Solved

How to delete files within a v2i file

Posted on 2009-05-07
4
1,466 Views
Last Modified: 2013-12-02
I have a bunch of .v2i image files created by PowerQuest Drive Image and Symantec.  These image files have a bunch of stuff in them I don't need.  Is there a utility that can delete files within a .v2i file?

I've tried the following:
Ghost Explorer
PowerQuest Backup Image Browser
0
Comment
Question by:kennethp123
  • 2
  • 2
4 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 250 total points
ID: 24330571
No you can't delete files from within images. You could restore the image, then delete whatever isn't needed, and then create a new image.
0
 

Author Comment

by:kennethp123
ID: 24354529
Restoring these images, deleting the unneeded files, and then re-imaging isn't an option.  I am still looking for a .v2i file editor.
0
 
LVL 88

Expert Comment

by:rindi
ID: 24355037
There is no such editor. There can be such options for other imaging products though. Shadowprotect has such an option (checkout "update backup images"). Apart from that it is the fastest such product on the market, and includes the universal restore in it's base product. It can handle v2i files, but I don't think it'll be able to edit them.

http://www.storagecraft.com/products/ShadowProtectDesktop/
0
 

Author Closing Comment

by:kennethp123
ID: 31579208
A v2i image editor capable of deleting/modifying files within an image does not exist.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question