and store the image file on removable
media for disaster recovery purposes;
(iii) use the Software to create a boot disk as described in the
documentation for reapplying the hard drive image that was created
for disaster recovery purposes to the hard drive on that same
computer; and
(iv) use the Software to clone a hard drive from that same computer to
a replacement computer, in the manner described in the software
documentation, and to use the Software on the replacement computer
provided that the Software has been removed from the original
computer.
You may not use the Software commercially or non-commercially for
the purpose of creating multiple computers or hard drives not
connected to the original computer, with similar or identical
configurations to that of the original computer or hard drive.
Appendix HInstalling Norton Ghost from the command line
Choosing an interface type for installation ................................................. 206
Choosing an installation mode ....................................................................206
Installing from the command line ...............................................................207
Uninstalling from the command line ..........................................................208
Service and support solutions
Glossary
Index
CD Replacement Form
12 Contents
Chapter
About Norton Ghost
This chapter includes the following topics:
■Introducing Norton Ghost
■What’s new in Norton Ghost 2003
■How Norton Ghost works
■Norton Ghost components
1
14 About Norton Ghost
Introducing Norton Ghost
Introducing Norton Ghost
Norton Ghost protects your data from computer disasters. The intuitive
Windows interface lets you create backup images of your hard disk or selected
partitions. You can clone directly between two computers using a network, USB,
or parallel connection. Norton Ghost is based on the robust cloning technology
of Symantec Ghost Enterprise.
Norton Ghost includes the following features:
■Backup flexibility: Back up directly to a wide range of hard drives and
removable media, including CD-R/RW drives, FireWire and USB hard
drives, DVD devices, Iomega, ZIP, and JAZ drives.
■Peer-to-peer communication: Fast peer-to-peer communication using high-
speed parallel, USB, or network IP connections.
■Operating system support: You can back up, restore, or clone computers
installed with DOS, Windows 2000/XP/NT/9x, OS/2, or Linux.
■File system support: You can back up, restore, or clone FAT, FAT32, NTFS,
and Linux Ext2/3 file systems.
■Image file editing: Ghost Explorer lets you edit FAT and FAT32 image files.
■Restore individual files: Ghost Explorer lets you restore individual files from
an image file.
■Disk and partition management: You can run GDisk from DOS or in a
command shell from within Windows to manage partitions and disks.
■Tutorials: A set of tutorials is included in Norton Ghost to provide a
demonstration of the most commonly used functions.
What’s new in Norton Ghost 2003
■Windows user interface: You can launch Norton Ghost directly from
Windows without having to restart your computer.
■Virtual Partition: Eliminates the need for a boot disk in most situations.
■Linux support: You can back up, restore, and clone EXT3 file systems.
■NTFS support: Norton Ghost now writes to NTFS partitions. You can store
an image file on an NTFS drive and restore from an image file located on an
NTFS drive.
■Mapped network drives: A computer on a network can be mapped to a drive
letter. This lets Norton Ghost see the computer as a local drive and back up to
and restore from it.
■Ghost Walker: This utility lets you update Security Identifiers (SID) and
computer names. Ghost Walker was previously available only in Symantec
Ghost, the corporate version of Norton Ghost.
■Support for FireWire, USB 1.1, USB 2.0: You can now use Norton Ghost to
back up, restore, and clone to and from FireWire, USB 1.1, and 2.0 devices,
including hard disks and supported CD-R/RW and DVD drives.
■DVD support: You can use Norton Ghost to back up to and restore from
supported DVD+ R/RW and DVD-R/RW drives.
■Expanded CD-R/RW support: The CD-R/RW drives supported by Norton
Ghost have been increased to include most new drives.
■Large drive support: Norton Ghost supports backing up, restoring, and
cloning IDE drives larger than 128 GB.
How Norton Ghost works
How Norton Ghost works
15About Norton Ghost
Virtual Partition
The basis of Norton Ghost is a cloning function that creates an image file that
contains all of the information required to recreate a complete disk or partition.
Image files contain a backup copy of an entire drive or one or more partitions.
The image file can be restored to one or more partitions or disks, replacing
existing data.
The Virtual Partition is a partition that is created when you perform a backup,
restore, clone, or other operation from Windows. All the files required for the
backup, restore, or clone are automatically installed into the Virtual Partition and
the task performed. Most of the Virtual Partition operation is not apparent to
you. However, there may be some occasions when you must know what the
Virtual Partition is and what it does, such as if you want to run Ghost.exe or
another application from the Virtual Partition.
One primary partition slot must be available in the MBR for the Virtual Partition.
16 About Norton Ghost
How Norton Ghost works
Hardware restrictions
Norton Ghost is designed to restore to and clone identical hardware. When
Microsoft Windows is installed, drivers necessary to support your hardware are
installed to the hard disk and recorded in the Windows Registry. If you move an
installation of Windows to another computer, either by directly moving the hard
disk or copying it using a Ghost operation, there is no guarantee that it will boot
or function correctly. Although Microsoft provides tools, such as Sysprep, that
may alleviate these problems to volume license holders, these tools are usually
unavailable to consumer or small business users.
A computer with Windows installed should be copied to a computer with
identical hardware. Moving or cloning file systems that do not contain an
operating system does not usually present a problem.
Preparing for an emergency
After you have installed Norton Ghost and created a backup image, you must
create and test a recovery boot disk for use in an emergency. If you experience a
critical failure and cannot start your computer, then you must have a recovery
boot disk. This lets you start your computer in DOS and run Norton Ghost to
restore your computer.
Note: If you saved your image file directly to CD or DVD, then you do not need a
recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to
CD or DVD.
Norton Ghost components
There are two methods of restoring your computer:
■Norton Ghost
If you are able to start in Windows, then you may be able to run Norton
Ghost from Windows on your hard disk and restore your computer with the
latest backup image file that you have created.
See “Restoring your computer from an image file” on page 37.
■Ghost.exe
If you cannot start Windows, then you must start your computer from a
recovery boot disk or CD/DVD. This starts your computer and starts Norton
Ghost in DOS. From Norton Ghost, you can access your image file and
restore your computer to the latest backup image file.
See “Restoring from an image file” on page 101.
The Ghost Boot Wizard helps you create a recovery boot disk.
See “Creating boot disks and boot images” on page 75.
Warning: Create and test a recovery boot disk before you need it. If your
computer crashes and you do not have a recovery boot disk, then you will have to
find another computer on which to create a boot disk.
17About Norton Ghost
Norton Ghost components
Norton Ghost includes a number of products and utilities.
Norton Ghost wizards
Norton Ghost includes Windows wizards to guide you through the basic tasks.
18 About Norton Ghost
Norton Ghost components
These wizards include:
Backup Wizard
The Backup Wizard lets you select a hard disk or partition to back up to an image
file.
Restore Wizard
The Restore Wizard lets you restore a hard disk or partition from an image file.
Norton Ghost components
Clone Wizard
The Clone Wizard lets you clone a hard disk or partition directly from another
hard disk or partition.
Peer-to-Peer Wizard
The Peer-to-Peer Wizard starts Ghost.exe in the Virtual Partition with the peerto-peer drivers loaded.
19About Norton Ghost
20 About Norton Ghost
Norton Ghost components
Create Virtual Partition Wizard
The Create Virtual Partition Wizard restarts your computer in the Virtual
Partition in DOS with files from a selected directory. This enables you to run
DOS applications.
Run Ghost Interactively Wizard
The Run Ghost Interactively Wizard restarts your computer in DOS and runs
Ghost.exe.
Integrity Check
The image integrity check runs an integrity check on backup image files.
View Log
View Log lets you view logs created during Norton Ghost operations.
Norton Ghost executable
Ghost.exe runs in DOS and lets you back up, restore, and clone. Because the
executable is small with minimal conventional memory requirements, you can
run it easily from a DOS boot disk or hard drive.
Norton Ghost components
21About Norton Ghost
22 About Norton Ghost
Norton Ghost components
Ghost Boot Wizard
The Ghost Boot Wizard is a Windows application that creates boot disks that
start Norton Ghost when you turn on your computer. You can create boot disks
for various cloning tasks. The wizard guides you through adding the drivers that
are needed to create a boot disk.
Ghost Explorer
Ghost Explorer is a Windows application that lets you view directories and files in
an image file. You can also add, recover, and delete individual directories and files
from a FAT16/32 file system image file.
Norton Ghost components
Note: You can restore individual files from NTFS images, but you cannot update
NTFS images.
23About Norton Ghost
GDisk
GDisk is a complete replacement for the Microsoft FDISK and FORMAT utilities
that allows the following:
■FAT file system formatting
■Batch mode operation
■Hiding and unhiding of partitions
■Secure disk wiping to US Department of Defense standards
■Extensive partition reporting
■Boot.ini manipulation (GDisk32 only)
Two versions of GDisk are supplied:
■GDisk: Runs in DOS
■GDisk32: Runs from the command prompt in a Windows operating system
24 About Norton Ghost
Norton Ghost components
Ghost Walker
Ghost Walker assigns a statistically unique security identifier (SID) and a unique
computer name to cloned Microsoft Windows NT/2000/XP workstations. The
SID is an important part of the Windows NT/2000/XP security architecture as it
provides a unique identifier when these computers are networked. If you are
cloning more than one computer using the multiuser pack, you can use Ghost
Walker to set up each computer on a network with a unique identification, which
is mandatory on a Microsoft network.
Chapter
Installing Norton Ghost
This chapter includes the following topics:
■Minimum system requirements
■Installing Norton Ghost
■Updating Norton Ghost
■Uninstalling Norton Ghost
2
26 Installing Norton Ghost
Minimum system requirements
Minimum system requirements
To install and run Norton Ghost, the minimum requirements are as follows:
■IBM computer or 100% compatible
■486 processor
■VGA monitor (Super VGA recommended)
■16 MB RAM (32 MB RAM recommended)
■Microsoft-compatible mouse recommended
■Microsoft Windows 98/2000/Me/XP or Microsoft Windows NT4 SP6a
■Internet Explorer 5
Ghost.exe
Ghost.exe must be installed on a computer with the Norton Ghost minimum
requirements. However, you can run Ghost.exe on a computer with the following
minimum requirements:
■IBM PC computer or 100% compatible
■486 processor
■16 MB RAM
■VGA monitor
■Microsoft-compatible mouse recommended
CD and DVD writing
■CD or DVD writer supported by Norton Ghost
Supported backup media
In addition to saving a backup to a secondary partition or an internal hard disk,
Norton Ghost can also save a backup to the following external media devices:
■CD-R/RW
■DVD+RW/-RW/+R/-R
■USB 1.1/2.0 hard drive and CD/DVD recordable devices
■FireWire (iEEE) 1394 hard drive and CD/DVD recordable devices
Installing Norton Ghost
■Atapi tape (QIC157) devices
■SCSI tape
■A second computer using a peer-to-peer connection
■Mapped network drive
■ZIP drive
■JAZ drive
To determine whether your device is supported by Norton Ghost, check that your
device is listed on the Symantec support Web site.
http:\\www.ghost.com
File systems supported for backup, restore, and cloning tasks
■All FAT
■All NTFS
■EXT2/3
See “Cloning with Linux” on page 187.
27Installing Norton Ghost
Disaster recovery requirements
To restore a backup image in the event of an operating system or hard disk
failure, you must have one of the following recovery mechanisms in place before
the emergency occurs:
■Floppy disk drive and floppy disk with the correct drivers for the selected
backup device
■CD or DVD device and a bootable CD-ROM with the backup image created
by Norton Ghost
See “Preparing for an emergency” on page 16.
Installing Norton Ghost
The installation instructions for Norton Ghost differ depending on how you have
purchased Norton Ghost:
■As a part of Norton SystemWorks Pro
■Norton Ghost 2003
28 Installing Norton Ghost
Installing Norton Ghost
Installing Norton Ghost if purchased with Norton SystemWorks Pro
If you have purchased Norton Ghost as part of Norton SystemWorks Pro, then
Norton Ghost is installed from the Norton SystemWorks Pro CD.
To install Norton Ghost from Norton SystemWorks
1Insert the Norton SystemWorks 2003 CD into the CD-ROM drive.
2In the Norton SystemWorks 2003 window, click Install Norton SystemWorks
2003.
3Click OK to accept the Virus detection message.
4Click Next.
5In the License Agreement window, click I accept the license agreement, and
then click Next.
If you select I do not accept the license agreement, you cannot continue with
the installation.
6Confirm the installation location.
To select a different location for the installed files, click Browse.
7Click Next.
8Select an installation type:
■Typical: The most common programs are installed. This is the best
choice for most users.
■Complete: All programs are installed. This is the best choice for users
who want to take advantage of all the product features.
■Express: The most common programs are installed with the default
settings and fewer prompts.
9In the Select Features window, select Norton Ghost 2003 and click one of the
following:
■Will be installed on local hard drive
■Entire feature will be installed on local hard drive
To install only Norton Ghost, click the other Norton SystemWorks
components and select Entire feature will be unavailable.
10 Click Next.
11 Continue with the type of installation you chose. After installation, you may
receive a prompt telling you that your computer needs to be restarted for the
updates to take effect.
Installing Norton Ghost
If you have purchased Norton Ghost separately from Norton SystemWorks Pro,
then Norton Ghost is installed from the Norton Ghost CD.
To install Norton Ghost from the Norton Ghost CD
1Insert the Norton Ghost CD into the CD-ROM drive.
4In the License Agreement window, click I accept the license agreement, and
then click Next.
If you select I do not accept the license agreement, you cannot continue with
the installation.
5In the User name field, type a user name.
6In the Organization field, type an organization, if you belong to one.
7Click Next.
8Confirm the installation location.
To select a different location for the installed files, click Change.
Installing Norton Ghost
29Installing Norton Ghost
9Click Next.
10 Click Install to start the installation.
If the opening screen does not appear
Sometimes, a computer’s CD-ROM drive does not automatically start a CD.
To start the installation from the Norton Ghost CD
1On your desktop, double-click My Computer.
2In the My Computer dialog box, double-click the icon for your CD-ROM
drive.
3From the list of files, double-click Ncdstart.exe.
Registering Norton Ghost
To stay informed of upcoming Symantec products, please fill out the details for
registration of Norton Ghost. If you choose not to register the software using the
Information Wizard or if registration fails for some reason, you can register on
the Symantec Web site at www.symantec.com or by using the Product
30 Installing Norton Ghost
Installing Norton Ghost
Registration option in the Help menu in the Norton Ghost window. On the Web
site, go to the Products page for the registration link.
To register Norton Ghost
1In the first Registration window, select the country from which you are
registering and the country in which you live (if different), and then click
Next.
2If you would like information from Symantec about Norton Ghost, select the
method by which you want to receive that information, and then click Next.
3Type your name and whether you want Norton Ghost registered to you or
your company, and then click Next.
4Type your address, and then click Next.
5Do one of the following:
■Answer the survey questions to help Symantec improve its products and
services, and then click Next.
■Skip the survey by clicking Next.
6Select whether you want to register Norton Ghost through the Internet or by
mail.
■If you want to register by mail, your computer must be connected to a
printer that the Information Wizard can use to print the registration
form.
■If you want to register using the Internet, you must be connected to the
Internet.
7Click Next.
If you submitted your registration through the Internet, the Information
Wizard displays the serial number for your product.
8Write down the serial number or click Print to get a copy of your registration
information for future reference.
9Click Next.
10 Select whether you want to use your existing profile the next time you
register a Symantec product or type the information as part of registration.
11 Click Finish.
Loading...
+ 191 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.