throbber
Symantec Ghost™
`Implementation Guide
`
`Apple Inc. Exhibit 1011 Page 1
`
`

`

`Symantec Ghost™
`Implementation Guide
`
`The software described in this book is furnished under a license agreement and may be used only in
`accordance with the terms of the agreement.
`Documentation version 7.5
`PN: 07-30-00482
`
`Copyright Notice
`Copyright  1998–2001 Symantec Corporation.
`All Rights Reserved.
`Any technical documentation that is made available by Symantec Corporation is the copyrighted work of
`Symantec Corporation and is owned by Symantec Corporation.
`NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec
`Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the
`information contained therein is at the risk of the user. Documentation may include technical or other
`inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice.
`No part of this publication may be copied without the express written permission of Symantec
`Corporation, 20330 Stevens Creek Boulevard, Cupertino, CA 95014.
`
`Trademarks
`
`Symantec, the Symantec logo, Symantec Ghost, Ghost Walker, Ghost Explorer, and GDisk are
`trademarks of Symantec Corporation.
`Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft
`Corporation. IBM, OS/2, and OS/2 Warp are registered trademarks of International Business
`Machines Corporation. Novell and NetWare are registered trademarks of Novell Corporation.
`3Com and EtherLink are registered trademarks of 3Com Corporation. Compaq is a registered
`trademark of Compaq Corporation. Zip and Jaz are registered trademarks of Iomega
`Corporation. SuperDisk is a trademark of Imation Enterprises Corporation.
`Other product names mentioned in this manual may be trademarks or registered trademarks of their
`respective companies and are hereby acknowledged.
`Printed in the United States of America.
`10
`9
`8
`7
`6
`5 4
`3
`2
`1
`
`Apple Inc. Exhibit 1011 Page 2
`
`

`

`SYMANTEC LICENSE AND WARRANTY
`
`SYMANTEC SOFTWARE LICENSE AGREEMENT
`
`IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS
`OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING
`THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS
`SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE
`SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY,
`OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE
`SOFTWARE (REFERENCED BELOW AS "YOU" OR "YOUR")
`ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF
`THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A
`LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU
`AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING
`THE SEAL, CLICKING ON THE "AGREE" OR "YES" BUTTON
`OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR
`LOADING THE SOFTWARE, YOU AGREE TO THE TERMS
`AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT
`AGREE TO THESE TERMS AND CONDITIONS, CLICK ON
`THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE
`INDICATE REFUSAL, AND MAKE NO FURTHER USE OF THE
`SOFTWARE.
`
`1. LICENSE:
`
`The software and documentation which accompanies this
`license (collectively, the "Software") is the property of
`Symantec or its licensors and is protected by copyright law.
`While Symantec continues to own the Software, you will have
`certain rights to use the Software after your acceptance of this
`license. This license governs any releases, revisions, or
`enhancements to the Software that Symantec may furnish to
`you. Except as may be modified by a Symantec license
`certificate, license coupon, or license key (each a "License
`Module") which accompanies, precedes, or follows this
`license, your rights and obligations with respect to the use of
`this Software are as follows:
`
`You may:
` (i) use the Software to clone a hard drive or multiple hard
`drives from another disk, partition, or disk image file. If a
`License Module accompanies, precedes, or follows this
`license, you may make and use that number of copies of the
`Software licensed to you by Symantec as provided in your
`License Module on an equal number of individual computers
`pursuant to the terms of this license. Your License Module
`shall constitute proof of your right to make and use such
`copies;
`
`(ii) use the Software to create disk image files of hard drives
`commensurate with the License Module and store the disk
`image files on removable media for disaster recovery
`purposes;
`
`(iii) use the Software to reapply, upgrade, refresh, or recover a
`hard drive an unlimited number of times provided that the
`hard drive is part of the original License Module granted by
`Symantec under this license;
`
`(iv) use the Software to manipulate hard drives and their
`contents, in the manner described in the software
`documentation;
`
`(v) make one copy of the Software for archival purposes, or
`copy the Software onto the hard disk of a computer and retain
`the original for archival purposes;
`
`(vi) use the Software on a network, provided that you have a
`licensed copy of the Software for each computer that can
`access the Software over that network;
`
`(vii) after written notice to Symantec, transfer the Software on
`a permanent basis to another person or entity, provided that
`you retain no copies of the Software and the transferee agrees
`to the terms of this license;
`
`(viii) use the Software as described in the documentation; and
`
`(ix) use the Software as described in the documentation to
`apply changes to a replacement hard drive provided the
`replaced hard drive has been permanently decommissioned.
`
`You may not:
`
`(i) use the Software for the purpose of creating multiple
`computers or hard drives for resale or external distribution
`except as stipulated in a License Module;
`
`(ii) copy the documentation which accompanies the Software
`except as provided herein;
`
`(iii) sublicense, rent or lease any portion of the Software;
`
`(iv) reverse engineer, decompile, disassemble, modify,
`translate, make any attempt to discover the source code of the
`Software, or create derivative works from the Software; or
`
`(v) use a previous version or copy of the Software after you
`have received a disk replacement set or an upgraded version
`as a replacement of the prior version. Upon upgrading the
`Software, all copies of the prior version must be destroyed.
`
`2. Content Updates:
`
`Certain Symantec software products utilize content that is
`updated from time to time (antivirus products utilize updated
`virus definitions; content filtering products utilize updated URL
`lists; firewall products utilize updated firewall rules;
`vulnerability assessment products utilize updated vulnerability
`data, etc.; collectively, these are referred to as "Content
`Updates"). You may obtain Content Updates for any period
`for which you have purchased a subscription for Content
`Updates for the Software (including any subscription included
`with your original purchase of the Software), purchased
`upgrade insurance for the Software, entered into a
`maintenance agreement that includes Content Updates, or
`otherwise separately acquired the right to obtain Content
`Updates. This license does not otherwise permit you to obtain
`and use Content Updates.
`
`3. Limited Warranty:
`
`Symantec warrants that the media on which the Software is
`distributed will be free from defects for a period of sixty (60)
`
`Apple Inc. Exhibit 1011 Page 3
`
`

`

`6. General:
`
`If You are located in North America or Latin America, this
`Agreement will be governed by the laws of the State of
`California, United States of America. Otherwise, this
`Agreement will be governed by the laws of England. This
`Agreement and any related License Module is the entire
`agreement between You and Symantec relating to the Software
`and: (i) supersedes all prior or contemporaneous oral or
`written communications, proposals, and representations with
`respect to its subject matter; and (ii) prevails over any
`conflicting or additional terms of any quote, order,
`acknowledgment or similar communications between the
`parties. This Agreement may only be modified by a License
`Module or by a written document which has been signed by
`both You and Symantec. This Agreement shall terminate upon
`Your breach of any term contained herein and You shall cease
`use of and destroy all copies of the Software. The disclaimers
`of warranties and damages and limitations on liability shall
`survive termination. Should you have any questions
`concerning this Agreement, or if you desire to contact
`Symantec for any reason, please write to: (i) Symantec
`Customer Service, 175 W. Broadway, Eugene, OR 97401, USA,
`or (ii) Symantec Customer Service Center, PO BOX 5689,
`Dublin 15, Ireland.
`
`days from the date of delivery of the Software to you. Your
`sole remedy in the event of a breach of this warranty will be
`that Symantec will, at its option, replace any defective media
`returned to Symantec within the warranty period or refund the
`money you paid for the Software. Symantec does not warrant
`that the Software will meet your requirements or that
`operation of the Software will be uninterrupted or that the
`Software will be error-free.
`THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL
`OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,
`INCLUDING THE IMPLIED WARRANTIES OF
`MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
`AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY
`RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL
`RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY
`FROM STATE TO STATE AND COUNTRY TO COUNTRY.
`
`4. Disclaimer of Damages:
`
`SOME STATES AND COUNTRIES, INCLUDING MEMBER
`COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT
`ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR
`INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE
`BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO
`YOU.
`
`TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
`LAW AND REGARDLESS OF WHETHER ANY REMEDY SET
`FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO
`EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO
`YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT OR
`SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR
`LOST DATA ARISING OUT OF THE USE OR INABILITY TO
`USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN
`ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
`
`IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS'
`LIABILITY EXCEED THE PURCHASE PRICE FOR THE
`SOFTWARE. The disclaimers and limitations set forth above
`will apply regardless of whether you accept the Software.
`
`5. U.S. Government Restricted Rights:
`
`RESTRICTED RIGHTS LEGEND. All Symantec products and
`documentation are commercial in nature. The software and
`software documentation are "Commercial Items", as that term
`is defined in 48 C.F.R. §2.101, consisting of "Commercial
`Computer Software" and "Commercial Computer Software
`Documentation", as such terms are defined in 48 C.F.R.
`§252.227-7014(a)(5) and 48 C.F.R. §252.227-7014(a)(1), and
`used in 48 C.F.R. §12.212 and 48 C.F.R. 227.7202, as applicable.
`Consistent with 48 C.F.R. §12.212, 48 C.F.R. §252.227-7015, 48
`C.F.R. §227.7202 through 227.7202-4, 48 C.F.R. §52.227-14, and
`other relevant sections of the Code of Federal Regulations, as
`applicable, Symantec's computer software and computer
`software documentation are licensed to United States
`Government end users with only those rights as granted to all
`other end users, according to the terms and conditions
`contained in this license agreement. Manufacturer is Symantec
`Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014,
`USA.
`
`Apple Inc. Exhibit 1011 Page 4
`
`

`

`C O N T
`
`E N T
`
`S
`
`Section 1 Getting started
`
`Chapter 1
`
`Chapter 2
`
`Chapter 3
`
`About Symantec Ghost
`New features in Symantec Ghost ....................................................... 17
`How Symantec Ghost works .............................................................. 19
`Quick reference guide ........................................................................ 21
`
`Understanding Symantec Ghost basics
`Choosing a method to create an image file ...................................... 23
`The Symantec Ghost partition ............................................................ 24
`Using the virtual partition to connect to the Console ............... 25
`Using the Ghost boot partition to connect to the Console ....... 26
`Symantec Ghost components ............................................................. 26
`Symantec Ghost Console ............................................................. 26
`Symantec Ghost Console client ................................................... 27
`Symantec Ghost GhostCast Server .............................................. 28
`Ghost Boot Wizard ...................................................................... 28
`Symantec Ghost AutoInstall ........................................................ 29
`Symantec Ghost executable ........................................................ 30
`Standalone configuration ............................................................. 30
`Ghost Walker ............................................................................... 30
`Ghost Explorer ............................................................................. 31
`GDisk ............................................................................................ 31
`License Audit Utility ..................................................................... 32
`Accessibility in Symantec Ghost ........................................................ 32
`Accessibility features in Symantec Ghost ................................... 32
`Support documentation formats ................................................. 33
`
`Installing Symantec Ghost
`Preparing for installation .................................................................... 36
`System requirements .................................................................... 36
`What to install .............................................................................. 37
`Installing the Symantec Ghost Console ............................................. 38
`Installing the Console client ............................................................... 39
`Remotely installing the Console client ....................................... 40
`Manually installing the Console client ........................................ 41
`Installing the standalone configuration client ................................... 41
`
`5
`
`Apple Inc. Exhibit 1011 Page 5
`
`

`

`
`
`Installing Symantec Ghost Standard Tools ........................................ 42
`Registering Symantec Ghost ............................................................... 43
`Generating a registration file ....................................................... 43
`Obtaining a validation key .......................................................... 44
`Entering a validation key ............................................................. 45
`Adding additional licenses .......................................................... 45
`Registering the Symantec Ghost Console after reinstallation .... 45
`Clearing an outstanding registration request .............................. 46
`Updating Symantec Ghost .................................................................. 47
`Updating the Symantec Console client ....................................... 47
`Uninstalling Symantec Ghost ............................................................. 48
`Creating Configuration Server accounts ............................................ 49
`Removing a domain account ...................................................... 51
`
`Section 2 Creating image files and managing
`tasks from the Console
`
`Chapter 4 Managing image files, configuration resources,
`and computers
`Introducing the Symantec Ghost Console ......................................... 55
`Creating and executing a Symantec Ghost Console task ................. 56
`Starting the Symantec Ghost Console ......................................... 57
`Grouping Console client computers .................................................. 58
`Adding or moving a computer to a group ................................. 59
`Removing a computer from a group .......................................... 60
`Renaming a computer ................................................................. 61
`Setting properties for computers in a subnet ............................. 61
`Storing the Console client computer details ..................................... 63
`Checking client software and status ........................................... 63
`Viewing and changing Console client computer properties ..... 64
`Editing and applying new default configuration settings .......... 66
`About the Configuration Resources folder ........................................ 69
`Creating and viewing image definitions ..................................... 70
`Creating and viewing configuration sets .................................... 71
`Creating and viewing AI package definitions ............................ 78
`
`Chapter 5
`
`Creating and executing tasks
`Understanding tasks ........................................................................... 81
`Starting a task from a client computer ........................................ 82
`
`6
`
`Apple Inc. Exhibit 1011 Page 6
`
`

`

`Creating the model computer ..................................................... 82
`Creating image dump tasks ................................................................ 83
`Setting image dump task properties ........................................... 84
`Creating tasks ...................................................................................... 87
`Setting task properties ................................................................. 88
`Reviewing tasks ........................................................................... 96
`Scheduling and executing tasks ......................................................... 97
`Scheduling a task ......................................................................... 97
`Executing a task manually from the Symantec Ghost Console 98
`Initiating a task from a client computer ............................................ 98
`Initiating a task from the client command line .......................... 99
`
`Incremental backups and rollbacks
`Introducing incremental backups and backup regimes ................. 101
`Creating a backup regime ................................................................ 102
`Setting backup regime properties, task, and schedule details 102
`Creating a backup manually ............................................................ 105
`Viewing computer backups ...................................................... 105
`Viewing a backup regime ................................................................ 105
`Restoring a computer ....................................................................... 106
`
`Chapter 6
`
`Chapter 7 Move the User
`Introducing Move the User .............................................................. 107
`Creating a data template .................................................................. 108
`Viewing a data template ................................................................... 111
`Creating a User Profile ..................................................................... 111
`Viewing a User Profile ...................................................................... 113
`Capturing and restoring user data ................................................... 113
`Variables for use with Move the User ............................................. 115
`Absolute and relative paths .............................................................. 116
`User settings that can be moved ...................................................... 117
`Accessibility settings .................................................................. 117
`Display settings .......................................................................... 118
`International settings ................................................................. 119
`Keyboard settings ...................................................................... 120
`Mouse settings ............................................................................ 120
`Sound settings ............................................................................ 121
`Screen Saver ............................................................................... 121
`Mapped network drive settings ................................................ 121
`Internet settings .......................................................................... 122
`Taskbar and Start menu options ............................................... 122
`Desktop options ......................................................................... 123
`
`7
`
`Apple Inc. Exhibit 1011 Page 7
`
`

`

`
`
`Chapter 8
`
`Chapter 9
`
`Sysprep
`Introducing Sysprep ......................................................................... 125
`Setting up Sysprep ............................................................................ 126
`Adding a Sysprep configuration ................................................ 127
`Overwriting a Sysprep configuration ........................................ 128
`Deleting a Sysprep configuration .............................................. 128
`Cloning with Sysprep ....................................................................... 129
`Editing, restoring or reloading Sysprep.inf ............................... 130
`How Sysprep works with cloning and the Console
`post-configuration process ............................................................ 131
`Configuring Sysprep.inf .................................................................... 132
`
`Creating boot images and disks with the Ghost
`Boot Wizard
`Introducing the Ghost Boot Wizard ................................................ 133
`Opening the Ghost Boot Wizard .............................................. 134
`Creating boot disks and boot images .............................................. 134
`Standard boot disks with the option of LPT and USB support 135
`Boot disks with network support ............................................. 136
`Creating boot disks that support mapping network drives ..... 138
`Boot disks with CD-ROM support ............................................ 140
`Creating a boot image containing the Console boot partition 141
`Boot packages that support RIS ................................................ 142
`Starting client computers from the network ............................. 144
`Multicard templates and the boot disk ............................................ 145
`Adding network drivers to the Ghost Boot Wizard ........................ 145
`Adding packet drivers to the Ghost Boot Wizard .................... 146
`Adding NDIS2 drivers to the Ghost Boot Wizard .................... 146
`Customizing the template .......................................................... 147
`Adding command-line parameters to a boot package ................... 148
`Selecting a version of DOS .............................................................. 150
`
`Chapter 10 Additional Console options
`Monitoring the Symantec Ghost Console activity ........................... 151
`Launching the Configuration Server ................................................ 154
`Setting the Symantec Ghost Console options ................................. 154
`Symantec Ghost Console security .................................................... 159
`Updating the boot partition certificates .................................... 160
`Generating new certificates ....................................................... 160
`
`8
`
`Apple Inc. Exhibit 1011 Page 8
`
`

`

`Chapter 11
`
`Image file options
`About Symantec Ghost image files .................................................. 161
`Image files and compression ........................................................... 162
`Performance expectations on a network .................................. 162
`Image files and CRC32 ..................................................................... 163
`Image files and volume spanning .................................................... 164
`Standard image files ................................................................... 164
`Size-limited, multisegment image files ..................................... 164
`Spanned image files ................................................................... 164
`Spanning across multiple volumes and limiting span sizes .... 165
`Loading from a spanned image ................................................ 166
`Image files and tape drives .............................................................. 166
`Image files and CD writers ............................................................... 168
`Cloning dynamic disks in Windows 2000 ....................................... 169
`Hibernation and swap files .............................................................. 170
`
`Section 3 GhostCasting image files in a
`networked environment
`
`Chapter 12 Using GhostCasting to create and load images
`About Symantec Ghost GhostCasting .............................................. 175
`Preparing for GhostCasting .............................................................. 176
`Creating the model computer ................................................... 177
`Creating a GhostCast Server ............................................................. 178
`Starting a GhostCast session ...................................................... 178
`Controlling the GhostCast session from the server .................. 183
`Setting Auto Start parameters .................................................... 186
`Setting the data transfer mode .................................................. 187
`Controlling the amount of network bandwidth used .............. 188
`Viewing and changing GhostCast Server session options ....... 190
`Running the Symantec Ghost executable ................................. 190
`
`Chapter 13 GhostCasting from the command line
`Running the GhostCast Server for Windows from the
`command line ................................................................................ 193
`Running the DOS-based GhostCast Server ...................................... 194
`Starting the GhostCast session ......................................................... 194
`GhostCast Server command-line options ........................................ 195
`Examples using GhostCast Server command-line options ...... 196
`
`9
`
`Apple Inc. Exhibit 1011 Page 9
`
`

`

`
`
`Creating a DOS boot disk manually ............................................... 198
`Setting up packet drivers ........................................................... 199
`
`Chapter 14 GhostCasting and IP addresses
`Introducing IP addresses for GhostCasting ..................................... 205
`Locally specified IP addresses .......................................................... 206
`Examples of Wattcp.cfg client configuration files .................... 206
`Using BOOTP/DHCP to assign IP addresses .................................. 208
`BOOTP/DHCP automatically defined IP address .................... 208
`Examples of BOOTP/DHCP defined addresses ....................... 209
`
`Section 4 Cloning image files locally
`
`Chapter 15 Symantec Ghost as a standalone program
`Starting the Symantec Ghost executable ......................................... 213
`Navigating without a mouse ............................................................ 214
`Using Ghost.exe on a standalone computer ............................ 215
`Cloning disks .................................................................................... 215
`Cloning disk to disk ................................................................... 216
`Cloning a disk to an image file ................................................. 217
`Cloning a disk from an image file ............................................ 219
`Cloning partitions ............................................................................. 221
`Cloning from partition to partition ........................................... 221
`Cloning a partition to an image file .......................................... 222
`Cloning a partition from an image file ..................................... 224
`Saving an image file to a CD-R/RW ................................................. 226
`Create Ghost boot disks ............................................................ 226
`Start your computer ................................................................... 226
`Create and save the image file .................................................. 227
`Adding switches to your cloning task ............................................. 227
`Creating a DOS boot disk ................................................................ 228
`
`Chapter 16 Standalone configuration
`Introducing the standalone configuration ....................................... 229
`Generating the configuration data file ............................................. 230
`Running the standalone configuration ............................................ 231
`Errors logged during a standalone configuration .................... 231
`
`10
`
`Apple Inc. Exhibit 1011 Page 10
`
`

`

`Section 5 Creating executables to roll out
`applications
`
`Chapter 17 Getting started with AutoInstall
`How AutoInstall works ..................................................................... 235
`Using AutoInstall ............................................................................... 236
`Installing AI Snapshot and AI Builder on the model computer 237
`Setting up target computers ...................................................... 238
`Installing Microsoft products using AutoInstall ............................... 238
`Letting the model computer restart ........................................... 238
`Adding uninstall commands ...................................................... 238
`Using AutoInstall to clone Office XP ........................................ 238
`Microsoft system file protection (SFP) limitations on
`deploying AI packages ........................................................... 239
`
`Chapter 18 Creating AI packages
`Creating an installation script for a software installation ............... 241
`Capturing existing system information ..................................... 241
`Installing the software that you would like to package .......... 242
`Capturing system information again to determine changes .... 244
`Customizing and building AI packages ........................................... 245
`Customizing installation scripts ................................................. 247
`Building AI packages ................................................................. 250
`Modifying installation scripts and AI packages ........................ 251
`Executing and rolling out AI packages ........................................... 252
`
`Section 6 Symantec Ghost utilities
`
`Chapter 19 Using Ghost Explorer to modify image file
`contents
`Understanding Ghost Explorer ........................................................ 255
`Viewing image files .......................................................................... 256
`Restoring a file or directory from an image file .............................. 257
`Modifying image files in Ghost Explorer ......................................... 258
`Adding, moving, and deleting files ........................................... 258
`Saving a list of contents of an image file ........................................ 258
`Setting span file sizes ....................................................................... 259
`Compiling a file ................................................................................ 259
`
`11
`
`Apple Inc. Exhibit 1011 Page 11
`
`

`

`
`
`Determining Symantec Ghost image file version ............................ 260
`Using Ghost Explorer from the command line ............................... 260
`
`Chapter 20 Managing partitions using GDisk
`Introducing GDisk ............................................................................ 263
` Overview of main command-line switches .................................... 264
`Online Help for command-line switches ................................. 265
`Switches common to all GDisk commands .............................. 266
`Creating a partition ........................................................................... 266
`Reinitializing the Master Boot Record ............................................. 268
`Showing information about disks .................................................... 269
`Performing multiple GDisk operations using batch mode ............. 269
`FAT16 partitions in Windows NT .................................................... 271
`Deleting and wiping your disk ............................

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket