Clonezilla 2.5.0-5 Full Description
You're probably familiar with the popular proprietary commercial package Norton Ghost®. The problem with these kind of software packages is that it takes a lot of time to massively clone systems to many computers. You've probably also heard of Symantec's solution to this problem, Symantec Ghost Corporate Edition® with multicasting. Well, now there is an OpenSource clone system (OCS) solution called Clonezilla with unicasting and multicasting!
Clonezilla, based on DRBL, Partclone and udpcast, allows you to do bare metal backup and recovery. Two types of Clonezilla are available, Clonezilla live and Clonezilla SE (server edition). Clonezilla live is suitable for single machine backup and restore. While Clonezilla SE is for massive deployment, it can clone many (40 plus!) computers simultaneously. Clonezilla saves and restores only used blocks in the harddisk. This increases the clone efficiency. At the NCHC's Classroom C, Clonezilla SE was used to clone 41 computers simultaneously. It took only about 10 minutes to clone a 5.6 GBytes system image to all 41 computers via multicasting!
Free (GPL) Software.
Filesystem supported: (1) ext2, ext3, ext4, reiserfs, reiser4, xfs, jfs of GNU/Linux, (2) FAT, NTFS of MS Windows, (3) HFS+ of Mac OS, (4) UFS of FreeBSD, NetBSD, and OpenBSD, and (5) VMFS of VMWare ESX. Therefore you can clone GNU/Linux, MS windows, Intel-based Mac OS, and FreeBSD, NetBSD, and OpenBSD, no matter it's 32-bit (x86) or 64-bit (x86-64) OS. For these file systems, only used blocks in partition are saved and restored. For unsupported file system, sector-to-sector copy is done by dd in Clonezilla.
LVM2 (LVM version 1 is not) under GNU/Linux is supported.
Grub (version 1 and version 2) is supported.
Unattended mode is supported. Almost all steps can be done via commands and options. You can also use a lot of boot parameters to customize your own imaging and cloning.
Multicast is supported in Clonezilla SE, which is suitable for massively clone. You can also remotely use it to save or restore a bunch of computers if PXE and Wake-on-LAN are supported in your clients.
The image file can be on local disk, ssh server, samba server, or NFS server.
Based on Partclone (default), Partimage (optional), ntfsclone (optional), or dd to image or clone a partition. However, Clonezilla, containing some other programs, can save and restore not only partitions, but also a whole disk.
By using another free software drbl-winroll, which is also developed by us, the hostname, group, and SID of cloned MS windows machine can be automatically changed.
ENHANCEMENTS and CHANGES
The underlying GNU/Linux operating system was upgraded. This release is based on the Debian Sid repository (as of 2016/Nov/22).
Linux kernel was updated to 4.8.7-1.
Packages p7zip-full, sysstat and iftop were added.
Language file ca_ES was updated. Thanks to René Mérou.
Update gen-rec-iso by adding option -k1 in ocs-sr.
[ Clonezilla full changelog
Clonezilla 2.5.0-5 Free Download Notice
Top 4 Download periodically updates software information of Clonezilla 2.5.0-5 full version from the publisher,
but some information may be slightly out-of-date.
Using warez version, crack, warez passwords, patches, serial numbers, registration codes, key generator, pirate key, keymaker or keygen for
Clonezilla 2.5.0-5 license key is illegal and prevent future development of
Clonezilla 2.5.0-5. Download links are directly from our mirrors or publisher's website,
Clonezilla 2.5.0-5 torrent files or shared files from free file sharing and free upload services,
including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, SendSpace, DepositFiles, Letitbit, MailBigFile, DropSend, MediaMax, LeapFile, zUpload, MyOtherDrive, DivShare or
are not allowed!
Your computer will be at risk getting infected with spyware, adware, viruses, worms, trojan horses, dialers, etc
while you are searching and browsing these illegal sites which distribute a so called keygen, key generator, pirate key, serial number, warez full version or crack for
Clonezilla 2.5.0-5 download. These infections might corrupt your computer installation or breach your privacy.
A keygen or key generator might contain a trojan horse opening a backdoor on your computer.
Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.