● You can create hard disk mirror backup files.
● You can restore the backup to the original hard disk.
● Disk backup can be performed between various storage systems.
● Support hard disk backup of FAT 16/32, NTFS, OS/2 and other partitions.
● Support hard disk backup under Win9X, NT, UNIX, Novell and other systems.
● You can copy (clone) the backup to another hard disk.
● Automatically partition and format the target hard disk during copying (cloning).
Installation:
The installation of Ghost is very simple, as long as you copy Ghost to the hard disk or floppy disk, you can execute it. Note that since the operation requires a mouse, it is recommended that you copy the mouse driver to the same directory as Ghost.exe, which is more convenient to use (if you don't use a mouse, please use the Tab key).
Start program:
In pure DOS, please run the mouse driver mouse first, and then run Ghost.exe.
Home screen operating instructions:
Ghost replication and backup can be divided into hard disk and partition. These include:
Disk-indicates the hard disk function option.
Partition-indicates the disk partition function option.
Check-indicates the check function option.
First, hard disk backup and recovery
Hard disk functions are divided into three types:
1, disk to disk (hard disk copy)
2. Disk to image (hard disk backup)
3. Disks from the image (backup and recovery)
Note: To use the hard disk function, there must be more than two hard disks to realize the hard disk function; And all recovered hard disks or disks, the original data will be completely lost. Please use it carefully and back up important documents or materials in advance to prevent accidents. )
1. Disk to disk (hard disk copy)
(1) Select the location of the source hard disk first;
(2) Select the location of the target drive;
(3) When copying or backing up a disk, the partition size can be set according to the use requirements;
(4) Press "OK" after selection, and a confirmation message will appear. Select "Yes" to start copying.
2. Disk to image (hard disk backup)
(1) Select the location of the source hard disk;
(2) Select the storage location of the backup file;
(3) Press "OK" and a confirmation message will appear. Select Yes to start the backup.
3. Create a disk from an image (backup restore)
(1) Select the file to restore;
(2) Select the hard disk target drive; To be restored;
(3) When the hard disk is restored (copied), the partition size can be set according to the use requirements;
(4) Press "OK" and a confirmation message will appear. Select Yes to start the recovery.
Second, partition backup and recovery.
There are three functions:
1, partition to partition (copy partition)
2. Partition to image (backup partition)
3. Partition from image (recovery partition)
1. partition to partition t (copy partition)
The usage of copying partitions is very simple. Select the source area first, then the destination area and confirm. The method of copying between disks is basically the same, so I won't explain it here.
2. Partition to image (backup partition)
(1) Select the hard disk to back up;
(2) Select the hard disk partition to be backed up, such as disk C, which usually stores the operating system and application programs;
(3) Select the storage path and file name of the backup file (Create). Cannot be placed in the partition selected for backup;
(4) Confirm Enter, and the following prompt box will appear, with three options:
No: data is not compressed during backup (fast, but takes up a lot of space).
Fast: little compression
High: the highest compression ratio (it can be minimized, but the backup/recovery time is long)
Suggestion: In order to save hard disk space, some friends choose "high" for high compression, which takes a long time. In fact, I think the capacity of the hard disk should not be a problem now, so it is better to choose a faster one. After all, cloned data is not easy to make mistakes.
(5) Confirm and execute "Yes".
Note: If you want to use the backup partition function, you must have more than two partitions (if you want to back up disk C), and disk C must be smaller than the capacity of disk D, and there must be enough space on disk D to store file backups. And how to limit the size of image files? Generally speaking, the image files we make are relatively large, so it takes a long time to update or restore. In fact, we only need to clone disk C of the main partition, and at the same time, you should install software on the main partition as little as possible, so that the image file will not be too big.
3. Partition from image (recovery partition)
(1) Select the backup file to restore;
(2) Select the hard disk to be restored;
(3) Select the hard disk partition to be restored;
(4) Select "Yes" to execute.
Suggestion: Clean and optimize the hard disk or partition before cloning. One thing must be reminded that when we use Ghost to back up data, we must thoroughly clean and optimize the hard disk or partition before cloning. It is best to use some tools and software to clean up the junk files and junk information in the system, and then sort out the hard disk, so that the cloned system is the best.
Third, the backup inspection and debugging
This function is used to check the failure of backup and recovery of disks or backup files due to different partition formats (FAT), and track the damage of hard disks. Click and select the file to check to start the check. A suggestion: before backup, please rearrange or format the hard disk directly, and then install the operating system and common software, such as office and wps2000. Don't install too many files to avoid the backup files being too large. Now I install 98 and some commonly used small software on drive C, save important files to other drives besides drive C to ensure that data is not lost, and install large-scale software such as office, wps, 3D max and VB on drive D, so the best thing is that when I restore the system, I don't have to worry about backing up or reloading these large-scale software. -You can also delete the hard disk swap file win386.swp in the widnows directory before backup, and windows will automatically generate it when it is restored, which can save tens of megabytes of space.
Fourth, LPT direct network backup and reply
This item is used for network computers. The two computers are directly connected through LPT port. The host chooses LPT-MASTER and the other chooses LPT-SLAVE. If the network check is correct, the docking can be realized. The process of backup and recovery is similar to that of this computer, and there is no difference.
V. Options
Here, you can change some running parameters of Ghost to make the software run more humanized. Please refer to the following "Ghost Usage Skills-Ghost Command Line Parameters" for this setting.
Matters needing attention in Ghost backup of intransitive verbs
1. partition format
First of all, pay attention to the partition format. 2000 system (XP) can use two partition formats, one is the traditional FAT partition (FAT 16, FAT32), and the other is the NTFS partition format unique to NT, 2000 and XP, namely NTFS5 in 2000. NTFS partition format is more secure and effective, so it is widely used. However, the lower version of Ghost software can't correctly identify the NTFS partition format, so you should choose the higher version of Ghost software before operation to ensure that you can correctly identify the NTFS partition format.
2. Hard disk properties
The second thing to pay attention to is the properties of the hard disk. Usually, the hard disk is the basic disk of 2000(XP), and the basic disk has partitions (which can be divided into main partitions and extended partitions). The basic disk is a disk attribute that we usually use, but there are many special functions that cannot be realized on the basic disk, such as mirror volume and fault-tolerant volume. To realize these functions, the premise is to convert the disk into a dynamic disk, which can neither exist nor be recognized by DOS system. Instead, there is no partition concept on dynamic disks, which can be divided into simple volumes, spanned volumes and so on. Unlike partitions, the same partition can only exist on one physical disk, but the same volume can span as many as 32 physical disks. This is a very practical function on the server. And the volume can also provide a variety of fault-tolerant functions (RAID0 or RAID5).
Ghost software can only identify basic disks, but not dynamic disks. If your disk property is dynamic, you may not be able to use Ghost software for backup. It should be noted that some SCSI disks (hot-swappable disks) will be identified as dynamic disks once inserted, and some logical disks with hardware arrays will also be identified as dynamic disks. It is particularly important to note that from the basic disk to the dynamic disk, the original partition will be converted into a simple volume, but to convert from the dynamic disk to the basic disk, all the volumes need to be deleted.
3. Backup and distribution
Ghost software can completely retain the disk information (saved by the channel), so in 1998, we often use it to install multiple computers (same or different) at the same time, but in the era of 2000(XP), you need to pay attention to that when installing 2000(XP), important hardware information will be recorded, so your backup can only be restored on the original machine. If important hardware is replaced or the machine is replaced, the backup may not start normally after recovery. This is determined by the hardware characteristics of 2000. Is there any way? Yes In 2000(XP), a special distribution tool called SYSPREP was provided. Before using Ghost, you can delete the hardware information in the system. Therefore, the kernel is applicable to all hardware. When this backup is started for the first time after recovery, the system will automatically re-detect the hardware and register the database. This process is similar to installing 2000, except that it is fast and does not need to install a CD. It should be noted that. After repackaging with SYSPREP, the system will automatically shut down. Please do not restart the system, or the hardware information will be re-recorded.
4. Is there a domain environment
With the popularity of the network, more and more computers are running on the network, and the domain is a necessary logical environment for managing and maintaining large-scale networks. Both 2000 Professional Edition and XP Professional Edition can be allowed to join the domain environment and accept centralized management and policy restrictions (this part is not explained here). Because joining the domain generally requires the unified operation of the administrator, some friends make Ghost backups after joining the domain, hoping that they don't need to rejoin the domain when they recover later. Is that so? When you are ready to log in to the domain again after restoring the backup, you will find that the system does not allow you to log in. Tip: The computer account of the main domain of the system is lost. Please contact the administrator. Oh, no. What's the matter? This should start with the security verification of the domain.
The difference between domain and group
A workgroup is a collection of computers, just a logical collection. Each computer is managed by itself. Whether you want to visit one of the computers or visit that computer to realize user authentication. Unlike a domain, a domain is a collection of computers with security boundaries. A trust relationship has been established between computers in the same domain, and access to other machines in the domain no longer requires the permission of the accessed machine. Why is this happening? Because when joining the domain, the administrator sets up a computer account for each computer in the domain (but not in the same domain as the user), and this account is protected by the password as the user account. But if you ask, I didn't enter any password. No, you didn't. The password of a computer account is not a password, but a login ticket in the domain. It was released and maintained by KDC service on DC (domain controller) in 2000. In order to ensure the security of the system, KDC service will automatically update all bills every 30 days and record the last used bills. Cycle after cycle. In other words, the server always keeps two bills, which are valid for 60 days. After 60 days, the last used banknotes will be discarded by the system. If the ticket in your Ghost backup is 60 days old, the KDC service will not authenticate the computer, so the system will prohibit any access request (including login) on the computer. What is the solution? The simple way is to quit the computer from the domain and rejoin it, and the KDC service will reset this ticket. Or use the NETDOM command in the 2000 resource package to force the reset of the security ticket. Therefore, in a domain environment, please try not to use Ghost to back up the system partition after the computer joins the domain. If so, please confirm that the backup was made within 60 days when restoring. If so, you'd better contact the system administrator. You can ask the administrator to reset the computer security ticket, otherwise you will not be able to log in to the domain environment.
Seven, ghost use skills
1. command line parameters
When using Ghost, do you have to enter Ghost first, and then operate it in its interface? This operation is not only troublesome, but also error-prone. In fact, Ghost, like dos command, can also be operated by command line parameters, which are actually the OPTION options in Ghost, just in the form of command line. Now let's talk about the command line parameters of Ghost, the most common backup method.
We assume that the user has a hard disk and multiple partitions, and the user uses Ghost to back up the C disk with the operating system installed. Ghost.exe program is located in the backup directory of disk D, and the backup file name is c.gho Then the command behavior is:
d:\backup\Ghost.exe -clone,mode=pdump,src= 1: 1,dst=d:\backup\c.gho -sure -z9
Ok, let's look at it item by item. D:\backup\Ghost.exe refers to the location of the Ghost program. -clone is the command parameter of cloning, and the following parts are all the "switches" of cloning. There are six options for mode switching: copy (disk-to-disk copy), load (from backup file to disk), dump (from disk backup to file), pcopy (partition-to-partition copy), pload (from backup file to partition) and pdump (from partition backup to file). The switch src is used to indicate the source disk (partition, file) of the clone operation. For example, in this example, our operating source is disk C, which is the first partition of the first hard disk, so the parameter is 1 (the first disk): 1 (the first partition). If the source is your first disk, then src= 1. The dst switch is used to indicate the target area. Our goal here is to back up to a file, so we enter the path and file name of the last backup file here. Of course, this switch allows you to skip the annoying confirmation process. -z This refers to the compression ratio of content during backup: -z or -z 1 is fast compression. The larger the number after z, the greater the compression ratio and the slower the speed. The maximum compression ratio is z9.
So can restore also use the command line? Sure:
d:\backup\Ghost.exe -clone,mode=pload,src=d:\backup\c.Ghost: 1,dst= 1: 1 -sure -rb
You see, our model here uses pload, because it is the reverse process of the backup process from file recovery to partition, src to file and dst to partition. The only extra switch is -rb, which means restarting the computer after the recovery process.
Ok, you can save these two command lines as two batch files. Is it fast and accurate to operate them in the future?
Finally, several common command line parameters of Ghost are given. Flexible applications usually improve the efficiency of backing up data.
1 、-rb
When this Ghost operation ends and exits, it will automatically restart. A very useful parameter, especially when copying the system, you can safely leave.
2.-Foreign exchange
After the operation of Ghost, it will automatically return to the DOS prompt (provided that Ghost is started by DOS command).
3. Of course
Answer "Yes" to all prompts or warnings that need to be confirmed. This parameter is dangerous to some extent. Recommended for advanced users only. Be careful!
4、fro
If the source partition finds bad clusters, skip the forced copy prompt. This parameter can be used to try to save the data in the bad track of the hard disk.
5、fnw
It is forbidden to write into FAT partition to prevent misoperation (this parameter is invalid for NTFS partition).
6、f32
Copy the source FAT 16 partition and convert it into FAT32 (provided that the target partition is not less than 2G). Since few operating systems support FAT32, unless you are copying 98 partitions, you should use this parameter carefully!
7、f64
Copy the source FAT 16 partition and convert it into 64K/ cluster (originally 5 12K/ cluster, provided that the target partition is not less than 2G). This parameter is only applicable to WINDOWS NT system, because other operating systems do not support 64K/ cluster FAT 16.
8, fat limit
Limit the FAT 16 partition of NT to 2G. This parameter is useful when copying WINDOWS NT partitions and you don't want to use FAT 16 with 64K/ cluster.
9. Span
Paper separation parameters. When the space is insufficient, you are prompted to copy to another image file in another partition.
10, automatic
When copying a volume, the file name is automatically given to continue execution without prompting.
1 1 、-crcignore
Ignore CRC errors in image files. Do not use this parameter unless the copied content is irrelevant, in case of data error.
2. About the conversion of different partition types before disk cloning.
As we all know, there are two hard disk partitions: FAT 16 and FAT32, so there will be a problem that FAT 16 hard disk partition cannot be cloned into FAT32 hard disk partition. To solve this problem, we can use the drive converter (FAT32) in the system tool to convert the FAT 16 hard disk into FAT32 hard disk, and then clone it. I would like to remind you that before you switch from FAT 16 to FAT32, you must uninstall all kinds of antivirus software on FAT 16 hard disk, otherwise it will be in vain. In addition, the converted FAT 16 hard disk must have more than 10% free space; The FAT 16 hard disk must be connected to the primary main port of the IDE 1 hard disk cable, and the CD-ROM drive must be connected to the secondary main port of the IDE 2 hard disk cable, otherwise there will be a "registry error" prompt, which will make you "restart" the computer for countless times and unable to complete the conversion.
3. Make necessary preparations before system backup.
In order to use Ghost software for system software backup and quick recovery better, faster and more accurately, please make some necessary preparations before cloning backup: first, ensure that the system software on the hard disk, as well as all kinds of genuine software, printer drivers and scanning devices have been installed and debugged, and ensure that all are correct; Secondly, the system software on the hard disk should be disinfected with genuine antivirus software to ensure that the system backup is clean. In addition, if your hard disk is large enough, please back up the whole system software. When running Ghost software, it is best to store the backup *. Gho files are placed on logical partitions far away from drive C, which can prevent viruses such as CIH from attacking the partitions in front of hard disks C, D and E, and greatly increase the security of backup files.
4. Use Ghost to defragment the disk
I remember the first time I used the defragmentation software that comes with Windows to organize a 4GB partition. The hard disk worked for more than 7 hours, and I never used it again. In fact, you can also use Ghost to organize your hard disk. As we all know, when using Ghost as a disk image, Ghost will completely read out every data in the hard disk partition and then write it into a GHO file. The software will automatically skip the blank part of the partition. Then when we restore the GHO image file, the software will write all the contents of the file into the partition continuously, so that all the data will be automatically written into the partition header, and we will get a complete unused space, and the original fragmented file will naturally disappear.
The specific method of defragmenting with GHOst is to scan and repair all the error codes on the partition with Scandisk, and then make a GHO mirror file for the partition to be defragmented with Ghost. The size of the mirror file depends on the usage of the partition, and then restore the Gho file to the original partition. These operations are best run in pure DOS mode, and the correct partition must be selected when restoring the image, otherwise data will be lost. According to my experience, it takes about 30 minutes to organize 4GB hard disk by this method, which is a little longer than Vopt2000, but the effect is much better. However, using Ghost software is dangerous to some extent, so it is recommended that you use it with caution.
5. Manage GHO files in the graphical interface.
*. When making image files, GHO is the default extension of Ghost. If you want to restore part of the contents of the image file, you can only choose to restore it completely, but it is really too much trouble. Moreover, Norton Ghost simplified version can only work in pure DOS mode, which is inconvenient to operate, but with Ghost Explorer, it is much easier. It can read and expand the completed image file, and then you can extract and delete any file like a hard disk partition operation. The whole process is completed under Windows. In this way, you don't have to overwrite the whole partition, because only a few files in the system partition are damaged and overwritten.
When using, directly run the Ghostexp.exe file in the installation directory, and you can see its main interface. See if this is the Windows standard window you are familiar with. Then add a. gho file that has been saved in the hard disk through the "file/open" command, which is the original mystery. Gho files will be presented to you as they are.
Note: When you first open GHOst Explorer, you may not find any GHO files, because the properties of Gho files are implicit, so you must click View → Folder Options in Explorer and set it to show all files and folders.
1. partial recovery of image file. When you run Norton Explorer, you will find that it is the familiar interface of Windows Explorer. The left window is the directory tree of the disk corresponding to the mirror file, and the right window displays the corresponding file or folder. After selecting the file to be restored from the right window, click the "Restore" button on the toolbar, and you can quickly restore to the specified location, which is really convenient. The most important thing is that only part of the content can be restored, which brings great convenience to users.
2. Update the image file at any time. Just like the system restoration in Windows Me, once the software and hardware of the system change, the image file must be recreated. Although the speed of Ghost can reach 80MB/min, the time it takes is still amazing. In fact, you can update the image file at any time by selecting the Add command from the Edit menu of Ghost Explorer. Like the standard Windows Explorer, Ghost Explore also supports the direct drag-and-drop function of the mouse, which means that you can drag files/folders directly to the desktop for decompression, or drag files/folders to. Gho file is convenient. Therefore, with its help, you can easily add the tools you need to the backup file and clean up the unnecessary garbage in the backup file.
Finally, remind everyone to pay attention to three aspects when using:
1.ghost Explore is just a viewing tool. Gho file When performing partition backup, it must be supported by the main operating program of Ghost.exe, otherwise the backup operation cannot be performed.
2. Ghost Explore cannot be installed in the partition that needs to be backed up, otherwise the backup will fail because it cannot be compressed;
3.Ghost is a program running in DOS mode, so when backing up in Windows, a window will appear first to prompt you to switch to full screen mode. You can usually press any key at this time.
The above is the super practical handbook of ghosts that I brought to you. If you can fully master these contents and skills and apply them to practice, your hard disk data will be much safer. But then again, data backup is only a passive means to protect hard disk data. If you really want to be foolproof, the best way is to start from yourself and develop good computer habits.