Subj : Re: Cloning a 2.5" IDE/PATA Laptop Hard drive To : All From : nospam@needed.invalid Date : Thu Jan 31 2019 19:16:21 Path: eternal-september.org!reader02.eternal-september.org!feeder.eternal-september.o rg!.POSTED!not-for-mail From: Paul Newsgroups: microsoft.public.windowsxp.general Subject: Re: Cloning a 2.5" IDE/PATA Laptop Hard drive Date: Sun, 12 Nov 2017 03:06:11 -0500 Organization: A noiseless patient Spider Lines: 74 Message-ID: References: <2e49F9HceGAaFw0R@soft255.demon.co.uk> <9gka0d55a85fgg6d62v76qacjftdvtei72@4ax.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sun, 12 Nov 2017 08:06:09 -0000 (UTC) Injection-Info: reader02.eternal-september.org; posting-host="e0f8c23c4ac5e5fc899797d5779c788e"; logging-data="21458"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19jm5ZFyIsf/kav3EA9a+py3nrm6dzQY3c=" User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802) In-Reply-To: Cancel-Lock: sha1:YWGMK5Tqy/Wqh0bKzUITIkdDX84= Xref: feeder.eternal-september.org microsoft.public.windowsxp.general:134489 james@nospam.com wrote: > On Sat, 11 Nov 2017 20:23:32 -0500, Some Guy wrote: > >> Paul wrote: >> >>> When you unpack the above GHOST_BOOTx.zip file, are >>> you finding it corrupted ? There seems to be a problem >>> unpacking the second floppy image. The file might have >>> been truncated. >> The page where I got the ghost link from is this: >> >> http://www.dslreports.com/forum/r5620695-Ghost-2003-Floppy-for-BootCD >> >> The first post gives a direct link to the file. If you click on the >> link and download it, you get a file with 1,340,942 bytes and it will >> have the current (real-time) date and time. >> >> The direct link is this (this is what I posted earlier in this thread): >> >> http://www.dslreports.com/r0/download/265545~688de4fa5cfd7a3653cce1c3f147b3d4/G HOST_BOOTx.zip >> >> I now see that if you try to download this file using wget, or by >> directly entering it into a browser, you get a file with 1,339,806 >> bytes, and it has a date of 1/11/2004 (at least that's what I'm seeing). >> And it won't unpack. >> >> It might be that the dslreports server is not giving the entire file >> unless your http file request includes this as the referrer url: >> >> www.dslreports.com/forum/r5620695-Ghost-2003-Floppy-for-BootCD >> >> wget won't give any referrer URL (unless you specifiy one on the command >> line, assuming wget has that ability). >> >> So in other words, you need to access this page using any browser: >> >> http://www.dslreports.com/forum/r5620695-Ghost-2003-Floppy-for-BootCD >> >> And then click on the ghost download link in the first post. >> > > Good grief.... > If it's that complicated and confusing, I'm glad I spent the $10 to buy > it. By the time I got this thing downloaded I would have spent at least > $10 for headache medication...... > > Actually I think I did get a usable download, at least the zipfile > opens, but after I open it, I had no clue what to do with the .EXE > inside of it. > > I'm hoping the CD in my purchased copy will allow me to create a > bootable floppy. I'll be doing that using a different computer which has > a CD drive, and a USB floppy drive. > > I cant run a CD drive on the computer I intend to use to clone the hard > drives. I need both IDE connectors for drives. There wont be one > available for a CD drive. > > I'm sure one I get this in the mail, I will figure it out from the > manual included with it. For the EXE, double-click it, stick a blank floppy in the floppy drive, and there should be a winimage screen... https://s8.postimg.org/7xor5c1id/click_that_EXE.gif There might have been files on the floppy that were deleted, just before the diskette was winimaged. In which case, after the floppy is written, you could run recuva or photorec or stuff of that sort, and see what "old" files were on that floppy. Just for fun of course. I don't really know what's on there. Paul --- Platinum Xpress/Win/WINServer v3.1 * Origin: Prison Board BBS Mesquite Tx //telnet.RDFIG.NET www. (1:124/5013) .