Symantec 10024709 Manuel D’Utilisation
9
Contents
Introducing GDisk ........................................................................................ 128
Running GDisk ............................................................................................. 128
Overview of main command-line switches ................................................. 129
Running GDisk ............................................................................................. 128
Overview of main command-line switches ................................................. 129
Creating a partition ....................................................................................... 131
Reinitializing the Master Boot Record ......................................................... 132
Showing information about disks ................................................................ 133
Performing multiple GDisk operations using batch mode ........................ 134
FAT16 partitions in Windows NT ............................................................... 135
Deleting and wiping your disk ..................................................................... 135
Activating or deactivating a partition .......................................................... 137
Hiding or unhiding a partition .................................................................... 137
Modifying the Windows NT/2000/XP boot menu ..................................... 138
Reinitializing the Master Boot Record ......................................................... 132
Showing information about disks ................................................................ 133
Performing multiple GDisk operations using batch mode ........................ 134
FAT16 partitions in Windows NT ............................................................... 135
Deleting and wiping your disk ..................................................................... 135
Activating or deactivating a partition .......................................................... 137
Hiding or unhiding a partition .................................................................... 137
Modifying the Windows NT/2000/XP boot menu ..................................... 138
Specifying the boot.ini path and file name .......................................... 138
Displaying the list of current boot entries ............................................ 138
Adding an entry to Boot.ini .................................................................. 138
Removing an entry from Boot.ini ........................................................ 141
Setting the default boot option and timeout ....................................... 141
Displaying the list of current boot entries ............................................ 138
Adding an entry to Boot.ini .................................................................. 138
Removing an entry from Boot.ini ........................................................ 141
Setting the default boot option and timeout ....................................... 141
clients ..................................................................................................... 144
Norton Ghost Walker capabilities ........................................................ 144
Norton Ghost Walker limitations ........................................................ 144
SID changing limitations ...................................................................... 145
Norton Ghost Walker capabilities ........................................................ 144
Norton Ghost Walker limitations ........................................................ 144
SID changing limitations ...................................................................... 145
Loss of access to external data objects ......................................................... 145
Identical user names and passwords across workstations .......................... 145
Using Ghost Walker ...................................................................................... 146
Identical user names and passwords across workstations .......................... 145
Using Ghost Walker ...................................................................................... 146
Using Norton Ghost with switches .............................................................. 154
Command-line switches ............................................................................... 154
Clone switch usage ........................................................................................ 166
Command-line switches ............................................................................... 154
Clone switch usage ........................................................................................ 166
Defining the type of clone command ................................................... 166
Setting a source for the clone switch .................................................... 167
Setting a destination for the clone switch ............................................ 169
Setting a destination size for the clone switch ..................................... 169
Examples of clone switch usage ............................................................ 170
Setting a source for the clone switch .................................................... 167
Setting a destination for the clone switch ............................................ 169
Setting a destination size for the clone switch ..................................... 169
Examples of clone switch usage ............................................................ 170