Ghost Software

Ghost Software stands for GENERAL HARDWARE ORIENTED SYSTEM TRANSFER and GHOST programs is a comprehensive PC management for OS deployment, software distribution, user-state migration, back up and disaster recovery. Managing today's increasingly heterogeneous enterprise environments of connected and mobile PCs poses major challenges for IT managers. Primary among them is the need to control the costs of setting up new PCs, migrating user desktop settings, and deploying OS and application upgrades and updates. By enabling the remote management of routine tasks such as PC deployment, cloning, changes in configuration settings, user migration, and backup and recovery of disk images, Symantec Ghost software streamlines the configuration and management of networked PCs, thereby dramatically reducing IT costs.

GHOST software is a system duplication tool that lets you transfer the contents of one disk to another (i.e., a one to one transfer). The GHOST software also lets you transfer the contents of one disk to a disk image file and use that image file to create copies of the original disk (i.e., a one-to-many transfer). This second option makes GHOST program an ideal utility for system rollouts and upgrades. GHOST software supports FAT12, FAT16, FAT32, and NTFS partition types, so you can use the GHOST software in any type of environment. Using GHOST software isn't complicated if you plan your data duplication strategy properly. You can use multiple methods to ghost a system; the method you choose depends on your goal.

If you want to ghost hard disks internally, the process is simple. If you want to create a disk image file and ghost the file over the network, you must have sufficient disk space for the file. If you intend to ghost an image file to more than one computer hard disk, you might want to store the image on a central server or a recordable medium. GHOST software also performs transfers over peer-to-peer connections through NetBIOS network connections or over a parallel port using a LapLink cable. After transfer, the software checks to ensure the transfer is complete (i.e., performs an integrity check).