On Thu, Mar 26, 2009 at 9:39 AM, Daniel Rodriguez <[email protected]> wrote:
> When the server was up and running an
> admin would do image backups to a Linux box. These images are in
> <filename>.iso.

  Hmmm.  That seems weird.  Usually an <.iso> extension signifies an
ISO-9660 filesystem image.  ISO-9660 can't be used to contain a true
hard disk image (block level).  Even as a filesystem, ISO-9660 can't
maintain NTFS ownership or permission.  I wonder if it's actually some
other format with a misleading name.

  Here's what I would do: Find or make a working Linux system.  (I'm
not sure if a "live CD" will do for this; they often omit things like
the "file" command.)  Run the "file" command against these <.iso>
files.  For example:

        file C_drive.iso

  The "file" command looks at file contents to determine type; it
doesn't use the file name ir extension.

  I might try loopback mounting the file on Linux:

        mount -o loop C_drive.iso /mnt/tmp

  I'd check the end of the kernel message log after the above, to see
if that provided useful clues:

        dmesg | tail

  I haven't used G4L myself, but I seem to recall it's just a
front-end to partimage or ntfsclone or something.  Once we figure out
what these files are, I can give you commands to examine the contents.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to