Solved

convert dmg to iso

Posted on 2014-04-06
7
1,136 Views
Last Modified: 2014-04-06
Can someone suggest a good reliable converter to convert dmg files to iso files on windows 7
I see that the dmg2iso site is suspicious so are there any others please, or a site with has the dmg2iso software as a download
0
Comment
Question by:doctorbill
7 Comments
 
LVL 118

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE)
Andrew Hancock (VMware vExpert / EE MVE) earned 167 total points
ID: 39981402
PowerIso
http://www.poweriso.com/

or

MagicIso
http://www.magiciso.com/

If you are using a Windows OS.
0
 
LVL 30

Assisted Solution

by:captain
captain earned 166 total points
ID: 39981435
0
 

Author Comment

by:doctorbill
ID: 39981460
If I use the MagicISO and open a dmg file I get "Can't find the file or file isn't CD image file" and cannot go any further
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 

Author Comment

by:doctorbill
ID: 39981484
The method described for MagicISO does not work
0
 
LVL 62

Accepted Solution

by:
☠ MASQ ☠ earned 167 total points
ID: 39981502
the .dmg image extension includes around 16 different types of disk image formats - it is not a standard -  and only around a third of these can be directly converted to an .iso format without using specific conversion tools (and in the simplest of conversions the .dmg actually contains a .iso compliant format so you can simply change the extension to .iso and it works!).  So you do need to look at getting dmg2img if a normal .iso convertor does not work to pre-process the .dmg
0
 

Author Comment

by:doctorbill
ID: 39981507
thanks all
0
 

Author Closing Comment

by:doctorbill
ID: 39981508
solution
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Last article we focus in how to VMware: How to create and use VMs TAGs – Part 1 so before follow this article and perform the next tasks, you should read the first article how to create the TAG before using them in Veeam Backup Jobs.
In this article, I will show you HOW TO: Install VMware Tools for Windows on a VMware Windows virtual machine on a VMware vSphere Hypervisor 6.5 (ESXi 6.5) Host Server, using the VMware Host Client. The virtual machine has Windows Server 2016 instal…
This Micro Tutorial walks you through using a remote console to access a server and install ESXi 5.1. This example is showing remote access and installation using a Dell server. The hypervisor is the very first component of your virtual infrastructu…
This video shows you how to use a vSphere client to connect to your ESX host as the root user. Demonstrates the basic connection of bypassing certification set up. Demonstrates how to access the traditional view to begin managing your virtual mac…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now