Linux Dividends; Friendly "Ghost"

NWC reader Leo Wilson says, "So few people acknowledge the incredible impact of Linux developers on the resuscitation of computers."

March 12, 2004

2 Min Read
NetworkComputing logo in a gray background | NetworkComputing





Friendly Ghost

Regarding Steven Hill's Sneak Preview of Symantec's Ghost Corporate Edition 8.0 (Jan. 22, 2004), I'm planning to buy the product to manage roughly 200 PC configurations remotely. One of Ghost CE's selling points is the ability to roll out Windows Hotfixes and Service Packs.

I'm having a hard time figuring out how to install a Hotfix to all Windows 2000 PCs at midnight. Is it simply a matter of pushing the image of the Hotfix, then executing the Hotfix? Or do I need to create an AI (Automatic Install) package for every Hotfix?


MARK A. HOVEY

IT Specialist
Deschutes Public Library
[email protected]Steven Hill replies: Ghost CE will let you push the Hotfix executable directly--either in advance, in the case of a large file, by scheduling a separate transfer task, or directly from the host as part of a transfer/ install task. Most Windows Hotfixes are available as executables that support conditional installation switches allowing unattended patching, such as those listed below.

/? : Display the list of installation switches.

/u : Use Unattended mode.

/f : Force other programs to quit when the computer shuts down.

/n : Do not back up files for removal./o : Overwrite OEM files without prompting.

/z : Do not restart when installation is complete.

/q : Use Quiet mode (no user interaction).

/l : List installed hotfixes.

/x : Extract the files without running Setup.The only drawback is that you have to identify and download the Hotfix executables in advance. You'll need to create an AI package only if the patch doesn't natively support unattended installation.





Tell us how you really feel. Send e-mail to us at [email protected], fax to (516) 562-7293 or mail letters to Network Computing, 600 Community Drive, Manhasset, NY 11030. Include your name, title, company name, e-mail address and phone number. All correspondence becomes the property of Network Computing.

Read more about:

2004
SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights