Solved

DBAN, THEN GHOST

Posted on 2006-06-17
2
658 Views
Last Modified: 2012-06-27
I have a stack of laptops that I am supposed to turn into useful tools.  I don't know any of the logins; don't know if they are Win2k or WinXP.  I used Deriks Boot and Nuke to wipe the drives, thinking that I could use ghost loaded from a CD to copy the image I want onto the C: drive.

After I used DBAN, the disk is wiped.  Thats good!  BUT, when I boot up into Ghost, it does not see the C: drive.  Do I need to partition it?  And if so, how?  I only have CD or USB access, no floppy.  Somehow I have to make Ghost see the hard drive so I can image it.

HELP!!
0
Comment
Question by:LEECHIPTURNER
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 70

Accepted Solution

by:
garycase earned 500 total points
ID: 16926780
"... don't know if they are Win2k or WinXP ..." ==>  :-)   ... after you "... used Deriks Boot and Nuke to wipe the drives ..." it's quite safe to say they are neither !!

Does the BIOS see the drive okay?   ... if so, I'm surprised Ghost doesn't "see" the drive to restore an image to it.   Do this:

(a)  Download Boot-It NG from www.bootitng.com  (the free demo)
(b)  Create a bootable CD
(c)  Boot to the CD;  press CANCEL at the 1st prompt; Okay at the 2nd (to go to Maintenance Mode)
(d)  Now click on Partition Work ==> and post exactly what it shows in the center section of the Window here (this will show the current partition structure of the drive)

0
 
LVL 70

Expert Comment

by:garycase
ID: 16926796
... if the BIOS isn't "seeing" the drive, you may need to force it to redetect the drive.  Post the make/model of the laptops if you need any help doing that.
0

Featured Post

Revamp Your Training Process

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is about my first experience with programming Arduino.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question