[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


remove ghost virtual partition

Posted on 2008-11-10
Medium Priority
Last Modified: 2013-12-02
I installed Norton Ghost 2003 and it created a virtual partition in which it runs.  I am having errors with Ghost and it won't run, and won't let me exit the partition.  HOW DO I REMOVE THE PARTITION?
Question by:MGothelf
LVL 63

Expert Comment

ID: 22934372
I would check the Symantec site for the errors you are getting, since you could have issues with booting if this is not done correctly.

I hope this helps !
LVL 88

Expert Comment

ID: 22938138
Use a partition manager like fdisk or similar to delete the extra partition. You'll find a few such tools on the UBCD.

LVL 11

Expert Comment

by:A. Cristian Csiki
ID: 22966332
Or Gparted from Rescue CD

Good luck,


Accepted Solution

MGothelf earned 0 total points
ID: 23083026
None of these answers addressed my problem.  I was not able to get back to Windows to use a partition manager (I have Partition Magic).  The problem was Ghost would only START to boot to Ghost, but not finish and not allow booting to Windows.

The solution was to use my Windows CD, and go through the 'reinstall windows' scenario which got me to the screen where I could delete the partition and make another bootable.
LVL 88

Expert Comment

ID: 23084196
We didn't ask you to get to windows to run those tools. They start directly from their CD's from which you boot from. Those tools on the UBCD are DOS based and GParted is Linux based.


Featured Post

Transaction-level recovery for Oracle database

Veeam Explore for Oracle delivers low RTOs and RPOs with agentless transaction log backup and transaction-level recovery of Oracle databases. You can restore the database to a precise point in time, even to a specific transaction.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

VM backup deduplication is a method of reducing the amount of storage space needed to save VM backups. In most organizations, VMs contain many duplicate copies of data, such as VMs deployed from the same template, VMs with the same OS, or VMs that h…
In real business world data are crucial and sometimes data are shared among different information systems. Hence, an agreeable file transfer protocol need to be established.
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question