IEI Integration IMBA-G412ISA v2.00 User Manual
Page 10

x1/20/2012164
IMBA-G412IS A ATX Mo th e rb o a rd
P a g e x
Figure C-14: Select a Local Source Drive
................................................................................127
Figure C-15: Select a Source Partition from Basic Drive
.......................................................127
Figure C-16: File Name to Copy Image to
................................................................................128
Figure C-18: Image Creation Confirmation
..............................................................................129
Figure C-19: Image Creation Complete
....................................................................................129
Figure C-20: Image Creation Complete
....................................................................................129
Figure C-21: Press Any Key to Continue
.................................................................................130
Figure C-22: Partitions for Linux
...............................................................................................131
Figure C-23: System Configuration for Linux
..........................................................................132
Figure C-24: Access menu.lst in Linux (Text Mode)
...............................................................132
Figure C-25: Recovery Tool Menu
............................................................................................133
Figure C-26: Recovery Tool Main Menu
...................................................................................134
Figure C-27: Restore Factory Default
.......................................................................................135
Figure C-28: Recovery Complete Window
...............................................................................135
Figure C-30: System Backup Complete Window
....................................................................136
Figure C-32: Restore System Backup Complete Window
......................................................137
Figure C-33: Symantec Ghost Window
....................................................................................138