Symantec 10024709 Patio Umbrella User Manual


 
9Contents
Chapter 10 Managing partitions using GDisk
Introducing GDisk ........................................................................................ 128
Running GDisk ............................................................................................. 128
Overview of main command-line switches .................................................129
Online Help for command-line switches .............................................130
Switches common to all GDisk commands ......................................... 130
Creating a partition ....................................................................................... 131
Reinitializing the Master Boot Record ......................................................... 132
Showing information about disks ................................................................ 133
Performing multiple GDisk operations using batch mode ........................ 134
FAT16 partitions in Windows NT ...............................................................135
Deleting and wiping your disk .....................................................................135
Activating or deactivating a partition .......................................................... 137
Hiding or unhiding a partition .................................................................... 137
Modifying the Windows NT/2000/XP boot menu ..................................... 138
Specifying the boot.ini path and file name .......................................... 138
Displaying the list of current boot entries ............................................ 138
Adding an entry to Boot.ini .................................................................. 138
Removing an entry from Boot.ini ........................................................ 141
Setting the default boot option and timeout ....................................... 141
Support for Large Hard Disks ......................................................................142
Chapter 11 Updating Security Identifiers (SIDs) and computer names
Making SID changes with Ghost Walker on Windows NT-based
clients .....................................................................................................144
Norton Ghost Walker capabilities ........................................................ 144
Norton Ghost Walker limitations ........................................................144
SID changing limitations ...................................................................... 145
Loss of access to external data objects ......................................................... 145
Identical user names and passwords across workstations ..........................145
Using Ghost Walker ...................................................................................... 146
Running Ghost Walker from the command line .................................148
Appendix A Command-line switches
Using Norton Ghost with switches ..............................................................154
Command-line switches ...............................................................................154
Clone switch usage ........................................................................................ 166
Defining the type of clone command ................................................... 166
Setting a source for the clone switch ....................................................167
Setting a destination for the clone switch ............................................169
Setting a destination size for the clone switch ..................................... 169
Examples of clone switch usage ............................................................ 170