What are the ghost operation skills?
Ghost has a lot of parameters that cleverly exploit these parameters and write them into the MS-DOS batch processing software, which can bring us great convenience to back up and restore the system. The following describes several common parameters: 1. volume backup ghost-sure-clone, mode = pdump, src =, dst = system. gho-span-split = 630 it backs up the first partition of the first hard disk to the system in the current folder. in gho, if the Generated system. gho is greater than 630 MB, it splits the generated GHO file, which is useful when backing up large partitions and burning them onto a 650 MB CD-R. 2. automatic Recovery of ghost-sure-rb-clone, mode = pload, src = system. gho: 1, dst = It is used to put the system in the current folder. the gho file is restored to the first partition of the first hard disk. After the operation is completed, the computer is automatically restarted. automatic Backup of ghost-sure-clone, mode = pdump, src = 1:1, dst = system. gho backs up the first partition of the first hard disk to the system in the current folder. in gho, you can use it to restore later. 4. password backup Ghost-sure-pwd, 666888-clone, mode = pdump, src =, dst = system. gho the statement is used to back up the first partition of the first hard disk to the system in the current folder. and uses 666888 as the password of the generated gho file for encryption. In the future, when you use Ghost to restore the system. gho file, or use Ghost Explorer to release the file, you must enter a password. Otherwise, the file cannot be recovered or released, which serves as a secret. If you enter ghost-sure-pwd-clone, mode = pdump, src = 1:1, dst = system. gho, that is,-pwd without a password, the Ghost will ask the user to encrypt the GHO password before making the GHO file. You must remember it. After the GHO file is encrypted, others cannot view or restore our files at will.