Download Norton Ghost 14.0

Norton Ghost 14.0 Readme:

Norton Ghost 14 is one of the most important software to recover file system, Disk clone and other special feature. When you need your hard disk clone you can do this by using this software.

About this readme

Carefully read the issues in this document before installing and using Norton Ghost™. This document contains important information that was discovered after the product was released to manufacturing.

Getting help while using Norton Ghost

To learn more about Norton Ghost, visit the new Help and Support page. Depending on which version and language of the product you have installed, the Help and Support page includes one-click access to more information, including the product help system, the product User's Guide, and access to the Symantec Knowledge Base where you can find troubleshooting information.

To access Help and Support

1.Start Norton Ghost.

2.On the Home page, click Help > Help and Support.

Known issues

The following section contains known issues that might affect the functionality of Norton Ghost. Please review each section carefully.

General issues

Items in this section are not specific to any one feature of the product. Please review them carefully.

> Using a Windows 2000 FTP Server (IIS 5.0) as an Offsite Copy destination has been shown to fail. Some of the packets at the end of recovery point files are missing, making the recovery point unusable. Symantec recommends that you not use Windows 2000 FTP Server as an Offsite Copy destination.

> When configuring a backup job to start a new recovery point set, be sure that you do not schedule the new set to start when the backup job is scheduled to create an incremental recovery point. If you do, the backup job scheduled to create the new recovery point set might not run as expected.

> If your computer shares RAM with another device, such as your graphics card, then your computer might not meet the minimum RAM requirements for using one or more features of Norton Ghost. You should avoid sharing RAM if your computer only meets the minimum amount of RAM required by Norton Ghost.

For example, the minimum RAM requirement for Symantec Recovery Disk is 512 MB. The entire RAM amount must be unshared and dedicated exclusively to Symantec Recovery Disk. If it is not dedicated and unshared, you may run out of memory when you restore recovery points or perform other tasks using Symantec Recovery Disk.

Refer to the Norton Ghost User's Guide for minimum system requirements.

> If you use Microsoft Bit Locker to secure the data on a drive, consider the following key points:

    • Lights Out Restore does not work on Bit Locked drives. Therefore, if you Bit Lock your system drive, you cannot recover the drive using Lights Out Restore.
    • You can back up a Bit Locked drive and then restore it using the Symantec Recovery Disk CD (or a customized version of the Symantec Recovery Disk).
    • After restoring a Bit Locked drive, you must set up Bit Locking again because the drive is no longer Bit Locked after it is recovered.
    • If you are concerned about securing the data on a drive (which is a common reason for using Bit Locker), you can encrypt your recovery points as a way of securing the data contained in them.
    • If you are restoring a recovery point of a Windows Vista computer that contains data from a previously Bit Locked drive to a new drive, you must have a recovery point of both the boot partition and the system partition.

You must restore the boot partition first, and then restore the system partition second. This allows the boot configuration data (BCD, a new data store introduced with Windows Vista) to be updated so that your computer starts correctly.

> When creating a customized Symantec Recovery Disk CD, you might receive the following error:

file:\\windows\system32\winload.exe status: 0xc0000001 The selected entry could not be loaded because the application is missing or corrupted.

This error is known to occur if your operating system resides on a drive that is formatted to FAT32.

To resolve this issue, reset %TEMP% to point to a secondary drive that is formatted to NTFS and that has enough disk space to host temporary program files included in the SRD .iso file (approximately 400 to 600 MB, depending on the language being used). Then re-create a custom Symantec Recovery Disk.

> Sometimes Windows incorrectly reports insufficient hard disk space when saving a recovery point to a Linux Samba share. To solve this issue, verify that Windows identifies the correct amount of space.

> If you are running Japanese and English computers on the same network, Japanese computer names may appear garbled in the console.

> Norton Ghost does not support computers that use the GRUB Boot Loader.

> Norton Ghost does not support computers that use Fedora Core3 Ext2/Ext3 or Grub 2 boot managers.

> Norton Ghost does not support writing to a shared CD drive on another computer.

> If you use an Iomega REV drive to back up your system, you must download the correct REV driver from the Iomega Web site if you want to write to the drives. The REV driver that shipped on the REV drive CD is not compatible with Norton Ghost. The driver to download is rev_system_software-w32-x86-30345 (or the most recent version).

> If you encounter failures in saving recovery points to your network, Symantec recommends that you set up network throttling. Backing up multiple computers at the same time to the same network location can limit the bandwidth on your network.

See the Norton Ghost User's Guide for more details about network throttling.

> Norton Ghost does not support dual boot or boot-strapping environments. If you want to manually edit your partition's boot.ini file, do the following:

    • Do not select the option to restart after a recovery point is restored.
    • Restore the recovery point.
    • From within Symantec Recovery Disk, choose Utilities > Edit boot.ini.
    • Make the needed changes, and then restart your computer.

> If you restore a file or folder that is shared, the sharing permissions are not restored. You will have to manually reconfigure the sharing permissions.

> If you are running Windows Vista and attempt to restore your system drive using recovery points that span multiple CDs or DVDs, you might encounter a known error. It appears that a conflict exists between Windows Vista and Gear CD/DVD drivers. To work around this issue, you should copy the required recovery points from CD or DVD to a second internal or external hard drive, and then restore your computer from the second drive.

> Because Microsoft Virtual Server and Virtual PC do not support 64-bit guests, Norton Ghost does not support the conversion of a 64-bit system volume to VHD format. However, you can convert data volumes to VHD format.

> If you are using a network location as your backup destination, make sure that you have provided a valid network user name and password. Norton Ghost frequently accesses the backup destination to verify that you have valid recovery points. If your network account is in a domain, common security procedures lock your account after a certain number of failed login attempts. If your login credentials are invalid, you could be locked out of your network account after multiple, failed attempts by Norton Ghost to access the backup destination.

> If you want to use a dynamic disk as your backup destination, you should run the Symantec Recovery Disk to see if the dynamic disk is accessible. You must have access to the recovery points stored in your backup destination in order to recover your computer.

Installation issues

Items in this section relate to issues found with installing Norton Ghost.

> Norton Ghost requires approximately 250 to 300 MB of hard disk space. If your system drive (typically, C) is low on disk space and you select an alternate drive to install Norton Ghost to, approximately 30 MB of disk space is still required on your system drive. If your system drive is dangerously low on disk space (less than 100 MB), you should first free up more space before installing Norton Ghost.

> If you are upgrading to a support pack release using a CD you created from an .iso file, you might receive a message to "insert disk 1". If you receive this message, copy the contents of the CD to a location on your hard drive and run the installation from there.

> After installing Norton Ghost, you are prompted to reboot your computer. Rebooting your computer is necessary in order to install and activate the system drivers, symsnap.sys and v2imount.sys.

> The following files are temporary shortcuts and icons created by MSI:

(Windows XP) <system_drive_letter>:\WINDOWS\Installer\{guid_number}\

    • _F2526B23_3845_44C8_A4C5_5D43FF9A707F
    • 1033.MST
    • ImageBrowser_32_digit_number.exe
    • NewShortcut12_32_digit_number.exe
    • SecurityV2i_32_digit_number.EXE

> The Norton Ghost install disables the Windows Last Access Time setting. This setting is used to record the date and time when files are accessed. However, this setting significantly slows down backup jobs that have search engine support enabled.

> Note: On Windows Vista, this setting is already disabled by default.

> If you depend on Last Access Time and can accept its effect on the speed of backup jobs that have search engine support enabled, you can use the following set of parameters at installation time to ensure that Last Access Time is left enabled. You must run this command from within the \Install folder on the product CD.

> The easiest way to run the install with these parameter settings is from the Windows Run command:

To leave Last Access Time enabled

1.On the Windows taskbar, click Start > Run, and then type the following command:

setup.exe /s /v"/qn DMFILEACCESS=1"

2.Click OK.

Uninstallation issues

This section contains issues discovered when uninstalling Norton Ghost.

> When you uninstall Norton Ghost, Live Update remains installed on your computer. If you want to uninstall Live Update, refer to your operating system's documentation for information about how to remove applications.

> The following is a list of folders containing files that remain on a computer following an uninstall of the software. If you want, you can manually delete these files inside the specified folder; however, it is not necessary to remove them.

If you uninstall Norton Ghost, the capicom.dll file might still appear in the system directory. This is a shared .dll file that is used to perform Live Update for all Symantec products. If you have multiple Symantec products on your computer, or if it is unclear whether the file is needed, you can leave it there. Or if you are certain that the file is not longer needed, you can delete it.

> If you uninstall any earlier version of this product, you might encounter a problem with the virtual volume driver. Uninstall and reinstall Norton Ghost. If this does not correct the issue, you may need to call Symantec Technical Support for assistance in correcting the product's registry entries.

> You can manually remove the following folder when uninstalling Norton Ghost:

    • system_drive_letter:\Documents and Settings\Administrator\Application Data\IsolatedStorage.

The IsolatedStorage folder contains folders and several .xml and .dat files. These files are used by the Microsoft .NET Framework application to store window sizes, locations, and so forth.

Warning: You should determine whether other applications are using the Isolated Storage folder before removing it.

> Windows Registry entries created by the install include the following:

    • HKEY_USERS\.DEFAULT\Software\Symantec
    • HKEY_USERS\S-1-5-21-1409082233-1275210071-1801674531-500\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu\Programs\Norton Ghost

> The following is a list of files that are installed outside the default folder location where the software is installed. All of these files are removed during an uninstall of the software.

(Windows XP) <system_drive_letter>:\WINDOWS\system32

    • GEARAspi.dll

Lights Out Restore

If you are using Lights Out Restore, consider the following known issues:

> When Lights Out Restore is set up, it installs the Symantec recovery environment directly to the file system on the system partition (you cannot change this location), and places a Symantec recovery environment boot option within the Windows boot menu.

> Lights Out Restore does not work on Bit Locked drives. Therefore, if you Bit Lock your system drive, you cannot recover the drive using Lights Out Restore.

> If you are unable to boot your computer using Lights Out Restore, it could be because your operating system resides on a drive formatted to FAT32.

To resolve this issue, reset %TEMP% to point to a secondary drive that is formatted to NTFS. Then re-create a custom Symantec Recovery Disk.

Remote management

If you are using the one-to-one management feature, review the following key points:

> You cannot deploy the Norton Ghost Agent to Windows Vista. You must manually install the agent to computers that are running Windows Vista. After you have manually installed the agent, you can then use Norton Ghost to remotely manage the Windows Vista computer.

> If you deploy the Norton Ghost Agent to a computer that is already running Live State Recovery 6.0 or Norton Ghost 10, the older product is automatically uninstalled without warning. Backup jobs and histories are also automatically deleted.

> You might receive a reconnect error when trying to manage a second computer.

To resolve this issue, use Windows Firewall to open TCP port 135 on both the source and target computers, and then try the connection again.

> You might receive a reconnect error when trying to manage a second computer. This error message appears in the status bar of the product user interface:

Connecting to agent on <remote computer name/IP address>. You do not have sufficient privileges to perform this operation.

This error might occur because Distributed COM (DCOM) is disabled on the computer.

To enable DCOM:

1.From the Start menu, click Run.

For Windows Vista, if the Run option is not visible, do the following:

> Right-click the Start button, and click Properties.

> On the Start Menu tab, click Customize.

> Scroll down and check Run command.

> Click OK.

2.Enter dcomcnfg.exe, and then press Enter.

3.In the tree on the left, double-click Component Services, and then double-click Computers.

4.Right-click My Computer, and then select Properties.

5.Click the Default Properties tab, and then select the Enable Distributed COM on this Computer check box.

6.Click OK to save the settings.

Third-party code

Portions of this product include third-party licensed code as provided below.

Copyright © 2003, Dr. Brian Gladman (, Worcester, UK. All rights reserved.

License terms

The free distribution and use of this software in both source and binary form is allowed (with or without changes) provided that:

> Distributions of this source code include the above copyright notice, this list of conditions and the following disclaimer;

> Distributions in binary form include the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other associated materials;

> The copyright holder's name is not used to endorse products built using this software without specific written permission.

ALTERNATIVELY, provided that this notice is retained in full, this product may be distributed under the terms of the GNU General Public License (GPL), in which case the provisions of the GPL apply INSTEAD OF those given above.

DISCLAIMER - This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose.

About Windows Vista manifests

The following table lists applications that have been tested on Windows Vista by Symantec but are provided by third-party software vendors and do not include embedded Windows Vista manifests:

> bootsect.exe

> dotnetfx.exe

> IDriver.exe

> IDriver2.exe

> IDriverT.exe

> gearinstall.exe

> geardrvsetup.exe

> IDriver.NonElevated.exe


> ImageBrowser1_32_alpha-numeric_characters.exe

> NewShortcut12_32_alpha-numeric_characters.exe


Copyright notification

Copyright © 2008, Symantec Corporation.

All rights reserved.

Symantec, Live State, Norton, and Norton Ghost are trademarks or registered trademarks of Symantec Corporation. All other brand or product names are trademarks or registered trademarks of their respective owners.

The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.


Of all the features of the Norton Ghost 14 Hard disk clone is most impressive. Clone your C drive with Norton Ghost. Many computer users are using this software instead of Acronis True Image Server. On the other hand some computer users are using Acronis True Image Server to backup their C driver. It is easier to clone C drive by using Acronis True Image Server but Norton Ghost is most popular. If you want learn How to clone your C drive using Acronis True Image Server Click Here. It is the easiest procedures to clone C drive. Only take a few minutes.

Now a days Norton Ghost are playing a vital roll in windows system. Experts say if you have Norton Ghost then why you don’t use Acronis Image Server for Hard disk clone. So it's better to use Norton Ghost instead of Acronis Image Server. So don't wast your time. Download Norton Ghost and take a clone of your C drive and use this backup when your system crash.


  1. I think Norton Ghost is better then any other software.

  2. Thank you so much for the full information about Norton Ghost 14 by Symantec... I'm just thinking about for installing this on my PC!!

  3. Norton Ghost does backups on the fly without restarting your system. Symantec provides most reliable and useful PC security software.