cloning from an identical machine

Posted on 2012-09-06
Last Modified: 2012-09-06
Hi, and thanks for any insight

I have a client who had a computer with a very nasty infection that brought the computer down.  The malware and subsequent cleaning destroyed the OS, so I copied the data attempted a restore from the restore partition.  But the restore fails with a bad-system-config error.

My client has a number of identical machines used for various purposes.  I was wondering if I  simply cloned one of those to the disk from the infected computer whether the recovery partition from that clone would operate normally, and once the recovery is complete, whether the restored partition would run as the correctly licensed OS.

Any knowledge of the anticipated results would be helpful.  I'm thinking it would not be a problem, but I'm not sure.

The machine is a HP/Compaq 6000 PRO Microtower with Win 7 Pro.

Thanks in advance for your insights.
Question by:mlitin
    LVL 23

    Expert Comment

    by:Stelian Stan
    If you have the Recovery Discs from another identical machine just use them. Boot from Recovery Discs and rebuild the entire machine.

    Author Comment

    Neglected to say, I can't find any recovery disks.  Wish I could, as it would be a snap. If I do, that would be my MO.  Thus the process I have mentioned.

    Thanks for the suggestion.
    LVL 23

    Accepted Solution

    OK. In that case you can use Acronis True Image or Ghost to accomplish your goal. I didn't worked with Ghost software for a long time so I'm not sure about that one, but Acronis does a good job.
    LVL 89

    Assisted Solution

    by:John Hurst
    My colleague and I use Ghost V11 for this and it works fine. If the machine is identical, it will work. I have not used Acronis.

    .... Thinkpads_User

    Author Closing Comment

    Thanks for your input.

    I cloned using my Acronis license and restored successfully with the restore partition.  All is good.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    Join & Write a Comment

    Create your own, high-performance VM backup appliance by installing NAKIVO Backup & Replication directly onto a Synology NAS!
    Are you looking to recover an email message or a contact you just deleted mistakenly? Or you are searching for a contact that you erased from your MS Outlook ‘Contacts’ folder and now realized that it was important.
    This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
    This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now