Experiment One
Experiment Name: Ghost do backup and restore of the system
Experimental Description: The system backup, can make the user in the computer virus or failure, can be restored to a relatively pure system environment
Experimental steps:
Steps 1 : Click Edit Virtual machine settings -cd/dvd- Select Image File - Select Super First aid Box
650) this.width=650; "width=" 745 "height=" 675 "title=" 2.1.png "style=" width:530px;height:455px; "alt=" Wkiom1o3ysvbauppaajc8kdlu0w680.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3ySvBAUppAAJc8KDlu0w680.jpg "/>
Steps 2 : Start the virtual machine - go to Resource manager - run the Super First Aid Kit installation file
650) this.width=650; "Width=" 899 "height=" 597 "title=" 2.2.png "style=" WIDTH:501PX;HEIGHT:359PX; "alt=" Wkiom1o3ywfb5lx_aakqdividiu794.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yWfB5LX_AAKQDIvidiU794.jpg "/>
Steps 3 : Rebooting the system - Select Super First aid Kit - Select Ghost32 for WinPE
650) this.width=650; "Width=" 1030 "height=" 442 "title=" 2.3.png "style=" width:420px;height:224px;float:left; "alt=" Wkiol1o3yumavmvoaae45s0aa1q282.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKioL1O3yUmAVMvoAAE45S0aA1Q282.jpg "/>
650) this.width=650; "Width=" 939 "height=" 560 "title=" 2.4.png "style=" Width:491px;height:295px;float:none; "alt=" Wkiom1o3yxijlnxdaafwecy66js316.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3yXijlnxdAAFwEcY66js316.jpg "/>
Steps 4 : Enter PE system later, click Ghost32 program - Select local->partition->to image- Next Step - Select the partition you want to back up - choose where to store your backup files - Select the backup rate - Next Step
650) this.width=650; "width=" 667 "height=" 511 "title=" 2.5.png "style=" Width:491px;height:347px;float:none; "alt=" Wkiol1o3yxsbahofaajqqegsloa137.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKioL1O3yXSBAhOFAAJqqEGSloA137.jpg "/>
650) this.width=650; "Width=" 622 "height=" 257 "title=" 2.6.png "style=" Width:575px;height:184px;float:none; "alt=" Wkiom1o3yaodkfsmaagiq3-0x4s838.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yaODkfSmAAGIQ3-0x4s838.jpg "/>
650) this.width=650; "Width=" 649 "height=" 507 "title=" 2.7.png "style=" Width:338px;height:221px;float:none; "alt=" Wkiol1o3yxttxmo8aak-sqqqcg0506.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKioL1O3yXTTxMo8AAK-sqqqCG0506.jpg "/>
650) this.width=650; "width=" 639 "height=" 506 "title=" 2.8.png "style=" Width:493px;height:409px;float:none; "alt=" Wkiol1o3yxsrqlkjaalacu44p5u159.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKioL1O3yXSRqLkjAALaCu44p5U159.jpg "/>
650) this.width=650; "title=" 2.9.png "style=" Float:none; "alt=" wkiom1o3yaorsxdgaaboohjkas0775.jpg "src=" http:/ S3.51cto.com/wyfs02/m01/39/4d/wkiom1o3yaorsxdgaaboohjkas0775.jpg "/>
in the D a file name appears in the disk Win.gho file that indicates that the backup was successful.
650) this.width=650; "Width=" 896 "height=" 429 "title=" 2.10.png "style=" width:420px;height:248px; "alt=" Wkiol1o3yc6qha2naahwxhvy8by341.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKioL1O3yc6Qha2NAAHWxhvY8bY341.jpg "/>
Create a new file on the desktop to confirm that the restore was successful.
650) this.width=650; "Width=" 698 "height=" 695 "title=" 2.11.png "style=" WIDTH:439PX;HEIGHT:256PX; "alt=" Wkiom1o3yhliorfmaapqqwbb2nc689.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yhLiOrfmAAPQqWbB2nc689.jpg "/>
Steps5: Reboot system, enterPEin the system-RunGhost32-local->partition->from image-Next Step-Next Step-SelectGhoWhere the file is located-ClickWin.ghofile-Next Step-Rebooting the system
650) this.width=650; "Width=" 793 "height=" 577 "title=" 2.12.png "style=" Width:593px;height:401px;float:none; "alt=" Wkiol1o3yghwzfynaalv6ow2tme765.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKioL1O3ygHwZfYnAALv6OW2TmE765.jpg "/>
650) this.width=650; "width=" 787 "height=" 562 "title=" 2.13.png "style=" Width:593px;height:413px;float:none; "alt=" Wkiom1o3yjcha7i0aanu9765ntq698.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yjChA7i0AANU9765ntQ698.jpg "/>
650) this.width=650; "Width=" 784 "height=" 559 "title=" 2.14.png "style=" Width:625px;height:461px;float:none; "alt=" Wkiol1o3ygggw6ydaamy-euiyh4539.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKioL1O3ygGgw6YdAAMY-EUIYH4539.jpg "/>
Reboot the system and discover that the new file is not in the original system, indicating that the restore was successful. 650) this.width=650; "Width=" 738 "height=" 673 "title=" 2.15.png "style=" width:440px;height:400px; "alt=" Wkiom1o3ylsxgcn5aapyjp53kkg536.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3ylSxgcN5AAPYJP53kKg536.jpg "/>
Summary: Choose what kind of backup to make, and PE under the
Experiment Two
Experiment Name: Connect two virtual machines
Experiment Description: Connect two virtual machines so that they can communicate
Experimental topology: 650) this.width=650; "title=" 2.16.png "alt=" wkiol1o3yj-stlusaac5f7h79k0707.jpg "src=" http://s3.51cto.com/ Wyfs02/m01/39/4d/wkiol1o3yj-stlusaac5f7h79k0707.jpg "/>
Experimental steps:
1 < Span style= "FONT-FAMILY:CALIBRI;" >windows server R2 ip address 650) this.width=650; "width=" 1035 "height=" 607 "title=" 2.17.png "style=" width:648px;height:405px; "alt=" Wkiol1o3ylysdhvcaareammqbuw962.jpg "src=" http://s3.51cto.com/wyfs02/M00/39/4D/ Wkiol1o3ylysdhvcaareammqbuw962.jpg "/>
Steps 2 : Modify a specific virtual network so that it is consistent with another virtual machine - turn on the virtual machine - Set IP Address
650) this.width=650; "Width=" 739 "height=" 670 "title=" 2.18.png "style=" Width:542px;height:469px;float:none; "alt=" Wkiol1o3ynda3xvraalergwpusu252.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKioL1O3ynDA3XVRAALErgwpuSU252.jpg "/>
650) this.width=650; "Width=" 1189 "height=" 658 "title=" 2.19.png "style=" Width:735px;height:489px;float:none; "alt=" Wkiom1o3yp_rgrziaabcj3btvxu612.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yp_RgRzIAAbCJ3bTvXU612.jpg "/>
Steps 3 : Called in two virtual machines, respectively cmd , using Ping command to test whether two virtual machines can be connected.
650) this.width=650; "Width=" 693 "height=" 448 "title=" 2.20.png "style=" Width:583px;height:346px;float:none; "alt=" Wkiom1o3ys2x6rczaah_qe6lavq899.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3ys2x6rczAAH_QE6lAVQ899.jpg "/>
650) this.width=650; "Width=" 682 "height=" 447 "title=" 2.21.png "style=" Width:584px;height:370px;float:none; "alt=" Wkiol1o3yp7i1yuraagiw8aix0y818.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4E/wKioL1O3yp7i1yuRAAGiW8aIx0Y818.jpg "/>
at this point, both virtual machines cannot Ping because the firewalls of both virtual machine systems are turned on.
650) this.width=650; "Width=" 971 "height=" 545 "title=" 2.22.png "style=" Width:718px;height:341px;float:none; "alt=" Wkiom1o3yupwh5_baamrxvop_mg995.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3yuPwH5_bAAMrxVop_mg995.jpg "/>
650) this.width=650; "Width=" "height=" 483 "title=" 2.23.png "style=" Width:724px;height:352px;float:none; "alt=" Wkiol1o3yrtdew0iaamvmjrnezc194.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4E/wKioL1O3yrTDeW0iAAMvmJrNeZc194.jpg "/>
Steps 4 : Shut down the firewall for two virtual machines. Click Turn Windows Firewall on or off - Turn off the firewall
650) this.width=650; "title=" 2.24.png "style=" Float:none; "alt=" wkiol1o3yt6curx3aaeiehs57go192.jpg "src=" http:/ S3.51cto.com/wyfs02/m02/39/4e/wkiol1o3yt6curx3aaeiehs57go192.jpg "/>
650) this.width=650; "Width=" 806 "height=" 497 "title=" 2.25.png "style=" Width:647px;height:425px;float:none; "alt=" Wkiom1o3yw3wkrj_aaieujmsvga103.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yw3wkRJ_AAIeUJmSVGA103.jpg "/>
650) this.width=650; "Width=" 793 "height=" 523 "title=" 2.26.png "style=" Width:607px;height:418px;float:none; "alt=" Wkiom1o3yw3cildcaal9yhn-o5y050.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yw3CiLdCAAL9YHN-O5Y050.jpg "/>
650) this.width=650; "Width=" 883 "height=" 534 "title=" 2.27.png "style=" Width:667px;height:446px;float:none; "alt=" Wkiol1o3yt7gl7gyaaj4_c1eapc615.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4E/wKioL1O3yt7gL7GYAAJ4_c1eapc615.jpg "/>
650) this.width=650; "width=" 889 "height=" 605 "title=" 2.28.png "style=" Width:639px;height:523px;float:none; "alt=" Wkiom1o3yw7wqo8gaapcjkxcozs994.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3yw7wqo8gAAPcjKxCoZs994.jpg "/>
and then separate with Ping command to test
650) this.width=650; "Width=" 668 "height=" 431 "title=" 2.29.png "style=" Width:571px;height:349px;float:none; "alt=" Wkiol1o3ywswr_cjaaihdbepywe650.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4E/wKioL1O3ywSwR_cjAAIhdBepYWE650.jpg "/>
650) this.width=650; "Width=" 689 "height=" 443 "title=" 2.30.png "style=" Width:573px;height:358px;float:none; "alt=" Wkiom1o3yzpgin9gaaj8kdr5nxs348.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yzPgiN9GAAJ8Kdr5Nxs348.jpg "/>
Summary: Two virtual machines are IP address, must be in the same network segment and the firewall is not open to be able to connect.
This article is from the Blue Blue blog, so be sure to keep this source http://kazafkay.blog.51cto.com/9108903/1434860