[LODR-U] VMware Workstation 6.5.1 - 6.5.3
#26
Posted 18 February 2009 - 10:44 PM
usually I do not use vmauthdservice at all.
In Workstation only good reason you may want it is Unity - as that hardly makes sense on PE I never bothered about vmauthd.
VMware View might need it though ...
Ulli
#27
Posted 18 February 2009 - 11:34 PM
#28
Posted 19 February 2009 - 06:43 AM
By the way - do you have vmauthdservice running in your latest LODR-pack ?
Another thing came to my mind. Normally registry captures will miss entries in SAM and lsa-related, unless if the capturetool is executed under LocalSystem.
There might be entries there that simply is missing.
Have you looked at the service immediately after a fresh install in moa with the installer?
Joakim
#29
Posted 19 February 2009 - 07:15 AM
so posting this type of pic is not againsta forum rules/policy ?? Sigh!
Btw, the screenshots were already sensored after all, by sparing you for his genitals and inner organs. I thought it would be tolerated...., but hey...sorry. Did not mean to offend anybody.
Would a link to the screenshots do?
Joakim
#30
Posted 19 February 2009 - 08:11 AM
Can someone point me to where this project fits best? I mean, in which forum this thread strictly belongs to.
It is not more related to vistape than livexp or pebuilder, or any other PE project.
Joakim
#31
Posted 20 February 2009 - 08:49 PM
You requested vmauthdservice. I just ran this batch prior to executing the my loader on a real system:
[codebox]net localgroup __vmware__ /add net user __vmware_user__ /add net localgroup __vmware__ /add __vmware_user__[/codebox] It all set nicely up, even vmauthdservice.
Ok, so it also may work on real systems as well..??
Need to toggle the minint key to trick the loader.
Joakim
#32
Posted 20 February 2009 - 08:58 PM
#33
Posted 21 February 2009 - 08:20 PM
I tried that already - it only works partially. I now use a larger sam-patch
Does it work with that larger patch?
Is it similar to this?
Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account]"F"=hex(03):02,00,01,00,00,00,00,00,6c,fa,c4,e3,39,92,c8,01,19,00,00,00,00,\ 00,00,00,00,00,00,00,40,de,ff,ff,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,80,00,cc,1d,cf,fb,ff,ff,ff,00,cc,1d,cf,fb,ff,ff,ff,00,00,00,00,00,00,00,\ 00,ee,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,03,00,00,00,\ 01,00,00,00,01,00,01,00,01,00,00,00,38,00,00,00,8f,77,a7,06,85,10,72,c6,97,\ 91,e3,25,44,ac,c9,79,ed,e1,60,89,95,cd,db,13,e0,e5,cb,86,58,ad,c1,78,4c,20,\ a3,89,75,17,4a,55,8d,99,15,ee,3a,8f,81,37,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Aliases\000003EC]"C"=hex(03):ec,03,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,14,\ 00,00,00,00,00,00,00,c4,00,00,00,22,00,00,00,00,00,00,00,e8,00,00,00,1c,00,\ 00,00,01,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,\ 00,02,00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,\ 00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,\ 00,4c,00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,\ 00,00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,\ 00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,\ 01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,\ 00,00,00,20,02,00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,\ 5f,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,73,00,65,00,72,00,20,\ 00,47,00,72,00,6f,00,75,00,70,00,00,00,01,05,00,00,00,00,00,05,15,00,00,00,\ 07,e5,3b,2b,6c,79,80,69,43,17,0a,32,ed,03,00,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Aliases\Members\S-1-5-21-725345543-1770027372-839522115\000003ED]@="?"[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Aliases\Names\__vmware__]@=hex(ec):[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Groups\00000201]"C"=hex(03):02,00,01,00,01,02,00,00,07,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,08,00,00,00,00,00,00,00,b8,00,\ 00,00,1c,00,00,00,00,00,00,00,d4,00,00,00,64,00,00,00,06,00,00,00,01,00,14,\ 80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,00,30,00,02,00,00,00,\ 02,c0,14,00,0e,00,05,01,01,01,00,00,00,00,00,01,00,00,00,00,02,c0,14,00,ff,\ ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,00,03,00,00,00,00,00,\ 14,00,11,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,00,00,18,00,1f,00,0f,\ 00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,00,18,00,1f,00,0f,00,\ 01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,00,00,00,00,00,05,20,\ 00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,4e,00,\ 6f,00,6e,00,65,00,4f,00,72,00,64,00,69,00,6e,00,61,00,72,00,79,00,20,00,75,\ 00,73,00,65,00,72,00,73,00,f4,01,00,00,f5,01,00,00,e8,03,00,00,ea,03,00,00,\ eb,03,00,00,ed,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\000003EB]"F"=hex(03):02,00,01,00,00,00,00,00,92,4c,6d,4e,93,93,c9,01,00,00,00,00,00,\ 00,00,00,ac,a8,d9,cd,7e,92,c8,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\ 00,00,eb,03,00,00,01,02,00,00,10,02,00,00,00,00,00,00,00,00,1e,00,01,00,00,\ 00,00,00,e7,77,00,00,09,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\000003ED]"F"=hex(03):02,00,01,00,00,00,00,00,30,bf,12,66,93,93,c9,01,00,00,00,00,00,\ 00,00,00,14,71,04,66,93,93,c9,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\ 00,00,ed,03,00,00,01,02,00,00,10,00,00,00,00,00,00,00,00,00,02,00,00,00,00,\ 00,00,00,ff,ff,bb,01,91,7c"V"=hex(03):00,00,00,00,d4,00,00,00,02,00,01,00,d4,00,00,00,1e,00,00,00,00,\ 00,00,00,f4,00,00,00,1e,00,00,00,00,00,00,00,14,01,00,00,16,00,00,00,00,00,\ 00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,\ 00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,\ 2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,\ 01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,\ 00,00,08,00,00,00,01,00,00,00,34,01,00,00,04,00,00,00,00,00,00,00,38,01,00,\ 00,14,00,00,00,00,00,00,00,4c,01,00,00,04,00,00,00,00,00,00,00,50,01,00,00,\ 04,00,00,00,00,00,00,00,01,00,14,80,b4,00,00,00,c4,00,00,00,14,00,00,00,44,\ 00,00,00,02,00,30,00,02,00,00,00,02,c0,14,00,44,00,05,01,01,01,00,00,00,00,\ 00,01,00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,\ 00,02,00,70,00,04,00,00,00,00,00,14,00,5b,03,02,00,01,01,00,00,00,00,00,01,\ 00,00,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,\ 02,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,\ 00,00,00,00,24,00,44,00,02,00,01,05,00,00,00,00,00,05,15,00,00,00,07,e5,3b,\ 2b,6c,79,80,69,43,17,0a,32,ed,03,00,00,01,02,00,00,00,00,00,05,20,00,00,00,\ 20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,5f,00,5f,00,76,\ 00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,00,72,00,5f,00,5f,00,\ 00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,\ 00,72,00,5f,00,5f,00,00,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,\ 73,00,65,00,72,00,01,00,01,02,00,00,07,00,00,00,01,00,01,00,01,00,01,00,4e,\ 03,9c,ca,b1,a7,ce,b2,dd,7c,07,99,08,70,3b,2d,01,00,01,00,01,00,01,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\Names\__vmware_user__]@=hex(ed):[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004]@=hex(03):[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004\ActSysAc]@=hex(00):01,00,00,00[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004\SecDesc]@=hex(00):01,00,04,80,48,00,00,00,58,00,00,00,00,00,00,00,14,00,00,00,02,00,\ 34,00,02,00,00,00,00,00,18,00,0f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,\ 00,20,02,00,00,00,00,14,00,00,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\ 01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,01,00,00,00,00,00,05,12,\ 00,00,00[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004\Sid]@=hex(00):01,05,00,00,00,00,00,05,15,00,00,00,07,e5,3b,2b,6c,79,80,69,43,17,\ 0a,32,ec,03,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account]"F"=hex(03):02,00,01,00,00,00,00,00,6c,fa,c4,e3,39,92,c8,01,19,00,00,00,00,\ 00,00,00,00,00,00,00,40,de,ff,ff,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,80,00,cc,1d,cf,fb,ff,ff,ff,00,cc,1d,cf,fb,ff,ff,ff,00,00,00,00,00,00,00,\ 00,ee,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,03,00,00,00,\ 01,00,00,00,01,00,01,00,01,00,00,00,38,00,00,00,8f,77,a7,06,85,10,72,c6,97,\ 91,e3,25,44,ac,c9,79,ed,e1,60,89,95,cd,db,13,e0,e5,cb,86,58,ad,c1,78,4c,20,\ a3,89,75,17,4a,55,8d,99,15,ee,3a,8f,81,37,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Aliases\000003EC]"C"=hex(03):ec,03,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,14,\ 00,00,00,00,00,00,00,c4,00,00,00,22,00,00,00,00,00,00,00,e8,00,00,00,1c,00,\ 00,00,01,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,\ 00,02,00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,\ 00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,\ 00,4c,00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,\ 00,00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,\ 00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,\ 01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,\ 00,00,00,20,02,00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,\ 5f,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,73,00,65,00,72,00,20,\ 00,47,00,72,00,6f,00,75,00,70,00,00,00,01,05,00,00,00,00,00,05,15,00,00,00,\ 07,e5,3b,2b,6c,79,80,69,43,17,0a,32,ed,03,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Aliases\Members\S-1-5-21-725345543-1770027372-839522115\000003ED]@="?"[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Aliases\Names\__vmware__]@=hex(ec):[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Groups\00000201]"C"=hex(03):02,00,01,00,01,02,00,00,07,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,08,00,00,00,00,00,00,00,b8,00,\ 00,00,1c,00,00,00,00,00,00,00,d4,00,00,00,64,00,00,00,06,00,00,00,01,00,14,\ 80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,00,30,00,02,00,00,00,\ 02,c0,14,00,0e,00,05,01,01,01,00,00,00,00,00,01,00,00,00,00,02,c0,14,00,ff,\ ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,00,03,00,00,00,00,00,\ 14,00,11,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,00,00,18,00,1f,00,0f,\ 00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,00,18,00,1f,00,0f,00,\ 01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,00,00,00,00,00,05,20,\ 00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,4e,00,\ 6f,00,6e,00,65,00,4f,00,72,00,64,00,69,00,6e,00,61,00,72,00,79,00,20,00,75,\ 00,73,00,65,00,72,00,73,00,f4,01,00,00,f5,01,00,00,e8,03,00,00,ea,03,00,00,\ eb,03,00,00,ed,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\ 00,00,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Users\000003EB]"F"=hex(03):02,00,01,00,00,00,00,00,92,4c,6d,4e,93,93,c9,01,00,00,00,00,00,\ 00,00,00,ac,a8,d9,cd,7e,92,c8,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\ 00,00,eb,03,00,00,01,02,00,00,10,02,00,00,00,00,00,00,00,00,1e,00,01,00,00,\ 00,00,00,e7,77,00,00,09,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Users\000003ED]"F"=hex(03):02,00,01,00,00,00,00,00,30,bf,12,66,93,93,c9,01,00,00,00,00,00,\ 00,00,00,14,71,04,66,93,93,c9,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\ 00,00,ed,03,00,00,01,02,00,00,10,00,00,00,00,00,00,00,00,00,02,00,00,00,00,\ 00,00,00,ff,ff,bb,01,91,7c"V"=hex(03):00,00,00,00,d4,00,00,00,02,00,01,00,d4,00,00,00,1e,00,00,00,00,\ 00,00,00,f4,00,00,00,1e,00,00,00,00,00,00,00,14,01,00,00,16,00,00,00,00,00,\ 00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,\ 00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,\ 2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,\ 01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,\ 00,00,08,00,00,00,01,00,00,00,34,01,00,00,04,00,00,00,00,00,00,00,38,01,00,\ 00,14,00,00,00,00,00,00,00,4c,01,00,00,04,00,00,00,00,00,00,00,50,01,00,00,\ 04,00,00,00,00,00,00,00,01,00,14,80,b4,00,00,00,c4,00,00,00,14,00,00,00,44,\ 00,00,00,02,00,30,00,02,00,00,00,02,c0,14,00,44,00,05,01,01,01,00,00,00,00,\ 00,01,00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,\ 00,02,00,70,00,04,00,00,00,00,00,14,00,5b,03,02,00,01,01,00,00,00,00,00,01,\ 00,00,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,\ 02,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,\ 00,00,00,00,24,00,44,00,02,00,01,05,00,00,00,00,00,05,15,00,00,00,07,e5,3b,\ 2b,6c,79,80,69,43,17,0a,32,ed,03,00,00,01,02,00,00,00,00,00,05,20,00,00,00,\ 20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,5f,00,5f,00,76,\ 00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,00,72,00,5f,00,5f,00,\ 00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,\ 00,72,00,5f,00,5f,00,00,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,\ 73,00,65,00,72,00,01,00,01,02,00,00,07,00,00,00,01,00,01,00,01,00,01,00,4e,\ 03,9c,ca,b1,a7,ce,b2,dd,7c,07,99,08,70,3b,2d,01,00,01,00,01,00,01,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Users\Names\__vmware_user__]@=hex(ed):
Maybe a bit too much, but this was everything sam-related the installer modified.
Joakim
#34
Posted 03 March 2009 - 04:17 PM
Can someone point me to where this project fits best? I mean, in which forum this thread strictly belongs to.
It is not more related to vistape than livexp or pebuilder, or any other PE project.
Joakim
VistaPE section is definately the wrong place .
Portable apps sections seems to be the right place with a wrong result. Right because this is a portable application. "Wrong Result" because when a user searchs for applications to use with the PE (vistape, livexp, nativeex barabone...) (s)he will simply looks at apps script section which will result missing this wonderful work you do.
For now i guess best fits "App Scripts". Topics in "App Scripts" section very mostly can be used with other project(s) and if not warned by author on post1 (also a lot of them are in fact portable applications). This is not a script based project but I believe "App Scripts" will hit the point mostly demanded.
So my idea is:
at App Scripts section
Title:
VMware Workstation 6.5.1 [LOD]
Description:
Tested with PE (LiveXP/VistaPE) and OS (xp/2003/vista/2008)
maybe in future when there are too many LOD project topics we may have different "App Scripts - LOD" section .
ps: I guess admins would move to section you want when you decide or you may create a new topic, further is up to you, only sharing my ideas.
#35
Posted 19 April 2009 - 09:37 PM
http://www.mediafire.../ws652_LODR.rar
http://www.mediafire...tcher_v1002.rar
Some of the fixed stuff;
- Removed the need to push any button to accept driveletter
- Fixed some bugs that prevented some services to register in 2008 server edition builds (kernel 6001)
- Fixed a bug in the vc_patcher that also throwed errors in 2008 server edition builds
- License can be auto-applied by the loader if put in a file called registration.reg. Copy this key from registry; [HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Workstation\License.ws.6.0.200907]
- Added one small tool to modify all vmware services (start/stop/install/uninstall).
- Reorganised all shortcuts generated and added a few others to the startmenu in LODR
- Removed the need for LODR_package.ini
Some information for those that do not have a license key for workstation;
You will still be able to create and modify virtual machine settings in the workstation GUI console. You will only be prevented to run the virtual machines in workstation.
RUN the vm's in player instead. It is included as well.
Joakim
#36
Posted 14 September 2009 - 01:08 PM
ws653_LODR
from the readme.txt;
Still the same LODR concept, and some fixes of previous versions. New: - get_license.exe will export your license from registry and save as license.reg (put it in directory with the rest of the files). - ws653_Preparation.exe will unpack the installer (VMware-workstation-6.5.3-185404.exe) and prepare the files. Downloads it if not present in current directory. - The Import (conversion) wizard now works really good, even as a coldclone solution. About Conversion Wizard: When converting local drives (irrelevant for other type of imports), you have to tweak the WinPE key in registry. The are two shortcuts generated in startmenu, "coldclone_on" and "coldclone_off". It is important to delete the WinPE key by clicking coldclone_off prior to launching the Conversion Wizard. When you have reached "Step 2: Destination" and "Name & Location", you must set the WinPE key on by clicking coldclone_on. The reason is that the code for the Conversion Wizard comes from Converter 3.0.3, which needed a license for install-less mode. This of course has nothing to do with VMware Workstation as it was never meant for install-less mode. It's just proof that someone was lazy. Without this switching of the WinPE key, snapshots will fail. As mentioned before, license is only needed for running the vm's in Workstation (but you can of course use the free and included Player for that.). How to: Put the loader, ws653_LODR.exe, inside the prepared directory and execute it from a running PE.
Joakim
#37
Posted 22 September 2009 - 04:36 PM
ws653_LODR_v4.zip
And a Visual C Runtime patcher for Win7Pe (RC1).
vc_patcher_win7rc1.zip
Does NOT work with beta sources!
Joakim
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users