Solved

Making bootable DVD's

Posted on 2004-04-20
8
493 Views
Last Modified: 2010-04-26
hi, we're about to take on a 50-strong addition to our sales force so will need to get a lot of machines ready simultaneously - our company has been using Ghost for years to great effect and we've used Ghostcast in conjunction with a bootable floppy.  However, the new laptops we've bought (the Latitude D-series from Dell, mmmmm) aren't being outfitted with a floppy-drive, so we need to find a way of using the DVD drive in it's place

thanks in advance!!
0
Comment
Question by:tonybushell
  • 2
  • 2
8 Comments
 
LVL 10

Expert Comment

by:Snowguy
ID: 10872978
Take a look here for some help.
http://www.bootdisk.com/nero.htm
0
 
LVL 4

Accepted Solution

by:
venishjoe earned 43 total points
ID: 10875443
Hai,

Check out

http://www.ezbsystems.com/enindex.html

(Shareware but very good in creating Bootable DVD's)

Regards
Venish
0
 
LVL 10

Assisted Solution

by:Snowguy
Snowguy earned 41 total points
ID: 10877065
What is your goal here to use one laptop to clone the others?
The DVD drives in the laptops are they writable drives?
I use Drive image when the image is writen to Disk (CDR or DVDR) it also makes it bootable.
http://www.symantec.com/driveimage/
0
 
LVL 3

Assisted Solution

by:Noordeloos
Noordeloos earned 41 total points
ID: 10877280
Tony,

The most simple way is to write your floppy image to a cdrom (nero, create bootable cdrom, insert floppy, burn), and just keep using GHOST

Erwin
0
 
LVL 3

Expert Comment

by:Noordeloos
ID: 12408643
seems that my answer was correct.... :)
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Hello to users to the new age of computers. There are so many products to choose from nowadays that you maybe confused to understand which product is the correct product for you. Let me explain briefly what should be the idea product for your best n…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now