Partition Magic Logs

Posted on 2006-04-10
Last Modified: 2008-03-17
Any information on where Partition Magic keeps its logs, task info, etc. I recently resized a partition and ran into problems and would like to see what partition magic thought it was trying to do. I'm guessing because of the way partition magic creates tasks, there has to be some sort of log, etc. that lists partition info before task, after tasks, etc.
Question by:ruggerrick

    Author Comment

    probably easy, but kinda urgent
    LVL 59

    Accepted Solution

    Well, I did a google search for "partition magic log file" and I found this site where there is a .pdf file which consists of the Partition Magic 7.0 User Guide:

    Starting on page 99, there is a description of the command line parameters that can be used with Partition Magic Pro.  It appears you can specify the location yourself of a log file (it doesn't say whether or not one is automatically used if you don't specify one).  Here is a representative quotation from that page:

    Whenever the program is run from a script, it is suggested that a log of
    all that occurred should be kept. The /LOG parameter is most useful
    when used with the /CMD parameter to review exactly what happened
    during the script execution. The /LOG parameter will specify the name
    of a file where all output will be directed. The output will appear as if a
    user had been executing the program through keyboard input,
    displaying each script command and all that happened because of that

    To specify a log named RESULTS.FIL, the command line would be:
    Do not attempt to modify the partition on which the log
    file is created. The log file is created on the partition
    that PQMAGIC is run from. If you need to modify this
    partition, do not use the /LOG switch. Doing so will
    damage your partition.

    Author Comment

    Running through a similar action in VMware I found that 2 files are "dropped" into c:\windows\temp, a debug file and a script file. These are the files that list the actions being taken and the previous and future settings

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Suggested Solutions

    Title # Comments Views Activity
    Functional Level 2012 R2 and XP 3 119
    external hard drive and Raidon 3630 5 106
    Blocking of USB Port 18 88
    different catridges 8 83
    If you build your web application in Visual Studio you'll get at least a few binaries, or .DLL, files in your bin folder. However, there is more compiling to be done. Normally this would happen when an ASP.NET resource within the web site is request…
    Sometimes people don't understand why download speed shows differently for Windows than Linux.Specially, this article covers and shows the solution for throughput difference for Windows than a Linux machine. For this, I arranged a test scenario.I…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now