Archive for March 2011

CHFI Training CBT Boot Camp: EC-Council Computer Hacking Forensic Investigator



CHFI Training CBT Boot Camp: EC-Council Computer Hacking Forensic Investigator $1,395.00 || 16.95 GB

Computer crime in today’s cyber world is on the rise. Computer Investigation techniques are being used by police, government and corporate entities globally and many of them turn to EC-Council for our Computer Hacking Forensic Investigator CHFI Training and Certification Program. Computer Security and Computer investigations are changing terms. More tools are invented daily for conducting Computer Investigations, be it computer crime, digital forensics, computer investigations, or even standard computer data recovery, The tools and techniques covered in EC-Council’sCHFI program will prepare the student to conduct computer investigations using groundbreaking digital forensics technologies.

Computer Investigation
Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks.


Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information known as computer data recovery.



Electronic evidence is critical in the following situations

• Disloyal employees
• Computer break-ins
• Possession of pornography
• Breach of contract
• Industrial espionage
• E-mail Fraud
• Bankruptcy
• Disputed dismissals
• Web page defacements
• Theft of company documents











This EC Council: Computer Hacking Forensic Investigator (CHFI) v4 training course will prepare you to pass the EC0 312-49 exam and achieve Computer Hacking Forensics Investigator (CHFI) certification. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

Career Academy is an EC-Council endorsed training provider. We have invited the best security trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for and pass your certification exams.

This officially endorsed product gives our students access to the exam by providing you with a Voucher Number. The EC-Council Voucher Number can be used at any Prometric center, this voucher number is required and mandatory for you to schedule and pay for your exam. Without this voucher number Prometric will not entertain any of your requests to schedule and take the exam.

PACKAGE INCLUDES

• 6 training DVDs featuring live instructor-led classroom sessions with full audio, video and demonstration components
• Official EC-Council CHFI Courseware Kit
* 4 discs containing Labs, Guides, and 1 Helix bootable CD
* Intensive Hacking & Counter-Hacking Hands-On demonstration components
* Official EC-Council CHFI Curriculum Courseware Volumes 1, 2 & 3
* Official EC-Council CHFI Lab Guide
• Exclusive LearningZone Live Mentor Click for Details
Help whenever you need it! - Why wait for email support?
Chat Live with our Certified Instructors anytime around the clock (24x7)
• Proven technique - Actual Exam Secrets Review
• Free 1 Year Upgrade Policy
• Certificate of Completionhttp://www.blogger.com/img/blank.gif

Download Here:

Wednesday, March 30, 2011
Tag :

Certified Ethical Hacker Training Version6



Certified Ethical Hacker Training Version6 | 12GB

If you want to stop hackers from invading your network, first you've got to invade their minds.
Computers around the world are systematically being victimized by rampant hacking. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes.
The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival.

If hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organizations have adequately protected their information assets, they must adopt the approach of 'defense in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

To achieve the Certified Ethical Hacker Certification, you must pass the CEH exam 312-50

WARNING: Students are warned against attending CEH training at unauthorized training centers. Only those who attend CEH training at EC-Council ATCs are eligible for CEH certification. Also you will be required to show proof of official CEH training attendance when you apply for EC-Council's LPT certification and Master of Security Science (MSS) degree program.

EC-Council has certified IT professionals from the following organizations as CEH:


* Cisco Corporation
* Novell
* Canon
* Hewlett Packard
* US Air Force Reserve
* US Embassy
* Verizon
* Pfizer
* HDFC Bank
* University of Memphis
* Microsoft Corporation
* Worldcom
* Trusecure
* US Department of Defense
* Fedex
* Dunlop
* British Telecom
* Supreme Court of the Philippines
* United Nations
* Ministry of Defense, UK
* Nortel Networks
* MCI
* Check Point Software
* KPMG
* Fleet International
* Cingular Wireless
* Columbia Daily Tribune
* Johnson & Johnson
* Marriott Hotel
* Tucson Electric Power Company
* Singapore Police Force
* PriceWaterhouseCoopers
* SAP
* Coca-Cola Corporation
* Quantum Research
* US Military
* IBM Global Services
* UPS
* American Express
* FBI
* Citibank Corporation
* Boehringer Ingelheim
* Wipro
* New York City Dept of IT & Telecom - DoITT
* United States Marine Corps
* Reserve Bank of India
* US Air Force
* EDS
* Bell Canada
* Sony
* Kodak
* Ontario Provincial Police
* Harris Corporation
* Xerox
* Philips Electronics
* US Army
* Schering
* Accenture
* Bank One
* SAIC
* Fujitsu
* Deutsche Bank
* Symantec
* Sun Microsystems
* Google Corporation
* McAfee
* Dell Corporation
* Verizon
* Motorola
* Singapore Airlines
* Infosys
* TATA Consultancy
* Deloitte
* Oracle

Download Here:

FILESERVE

6 DVDs featuring live instructor-led classroom sessions with full audio, video and demonstration components (Aprox. 10.3 GiB)

http://www.fileserve.com/file/tSqyeHg/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part01.rar

http://www.fileserve.com/file/u7EJV8K/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part02.rar

http://www.fileserve.com/file/HGQWjPs/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part03.rar

http://www.fileserve.com/file/UTJ7qvC/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part04.rar

http://www.fileserve.com/file/upfE9wb/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part05.rar

http://www.fileserve.com/file/rzzyY3B/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part06.rar

http://www.fileserve.com/file/vjs5668/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part07.rar

http://www.fileserve.com/file/GXbS2XN/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part08.rar

http://www.fileserve.com/file/4fMZz5X/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part09.rar

http://www.fileserve.com/file/68R2BP9/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part10.rar

http://www.fileserve.com/file/K7bMrW9/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part11.rar

http://www.fileserve.com/file/bkhZUUv/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part12.rar

http://www.fileserve.com/file/2k75Nh5/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part13.rar

http://www.fileserve.com/file/kcfjh7t/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part14.rar

http://www.fileserve.com/file/Yzsweea/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part15.rar

http://www.fileserve.com/file/UyYCxza/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part16.rar

http://www.fileserve.com/file/tqxGERV/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part17.rar

http://www.fileserve.com/file/SCMAQav/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part18.rar

http://www.fileserve.com/file/FVCs9Zk/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part19.rar

http://www.fileserve.com/file/m8JXkz3/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part20.rar

http://www.fileserve.com/file/dqXentR/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part21.rar

http://www.fileserve.com/file/dYTx6AA/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part22.rar

http://www.fileserve.com/file/SQFrmkU/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part23.rar

http://www.fileserve.com/file/WHBbetc/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part24.rar

http://www.fileserve.com/file/Ttw37Jw/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part25.rar

http://www.fileserve.com/file/XgSs2dd/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part26.rar

http://www.fileserve.com/file/pYeVYW3/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part27.rar

http://www.fileserve.com/file/muCAtDb/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part28.rar

http://www.fileserve.com/file/EFTBKrG/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part29.rar

http://www.fileserve.com/file/FFqT8tm/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part30.rar

http://www.fileserve.com/file/PNJY4je/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part31.rar

http://www.fileserve.com/file/HgGwyRT/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part32.rar

http://www.fileserve.com/file/yBAQSt8/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part33.rar

http://www.fileserve.com/file/RTxFfFN/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part34.rar

http://www.fileserve.com/file/chyppkk/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part35.rar

http://www.fileserve.com/file/cxhEBNK/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part36.rar

http://www.fileserve.com/file/VbtYRCc/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part37.rar

http://www.fileserve.com/file/yu4T7aa/Career_Academy_CEHv6_CBT_6_DVD.7z-BFU.part38.rar

Extract RAR Files Without Password Free – Open Locked RAR Files

If you are looking for free softwares to extract rar files without password then here are two simple tools to open locked rar file archives. Simply download them you might jut be able to extract files from password protected Rar files.

Extract Files from Password Protected RAR Files
Winrar Unlock


Unlock locked winrar archive (including SFX) allowing you to modify the content freely. With Winrar archive lock to prevent modification, people cannot change the content/comment in it. Through some patching of few bytes, you are able to modify your archive with ease.

Download Winrar Unlock: http://www.megaupload.com/?d=FET7W6N2

RAR Password Cracker


This program is intended to recover lost passwords for RAR/WinRAR archives of versions 2.xx and 3.xx. The program finds by the method of exhaustive search all possible combinations of characters (“bruteforce” method), or using passwords from lists (“wordlist” or “dictionary” method). Self-extracting archives and multivolume archives are supported.

Download RAR Password Cracker: http://www.megaupload.com/?d=WOBWCUTDLink

The program is able to save a current state (you can interrupt the program at any time, and restart from the same state later).

Note: Most of the time for password protected RAR files For eg. Heroes.S02.E10.www.Free-Offline.com.rar the password is in the name it self. In this case the password, it is www.free-offline.com

Protect USB Flash Drive with Password Lock

USB Safeguard enables you to encrypt and password protect sensitive data on your USB drive. You can selected one or more folders to be encrypted and choose to securely delete the original (unencrypted) files with the built-in file shredder.


Lock your USB Pen Drive with Password : USB Safeguard


Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an password to encrypt and decrypt the files that you want to protect from prying eyes.


The program also includes a handy Safe Browsing feature that allows you to launch Internet Explorer without leaving any Internet traces on the host computer. Other features include an on-screen keyboard for secure password input and free space wiping.

Download USB Safeguard :

USB Safeguard uses 256-bit AES encryption to protect your date. The program is not installed on your PC, it runs directly from your USB pen drive.

Delete Locked Files Which Can’t be Deleted

If you have been using a computer, you have ran into one or more of the following messages:

* Cannot delete file: Access is denied.
* Make sure the disk is not full or write-protected and that the file is not currently in use.
* The source or destination file may be in use.
* The file is in use by another program or user.

These are very common messages that occur when attempting to delete files that a particular malware infection put onto your system.
Remove, Move & Delete Locked Files in Windows

FileASSASSIN is an application that can delete any type of locked files that are on your computer. Whether the files are from a malware infection or just a particular file that will not delete – FileASSASSIN can remove it.


Simply

download FileASSASSIN from one of the links below. If you selected the portable build, simply unzip and run the application, otherwise run the installer provided.

Start FileASSASSIN and select a file by dragging it onto the text area or select it using the (…) button. Next, select a removal method from the list. Finally, click Execute and the removal process will commence.

Download FileASSASSIN : http://www.megaupload.com/?d=C7UVL2R0

The program uses advanced programming techniques to unload modules, close remote handles, and terminate processes to remove the particular locked file. Please use with caution as deleting critical system files may cause system errors.

Play all Broken/Not Working AVI files

Generally most of the times you may notice that if you are downloading a movie etc in avi format, they show up errors due to download errors.

This are minor index and similar problem show up in files which are downloaded from ed2k (emule), torrent, gnutella, etc. Here are few softwares or players that can play these corrupted avi files.
How to Fix, Repair and Play Broken AVI Files with Index Errors etc.
Divfix++ (link)

This less than 1 MB program repairs broken AVI file streams by rebuilding index part of file. This is very useful when trying to preview movies which has no index part, like some files are currently downloading.


To fix the file click on ‘Fix’. Make sure the option ‘Keep original file’ is checked or else the file will get replaced by the edited one. DivFix++ specialy designed for previewing video being downloaded files from P2P networks.
GOM Player (link)

AVI files can’t be played if the index is broken, or if the file isn’t completely downloaded. This is because the index is located at the end of the file. But, GOM Player’s patented technology enables users to view files with broken indexes or that are still being downloaded.
VLC Player (link)

The best of all VLC Player also allows you to fix broken AVI files and play them. But, sometimes you won’t be able to forward or rewind them.
Fix Player (link)

Fix Player is a simple and useful free AVI player which helps you to repair and to watch AVI video files on your PC. It’s easy and simple to use. Fix Player is AVI media player with some useful features:

* Repair broken AVI files.
* View partly download files. It may be files your get while connection aborted or file you get with the help of some bit torrent application.
* Download part of the file from internet, and preview it to decide if you want download file completely.
* Repair file from the broken CD or DVD disk.

Using these you can repair AVI, if your AVI file have not completely downloaded from the Internet.

Install and Configure Windows 2003 Remote Installation Services (RIS)

Install and Configure Windows 2003 Remote Installation Services (RIS)


RIS is Microsoft's version of 3rd party imaging software such as Symantec's Ghost. RIS uses various technologies, such as PXE and DHCP to install clean installations, (not upgrade), of several operation systems. The PXE protocol is a combination of DHCP and TFTP, where DHCP is used to locate a boot server or servers, with TFTP used to download the initial bootstrap program and additional files. The bootstrap program can then begin the OS installation.

The process of installing and configuring RIS is described below:

* Step 1 - Install the Remote Installation Service
* Step 2 - Further Configuration for Extended Use
* Step 3 - Using Symantec Ghost with RIS
* Step 4 - Troubleshooting RIS
* Create an Unattended Install Answer File
* Create a Ghost Image Bootable DVD



Step 1 - Install the Remote Installation Service

RIS Prerequisites:

RIS requires a DHCP server, a DNS server, and an Active Directory Domain Controller, all of which can be on the same server or a standalone server, it doesn't matter as long as they are accessible. The RIS server will need at least a 2GB NTFS partition and the client image cannot be stored on the system drive

RIS clients need to be PXE compliant. If in the client's BIOS screen or Boot Device options there is an option for "Network Boot" then the chances are that the computer is PXE compliant.

Although it is not necessary, an isolated subnet with an isolated domain can offer security for the RIS Service as well as making it impossible for users to accidentally start a RIS install and lose their data.

Limitations of RIS:

RIS delivers only clean installs of XP Professional, you cannot use this technology to upgrade clients such as Windows 98 to XP. While you cannot use RIS to install domain controllers, you can have Windows Server 2003 stand alone servers which can then join the domain and promoted to domain controllers. Wireless networks do not support PXE network cards, so you cannot use the wireless medium to install XP Professional via RIS.
The RIS Server can be a Member Server, in fact it's probably BETTER to offer RIS from a Member Server than a Domain Controller.

Once these conditions have been met then The Install can begin from the Add/Remove Program Control Panel:

Tick the "Remote Installation Services" Checkbox and press Next.


Windows will then copy the necessary files,you may be prompted for the windows CD.




Once the files have been copied, press Finish.


If required, restart the server just now.


Once you have logged in again, start RIS from the Administrative Tools start menu shortcut


Press Next


Any folder can be used as long as it is NTFS and not the system drive


If the folder you selected already exists then you will be asked to confirm your choice.


The above setting mean that any pc that contacts the server will be accepted for RIS install. By ticking the other box, the client PC's Computer account must first be created in Active Directory. If no boxes are ticked then no RIS installations will take place. These settings can be changed after the Installation has finished.


Here you enter the location of your XP Setup Files. Any location can be used, CD, local copy or network location.



This is the name of the folder that the image will be stored in, if it is not a standard image, then this can be reflected in the name.


Here the Image description can be entered, again if it is not a standard image, then this can be reflected in the description.


A brief reminder of the selections made and a chance to go back if something needs changed, otherwise press Finish.


the Install process will take about 30 min's, if there are any errors, they will be displayed.


Once complete press Done, RIS is now ready to use



Step 2 - Further Configuration for Extended Use

Open Active Directory Users and Computers


The properties of the Server's computer account will display the configuration options


here you can change the Server respond settings and also Verify the server configuration . Press Advanced Settings


The naming convention for the Computer accounts can be customized here, for the Client install to be as automatic as possible select custom as above.


The above format will ensure that the server creates incremental names for the computer accounts, if the RIS server is on an isolated domain, then this setup ensures that you don't have to create/delete/modify the computer accounts as they will have no effect on your live domain.



Here you can install a new image for another OS or another version of the same OS. Press Add


The "Add new installation image" option takes you through the same process as we have just completed to create a new image. The "Associate a new answer file to an existing image" option allows you to customize the RIS image further, choose this option.


The "Windows image Sample Files" option allows you to choose between 2 preset answer files, a standard one and one that does not repartition the hard drive. The "Another Remote Installation Server" option allows you to select an answer file already configured on another RIS server. The "An Alternate Location" allows you to select an answer file from a local or network drive, choose this


Choose the Image you want to add the answer file to.


Locate the Answer file with the Browse button, it must have the .sif extension, To learn how to create an answer file click here.


Enter a Description and Help Text


Review your settings and press Finish



Your new Answer file has been added, both choices will now be available to the RIS Client.


Few properties are configurable but by pressing Permissions:


You can decide who can Read/Modify the answer file.



To Allow User to install a Client Image using RIS

In order for normal users to install an OS with RIS they must be able to create computer accounts in the domain, this is done as follows:

Open Active Directory Users and Computers from the Administrative Tools Program Menu or by typing dsa.msc at the run prompt:


Select Delegate Control from the Domain Context Menu


Press Add and select the User(s) you want to grant the permission to


Press Next


Press Next


All Done, the specified users can now use RIS to install an OS image.



Step 3 - Using Symantec Ghost with RIS

RIS can be used to deploy Ghost images to any PXE compliant RIS client by using the following method:


Open Symantec Ghost Console and select Tools/Boot Wizard


Symantec Ghost must be installed on a RIS server for the RIS option to appear. Press Next


Here you select the network card drivers used for this boot disk, most common drivers are included but you can download other versions from the manufacturers website and add them here too.


Here you can choose the DOS version to br used for the boot disk, PC-DOS will do but if necessary you can use MS-DOS from a floppy disk.


Here you select the Ghost.exe file to be used on the boot disk and any command line parameters that you need.


More options but both are unnecessary for a RIS image deployment.


For use with RIS leave this as above, RIS uses DHCP after all so the service will be available.



An image specific Boot Name.


A last chance to change any settings.


All Done, press Finish.


Close Ghost Console and locate the RIS folder, created when you installed RIS, the new ghost image will have been added to the appropriate location as above.

Step 4 - Troubleshooting RIS

RIS Client Does Not Connect to RIS Server

Open The DHCP Management Console on the DHCP Server that serves the RIS clients:



Right-click on Scope Options and select Configure Options


Ensure that option 066 Boot Server Host Name holds either the RIS Server's IP Address or it's DNS Name


Ensure that option 067 Bootfile Name holds the location of the bootstrap program loader, in the Standard windows RIS Install the location is OSChooser\i386\startrom.com



Attempt the RIS install again.



RIS Client Does Not Pick up an IP Address

Check that you can reach the DHCP server and check that the server is Authorized in Active Directory. Right-click on the DHCP Server in the DHCP Management console and select Authorize



My Client is not PXE Compliant

There is a program called rbfg.exe located at RISFolder\Admin\i386, this program creates a Specialized boot disk that can be used when the network card is not PXE compliant, however, the included drivers are limited, but it might work.



Create an Unattended Install Answer File

Explore the windows XP or windows 2003 Install CD and open the Deploy.cab file in the Support\Tools folder


Extract and run Setupmgr.exe



Press Next


Select Remote Installation Services (RIS) and press next


Choose which OS you want to install, please note that although you can Install windows 2003 with RIS, you cannot make it a Domain Controller.



Here you choose the level of Interaction that will be required during the RIS install, choose Fully Automated.


Accept the terms of the License Agreement



Go through the options and configure them as you see fit. When finished press Finish and the Answer file will be saved to a location of your choosing.



Create a Ghost Image Bootable DVD

A Ghost Bootable DVD is not a necessary part of windows RIS, but it provides a means of making your Ghost Images portable. Once you have added the ghost component to RIS in step 3 then you can create an image using GhostCast Server that comes as part of the Symantec Ghost Server.

Once an image has been created save it to a folder on a pc or server that has a DVD Writer and a copy of Nero installed. Name the image as image.gho

You will also need a Windows 98 Boot disk, alternatively you can create a DOS boot disk in Ghost console by selecting the "CD/DVD Startup Disk with Ghost" option in Ghost Boot Wizard Tools menu. Download a copy of GhostBootDiskFiles and add them to the folder.

The file autoexec.bat contains the following text:

The text that starts with ECHO is what is displayed on screen during the ghosting process, change this to whatever suits you.

@echo off

MSCDEX.EXE /D:CDROM /L:R

CLS
ECHO Initializing Ghost Recovery....
ECHO.

CLS
ECHO Do you wish to Restore Windows Xp to its Original State?
ECHO All Data will be erased!
ECHO Yes or No [y/n]
ECHO.
ECHO Setup will automatically exit after 15 Seconds.
ECHO.

R:\CHOICE.com /N /T:n,15

IF errorlevel 2 GOTO No
IF errorlevel 1 GOTO Yes

:Yes
R:\ghost -clone,mode=load,src=R:\Image.gho,dst=1 -sure
GOTO End

:No
exit

:End
exit



Also copy the files to the DOS boot Floppy and overwrite files if asked. The last file that you will need is Ghost.exe which can be found in the program folder of the Symantec Ghost Server, copy this to the folder too. you should now have a folder that looks like this:


Make sure the DOS boot disk into the drive and start Nero.


Select DVD-ROM(Boot) and on the right select "Bootable logical drive (must fit on the DVD), im currently working on my laptop which has no floppy drive so this option was not available, but in your case make sure that you select the drive that has the floppy disk in it. Select the ISO Tab.


Set as above and press the label tab.



You can change the name as you see fit, No options need to be configured on the Dates or Misc tab so press Burn.


Burn at whatever speed you like and press New.


Copy the files from the folder you made earlier on and burn the DVD. Once complete you DVD should be ready to use, but remember that the DVD will overwrite all files that are currently on the PC, so make a backup of any important documents.

All Done
Tuesday, March 29, 2011

Pageviews

Followers

Blog Archive

Powered by Blogger.

- Copyright © 2013 Selva Sharing -Selvasharing- Powered by Blogger - Designed by @ Access -