li

Hard Disk Cloning from Entry to the Master

The fault instability, a variety of hardware and software of Windows itself and some be rather baffling problem, often have to reinstall the system, especially for the school computer room management is also a kind of disaster. In fact, we have only to the rational use of Ghost, will let these worries sweep away. Below I will talk about some tips on using Ghost, for your reference.

A. Entry Skills

1. Before cloning, first finishing disk C;

Using the system in Norton 2002 Norton System Check before cloning the error check and repair, and to be cloned partition or disk to optimize, to reduce all kinds of trouble appeared in the cloning process, and can accelerate the speed of cloning.

2. Tips to weight loss the image file;

(1). all the temporary file Windows98 Temp folder;

(2). to My Document (my documents) and Temporary Internet Files (browser cache folder) two folders to the other partition;

(3). delete the useless help, readme file, the screen saver file, background images and various audio files;

(4). to the various application software installed in the other partition;

(5). if it is in the DOS clone can also use the DOS DEL command to delete the Windows98 virtual memory file Win386.swp. [next]

3. Backup techniques;

(1). check the "Options/span/Create CRC32" option to discover the cloning process error in the first before cloning.

(2). the general operation method of hard disk partition backup is: select " Local/Partition/To Image" option from the main menu of the Ghost, open to the backup disk (if hung with more than one hard disk) and partition, then specify the name and path, stored image file OK, began to generate .Gho extension mapping file.

(3). in the selection of the compression ratio, do not recommend the use of “high", because it is very time-consuming, and compression rate did not significantly improve.

(4). cloning is completed, use "Local/Check/Image File" to check the integrity of the image file.

4. Mapping files management skills;

(1). stored image file partition or disk to ensure correct, and good finishing with a disk defragmenter, and then the image file is stored in the;

(2). the image file is read-only, hidden, set system properties, it can prevent from being accidentally deleted and will not be the disk defragmenter mobile (I found if finishing the stored image file to the time-sharing, often cannot by 32 CRC Ghost detection, so we should prevent the image file to disk the defragmenter mobile);

(3). if conditions allow the best image files to an external hard drive or burn to CD, to avoid damage to the image file.

5. Restoring the backup technique;

(1). recovery system must be something important (such as favorites, e-mail information) for backup;

(2). the general operation method of restoring the backup is: select "Local/Partition/From Image" option from the main menu of Ghost, select the image file, and then specify the coverage of the partition, the OK, the backup files to the specified partition.

(3). should be combined with the use of Ghost Explorer software, so that when a system problem occurs, do not have to restore the entire partitions or hard, only the problem of folders or files can be recovered.

(4). the best use of KV3000 (Kill, Norton) tool will partition table information backup to floppy disk, which can be easily restored in the face of the virus destroyed. [next]

The Ghost is also one of the languages we use to the digital publication software, and the software is the weapon to attract others’ eyeballs. When pdf to flipbook converter works in your PC, you will get remarkable flipping publications.

B. Advanced Skills

1. Ghost command parameters;

Because the order parameters Ghost, so here I only introduce several commonly used parameters.

(1). -RB: Ghost operation is completed automatically restart after the exit;

(2). -Zn compressed image file, -Z or -Z1 is not compressed (fast); -Z2 high compression (medium); -Z3 to -Z9 compression rate (speed increases are slowing down);

(3). -FRO: skip the error (using this parameter can save the data in the hard disk).

(4). -CLONE This is the core parameters in realization of Ghost unattended backup (recovery);

Syntax of Using:

-CLONE,MODE=(operation),src="http://img.jcwcn.com/attachment/portal"FONT-SIZE: 14px; LINE-HEIGHT: 23px">

 


Make a Free Website with Yola.