Solved

Ghost 9 boot CD with USB support needed ; can Ghost 8 boot CD read Ghost 9 image

Posted on 2009-04-03
1
619 Views
Last Modified: 2013-12-02
Hi

Q1:
Can a Ghost 8 boot CD be used to restore Ghost 9 backup image files (I think
Ghost 9 image files has extension .v9i   rather than the usual .gho or .ghs) ?


Q2 :
I have taken a Ghost 9 backup of my Thinkpad's C: drive before a problem surfaced
with my Thinkpad Win XP (no viral but all LAN and 3G connections won't connect /
enable).
Would Ghost explorer help in doing selective restore and if so which files should I
be restoring using Ghost explorer


Q3 :
Any idea on how to build a Ghost 9 Boot CD with USB support.  My Ghost 8 Boot
CD is given by an ex-colleague whom I've lost touch with
0
Comment
Question by:sunhux
1 Comment
 
LVL 63

Accepted Solution

by:
SysExpert earned 500 total points
ID: 24079524
1) Probably not

2) too general a question, I would try other trouble shooting measure, restore point, or malware and other checks as well as repair install or at least  SFC/scannow

3) Buy Ghost 9. probably very cheap on internet since it is so old.

I hope this helps !
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Wireless coverage 7 72
Setting up new wifi in new office 3 44
Cisco WLC: Blocking specific MAC address 3 61
2008 R2 Radius Server for wireless authentication 4 42
Create your own, high-performance VM backup appliance by installing NAKIVO Backup & Replication directly onto a Synology NAS!
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now