VirtualBox 添加Slic 2.1

ref:

https://www.virtualbox.org/manual/ch09.html

9.13. Configuring the custom ACPI table

VirtualBox can be configured to present an custom ACPI table to the guest. Use the following command to configure this:

VBoxManage setextradata "VM name"
      "VBoxInternal/Devices/acpi/0/Config/CustomTable" "/path/to/table.bin"

Configuring a custom ACPI table can prevent Windows Vista and Windows 7 from asking for a new product key. On Linux hosts, one of the host tables can be read from /sys/firmware/acpi/tables/.

在虚拟机配置文件 <ExtraData>节添加以下参数

<ExtraDataItem name="VBoxInternal/Devices/acpi/0/Config/CustomTable" value="/Path Of Slic Table/SLIC.BIN"/>

 

 激活

导入对应Windows版本的产品证书和密钥,激活系统。Dell.xrm-ms,下面密钥为DELL_WIN7-U版的。

slmgr -ipk 342DG-6YJR8-X92GV-V7DCV-P4K27
slmgr -ilc Dell.xrm-ms
slmgr -ato

slmgr -dli

USB问题

ref:
http://www.virtualbox.org/manual/ch03.html#idm1637
https://www.virtualbox.org/manual/ch12.html#ts_usb-linux

3.11. USB support

3.11.1. USB settings

The “USB” section in a virtual machine’s Settings window allows you to configure VirtualBox’s sophisticated USB support.

VirtualBox can allow virtual machines to access the USB devices on your host directly. To achieve this, VirtualBox presents the guest operating system with a virtual USB controller. As soon as the guest system starts using a USB device, it will appear as unavailable on the host.

Note

  1. Be careful with USB devices that are currently in use on the host! For example, if you allow your guest to connect to your USB hard disk that is currently mounted on the host, when the guest is activated, it will be disconnected from the host without a proper shutdown. This may cause data loss.
  2. Solaris hosts have a few known limitations regarding USB support; please see Chapter 14, Known limitations.

In addition to allowing a guest access to your local USB devices, VirtualBox even allows your guests to connect to remote USB devices by use of the VirtualBox Remote Desktop Extension (VRDE). For details about this, see Section 7.1.4, “Remote USB”.

In the Settings dialog, you can first configure whether USB is available in the guest at all, and then choose the level of USB support: OHCI for USB 1.1, EHCI (which will also enable OHCI) for USB 2.0, or xHCI for all USB speeds.

Note

The xHCI and EHCI controllers are shipped as a VirtualBox extension package, which must be installed separately. See Section 1.5, “Installing VirtualBox and extension packs” for more information.

When USB support is enabled for a VM, you can determine in detail which devices will be automatically attached to the guest. For this, you can create so-called “filters” by specifying certain properties of the USB device. USB devices with a matching filter will be automatically passed to the guest once they are attached to the host. USB devices without a matching filter can be passed manually to the guest, for example by using the Devices / USB devices menu.

Clicking on the “+” button to the right of the “USB Device Filters” window creates a new filter. You can give the filter a name (for referencing it later) and specify the filter criteria. The more criteria you specify, the more precisely devices will be selected. For instance, if you specify only a vendor ID of 046d, all devices produced by Logitech will be available to the guest. If you fill in all fields, on the other hand, the filter will only apply to a particular device model from a particular vendor, and not even to other devices of the same type with a different revision and serial number.

In detail, the following criteria are available:

  1. Vendor and product ID. With USB, each vendor of USB products carries an identification number that is unique world-wide, the “vendor ID”. Similarly, each line of products is assigned a “product ID” number. Both numbers are commonly written in hexadecimal (that is, they are composed of the numbers 0-9 and the letters A-F), and a colon separates the vendor from the product ID. For example, 046d:c016 stands for Logitech as a vendor, and the “M-UV69a Optical Wheel Mouse” product.Alternatively, you can also specify “Manufacturer” and “Product” by name.To list all the USB devices that are connected to your host machine with their respective vendor and product IDs, you can use the following command (see Chapter 8, VBoxManage):
    VBoxManage list usbhost

    On Windows, you can also see all USB devices that are attached to your system in the Device Manager. On Linux, you can use the lsusb command.

  2. Serial number. While vendor and product ID are already quite specific to identify USB devices, if you have two identical devices of the same brand and product line, you will also need their serial numbers to filter them out correctly.
  3. Remote. This setting specifies whether the device will be local only, or remote only (over VRDP), or either.

On a Windows host, you will need to unplug and reconnect a USB device to use it after creating a filter for it.

As an example, you could create a new USB filter and specify a vendor ID of 046d (Logitech, Inc), a manufacturer index of 1, and “not remote”. Then any USB devices on the host system produced by Logitech, Inc with a manufacturer index of 1 will be visible to the guest system.

Several filters can select a single device — for example, a filter which selects all Logitech devices, and one which selects a particular webcam.

You can deactivate filters without deleting them by clicking in the checkbox next to the filter name.

3.11.2. Implementation notes for Windows and Linux hosts

On Windows hosts, a kernel mode device driver provides USB proxy support. It implements both a USB monitor, which allows VirtualBox to capture devices when they are plugged in, and a USB device driver to claim USB devices for a particular virtual machine. As opposed to VirtualBox versions before 1.4.0, system reboots are no longer necessary after installing the driver. Also, you no longer need to replug devices for VirtualBox to claim them.

On newer Linux hosts, VirtualBox accesses USB devices through special files in the file system. When VirtualBox is installed, these are made available to all users in the vboxusers system group. In order to be able to access USB from guest systems, make sure that you are a member of this group.

On older Linux hosts, USB devices are accessed using the usbfs file system. Therefore, the user executing VirtualBox needs read and write permission to the USB file system. Most distributions provide a group (e.g. usbusers) which the VirtualBox user needs to be added to. Also, VirtualBox can only proxy to virtual machines USB devices which are not claimed by a Linux host USB driver. The Driver= entry in /proc/bus/usb/devices will show you which devices are currently claimed. Please refer to Section 12.8.7, “USB not working” also for details about usbfs.

 

If USB is not working on your Linux host, make sure that the current user is a member of the vboxusers group. Please keep in mind that group membership does not take effect immediately but rather at the next login. If available, the newgrp command may avoid the need for logout/login.
如果虚拟机无法使用USB
1.安装VirtualBox extension package
2.将当前用户添加到vboxusers 组中。

Ubuntu Linux添加源实现自动更新

Debian-based Linux distributions

Add the following line to your /etc/apt/sources.list. According to your distribution, replace ‘<mydist>‘ with ‘artful‘, ‘zesty‘, ‘yakkety‘, ‘xenial‘, ‘vivid‘, ‘utopic‘, ‘trusty‘, ‘raring‘, ‘quantal‘, ‘precise‘, ‘stretch‘, ‘lucid‘, ‘jessie‘, ‘wheezy‘, or ‘squeeze‘:

deb http://download.virtualbox.org/virtualbox/debian <mydist> contrib

(Up to version 3.2 the packages were located in the non-free section. Starting with version 4.0 they are located in the contrib section.)

The Oracle public key for apt-secure can be downloaded

  • here for Debian 8 (“Jessie”) / Ubuntu 16.04 (“Xenial”) and later
  • here for older distributions.

You can add these keys with

sudo apt-key add oracle_vbox_2016.asc
sudo apt-key add oracle_vbox.asc

or combine downloading and registering:

wget -q https://www.virtualbox.org/download/oracle_vbox_2016.asc -O- | sudo apt-key add -
wget -q https://www.virtualbox.org/download/oracle_vbox.asc -O- | sudo apt-key add -

The key fingerprint for oracle_vbox_2016.asc is

B9F8 D658 297A F3EF C18D  5CDF A2F6 83C5 2980 AECF
Oracle Corporation (VirtualBox archive signing key) <[email protected]>

The key fingerprint for oracle_vbox.asc is

7B0F AB3A 13B9 0743 5925  D9C9 5442 2A4B 98AB 5139
Oracle Corporation (VirtualBox archive signing key) <[email protected]>

(As of VirtualBox 3.2, the signing key was changed. The old Sun public key for apt-secure can be downloaded  here.)

To install VirtualBox, do

sudo apt-get update
sudo apt-get install virtualbox-5.2

Replace virtualbox-5.2 by virtualbox-5.1 to install VirtualBox 5.1.30 Note: Ubuntu/Debian users might want to install the dkms package to ensure that the VirtualBox host kernel modules (vboxdrvvboxnetflt and vboxnetadp) are properly updated if the linux kernel version changes during the next apt-get upgrade. For Debian it is available in Lenny backports and in the normal repository for Squeeze and later. The dkms package can be installed through the Synaptic Package manager or through the following command:

sudo apt-get install dkms

What to do when experiencing The following signatures were invalid: BADSIG … when refreshing the packages from the repository?

# sudo -s -H
# apt-get clean
# rm /var/lib/apt/lists/*
# rm /var/lib/apt/lists/partial/*
# apt-get clean
# apt-get update

RPM-based Linux distributions

Starting with VirtualBox 3.0.12 we provide a yum-style repository for Oracle Linux/Fedora/RHEL/openSUSE. Note that 3.0.x .rpm packages are named VirtualBox-3.0.x while 3.1.x .rpm packages are named VirtualBox-3.1-3.1.x. This naming scheme allows to use the older 3.0.x packages without changing the repository.

Furthemore, all .rpm packages are signed. The Oracle public key for rpm can be downloaded here. You can add this key (not necessary for yum users, see below!) with

sudo rpm --import oracle_vbox.asc

or combine downloading and registering:

wget -q https://www.virtualbox.org/download/oracle_vbox.asc -O- | rpm --import -

The key fingerprint is

7B0F AB3A 13B9 0743 5925  D9C9 5442 2A4B 98AB 5139
Oracle Corporation (VirtualBox archive signing key) <[email protected]>

After importing the public key, the package signature can be checked with

rpm --checksig PACKAGE_NAME

Note that importing the key is not necessary for yum users (Oracle Linux/Fedora/RHEL/CentOS) when using one of the virtualbox.repo files from below as yum downloads and imports the public key automatically!

The package signature is checked by yum/zypper as well:

OA 2.x SLIC & OEMCERT Collection

来源:https://forums.mydigitallife.net/threads/oa-2-x-slic-oemcert-collection.5952/

 

Share any new SLIC 2.x bins & certs here.

Only new bins will be added if the OEMID & OEMTableID differ from the bins in the list.


** NO 2.x BIN MODDING REQUESTS **
** KEEP DISCUSSIONS ABOUT 2.x BIN SHARING-COLLECTING ONLY **

SLIC 2.0 is needed for offline activation of Windows Vista and Server 2008 OEM SLP.
SLIC 2.1 is needed for offline activation of Windows 7 and Server 2008 R2 OEM SLP.
SLIC 2.2 is needed for offline activation of Windows Server 2012 OEM SLP.
SLIC 2.3 is needed for offline activation of Windows Server 2012 R2 OEM SLP.
SLIC 2.4 is needed for offline activation of Windows Server 2016 OEM SLP.

SLICs are backward compatible, which means SLIC 2.4 still can activate Windows 7.

下载:https://forums.mydigitallife.net/attachments/oemcert_and_slics_2017-09-02-7z.42836/

 

https://resource.mking007.com/bios/OEMCERT_AND_SLICS_2017-09-02.7z

 

激活:

slmgr.vbs -ipk xxxxx-xxxxx-xxxxx-xxxxx-xxxxx

导入证书:

slmgr.vbs -ilc [盘符]:\[路径]\ASUS-_ASUS_-2.1.XRM-MS
slmgr.vbs -ato

WinPE: Add packages (Optional Components Reference)

ref:

https://msdn.microsoft.com/en-us/windows/hardware/commercialize/manufacture/desktop/winpe-add-packages–optional-components-reference

Add feature packages, also known as optional components, to Windows PE (WinPE).

Languages: When you install each optional component, you must first install the language-neutral optional component and then install the language-specific optional component. The required language resources must be the same version as the language-neutral resources. Language resources are in a folder that has the same name as the language that is installed in the directory of optional components.

Adding optional components

Optional components are included as part of the Windows Assessment and Deployment Kit (Windows ADK), in 32- and 64-bit architectures. When you add optional components to your WinPE image, make sure your optional components are from the same ADK build and have the same architecture as your WinPE image. You can find WinPE optional components in the following locations after you install the ADK.

64-bit C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\

32-bit C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\x86\WinPE_OCs\

Get the Windows Assessment and Deployment Kit with Windows PE tools including optional components

Create a set of either 32-bit or 64-bit Windows PE files

  1. Click Start, and type deployment. Right-click Deployment and Imaging Tools Environment and then select Run as administrator.
  2. In the Deployment Tools and Imaging Environment, copy the Windows PE files for the PCs you want to boot.
    • The 64-bit version can boot 64-bit UEFI and 64-bit BIOS PCs.
      copype amd64 C:\WinPE_amd64
      
    • The 32-bit version can boot 32-bit UEFI, 32-bit BIOS, and 64-bit BIOS PCs.
      copype x86 C:\WinPE_x86
      

Mount the Windows PE boot image

  • Mount the Windows PE image.
    Dism /Mount-Image /ImageFile:"C:\WinPE_amd64\media\sources\boot.wim" /index:1 /MountDir:"C:\WinPE_amd64\mount"
    

Add optional components (packages or .cab files)

  1. Add the optional component into Windows PE. To add optional components, you need to add both the optional component and its associated language packs.

    Important
    Some optional components have prerequisites that must be installed in order. See the list of optional components on this page.

  2. Verify that the optional component is part of the image:
    Dism /Get-Packages /Image:"C:\WinPE_amd64\mount"
    

    Review the resulting list of packages and verify that the list contains the optional component and its associated language pack.

Add more languages to images that include optional components

  1. List the optional components in the Windows PE image:
    Dism /Get-Packages /Image:"C:\WinPE_amd64\mount"
    
  2. Review the resulting list of packages, and add the corresponding language packs for each package in the image, including the base Windows PE language pack.

    where … WinPE_OCs\fr-fr\lp.cab represents the base Windows PE language pack.

  3. If you’re adding language packs for Japan, Korea, or China, add the font packages for these languages. Here’s an example for Japan:
    Dism /Add-Package /Image:"C:\WinPE_amd64\mount" /PackagePath:"C:\Program Files (x86)\Windows Kits\10\Assessment and Deployment Kit\Windows Preinstallation Environment\amd64\WinPE_OCs\WinPE-Font Support-JA-JP.cab"
    
  4. Verify that the language packs are part of the image:
    Dism /Get-Packages /Image:"C:\WinPE_amd64\mount"
    

    Review the resulting list of packages and verify that the for each optional component, including the base Windows PE image, that there is an associated language pack.

  5. Change the regional settings to the language you’d like to use:
    Dism /Set-AllIntl:en-US /Image:"C:\WinPE_amd64\mount"
    

    To switch languages while in Windows PE, use wpeutil setmuilanguage.

Unmount the Windows PE image and create media

  1. Unmount the Windows PE image.
    Dism /Unmount-Image /MountDir:"C:\WinPE_amd64\mount" /commit
    
  2. Create bootable media, such as a USB flash drive.
    MakeWinPEMedia /UFD C:\WinPE_amd64 F:
    
  3. Boot the media. Windows PE starts automatically. After the Windows PE window appears, the wpeinit command runs automatically. This may take a few minutes. Verify your customizations.

List of Optional Components

Area/Optional component name Description
Database/WinPE-MDAC WinPE-MDAC supports Microsoft Open Database Connectivity (ODBC), OLE DB, and Microsoft ActiveX Data Objects (ADO). This set of technologies provides access to various data sources, such as Microsoft SQL Server. For example, this access enables queries to Microsoft SQL Server installations that contain ADO objects. You can build a dynamic answer file from unique system information. Similarly, you can build data-driven client or server applications that integrate information from a variety of data sources, both relational (SQL Server) and non-relational.
File management/WinPE-FMAPI WinPE-FMAPI provides access to the Windows PE File Management API (FMAPI) for discovering and restoring deleted files from unencrypted volumes. The FMAPI also provides the ability to use a password or recovery key file for the discovery and recovery of deleted files from Windows BitLocker Drive Encryption encrypted volumes.
Fonts/WinPE-Fonts-Legacy WinPE-Fonts-Legacy contains 32 font files for various languages/writing scripts. Some of these fonts are no longer used as UI fonts. For example, scripts such as Bangla, Devanagari, Gujarati, Gurmukhi, Kannada, Malayalam, Odia, Tamil, Telugu, and Sinhalese were covered by Mangal, Latha, Vrinda, Gautami, Kalinga, artika, Raavi, Shruti, and Tunga, but in Windows 8, they were all unified under Nirmala UI, a single, pan-Indian font. The following list shows the fonts and languages included in this optional component:

  • estre.ttf Estrangelo Edessa (Syriac)
  • mvboli.ttf MV Boli (Thaana)
  • KhmerUI.ttf Khmer UI (Khmer UI)
  • KhmerUIB.ttf Khmer UI Bold (Khmer UI)
  • Laoui.ttf Lao UI (Lao)
  • Laouib.ttf Lao UI Bold (Lao)
  • daunpenh.ttf DaunPenh (Khmer)
  • moolbor.ttf MoolBoran (Khmer)
  • dokchamp.ttf DokChampa (Lao)
  • Himalaya.ttf Microsoft Himalaya (Tibetan)
  • monbaiti.ttf Mongolian Baiti (Mongolian)
  • MSYI.ttf Microsoft Yi Baiti (Yi Syllables)
  • nyala.ttf Nyala (Ethiopic)
  • sylfaen.ttf Sylfaen (Armenian & Georgian)
  • euphemia.ttf Euphemia (Unified Canadian Aboriginal Syllabics)
  • plantc.ttf Plantagenet Cherokee (Cherokee)
Fonts/WinPE-Font Support-JA-JP WinPE-Font Support-JA-JP contains two Japanese font families that are packaged as TrueType Collection (TTC) files. MS Gothic is the Windows Japanese user interface font in versions of Windows before Windows Vista. MS Gothic contains a large character set and embedded bitmaps to ensure legible rendering at small sizes. Meiryo, a font that was introduced in Windows Vista, is designed specifically for use in a Microsoft ClearType® rendering environment. Meiryo does not include embedded bitmaps. Instead, Meiryo relies on hinting instructions to produce legible characters at small sizes. In addition, the module contains two Japanese bitmap fonts, App932.fon and Vga932.fon. The module also contains a bitmap-only TrueType font, Jpn_font.ttf. This font is used on boot screens.
Fonts/WinPE-Font Support-KO-KR WinPE-Font Support-KO-KR contains three core Korean font families: Gulim, Batang and Malgun Gothic. Gulim is the legacy UI font and, as a TTC file, contains Gulim, GulimChe, Dotum and DotumChe. Batang is the legacy text font and is also a TTC file, containing Batang, BatangChe, GungSuh and GungSuhChe. Malgun Gothic, a font that was introduced in Windows Vista, is designed specifically for use in a ClearType rendering environment. Malgun Gothic does not include embedded bitmaps and instead relies on hinting instructions to produce legible characters at small sizes.
Fonts/WinPE-Font Support-ZH-CN WinPE-Font Support-ZH-CN contains two Chinese font families that are packaged as TTC files. Simsun is the Simplified Chinese user interface font in Windows versions before Windows Vista. Simsun contains embedded bitmaps to ensure legible rendering at small sizes. The other TTC font is MingLiu. MingLiu has embedded bitmaps and provides support for the Hong Kong Supplementary Character Set (HKSCS). YaHei, a font that was introduced in Windows Vista, is designed specifically for use in a ClearType rendering environment. YaHei does not include embedded bitmaps. YaHei relies on hinting instructions to produce legible characters at small sizes. In addition, the module contains one bitmap-only TrueType font, Chs_boot.ttf. This font is used on boot screens.
Fonts/WinPE-Font Support-ZH-HKand

WinPE-Font Support-ZH-TW

The Hong Kong and Taiwan optional components contain two Chinese font families that are packaged as TTC files. Simsun is the Simplified Chinese user interface font in Windows versions before Windows Vista. Simsun contains embedded bitmaps to ensure legible rendering at small sizes. MingLiu has embedded bitmaps and provides support for the HKSCS. JhengHei, a font that was introduced in Windows Vista, is designed specifically for use in a ClearType rendering environment. JhengHei does not include embedded bitmaps. JhengHei relies on hinting instructions to produce legible characters at small sizes. In addition, the module contains one bitmap-only TrueType font, Cht_boot.ttf. This font is used on boot screens.
HTML/WinPE-HTA WinPE-HTA provides HTML Application (HTA) support to create GUI applications through the Windows Internet Explorer script engine and HTML services. These applications are trusted and display only the menus, icons, toolbars, and title information that you create.
Input/WinPE-GamingPeripherals WinPE-GamingPeripherals adds support for Xbox wireless controllers in WinPE.
Microsoft .NET/WinPE-NetFX WinPE-NetFX contains a subset of the .NET Framework 4.5 that is designed for client applications.Not all Windows binaries are present in Windows PE, and therefore not all Windows APIs are present or usable. Due to the limited API set, the following .NET Framework features have no or reduced functionality in Windows PE:

  • Windows Presentation Foundation (WPF)
  • Windows Runtime
  • .NET Framework Fusion APIs
  • Windows Control Library event logging
  • .NET Framework COM Interoperability
  • .NET Framework Cryptography Model

Dependencies:

  • Install WinPE-WMI before you install WinPE-NetFX.
  • Install WinPE-HTA to enable limited WPF support.
Network/WinPE-Dot3Svc Adds support for the IEEE 802.X authentication protocol on wired networks. For more info, see WinPE Network Drivers: Initializing and adding drivers.
Network/WinPE-PPPoE WinPE-PPPoE enables you to use Point-to-Point Protocol over Ethernet (PPPoE) to create, connect, disconnect, and delete PPPoE connections from Windows PE. PPPoE is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. PPPoE enables Windows users to remotely connect their computers to the web. By using PPPoE, users can virtually dial from one computer to another over an Ethernet network, to establish a point-to-point connection between the computers. The computers can use this point-to-point connection to transport data packets.
Network/WinPE-RNDIS WinPE-RNDIS contains Remote Network Driver Interface Specification (Remote NDIS) support. WinPE-RNDIS enables network support for devices that implement the Remote NDIS specification over USB. Remote NDIS defines a bus-independent message set and a description of how this message set operates over various I/O buses. Therefore, hardware vendors do not have to write an NDIS miniport device driver. Because this Remote NDIS interface is standardized, one set of host drivers can support any number of bus-attached networking devices.
Network/WinPE-WDS-Tools WinPE-WDS-Tools includes APIs to enable the Image Capture tool and a multicast scenario that involves a custom Windows Deployment Services client. It must be installed if you intend to run the Windows Deployment Services client on a custom Windows PE image.
Network/WinPE-WiFi-Package WinPE-WiFi-Package is used by Windows Recovery Environment (Windows RE). This package is included in the base winre.wim file.
Windows PowerShell/WinPE-PlatformID WinPE-PlatformID contains the Windows PowerShell cmdlets to retrieve the Platform Identifier of the physical machine.

Dependencies: Install WinPE-WMI and WinPE-SecureStartup before you install WinPE-PlatformID.To use the Windows PowerShell cmdlet to retrieve the Platform Identifier, you will need install WinPE-PowerShell package.

Windows PowerShell/WinPE-PowerShell WinPE-PowerShell contains Windows PowerShell–based diagnostics that simplify using Windows Management Instrumentation (WMI) to query the hardware during manufacturing. You can create Windows PowerShell–based deployment and administrative Windows PE–based tools. In addition to deployment, you can use Windows PowerShell for recovery scenarios. Customers can boot in Windows RE and then use Windows PowerShell scripts to resolve issues. Customers are not limited to the toolsets that run in Windows PE. Similarly, you can build scripted offline solutions to recover some computers from no-boot scenarios.

WinPE-PowerShell has the following known limitations:

  • Windows PowerShell remoting is not supported. Any cmdlets that have remoting functionality will return an error.
  • The Windows PowerShell Integrated Scripting Environment (ISE) is not supported.
  • Windows PowerShell 2.0 is not supported.

Dependencies: Install WinPE-WMI > WinPE-NetFX > WinPE-Scripting before you install WinPE-PowerShell.

Windows PowerShell/WinPE-DismCmdlets WinPE-DismCmdlets contains the DISM PowerShell module, which includes cmdlets used for managing and servicing Windows images.

For more info, see Deployment Imaging Servicing Management (DISM) Cmdlets in Windows PowerShell.Dependencies: Install WinPE-WMI > WinPE-NetFX > WinPE-Scripting > WinPE-PowerShell before you install WinPE-DismCmdlets.

Windows PowerShell/WinPE-SecureBootCmdlets WinPE-SecureBootCmdlets contains the PowerShell cmdlets for managing the UEFI (Unified Extensible Firmware Interface) environment variables for Secure Boot.

Dependencies: Install WinPE-WMI > WinPE-NetFX > WinPE-Scripting > WinPE-PowerShell before you install WinPE-SecureBootCmdlets.

Windows PowerShell/WinPE-StorageWMI WinPE-StorageWMI contains PowerShell cmdlets for storage management. These cmdlets use the Windows Storage Management API (SMAPI) to manage local storage, such as disk, partition, and volume objects. Or, these cmdlets use the Windows SMAPI together with array storage management by using a storage management provider. WinPE-StorageWMI also contains Internet SCSI (iSCSI) Initiator cmdlets for connecting a host computer or server to virtual disks on external iSCSI-based storage arrays through an Ethernet network adapter or iSCSI Host Bus Adapter (HBA).

Dependencies: Install WinPE-WMI > WinPE-NetFX > WinPE-Scripting > WinPE-PowerShell before you install WinPE-StorageWMI.

Recovery/WinPE-Rejuv WinPE-Rejuv is used by Windows Recovery Environment (Windows RE). This package is included in the base winre.wim file.
Recovery/WinPE-SRT WinPE-SRT is used by Windows RE. This package is included in the base winre.wim file.
Recovery/WinPE-WinReCfg WinPE-WinReCfg contains the Winrecfg.exe tool, and it enables the following scenarios:

  • Boot from x86-based Windows PE to configure Windows RE settings on an offline x64-based operating system image.
  • Boot from x64-based Windows PE to configure Windows RE settings on an offline x86-based operating system image.
Scripting/WinPE-Scripting WinPE-Scripting contains a multiple-language scripting environment that is ideal for automating system administration tasks, such as batch file processing. Scripts that run in the Windows Script Host (WSH) environment can call WSH objects and other COM-based technologies that support Automation, such as WMI, to manage the Windows subsystems that are central to many system administration tasks.

Dependencies: Install WinPE-Scripting to make sure that full scripting functionality is available when you are using WinPE-NetFX and WinPE-HTA. The installation order is irrelevant.

Scripting/WinPE-WMI WinPE-WMI contains a subset of the Windows Management Instrumentation (WMI) providers that enable minimal system diagnostics. WMI is the infrastructure for management data and operations on Windows-based operating systems. You can write WMI scripts or applications to automate administrative tasks on remote computers. Additionally, WMI supplies management data to other parts of the operating system and products.
Setup/Winpe-LegacySetup Winpe-LegacySetup contains all Setup files from the \Sources folder on the Windows media. Add this optional component when you service Setup or the \Sources folder on the Windows media. You must add this optional component together with the optional component for the Setup feature. To add a new Boot.wim file to the media, add the parent WinPE-Setup, either of the children (WinPE-Setup-Client or WinPE-Setup-Server), and Media optional components. Media Setup is required to support Windows Server 2008 R2 installation.
Setup/WinPE-Setup Winpe-LegacySetup contains all Setup files from the \Sources folder on the Windows media. Add this optional component when you service Setup or the \Sources folder on the Windows media. You must add this optional component together with the optional component for the Setup feature. To add a new Boot.wim file to the media, add the parent WinPE-Setup, either of the children (WinPE-Setup-Client or WinPE-Setup-Server), and Media optional components. Media Setup is required to support Windows Server 2008 R2 installation.
Setup/WinPE-Setup-Client WinPE-Setup-Client contains the client branding files for the parent WinPE-Setup optional component.

Dependencies: Install WinPE-Setup before you install WinPE-Setup-Client.

Setup/WinPE-Setup-Server WinPE-Setup-Server includes the server branding files for the parent WinPE-Setup optional component.

Dependencies: Install WinPE-Setup before you install WinPE-Setup-Server.

Startup/WinPE-SecureStartup WinPE-SecureStartup enables provisioning and management of BitLocker and the Trusted Platform Module (TPM). It includes BitLocker command-line tools, BitLocker WMI management libraries, a TPM driver, TPM Base Services (TBS), the Win32_TPM class, the BitLocker Unlock Wizard, and BitLocker UI libraries. The TPM driver provides better support for both BitLocker and the TPM in this preboot environment.

Dependencies: Install WinPE-WMI before you install WinPE-SecureStartup.

Storage/WinPE-EnhancedStorage WinPE-EnhancedStorage enables Windows to discover additional functionality for storage devices, such as encrypted drives, and implementations that combine Trusted Computing Group (TCG) and IEEE 1667 (“Standard Protocol for Authentication in Host Attachments of Transient Storage Devices”) specifications. This optional component enables Windows to manage these storage devices natively by using BitLocker.

Windows RE optional components

The default Windows RE image contains the following built-in optional components:

  • WinPE-EnhancedStorage
  • WinPE-Rejuv
  • WinPE-Scripting
  • WinPE-SecureStartup
  • WinPE-Setup
  • WinPE-SRT
  • WinPE-WDS-Tools
  • WinPE-WMI

Linux(ubuntu)制作win7安装u盘,以及备份分区

原文:http://www.cnblogs.com/alanalan/p/3316598.html

 

参考网址(感谢原作者分享!):

http://serverfault.com/questions/6714/how-to-make-windows-7-usb-flash-install-media-from-linux

http://www.techrepublic.com/blog/linux-and-open-source/drive-and-partition-backups-with-dd/

dd的简介我就省了,一搜一大把。

网上流行的一种做法是把u盘分成一个区,格式化成fat,然后 dd if=/xxx.iso of=/dev/sdx,似乎是有成功的人,但这里缺少了制作引导这一步,至少在我这里是没能搞定。

linux下制作引导可以用 ms-sys 或 lilo -M命令,我用的是后者,主要是因为在源里直接有,而且之前用过lilo有亲切感。。。

sudo apt-get install lilo,用ms-sys的话自行搜索。

注意:选择安装lilo的话不要执行它的配置向导,否则会顶替掉你电脑现在用的引导(grub之类)

开始之前用df或别的什么办法搞清楚你的u盘是哪个,这里以我自己的情况为例/dev/sdd

使用 cfdisk /dev/sdd 或 fdisk /dev/sdd分区,删除所有分区,然后创建一个新的分区,占用全部空间,把type设置成NTFS(就是在修改type的地方改成7),标记为bootable。

新的分区将会是/dev/sdd1

用NTFS格式化:mkfs.ntfs -f /dev/sdd1

写入 windows 7 的 MBR 到u盘上(windows 8 也一样):

ms-sys -7 /dev/sdd 或 sudo lilo -M /dev/sdd mbr

然后挂载 ISO 和 USB:

mount -o loop win7.iso /mnt/iso

mount /dev/sdd1 /mnt/usb

复制ISO所有文件到U盘: cp -r /mnt/iso/* /mnt/usb/

等复制完就完工,图形化界面操作应该也一样的。

现在的情况是,你有了一个一切准备就绪的win7安装u盘,再回想之前最开始的时候那个不完全的做法,我们可以发挥一下,用dd把当前可以引导的u盘整个备份下来,以后再用时就可以用之前的办法直接还原了。

dd if=/dev/sdd of=/win7.img

这样我们就有了一个直接恢复到u盘上就可以进行usb安装的镜像文件了,可能不同的U盘容量上还会有一些麻烦,必须要跟这个U盘一样或者更大,dd是连没用到的空间都一起保存了的。

备份分区以及压缩备份文件

最简单的备份分区方式跟上文一样,就是dd if=/dev/sda1 of=/path/to/backup.img,但前文提到过dd会把空白字节也一起复制了,对U盘来说还能接受,但备份硬盘分区也这样就实在是离谱了,我们可以在备份完成后对img进行压缩,或在备份过程中即时完成:

dd if=/dev/sda1 | bzip2 -9f >/path/to/backup.img.bz2

还原时,如果你没有压缩:

dd if=/path/to/backup.img of=/dev/sda1

用前文方式压缩了的话:

bunzip2 -dc /path/to/backup.img.bz2 | dd of=/dev/sda1

 

文件: G:\TDDOWNLOAD\LENOVO_W7P1_PR_64_SC_RDVD.iso
大小: 3927812096 字节
修改时间: 2012年9月16日, 1:47:00
MD5: C59EEDCDA1260A187F6D128CD5E701A3
SHA1: F74BD4FBB281418DBF6D1D947D7A1DCEC3F30712
CRC32: BF468969

文件: G:\TDDOWNLOAD\LENOVO_WIN7_HP_64_ZH_CN_RDVD.iso
大小: 3579365376 字节
修改时间: 2012年9月24日, 3:09:30
MD5: E4C1FBFB2641ED73CA01EDC4B68E3160
SHA1: F200D6B1CFED0852030C3B7E2C584463541D4286
CRC32: 6FBA6A8A

文件: G:\TDDOWNLOAD\Lenovo_windows7_Ultimate_sp1_64_DVD.iso
大小: 3463053312 字节
修改时间: 2012年9月27日, 12:47:01
MD5: 974568C54FF16298DB459F6A655D1077
SHA1: C1E847ED1F5F26691196CC0EAC437D1DD7BCD4CA
CRC32: 0265E361

文件: G:\TDDOWNLOAD\lenovo_windows7_HP_64.iso
大小: 3513417728 字节
修改时间: 2012年9月16日, 0:56:35
MD5: 9A44709AAE11CE42D424FE46333384E1
SHA1: 8015CAC9CDFDE51E5BB643AC4F02CF498813A5F9
CRC32: 126B4292

添加删除windows的系统服务

原文:http://yahoon.blog.51cto.com/13184/235573

一、删除服务
办法一: 用sc.exe这个Windows命令
开始——运行——cmd.exe,然后输入sc就可以看到了。使用办法很简单:
sc delete “服务名” (如果服务名中间有空格,就需要前后加引号),服务名称可以在服务的属性里找到,不要将服务名称误认为显示名称。
如针对上面的: sc delete KSD2Service
方法二:直接进行注册表编辑
打开注册表编辑器,找到下面的键值:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services 一般服务会以相同的名字在这里显示一个主健,直接删除相关的键值便可。
方法三、特殊情况
1、如果服务显示的是rundll32.exe,并且这个文件是位于system32目录下,那么就不能删除这个rundll32.exe文件,它是Windows系统的文件。这时只要清除相关的服务就可以了
2、如果一个服务删除了马上又自动建立了,说明后台有进程在监视、保护。需要先在进程管理器中杀掉相应的进程,或者启动后按F8,到安全模式下删除。

二、添加服务
  在Windows XP系统的“服务”窗口中并不能添加或删除服务,常用的方法有以下几种:
  方法1:修改注册表
  在“开始→运行”中键入“regedit.exe”,打开“注册表编辑器”,展开分支“HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services”,在右侧窗格中显示的就是本机安装的服务项。
  如果要新建服务,只须点击“编辑→新建→项”,然后为此项命名,如“test”;然后右击该项,选择“新建→字符串值”或“新建→DWORD值”即可。添加一个服务项目具体需要添加的键值如下:
  “DisplayName”,字符串值,对应服务名称;
  “Descrīption”,字符串值,对应服务描述;
  “ImagePath”,字符串值,对应该服务程序所在的路径;
  “ObjectName”,字符串值,值为“LocalSystem”,表示本地登录;
  “ErrorControl”,DWORD值,值为“1”;
  “Start”,DWORD值,值为2表示自动运行,值为3表示手动运行,值为4表示禁止;
  “Type”,DWORD值,应用程序对应10,其他对应20。
  另外,还要在“test”项下新建一个“Enum”项。按照以上步骤添加QQ程序为服务,重新启动计算机后,打开“服务”窗口,就可以看到刚才添加的QQ服务(图2)
 如果要删除某项服务,只要删除注册表的中相关键值即可,本例中要删除QQ服务,直接删除“HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\test”分支即可。

参http://hi.baidu.com/zwfec/blog/item/61836406c2851e71020881c2.html