DAY02 WINDOWS Lab Report

Source: Internet
Author: User

Experiment One

Experiment Name: Ghost do backup and restore of the system

Experimental Description: The system backup, can make the user in the computer virus or failure, can be restored to a relatively pure system environment

Experimental steps:

Steps 1 : Click Edit Virtual machine settings -cd/dvd- Select Image File - Select Super First aid Box


650) this.width=650; "width=" 745 "height=" 675 "title=" 2.1.png "style=" width:530px;height:455px; "alt=" Wkiom1o3ysvbauppaajc8kdlu0w680.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3ySvBAUppAAJc8KDlu0w680.jpg "/>

Steps 2 : Start the virtual machine - go to Resource manager - run the Super First Aid Kit installation file

650) this.width=650; "Width=" 899 "height=" 597 "title=" 2.2.png "style=" WIDTH:501PX;HEIGHT:359PX; "alt=" Wkiom1o3ywfb5lx_aakqdividiu794.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yWfB5LX_AAKQDIvidiU794.jpg "/>

Steps 3 : Rebooting the system - Select Super First aid Kit - Select Ghost32 for WinPE

650) this.width=650; "Width=" 1030 "height=" 442 "title=" 2.3.png "style=" width:420px;height:224px;float:left; "alt=" Wkiol1o3yumavmvoaae45s0aa1q282.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKioL1O3yUmAVMvoAAE45S0aA1Q282.jpg "/>

650) this.width=650; "Width=" 939 "height=" 560 "title=" 2.4.png "style=" Width:491px;height:295px;float:none; "alt=" Wkiom1o3yxijlnxdaafwecy66js316.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3yXijlnxdAAFwEcY66js316.jpg "/>

Steps 4 : Enter PE system later, click Ghost32 program - Select local->partition->to image- Next Step - Select the partition you want to back up - choose where to store your backup files - Select the backup rate - Next Step


650) this.width=650; "width=" 667 "height=" 511 "title=" 2.5.png "style=" Width:491px;height:347px;float:none; "alt=" Wkiol1o3yxsbahofaajqqegsloa137.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKioL1O3yXSBAhOFAAJqqEGSloA137.jpg "/>

650) this.width=650; "Width=" 622 "height=" 257 "title=" 2.6.png "style=" Width:575px;height:184px;float:none; "alt=" Wkiom1o3yaodkfsmaagiq3-0x4s838.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yaODkfSmAAGIQ3-0x4s838.jpg "/>

650) this.width=650; "Width=" 649 "height=" 507 "title=" 2.7.png "style=" Width:338px;height:221px;float:none; "alt=" Wkiol1o3yxttxmo8aak-sqqqcg0506.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKioL1O3yXTTxMo8AAK-sqqqCG0506.jpg "/>

650) this.width=650; "width=" 639 "height=" 506 "title=" 2.8.png "style=" Width:493px;height:409px;float:none; "alt=" Wkiol1o3yxsrqlkjaalacu44p5u159.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKioL1O3yXSRqLkjAALaCu44p5U159.jpg "/>

650) this.width=650; "title=" 2.9.png "style=" Float:none; "alt=" wkiom1o3yaorsxdgaaboohjkas0775.jpg "src=" http:/ S3.51cto.com/wyfs02/m01/39/4d/wkiom1o3yaorsxdgaaboohjkas0775.jpg "/>

in the D a file name appears in the disk Win.gho file that indicates that the backup was successful.

650) this.width=650; "Width=" 896 "height=" 429 "title=" 2.10.png "style=" width:420px;height:248px; "alt=" Wkiol1o3yc6qha2naahwxhvy8by341.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKioL1O3yc6Qha2NAAHWxhvY8bY341.jpg "/>

Create a new file on the desktop to confirm that the restore was successful.


650) this.width=650; "Width=" 698 "height=" 695 "title=" 2.11.png "style=" WIDTH:439PX;HEIGHT:256PX; "alt=" Wkiom1o3yhliorfmaapqqwbb2nc689.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yhLiOrfmAAPQqWbB2nc689.jpg "/>

Steps5: Reboot system, enterPEin the system-RunGhost32-local->partition->from image-Next Step-Next Step-SelectGhoWhere the file is located-ClickWin.ghofile-Next Step-Rebooting the system

650) this.width=650; "Width=" 793 "height=" 577 "title=" 2.12.png "style=" Width:593px;height:401px;float:none; "alt=" Wkiol1o3yghwzfynaalv6ow2tme765.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKioL1O3ygHwZfYnAALv6OW2TmE765.jpg "/>

650) this.width=650; "width=" 787 "height=" 562 "title=" 2.13.png "style=" Width:593px;height:413px;float:none; "alt=" Wkiom1o3yjcha7i0aanu9765ntq698.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yjChA7i0AANU9765ntQ698.jpg "/>

650) this.width=650; "Width=" 784 "height=" 559 "title=" 2.14.png "style=" Width:625px;height:461px;float:none; "alt=" Wkiol1o3ygggw6ydaamy-euiyh4539.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKioL1O3ygGgw6YdAAMY-EUIYH4539.jpg "/>

Reboot the system and discover that the new file is not in the original system, indicating that the restore was successful. 650) this.width=650; "Width=" 738 "height=" 673 "title=" 2.15.png "style=" width:440px;height:400px; "alt=" Wkiom1o3ylsxgcn5aapyjp53kkg536.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3ylSxgcN5AAPYJP53kKg536.jpg "/>

Summary: Choose what kind of backup to make, and PE under the

Experiment Two

Experiment Name: Connect two virtual machines

Experiment Description: Connect two virtual machines so that they can communicate

Experimental topology: 650) this.width=650; "title=" 2.16.png "alt=" wkiol1o3yj-stlusaac5f7h79k0707.jpg "src=" http://s3.51cto.com/ Wyfs02/m01/39/4d/wkiol1o3yj-stlusaac5f7h79k0707.jpg "/>

Experimental steps:

1 < Span style= "FONT-FAMILY:CALIBRI;" >windows server R2 ip address 650) this.width=650; "width=" 1035 "height=" 607 "title=" 2.17.png "style=" width:648px;height:405px; "alt=" Wkiol1o3ylysdhvcaareammqbuw962.jpg "src=" http://s3.51cto.com/wyfs02/M00/39/4D/ Wkiol1o3ylysdhvcaareammqbuw962.jpg "/>

Steps 2 : Modify a specific virtual network so that it is consistent with another virtual machine - turn on the virtual machine - Set IP Address

650) this.width=650; "Width=" 739 "height=" 670 "title=" 2.18.png "style=" Width:542px;height:469px;float:none; "alt=" Wkiol1o3ynda3xvraalergwpusu252.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKioL1O3ynDA3XVRAALErgwpuSU252.jpg "/>

650) this.width=650; "Width=" 1189 "height=" 658 "title=" 2.19.png "style=" Width:735px;height:489px;float:none; "alt=" Wkiom1o3yp_rgrziaabcj3btvxu612.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yp_RgRzIAAbCJ3bTvXU612.jpg "/>

Steps 3 : Called in two virtual machines, respectively cmd , using Ping command to test whether two virtual machines can be connected.

650) this.width=650; "Width=" 693 "height=" 448 "title=" 2.20.png "style=" Width:583px;height:346px;float:none; "alt=" Wkiom1o3ys2x6rczaah_qe6lavq899.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3ys2x6rczAAH_QE6lAVQ899.jpg "/>

650) this.width=650; "Width=" 682 "height=" 447 "title=" 2.21.png "style=" Width:584px;height:370px;float:none; "alt=" Wkiol1o3yp7i1yuraagiw8aix0y818.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4E/wKioL1O3yp7i1yuRAAGiW8aIx0Y818.jpg "/>

at this point, both virtual machines cannot Ping because the firewalls of both virtual machine systems are turned on.

650) this.width=650; "Width=" 971 "height=" 545 "title=" 2.22.png "style=" Width:718px;height:341px;float:none; "alt=" Wkiom1o3yupwh5_baamrxvop_mg995.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3yuPwH5_bAAMrxVop_mg995.jpg "/>

650) this.width=650; "Width=" "height=" 483 "title=" 2.23.png "style=" Width:724px;height:352px;float:none; "alt=" Wkiol1o3yrtdew0iaamvmjrnezc194.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4E/wKioL1O3yrTDeW0iAAMvmJrNeZc194.jpg "/>

Steps 4 : Shut down the firewall for two virtual machines. Click Turn Windows Firewall on or off - Turn off the firewall

650) this.width=650; "title=" 2.24.png "style=" Float:none; "alt=" wkiol1o3yt6curx3aaeiehs57go192.jpg "src=" http:/ S3.51cto.com/wyfs02/m02/39/4e/wkiol1o3yt6curx3aaeiehs57go192.jpg "/>

650) this.width=650; "Width=" 806 "height=" 497 "title=" 2.25.png "style=" Width:647px;height:425px;float:none; "alt=" Wkiom1o3yw3wkrj_aaieujmsvga103.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yw3wkRJ_AAIeUJmSVGA103.jpg "/>

650) this.width=650; "Width=" 793 "height=" 523 "title=" 2.26.png "style=" Width:607px;height:418px;float:none; "alt=" Wkiom1o3yw3cildcaal9yhn-o5y050.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4D/wKiom1O3yw3CiLdCAAL9YHN-O5Y050.jpg "/>

650) this.width=650; "Width=" 883 "height=" 534 "title=" 2.27.png "style=" Width:667px;height:446px;float:none; "alt=" Wkiol1o3yt7gl7gyaaj4_c1eapc615.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4E/wKioL1O3yt7gL7GYAAJ4_c1eapc615.jpg "/>

650) this.width=650; "width=" 889 "height=" 605 "title=" 2.28.png "style=" Width:639px;height:523px;float:none; "alt=" Wkiom1o3yw7wqo8gaapcjkxcozs994.jpg "src=" Http://s3.51cto.com/wyfs02/M02/39/4D/wKiom1O3yw7wqo8gAAPcjKxCoZs994.jpg "/>

and then separate with Ping command to test

650) this.width=650; "Width=" 668 "height=" 431 "title=" 2.29.png "style=" Width:571px;height:349px;float:none; "alt=" Wkiol1o3ywswr_cjaaihdbepywe650.jpg "src=" Http://s3.51cto.com/wyfs02/M01/39/4E/wKioL1O3ywSwR_cjAAIhdBepYWE650.jpg "/>

650) this.width=650; "Width=" 689 "height=" 443 "title=" 2.30.png "style=" Width:573px;height:358px;float:none; "alt=" Wkiom1o3yzpgin9gaaj8kdr5nxs348.jpg "src=" Http://s3.51cto.com/wyfs02/M00/39/4D/wKiom1O3yzPgiN9GAAJ8Kdr5Nxs348.jpg "/>

Summary: Two virtual machines are IP address, must be in the same network segment and the firewall is not open to be able to connect.

This article is from the Blue Blue blog, so be sure to keep this source http://kazafkay.blog.51cto.com/9108903/1434860

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.