Windows Legacy OS forum

General discussion


by snozzau / June 20, 2004 2:44 PM PDT

First up I'll tell you all what I want to accomplish and would like someone to tell me if a program like Partition magic will let me do it.
I have an 80gb hard drive and want to divide it into 3 seperate drives,1 for me and 2 for teenagers.
I want to format and reload XP, then use ghost to transfer XP to the other drives.
Will this work and if a worm or trojan or whatever arrives in one of the drives will it be isolated from the rest of the HD.

Discussion is locked
You are posting a reply to: Partition??????????s
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: Partition??????????s
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Re: Partition??????????s
by Cursorcowboy / June 21, 2004 12:59 AM PDT
In reply to: Partition??????????s

1. First up I'll tell you all what I want to accomplish and would like someone to tell me if a program like Partition magic will let me do it.

I have an 80gb hard drive and want to divide it into 3 seperate drives,1 for me and 2 for teenagers.

Different drive than already in the computer or do you speak of one already there1?

2. I want to format and reload XP, then use ghost to transfer XP to the other drives.

Can't be done. Only one of like OSes on a computer regardless of drives or partitions without using third-party software which I don't think you want.

3. Will this work and if a worm or trojan or whatever arrives in one of the drives will it be isolated from the rest of the HD.

Since IMHO #2 will not accomplish what you want, the question is null. However, FYI if an infection is serious enough, NOTHING is safe.

4. You can create separate accounts for each person that will be using the computer which allows each user to have their own document folders and settings such as the wallpaper, Start menu, visual style, and so forth. You can create and configure user accounts with the User Accounts tool (Q279783) in Control Panel, but is not available on a computer that is a member of a Domain.

5. For a thorough understanding, please read through the TechNet article, "User Data and Settings Management - User Profile Structure", and the "User Profiles and Folder Redirection FAQ."

6. "You Cannot Select the "Make This Folder Private" Option (Q307286)" can occur for either of the following reasons:

a. The folder is not in your user profile (Drive_letter:\Documents and Settings\User_name, where Drive_letter is the drive on which Windows XP is installed and User_name is your user name). The Make this folder private option is available only for files in your user profile (the My Documents folder and its subfolders, and the Cookies, Desktop, Start Menu, or Favorites folders).

b. The Windows folder is located on a drive that is formatted with the FAT or FAT32 file systems. The "Make this folder private" option requires the NTFS file system NTFS Preinstallation and Windows XP.

7. "HOW TO: Assign a Mandatory User Profile in Windows XP (Q307800)."

Note: When a user with an assigned mandatory profile logs off from a computer any changes to the profile are lost.

8. After upgrading a system from Win9x or Millennium Edition to WinXP Home or Pro and if user accounts were not set up initially, the Fast User Switching feature is not turned on by default.

9. Supplemental reading:

a. "How to Copy User Data to a New User Profile (Q811151)."

b. "How to Create and Copy Roaming User Profiles (Q314478)."

c. "HOW TO: Create a Custom Default User Profile (Q319974)."

d. "Error Message: "Windows Cannot Load the Locally Stored Profile" (Q812339)."

e. "User Accounts overview."

f. "Availability of the CopyProfile command-line tool to copy a Windows user profile on a Windows XP-based or a Windows Server 2003-based computer."

Bill Gaston

Pardon ma ACKsent, ah'm frum Austin, Tex_As, USA

....its been my policy to view the Internet not as an 'information highway,' but as an electronic asylum filled with babbling loonies.
Collapse -
Re: Partition??????????s
by snozzau / June 21, 2004 2:37 AM PDT

I already have separate user accounts,I am just sick and tired of having to format my computer every time one of the kids downloads a song,game or whatever and they pick up a worm,trojan etc.
What about partitioning my existing single hard drive into 4 and running XP on its own partition,so if gets infected I can just format the XP partition and leave everything else loaded on.

Collapse -
Re: Partition??????????s
by Cursorcowboy / June 21, 2004 5:26 AM PDT

Part I - Setup: -- as a suggestion for using

1. During Setup, the Administrator account is created automatically as a member of the Administrators group on the workstation or member server and when the screen "Who will use this computer?" was displayed and a name entered, they retain full administrative privileges without password by default. The Administrator account can never be deleted, disabled, or removed from the Administrators local group, ensuring that you never lock yourself out of the computer by deleting or disabling all the administrative accounts.

Note: Since User accounts created during Setup are initially created with Computer administrator access and password, which means they have complete control over a computer and can gain access to and modify all user accounts on a computer, launch User Accounts from the Control Panel and individually select each account and supply a password, change the picture, and optionally change the account type -- such as Computer administrator and Limited account types limiting what other family members/users are authorized to do. Click Start, Help and Support, type safe mode in the Search box and read how to create/change an Administrator account password.

2. Every user has an account (a record that consists of all the information that defines a user and includes the user name and password required for the user to log on, the groups in which the user account has membership, and the rights and permissions the user has for using the computer and network and accessing their resources) that allow the user to access resources on a local computer or domain. If the account is specific to a local computer, the user will not be able to access network based resources unless the resources have been configured to allow Anonymous access. If the account is domain based, the user will be able to access network resources from the local computer. However, his or her permissions as a user of network resources might be quite different than his or her rights on the local computer. Two user accounts, Administrator and Guest are created automatically when Windows is installed.

Administrator can install software, configure printers, join the computer to a domain, and after the computer has been configured. Log on only as the Administrator to perform administrative tasks.

Guest accounts can be used to allow different users to log on and access local resources without having to create an account for each user. It can also be enabled to simplify file and printer sharing with other Windows-based computers configured in a workgroup environment. Otherwise, it is recommended that Guest accounts be turned off, Q300489).

Note: Guest account users normally do not have access to the Internet unless they are allowed on a computer which is already connected by dial-up or the computer is connected to the Internet using cable, DSL, or the system is on a network.

a. Except for the Administrator and Guest accounts, Local User accounts are not created automatically when Windows is installed. Instead, an account must be created by a member of the Administrators group after the installation is complete. Only a domain-level Administrators and Account Operators can create domain accounts. User accounts, which include information such as the user's name, alias, password, and unique security identifier (SID), enable users to log on to the network or local computer and to access local and network resources. Domain or local user can manage permissions on resources on the local computer -- as long as the user has change permission rights on the resource.

b. To create, delete, and manage user accounts, Administrators use the User Accounts in Control Panel -- the Local Users and Groups snap-in to the Microsoft Management Console (if the user account is local to a particular computer) or the Active Directory Users and Computers snap-in (if the account is to participate in a domain) (Q279783). For more information about creating, deleting, and managing user accounts, see "Local Users and Groups" in the Windows Help and Support Center.

3. User's group and account type depend on whether a member is part of a network domain or is a part of a workgroup (stand-alone computer). Steps to perform tasks differ:

Warning: Must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. In addition, if a computer is connected to a network, network policy settings may prevent this procedure from being completed "Use the Group Policy Editor to Manage Local Computer Policy (Q307882)."

a. When a computer is part of a network domain, users are assigned to user groups and are granted the rights and permissions granted to the group.

b. When a computer is part of a workgroup or is a stand-alone computer, users are assigned types of user accounts and are granted the rights and permissions associated with that account.

4. There are three fundamental levels of security granted and are granted to end users through membership in:

Note: By default, the predefined and used security templates are stored in systemroot\Security\Templates. Setup security.inf is a computer-specific template that represents the default security settings that are applied during installation of the operating system, including the file permissions for the root of the system drive.

a. ADMINISTRATORS - is the most secure option, because the default permissions allotted to this group do not allow members to modify operating system settings or other user's data. However, user level permissions often do not allow the user to successfully run legacy applications. The members of the Users group are only guaranteed to be able to run programs that have been certified for Windows. As a result, only trusted personnel should be members of this group. Ideally, administrative access should only be used to:

(1) Install the operating system and components (such as hardware drivers, system services, and so on).

(2) Install Service Packs and Windows Packs.

(3) Upgrade the operating system.

(4) Repair the operating system.

(5) Configure critical operating system parameters (such as password policy, access control, audit policy, kernel mode driver configuration, and so on).

(6) Take ownership of files that have become inaccessible.

(7) Manage the security and auditing logs.

(8) Back up and restore the system.

b. POWER USERS - are provided primarily backwards compatibility for running non-certified applications but have more permissions than members of the Users group and fewer than members of the Administrators group. Power Users can perform any operating system task except tasks reserved for the Administrators group. The default permissions that are allotted to this group allow this group's members to modify computerwide settings. Power User can:

Note: If non-certified applications must be supported, then end users will need to be part of the Power Users group.

(1) Run legacy applications, in addition to Windows certified applications.

(2) Install programs that do not modify operating system files or install system services.

(3) Customize systemwide resources including printers, date, time, power options, and other Control Panel resources.

(4) Create and manage local user accounts and groups.

(5) Stop and start system Services, (click to see an example screenshot) which are not started by default.

Note: Power Users do not have permission to add themselves to the Administrators group. Power Users do not have access to the data of other users on an NTFS volume, unless those users grant them permission.

Warning: Running legacy programs often require modification to access certain system settings. The same default permissions that allow Power Users to run legacy programs also make it possible for a Power User to gain additional privileges on the system, even complete administrative control. Therefore, it is important to deploy certified programs in order to achieve maximum security without sacrificing program functionality. Programs that are certified can run successfully under the Secure configuration provided by the Users group. Since Power Users can install or modify programs, running as a Power User when connected to the Internet could make the system vulnerable to Trojan horse programs and other security risks.

c. USERS - is the most secure because the default permissions allotted to this group do not allow members to modify operating system settings or other users' data and provides the most secure environment in which to run programs. On a volume formatted with NTFS, the default security settings on a newly installed system (but not on an upgraded system) are designed to prevent members of this group from compromising the integrity of the operating system and installed programs:

(1) Users cannot modify systemwide registry settings, operating system files, or program files.

(2) Users can shut down workstations, but not servers. Users can create local groups, but can manage only the local groups that they created.

(3) They can run certified Windows programs that have been installed or deployed by administrators.

(4) Users have Full Control over all of their own data files (%userprofile%) and their own portion of the registry (HKEY_CURRENT_USER).

Note: User-level permissions often do not allow the user to successfully run legacy applications. Only the members of the Users group are guaranteed to be able to run Certified for Windows applications. Users will not be able to run most programs written for prior versions of Windows, because they did not support file system and registry security (Windows 95 and Windows 98) or shipped with lax default security settings (Windows NT). If problems are encountered in running legacy applications on newly-installed NTFS systems:

a. Install new versions of the applications that are certified for Windows.

b. Move end users from the Users group into the Power Users group.

c. Decrease the default security permissions for the Users group which can be accomplished by using the Compatible security template.

5. Compatible (Compatws.inf) - default permissions for workstations and servers are primarily granted to three local groups: Administrators, Power Users, and Users. Administrators have the most privileges while Users have the least. Because of this, you can significantly improve the security, reliability, and total cost of system ownership by:

a. Making sure that end-users are members of the Users group.

b. Deploying applications that can be run successfully by members of the Users group, who can successfully run applications that take part in the Certified for Windows program. However, applications probably cannot be run that are not certified in a User context. If non-certified applications must be supported, there are two options:

(1) Allow members of the Users group to be members of the Power Users group.

(2) Relax the default permissions that are granted to the Users group.

c. Since Power Users have inherent capabilities, such as creating users, groups, printers and shares, this can be relaxed in order that the default User permissions allow end-users to be members of the Power Users group and this is precisely what the Compatible template is for. The Compatible template changes the default file and registry permissions that are granted to Users in a manner that is consistent with the requirements of most non-certified applications. Additionally, since it is assumed that the administrator who is applying the Compatible template does not want end users to be Power Users, the Compatible template also removes all members of the Power Users group.

Warning: The Compatible template should not be applied to domain controllers. For example, do not import the Compatible template to the Default Domain policy or Default Domain Controller policy.

Note: Security template (located in %windir%\Security\Templates) settings can be viewed text files.

6. Secure (Secure*.inf) - defines enhanced security settings that are least likely to impact application compatibility. For example, the Secure templates define stronger password, lockout, and audit settings.

7. Highly Secure (hisec*.inf) - templates which are supersets of the secure templates that impose further restrictions on the levels of encryption and signing that are required for authentication and for the data that flows over secure channels and between SMB clients and servers. For example, while the Secure templates cause servers to refuse LAN Manager responses, the Highly Secure templates cause servers to refuse both LAN Manager and NTLM responses.

8. System root security (Rootsec.inf) - specifies the new root permissions introduced with Windows. This template can be used to reapply the root directory permissions if they are inadvertently changed, or the template can be modified to apply the same root permissions to other volumes. As specified, the template does not overwrite explicit permissions that are defined on child objects; it propagates only the permissions that are inherited by child objects.

9. No Terminal Server user SID (Notssid.inf) - the default file system and registry access control lists that are on servers grant permissions to a Terminal Server SID. The Terminal Server SID is used only when Terminal Server is running in application compatibility mode. If Terminal Server is not being used, this template can be applied to remove the unnecessary Terminal Server SIDs from the file system and registry locations. However, removing the access control entry for the Terminal Server SID from these default file system and registry locations does not increase the security of the system. Instead of removing the Terminal Server SID, simply run Terminal Server in Full Security mode. When running in Full Security mode, the Terminal Server SID is not used.

10. Special Groups - When a prior version of Windows is upgraded resources with permission entries for the Everyone group (and not explicitly to the Anonymous Logon group Win2000) will no longer be available to Anonymous users after the upgrade, which is an appropriate restriction. If access must be permitted in order to support pre-existing applications, the Anonymous Logon security group and its permissions must be explicitly added. However, in some situations where it might be difficult to determine and modify the permission entries on resources hosted, the Network access: Let Everyone permissions apply to anonymous users security setting, could be changed.

a. Interactive - contains the user who is currently logged on to the computer. During an upgrade to XP, members of the Interactive group will also be added to the Power Users group so that legacy applications will continue to function as they did before.

b. Network - contains all users who are currently accessing the system over the network.

c. Terminal Server User - when Terminal Servers are installed in application serving mode, this group contains any users who are currently logged on to the system using Terminal Server, with default permissions already assigned and are able to run most legacy programs.

Note: The same default permissions that allow a Terminal Server User to run legacy programs also make it possible for a Terminal Server User to gain additional privileges on the system, even complete administrative control. Applications that are certified for Windows can run successfully under the secure configuration provided by the Users group. Local accounts created on the local computer are created without passwords and are added to the Administrators group by default. If this is a concern, use Security Configuration Manager to allows membership of the Administrators (or any other group) with Restricted Groups policy.

11. Domain - "Configuring" (Q305553) and "Change a Computer Name or Join" (Q295017).

Warning: The most fundamental difference between the Professional edition and Home Edition is that only Professional can join a network domain. A computer running Home Edition can be a member of a workgroup (a home network), but not a domain. This distinction may sound trivial, but it?s important if you need the features available to computers that can join a domain. Expert Zone, by Sharon Crawford.

a. Open User Accounts in Control Panel.

b. On the Users tab, under Users for this computer, click the user account name, and then click Properties.

c. On the Group Membership tab, click the group wanted, and then click OK.

d. Notes:

(1) New users should not be added to the Administrators group unless they will perform these tasks only.

(2) To include a user in more than one group, open Local Users and Groups in the User Accounts dialog box, and on the Advanced tab click the Advanced button. Double-click Groups and then add the user to the group(s) wanted.

e. Should an error be rendered that an account already exists, even though it is not reflected in either the User Accounts tool in Control Panel or on the Welcome screen, it may have existed but is now disabled (Q297221).

12. Workgroup (a stand-alone computer)

a. Open User Accounts in Control Panel.

b. Click the user's account name and click Change the account type.

c. Click the type of account wanted, and then click Change Account Type.

Warning: If there is only one user on a computer with a computer administrator account, the account type cannot be changed because there must be at least one person with a computer administrator account at all times.

13. Password - Computer security includes the use of strong passwords (up to 127 characters long) for network logon and the Administrator account and can be the weakest link in a computer security scheme. Strong passwords are important because password cracking (which uses one of three approaches: intelligent guessing, dictionary attacks, and automation that tries every possible combination of characters) tools continue to improve and the computers used to crack passwords are more powerful than ever. For a password to be strong, it should be at least seven characters long, because of the way passwords are encrypted, the most secure passwords are seven or 14 characters.

a. A password should contain characters from each of the following three groups:

(1) Letters (uppercase and lowercase) A, B, C... (and a, b, c...)

(2) Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9

(3) Symbols (all characters not defined as letters or numerals) ` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] \ : " ; ' < > ? , . /

b. Have at least one symbol character in the second through sixth positions.

c. Be significantly different from prior passwords.

d. Not contain your name or user name.

e. Not be a common word or name.

f. To ensure security, passwords must be used carefully. These recommendations will help protect a password(s):

(1) Never write down the password.

(2) Never share a password with anyone.

(3) Never use a network logon password for another purpose.

(4) Use different passwords for network logon and the Administrator account.

(5) Change a network password every 60 to 90 days or as often as required in specific environments.

(6) Change a password immediately if you think it has been compromised.

(7) Be careful about where a password is saved. Some dialog boxes, such as those for remote access and other telephone connections, present an option to save or remember a password and this option should not ever be selected.

(8) Create and Use a Password Reset Disk for a Computer That Is Not a Domain Member (Q305478).

14. Running Windows XP as an Administrator makes the entire system totally vulnerable to Trojan horses and other security risks and the simple act of visiting an Internet site can be extremely damaging to it since an unfamiliar Internet site may have Trojan horse code that can be downloaded and executed. When logged on with administrator privileges, a Trojan horse could do anything, like reformat the hard drive, delete files, create new user accounts with administrative access, and a host of other things. When logged on as a member of the Users group, routine tasks can be performed including running programs and visiting Web sites without exposing a system to unnecessary risk. As a member of the Power Users group, routine tasks can be performed, programs can be installed, printers added, and allows use of most Control Panel items. When needing to perform Administrative tasks, such as upgrading the operating system or configuring system parameters, log off and log back on as an Administrator. When needing to log on as an administrator the runas command may be used:

Note: The article [Q294676] states you can run programs as a different user than the currently-logged on user provided the RunAs service (installed by Windows and started by default automatically, and accept only password authentication) as well as the Secondary Logon service is running -- the same services with different names. This step-by-step article describes how to enable and use the Run As command.

a. In Windows Explorer, click the executable program file wanted.

b. Press and hold the SHIFT key, right-click the program icon, and then click Run as.

c. To log on using an Administrator account, click The following user.

d. In User name and Password, type the Administrator account name and password.

e. Else, create a shortcut for easier access to use the runas command (password required):

(1) Right-click the Desktop, point to New, and then click Shortcut.

(a) For a command prompt with administrator credentials, type runas /user:ComputerName\administrator cmd

(b) For a Computer Management with administrator credentials, type runas /user:ComputerName\administrator "mmc %windir%\system32\compmgmt.msc"

(2) Click Next, type a name for the shortcut, and then click Finish.

15. Please review the information:

a. "Account Configuration for XP Pro".

b. "You Cannot View HTML Help Files When Special Characters Appear in Your Username (Q307823)."

Part II - Security:

This I'm leaving to you and suggest you start another message concerning that subject.

Collapse -
Re: Partition??????????s
by chris-cogan / July 9, 2004 2:02 AM PDT

If you can teach the kids to use separate partitions it would work. I personally prefer separate hard drives, to totally isolate the operating system. I install my OS and base programs on the C drive, and store my music, downloads, and data files on the second drive. If I get a virus or worm, the C drive gets reformatted, but all the data stays safe. The problem with your option is, unless your kids can reformat, if they get a virus or worm, you'll be doing the reformatting anyway, you just won't lose your settings. If that's your big concern, get a second drive, and install a second OS on it for all your kids. You'll just need a boot manager like Boot Magic to choose which OS to boot into. Password protect yours, so that they can't boot into the wrong OS by mistake if you're using the same OS on each drive. Separate drives is a much better solution that partitioning, and gives you extra drive space for storage for both you and the kids.

Collapse -
Not going to work
by Yew / June 21, 2004 5:54 AM PDT
In reply to: Partition??????????s

First off, there's no real easy way to boot between the three installations if you're using Ghost to install them. You can set up boot managers, but if you ask me, it's more trouble than it's worth. Incidently, this plan would work beautifully with Linux, but Windows is too finiky about where it's installed.

Your best bet here is to just remove a lot of the sources of risk for your computer. Start by banning the use of Internet Explorer and Outlook Express. You can replace it with the free Mozilla or it's cousin Firefox (and sibling Thunderbird for email): . This eliminates a lot of potential security risks and even "drive-by" style spyware installation.

From a legal standpoint, all P2P programs should probably be similarly banned from your system. Kazaa in particular is rife with spyware and viruses, so get rid of it and make sure it doesn't mysteriously find its way back.

Make sure you have an anti-virus program and that it's kept up to date. Then educate your kids on being careful about opening just anything they download.

That will probably cut your risk significantly, and at least probably give you more time inbetween formatting sessions (an inevitable part of using Windows sadly).

Collapse -
Re: Partition? Just boot with the XP CD...
by David Chan / June 21, 2004 10:44 AM PDT
In reply to: Partition??????????s

During setup all you have to do is delete your existing partiion and then you can create several partitions to suit your requirements.

Bear in mind that XP & your other programs should be installed on the same C Drive.

If you want to safe-guard your documents you can relocate My Documents to a second partition instead of the default C Drive.
This way when you need to reformat and reinstall XP your documents won't be affected.

But this should not mean that you don't have to do backups of your files as anything can happen when you reinstall XP.

But if your kids continue to run P2P Networks and download from Kazaa, Imesh your PC will continue to be plagued with viruses, downloader trojans, Gator/Claria, Hotbar and tons of other spyware...

Why not keep them out of your PC and let them have their own PC? This way your files are safe and if they trashed their PC make them learn how to fix it themselves.
Only then will they learn to take responsibilities for their own actions.

Collapse -
Re: Partition??????????s, Why Not A Good AV Program?
by Stan Chambers / June 21, 2004 12:13 PM PDT
In reply to: Partition??????????s

If viruses are the problem, why not install anti-virus software. I run NAV, along with Ad-Aware and Spybot. I also have Stinger (free from Mcafee).
It is impossible to escape these pests without some reliable programs to protect your computer.
There are many other such (free)programs available.
Ad-aware & Spybot at
Free AVG at
A google search will reveal more.

Collapse -
Re: Partition??????????s, Why Not A Good AV Program?
by snozzau / June 21, 2004 12:54 PM PDT

I'm running PC-Cillin firewall and Antivirus and it updates itself regularly.
Thanks to all for the advice.

Collapse -
Re: Partition??????????s, Why Not A Good AV Program?
by Stan Chambers / June 21, 2004 2:04 PM PDT

Firewall and anti-virus are a good start, but only part of the equation. You need the other protection mentioned earlier, or similar, for spyware and ad-ware and such other parasites that may arise.

Collapse -
Re: Partition??????????s
by 010101xxxxx / June 21, 2004 2:50 PM PDT
In reply to: Partition??????????s

Scott, depending on your computer type, this might be a viable option. Get a removeable drive bay, with a couple of extra trays. Since you want to split an 80G drive, try getting a couple of 20G drives. Each teen has their own drive to do what ever. Your drive stays untouched. It costs a little more, but I think it be a solution.

Collapse -
Re: Partition??????????s
by briggspaul2 / July 5, 2004 9:14 PM PDT

Yes It can be done, I've just done it.
All you need is PARTITION MAGIC/BOOT MAGIC and DRIVE Image or ghost.
However I just have one problem to resolve regarding user accounts... see below..

I have Windows XP at home.

I have done the following:-

1) created 2 partitions of 7 gig each one for work use and one for game use. (does not matter what size yours are, just make sure the 2nd,3rd,4th etc is at least as large as the first)
2) Installed XP on 1st Partition. (Work)
3) Used Drive Image (drive copy) to copy the first partition.
4) Used the image from step 3 to install the XP on the 2nd partition.

So now at this stage I have 2 xp installations one on partition 1 and one on partition 2.

5) Using Bootmagic I can boot select between the 2 Operating systems.


However I have discovered the following issue.

6) So I boot to the 2nd operating system. The User account says WORK I change the name to GAMES and the icon to a different picture.
7) I boot the pc again, and boot the 1st partition guess what... The 1st partion boots, and the user account name has changed to Games, icon is the same as the work icon before...
Cool So What is going on, What does NTFS? Partitions do to change the user account on a total separate partion and op.

The only thing I can think of is that because I setup the 1st partition and copied it, somehow xp has done something in NTFS as it is the same licence as the 1st image? I don't know...

What I was expecting was total separate Ops. So that when I changed the user account on the 2nd partition to Games it would not make any changes to the user account on the 1st partition which by the way is hidden as I used Partition Magic to create these two primary bootable partitions.

Any ideas? What I would like to do is to keep these totally separate, otherwise I am just going to have to do a long separte install on each partition! Which will be a complete pain as I want to create 4 sep partions, one for work, one for games, one for apps and one for testing. I was planning to just copy the image onto each of the 3 remianing sep partions.
Which will save me hours of time, what with all the updates I have to install for XP..

Even though I am using BOOT MAGIC to selected which op and partition to boot from, I want to see that when XP loads it tells me I have loaded, work, games etc and not this .... Now it makes me wonder what else is XP doing? (As I say it may be worth just dealing with the pain of a sep set-up for each one and then drive imaging each.)

Or Just creating a user account Games and marking the work account disabled on this partion.
Im still looking into it, I only set this up last night, I image it has to do with the way XP installs where you must give the Admin name/account on install.
and you can not delete it?
But all said and done, this will do what you want.. The programs are not that expensive and Im sure there are others out there.

It's the way too go.

Collapse -
Re: Partition??????????s
by briggspaul2 / July 9, 2004 4:00 PM PDT

ok i have now had to install a seperate xp install from scratch for each partition, as when i created other user accounts as a test on the 2nd install, they showed up on the 1st partition (work) so I went the long hard way and installed from scratch for each one....
Now I think I will raise a seperate discussion as I want to find out why this is the case? still once all done and each partition backed up the hard work would have all been worth while.

Collapse -
Why Not ......
by Angela / July 6, 2004 12:58 PM PDT
In reply to: Partition??????????s

Install an inexpensive Hard Disk Drive Cradle (AUS$35)and hook it up as Master and adjust your BIOS Boot order accordingly. Go and buy a couple of inexpensive Slightly out of date Hard Disk Drives (20GB AUS$45) and HDD Cases for the cradle (You may be able to get these from the cradle supplier seperately or look at computer markets otherwsie buy complete cradles and keep the extra bits as spares). Load XP onto each HDD and configure for the indivual it is intended for. Write that individuals name on the front of the HDD Case.

User 1 comes along to the powered down PC inserts his/her HDD into the Cradle and powers up the PC, he/she logs on and does what they need to do, powers down the pc and removes their HDD.

User 2 comes along to the powered down PC inserts his/her HDD into the Cradle and powers up the PC, he/she logs on and does what they need to do, powers down the pc and renoves their HDD.

If User 1 gets a virus then only their HDD is effected. (The only exception to this is if you are unfortuante enough to get a virus sitting in your cache but with security software installed on each HDD including AV Suite, Firewall and Anti-Spyware you would be highly protected).

Establish some rules for file sharing programs, downloads, adult only sites etc... and ensure each user knows how to look after their own HDD otherwise make them learn how to reinstall the OS themselves.

At least all your valuable data and Customised settings will be yours and yours alone to be responsible for and you still only have 1 PC.

DOWNSIDE - any hardware changes will require driver installation for each Hard Disk Drive respectively. HDD cannot be inserted into other PC Cradles as the system info and device drivers will not match the hardware.

HDD cannot be inserted or removed from powered up machine as it will blow out the mobo, hdd and psu.

You will need to sus out the license implication but they would be the same for ghosted images anyway as you are intended on running 3 installations and therefore would require 3 licenses.


Popular Forums
Computer Newbies 10,686 discussions
Computer Help 54,365 discussions
Laptops 21,181 discussions
Networking & Wireless 16,313 discussions
Phones 17,137 discussions
Security 31,287 discussions
TVs & Home Theaters 22,101 discussions
Windows 7 8,164 discussions
Windows 10 2,657 discussions

Does BMW or Volvo do it best?

Pint-size luxury and funky style

Shopping for a new car this weekend? See how the BMW X2 stacks up against the Volvo XC40 in our side-by-side comparison.