"Norton Ghost 6.0"
Norton Ghost 6.0 For Windows 95, Windows 98, Windows 2000 & Windows NT Workstation Evaluator's guide Symantec Corporation 10201 Torre Ave. Cupertino, Calif. 95014-2132 408-253-9600 fax 408-252-4694 Web: http://www.symantec.com CompuServe: GO SYMANTEC America Online keyword: Symantec BBS: 541-484-6699 (300 to 28,000 bps) Table of contents Quick Profile ……………………………………………………………………………..1 Key Messages ……………………………………………………………………………2 Who Uses NORTON GHOST 6.0? ………………………………………………………..4 User Benefits …………………………………………………………………………….5 What's New? ……………………………………………………………………………..7 What's Improved? ……………………………………………………………………….8 Additional Features ……………………………………………………………………..9 How does NORTON GHOST Work? …………………………….……………………….11 Using NORTON GHOST ………………………………………….………………………..13 Product History ………………………………………………….………………………17 Market Leadership …………………………………………………….………………..17 Pricing and Configuration ………………………………………………..……………17 About Symantec ………………………………………………………..……………….18 Comparative Information ……………………………………………..……………….19 Contact Information ……………………………………………………..……………..22 Glossary ……………………………………………………………………..……………23 Quick Profile Product: NORTON GHOST 6.0 for Windows 95, Windows 98, Windows 2000 and Windows NT Workstation. Summary: NORTON ANTIVIRUS 6.0 is the latest version of the market leading and best performing PC cloning solution that sets the standard in disk image management, PC roll-out, and ongoing workstation configuration. Announce date: September 1999. Availability: September 1999. Pricing: Norton Ghost 6.0 Standard $##.## Norton Ghost 6.0 Enterprise Norton Ghost 6.0 Standard VAR Norton Ghost 6.0 Enterprise VAR Upgrades: $????, upgrade pricing? Site licenses: Site licenses are available. For details, call Customer Service, 800-441-7234 or 541-334-6054. Availability • Direct from Symantec, http://www.symantec.com • From national distributors • Through mail order • At software retailers worldwide Free demo: A free 30-day demo may be downloaded from the Symantec Web site, http://www.symantec.com/trialware System requirements Minimum • 386SX processor (486 or above recommended) • 4MB RAM, 8MB RAM for NTFS (16 MB recommended) • VGA Monitor Special bonus: Ghost Explorer Ghost Walker GDISK 1 Key messages Symantec offers a powerful solution for PC roll-outs and desktop configuration management. NORTON GHOST 6.0 provides a comprehensive disk imaging and management solution and provides for software distribution and updates. GHOST allows IT managers to significantly cut the costs of software installation and workstation upgrades through the use of standard tools and centralized management. For Windows client workstations of all types, NORTON GHOST 6.0 for Windows 95, Windows 98, Windows NT, and Windows 2000 is the latest version of the world's most popular, most powerful and most comprehensive disk imaging and update management solution. NORTON GHOST 6.0 offers comprehensive disk cloning/imaging, image management, and image distribution that is fast and easy to use. Key features include: • Disk Imaging - Makes complete backup of PC system files, including OS, applications, hidden files, and critical data. • Formatting and Partitioning - Automatically formats and partitions a target drive with no preliminary work necessary. • Segment Imaging - Ability to image one or more individual partitions instead an entire drive. • Multicasting - Enables the simultaneous distribution of a single image to multiple machines without performance degradation or bandwidth overload. • Multi-OS Support - Supports imaging in DOS, Windows, Windows NT, NetWare and Linux networks. 2 • Image Compression - Image files may be compressed to reduce transfer times and storage requirements. • Removable Media Support - Images can be saved to JAZ, ZIP, Superdisk, CD-ROM and other removable media and may be spanned across multiple disks. • Image CRC Check - Redundancy checking to ensure accurate cloning. • Centralized Console - Powerful graphical user interface enables deployment of disk image to multiple clients in remote locations. • Remote Imaging - Central management without the requirement to physically visit each workstation. • Customized Configuration - Centralized console supports the ability to apply customized information relative to each client machine. • Multi-network OS Support - Supports imaging in Windows, Windows NT, NetWare and Linux networks. • Linux Support - Full GHOST functionality is applicable to Linux including resizing and cloning of Linux partitions. 3 Who uses NORTON GHOST 6.0? NORTON GHOST 6.0 is an ideal system for anyone who deploys, manages, upgrades, repairs or administers PCs across a large environment. The tedious process of manually installing an OS and applications on multiple client workstations is greatly simplified when using NORTON GHOST: • IS and IT personnel for enterprise corporations will be the primary users of NORTON GHOST. Corporations with 5000+ nodes have significant demand and pressing requirements to distribute, configure, administer and maintain office-based or desk- bound computers. There are also heavy requirements to configure and update mobile and remote based laptops and notebooks. • In small, medium and large corporations, anyone responsible for deploying and maintaining multiple computers with similar OS and application configurations will benefit from NORTON GHOST. PC rollout, hardware migration, OS and application updating and disaster recovery are all activities that can be simplified with time to completion reduced with NORTON GHOST. Individuals performing these activities at small, medium, and large companies may be internal IS, HelpDesk employees, system administrators or outsource services. • In addition to corporations, VARs, Resellers, Configuration Centers, PC manufacturers, and OEMs will benefit from using NORTON GHOST 6.0 during initial configuration and for ongoing maintenance. GHOST'S multicast feature provides the ability to dramatically reduce configuration time and effort by allowing multiple systems to be configured simultaneously. OEMs can use NORTON GHOST by including a recovery image of the system as it was configured at the factory. This provides customers with a working baseline configuration for rebuilding their PCs. • Educational institutions, universities, schools, and training centers use NORTON GHOST to quickly reconfigure large numbers of PCs for each new class, semester, or section. • Smaller but still viable markets for NORTON GHOST exist with storage peripheral vendors and computer training and education centers. Peripheral vendors such as HP and IOMEGA augment their product lines by providing OS and application recovery ability; computer training and testing centers are able to reconfigure large numbers of machines quickly and easily using NORTON GHOST. 4 User benefits In simplest terms, NORTON GHOST 6.0 reduces the drudgery and cost of configuring multiple PCs. Research firms, focus groups and customer visits consistently point out the need to reduce the total cost of PC/Server ownership. In the case of PC installations, a significant percentage of this cost is in initial installation, configuration, and maintenance. Cloning, post-cloning configuration, and remote management contribute sizably to cutting the cost of PC roll-out and total cost of ownership (TCO) by reducing installation and upgrade times. Industry research quantifies the costs associated with PC roll-out as follows: • MIS departments spend 50% of their time on installing software and performing upgrades. (source: ComputerWorld survey) • IT managers cite the need for better tools and standardization to improve their performance. (source: ????) • The total cost of ownership (TCO) for a PC are between $9,000-$12,000 per year. (source: Gartner Group) • Internal help-desks and push technologies are a means of decreasing IT costs. (source: ????) • In a Forrester Research survey, 68% of respondents indicated that TCO is on the rise, 36% believe that better tools could reduce desktop/server support costs and 28% believe that standardization would also help. (source: Forrester Research) NORTON GHOST can be used at all stages of the PC life cycle. OEMs use it at manufacturing to initially configure a machine. VARs and resellers use it to replicate customer specific images at installation. Corporate IT and IS support use it for upgrade, migration, and reconfiguring. And, end users can use NORTON GHOST for backup and disaster recovery. User benefits include simple and secure backup capabilities. Disk images are compressed and then stored to removable media such as JAZ, ZIP, Superdisk, or CD-ROM disks. Multicasting provides the ability to clone multiple machines at once. And, network distribution and unattended refresh make it possible to accomplish these tasks remotely. NORTON GHOST is becoming a standard mechanism for shipping the entire contents of a hard drive to a manufacturer, support organization, or analysis center for audit or diagnosis. One example is law enforcement agencies using NORTON GHOST to secure the contents of a hard disk as evidence for investigation purposes. Periodic snapshots of disk information are valuable for any number of types of analysis. And of course, all of NORTON GHOST'S functionality is securely available through a powerful, easy to use interface. Image files may be password protected against unauthorized access. 5 Case Study Without NORTON GHOST 6.0 Manually setting up a PC usually requires the installation of an operating system (Win95, Win98, NT, etc.), desktop applications (spreadsheet, word processing, mail, browser, etc.), and then modifying configuration settings. This process on a single machine can take from two hours to an entire day depending on the complexity of the configuration. For a company with 500 PCs, this process would take a minimum of 125 man days or a single individual over 6 months to complete. This can be a tremendous strain on resources, especially if IS staff are also maintaining existing systems at the same time. With NORTON GHOST 6.0 Using NORTON GHOST the process is considerably streamlined. A single master workstation is configured and tested to make sure that all settings are correct and applications are functioning. The master image is then multicast across the network to each of the new workstations and confirmation is received that the imaging process is completed correctly. If configuring the master takes a day and then another day is added for multicasting and confirmation, the entire process only takes two days as opposed to six months. Additional Benefits Several bonus benefits result from using NORTON GHOST 6.0 that outlast the initial rollout. First, the master configuration will have been thoroughly tested and this testing benefit is inherited by each of the workstations. There will be no differences between workstation configurations due to human error or different installers. IS staff will have a common, consistent baseline configuration that will speed analysis of future workstation problems. The corporation can realize savings through standard and bulk hardware and software purchases. All of this leads to a reduced cost of ownership. 6 What's New? Centralized Console A major NORTON GHOST 6.0 enhancement is the inclusion of a Windows based management console for multiple workstation management. Any Windows workstation that has been enabled with the Ghost client can be configured, updated, and managed from the central Enterprise Ghost Console. • NORTON GHOST 6.0 now includes a Windows console for centralized management of workstations, images and configurations. This powerful management tool is easy to use and provides any engineer or administrator with the ability to quickly deploy, configure, and manage hundreds of workstations. • NORTON GHOST 6.0 introduces remote cloning. Clone any Windows 9.x, Windows NT or 2000 Workstation across the network from a centralized console. A GHOST 6.0 client agent also ensures that any subsequent cloning operation can be done from the centralized console without the need to physically visit the workstation with a boot disk. NORTON GHOST 6.0 provides a graphical view of your network and cloning topology. • NORTON GHOST 6.0 also introduces post cloning configuration. This allows the GHOST user to apply customized, PC specific information such as PC name, PC description, workgroup, domain, and TCP/IP settings to each workstation - again, remotely. A straight cloning operation only performs 80% of the work needed to fully deploy at PC; post cloning performs the remaining 20%. There is no need to physically visit a machine to finalize configuration. 7 • Another major enhancement to NORTON GHOST 6.0 is support for the popular Internet operating system, Linux. A major deterrent to the use of Linux has been the complexity of installing the OS and file system. GHOST provides full Linux support with the ability to quickly and easily configure a Linux machine and then resize and clone Linux partitions. • The Multicast Assist Boot Wizard has been added with NORTON GHOST 6.0. This provides a wizard interface to easily create GHOST boot disks. Also, Multicast Server for NetWare has been included which provides the ability to operate Multicast Server in a Novell environment. What's improved? • NORTON GHOST 6.0 provides improved user interface with the new Windows based console and utilities as well as improved changes to the DOS-based GHOST interface. This simplifies user operations and makes managing a much more intuitive process. • Performance has been improved with GHOST 6.0 making it possible to completely configure a PC from an image file complete with operating system and applications in about seven minutes. NORTON GHOST still continues to be the best performing disk imaging solution available. 8 Additional features NORTON GHOST 6.0 continues to provide users with a solution that enables corporations, OEMs, and training centers to quickly and easily configure large numbers of PCs. With NORTON GHOST'S successfully long history and dominant market share, its stability and robustness have been proven reliable with more hardware and software combinations than any other solution. • NORTON GHOST EXPLORER allows you to quickly and easily restore individual files or directories from an image file. Using GHOST EXPLORER you can: § View image file contents § Restore files and directories § Add, move, copy, or delete files and directories from an image file Ghost Explorer • NORTON GHOST WALKER allows you to alter identification details of Windows machines following a clone operation. Each Windows 9x machine can be assigned a unique name and each Windows NT/2000 machine can be assigned a unique name and machine Security Identifier (SID). • NORTON GHOST GDISK is a complete replacement for FDISK and FORMAT utilities. GDISK is command-line driven for quicker configuration and use with batch files. Features include: § On-the-fly formatting § Improved disk space utilization with small cluster sizes § The ability to hide or make visible partitions 9 § Extensive partition reporting § High security disk wiping Other standard features of NORTON GHOST 6.0 include: Hardware Migration Easily migrate from one machine to another without having to visit each machine. Formatting and Partitioning Automatically format and partition a PC drive as the image is being copied - no need for disk preparation. Password Protected Image Secure image files from unauthorized access. Files Single Partition Cloning Enable one or more individual partitions to be cloned instead of the entire drive. Image Templates Create an image file of a model PC that can be a template to create other PCs. Image Compression Compress an image file to reduce storage requirements and transfer times. Images can be compressed up to 70%. Removable Media Support Save images to SCSI tape, JAZ, ZIP, CD-ROM, Superdisk, and other removable media. Spanning Media Support If an image does not fit on one removable media disk, it can be split across multiple disks or volumes. Image CRC Checking CRC checking ensures image file is an accurate clone of the original. 10 How NORTON GHOST Works NORTON GHOST technology is referred to as disk image duplication or cloning. Disk image duplication creates an image 'snapshot' of a PC hard drive. This image includes the PC's operating system, applications, data files and hidden files. The options possible with the image include: • Compressing the image and saving it to storage • Copying the image to another PC • Copying the image to multiple PCs simultaneously NORTON GHOST was the first cloning solution available on the market and since its release has been used in many ways to increase productivity and eliminate routine PC management tasks. Here are several implementations that existing users have found very valuable: • Centralized Configuration Management PC managers create a model configuration on a typical desktop or laptop. This configuration is complete with operating system, applications (office apps, Web browser, etc.) and any relevant data files (standard document templates, company information, etc.). This configuration is then cloned and the image saved to a central file server where it can be accessed for updating or configuring any PC that is connected to the network. • Peer-to-peer Management NORTON GHOST 6.0 provides for imaging options between two computers when there is no established network in place. Using either a 'cross-over' network cable or a parallel cable, two computers can be connected together in a master-slave relationship for disk imaging. For disk-to-disk or partition-to-partition operations, the destination location is the slave computer and the source location is the master computer. Network Connection- A network connection is two to five times faster than a parallel connection. Using the network cards in each machine and connecting via NetBIOS and a cross-over Ethernet cable complete hard drives or disk partitions can be duplicated. LPT (Parallel) Connection - By connecting a standard parallel cable between the LPT ports on each machine you can image a complete drive or just a partition. The parallel ports on each machine should be configured in the BIOS for bi-directional operation. • Cloning Hard Drives Internally With NORTON GHOST 6.0 you can save all the contents from one internal drive to another by duplicating directly - drive to drive. This is a fast and effective hard drive backup solution. If the main drive fails, you can remove it and be running on the cloned drive almost immediately. 11 • Multicasting Multicasting enables the simultaneous cloning of a master disk image to many destination PCs over an Ethernet or Token Ring network. NORTON GHOST 6.0'S multicasting capability provides superior technology for high speed cloning. Rather than using a one-to-one connection method (a separate image file is sent to each destination workstation), NORTON GHOST implements multicasting which allows each destination workstation to connect through a common channel where a single disk image is transferred to all workstations simultaneously. This provides a dramatic improvement in performance and network utilization when there are multiple destination machines. Multicasting is implemented using a common TCP/IP connection session. 12 Using NORTON GHOST 6.0 This section will outline several options that you can perform to see the functionality of NORTON GHOST and its accompanying utilities. Boot Disks Since most GHOST operations involve duplicating system level information on a hard drive, the NORTON GHOST utility runs in DOS from a boot disk. The first task is to prepare a DOS boot disk for the machines that you will be using. If you are cloning internally, only one disk is required. If you are performing operations peer-to-peer, a boot disk for each machine is required with appropriate network drivers for the respective machines. If you are using the GHOST 6.0 multicasting capability, you will need to create a boot diskette with network and IP capabilities. To create a simple DOS boot disk: 1. Insert a blank diskette and type Format a: /s 2. Create a file called config.sys 3. Insert into the file the following parameters: Files=50 Buffers=15 4. Copy ghost.exe from the GHOST 6.0 CD to the new diskette Internal Cloning 1. Boot the machine from the boot diskette 2. From the DOS prompt type: ghost <return> 3. Select the Local option. 4. Select the Disk or Partition option (Disk images the entire disk, Partition images just the partition) 5. Select the target option (clone or make an image) 6. Select the source drive or partition 13 7. Select the destination (disk, partition, or directory) 8. Select a compression option (No, Fast, High) 9. Select Yes to proceed with operation Note: To save and load images to and from removable media (ZIP, JAZ, Superdisk, CD- ROM, etc.), additional drivers for these devices must be included on the boot diskette. Peer-to-Peer Cloning The two peer-to-peer cloning options with NORTON GHOST 6.0 are through a parallel cable (LPT) and through a network cable (NetBios). To use a parallel cable, make sure both computers are connected through the LPT port with a parallel data transfer cable. NORTON GHOST must be running under DOS on both computers. Select master and slave computers. The parallel port MUST be set to bidirectional, EPP, or ECP (not unidirectional). To use a network cable, make sure the computers (network adapter cards/NICs) are connected either through a network hub or with a network crossover cable. This requires modifying the boot diskette to include network client software. For a complete description of how this is done see the NORTON GHOST manual. Samples of network client boot diskettes are found at : ftp://ftp.symantec.com/public/english_us_canada/products/ghost The following chart will help in determining master/slave relationships between disks, partitions, and computers. Remember that all user input is from the master console. Action Master Slave Disk-to-disk copy Machine containing source Machine containing disk destination disk Disk-to-image copy Machine containing source Machine receiving disk destination image Image file-to-disk copy Machine containing Machine containing source destination disk image file Partition-to-partition copy Machine containing source Machine containing partition receiving partition Partition-to-image file copy Machine containing source Machine receiving partition destination image file Image file-to-partition copy Machine containing Machine containing source destination partition image file 14 Multicasting Multicasting allows multiple Ghost-enabled client machines to receive the same information (disk or partition) over a computer network simultaneously through a single transmission. This is accomplished by having each destination machine participate in the same TCP/IP packet transmission session. To create a Ghost multicasting session, perform the following steps: 1. Install the Ghost Multicast Server on a networked machine. The Windows version (ghostsrv.exe) will run under Windows NT, Windows 95, Windows 98, or Windows 2000. The DOS version (dosghserv.exe) will run under DOS. This is a standalone program and needs no other files to operate. 2. Each client machine can be prepared for multicast in one of three ways. The simplest method is to run Setup from the Norton Ghost CD and select the client install option. The second is to run the Multicast Assist Wizard and create boot diskettes with client specific NIC drivers. The third is to follow the above instructions in bringing up the machine from a boot disk and then run ghost.exe. The client workstations will need to be running the IP protocol with proper IP and subnet addresses. There are several sample Multicast client examples located at: http://www.symantec.com/techsupp/ghost/allservices_ghost.html 3. From the Multicast Server machine, run the Ghostsrv application (either through Windows or DOS). 4. Name the Multicast session and select an image file, disk or partition to broadcast. 5. Select the Accept Clients option and make sure that all target clients show up in the list. 6. Select the Send option to multicast/transmit the image. Multicast Server 15 Centralized Management The Norton Ghost Enterprise Console (included with the Enterprise version) allows administrators to manage multiple clients that have been 'Ghost enabled' from a central point. It is a server-based application for remote management of cloning operations and post-cloning configuration. After a target client has been 'enabled' using the Console Client, it is accessible from the Enterprise Console. To use the Enterprise Console, do the following: 1. Insert the NORTON GHOST 6.0 CD, run Setup and select the Enterprise Server install option. 2. Select Start/Programs/Norton Ghost and open the application. 3. From the Console screen you can select specific GHOST enabled clients and perform cloning, image management, and post-configuration of workstations. Enterprise Console Uninstall To remove either the Norton Ghost Console or the Console Client, go to Settings/Control Panel/Add-Remove Programs and remove NORTON GHOST . 16 Product history GHOST was first developed by Binary Research Limited, based in Auckland, New Zealand and released in June 1996. GHOST version 5.0 was released in May of 1998 and was adopted with great enthusiasm by a worldwide market. In June 1998, Symantec expanded its corporate software solutions by purchasing the assets of Binary. The acquisition of Binary reinforces Symantec's goal to provide automated and manageable solutions to increase customers' productivity. In September 1998, NORTON GHOST was established as the market leader and solution of choice for corporate IT. NORTON GHOST 6.0 is the latest in a long line of award-winning, industry-leading management utility products from Norton and is shipping September 1999. Market Leadership The market for disk image duplication software has grown dramatically since 1996. Sales that year were less than $1 million; in 1999 disk imaging software is projected to be $45 million - a year-to-year growth rate of 88%. NORTON GHOST has captured 75% of this market. PC Computing awarded NORTON GHOST a five-star rating and in February 1999, NORTON GHOST outperformed Micro House's ImageCast in all 18 tests conducted by ZDTag, the ZD Testing and Analysis Group. Pricing and Configuration NORTON GHOST 6.0 will be available in two configurations - Standard and Enterprise - with the following features: NORTON GHOST 6.0 Standard Ghost application Price: ???? Multicast Server VAR Price: ???? Multicast Assist Wizard Ghost Walker Ghost Explorer GDISK Linux Support NORTON GHOST 6.0 Enterprise Ghost Standard features plus: Price: ???? Ghost Enterprise Console VAR Price: ???? Ghost Console Client 17 About Symantec Symantec is the world leader in utility software for business and personal computing. Symantec products and solutions help make users productive and keep their computers safe and reliable anywhere and anytime. Symantec offers a broad range of solutions and is acclaimed as a leader in both customer satisfaction and product brand recognition. Symantec is traded on NASDAQ under the symbol SYMC. More information on the company and its products can be obtained at www.symantec.com. 18 Comparison Chart Function: l = yes m = no ¤ = partially supported OR rank: l = 1st ¤ = 2nd m = 3rd Feature/Benefits Symantec PowerQuest Altiris MicroHouse Norton Ghost Drive Image Pro RapiDeploy IC3 V6 V3.0 V3.3 V3.11 Core functionality Internally clone a disk to another disk l l m l Internally clone partition to partition l l m l Clone a disk directly to multiple machines m m l m Create and restore an image of an entire disk l l l l Create and restore an image of a partition or partitions l l ¤ l Selectively restore a partition from a multi-partition image l l ¤ m On-the-fly partition creation and resizing m l m m Disk integrity checking l l m m Image file verification l m m m Large disk support (> 1023 cylinders) l l m l Large image file support (> 2047 MB) l l m m SCSI drive support l l ¤ ¤ Native file system support FAT16 l l l l FAT32 l l l l NTFS l l l ¤ HPFS (ie OS/2) m l m m Linux l m m m Sector-by-sector treatment of all other file systems l l l l Partition resizing FAT16 l l l l FAT32 l l l l NTFS l l m ¤ HPFS m l m m FAT16 ↔ FAT32 conversion l l m m Support for large Windows NT FAT16 partitions l l l l 19 Feature/Benefits Symantec PowerQuest Altiris MicroHouse Norton Ghost Drive Image Pro RapiDeploy IC3 V6.0 V3.0 V3.3 Peer to peer Peer to peer via LPT l m m m Peer to peer via NetBIOS l m m m Peer to peer via IPX l m l m Multicasting Windows 95/NT Multicasting Server l l l l Microsoft Management Console Integration l m m m Drag & drop User Interface l m m l Simultaneous multicast sessions l m m l Router support l m m l Token Ring support l m ¤ m DHCP Support l m m l Remote reboot facility l m m l Multicast boot disk wizard l m m l Multicast session wizard l m l m DOS Multicasting Server l m l m Automated Windows 9x/NT configuration Post-multicast configuration for NT and 9x l m l l Dynamic post-configuration 1 l m m m Post-configuration reporting l m m m End-user instigated cloning l m m m Ability to capture configuration from PC or image l m m m Image file management Image file explorer and individual file restoration l l l ¤ Image file editor (extract, delete and replace files & dirs) l l m m Windows 9x/NT application imager/Delta Technology l l m l Partial/multiple imaging l m m m Massively reduced storage requirements (through the l m m m prevention of common file duplication) User can include description in image file l l l l Image library manager m m m ¤ 1 i.e. configuration changes are made as part of the cloning process, not after Windows has restarted. This is the more powerful method since it does not require Windows to login before the configuration changes. 20 Feature/Benefits Symantec PowerQuest Altiris MicroHouse Norton Ghost Drive Image Pro RapiDeploy IC3 V6.0 V3.0 V3.3 Compression Number of compression levels 9 3 3 9 User Interface Graphical User Interface for DOS components l l m m Batch processing l l l l Quiet mode (for security) l m m m Additional functionality Skipping of FAT files and directories when cloning l m m m Image file encryption l l m l Spanning of images across multiple media l ¤ m m SCSI Tape support l m m m Multiple images on one tape l m m m Post-operation source and destination comparison l m m m Sector by sector copy of any disk (Exact copy) l l l l Backward compatibility l l l l User-customisable functionality l m m m Norton Anti-Virus compatible l m m m Portability Smallest executable size l ¤ m ¤ Support Comprehensive, accessible documentation l l ¤ l On-line technical forum l l m l Y2K compliance Year 2000 compliant l l l ? Independent certification l m m ? Additional products NT SID changer l l l ¤ Stand-alone disk partitioning l l m m Windows 9x/NT drive mapping wizard m l m m Windows 3.x/9x/NT application mover m l m m Pre-imaging preparation tools for non-native systems m m l ¤ 21 Contact Information Media services: Symantec provides special support services to the media when evaluating NORTON GHOST 6.0 on deadline. Please direct questions to: Mike Bradshaw Connect Public Relations 801-373-7888 email@example.com Genevieve Haldeman Public Relations Manager Symantec Corp. 310-449-4309, firstname.lastname@example.org Symantec Press Center http://www.symantec.com/PressCenter Information resources Arrange for technical questions to be answered: Mike Bradshaw Connect Public Relations 801-373-7888 email@example.com Dwaynne Vanderhorst Symantec Corporation 408-446-7186 firstname.lastname@example.org 22 GLOSSARY Broadcast A single network packet of information simultaneously sent to all members on the local network by addressing the packet with a broadcast address. Broadcast Address Any of a number of special addresses, which indicate a packet which is to be received and processed by all members on a local segment. For TCP/IP, the most commonly used TCP/IP broadcast address is 255.255.255.255, which will be received by all members of the local subnet Clone (1) A duplicate system having the same configuration as the original. (2) The act of replicating. Destination Location of the disk, partition, or image file that Ghost will write to. Drive Another name for a partition. Each drive is accessed by a drive letter—for example, C:. FAT File Allocation Table. The File Allocation Table is used by the MS- DOS operating system to allocate space to files and directories. It is a table in the system area of each disk partition that identifies each cluster as free, belonging to a file, or as bad. Image File An image file is so named because it contains an exact copy or image of a drive or partition. The image file can then be used for recovery or cloning purposes, to replicate exactly the drive/partition contents. Linux A freely available implementation of the Unix operating system. Master (clone) When cloning using peer-to-peer connections, one computer must be defined as the master. When cloning from disks or partitions, the master contains the source data. All operator input will be on this master computer. Multicasting A network message simultaneously sent to a group of members of the local network. In TCP/IP terms, multicast datagrams are sent to a group of members listening on a multicast address. Allows concurrent workstations loading while keeping network traffic to a minimum. Multicast Client The multicast client machine is the destination machine containing the disk/image dump. Multicast Log File A file generated by Ghost multicasting for diagnostic purposes. 23 Multicast Server The multicast server is the machine containing the disk/image details for cloning the client machines. SCSI Serial Computer System Interface. (Initially known as Small Computer System Interface). Pronounced “SKUH-zee.” Industry standard interface that provides high-speed access to peripheral devices such as hard disks, printers and CD-ROMs. Up to seven SCSI devices can be connected to each other and to a single SCSI port on the computer. SID The Windows NT Security Identifier. The SID must be unique for each machine on the network. If you clone a Windows NT machine, you must make sure each machine has a unique SID to avoid networking problems. The SID can be dynamically assigned by the Norton Ghost companion, Ghost Walker. Slave When using Ghost for peer-to-peer connections, one computer must be defined as the master, one as the slave. When cloning image files, the Slave contains the source data. See Master. Source The disk, disk image file, partition, or partition image file used by Ghost as the model for cloning to a destination disk or partition. Span The placement of an image file across multiple volumes or removable disks when the image will not fit on a single volume or removable disk. TCP/IP Transmission Control Protocol/Internet Protocol. A networking protocol that is widely used and supported because of its ability to connect disparate hosts. Volume A physical unit of a storage medium such as a diskette, hard disk, or disk pack capable of having data recorded on it and subsequently read. 24