Solved

iBook HDD

Posted on 2007-11-21
4
393 Views
Last Modified: 2010-04-03
Hi-

I have a friend who owns one of the more problematic iBooks with a notoriously faulty motherboard. The question I have relates to a procedure to secure all the data from his HDD.
I was hoping to use an external enclosure unit from an external HDD to hook up his HDD and mount it to my MacBookPro. I'm concerned the HDD cables from the HDD's external enclosure will not fit the iBook HDD.
Although I've worked on notebooks before, I've never had to swap HDDs, or even touch them. Any information would be appreciated.

Thanks
0
Comment
Question by:WolfeTone32
  • 2
  • 2
4 Comments
 
LVL 19

Expert Comment

by:pheidius
ID: 20329389
Sounds a little overcomplicated, but I need to know which ibook. Does it have fire wire or just USB and what OS is it running?  Does he think the drive is failing? Or is he planing to try to put a larger drive in it? Unfortunately, you cannot fire wire target mode boot a PPC Mac from an Intell one so that rules that out.  But you could still get all the data off that drive without removing it. Assuming you are using some flavor of OS X,  you can just use a program like carbon copy cloner of super duper and clone an entire boot able drive image of his iBook to an external USB or fire-wire drive.

http://www.bombich.com/software/ccc.html
http://www.shirt-pocket.com/SuperDuper/SuperDuperDescription.html
0
 

Author Comment

by:WolfeTone32
ID: 20329593
Hi Pheidius,

The problem is that the motherboard is no longer good and he doesn't want to replace it again. He just wants all of the data from his HDD. It's a iBook G3 running OS X.
My main concern is that the external enclosure is for a large SATA HDD. I pulled out the HDD from that unit and wonder if I could simply hook his up to that unit and access all of the data. Considering the iBook has an ATA 66 HDD, I didn't think the external enclosure's IDE cable would fit.
Apologies for the confusion. I don't think this was clearly stated in my initial post.

Thanks,

Stephen
0
 
LVL 19

Accepted Solution

by:
pheidius earned 500 total points
ID: 20332395
0
 

Author Comment

by:WolfeTone32
ID: 20333871
Thanks for the information, Pheidius.

Cheers,

Stephen
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The question appears often enough, how do I transfer my data from my old server to the new server while preserving file shares, share permissions, and NTFS permisions.  Here are my tips for handling such a transfer.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question