beautypg.com
KINO-DH610
Page X
Figure 6-20: Audio Driver Installation Complete .................................................................... 107
Figure B-1: IEI One Key Recovery Tool Menu ........................................................................ 112
Figure B-2: Launching the Recovery Tool .............................................................................. 117
Figure B-3: Recovery Tool Setup Menu .................................................................................. 117
Figure B-4: Command Mode..................................................................................................... 117
Figure B-5: Partition Creation Commands.............................................................................. 119
Figure B-6: Launching the Recovery Tool .............................................................................. 121
Figure B-7: System Configuration for Windows .................................................................... 121
Figure B-8: Build-up Recovery Partition ................................................................................. 122
Figure B-9: Press any key to continue .................................................................................... 122
Figure B-10: Press F3 to Boot into Recovery Mode............................................................... 123
Figure B-11: Recovery Tool Menu ........................................................................................... 123
Figure B-12: About Symantec Ghost Window ........................................................................ 124
Figure B-13: Symantec Ghost Path ......................................................................................... 124
Figure B-14: Select a Local Source Drive ............................................................................... 125
Figure B-15: Select a Source Partition from Basic Drive ...................................................... 125
Figure B-16: File Name to Copy Image to ............................................................................... 126
Figure B-17: Compress Image.................................................................................................. 126
Figure B-18: Image Creation Confirmation ............................................................................. 127
Figure B-19: Image Creation Complete ................................................................................... 127
Figure B-20: Image Creation Complete ................................................................................... 127
Figure B-21: Press Any Key to Continue ................................................................................ 128
Figure B-22: Partitions for Linux.............................................................................................. 129
Figure B-23: System Configuration for Linux......................................................................... 130
Figure B-24: Access menu.lst in Linux (Text Mode) .............................................................. 130
Figure B-25: Recovery Tool Menu ........................................................................................... 131
Figure B-26: Recovery Tool Main Menu .................................................................................. 132
Figure B-27: Restore Factory Default ...................................................................................... 133
Figure B-28: Recovery Complete Window .............................................................................. 133
Figure B-29: Backup System.................................................................................................... 134
Figure B-30: System Backup Complete Window ................................................................... 134
Figure B-31: Restore Backup ................................................................................................... 135
Figure B-32: Restore System Backup Complete Window ..................................................... 135
Figure B-33: Symantec Ghost Window ................................................................................... 136