Alright all you smart folks out there, here's the one that i've actually gotten a few new grey hairs about.USING: Steps and techniques as provided by Shadow in his post regarding the creation of a bootable USB Thumbdrive/Pendrive/Whateveryouwanttocallit drive, XMSDSK to create a ramdrive labeled R:, mouse.com, and a slight variation of some nifty batch files (mainly for copying dos programs into the ramdrive and running from there), and appropriate dos based USB drivers. I have created a bootable USB stick.HOWEVER: when I start the computer and have it boot from said pen drive, it hangs when loading the usbaspi.sys. I have tried several different combinations of command switches (/e /o /u) and nothing seems to work. The specific error is 'driver constant in memory' and then it just hangs and never pushes forward from there.ALSO: Using ghost 11.5, is it somehow able to see/use external usb HDDs without above mentioned usb drivers? I'm so confused.
Exe download 2shared. Exe download at 2shared. Click on program Ghost 1. Online file upload unlimited free web.
- Here you can find ghost exe for dos shared files. Download Ghost Stories Spooky Ghost Stories for Kids and Adults Jason Blair.zip from mediafire.com 2.24 MB, Norton ghost 2004 for dos bootable floppy exe from 4shared.com (1 MB), Norton ghost 2004 for dos bootable floppy v6 10 0 6100 exe from 4shared.com (1 MB) free from TraDownload.
- Ghost 11.5 free download - Ghost Mouse, Norton Ghost, Ghost Control, and many more programs.
I'm used to using Ghost 8.0 (Ghost32) from within a BartPE disk and i'm just trying to improve the process while keeping it as simple as possible.Your input is encouraged and welcomed, thanks in advance. Since there is no such product as Ghost 11.5; what Symantec product do you have? There is more than one corporate product which includes the Ghost cloning tools now.Well, it's funny you should say that there is no such product as Ghost 11.5 because that's exactly what my ghost screen in dos is showing me. Maybe i'm just wrong, but my eyes are deceiving me. Funny, when i'm in DOS and I run the Ghost /ver it even shows Symantec Ghost 11.5.0 build 2113.April 22 2009, so I'm assuming from what you're saying, that's not the product is it? But it IS a fully functional ghost.hmmmmmm.To further answer your question, I don't 'have' a Symantec product, if you're referring to something like Norton Ghost 9, yes I have that, but i'm using Ghost 11.5 which you say doesn't exist for whatever reason. I'm old school, I don't use any of the newer symantec ghosting software/suites.Let me know if I can provide you with any more information on the product that I don't have but seem to be running.
I don't 'have' a Symantec productThat was actually pretty obvious, I just felt like pointing it out this time for the benefit of Rad and Pleo, who probably aren't really aware just how much of the discussion here (and it's a lot) is simply about facilitating piracy and not legitimate at all.Funny, i didn't see where my post shouted out that I was trying to pirate the software to begin with. Perhaps you might want to stay on topic with your future postings.Where the software came from to me is completely inconsequential considering it's widely available as just the ghost executable almost everywhere on the internet. I know tons of companies both locally and nationally that while they won't outright say they own a licensed copy of the software, they're using either ghostcast server or ghost in its DOS form anyway because it gets the job done. I know, i've worked for a few companies and even pointed that out several times.
Always got the same answer, 'As long as we're not installing it on a computer, it gets the job done the way we need it. And anyways, it was obtained freely over the internet.SOOOOOO, before you go bashing me and running off topic about my post, realize that 90% or better of the people using the software MOST LIKELY don't outright own a legit copy.
And if you do, good for you.If you're like most of the seasoned technicians I know, yeah, you carry some pirated software, who doesn't? What it comes down to in the field and on the job sometimes is you do whatever it takes by whatever means necessary to get the computer running for the customer is the shortest amount of time possible. If that means you use pirated software once to accomplish that, yeah go for it as long as you leave NO traces on the customer/client machine and you don't do it habitually. Someone once told me the best software that does the job is still always going to be the free stuff, well this my friend, was a free download. Can't help it if someone took ghost out of their programs folder and slapped it on the internet for everyone else to have.And finally, just so you know everything, I do have legit copies of ghost 7 and 8 (2003). I got a hold of this one and was testing it to see if there were any benefits to switching to it instead of what I have been using.
Don't come here busting my chops when you don't know the whole real deal. Is this forum now just for Blasting people for what might be called 'Piracy' or for helping people with their backup problems?If it's just for the above purpose, I would suggest that those who are offended by such accusations as well as myself, go to a different forum for help.
There are plenty of them on the internet, where you can get help without being called names.I personally have Ghost 11.5, which I got off of one of those 'Ultimate Boot CD's' that I found a link-to right here on this very forum.It looks and runs from a DOS boot disk, exactly like Ghost 2003 does, but it will back up Windows Vista, where Ghost 2003 will NOT.It's too big to fit on a boot floppy, but runs nicely from a boot CD or Flash Drive.Nigel, you can deny it's existence all you want but to the people already running it, you're sounding like an id10t. I know you're a Symantec employee and you must stick to the 'Party Line' but sometimes it gets pretty OLD when you start calling people 'Pirates'.Mr Bones, is it necessary for you to run Ghost from a boot Flash Drive or can you just as easily boot from a CD? I find in most cases, booting from a Flash Drive is more of an Exercise, just for fun, than a necessity.I do it, just because I can. Not because I have to.All the stuff you mentioned about RAM drives, etc., is just not necessary.Ghost 11.5 runs quite nicely from a boot CD and will access every drive on your system without special drivers, IF your motherboard lists those drives in its own 'drive list'. Or to say that another way, Ghost should be able to see everything that your motherboard can see.At least, that's the way it is on all my own systems.I like to set up Ghost on a Flash Drive before I burn it to a CD, so I can set up my options in the Ghost.ini file. You can't do that, once Ghost is burned to a CD.Be aware, if Ghost runs into an error when run from a CD, it can't write the error to its Ghosterr.txt file and can hang.So, if you're running Ghost from a CD, make sure you do it right, so there won't be any errors.
@ HellsbonesParts of this thread will be of interest. It's about using software that one hasn't paid for.Are you people on crack? Of course I know the policy on promoting pirated software. Yet again, I'll refer BACK to my original post, NOWHERE in there did I once say, 'HEY!
I just got a free ripped version of Ghost 11.5 and here's the link to download it. And oh btw, can someone help with what i'm trying to do?' No, I came in and asked a very simple question providing very specific information so people who can and want to help, LIKE Shadow, would be able to readily identify what I'm using in order to better help and resolve my issue and provide the appropriate level of guidance.@ Nigel,You don't want people pirating your software you help write/develop, write better software that can't be pirated.
Until you/your company and every other software developing company does that and moves past this crap about people pirating 'the best' software, nothing's going to change. If you want to complain about being the best of the best, you need to start thinking like the rest. If there's a way to do it, somone's going to find it and you need to be one step ahead of that someone.
Start looking into making your software 'locked' after installation so that things like this can't happen. But then again, you're the software developer(?) i'm sure you already thought of those bigger issues that you say everyone needs to look at from the grand scheme of things right?No, i'm not a software developer by any means, however what I am is an enduser technician that supports 3000+ people throughout the state. My job is to fix the problem. That's what I do, and thankfully because of software reps like yourself, I have just another reason to go give the contract to your competitors. AT the very least, I know that when I go to them, they're not going to immediately call me a software pirate because i'm standing there with a govt contract for their product. Garmin mapsource software 6.13.7 download free.
Stop being an ass and realize that until YOU (since you seem to speak for your company)fix the problem at your level, it's still going to be a problem.@Admins, Mods, and others with Authority to do so,I apologize for my rants, my behaviors and comments in this posting. However, in light of the things I have said, I know that the better part of this community as well as any other online community is in fact using misappropriately acquired software for whatever purposes. We are here as an online forum for 'HELPING' people resolve issues, provide technical support, provide our knowledge in the hopes that we can all somehow somewhere, fix the problems at hand.
In that aspect, that's how I came into this forum, this specific posting. If there's something wrong with that, PM me, tell me i'm wrong, and tell me to leave and I will without question because there are plenty of other sites online that I could go to, but I CHOSE to come here because of the insurmountable knowledge from people LIKE Shadow.@Everyone else,I apologize to you all, I'm not normally this much of 'an @ss' in forums, but truely, I hate being pointed at and someone trying to make me be their example whether right or wrong and for whatever reason. Sorry if i've offended any of you with this particular post.@ Shadow,Thanks for your input, I didn't think about creating a ghost.ini file, i'll have a look at that. Yes I was throwing it on a thumbdrive for, as you said, an exercise to see that it would run. As always, your input is greatly appreciated and more than welcomed.
Mr Bones,As I've said so many times before, if you want to set up Ghost on a CD, it's very advantageous to set it up first on a re-writable media, like a floppy or flash drive. Once the program is burned to a CD, you can't just go in and edit things like batch files, Ghost.ini files, etc.CD's are READ ONLY devices.Many times since I first burned my Ghost boot disk to a CD, I've wanted to change some little thing, like one of my batch files or the Ghost.ini file.Well, having the original of that CD on a flash drive, makes it easy to do the editing and then just burn a new CD and you're in business.I use only Nero for burning my Ghost CD's. Nothing is any simpler.Everyone who's ever read me on this or the other twenty or so forums that I work, knows darn'd well that I like things SIMPLE! If it ain't simple, I don't want anything to do with it. Alright all you smart folks out there, here's the one that i've actually gotten a few new grey hairs about.USING: Steps and techniques as provided by Shadow in his post regarding the creation of a bootable USB Thumbdrive/Pendrive/Whateveryouwanttocallit drive, XMSDSK to create a ramdrive labeled R:, mouse.com, and a slight variation of some nifty batch files (mainly for copying dos programs into the ramdrive and running from there), and appropriate dos based USB drivers. I have created a bootable USB stick.HOWEVER: when I start the computer and have it boot from said pen drive, it hangs when loading the usbaspi.sys. I have tried several different combinations of command switches (/e /o /u) and nothing seems to work.
The specific error is 'driver constant in memory' and then it just hangs and never pushes forward from there.ALSO: Using ghost 11.5, is it somehow able to see/use external usb HDDs without above mentioned usb drivers? I'm so confused. I'm used to using Ghost 8.0 (Ghost32) from within a BartPE disk and i'm just trying to improve the process while keeping it as simple as possible.Your input is encouraged and welcomed, thanks in advance.It should be noted that I have uncovered what I think is part of the problem, any further assistance would be greatly appreciated.' I'm working on a project that can boot from flash media, the issue i'm having is that if I have USB legacy turned on, I can see one type of USB connection such as my USB attached drives. However, I lose the ability to use USB connected mouse and keyboard.
If I turn off USB Legacy, I can use mouse and keyboard, but lose visibility of USB attached drives, this is the delima i've been facing for the past few weeks.' On my MSI mobo, those functions are separate.not all together.Legacy USB support and USB mouse and keyboard support are two separate settings.But anyway, I can access my USB drives and run Ghost XXX with my USB mouse, at the same time.Success or failure with these USB things seems to rely mostly in the capabilities of the mobo itself.Many mobo's in Name Brand PC's are not very capable at all.Are you using any mouse driver at all? Or just going al'natural?I just use 'Mouse.com'.With SO MANY variations in Bios's and mobo's, there is NO pat answer to many problems, with USB devices.
You just have to experiment around with different things till you find something that works for you.Good Luck,The Shadow.
This document lists Ghost's command-line switches in alphabetical order. For more information on Ghost command-line switches, see the following documents:. For Symantec Ghost Solution Suite 3.x seeSwitches and hyphensWhen a switch is both preceded by and followed by a hyphen, such as with -NTC-, the second hyphen means that the feature is disabled.
Such switches are normally not used without the second hyphen. For instance, -NTC- forces Ghost to disable the allocation of NTFS contiguous cluster runs.NTC is not used because Ghost enables the allocation of NTFS contiguous cluster runs by default.Switches and versions. The version information is not complete. Some switches are not available in all versions. Usually, a switch available in one version will also be available in later versions, but not always. Unless otherwise stated, most of the following switches are used on the Ghost command-line with Ghost.exe, Ghostpe.exe, or Ghostwks.exe.SwitchDescriptionGhost Version@filenameSpecifies a file that contains additional command-line switches that Symantec Ghost should read.
Filename indicates the path and file name of the command-line switch file. The command-line switch file can include any Symantec Ghost command-line switch.
The Symantec Ghost command-line switch file must be a text file with each switch on a separate line. This lets you exceed the DOS command-line limit of 150 characters.@Connect to. See the document.@MTxDesignates which tape device to use (0 through n).-#ENVDesignates the filename of your ENV file for registration.-DiagnosticReplaces the default abort error log file name,.txt, with the directory and file given in.Symantec Ghost 8.0Norton Ghost 2003Image fileAutomatically names spanned image files during creation. Using this switch avoids the user prompt that asks for confirmation of the next destination location for the of the image file that is being restored.This switch is the default behavior for Symantec Ghost.Symantec Ghost 8.0Norton Ghost 2003User interventionPrevents abort messages from waiting for user and removes user interaction prompts. The return value of.exe must to identify whether the operation was successful. Symantec Ghost returns 0 on success and 1 or higher on failure or error.Symantec Ghost 8.0Norton Ghost 2003-Bad diskHandles bad FAT clusters when writing to disk.
If this switch, and the target partition is FAT, Symantec Ghost checks for and works around bad sectors and.This option may slow Symantec Ghost operation substantially.Symantec Ghost 8.0Norton Ghost 2003Batch mode processingPrevents any GUI display with switches that do not require any user input, for example, the clone switch. Using this switch lets you execute Ghost operations on a computer with no video adapter.Symantec Ghost 8.0-Image fileSets the block size to K for writing to image files.Removed from Symantec Ghost 8.0.Clone / CD-R and CD-RW drivesWhen writing an image directly to a CD/DVD writer, this makes the CD/DVD bootable in drive A. If you use the -SURE switch with -, and a floppy disk is not in drive A, then a non-bootable CD/DVD.Symantec Ghost 8.0Norton Ghost 2003-NetworkGhost creates an image file using a buffer of size = number of KB. The default size of the buffer by Symantec Ghost. The switch lets you override this size. You can set the buffer size value from 1 to 32.Symantec Ghost 8.0 Norton Ghost 2003-Image FileChecks the integrity of the image file that is indicated by the filename.Symantec Ghost 8.0 Norton Ghost 2003-CLONECloneGhost.exe operation switch. This switch allows automation of Ghost.exe operations and has a series of arguments that define the operation parameters.Symantec Ghost 8.0Norton Ghost 2003-CNSImage FileReverts the naming of spanned files to the system used by versions of Symantec Ghost prior to Symantec Ghost 6.5.
Ghost 11 5 Exe Dos Downloads Torrent
If this switch is not used, then the naming of spanned files conforms to Microsoft application guidelines. You do not need to use this switch when reading an existing file. Use this switch when the first five characters in a file name must be unique.For example:With -CNS: (Allows you to save in long file name format.)This is a long file name.ghoThis is a long file name.001This is a long file name.002Without -CNS:Filename.ghoFilen001.ghsFilen002.ghsSymantec Ghost 8.0Norton Ghost 2003-CRC32CRC32 / Image verificationThis switch creates an image file with CRC values and then verifies the list against the original or a copy. The purpose is to allow both quick listing of the contents of an image file and verification that a disk created by Symantec Ghost contains the same files as the original.Symantec Ghost 8.0Norton Ghost 2003-CRCIGNORECRC32 / Image verificationCRC errors indicate data corruption. This switch overrides CRC errordetection and may allow a corrupted image file to be used. Using this switch leaves the corrupted files in an unknown state. You can use this switch to help you extract files from a corrupted image file.Symantec Ghost 8.0Norton Ghost 2003-CVTAREAFAT partitionsCreates a file, Cvtarea.tmp, that is the location of the MFT when the FAT32 partition is converted to NTFS.
This switch operates in a similar manner to the cvtarea program that Microsoft provides in Deploy.cab on the Windows XP installation CD.The file is created in the root directory of the partition during a partition or disk restore and is created as a contiguous space on the disk. The largest size allowed is 4 GB. If the file is larger than this, it is truncated to 4 GB.Consult the Symantec Ghost Reference Guide for information on the syntax and default settings.Symantec Ghost 8.0Norton Ghost 2003-DDDiagnosticDumps disk metrics information to the dump log file, Ghststat.txt.
The file location can be altered using the -dfile=filename switch.Symantec Ghost 8.0Norton Ghost 2003-DFILE=filenameDiagnosticChanges the path and file name of the dump log file created using the -dd switch.Symantec Ghost 8.0Norton Ghost 2003-DIDiagnosticDisplay diagnostics.-DL=numberDisk AccessSpecifies the number of hard disks present. Valid numbers are between 1 and 8. This may help when the BIOS does not report the number of drives correctly.Use this switch in the following circumstances:. When Ghost does not detect a fixed disk.
Use the -DL switch to force Ghost to detect fixed disks that are on higher numbered slots. To search all slots, use ghost -DL=255.
When Ghost stops responding immediately after starting Ghost. This may be due to problems with higher slot numbers. Use -DL with values less then 146. The lowest usable value would be 127 plus the number of physical drives on the computer.
For instance, if the computer has 2 drives, the command would be: ghost -DL=129.Symantec Ghost 8.0Norton Ghost 2003-DLIST=drivesDisk AccessSpecifies a list of drives to search for span files. If a span file cannot be found, then the drive letters in dlist are substituted one by one to look for the file on other drives.For example, the command ghost -dlist=CDEFG instructs Norton Ghost to look for files on C, D, E, F, and G drives. The path remains the same.Symantec Ghost 8.0Norton Ghost 2003DSTCloneUsed as a parameter with the -CLONE switch. Defines the location of the destination partition, disk, or image file. See the document.-F32FAT partitionsLets Symantec Ghost convert all FAT16 volumes to FAT32 volumes when the destination partition to convert is larger than 256 MB in size. Ensure that the installed operating systems can access the volumes that will be converted to support FAT32.Symantec Ghost 8.0Norton Ghost 2003-F64FAT partitionsLets Symantec Ghost resize FAT16 partitions to be larger than 2047 MB using 64 KB clusters. This is only supported by Windows NT and Windows 2000.
Do not use on computers with other operating systems.Symantec Ghost 8.0Norton Ghost 2003-FATLIMITFAT partitionsLimits the size of FAT16 partitions to 2047 MB. Useful when Windows NT FAT16 partitions are present on the disk and 64 KB clusters are not wanted.Symantec Ghost 8.0Norton Ghost 2003-FCRCRC32 / Image verificationCreates a CRC file, Ghost.crc, while making an image file. This is the same CRC file that is created when using one of the create actions on the -CRC32 switch.Symantec Ghost 8.0Norton Ghost 2003-FDCForces Ghost to check for a dongle. In Ghost versions prior to 2.09, Ghost automatically checked for a dongle.Removed from Symantec Ghost 8.0-FDSPCloneForce Disk Signature Preserve. Use to resolve bootup failures after cloning a disk on a Windows 2000/XP computer, especially when the disk and controller are the same in the source and destination computers, but the partition sizes or layout are different.
Ghost 11.5 Dos Download
This switch preserves the signature bytes on the destination disk when performing a disk-to-disk or image-to-disk cloning operation. This switch prevents Ghost from automatically forcing a disk initialization, which Ghost does by default when imaging a Windows 2000/XP disk.Symantec Ghost 8.0Norton Ghost 2003-FDSZCloneForce Disk Signature to Zero.
Download Ghost 11.5
Use to resolve bootup failures after cloning a partition on a Windows 2000/XP computer, especially when the disk and controller are the same in the source and destination computers, but the partition sizes or layout are different.