background image

 

Norton Ghost

 

™ 

 

Personal Edition

User’s Guide

Summary of Contents for NORTON GHOST

Page 1: ...Norton Ghost Personal Edition User s Guide ...

Page 2: ... prior notice No part of this publication may be copied without the express written permission of Symantec Corporation Peter Norton Group 10201 Torre Avenue Cupertino CA 95014 Trademarks Symantec the Symantec logo Norton Ghost Ghost Walker Ghost Explorer and GDisk are trademarks of Symantec Corporation Microsoft MS DOS Windows and Windows NT are registered trademarks of Microsoft Corporation IBM O...

Page 3: ...ibed in the software documentation and to use the Software on the replacement computer provided that the Software has been removed from the original computer v make one copy of the Software for archival purposes or copy the Software onto the hard disk of your computer and retain the original for archival purposes vi after written notice to Symantec transfer the Software on a permanent basis to ano...

Page 4: ... EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU IN NO CASE SHALL SYMANTEC S LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE The disclaimers and limitations set forth above will apply regardless of whether you accept the Software U S Government Restricted Rights RESTRICTED RIGHTS LEGEND All Symantec products and document...

Page 5: ...installing Norton Ghost in Windows 16 Uninstalling Norton Ghost in DOS 16 Setting up a DOS boot disk 16 Setting up transfer methods 17 Internal drives 17 Local devices 17 Peer to peer connections 18 Peer to peer parallel port connections 18 Peer to peer NetBIOS network connections 18 Chapter 3 Using Norton Ghost What you need to do 21 Starting Norton Ghost 23 Navigating without a mouse 24 Cloning ...

Page 6: ...hes Command line switches 47 Appendix B Frequently asked questions Appendix C Troubleshooting Norton Ghost error codes 67 Appendix D Diagnostics Hard drive detection and diagnostic information 69 Norton Ghost abort error file ghost err 69 Hard disk geometry diagnostics 70 Full diagnostic statistics dump summary 70 Symantec Service and Support Solutions Disk Replacement Form Index ...

Page 7: ...artitions can be copied to an image file that is used as a template to create copies of the original partitions When cloning complete hard drives procedures such as FDISK and FORMAT are a thing of the past Norton Ghost dynamically partitions and formats a target disk on the fly The source and target disks can be different sizes Norton Ghost adjusts the position and size of the target partitions au...

Page 8: ...atch mode operation hiding and unhiding of partitions and extensive partition reporting Unlike FDISK which uses interactive menus and prompts GDISK is command line driven and offers quicker configuration of a disk s partitions How Norton Ghost works Because the Norton Ghost executable is small with minimal conventional memory requirements it can easily be run from a DOS boot disk or alternative st...

Page 9: ... migrate the contents of the old drive to the larger drive This leaves the original disk untouched and available until the new system configuration is completed Caution Make sure you correctly identify and select the source and destination disks as the operation cannot be undone Save and load image files to and from removable media It is possible to burn image files onto a CD or to save an image f...

Page 10: ...ct through NetBIOS you need a network card in each computer a converted Ethernet cable and the appropriate networking software In general connecting through the network gives two to five times the performance of an LPT connection For NetBIOS and LPT connections one machine must act as the master and the other the slave All operator input will be on the master computer Using the NETBIOS interface W...

Page 11: ... use NetBIOS to communicate and clone between master and slave Using the parallel LPT port With two computers and a parallel data transfer cable not provided with Norton Ghost you can clone two computers master to slave Crossover Ethernet Cable Master Slave Parallel data transfer cable Master Slave ...

Page 12: ...Chapter 1 About Norton Ghost Personal Edition 12 ...

Page 13: ... 2 Setting up Norton Ghost Minimum system requirements The system requirements to run Norton Ghost are 386SX processor 486 or above recommended 4 MB RAM 8 MB RAM for NTFS 16 MB recommended DOS 5 0 or above VGA monitor ...

Page 14: ...utomatically If the setup program does not start automatically Autorun might be disabled on your computer Peer to peer LPT parallel port connection Parallel connection cable and a bidirectional parallel port with EPP or ECP compatibility on each machine Peer to peer NetBIOS connection Ethernet or Token Ring network interface card Established network connection which includes one of the following C...

Page 15: ...rectory on the destination drive For example C GHOSTPE 2 Locate the DOSINST folder on the installation CD and copy the directory tree under DOSINST to the folder you created in step 1 For example if E is your CD ROM drive type the following at the DOS prompt cd E DOSINST copy C GHOSTPE Note If a Windows drag and drop or copy and paste operation is used instead of a DOS command the files being copi...

Page 16: ...ased application that should be run in DOS mode outside of Windows On some systems such as Windows NT Windows 2000 and other non DOS operating systems a DOS boot disk must be used to start the system to allow Norton Ghost to operate Additional DOS drivers may be required to allow Norton Ghost to access local hardware The configuration files on a DOS boot disk can be altered to load these drivers a...

Page 17: ...ton Ghost operation Internal drives To work with internal drives ensure that each of the drives is properly configured This means that if fixed IDE drives are in use the jumpers on the drives are set up correctly and the BIOS of the machine is configured for the disks and setup arrangement Both the source and the destination drives must be free from file corruption and physical hard drive defects ...

Page 18: ...r Use the previous table to choose which machine will be the master and which will be slave Peer to peer NetBIOS network connections NetBIOS is only available for peer to peer connections Sample third party files are available on the Symantec FTP site at ftp ftp symantec com public english_us_canada products ghost Action Master Slave Disk to disk copy Machine containing source disk Machine contain...

Page 19: ...e Card setup program and configure the card 4 Set up NetBIOS Here is an example of loading NetBIOS in your startnet bat or autoexec bat LSL COM REM Comment replace NE2000 COM with your NIC driver NE2000 COM IPXODI COM NETBIOS EXE An example of the net cfg for an NE2000 NIC set up the NIC link driver NE2000 _int 10 _port 300 Select which computer is the master the machine from which you control the...

Page 20: ...Chapter 2 Setting up Norton Ghost 20 ...

Page 21: ...ton Ghost without a mouse Cloning disks Cloning partitions Managing image files What you need to do The following section gives a quick overview of the ways you can use Norton Ghost to perform everyday tasks 1 Identify what you want Norton Ghost to do and how many machines are involved Disk duplication Disk image file creation Disk creation from image file Partition duplication Partition image fil...

Page 22: ...S driver in the config sys file as outlined in SCSI Tape Drive documentation Third party device requiring DOS driver setup Install the DOS driver as outlined in device documentation Peer to peer connection LPT Using a parallel data transfer connection cable connect up the two machines Decide which machine is the master and which is the slave Peer to peer connection NetBIOS Install network interfac...

Page 23: ...rating system s volume must not be overwritten If you overwrite a drive or partition the system must be restarted LPT connection operation is not available Norton Ghost will not automatically reboot the system Hard disk drive sizes may be displayed smaller than their actual size Norton Ghost will only be able to access the displayed destination size The remaining space will not be used Norton Ghos...

Page 24: ...on Ghost is started mouse support may not be available To use Norton Ghost without a mouse Use arrow keys to navigate the menu Press Tab to move from button to button Press Enter to activate the selected button Press Enter to select an item in a list Cloning disks Disk cloning procedures are accessed from the main menu To specify the transfer method select one of the following Local ...

Page 25: ...ve the Destination Drive dialog box displays 3 Select the destination drive The Destination Drive dialog box displays the details of every disk Norton Ghost can find on the destination machine If a peer to peer connection is established this will be the slave machine s disks If this is a local disk to disk copy then the source disk will be unavailable for selection On selection of the destination ...

Page 26: ...s You can change the size of any destination FAT or NTFS partition at this stage simply by entering the new size in megabytes You cannot enter a value that exceeds the available space is beyond the file systems limitations or that is not large enough to contain the data held in the source partition On selecting OK Norton Ghost displays the final Proceed with disk clone question This is the last ch...

Page 27: ...Select No to return to the menu 6 When the disk clone is complete reboot the machine Norton Disk Doctor ScanDisk or a similar utility can then be run to verify the integrity of the destination disk Cloning a disk to image file To clone a disk to an image file 1 From the main menu select Disk To Image The Source Drive dialog box displays 2 Select the source drive The Source Drive dialog box display...

Page 28: ...type Select No for no compression high speed Select Fast for low compression medium speed Select High for high compression slower speed Compression may affect the speed of operations On selection of a compression type Norton Ghost estimates the amount of space available for the destination image file If there is insufficient space Norton Ghost prompts you to enable spanning of image files Note If ...

Page 29: ...to the destination image file If you need to abort the process use Ctrl C but be aware that this leaves the destination image file in an unknown state Select No to return to the menu 6 After the image file creation is complete Norton Ghost can verify the integrity of the image file From the main menu select Check Image File Cloning a disk from an image file To clone a disk from an image file 1 Fro...

Page 30: ...for selection On selection of the destination drive the Destination Drive Details dialog box displays Warning Choose carefully as this is the disk that is going to get overwritten 4 Confirm or change the destination drive partition layout The Destination Drive Details dialog box displays a suggested partition layout for the destination drive By default Norton Ghost allocates any extra space that t...

Page 31: ... need to abort the process use Ctrl C but be aware that this leaves the destination drive in an unknown state Warning Only select Yes if you are really sure you want to proceed The destination drive will be completely overwritten with no chance of recovering any data Select No to return to the menu Note Spanned and split image files are handled as outlined in the image file management section See ...

Page 32: ...artitions Cloning from partition to partition A destination partition must be correctly configured before Norton Ghost can clone another partition into it To clone from partition to partition 1 From the main menu select Partition To Partition The Source Drive dialog box displays 2 Select the source drive The Source Drive dialog box displays the details of every drive Norton Ghost can find on the l...

Page 33: ...etails of every disk Norton Ghost can find on the destination machine For peer to peer connections the slave machine is the destination On selection of the destination drive the Destination Partition dialog box displays 5 Select the destination partition The Destination Partition dialog box displays the details of all the partitions on the selected destination drive On selection of the destination...

Page 34: ...n state Warning Only select Yes if you are really sure you want to proceed The destination partition will be completely overwritten with no chance of recovering any data Select No to return to the menu 7 When the partition copy is complete reboot the destination machine Norton Disk Doctor ScanDisk or a similar utility can then be run to verify the integrity of the destination partition Cloning fro...

Page 35: ...e The image file may reside on a local drive but not the one that is being copied from When using peer to peer connections the image file will be created on the slave machine On pressing Enter the compress image question displays 5 Select the compression type Select No for no compression high speed Select Fast for low compression medium speed Select High for high compression slower speed Compressi...

Page 36: ...er the image file creation is complete Norton Ghost can verify the integrity of the image file From the main menu select Check Image File Cloning a partition from an image file A destination partition must be correctly configured before Norton Ghost can clone another partition into it To clone a partition from an image file 1 From the main menu select Partition From Image The File Locator dialog b...

Page 37: ...tination Drive dialog box displays the details of every disk Norton Ghost can find on the local machine On selection of the destination drive the Destination Partition dialog box displays 5 Select the destination partition The Destination Partition dialog box displays the details of all the partitions on the selected destination drive On selection of the destination partition Norton Ghost displays...

Page 38: ...ess use Ctrl C but be aware that this leaves the destination partition in an unknown state Warning Only select Yes if you are really sure you want to proceed The destination partition will be completely overwritten with no chance of recovering any data Select No to return to the menu Note Spanned and split image files are handled as outlined in the Image File Management section See Managing image ...

Page 39: ...nd compression Image files created in Norton Ghost support several levels of data compression When using Norton Ghost in interactive mode three compression options are provided none fast and high The Norton Ghost command line switches provide access to nine levels of compression The compression switch Z is detailed in Appendix A As a general rule the more compression you use the slower Norton Ghos...

Page 40: ... identical This can offer an additional detection method against bad sector writes and other drive anomalies that may be missed during normal imaging checks A text file containing CRC values and associated file attributes can be generated using the CRC32 command line switch These switches and functions are detailed in Appendix A Image files and volume spanning Standard image files Standard image f...

Page 41: ... or partition is being included in the image Creating an image file An image file can be created using the disk to image file and partitions to image file options in Norton Ghost For more information see Cloning a disk to image file on page 27 and Cloning from partition to image file on page 34 How to span an image across multiple volumes and limit span sizes When creating an image file from a dis...

Page 42: ...if you started spanning onto a JAZ drive and wish to span a 3 0 GB drive onto just JAZ disks select Enter to continue on JAZ disks If you wish to span across different forms of media selecting FileName gives you the option to span onto a different location Caution Record where you save your segments of the span Also record the filename of each span segment Norton Ghost will not record the location...

Page 43: ...sh to restore a 3 0 GB drive from just JAZ disks replace the disk and press Enter to continue from JAZ disks If you wish to restore from different forms of media selecting FileName gives you the option to restore from a different location Caution You need to know where you saved your segments of the span You must also know each filename and path for each span segment When the disk image load is co...

Page 44: ...r methods on page 17 for more information Norton Ghost in its default mode performs well with most SCSI tape devices In some situations with older style SCSI tape devices and possibly with unreliable tapes Norton Ghost may need to be configured to slow down or alter the way it uses the tape device These options are listed in Appendix A Viewing image file content and selective file restoration Ghos...

Page 45: ...and partition to save A sample screen is shown below Norton Ghost creates an index in the image file as it works that allows Ghost Explorer to create a display of files very quickly For more information on Ghost Explorer see the Ghost Explorer online help ...

Page 46: ...Chapter 3 Using Norton Ghost 46 ...

Page 47: ...case sensitive They can be entered in upper lower or mixed case Command line switches filename Specifies a file containing additional command line switches that should be read filename indicates the path and filename of the command line switch file The command line switch file can include any Norton Ghost command line switches except for afile and dfile The Norton Ghost command line switch file mu...

Page 48: ...The x value indicates the maximum number of bad sectors allowed to be handled by Norton Ghost The default value is 500 Norton Ghost will abort when a bad sector is encountered in a non FAT partition after the maximum number of bad clusters is exceeded or if the switch is not selected chkimg filename Checks the integrity of the image file indicated by filename clone The full syntax for this switch ...

Page 49: ...f SRC option copy dump Source disk number For example disk one is represented by SRC 1 load The image file source location drive path and filename or device If using a tape drive device set to MTx x 0 pcopy pdump Source partition number 1 2 indicates the second partition on drive one pload Partition image filename or device and partition number g images disk1 img 2 indicates the second partition i...

Page 50: ...creased L Resizes the last partition to maximum size allowed based on file type If additional space remains other partition sizes will be increased n xxxxM Indicates that the nth destination partition is to have a size of xxxx MB e g SZE2 800M indicates partition two is to have 800 MB n mmP Indicates that the nth destination partition is to have a size of mm percent of the target disk Due to parti...

Page 51: ...ion of the local drive one the first partition of local drive ghostpe exe clone mode pcopy src 1 2 dst 2 1 To load drive two from an image file and resize the destination partitions into a 60 40 allocation ghostpe exe clone mode load src g 2prtdisk gho dst 2 sze1 60P sze2 40P To clone a three partition disk and keep the first partition on the destination drive the same size as on the source disk b...

Page 52: ...ng a CRC check with an NTFS file system When a CRC file is created for an NTFS partition only a single CRC value is generated You can also create a CRC file from an image file and verify against a disk The full syntax for this switch is CRC32 action create verify pcreate pverify dcreate dverify src Disk Spec Part Spec File crcfile File vlist File vexcept File Note that no spaces are allowed in the...

Page 53: ...tion create Note that the default disk is the primary drive the default ASCII CRC32 file is ghost crc To create an ASCII CRC32 file ghostpe exe CRC32 action create src 2 crcfile myfile txt Same as previous except you specify the disk and ASCII CRC32 file This example uses disk 2 as the source drive and the outfile myfile txt To verify the contents of the primary drive against a CRC32 file ghostpe ...

Page 54: ...on file follows ghost exclusion list PERSONAL PHONE partition 1 WINDOWS COOKIES WINDOWS HISTORY WINDOWS RECENT WINDOWS USER DAT WINDOWS TEMPOR 1 CACHE1 WINDOWS TEMPOR 1 CACHE2 WINDOWS TEMPOR 1 CACHE3 WINDOWS TEMPOR 1 CACHE4 partition 2 1 end of list The exclusion list is case sensitive all files should be specified in upper case The wildcard follows Unix rule it is more powerful than the MS DOS In...

Page 55: ...le filename switch dfile filename Changes the path and filename of the dump log file created using the dd switch This switch can not be included in the ghost switch text file di Displays diagnostics This is useful for Technical Support purposes For each disk present on the machine the physical attributes such as drive cylinders heads sectors per track and total sectors are displayed For each parti...

Page 56: ... supported by Windows NT Do not use on systems including other operating systems fatlimit Limits the size of NT FAT16 partitions to 2047 MB Useful when Windows NT OS FAT16 partitions are present on the disk and 64K clusters are not wanted fcr Creates a CRC32 file called ghost crc while creating an image file ffi Forces the use of direct IDE access for IDE hard disk operations By default direct IDE...

Page 57: ...r SCSI hard disk operations fnw Disables writing to FAT disks or partitions Similar to the functionality environment switch WRITE N This switch does not work with NTFS volumes fnx Disables Extended INT13 support during cloning and disk geometry detection fro Forces Norton Ghost to continue cloning even if source contains bad clusters fx Flag Exit Causes Norton Ghost to exit to DOS after operation ...

Page 58: ...Disk Similar to ia Image All but also copies the boot track as in ib ImageBoot extended partition tables and unpartitioned space on the disk When looking at an image made with id you will see the unpartitioned space and extended partitions in the list of partitions The id switch is primarily for the use of law enforcement agencies who require forensic images When Norton Ghost restores from a id im...

Page 59: ... into NetBIOS master mode and is the equivalent of selecting the NetBIOS Master option from the main menu See Peer to peer NetBIOS network connections on page 18 for more information nbs NetBIOS slave mode This switch causes Norton Ghost to automatically go into NetBIOS slave mode and is the equivalent of selecting NetBIOS slave in the main menu See Peer to peer connections on page 18 for more inf...

Page 60: ...ware RAID partitions use the following procedure 1 With Windows NT disk administrator break the mirror set 2 Using the ntiid switch clone just one of the mirror partitions and resize as desired Note Partitions can only be resized by Norton Ghost during a DISK operation When performing a partition operation the target partition size must already be established 3 After cloning recreate a mirror set ...

Page 61: ... Ghost to exclude the indicated files during an operation A skip entry can specify a single file directory or multiple files using the wildcard Filenames must be given in short filename format and all pathnames are absolute Only FAT system files are able to be skipped It is not possible to skip files on NTFS or other file systems The skip switch may only be included in the command line once To spe...

Page 62: ...es split x Splits image file into x MB spans Use this to create a forced size volume set For example if you would like to force smaller image files from a 1024 MB drive you could specify 200 MB segments For example ghostpe exe split 200 will divide the image into 200 MB segments tapebuffered Default tape mode Sets the ASPI driver to report a read write as successful as soon as the data has been tr...

Page 63: ...he data is actually physically written to the medium vdw If this switch is set Norton Ghost will use the disk s verify command to check every sector on the disk before it is written The action Norton Ghost takes if a sector fails the verify depends on the bfc switch ver Displays the version number of Norton Ghost ver value Tests the version number of Norton Ghost If the version number value given ...

Page 64: ...Appendix A Norton Ghost command line switches 64 z or z1 low compression fast z2 high compression medium z3 thru z9 higher compression slower ...

Page 65: ...e observed When the operating system is running there may be files open or in a changing state which if cloned will result in the destination being in an unknown state In addition if you overwrite partitions the system must be restarted before using them If I shouldn t run Norton Ghost inside the operating system how should I launch Norton Ghost It is best to execute Norton Ghost at the true DOS l...

Page 66: ...model BEFORE saving the image or cloning After cloning restart Windows 95 will detect the card for the first time and request the drivers These drivers can be saved in the image file for easy access after cloning Does Norton Ghost support Macintosh No If I accidentally specify the wrong destination drive is there any way to restore the original contents No Norton Ghost completely overwrites the ta...

Page 67: ...rated when an abort error occurs Further information is available on Symantec s Norton Ghost technical support website See Symantec Service and Support Solutions 8005 8012 Norton Ghost is being run in a non DOS environment Either boot the system to DOS or create a DOS boot disk with required device drivers to start the system and run Norton Ghost 10098 12412 The partition number must be included i...

Page 68: ...ls on how to purchase Norton Ghost 15150 Probable corrupt image file Check the integrity of the image file by selecting Local Check Image File in the main menu 15170 Due to an unformatted or invalid partition on the source hard drive Make certain the source drive is completely allocated as Norton Ghost looks for 100 viable media CDR101 Not ready reading drive X Abort Retry Fail A system error mess...

Page 69: ...rton Ghost abort error file includes these details along with additional drive diagnostics and details required to assist technical support in diagnosing the cause of the problem The Norton Ghost abort error file is generated when a erroneous condition is detected by the software which Norton Ghost is unable to recover from or work around The ghost err file is generated in the directory where the ...

Page 70: ...e used as shown in the following example c ghostpe di drives txt Full diagnostic statistics dump summary A full diagnostic statistics dump summary file contains the detected hard disk geometry details along with other Norton Ghost statistics The full Norton Ghost diagnostic statistics dump can be created using the command line switch dd The location and file name of file generated by Norton Ghost ...

Page 71: ...egister via modem during the installation process if your software offers this feature or via fax to 800 800 1438 or 541 984 8020 Technical support Symantec offers an array of technical support options designed for your individual needs to help you get the most out of your software investment World Wide Web The Symantec World Wide Web site http service symantec com is the doorway to a set of onlin...

Page 72: ...de the following America Online Type Keyword SYMANTEC to access the Symantec forum CompuServe Type GO SYMANTEC to access the Symantec forum Symantec BBS Set your modem to 8 data bits 1 stop bit no parity and dial 541 484 6669 Automated fax retrieval system To receive general product information fact sheets and product upgrade order forms directly to your fax machine please call our Customer Servic...

Page 73: ... for product literature or demonstration disks Find out about dealers and consultants in your area Replace missing or defective CDs disks manuals etc Update your product registration with address or name changes You can also visit Customer Service online at www symantec com custserv for the latest Customer Service FAQs to find out the status of your order or return or to post a query to a Customer...

Page 74: ...RIM Symantec Australia Pty Ltd 61 2 9850 1000 408 Victoria Road Fax 61 2 9850 1001 Gladesville NSW 2111 Australia Automated Fax Retrieval 61 2 9817 4550 Most International Partners provide Customer Service and Technical Support for Symantec products in your local language For more information on other Symantec and International Partner locations please call our Technical Support automated fax retr...

Page 75: ...sa __ Mastercard __ American Express CreditCardNumber ____________________________________________________________________________________ Expires__________ NameonCard pleaseprint ____________________________________________________Signature ___________________________________ U S Dollars PaymentmustbemadeinU S dollarsdrawn on a U S bank MAILYOUR DISK REPLACEMENT ORDERTO SymantecCorporation Attent...

Page 76: ...Disk Replacement Form 76 ...

Page 77: ...agnostics 69 disk See hard disk F file system FAT16 Windows NT 56 FAT32 conversion from FAT16 56 NTFS switches 59 60 files skipping 61 fingerprint See Ghost format logical 7 G Ghost features memory requirements 8 fingerprint 57 image file See image files introduction 7 system requirements 13 See also uninstalling See also procedures hard disk See also procedures Ghost Explorer 44 Ghost operation o...

Page 78: ...rt transfer 11 14 automation 58 setup 18 22 See also master See also slave partition cloning 7 peer to peer connection LPT See parallel port transfer procedures 21 23 disk 24 31 from image file 29 31 to disk 25 27 to image file 27 29 partitions 32 38 from image file 36 38 to image file 34 36 to partition 32 34 R removable media 8 14 See also image files spanned 39 restore See image files See proce...

Page 79: ...Index 79 T tape drive See image files See SCSI tape U uninstalling 16 W Windows running Ghost inside 23 Z Zip drive See image files spanned ...

Page 80: ...Index 80 ...

Reviews: