Article Title: system backup and recovery tips Ghost program parameters four rules. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
I believe that Windows crashes and system crashes have been seen by many people. The trick to quickly restore the system is to use the Ghost program, but each time you use the Ghost, you must make a choice, which is too troublesome. In fact, Ghsot has a lot of parameters, cleverly use these parameters, and write them into the MS-DOS batch processing software, can bring us a lot of convenience to back up and restore the system.
1. Automatic Backup
Ghost-sure-clone, mode = pdump, src = 1:1, dst = system. gho
Back up the information of the first partition of the first hard disk to system. gho in the current folder. You can use it to restore it later.
2. volume-based backup
Ghost-sure-clone, mode = pdump, src =, dst = system. gho-span-split = 630
It backs up the first partition of the first hard disk to the system in the current folder. in gho, if the Generated system. gho is greater than 630 MB, it splits the generated GHO file, which is useful when backing up large partitions and burning them onto a 650 MB CD-R.
3. Automatic Recovery
Ghost-sure-rb-clone, mode = pload, src = system. gho: 1, dst = 1:1
It restores the system. gho file in the current folder to the first partition of the first hard disk without confirmation. After the operation is completed, the computer is automatically restarted.
4. Password backup
Ghost-sure-pwd, 666888-clone, mode = pdump, src = 1:1, dst = system. gho
This statement backs up the first partition of the first hard disk to system. gho in the current folder and uses 666888 as the password of the generated GHO file for encryption.
In the future, when you use Ghost to restore the system. gho file, or use Ghost Explorer to release the file, you must enter a password. Otherwise, the file cannot be recovered or released, which serves as a secret.
If you enter ghost-sure-pwd-clone, mode = pdump, src = 1:1, dst = system. gho, that is,-pwd without a password, the Ghost will ask the user to encrypt the GHO password before making the GHO file. You must remember it. After the GHO file is encrypted, others cannot view or restore our files at will.