Solved

Norton Ghost  Corrupted Image

Posted on 2011-02-17
3
588 Views
Last Modified: 2012-05-11
Hi there

We are having a problem with a corrupted Norton Ghost image, it has previously been tested and was working but we have gone to get some data from it and cannot open it, it is now saying it is corrupt.

To get around this we tried to restore it to a hard drive and this looked like it was going to work, we could see files being transferred but it then crashed at 39% and said corrupted, we have checked the image and it is telling us to re-image the hard drive which we cannot do at the moment.

We have also check disked the drive that it sits on but this hasn't helped.

After doing some research I found we could tell Ghost to ignore CRC errors and force the image to complete, again, this did not work.

Is there anything else we can try to get access to the data

Thanks
0
Comment
Question by:aeardley
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 8

Expert Comment

by:bright12
ID: 34915587
You said that check was not helping. But did it find any errors on the disk?
0
 
LVL 35

Accepted Solution

by:
torimar earned 500 total points
ID: 34915640
Did you already check this article in the KB?
http://www.symantec.com/business/support/index?page=content&id=TECH107196&locale=en_US
(How to handle a corrupted image file)

Particularly interesting could be the "-corrupt" switch for ghostexp.exe (under "Recovering important files").
0
 
LVL 8

Expert Comment

by:moonie42
ID: 34915656
You state that you can't apply the image to a hard drive, but have you tried using Ghost Explorer to open/view files within the image?
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If your system is showing symptoms of browser hijacks or 'google search redirects' check out my other article (http://rdsrc.us/u3GP7A) first and run the tool TDSSKiller (http://rdsrc.us/GDBBs4) to get rid of the infection. Once done, and if the …
We have adopted the strategy to use Computers in Student Labs as the bulletin boards. The same target can be achieved by using a Login Notice feature in Group policy but it’s not as attractive as graphical wallpapers with message which grabs the att…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question