Skip to main content

How to create ghost image of hard disk for free?

If you are the person who want to backup
complete disk along with OS. So lets see
how we can create hard disk image or
ghost image or disk clone without using
those highly priced ghost creating
software.
Requirements:
Ubuntu Live CD/DVD, A hard disk with
more capacity than the one you want to
clone and some basic knowledge ofLinux.
Procedure:
Linux provides disk dumping feature, this
feature can be used for creating complete
backup of any possible storage media. And
we will use this feature of Linux command
shell to create ghost images. While writing
this tutorial I am assuming that you want
to backup a hard disk which already
havean OS installed in it.
Boot from Ubuntu Live CD/DVD. Now
mount the hard disk youwant to take
backup on /mnt folder. Now take backup
using following commands,
[root@localhost ~]dd if=/dev/sda1 of=/
mnt/ image.img
This will create complete image of hard
disk partition sda1, next you must take
backup of partition table,
[root@localhost ~]#dd if=/dev/sda of=/
mnt/ partitiontable.i mg count=0 bs=512
or
[root@localhost ~]#dd if=/dev/sda of=/
mnt/ partitiontable.i mg count=0 bs=1024
Now while restoring first restore partition
table on new hard disk
[root@localhost ~]#dd if=/mnt/
partitiontable.i mg of=/dev/sda count=0
bs=512
or
[root@localhost ~]#dd if=/mnt/
partitiontable.i mg of=/dev/sda count=0
bs=1024
Finally restore ghost image,
[root@localhost ~]#partprobe /dev/sda
[root@localhost ~]#dd if=/mnt/
image.img of=/dev/sda1
Now please note that when you'll create
ghost image no matter what amount of
data you have in disk your ghost disk will
be of actual size of source hard disk, that
meansif your source hard disk is 40GB in
size then your ghost hard disk will also be
of 40GB. If you think above tutorial was
little geeky then even I don't take different
view from you, yes its really little geeky but
believe me its not that difficult. If you loved
reading this post please LIKE and SHARE
with your friends... Thanks for reading..

Comments

Popular posts from this blog

Physical Teleportation Theoretical method to do It!

Teleportation is the ability of moving matter from one point in time and space to another point in time and space instantaneously. There are different types of teleportation available at this time both visual and physical teleportation are possible and we use visual teleportation as our starting point. Types Visual body teleportation Astral body teleportation The different types of visual teleportation are. visual body or astral body teleportation , or visual object teleportation but before we can master teleportation we must first learn the art of Telekinesis/Psychokinesis and Clairsentience and the higher state of consciousness the seventh sense. Other abilities useful in teleportation are Tele-Visualization and ESP (Extrasensory Perception). The ability of teleportation is used in Time travel, Interstellar travel, and Dimensional travel. Teleportation is the near instantaneous transport of the Psychic from one location to another and there is no other fo...

How to make explosive at home

Hey guys. So I seen a few tutorials on how to make explosives at home. Most of them were pretty long and confusing, dangerous or just stupid. Well this tutorial will show you a very easy way anyone can make explosives, and it's quite stable. What you need: Acetone (C3H6O) Hydrogen Peroxide You can get these from the pharmacy. Mixing these two ingredients in a high temperature will result in Acetone Peroxide. It's not very stable when it's dry, so as long as it's wet it's more stable. This "TATP" got a bit a publicity a couple years ago, in the U.K. Underground bombings, actually. It's dangerous, just like any explosive, so be VERY careful if you plan to make this. And read about it here http://en.wikipedia.org/wiki/Acetone_peroxide I AM NOT RESPONSIBLE FOR ANYTHING YOU DO WITH THIS INFORMATION. THIS IS FOR EDUCATION PURPOSE ONLY.

Trojan blackdoor

What is trojan backdoor ? Backdoor.Trojan is a detection name used by Symantec to identify malicious software programs that share the primary functionality of enabling a remote attacker to have access to or send commands to a compromised computer. As the name suggests, these threats are used to provide a covert channel through which a remote attacker can access and control a computer. The Trojans vary in sophistication, ranging from those that only allow for limited functions to be performed to those that allow almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer. A computer with a sophisticated back door program installed may also be referred to as a "zombie" or a "bot". A network of such bots may often be referred to as a "botnet". Botnets have been well publicized in the news over the years, with different instances being given specific names such as Kraken, Mariposa, or Kneber, alon...