Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to restore Symantec Powerquest V2i backup files

Posted on 2008-06-18
2
Medium Priority
?
4,042 Views
Last Modified: 2012-08-13
I received a set of V2i backup files and after much digging around on the internet i found that these files where created using Powerquests backup software. However, it looks like Powerquest is no more, Symantec bought them,  and incorporated their software into some of it's own products. I haven't been able to find a product provided by Symantec that will let me restore these files. I spoke with a sales rep at Symantec who told me that they don't support that file extension anymore.

Does anyone know what program i can use that will let me view/restore these V2i files? I found a website that sells out-dated software where i can buy the original Powerquest software but i would rather buy a new program rather than one that's 6 years old.
0
Comment
Question by:Yaniv Schiff
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 35

Expert Comment

by:torimar
ID: 21813311
There indeed seems to be a huge confusion about this even among Symantec employees. On top of that, there seems to be the same brand name for completely different products.

From what I could gather, the following happened (simplified version):
When Symantec purchased Powerquest, the .v2i technology was incorporated into Norton Ghost, the old .gho technology abandoned. So theoretically, all Ghost versions from 2004 on should be able to process .v2i files.

You can download a free 30-day trial of the newest Ghost version to check this: http://nct.symantecstore.com/fulfill/0184.074


On top of this, Symantec started to create a whole new product formerly called "Symantec LiveState Recovery", now "Backup Exec System Recovery". If you browse the product related forums (https://forums.symantec.com/syment?category.id=besr) you will realize that this may be the product you're looking for, because searching for .v2i yields many hits and there are definitely users who created such files only this month.
So the statement by the Symantec employee you spoke to was either wrong or purposefully misleading.

Hope this helps.
0
 
LVL 35

Accepted Solution

by:
torimar earned 2000 total points
ID: 21837098
Having to deal with Ghost myself yesterday, I came back to this question.

I'm certain now that what you need is Symantec's "Backup Exec System Recovery", which is the continuation of "LifeState Recovery" + "V2i Protector":

http://entsearch.symantec.com/search?p=Q&lbc=symantec&uid=440143110&ts=c2&w=v2i&af=dtype:forum%20cat2_backupexecserverproducts:15047%20cat1:backupexecserverproducts%20&isort=score&method=and&ed=edn_15047
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Developer portfolios can be a bit of an enigma—how do you present yourself to employers without burying them in lines of code?  A modern portfolio is more than just work samples, it’s also a statement of how you work.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
This video demonstrates how to use each tool, their shortcuts, where and when to use them, and how to use the keyboard to improve workflow.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question