How does ghosting work?
I am trying to solve a problem but I need to know how all this works. So are there 2 pieces to ghosting? A thing that boots into ghost and then another program that host the ghost image file? At work we have a PXE server that boots into windo...