Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What software does ghost belong to in the computer?

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

Editor to share with you what kind of software ghost belongs to in the computer, I believe that most people do not know much about it, so share this article for your reference, I hope you can learn a lot after reading this article, let's go to know it!

Ghost belongs to the commonly used "data backup and restore" software. Ghost software is an excellent hard disk backup and restore tool developed by Symantec, which can realize partition and hard disk backup and restore of various hard disk partition formats, such as FAT16, FAT32, NTFS, OS2 and so on.

Ghost belongs to the commonly used "data backup and restore" software.

Ghost software is another fist software of the famous Symantec. GHOST is the abbreviation of "General Hardware Oriented Software Transfer", which means "general-purpose hardware delivery software".

Ghost software is an excellent hard disk backup and restore tool, which can achieve FAT16, FAT32, NTFS, OS2 and other hard disk partition formats and hard disk backup and restore; commonly known as cloning software.

1. Features: since it is called cloning software, it means that the backup and restore of its Ghost is carried out in the sector of the hard disk, that is to say, the physical information on a hard disk can be completely copied, not just a simple copy of the data. Human cloning can only clone the body, but this Ghost can clone everything in the system, including sound and animation images, and even disk fragments can help you copy, which is more powerful than human cloning. Ghost supports backing up a partition or hard drive directly to a file with a .gho extension (Symantec calls this file an image file), as well as directly to another partition or hard drive.

2. Run ghost: so far, ghost only supports the running environment of Dos, which is not a pity: (. We usually copy the ghost file to the boot floppy disk (U disk), or burn it to the boot CD. After entering the Dos environment with the boot disk, enter ghost at the prompt and enter to run ghost. The first thing that appears is about the interface.

Press any key to enter the ghost operation interface, there is a ghost menu, the main menu has four items, from bottom to top are Quit (exit), Options (option), Peer to Peer (peer-to-peer, mainly used in the network), Local (local). In general, we only use Local menu items, under which there are three sub-items: Disk (hard disk backup and restore), Partition (disk partition backup and restore), and Check (hard disk detection). The first two functions are used most, and the following operation explanation is carried out around these two items.

3. Since Ghost replicates by sector in backup and restore, you must be careful not to get the target disk (partition) wrong, or it will be miserable if you erase all the data of the target disk (partition). There is not much chance of recovery at all, so we must be serious and careful! But you should not be too nervous, in fact, the use of Ghost is very simple, understand the meaning of those words, you will understand its usage, coupled with a serious attitude, you can certainly master it! Let's come together:)

The above is all the contents of the article "what Software does ghost in the computer belong to?" Thank you for reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report