-
First, partition backup
There are two ways to use Ghost for system backup: whole disk and partition. Click the local item in the menu, and there are three sub-items in the pop-up menu on the right, in which disk means to back up the whole hard disk (i.e. clone), and partition means to back up a single partition of the hard disk. Check the files that mean to check the hard disk or backup to see if the backup or recovery will fail due to partition, hard disk damage and other reasons. As an individual user to save system data, partition backup has practical value, especially when restoring and copying system partitions.
Select local → partition → to the mirror menu, and the hard disk selection window will pop up to start the partition backup operation. Click on the white hard disk information bar in the window, select the hard disk, enter the window, and select the partition to be operated (if there is no mouse, you can use the keyboard to switch, enter to confirm, and arrow keys to select). In the pop-up window, select the directory path of backup storage and enter the backup file name. Please note that the backup file name has the extension of GHO. Next, the program will ask whether to compress the backup data, and give three choices: No means no compression, Fast means small compression ratio and fast backup speed, and High means high compression ratio but rather slow backup speed. Finally, select the Yes button to start backing up the partitioned hard disk. Ghost backup is very fast, so it can be completed without waiting. Backup files are stored in the set directory with the GHO suffix.
Second, disk cloning and backup.
Disk cloning is the backup and recovery of the whole hard disk. Select the menu Local → Disk → To Disk, select the source hard disk (the first hard disk) in the pop-up window, and then select the target hard disk (the second hard disk) to copy to. Note that you can set the size of each partition of the target hard disk, and Ghost can automatically partition and format the target hard disk according to the set partition value. Select "Yes" to start execution.
Ghost can copy the target hard disk almost exactly like the source hard disk, and partition, format and copy the system and files in one step. As long as the target hard disk is not too small, the data content of the source hard disk must be loaded.
Ghost also provides a hard disk backup function, that is, the data of the whole hard disk is backed up as a file and saved on the hard disk (menu local → disk → mirror), and then it can be restored to other hard disks or source hard disks at any time, which is very convenient for installing multiple systems. The usage method is similar to partition backup.
Third, backup and recovery.
If the backup partition data in the hard disk is damaged, it can't be repaired by ordinary data repair methods, and the system can't be started after being damaged, so it can be completely recovered with the backup data without reinstalling the program or system. Of course, you can also restore the backup to another hard disk.
To restore the backup partition, select the menu Local → Partition → From Mirror in the interface, select the restored backup file in the pop-up window, then select the restored hard disk and partition, and click Yes.
Fourth, LAN operation.
LPT transmits backup files through parallel port. There are two options: slave and master, which are used to connect the host and the client respectively. NetBios, the network basic input and output system, is similar to LPT, and also has two options, slave and master, which have the same functions as LPT.
Make the partition of ghost a *. Gho file, and then install Symantec Ghost Enterprise Edition on win98 and restart.
1. First, make a ghost boot disk with a network card driver. Start & gt Program & gt Symantec Ghost & gtGhost Boot Wizard-> Network Boot Disk If your network card is directly selected from the list, you can use PC-DOS to generate a boot disk. However, the floppy disk generated by version 6.5 often has problems and cannot be successfully started. If your network card is not in the list, you should set up a special packet driver. Add-> The packet driver (included in the driver of the network card) goes down step by step according to the prompt and fills in the IP of the workstation (Ghost must have tcp/ip protocol). Finally, a floppy disk was generated, but it still could not be used. To change the autoexec.bat file, please add a 16 address after net xxxx.dos, such as 0X75. Multiple computers only need to change the ip in the wattcp.cfg file:
IP = 192. 168. 100.44
Netmask = 255.255.255.0
Gateway =192.168.100.1
2. Run the multicast server screen on the server side. Give the server a session name (alias), such as bb, and then select image file as the gho file. Then-> dump from client-> Partition-> More options-> Fill in 50 in the automatically started client (if you want to copy 50 sets at the same time)-> Even if you accept the completion of the client, when the number of your workstations reaches 50, the server will automatically transmit *. Gho file
3. Details:
At present, quite a few electronic classrooms have adopted workstations without floppy drives and CDs. In the absence of floppy drive and CD-ROM drive, when the software system of hard disk has problems, can network disk cloning be realized? PXE (pre boot execution environment, which is an extended network protocol based on Internet protocols such as TCP/IP, DHCP and TFTP) technology provides the function of starting from the network, which enables us to find a solution. Next, we will explain how to use Ghost 7.0 to realize PXE-based network disk cloning.
Brief introduction of network disk cloning process
The process of network disk cloning is as follows: on the workstation with floppy drive, start the machine with startup disk, connect to the server, and clone the mirror image of hard disk or partition to the workstation with Ghost multicast server, thus realizing a safe and fast network disk cloning without disassembling the machine.
Realize PXE network startup mode
For workstations without floppy drive and CD-ROM drive, there are three steps to realize PXE network startup mode:
1, PXE startup setting of workstation
PXE network startup generally needs to add PXE startup ROM); To the network card; For some models of network cards, PXE boot code can also be written into the Flash ROM motherboard. And some brand machines with integrated network cards (such as the commercial machines of Tsinghua Tongfang) can directly support PXE startup.
Commonly used RTL8 139 chip network card, its PXE startup setting mode is: press Shift+F 10 according to the screen prompt when booting, and select PXE in startup type to open the network startup option.
2. Make PXE startup files.
To make PXE startup files, it is recommended to use 3Com's DABS (Dynamic Access Boot Service). DABS provides powerful PXE startup service and management functions, but the 30-day trial version can be downloaded online. So we only use its boot image file making function, and the DHCP server of Windows 2000 Server provides PXE boot service.
DABS can be installed on any machine running Windows. After the installation is completed, run the 3Com boot image editor and the main interface diagram will appear. Select Create TCP/IP or PXE Image File to open the dialog box. Name the image file to be created, such as pxeghost.img. For others, use the default option, put the network boot disk that has been tested normally into the floppy drive, and select [OK] to create the pxeghost.img file of the PXE boot image.
Select "Create PXE menu startup file" in the main menu of 3Com startup image editor, and select [Add] in the window that appears to add the startup image file Pxeghost.img that we just created. You can set the menu title and waiting time in the Options tab.
Select [Save] and name the saved PXE menu startup file Pxemenu.pxe
3. PXE startup service settings of the server
The DHCP service of Windows 2000 Server supports two startup protocols: DHCP and BOOTP. We can set the following three options: DHCP only, BOOTP only and both. If other DHCP servers provide dynamic IP address allocation in our LAN, then only BOOTP is selected here. If you need this server to provide dynamic IP address allocation, you need to select both.
Next, set the startup file name. Configure the option "067: startup file name" in the scope option of DHCP server, and the string value is the startup file name pxemenu.pxecreated by us. Note: The file name does not contain the path.
The DHCP server only informs the BOOTP client of the startup file name. How does the client download the startup file? The answer is that TFTP service is needed. 3Com's DABS contains a TFTP service component. Of course, you can also download a free TFTP server software for long-term use.
In the settings of TFTP server, specify a service directory. Put the PXE startup files Pxeghost.img and Pxemenu.pxe the service directory of TFTP. The TFTP server is set to run automatically.
Cloning hard disk with Ghost multicast
Now run the Ghost multicast server, and the task name is Restore. After the setting is completed, press the [Accept Client] button. Start a diskless workstation in a disk clone. If the above steps are correct, you should be able to start PXE and join the multicast cloning task. After all target workstations are connected to the task, press the [Send] button to start the cloning task.
Verb (abbreviation of verb) parameter setting
You can set parameters in the options. Here is a brief introduction:
1. Mirror Write Buffer: Open the write buffer when creating backup files;
2. OK: after this option is selected, there will be no final confirmation query (it is recommended not to select this option);
3.Noint 13: When this option is selected, interrupt 13 is not supported (it is not selected by default);
4. Restart: automatically restart the computer after the hard disk or partition operation is completed;
5. Spanning: Backing up files through multi-volume architecture (write buffer when this option is selected); Closed);
6. Automatic naming: automatically name the generated file;
7. Allow 64K FAT cluster: Allow 64k fat cluster (only supported by Windows NT);
8. Ignore CRC error: Ignore CRC error;
9. Override size limit: If the partition size does not match, execution can be ignored;
10. Image read buffer: Turn on the read buffer when generating backup files (this option is selected by default).
Software function of intransitive verbs
1. storage medium
The storage media supported by Ghost is beyond our imagination. It supports point-to-point LPT interface, point-to-point USB interface, point-to-point TCP/IP interface, SCSI tape drive, portable devices (JAZ, ZIP, MO, etc. ), CD burner (CDR, CDRW) and so on. These functions don't need any extra drivers and software, just a floppy disk! Especially for the support of CD burners, the existing burners and blank CDs are very cheap and very suitable for backup.
Step 2 live in harmony
Ghost has good support for existing operating systems, including file storage formats such as FAT 16, FAT32, NTFS, HPFS, UNIX and NOVELL. Different from the previous version, Ghost 200 1 adds support for Linux EX2 (FIFO file storage format), which means that Linux users can also use Ghost to back up their own systems.
3. Support software
A.Ghost browser
In the previous version of Ghost, we can only simply backup, copy and restore the whole system. To recover individual files and folders, we need to use GhostEXP software. Now, Symantec has integrated the Ghost browser into the software. Ghost browser uses an interface similar to resource manager, through which we can find the files and folders we want in the backup package conveniently and quickly, and restore them.
Using Explorer, you can back up an entire hard disk or a single hard disk partition. Click the cylinder icon on the toolbar to pop up a dialog window for selecting hard disk or partition, then select the storage directory of backup files and enter a name. It should be noted that non-registered users cannot use the backup function.
It is very convenient to manage hard disk backup files in Ghost Explorer. First, choose to open a backup file (File/Open). At this point, the files in the backup will be listed in the program interface window like the resource manager. You can easily view and open files, find files or delete files (but you can't delete directories).
Ghost Explorer provides a variety of methods to restore hard disk backup files. The most convenient way is to right-click a file, select Restore from the pop-up menu, and then enter the directory to restore to, so that you can restore a single file from the entire disk backup. Of course, if you want to restore the entire disk backup, just select the top-level directory item with the disk icon in the directory list column on the left, and then click the restore icon (the second one) in the toolbar.
B.GDisk
GDisk is a newly added utility, which completely replaces FDisk and Format. Its functions are as follows:
* Quick format.
* Hide and show partitions. This function allows more than one main DOS partition, and the operating system on each partition has a different version. The ability to hide partitions makes the computer accustomed to boot to the selected bootable partition, ignoring the installation of the same operating system in other hidden partitions.
* Comprehensive zoning report.
* highly secure disk erasure. Provides disk erasure options that meet U.S. Department of Defense standards and higher security standards.
Unlike FDisk which uses interactive menus, GDisk is driven by the command line. This provides the ability to configure disk partitions faster and define GDisk operations in batch files. But at the same time, dozens of parameters will make ordinary users have a headache, so I don't recommend them to ordinary users. For the convenience of users, Symantec should also launch a corresponding GUI (Graphical User Interface) console. You can use the command line gdisk/? I see.
C. Real-time update
Real-time update is a general software upgrade program of Symantec, which can check the Symantec software installed in the current system and upgrade the software online through the Internet.
When installing Ghost 200 1, the installer automatically upgraded the version of the real-time update program.
Seven. Command line parameters: (Ghost unattended backup/restore/copy operation)
In fact, the functions of Ghost 200 1 are far more than those shown in its main program. Ghost can add many parameters to its startup command line to achieve more functions. Command-line parameters are quite complicated to use, but we can make batch files, thus "once and for all" (similar to unattended installation of Windows 98 and Windows 2000). Now let's learn some common parameters (see Ghost's help file for more detailed parameter introduction).
1.- Regular budget
This Ghost operation will automatically restart when exiting. This way, you can safely leave when copying the system.
2.- Foreign exchange
Automatically return to DOS prompt when exiting after this Ghost operation.
3.- Of course
Answer "Yes" to all prompts or warnings that need to be confirmed. This parameter is very dangerous and is only recommended for advanced users.
4.-fro
If the source partition finds a bad cluster, ignore the prompt and force replication. This parameter can be used to try to save the data in the bad track of the hard disk.
5.@ File name
Specify the txt file in the file name. Txt file is an additional parameter of Ghost, which is not limited by DOS command line 150 characters.
6.-f32
Copy the source FAT 16 partition and convert it into FAT32 (provided that the target partition is not less than 2G). WinNT 4 and Windows95 and 97 users should use it with caution.
7.-bootcd
This option makes the CD bootable when backing up files directly to the CD. This process needs to be put into the startup disk.
8.- Fat limit
Limit the FAT 16 partition of NT to 2G. This parameter is useful when copying Windows NT partitions and you don't want to use FAT 16 with 64k/ cluster.
9.- span
Paper separation parameters. When the space is insufficient, you are prompted to copy to another backup package in another partition.
10.- Automatic
When copying a volume, the file name is automatically given to continue execution without prompting.
1 1.-crcignore
Ignore CRC errors in the backup package. Do not use this parameter unless you need to rescue the data in the backup package to prevent data errors.
12.- Ministry of Internal Affairs
All images. Ghost will back up all partitions on the hard disk one by one.
13.-ial
All images, similar to the -ia parameter, back up Linux partitions one by one.
14. [Constructed as an adjective
All images. Similar to the -ia parameter, but contains the boot information of the partition.
15. Quiet
Status updates and user intervention are prohibited during operation.
16.- Script
You can execute multiple Ghost command lines. The command line is stored in the specified file.
17.- division =x
Divide the backup package into multiple volumes, each with a size of X megabytes. This function is very practical for copying large backup packages to portable storage devices, such as copying a backup package of 1.9G to three burning CDs.
18.-z
When saving the contents of a disk or partition to an image file, compress it. -z or -z 1 is a low compression ratio (fast); -z2 is high compression ratio (medium speed); The compression ratio increases from -z3 to -z9 (the rotating speed decreases in turn).
19. Cloning
This is the core parameter to realize Ghost unmanned backup/recovery. Use the following syntax:
-clone, MODE= (operation), SRC= (source), DST= (destination), [SZE (size), SZE (size) ...]
This parameter line is very complex, and there cannot be spaces between parameters. Where operation indicates the operation type, and the value is acceptable: copy:disk to disk;; Load: file to disk; Dump: disk to file; Pcopy: partition to partition; Pload: file to partition; Partition to a file.
Source indicates the operation source, and the value is acceptable: drive letter, starting from 1; Or for the file name, you need to write an absolute path.
Destination indicates the target location, with acceptable values: drive letter, starting from 1 Or for the file name, you need to write an absolute path; @CDx, burner, x stands for the letter of the burner, starting from 1
Here is an example:
1. Command line parameters: ghostpe.exe-clone, mode = copy, src = 1, dst = 2.
Finish: Copy the local disk 1 to the local disk 2.
2. Command line parameters: ghostpe.exe-clone, mode = pcopy, src = 1: 2, DST = 2: 1.
Operation completed: copy the second partition on the local disk 1 to the first partition on the local disk 2.
3. Command line parameters: ghostpe.exe-clone, mode = load, src = g: \ 3prtdisk.gho, dst = 1, sze 1 = 450m, sze2 = 1599m, sze3 = 2047m.
Done: Mount the disk 1 from the image file, and adjust the size of the first partition to 450MB, the size of the second partition to 1599MB, and the size of the third partition to 2047MB.
4. Command line parameters: ghostpe.exe-clone, mode = pdump, src 2: 1: 4: 6, dst = d: \ prt246.gho
Done: Create an image file containing only the selected partition. Select partitions 1, 4 and 6 from disk 2.
Eight, some examples
Ghost.exe- clone, mode = copy, src= 1, dst = 2- OK.
Hard disk copy
Ghost.exe- clone, mode =pcopy, src= 1:2, dst = 2: 1- ok.
Copy the second partition of hard disk 1 to the first partition of hard disk # 2.
Ghost.exe clone, mode =pdump, src= 1:2, dst = g: \ bac.gho.
Make the second partition of the 1 hard disk into a mirror file and put it in the G partition.
Ghost.exe clone, mode =pload, src=g:\bac.gho:2, dst= 1:2.
Restore the second partition to the second partition of the hard disk from an image file containing two partitions.
Ghost.exe- clone, mode =pload, src=g:\bac.gho, dst =1:1-FX-sure-Rb.
Restore drive C with the bac.gho file of drive C, and start it directly without displaying any information.
Ghost.exe clone, mode = loading, src=g:\bac.gho, dst=2, SZE 1=60P, SZE2=40P.
Restore the image file to the second hard disk and change the partition size ratio to 60:40.
Automatic recovery disk:
First, make a startup disk, including config. sys,autoexec。 Bat, Command.com, Io. Sys and Ghost.exe files (which can be done by using windows as the startup disk program). Autoexec.bat contains the following commands:
Ghost.exe- clone, mode =pload, src=d:\bac.gho, dst =1:1-FX-sure-Rb.
Automatically recover the files on disk D, and then automatically exit ghost to restart.
Automatic backup disk:
Ghost.exe- clone, mode =pdump, src= 1: 1, dst=d:\bac.gho -fx -sure -rb.
Automatic recovery CD:
Including files: config.sys, autoexec.bat, Mscdex.exe(CDROM executive program), Oakcdrom.sys (ATAPI CDROM compatible driver), Ghost.exe.
The contents of Config.sys are:
DEVICE=OAKCDROM。 SYS /D:IDECD00 1
The contents of Autoexec.bat are:
MSCDEX.EXE/D:idece 00 1/L:Z
Ghost -clone,mode=load,src=z:\bac.gho,dst= 1: 1 -sure -rb
This example can be modified according to the following specifications:
1. Clone
-clone must be used with parameters, and it is also the most practical switch {batch switch} among all switches. The following are the parameters of the clone definition:
mode = { copy | load | dump | pcopy | pload | pdump },
Src = {drive | file | drive partition},
dst = { drive | file | drive partition }
Mode specifies which command provided by the clone is used.
Copy from hard disk to disk.
Restore the loaded file to the hard disk (file to disk loading).
Dumping makes the hard disk a disk-to-file dump.
Partition-to-partition copy of pcopy partition.
Restore pload file to partition loading.
The Pdump partition is backed up as a file dump partition.
Src specifies the location mode of the source partition used by the ghost runtime and its importance. Examples of parameters for the corresponding mode command src:
Copy/dump the source hard disk number. 1 stands for the first hard disk.
Load the image file name. G:/back98/setup98.gho or device name (drive).
PCOPY/PDUMP source partition number. 1:2 represents the second partition of hard disk 1.
PLOAD partition mirror file name plus area code or drive name plus area code. G:\back98.gho:2 represents the second partition in the image file.
Dst specifies the target location mode used when running Ghost and its significance. Examples of parameters for the corresponding mode command dst:
Copy/dump the target hard disk number. 2 stands for the second hard disk.
Load the hard disk image file name. Example g:\back98\setup98.gho
PCOPY/PLOAD target partition number. 2:2 represents the second partition of hard disk 2.
Partition mirror file name plus area code. g:\back98\setup98.gho:2
SZEn specifies the size of the target partition used:
N=xxxxM specifies that the size of the nth partition is xxxxMB. For example, SZE2=800M means that the size of partition 2 is 800MB.
N=mmP specifies that the size of the nth partition is the mm percentage of the whole hard disk.
2.-fxo When a bad block appears in the source object, the copy is forced to continue.
3.-fx When ghost finishes the work of the new system, it will directly return to DOS without displaying and press ctrl-alt-del to restart.
4.-ia completely performs sector-to-sector copying. When copying a partition from an image file or another hard disk, Ghost will first check the source partition, and then decide whether to copy the file and directory structure or mirror (sector to sector). The default is this form. But sometimes, some hidden files related to system security may be placed in a specific location on the hard disk. Only by using the method of sector-to-sector replication can it be copied correctly.
5.-pwd and -pwd=x encrypt the image file.
6.-Reboot the system after 6.-rb recovery or replication is completed.
7.- Of course it can be used for cloning. Ghost does not show that disk cloning will continue-the target drive will be overwritten? Urging information
Nine, matters needing attention
1. When backing up the system, a single backup file should not exceed 2GB.
2. Before backing up the system, it is best to delete some useless files to reduce the volume of Ghost files. Usually useless files are: temporary folder of Windows, temporary folder of IE, and memory swap file of Windows. These files usually occupy more than 100 megabytes of hard disk space.
3. Before backing up the system, tidy up the target disk and the source disk to speed up the backup.
4. Before backing up the system and restoring the system, it is best to check the target disk and the source disk to correct disk errors.
5. When restoring the system, it is best to check whether there are any important files to be restored on the target disk, and don't wait until the hard disk information is overwritten to regret it.
6. When choosing the compression ratio, it is recommended not to choose the highest compression ratio, because the highest compression ratio is very time-consuming and the compression ratio has not been significantly improved.
7. After newly installing the software and hardware, it is best to re-create the image file, otherwise some inexplicable errors are likely to appear after recovery.