`Implementation Guide
`
`Apple Inc. Exhibit 1011 Page 1
`
`
`
`Symantec Ghost™
`Implementation Guide
`
`The software described in this book is furnished under a license agreement and may be used only in
`accordance with the terms of the agreement.
`Documentation version 7.5
`PN: 07-30-00482
`
`Copyright Notice
`Copyright 1998–2001 Symantec Corporation.
`All Rights Reserved.
`Any technical documentation that is made available by Symantec Corporation is the copyrighted work of
`Symantec Corporation and is owned by Symantec Corporation.
`NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec
`Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the
`information contained therein is at the risk of the user. Documentation may include technical or other
`inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice.
`No part of this publication may be copied without the express written permission of Symantec
`Corporation, 20330 Stevens Creek Boulevard, Cupertino, CA 95014.
`
`Trademarks
`
`Symantec, the Symantec logo, Symantec Ghost, Ghost Walker, Ghost Explorer, and GDisk are
`trademarks of Symantec Corporation.
`Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft
`Corporation. IBM, OS/2, and OS/2 Warp are registered trademarks of International Business
`Machines Corporation. Novell and NetWare are registered trademarks of Novell Corporation.
`3Com and EtherLink are registered trademarks of 3Com Corporation. Compaq is a registered
`trademark of Compaq Corporation. Zip and Jaz are registered trademarks of Iomega
`Corporation. SuperDisk is a trademark of Imation Enterprises Corporation.
`Other product names mentioned in this manual may be trademarks or registered trademarks of their
`respective companies and are hereby acknowledged.
`Printed in the United States of America.
`10
`9
`8
`7
`6
`5 4
`3
`2
`1
`
`Apple Inc. Exhibit 1011 Page 2
`
`
`
`SYMANTEC LICENSE AND WARRANTY
`
`SYMANTEC SOFTWARE LICENSE AGREEMENT
`
`IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS
`OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING
`THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS
`SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE
`SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY,
`OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE
`SOFTWARE (REFERENCED BELOW AS "YOU" OR "YOUR")
`ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF
`THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A
`LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU
`AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING
`THE SEAL, CLICKING ON THE "AGREE" OR "YES" BUTTON
`OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR
`LOADING THE SOFTWARE, YOU AGREE TO THE TERMS
`AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT
`AGREE TO THESE TERMS AND CONDITIONS, CLICK ON
`THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE
`INDICATE REFUSAL, AND MAKE NO FURTHER USE OF THE
`SOFTWARE.
`
`1. LICENSE:
`
`The software and documentation which accompanies this
`license (collectively, the "Software") is the property of
`Symantec or its licensors and is protected by copyright law.
`While Symantec continues to own the Software, you will have
`certain rights to use the Software after your acceptance of this
`license. This license governs any releases, revisions, or
`enhancements to the Software that Symantec may furnish to
`you. Except as may be modified by a Symantec license
`certificate, license coupon, or license key (each a "License
`Module") which accompanies, precedes, or follows this
`license, your rights and obligations with respect to the use of
`this Software are as follows:
`
`You may:
` (i) use the Software to clone a hard drive or multiple hard
`drives from another disk, partition, or disk image file. If a
`License Module accompanies, precedes, or follows this
`license, you may make and use that number of copies of the
`Software licensed to you by Symantec as provided in your
`License Module on an equal number of individual computers
`pursuant to the terms of this license. Your License Module
`shall constitute proof of your right to make and use such
`copies;
`
`(ii) use the Software to create disk image files of hard drives
`commensurate with the License Module and store the disk
`image files on removable media for disaster recovery
`purposes;
`
`(iii) use the Software to reapply, upgrade, refresh, or recover a
`hard drive an unlimited number of times provided that the
`hard drive is part of the original License Module granted by
`Symantec under this license;
`
`(iv) use the Software to manipulate hard drives and their
`contents, in the manner described in the software
`documentation;
`
`(v) make one copy of the Software for archival purposes, or
`copy the Software onto the hard disk of a computer and retain
`the original for archival purposes;
`
`(vi) use the Software on a network, provided that you have a
`licensed copy of the Software for each computer that can
`access the Software over that network;
`
`(vii) after written notice to Symantec, transfer the Software on
`a permanent basis to another person or entity, provided that
`you retain no copies of the Software and the transferee agrees
`to the terms of this license;
`
`(viii) use the Software as described in the documentation; and
`
`(ix) use the Software as described in the documentation to
`apply changes to a replacement hard drive provided the
`replaced hard drive has been permanently decommissioned.
`
`You may not:
`
`(i) use the Software for the purpose of creating multiple
`computers or hard drives for resale or external distribution
`except as stipulated in a License Module;
`
`(ii) copy the documentation which accompanies the Software
`except as provided herein;
`
`(iii) sublicense, rent or lease any portion of the Software;
`
`(iv) reverse engineer, decompile, disassemble, modify,
`translate, make any attempt to discover the source code of the
`Software, or create derivative works from the Software; or
`
`(v) use a previous version or copy of the Software after you
`have received a disk replacement set or an upgraded version
`as a replacement of the prior version. Upon upgrading the
`Software, all copies of the prior version must be destroyed.
`
`2. Content Updates:
`
`Certain Symantec software products utilize content that is
`updated from time to time (antivirus products utilize updated
`virus definitions; content filtering products utilize updated URL
`lists; firewall products utilize updated firewall rules;
`vulnerability assessment products utilize updated vulnerability
`data, etc.; collectively, these are referred to as "Content
`Updates"). You may obtain Content Updates for any period
`for which you have purchased a subscription for Content
`Updates for the Software (including any subscription included
`with your original purchase of the Software), purchased
`upgrade insurance for the Software, entered into a
`maintenance agreement that includes Content Updates, or
`otherwise separately acquired the right to obtain Content
`Updates. This license does not otherwise permit you to obtain
`and use Content Updates.
`
`3. Limited Warranty:
`
`Symantec warrants that the media on which the Software is
`distributed will be free from defects for a period of sixty (60)
`
`Apple Inc. Exhibit 1011 Page 3
`
`
`
`6. General:
`
`If You are located in North America or Latin America, this
`Agreement will be governed by the laws of the State of
`California, United States of America. Otherwise, this
`Agreement will be governed by the laws of England. This
`Agreement and any related License Module is the entire
`agreement between You and Symantec relating to the Software
`and: (i) supersedes all prior or contemporaneous oral or
`written communications, proposals, and representations with
`respect to its subject matter; and (ii) prevails over any
`conflicting or additional terms of any quote, order,
`acknowledgment or similar communications between the
`parties. This Agreement may only be modified by a License
`Module or by a written document which has been signed by
`both You and Symantec. This Agreement shall terminate upon
`Your breach of any term contained herein and You shall cease
`use of and destroy all copies of the Software. The disclaimers
`of warranties and damages and limitations on liability shall
`survive termination. Should you have any questions
`concerning this Agreement, or if you desire to contact
`Symantec for any reason, please write to: (i) Symantec
`Customer Service, 175 W. Broadway, Eugene, OR 97401, USA,
`or (ii) Symantec Customer Service Center, PO BOX 5689,
`Dublin 15, Ireland.
`
`days from the date of delivery of the Software to you. Your
`sole remedy in the event of a breach of this warranty will be
`that Symantec will, at its option, replace any defective media
`returned to Symantec within the warranty period or refund the
`money you paid for the Software. Symantec does not warrant
`that the Software will meet your requirements or that
`operation of the Software will be uninterrupted or that the
`Software will be error-free.
`THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL
`OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,
`INCLUDING THE IMPLIED WARRANTIES OF
`MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
`AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY
`RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL
`RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY
`FROM STATE TO STATE AND COUNTRY TO COUNTRY.
`
`4. Disclaimer of Damages:
`
`SOME STATES AND COUNTRIES, INCLUDING MEMBER
`COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT
`ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR
`INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE
`BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO
`YOU.
`
`TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE
`LAW AND REGARDLESS OF WHETHER ANY REMEDY SET
`FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO
`EVENT WILL SYMANTEC OR ITS LICENSORS BE LIABLE TO
`YOU FOR ANY SPECIAL, CONSEQUENTIAL, INDIRECT OR
`SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR
`LOST DATA ARISING OUT OF THE USE OR INABILITY TO
`USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN
`ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
`
`IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS'
`LIABILITY EXCEED THE PURCHASE PRICE FOR THE
`SOFTWARE. The disclaimers and limitations set forth above
`will apply regardless of whether you accept the Software.
`
`5. U.S. Government Restricted Rights:
`
`RESTRICTED RIGHTS LEGEND. All Symantec products and
`documentation are commercial in nature. The software and
`software documentation are "Commercial Items", as that term
`is defined in 48 C.F.R. §2.101, consisting of "Commercial
`Computer Software" and "Commercial Computer Software
`Documentation", as such terms are defined in 48 C.F.R.
`§252.227-7014(a)(5) and 48 C.F.R. §252.227-7014(a)(1), and
`used in 48 C.F.R. §12.212 and 48 C.F.R. 227.7202, as applicable.
`Consistent with 48 C.F.R. §12.212, 48 C.F.R. §252.227-7015, 48
`C.F.R. §227.7202 through 227.7202-4, 48 C.F.R. §52.227-14, and
`other relevant sections of the Code of Federal Regulations, as
`applicable, Symantec's computer software and computer
`software documentation are licensed to United States
`Government end users with only those rights as granted to all
`other end users, according to the terms and conditions
`contained in this license agreement. Manufacturer is Symantec
`Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014,
`USA.
`
`Apple Inc. Exhibit 1011 Page 4
`
`
`
`C O N T
`
`E N T
`
`S
`
`Section 1 Getting started
`
`Chapter 1
`
`Chapter 2
`
`Chapter 3
`
`About Symantec Ghost
`New features in Symantec Ghost ....................................................... 17
`How Symantec Ghost works .............................................................. 19
`Quick reference guide ........................................................................ 21
`
`Understanding Symantec Ghost basics
`Choosing a method to create an image file ...................................... 23
`The Symantec Ghost partition ............................................................ 24
`Using the virtual partition to connect to the Console ............... 25
`Using the Ghost boot partition to connect to the Console ....... 26
`Symantec Ghost components ............................................................. 26
`Symantec Ghost Console ............................................................. 26
`Symantec Ghost Console client ................................................... 27
`Symantec Ghost GhostCast Server .............................................. 28
`Ghost Boot Wizard ...................................................................... 28
`Symantec Ghost AutoInstall ........................................................ 29
`Symantec Ghost executable ........................................................ 30
`Standalone configuration ............................................................. 30
`Ghost Walker ............................................................................... 30
`Ghost Explorer ............................................................................. 31
`GDisk ............................................................................................ 31
`License Audit Utility ..................................................................... 32
`Accessibility in Symantec Ghost ........................................................ 32
`Accessibility features in Symantec Ghost ................................... 32
`Support documentation formats ................................................. 33
`
`Installing Symantec Ghost
`Preparing for installation .................................................................... 36
`System requirements .................................................................... 36
`What to install .............................................................................. 37
`Installing the Symantec Ghost Console ............................................. 38
`Installing the Console client ............................................................... 39
`Remotely installing the Console client ....................................... 40
`Manually installing the Console client ........................................ 41
`Installing the standalone configuration client ................................... 41
`
`5
`
`Apple Inc. Exhibit 1011 Page 5
`
`
`
`
`
`Installing Symantec Ghost Standard Tools ........................................ 42
`Registering Symantec Ghost ............................................................... 43
`Generating a registration file ....................................................... 43
`Obtaining a validation key .......................................................... 44
`Entering a validation key ............................................................. 45
`Adding additional licenses .......................................................... 45
`Registering the Symantec Ghost Console after reinstallation .... 45
`Clearing an outstanding registration request .............................. 46
`Updating Symantec Ghost .................................................................. 47
`Updating the Symantec Console client ....................................... 47
`Uninstalling Symantec Ghost ............................................................. 48
`Creating Configuration Server accounts ............................................ 49
`Removing a domain account ...................................................... 51
`
`Section 2 Creating image files and managing
`tasks from the Console
`
`Chapter 4 Managing image files, configuration resources,
`and computers
`Introducing the Symantec Ghost Console ......................................... 55
`Creating and executing a Symantec Ghost Console task ................. 56
`Starting the Symantec Ghost Console ......................................... 57
`Grouping Console client computers .................................................. 58
`Adding or moving a computer to a group ................................. 59
`Removing a computer from a group .......................................... 60
`Renaming a computer ................................................................. 61
`Setting properties for computers in a subnet ............................. 61
`Storing the Console client computer details ..................................... 63
`Checking client software and status ........................................... 63
`Viewing and changing Console client computer properties ..... 64
`Editing and applying new default configuration settings .......... 66
`About the Configuration Resources folder ........................................ 69
`Creating and viewing image definitions ..................................... 70
`Creating and viewing configuration sets .................................... 71
`Creating and viewing AI package definitions ............................ 78
`
`Chapter 5
`
`Creating and executing tasks
`Understanding tasks ........................................................................... 81
`Starting a task from a client computer ........................................ 82
`
`6
`
`Apple Inc. Exhibit 1011 Page 6
`
`
`
`Creating the model computer ..................................................... 82
`Creating image dump tasks ................................................................ 83
`Setting image dump task properties ........................................... 84
`Creating tasks ...................................................................................... 87
`Setting task properties ................................................................. 88
`Reviewing tasks ........................................................................... 96
`Scheduling and executing tasks ......................................................... 97
`Scheduling a task ......................................................................... 97
`Executing a task manually from the Symantec Ghost Console 98
`Initiating a task from a client computer ............................................ 98
`Initiating a task from the client command line .......................... 99
`
`Incremental backups and rollbacks
`Introducing incremental backups and backup regimes ................. 101
`Creating a backup regime ................................................................ 102
`Setting backup regime properties, task, and schedule details 102
`Creating a backup manually ............................................................ 105
`Viewing computer backups ...................................................... 105
`Viewing a backup regime ................................................................ 105
`Restoring a computer ....................................................................... 106
`
`Chapter 6
`
`Chapter 7 Move the User
`Introducing Move the User .............................................................. 107
`Creating a data template .................................................................. 108
`Viewing a data template ................................................................... 111
`Creating a User Profile ..................................................................... 111
`Viewing a User Profile ...................................................................... 113
`Capturing and restoring user data ................................................... 113
`Variables for use with Move the User ............................................. 115
`Absolute and relative paths .............................................................. 116
`User settings that can be moved ...................................................... 117
`Accessibility settings .................................................................. 117
`Display settings .......................................................................... 118
`International settings ................................................................. 119
`Keyboard settings ...................................................................... 120
`Mouse settings ............................................................................ 120
`Sound settings ............................................................................ 121
`Screen Saver ............................................................................... 121
`Mapped network drive settings ................................................ 121
`Internet settings .......................................................................... 122
`Taskbar and Start menu options ............................................... 122
`Desktop options ......................................................................... 123
`
`7
`
`Apple Inc. Exhibit 1011 Page 7
`
`
`
`
`
`Chapter 8
`
`Chapter 9
`
`Sysprep
`Introducing Sysprep ......................................................................... 125
`Setting up Sysprep ............................................................................ 126
`Adding a Sysprep configuration ................................................ 127
`Overwriting a Sysprep configuration ........................................ 128
`Deleting a Sysprep configuration .............................................. 128
`Cloning with Sysprep ....................................................................... 129
`Editing, restoring or reloading Sysprep.inf ............................... 130
`How Sysprep works with cloning and the Console
`post-configuration process ............................................................ 131
`Configuring Sysprep.inf .................................................................... 132
`
`Creating boot images and disks with the Ghost
`Boot Wizard
`Introducing the Ghost Boot Wizard ................................................ 133
`Opening the Ghost Boot Wizard .............................................. 134
`Creating boot disks and boot images .............................................. 134
`Standard boot disks with the option of LPT and USB support 135
`Boot disks with network support ............................................. 136
`Creating boot disks that support mapping network drives ..... 138
`Boot disks with CD-ROM support ............................................ 140
`Creating a boot image containing the Console boot partition 141
`Boot packages that support RIS ................................................ 142
`Starting client computers from the network ............................. 144
`Multicard templates and the boot disk ............................................ 145
`Adding network drivers to the Ghost Boot Wizard ........................ 145
`Adding packet drivers to the Ghost Boot Wizard .................... 146
`Adding NDIS2 drivers to the Ghost Boot Wizard .................... 146
`Customizing the template .......................................................... 147
`Adding command-line parameters to a boot package ................... 148
`Selecting a version of DOS .............................................................. 150
`
`Chapter 10 Additional Console options
`Monitoring the Symantec Ghost Console activity ........................... 151
`Launching the Configuration Server ................................................ 154
`Setting the Symantec Ghost Console options ................................. 154
`Symantec Ghost Console security .................................................... 159
`Updating the boot partition certificates .................................... 160
`Generating new certificates ....................................................... 160
`
`8
`
`Apple Inc. Exhibit 1011 Page 8
`
`
`
`Chapter 11
`
`Image file options
`About Symantec Ghost image files .................................................. 161
`Image files and compression ........................................................... 162
`Performance expectations on a network .................................. 162
`Image files and CRC32 ..................................................................... 163
`Image files and volume spanning .................................................... 164
`Standard image files ................................................................... 164
`Size-limited, multisegment image files ..................................... 164
`Spanned image files ................................................................... 164
`Spanning across multiple volumes and limiting span sizes .... 165
`Loading from a spanned image ................................................ 166
`Image files and tape drives .............................................................. 166
`Image files and CD writers ............................................................... 168
`Cloning dynamic disks in Windows 2000 ....................................... 169
`Hibernation and swap files .............................................................. 170
`
`Section 3 GhostCasting image files in a
`networked environment
`
`Chapter 12 Using GhostCasting to create and load images
`About Symantec Ghost GhostCasting .............................................. 175
`Preparing for GhostCasting .............................................................. 176
`Creating the model computer ................................................... 177
`Creating a GhostCast Server ............................................................. 178
`Starting a GhostCast session ...................................................... 178
`Controlling the GhostCast session from the server .................. 183
`Setting Auto Start parameters .................................................... 186
`Setting the data transfer mode .................................................. 187
`Controlling the amount of network bandwidth used .............. 188
`Viewing and changing GhostCast Server session options ....... 190
`Running the Symantec Ghost executable ................................. 190
`
`Chapter 13 GhostCasting from the command line
`Running the GhostCast Server for Windows from the
`command line ................................................................................ 193
`Running the DOS-based GhostCast Server ...................................... 194
`Starting the GhostCast session ......................................................... 194
`GhostCast Server command-line options ........................................ 195
`Examples using GhostCast Server command-line options ...... 196
`
`9
`
`Apple Inc. Exhibit 1011 Page 9
`
`
`
`
`
`Creating a DOS boot disk manually ............................................... 198
`Setting up packet drivers ........................................................... 199
`
`Chapter 14 GhostCasting and IP addresses
`Introducing IP addresses for GhostCasting ..................................... 205
`Locally specified IP addresses .......................................................... 206
`Examples of Wattcp.cfg client configuration files .................... 206
`Using BOOTP/DHCP to assign IP addresses .................................. 208
`BOOTP/DHCP automatically defined IP address .................... 208
`Examples of BOOTP/DHCP defined addresses ....................... 209
`
`Section 4 Cloning image files locally
`
`Chapter 15 Symantec Ghost as a standalone program
`Starting the Symantec Ghost executable ......................................... 213
`Navigating without a mouse ............................................................ 214
`Using Ghost.exe on a standalone computer ............................ 215
`Cloning disks .................................................................................... 215
`Cloning disk to disk ................................................................... 216
`Cloning a disk to an image file ................................................. 217
`Cloning a disk from an image file ............................................ 219
`Cloning partitions ............................................................................. 221
`Cloning from partition to partition ........................................... 221
`Cloning a partition to an image file .......................................... 222
`Cloning a partition from an image file ..................................... 224
`Saving an image file to a CD-R/RW ................................................. 226
`Create Ghost boot disks ............................................................ 226
`Start your computer ................................................................... 226
`Create and save the image file .................................................. 227
`Adding switches to your cloning task ............................................. 227
`Creating a DOS boot disk ................................................................ 228
`
`Chapter 16 Standalone configuration
`Introducing the standalone configuration ....................................... 229
`Generating the configuration data file ............................................. 230
`Running the standalone configuration ............................................ 231
`Errors logged during a standalone configuration .................... 231
`
`10
`
`Apple Inc. Exhibit 1011 Page 10
`
`
`
`Section 5 Creating executables to roll out
`applications
`
`Chapter 17 Getting started with AutoInstall
`How AutoInstall works ..................................................................... 235
`Using AutoInstall ............................................................................... 236
`Installing AI Snapshot and AI Builder on the model computer 237
`Setting up target computers ...................................................... 238
`Installing Microsoft products using AutoInstall ............................... 238
`Letting the model computer restart ........................................... 238
`Adding uninstall commands ...................................................... 238
`Using AutoInstall to clone Office XP ........................................ 238
`Microsoft system file protection (SFP) limitations on
`deploying AI packages ........................................................... 239
`
`Chapter 18 Creating AI packages
`Creating an installation script for a software installation ............... 241
`Capturing existing system information ..................................... 241
`Installing the software that you would like to package .......... 242
`Capturing system information again to determine changes .... 244
`Customizing and building AI packages ........................................... 245
`Customizing installation scripts ................................................. 247
`Building AI packages ................................................................. 250
`Modifying installation scripts and AI packages ........................ 251
`Executing and rolling out AI packages ........................................... 252
`
`Section 6 Symantec Ghost utilities
`
`Chapter 19 Using Ghost Explorer to modify image file
`contents
`Understanding Ghost Explorer ........................................................ 255
`Viewing image files .......................................................................... 256
`Restoring a file or directory from an image file .............................. 257
`Modifying image files in Ghost Explorer ......................................... 258
`Adding, moving, and deleting files ........................................... 258
`Saving a list of contents of an image file ........................................ 258
`Setting span file sizes ....................................................................... 259
`Compiling a file ................................................................................ 259
`
`11
`
`Apple Inc. Exhibit 1011 Page 11
`
`
`
`
`
`Determining Symantec Ghost image file version ............................ 260
`Using Ghost Explorer from the command line ............................... 260
`
`Chapter 20 Managing partitions using GDisk
`Introducing GDisk ............................................................................ 263
` Overview of main command-line switches .................................... 264
`Online Help for command-line switches ................................. 265
`Switches common to all GDisk commands .............................. 266
`Creating a partition ........................................................................... 266
`Reinitializing the Master Boot Record ............................................. 268
`Showing information about disks .................................................... 269
`Performing multiple GDisk operations using batch mode ............. 269
`FAT16 partitions in Windows NT .................................................... 271
`Deleting and wiping your disk ............................