Solved

How to create a bootable CD/DVD from a DMG ?

Posted on 2009-07-06
7
1,739 Views
Last Modified: 2013-11-12
I am trying to figure out what the best way is to create a bootable DVD from a DMG file?

Upon first purchasing Leopard 10.5 way back when it came out, I decided to back up the disk on my computer by creating a Disk Image. Turns out it was a good move because now that I need the disc, it seems to have picked up a big scratch on it's surface, and it simply refuses to mount at this point...I was hoping someone would be gracious enough to provide me with instructions on what would be the best way to create a bootable DVD from this DMG file...

Any suggestions would be greatly appreciated... Thanks!
0
Comment
Question by:marietto2008
  • 4
  • 3
7 Comments
 
LVL 53

Expert Comment

by:strung
ID: 24786973
I think you can just burn the image using Disk Utility.
0
 
LVL 53

Accepted Solution

by:
strung earned 500 total points
ID: 24787019
0
 
LVL 2

Author Comment

by:marietto2008
ID: 24787303
I want to build a bootable dmg of my leopard installation,not of my original leopard disk...
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 
LVL 53

Expert Comment

by:strung
ID: 24787364
You already have the disk image. Just follow the instructions following "BURN THE IMAGE" in the link.
0
 
LVL 2

Author Comment

by:marietto2008
ID: 24788263
I've converted dmg to cdr and I've burned it. It didn't work because inside the dvd there is a file called leopard.cdr. Why ?
0
 
LVL 2

Author Comment

by:marietto2008
ID: 24798971
I've followed the instructions in the link,but the dvd that comes out is empty.
0
 
LVL 2

Author Closing Comment

by:marietto2008
ID: 31600230
10x
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Syslogd is a utility that traps and logs messages sent by running processes. It is configured with the syslog.conf file, which consists of lines containing a pair of fields: "the selector field which specifies the types of messages and priorities to…
In this article we have discussed about the OS X EI Capitan and how to fix Wi-Fi issue in OS X El Capitan. We have explained how to delete system level preferences and create a new Wi-Fi location to resolve Wi-Fi issue.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question