How does Ghosting work?
I've never actually used a ghosting product and I'm a little curious how it really works?
How can it work so quickly? Does it just copy an image of the host, or does it actually copy all the files?
If it doesn't copy the actual file, isn't it possible the entire image on the receiving drive could become damaged and unusable?
Associates Degree in IS
Studying for Network+