Disk Imaging Who, What, When, Where, Why (and maybe How) February 9th, 2010 Manitoba UNIX Users Group Adam Thompson -

Slides:



Advertisements
Similar presentations
COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Advertisements

Windows fails to boot. HELP !! Recue tools and other stuff Windows install disk Backup Image - From Acronis / DriveImage Special Rescue tools disks -Hirens.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Using Ghost cast to Image PCs
Imaging Software: Norton Ghost Presented by: Paul Tsan Carlos Vasquez Steven Sanchez.
Princeton PC Users Group Hard Drive Disaster! By Paul Kurivchack March 14, 2005.
1 Chapter 2 Operating Systems: Software in the Background.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Public Computing Roundtable December 1, Lab Management Tools Imaging Imaging Securing Securing License Compliance License Compliance Remote Management.
Installation Ubuntu for Libraries. Step 1: Download Head on to Pick Ubuntu LTS; just click the big orange.
Windows 7 Upgrade to 8.1 My Experience. Hardware 1.Fry’s components 2.Desktop platform 3.64-bit processor 4.8 gb ram 5.Multiple SATA internal hard disks.
Developed by Klaus Knopper Linux Consultant. What is Knoppix?  Unix-like operating system  Run directly from CD or DVD  Bootable from USB flash drive.
 Advantages  Easy to learn  Graphical Advantages  Help and Support  Widely used  Software compatibility  Customisable  Customisable Hardware 
Moving to Win 7 Considerations Dean Steichen A2CAT 2010.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
When your hard-drive DIES! Are you protected?. Did you know? ALL hard-drives eventually fail. Typical HD life is between 2 and 8 years. Five years is.
Learning Outcomes At the end of this lesson, students should be able to: State the types of system software – Operating system – Utility system Describe.
Symantec Ghost Effective Disk Cloning Software. What is Ghost? “Ghost is a software product from Symantec that can clone (copy) the entire contents of.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Operating System Utility Programs & Stand-alone utility Programs.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Drive Imaging Joe Cicero Northeast Wisconsin Technical College.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Backup for Mac OS X Richard Corzo March 2, Time Machine Built in to Leopard (10.5) and Snow Leopard (10.6) Requires external drive or Apple’s Time.
CIS 191 – Lesson 2 System Administration. CIS 191 – Lesson 2 System Architecture Component Architecture –The OS provides the simple components from which.
Drive Imaging Richard Woods March 14, Major Disaster Recovery What if?  Major software corruption  Hard disk failure You could spend 1-2 days.
10/1/2015 Chapter 2 Installing Windows XP Professional.
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Software.
Windows OS and Application Management Chris Brew Rutherford Appleton Laboratory J-Lab, HEPiX/HEPNT 30/10/2000.
January Backing Up Your PC’s Hard Drive Dr. Michael Stachiw.
WINDOWS XP PROFESSIONAL AUTOMATING THE WINDOWS XP INSTALLATION Bilal Munir Mughal Chapter-2 1.
T4L – NSW DET SOE Muticasting an Image. Problem New T4L computers use SATA HDD’s SATA drives are not recognised by Current DET Licensed version of Ghost.
Ch 5 Quick Quiz T F 1. Linux is an example of an operating system. T F 2. With sequential processing techniques, multiple tasks are performed at the exact.
Back up, Restore or Clone hard drives or partitions The easy way with Live Distros! By Carl Weisheit.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Workstations.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Windows XP Professional Installation Types ©Richard L. Goldman February 5, 2003.
PC Backup & Recovery. Why Backup? ● It's virtually guaranteed if you use computers that eventually, something will happen that will require you to restore.
Backup Strategies A Discussion November 19, 2015 Tom Davis.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
Kevin Brouelette OCLUG
WHAT SHOULD YOU DO IF YOUR COMPUTER WILL NOT BOOT UP
Delete an Operating System From Single-Boot HP Computer.
Exercise #1: Exploring Open-Source Operating Systems with Virtual Machines J. H. Wang Sep. 20, 2016.
When your hard-drive DIES!
Basic Guide to Computer Backups
Red hat Installation 2 Live CD.
Guide to Linux Installation and Administration, 2e
Operating System Review
CS101 Booting A Computer.
Effective Disk Cloning Software
Virtualization OVERVIEW
Why Computer Security Need???
Tips to Replace the Boot Drive on a PC using Norton Ghost.
Chapter 4 The Power behind the Power
Operating System Review
Exercise #1: Exploring Open-Source Operating Systems with Virtual Machines J. H. Wang Sep. 21, 2018.
OPS235 MANAGING LVMs – PART I
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
Chapter 4 The Power behind the Power
Different types of Linux installation
Computer Startup.
Have you seen this screen?
Presentation transcript:

Disk Imaging Who, What, When, Where, Why (and maybe How) February 9th, 2010 Manitoba UNIX Users Group Adam Thompson -

WHO

● Users ● System Administrators ● Tech Support ● Vendors

WHAT

● Reading an exact copy of a disk or partition ● Writing that to another disk, or CD/DVD, or file ● Writing that image back to a disk or partition

WHERE

● While running Linux (or another OS) ● Boot from CD ● Boot from floppy ● Boot from network ● Boot from USB key

WHERE ● On the source machine ● On the target machine ● On a transfer machine ● Over the network on two or three of the above

WHEN

● Replacing a hard drive ● Replacing a computer ● Backing up a hard drive ● Testing ● Resizing partitions

WHY

● VERSUS Reinstalling: ● Can be much faster ● Keeps preferences ● Implicitly creates a backup

WHY ● VERSUS Copying: ● Can be much faster ● Can't lose any files ● Implicitly creates a backup

WHY ● VERSUS “dd if=/dev/hda”: ● Much faster ● Much smaller ● Easier to manage multiple images ● Multicast & Broadcast

HOW

● Norton/Symantec Ghost ● The “gold standard” ● Acronis TrueImage ● DriveImageXML ● SelfImage [free]

HOW ● Apple Software Restore ● Apple Disk Utility ● Carbon Copy Cloner ● SuperDuper!

HOW ● PartImage ● CloneZilla (uses PartImage) ● SystemRescueCD (ditto) ● PING (ditto) ● g4u ● G4L

HOW ● Demo if time (and equipment!) permits...