GHOST All parameters This section can set parameters in Options
1. Image Write Buffering: Turn on the write buffer when establishing a backup file;
2. SURE: After selecting this, no longer have finally confirmed inquiry (it is recommended not to select this);
3. NO INT 13: After selecting this, no interrupt 13 (not selected by default);
4. Reboot: After the hard disk or partition operation is complete, the computer is automatically restarted;
5. Spanning: Back up files through multiple volume architectures (turn off write buffering);
6. AutoName: Automatically named the spanning file;
7. Allow 64K Fat Clusters: Support only in Windows NT;
8. Ignore CRC Errors: Ignore the CRC error;
9. OVERRIDE SIZE LIMIT: If the partition size does not match, it can be ignored;
10. Image Read Buffering: Opens the read cache when generating a backup file (check this item when default).
Ghost other parameters introduction
1.-RB This time the GHOST operation ends automatically restarts. In this way, you can get relieved when you copy the system.
2.-FX This time the GHOST operation ends automatically returns to the DOS prompt.
3.-Sure Answer "Yes" on all requests or warnings of all required confirmation. This parameter is of certain hazards that only recommend advanced users.
4. -Fro If the source partition is discovered, the prompt forced copy is slightly prompted. This parameter can be used to try to save data in the bad drive of the hard disk.
5. @ filename Specifies the TXT file in FileName. The additional parameters for GHOST in the TXT file, which can be limited without the limit of 150 characters lines in the DOS command.
6.-F32 converts the source FAT16 partition after converting into FAT32 (provided that the target partition is not less than 2G). Winnt 4 and Windows95, 97 users are cautious.
7.-bootcd This option allows the disc to bootable when the file is backed up directly to the disc. This process needs to be placed in the boot disk.
8.-FatLimit limits the FAT16 partition of NT to 2G. This parameter is useful when copying the Windows NT partition and does not want to use the 64k / cluster of FAT16.
9.-SPAN split parameters. When the space is insufficient, copy another backup package to another partition.
10.-Auto points, no prompts are not prompted, you will automatically give a file name to continue execution.
11.-CRcignore ignores the CRC Error in the backup package. Do not use this parameter unless you need data in the backup package, do not use this parameter to prevent data errors.
12.-IA all images. GHOST will back up all partitions on the hard disk.
13.-IAL all images, similar to the -IA parameters, backups on the Linux partition one by one.
14.-id all the images. Similar to the -IA parameter, but includes boot information of the partition.
15. The state update and user intervention are disabled during operation.
16.-S CRIPT can perform multiple ghost command lines. The command line is placed in the specified file.
17.-SPAN Enables the cross-volume function of the image file.
18.-split = x divides the backup package into multiple points, each slog of X. This feature is very practical, used for large backup packages onto the mobile storage device, such as copying a 1.9G backup package to 3 crates.
19.-z Preserves the contents of the disk or partition to the image file to compress. -z or -z1 is low compression ratio (fast); - Z2 is high compression ratio (medium speed); - Z3 to -Z9 compression ratio is in turn (speed in turn). 20.-Clone This is a core parameter that implements GHOST unmanned backup / recovery.
Use the syntax as: -clone, mode = (operation), src = (sour), DST = (Destination), [Size, Sze (size) ......
This parameter is more complicated and spaces between parameters cannot be included.
Where Operation is an operation type, the value is available: Copy: Disk to disk; load: file to disk; dump: Disk to file; pcopy: partition to partition; pdump: partition to file. Source means operating the source, the value is available: the drive letter, from 1; or the file name, you need to write an absolute path. Destination is the target position, the value is available: the drive number, starting from 1; or the file name, you need to write an absolute path; @cdx, recorder, x represents the driver number of the burner, starting from 1.
Below examples:
Command line parameters: ghostpe.exe -clone, mode = copy, src = 1, DST = 2
Complete operation: Copy the local disk 1 to the local disk 2.
Command line parameters: ghostpe.exe -clone, mode = pcopy, src = 1: 2, DST = 2: 1
Completion operation: Copy the second partition on the local disk 1 to the first partition of the local disk 2.
Command line parameters: ghostpe.exe-clone, Mode = LOAD, SRC = g: /3prtdisk.gho, dST=1, SZE1=450M ,SZE2=1599M ,SZE3=2047M
Complete operation: loading the disk 1 from the image file, and adjust the size of the first partition to 450MB, the second adjustment is 1599MB, and the third adjustment is 2047MB.
Command line parameters: ghostpe.exe -clone, mode = pdump, src2: 1: 4: 6, DST = D: /PRT246.GHO
Complete operation: Create an image file with only selected partitions. Select partitions 1, 4, 6 from disk 2. After you understand these parameters, we can easily implement GHOST's unmanned backup / replication / recovery. Cup of coffee.
Precautions
1. When the backup system, a single backup file is preferably not more than 2GB.
2. Before the backup system, it is best to delete some useless files to reduce the volume of the GHOST file. Usually useless files are: Windows temporary folders, IE temporary folders, Windows memory swap files. These files usually take up to 100 more hard disk spaces.
3. Before the backup system, organize the target disk and source disk to speed up the backup speed.
4. Before the backup system and before the recovery system, it is best to check the target disk and source disk, correct disk errors.
5. When restoring the system, it is best to check if there is important file to be restored to the target disk that has not been transferred. Don't wait until the hard disk information is covered, it will regret it.
6. When selecting compression ratio, it is recommended not to select the highest compression ratio because the maximum compression ratio is very time consuming, and the compression ratio is not significantly improved.
7. After the software and hardware is installed, it is best to re-create image files, otherwise it is likely that some inexplicable errors appear after recovery. Ghost command line parameters list
details as follows:
/? Or / h: View help.
-Clone: Cloning.
-IA: Make a picture in all partitions.
-ID: Copy the entire disk (including unparalleled space).
-Ir: and ID, but no partition is adjusted to sector boundaries.
-Ib: Only the start sector of the disk is copied.
-Ial: The entire replication of the Linux partition is performed, and the normal method is used for other partitions.
-Or: Cover space and perform integrity check.
-Nolilo: Do not try to correct the LILO boot tunator after copying.
-Bootcd: When you use-Sure to create a CD-R image, you expect to find a bootable floppy disk.
-Fdsz: Clear the iconic byte on the target disk.
-FDSP: Keep the iconic byte on the target disk. (The priority is higher than -FSSZ)
-Lpm: LPT main parallel connection mode.
-Lps: LPT from parallel connection mode.
-TCPM: TCP / IP main connection mode.
-TCPS: TCP / IP is connected from the connection mode.
-USBM: Automatically enter the USB main mode.
-USBS: Automatically enter the USB source from mode.
-JL: Record multi-point transfer session diagnostic messages to files.
-JS: Set the maximum multi-point transmission value.
-JA: Set the name of the multi-point transfer session.
-Auto: Do not prompt to enter the file name, use the default value.
-CHKIMG: Check the integrity of the image file.
-Pwd: Specify a password.
-Skip: Specifies the file or directory in the FAT file system you want to skip.
-Pmbr: When performing any disk replication operation, the main boot record in the target disk is retained.
-Span: Allows access to multiple volumes.
-Split: Divide the image into several blocks when the image is created.
-Z: Compressed image file.
-F64: The 64K cluster size is allowed when the old image file is transferred.
-Fatlimit: Prevents the FAT partitioned size more than 2 megons.
-F32: Convert FAT16 to FAT32.
-NTD: Allows NTFS internal diagnostic check.
-NTC-: NTFS continuous cluster allocation.
-NTchkdsk: Forced Chkdsk to start in the next NTFS volume.
-NTIC: Ignore the Chkdsk bit on the NTFS volume.
-Ntil: Ignore non-empty NTFS log file check bits.
-NTIID: Ignore the copy of the partition system identifier.
-TapeBuffered: The default tape mode.
-TapeSafe: Useful when using old or unreliable tapes.
-Tapeespeed: Allows the tape speed.
-TapeunBuffered: Forced non-buffered tape input output.
-Tapeeject: The forced tape is ejected.
-Tapebsize: Tape block size.
-Rb: Automatically restart after compulsory replication.
-FX: Exit the program after completion of the replication.
-Quiet: quiet mode.
-Ssure: Use the -clone option to avoid questions.
-Batch: Batch mode, all operations are automatically completed by the program.
-Nofile: Prohibited file query.
-Script: Automatically follow the commands in the script file to run the program.
-Dl: Specifies the existing hard disk number.
-Fis: Use the detected hard drive maximum.
-Fnx: It is forbidden to expand 13 interrupt support.
-FFX: Using the Extension 13 interrupt. -Fni: Prohibits direct IDE hard drive access support.
-FFI: Use direct IDE hard drive access.
-Fns: Disable direct ASPI / SCSI hard drive access support.
-Ffs: Use direct ASPI / SCSI hard drive access.
-Noscsi: It is forbidden to use ASPI to access SCSI devices.
-BFC: Treatment of bad FAT clusters.
-Vdm: Use the disk check command before writing to check each sector on the disk.
-FRO: Forced even if there is a bad cluster, it will continue to replicate.
-CRC32: Use CRC32 check.
-Crcignore: Try to ignore errors in the image file.
-Fcr: Create a check file when a file is established.
-AFILE: Use the specified abort record file.
-DI: Display diagnosis.
-Memcheck: Diagnosing memory.
-Dd: Record disk information to GHSTSTAT.TXT
-Dfile: Use the specified information log file.
-Finger: Displays detailed fingerprint information.
-R: Display the program version number.
1.-RB This time the GHOST operation ends automatically restarts. In this way, you can get relieved when you copy the system.
2.-FX This time the GHOST operation ends automatically returns to the DOS prompt.