150   Command-line switches <?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />

      Command-line switches

 

                                 To list Symantec Ghost command-line switches

 

                                      In the Ghost directory, type .e of the following:

 

                                           ghost.exe -h

 

                                           ghost.exe -?

 

     Command-line switches

 

     @filename                   @filename specifies a file that contains additional command-line switches that Symantec

                                 Ghost should read. Filename indicates the path and file name of the command-line switch

                                 file. The command-line switch file can include any Symantec Ghost command-line switch.

                                 The Symantec Ghost command-line switch file must be a text file with each switch . a

                                 separate line. This lets you exceed the DOS command-line limit of 150 characters.

 

                                 For example:

 

                                 ghost.exe @ghswitch.txt

 

                                 For this command-line switch, the Ghswitch.txt file reads:

 

                                 -clone,mode=pcreate,src=1:2,dst=g:\part2.gho

                                 -fcr

                                 -sure

 

     -afile=filename             Replaces the default abort error log file name, Ghosterr.txt, with the directory and file

                                 given in filename.

 

     -auto                       Automatically names spanned image files during creation. Using this switch avoids the

                                 user prompt that asks for confirmation of the next destination location for the remainder

                                 of the image file that is being restored.

 

                                 This switch is the default behavior for Symantec Ghost.

 

     -batch                      Batch mode switch. Prevents abort messages from waiting for user acknowledgment and

                                 removes user interaction prompts. The return value of Ghost.exe must be checked to

                                 identify whether the operation was successful. Symantec Ghost returns 0 . success and

                                 1 or higher . failure or error.

 

                                 See “Batch file example” . page 171.

 

     -bfc                        Handles bad FAT clusters when writing to disk. If this switch is set and the target

                                 partition is FAT, Symantec Ghost checks for and works around bad sectors, and all free

                                 sectors are verified.

 

                                 This option may slow Symantec Ghost operation substantially.

 

     -blind                      Prevents any GUI display. The blind switch must be used with switches that do not

                                 require any user input, for example, the clone switch. Using this switch lets you execute

                                 Ghost operations . a computer with no video adapter.

-bootcd                   When writing an image directly to a CD/DVD writer, makes the CD/DVD bootable. You

                           need a bootable floppy disk in drive A. If you use the -sure switch with -bootcd and a

                          floppy disk is not in drive A, then a non-bootable CD/DVD is created.

 

-buffersize=x             Ghost creates an image file using a buffer of size x where x = number of KB. The default

                          size of the buffer is automatically calculated by Symantec Ghost. The buffersize switch

                           lets you override this size. You can set the buffer size value from 1 to 32.

 

-chkimg,filename          Checks the integrity of the image file indicated by filename.

 

-clone                    Ghost.exe operation switch. This switch allows automation of Ghost.exe operations and

                           has a series of arguments that define the operation parameters.

 

                          See “Using the clone switch” . page 164.

 

-cns                      Reverts the naming of spanned files to the system used by versions of Symantec Ghost

                           prior to Symantec Ghost 6.5. If this switch is not used, then the naming of spanned files

                          conforms to Microsoft application guidelines. You do not need to use this switch when

                           reading an existing file. Use this switch when the first five characters in a file name must

                           be unique.

 

                           For example:

 

                          With -cns                                       Without -cns

 

                           Filename.gho                                   Filename.gho

 

                           Filename.001                                   Filen001.ghs

 

                           Filename.002                                   Filen002.ghs

 

-CRC32                     The -CRC32 switch lists the files . a disk or partition or creates an image file with CRC

                           values and then verifies the list against the original or a copy. The purpose is to allow

                           both quick listing of the contents of an image file and verification that a disk created by

                           Symantec Ghost contains the same files as the original.

 

                           See “Using the -CRC32 switch” . page 172.

 

-crcignore                 Ignores CRC errors. CRC errors indicate data corruption. This switch overrides CRC error

                           detection and may allow a corrupted image file to be used. Using this switch leaves the

                           corrupted files in an unknown state. You can use this switch to help you extract files from

                           a corrupted image file.

 -cvtarea                    Creates a file, Cvtarea.tmp, that is the location of the MFT when the FAT32 partition is

                                 converted to NTFS. This switch operates in a similar manner to the cvtarea program that

                                 Microsoft provides in Deploy.cab . the Windows XP installation CD.

 

                                 For more information, see the Microsoft Web site:

 

                                 http://www.microsoft.com/hwdev/tech/storage/ntfs-preinstall.asp

 

                                 The file is created in the root directory of the partition during a partition or disk restore

                                 and is created as a contiguous space . the disk. The largest size allowed is 4 GB. If the

                                 file is larger than this, it is truncated to 4 GB.

 

                                 The syntax for this switch is as follows:

 

                                 -cvtarea,filename=xxx,size=yyy{%disk,%free,KB,MB,GB},

                                 firstcluster=zzz{%disk,%free,KB,MB,GB}

 

                                 The default settings are as follows:

 

                                 filename          cvtarea.tmp

 

                                 size              12%disk

 

                                 firstcluster      1|3 GB|33%disk

 

                                                   Defaults to:

 

                                                        1/3 of the partition size if the partition size is less than 2 GB

 

                                                        1 GB if the partition size is less than 6 GB

 

                                                        3 GB if the partition size is equal to or greater than 6 GB

 

     -dd                         Dumps disk metrics information to the dump log file, Ghststat.txt. The file location can be

                                 altered using the -dfile=filename switch.

 

     -dfile=filename             Changes the path and file name of the dump log file created using the -dd switch.

 

     -dl=number                  Specifies the number of hard disks present. Valid numbers are between 1 and 8. This may

                                 help when the BIOS does not report the number of drives correctly.

 

     -dlist=drives               Specifies a list of drives to search for span files. If a span file cannot be found, then the

                                 drive letters in dlist are substituted .e by .e to look for the file . other drives.

 

                                 For example, the command ghost -dlist=CDEFG instructs Symantec Ghost to look for files

                                 on C, D, E, F, and G drives. The path remains the same.

 

     -f32                        Lets Symantec Ghost convert all FAT16 volumes to FAT32 volumes when the destination

                                 partition to convert is larger than 256 MB in size. Ensure that the installed operating

                                 systems can access the volumes that will be converted to support FAT32.

 

     -f64                        Lets Symantec Ghost resize FAT16 partitions to be larger than 2047 MB using 64 KB

                                 clusters. This is .ly supported by Windows NT and Windows 2000. Do not use .

                                 computers with other operating systems.

-fatlimit                  Limits the size of FAT16 partitions to 2047 MB. Useful when Windows NT FAT16

                            partitions are present . the disk and 64 KB clusters are not wanted.

 

-fcr                       Creates a CRC32 file, Ghost.crc, while creating an image file.

 

                           See “Using the -CRC32 switch” . page 172.

 

-fdsp                      Preserves the signature bytes . the destination disk when performing a disk-to-disk or

                            image-to-disk cloning operation.

 

-fdsz                      Clears the signature bytes . the destination disk. This is the default for disk-to-disk and

                            image-to-disk operations.

 

-femax                     When an extended partition is created in a disk-to-disk or image-to-disk operation, the

                           femax switch ensures that the extended partition takes up all free space.

 

-ffatid                    Forces the FAT partition id. This switch changes the partition id to the recommended

                            partition id for the FAT partition within the destination image file or the destination

                            partition table. This switch .ly takes effect if the source is a disk or partition, not an

                            image file.

 

                            For example, if you are cloning a partition of type 0xA0 (some unknown partition id), and

                           Symantec Ghost sees it as a valid FATx (FAT12/FAT16/FAT32) partition, then the

                            partition id is changed from 0xA0 to FATx.

 

                           This was default Symantec Ghost behavior before Symantec Ghost 7.5. This switch allows

                           for backward compatibility.

 

-ffi                       Prefers the use of direct IDE access for IDE hard-disk operations.

 

-ffs                       Prefers the use of direct ASPI/SCSI disk access for SCSI hard-disk operations.

 

-ffx                       Prefers the use of Extended Interrupt 13h disk access for hard-disk operations.

 

-finger                    Shows the fingerprint details written . a hard disk created by Symantec Ghost. The

                           fingerprint details include the process used to create the disk or partition and the time,

                           date, and disk . which the operation was performed.

 

                            Reports the presence of a Ghost fingerprint with the following return code:

 

                                If any of the disks that Ghost can access have a fingerprint: 1

 

                                If none of the disks that Ghost can access have a fingerprint: 0

 

                                If the computer has no disk or none of the disks can be accessed: 2

 

-fis                       Uses all available disk space when creating partitions. By default, Symantec Ghost often

                            leaves a small amount of free space at the end of the disk. Because partitions must be

                           aligned to cylinder boundaries, Symantec Ghost may leave up to 8 MB free even when -fis

                            is specified.

 

-fni                       Disables direct IDE access support for IDE hard-disk operations.

 

-fns                       Disables direct ASPI/SCSI access support for SCSI hard-disk operations.

 

-fnx                       Disables extended INT13 support for hard-disk operations.

-force1394                  Forces FireWire support to start, even when the FireWire controller is being run by

                                 something else. The -force1394 switch attempts to take over the FireWire Host Controller.

                                 To enable native BIOS support you must restart the computer.

 

                                 Note the following:

 

                                      Use this switch with caution.

 

                                      Avoid using the force1394 switch to take over a FireWire controller from a driver, for

                                       example, Iomega FireWire drivers. You may encounter problems if you do this.

 

     -forceusb                   Forces USB support to start, even when the USB controller is being run by something else.

                                 The -forceusb switch attempts to take over the USB Host Controller and then attempts to

                                 return it to the previous state .ce the Ghost operation is complete. This works for

                                 controllers as follows:

 

                                      EHCI controllers with BIOS support are taken over and then returned to the BIOS.

 

                                      UHCI controllers with BIOS support are taken over and then returned to the BIOS.

                                       For example, the keyboard is returned after the Ghost operation is finished.

 

                                      OHCI controllers with BIOS support are taken over but not returned to the BIOS.

 

                                 Note the following:

 

                                      Use this switch with caution.

 

                                      Avoid using the forceusb switch to take over a USB controller from a driver, for

                                       example, the Ghost peer-to-peer USB driver. You may encounter problems if you do

                                       this.

 

     -fro                        Forces Symantec Ghost to continue cloning even if the source contains bad clusters.

 

     -fx                         Causes Symantec Ghost to exit to DOS after an operation is complete. By default,

                                 Symantec Ghost prompts the user to restart or exit when the operation has finished. If

                                 Symantec Ghost is run as part of a batch file, it is sometimes useful to exit back to the DOS

                                 prompt after completion so that further batch commands are processed.

 

                                 See “-rb” . page 160.

 

     -ghostoncd                  Includes Ghost.exe . a CD/DVD when writing an image to a CD/DVD.

 

     -h or -? or -help           Shows the Symantec Ghost command-line switch Help page.

-hasfingerprint           Reports the presence of a Ghost fingerprint with the following:

 

                              If any of the disks that Ghost can access have a fingerprint:

                               Display to screen: 1

                               Return code: 1

 

                              If none of the disks that Ghost can access have a fingerprint:

                               Display to screen: 0

                               Return code: 0

 

                              If the computer has no disk or none of the disks can be accessed:

                               Display to screen: unknown

                               Return code: 2

 

                          The display to the screen can be interpreted by any . language that is executing

                          Ghost. However, it is easiest to use the return value.

 

-ia                       The image all switch forces Symantec Ghost to perform a sector-by-sector copy of all

                          partitions. By default, when copying a partition from a disk to an image file or to another

                          disk, Symantec Ghost examines the source partition and decides whether to copy just the

                          files and directory structure or to do a sector-by-sector copy. If it understands the internal

                          format of the partition, it defaults to copying the files and directory structure. Generally,

                          this is the best option. However, if a disk has been set up with special hidden security files

                          that are in specific positions . the partition, the .ly way to reproduce them accurately

                          on the target partition is through a sector-by-sector copy. If you use this switch to create

                          an image of a dynamic disk, then the image must be restored to a disk with identical

                          geometry.

 

-ial                      Forces a sector-by-sector copy of Linux partitions. Other partitions are copied normally.

 

-ib                       The image boot switch copies the entire boot track, including the boot sector, when

                          creating a disk image file or copying disk-to-disk. Use this switch when installed

                          applications, such as boot-time utilities, use the boot track to store information. By

                          default, Symantec Ghost copies .ly the boot sector and does not copy the remainder of

                          the boot track. You cannot perform partition-to-partition or partition-to-image functions

                          with the -ib switch.

 -id                          The image disk switch is similar to -ia (image all), but also copies the boot track, as in -ib

                                   (image boot), extended partition tables, and unpartitioned space . the disk. When

                                   looking at an image with -id, you see the unpartitioned space and extended partitions in

                                   the list of partitions. The -id switch is primarily used by law enforcement agencies that

                                   require forensic images.

 

                                   When Symantec Ghost restores from an -id image, it relocates partitions to cylinder

                                   boundaries and adjusts partition tables accordingly. Head, sector, and cylinder

                                   information in partition tables is adjusted to match the geometry of the destination disk.

                                   Partitions are not resizeable. You will need an identical or larger disk than the original.

 

                                   Symantec Ghost does not wipe the destination disk when restoring from an -id image.

                                   Geometry differences between disks may leave tracks . the destination disk with their

                                   previous contents.

 

                                   Use the -ia (image all) switch instead of the -id switch when copying partition-to-partition

                                   or partition-to-image. An individual partition can be restored from an image created with

                                   -id.

 

      -imgdesc                     Adds a single-line image file de.ion to the image file with the following restrictions:

 

                                        Cannot include any new lines

 

                                        Cannot be used with -imgdescfile

 

                                        Must be used with the clone switch

 

                                        Clone switch mode must be create, dump, pcreate, or pdump

 

      -imgdescfile=filename        Specifies a text file that contains an image file de.ion to be added to the image file

                                   with the following restrictions:

 

                                        Cannot be used with -imgdesc

 

                                        Must be used with the clone switch

 

                                        Clone switch mode must be create, dump, prcreate, or pdump

 

      -ir                          The image raw switch copies the entire disk, ignoring the partition table. This is useful

                                   when a disk does not contain a partition table in the standard PC format, or you do not

                                   want partitions to be realigned to track boundaries . the destination disk. Some

                                   operating systems may not be able to access unaligned partitions. Partitions cannot be

                                   resized during restore and you need an identical or larger disk.

 

      -ja=sessionnm                Connects to the GhostCast Server using the specified session name. Set the disk and

                                   possibly partition to be cloned . the GhostCast Server.

 

      -jaddr=<ip_address>          Use the IP address for the GhostCast Server.

 

      -jl:x=filename               Creates a log file to assist in diagnosing GhostCasting and TCP/IP peer-to-peer problems.

                                   The amount of information logged is set by the log level x. The log level x can be E (errors),

                                   S (statistics), W (warnings), I (information), or A (all) in increasing order of logging detail.

                                   The file name indicates the path and file name of the log to be created. In general, the

                                   error and statistic levels do not affect session performance. All other levels may reduce

                                   performance and should be used for diagnostic purposes .ly.

 

      -jm=[u|d|m]                  Use unicasting, direct broadcast, or multicasting.

 

-js=n                      Sets to n the number of router hops Symantec Ghost is allowed to cross in an attempt to

                           find the GhostCast Server. (Default is 16.)

 

-lockinfo                  Shows the type code and information stored in the BIOS or the Pentium III Processor ID.

 

                           For example:

 

                           Type       Based .                   Value

 

                           M          Manufacturer                Compaq

 

                           P          Product name                Deskpro EN Series SFF

 

                           V          Version                    Award Software

 

                           S          Serial number              H925CKH60020

 

                           U          UUID                        2DA9379B4707D31185E8C800A4F232BC

 

                           C          M&P combined               Compaq Deskpro EN Series SFF

 

                           I          PIII ID                     0000067200028E72A6994A20

 

-locktype= Type            Lets you lock an image file for use with a specific set of computers defined by the type

                           chosen and the source computer.

 

                           For example, ghost -locktype=P creates an image that can be used .ly . systems that

                           have the same product name type as the source computer.

 

                           On computers with multiple processors, the processorID bios lock option does not work as

                           intended when running Ghost32.exe. In this situation, do not create or restore images

                           with the -locktype parameter set to I. Other -locktype values work as intended.

 

-lpm                       The LPT master mode switch causes Symantec Ghost to automatically go into LPT master

                           mode and is the equivalent of selecting LPT Master from the main menu.

 

                           See “Peer-to-peer connections” . page 212.

 

-lps                       The LPT slave mode switch causes Symantec Ghost to automatically go into LPT slave

                           mode and is the equivalent of selecting LPT Slave from the main menu.

 

                           See “Peer-to-peer connections” . page 212.

 

-noauto                    Disables the automatic naming of spanned image files during creation. The user is

                           prompted for confirmation of the next destination location for the remainder of the image

                           file that is being restored.

-noautoskip               Includes the hibernation and skip files in the image file. These files are excluded by

                               default.

 

                               For more information . hibernation and skip files, see the Symantec Ghost

                               Implementation Guide.

 

     -nofile                   Disables the Image File Selection dialog box. Useful when opening directories with large

                               numbers of files and slow links.

 

     -noide                    Disables access to IDE devices. This is equivalent to -fni for IDE disks, but noide also

                               affects ATAPI CD writers, tape drives, and other IDE devices.

 

     -noindex                  Prevents Symantec Ghost from creating an index when creating an image file. This

                               slightly reduces the size of the image file and saves memory, but Ghost Explorer is much

                               slower in reading the image file. This switch is useful if you are saving an image file from a

                               large disk with very little memory.

 

     -nolilo                   Does not attempt to patch the LILO or GRUB boot loader after a clone. If you use the -

                               nolilo switch, you can restart your computer from a floppy disk or CD after a clone and

                               then run

                               /sbin/lilo or the GRUB install . as the root user to reinstall the boot loader.

 

     -noscsi                   Disables access to SCSI devices using ASPI. This is equivalent to -fns for SCSI disks, but

                               noscsi also affects SCSI CD writers, tape drives, and other SCSI devices.

 

     -no1394                   Disables FireWire support.

 

     -nousb                    Disables USB support.

 

     -ntc-                     Disables NTFS contiguous run allocation.

 

     -ntchkdsk                 Sets the CHKDSK bit set . a copied NTFS volume. This causes Windows NT to check the

                               integrity of the volume when it is started.

 

     -ntd                      Enables NTFS internal diagnostic checking.

 

     -ntic                     Ignores the NTFS volume CHKDSK bit. Symantec Ghost checks the CHKDSK bit . an

                               NTFS volume before performing operations. When Symantec Ghost indicates that the

                               CHDSK bit is set, you should run CHKDSK . the volume to ensure that the disk is in a

                               sound state before cloning.

-ntiid                     This switch forces Symantec Ghost to ignore the partition table system ids and instead to

                           check the partition contents when detecting NTFS file systems. This switch is useful when

                           the system id is not set to 0x07 for partitions containing NTFS file systems. The partitions

                           would otherwise be inefficiently imaged sector-by-sector. This switch can be used when it

                            is necessary to image a Windows NT4 FTDisk mirrored partition.

 

                           Take care when using this switch. Do not use the -ntiid switch with volume sets and stripe

                           sets.

 

                           To clone mirrored partitions (also known as Windows NT software RAID partitions)

 

                            1    With Windows NT disk administrator, break the mirror set.

 

                           2     Using the -ntiid switch, clone .e of the mirror partitions.

 

                           3     Resize as desired. Partitions can .ly be resized by Symantec Ghost during a disk

                                 operation. When performing a partition operation, the target partition size must

                                 already be established.

 

                           4     After cloning, recreate the mirror set using the Windows NT disk administrator. The

                                 disk administrator creates the partitions in the mirror set.

 

-ntil                      Ignores NTFS log file check (inconsistent volume).

 

-or                        The override switch allows the override of internal space and integrity checks and lets you

                            put a very big image into a small partition. The operation fails if it is unable to write to the

                            limited partition size. This switch lets you override spanning, which fails if there is limited

                           space. Avoid using this switch.

 

-pfile                     Saves the File Preservation Metadata File that holds the location of preserved files to a

                           specified location. By default, it is saved to the current directory.

 

                            For example,

 

                            ghost - pfile=c:\pathname

 

                           Where pathname is the directory for the File Preservation Metadata File.

 

-pmbr                      Specifies that the master boot record of the destination disk is to be preserved when

                            performing a disk-to-disk or image-to-disk operation.

 

-prefghst                  If Symantec Ghost has a choice, it attempts to use internal Ghost file system access as

                           opposed to using the operating system for file system access.

 

                           This switch is intended for use under instruction from Symantec Technical Support when

                           troubleshooting.

 

-prefos                    If Symantec Ghost has a choice, it attempts to use the operating system for file system

                           access as opposed to using the internal Ghost file system access.

 

                           This switch is intended for use under instruction from Symantec Technical Support when

                           troubleshooting.

-preserve                  Preserves files specified by the preservedest switch. The task fails if the specified files do

                                not exist. To preserve files or directories other than the image file, the syntax is as follows:

 

                                -preserve=filepath[=newpath] [,filepath[=newpath]...]

 

                                Each filepath can refer to an individual file or a directory. All files and subdirectories of a

                                specified directory are preserved. If a file does not exist, then the restore fails. After a

                                Clone step in a task, all preserved files are added back to the partition specified by the

                                -preservedest=n switch, renaming them to newpath where specified. You must use

                                -preserve with -preservedest.

 

     -preservedest=n            Where n is the number of the partition relative to the destination disk, not relative to the

                                partitions being restored. Specifies the partition to which files specified with the preserve

                                switch are restored.

 

     -preservedimage            Deletes a preserved image file .ce the restore has completed successfully. This switch

     deleteafterclone           overrides the default, which is to retain the preserved image file.

 

     -preserveifexists          Preserves files specified by the preservedest switch if they exist. The task does not fail if

                                the specified files do not exist. To preserve files or directories other than the image file,

                                the syntax is as follows:

 

                                -preserveifexists=filepath[=newpath] [,filepath[=newpath]...]

 

                                Each filepath can refer to an individual file or a directory. All files and subdirectories of a

                                specified directory are preserved. If a file does not exist, then the restore fails. After a

                                Clone step in a task, all preserved files are added back to the destination specified by the

                                -preservedest=n switch, renaming them to newpath where specified. You must use the

                                -preserveifexists switch with -preservedest.

 

     -pwd and -pwd=x            Specifies that password protection be used when creating an image file.

 

                                x indicates the password for the image file. If no password is given in the switch, Symantec

                                Ghost prompts for .e. You can enter a maximum of 10 alphanumeric characters.

 

     -quiet                     The quiet mode switch disables status updates and user intervention.

 

     -rb                        Restarts after finishing a restore or copy. After completing a restore or copy operation,

                                the target computer must be restarted so that the operating system can restore the new

                                disk/partition information. Normally, Symantec Ghost prompts the user to restart or exit.

                                The -rb switch tells Symantec Ghost to restart automatically after it completes the restore

                                or copy. This is useful when automating Symantec Ghost in a batch command file.

 

                                See “-fx” . page 154.

 

     -recover                   Sets the default to recover preserved files if a previous restore has failed and the File

                                Preservation Metadata File still exists. If this switch is not used, the default is set to abort.

-.                    Allows you to specify a series of commands (one per line) that Symantec Ghost will

                           execute in sequential order.

 

                           For example:

 

                           ghost -.=..txt

 

                           Following is an example of ..txt:

 

                           -clone,mode=create,src=2,dst=1:1\drv2.gho

                           -chkimg,1:1\drv2.gho

                           -clone,mode=create,src=2,dst=c:\part2.gho

                           -chkimg,c:\part2.gho

 

                           In this example 1:1 is equivalent to c:\.

 

-skip=x                    The skip file switch causes Symantec Ghost to exclude the indicated files during a create

                           or restore operation. A skip entry can specify a single file, a directory, or multiple files

                           using the * wildcard. File names must be given in short file name format and all path

                           names are absolute. .ly FAT system files can be skipped. It is not possible to skip files .

                           NTFS or other file systems. The skip switch may .ly be included in the command line

                           once. To specify multiple skip entries, they must be included in a text file indicated using

                           -skip=@skipfile. The format of the skip text file, skipfile, matches the format used with the

                           CRC32 vexcept option.

 

                           For example:

 

                               -skip=\windows\user.dll

                                Skips the file User.dll in the Windows directory.

 

                               -skip=*\readme.txt

                                Skips any file called Readme.txt in any directory.

 

                               -skip=\ghost\*.dll

                                Skips any file ending with .dll in the Ghost directory.

 

                               -skip=\progra~1\

                                Skips the program files directory (note the short file name).

 

                               -skip=@skipfile.txt

                                Skips files as outlined in Skipfile.txt. For example:

                                *\*.tmt

                                 [partition:1]

                                \windows\

                                *\*.exe

                                 [Partition:2]

                                *\*me.txt

                                This Skipfile.txt file would skip all *.tmt files . any partition, the Windows

                                directory, all *.exe files . the first partition, and any file that ends with me.txt .

                                the second partition.

 

-span                      Enables spanning of image files across volumes.

 

                           Do not use this switch if you are running Ghost.exe to write an image file directly to a CD-

                           R/RW. Ghost.exe automatically spans CD-R/RW disks if required.

 -split=x                   Splits image file into x MB spans. Use this switch to create a forced-size volume set. For

                                example, if you want to force smaller image files from a 1024 MB drive, you could specify

                                200 MB segments.

 

                                 For example:

 

                                 ghost.exe -split=200

 

                                This divides the image into 200 MB segments.

 

                                 If this switch is not used then an image is split at 2 GB in the following operations:

 

                                     GhostCast

 

                                     Peer-to-peer

 

                                     Creating an image . a mapped-network drive

 

                                 If this switch is explicitly set to 0, the image does not split.

 

     -sure                      Use the -sure switch in conjunction with -clone to avoid being prompted with the final

                                question “Proceed with disk clone - destination drive will be overwritten?” This command

                                 is useful in batch mode.

 

     -sze                       Sets the size for the destination partitions for either a disk restore or disk copy operation.

                                When numbering partitions in the -sze switch, do not include the hidden Ghost partition.

                                This switch is intended to be used in the Additional command line in the Console. All

                                functionality of -sze switches are supported.

 

                                See “Setting a destination size for the clone switch” . page 168.

 

     -szee                      Forces Symantec Ghost to keep the sizes of all destination partitions the same as in the

                                source partition (no resizing).

 

                                This switch can be used with or without the -clone switch.

 

                                See “Setting a destination size for the clone switch” . page 168.

 

     -szef                      Forces Symantec Ghost to keep the sizes of all destination partitions, except for the first

                                one, the same as in the source partition. The first partition uses the remaining disk space.

 

                                This switch can be used with or without the -clone switch.

 

                                See “Setting a destination size for the clone switch” . page 168.

 

     -szel                      Forces Symantec Ghost to keep the sizes of all destination partitions, except for the last

                                one, the same as in the source partition. The last partition uses the remaining disk space.

 

                                This switch can be used with or without the -clone switch.

 

                                See “Setting a destination size for the clone switch” . page 168.

 

     -tapebuffered              Default tape mode. Sets the ASPI driver to report a read/write as successful as soon as the

                                data has been transferred to memory. Useful when using older or unreliable tape devices

                                or sequential media.

-tapeeject                Forces Symantec Ghost to eject the tape following a tape operation. If the tape drive does

                          not support remote ejection, you must eject and insert the tape manually before further

                          use. Earlier versions ejected the tape by default. By default, Symantec Ghost does not eject

                          the tape. It rewinds the tape before exiting to DOS.

 

-tapebsize=x              Specifies the tape block size in units of 512 bytes, where x is a number between 1 and 128.

 

-tapespeed=x              Allows control of tape speed, where x is 0 to F. 0 is the default. 1 to F increases tape speed.

                          Only use this when the tape does not work correctly at the speed used by Symantec Ghost.

 

-tapeunbuffered           Sets the ASPI driver to report a read/write as successful .ly when the data has been

                          transferred to the tape drive. This can occur before the data is physically written to the

                          medium.

 

-tcpm[:slave IP address]  The TCP/IP master mode switch causes Symantec Ghost to go into TCP/IP master mode

                          automatically and is the equivalent of selecting TCP/IP Master from the main menu. The

                          IP address of the slave computer may be specified.

 

                          See “Peer-to-peer connections” . page 212.

 

-tcps                     The TCP/IP slave mode switch causes Symantec Ghost to go into TCP/IP slave mode

                          automatically and is the equivalent of selecting TCP/IP Slave from the main menu.

 

                          See “Peer-to-peer connections” . page 212.

 

-unpreserveimage          After a failed restore, do not preserve the image file that was used . the failed restore.

 

-usbm                     The USB master mode switch causes Symantec Ghost to go into USB master mode

                          automatically and is the equivalent of selecting USB Master from the main menu.

 

                          See “Peer-to-peer connections” . page 212.

 

-usbs                     The -usbs switch causes Symantec Ghost to go into USB slave mode automatically and is

                          the equivalent of selecting USB Slave from the main menu.

 

                          See “Peer-to-peer connections” . page 212.

 

-vdw                      If the -vdw switch is set, Symantec Ghost uses the disk’s verify command to check every

                          sector . the disk before it is written. This option may slow Symantec Ghost operation

                          substantially.

 

-ver                      Shows the version number of Symantec Ghost.

 

-z                        Runs compression when saving a disk or partition to an image file. The greater the

                          compression, the slower the transmission, as follows:

 

                              -z or -z1: Low compression (fast transmission)

 

                              -z2: High compression (medium transmission)

 

                              -z3 through -z9: Higher compression (slower transmission)

 

                          For more information . image files and compression, see the Symantec Ghost

                          Implementation Guide.