Pre-Ghost Security Process

Posted on 2004-11-02
Last Modified: 2013-11-29
I need to copy my Hard Drive to a new appears the old is "bad" according to mfg.  There have been issues on the old HD that appeared to be from a  Virus or other pest.  Since I intend to use Norton Ghost to copy the HD, I wish to make sure there is no Pest or Virus in residence on the old HD.  I have researcrd and found pest/virus deletion answer #s Q-21168160 and Q-21159548 on Experts-Exchange.  

Both answeres are excellent...can anyone comment whether these are the most complete processes to eliminate all pests and Viruses prior to copying my HD?  Anyone have aditional suggestions?

Also, is anyone aware of a better Software than Norton Ghost to make a duplicate Hard drive?  I am not enchanted with Symantec but Ghost seems to be the most Highly recommended. Thank You

Question by:OrvHaugen
    LVL 3

    Accepted Solution

    Well In my long experience I have always woked with Northon Ghost and never had problems with it ... but just be sure that you have the most rescent updated version ... "just in case" case :))

    And this is by my opinnion the bast way to clean up the pests from your computer ...

    Hope my opinion counts ...
    LVL 20

    Expert Comment

    If you drive is dying...I would back it up IMMEDIATELY...then worry about the virus removal AFTER the restore!

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
    Every business owner understands the significance of online customer reviews and the impact it can have on sales and revenues. With technology advancing at such a rapid pace, getting online reviews has never been easier, especially when many regions…
    Viewers will get an overview of the benefits and risks of using Bitcoin to accept payments. What Bitcoin is: Legality: Risks: Benefits: Which businesses are best suited?: Other things you should know: How to get started:
    This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now