Jump to content











Photo
- - - - -

[LODR-U] VMware Workstation 6.5.1 - 6.5.3


  • Please log in to reply
36 replies to this topic

#26 sanbarrow

sanbarrow

    Silver Member

  • Developer
  • 788 posts
  • Location:Germany - Sauerland

Posted 18 February 2009 - 10:44 PM

Hi
usually I do not use vmauthdservice at all.
In Workstation only good reason you may want it is Unity - as that hardly makes sense on PE I never bothered about vmauthd.
VMware View might need it though ...

Ulli

#27 risolutore

risolutore

    Frequent Member

  • Advanced user
  • 311 posts
  •  
    Italy

Posted 18 February 2009 - 11:34 PM

so posting this type of pic is not againsta forum rules/policy ?? Sigh!

#28 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 19 February 2009 - 06:43 AM

By the way - do you have vmauthdservice running in your latest LODR-pack ?


Another thing came to my mind. Normally registry captures will miss entries in SAM and lsa-related, unless if the capturetool is executed under LocalSystem.

There might be entries there that simply is missing.

Have you looked at the service immediately after a fresh install in moa with the installer?

Joakim

#29 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 19 February 2009 - 07:15 AM

so posting this type of pic is not againsta forum rules/policy ?? Sigh!


Btw, the screenshots were already sensored after all, by sparing you for his genitals and inner organs. I thought it would be tolerated...., but hey...sorry. Did not mean to offend anybody.

Would a link to the screenshots do?

Joakim

#30 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 19 February 2009 - 08:11 AM

If an admin read this:

Can someone point me to where this project fits best? I mean, in which forum this thread strictly belongs to.

It is not more related to vistape than livexp or pebuilder, or any other PE project.

Joakim

#31 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 20 February 2009 - 08:49 PM

@Ulli
You requested vmauthdservice. I just ran this batch prior to executing the my loader on a real system:

[codebox]net localgroup __vmware__ /add net user __vmware_user__ /add net localgroup __vmware__ /add __vmware_user__[/codebox] It all set nicely up, even vmauthdservice.
Ok, so it also may work on real systems as well..??

Need to toggle the minint key to trick the loader.

Joakim

#32 sanbarrow

sanbarrow

    Silver Member

  • Developer
  • 788 posts
  • Location:Germany - Sauerland

Posted 20 February 2009 - 08:58 PM

I tried that already - it only works partially. I now use a larger sam-patch

#33 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 21 February 2009 - 08:20 PM

I tried that already - it only works partially. I now use a larger sam-patch


Does it work with that larger patch?

Is it similar to this?
Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account]"F"=hex(03):02,00,01,00,00,00,00,00,6c,fa,c4,e3,39,92,c8,01,19,00,00,00,00,\  00,00,00,00,00,00,00,40,de,ff,ff,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,80,00,cc,1d,cf,fb,ff,ff,ff,00,cc,1d,cf,fb,ff,ff,ff,00,00,00,00,00,00,00,\  00,ee,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,03,00,00,00,\  01,00,00,00,01,00,01,00,01,00,00,00,38,00,00,00,8f,77,a7,06,85,10,72,c6,97,\  91,e3,25,44,ac,c9,79,ed,e1,60,89,95,cd,db,13,e0,e5,cb,86,58,ad,c1,78,4c,20,\  a3,89,75,17,4a,55,8d,99,15,ee,3a,8f,81,37,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Aliases\000003EC]"C"=hex(03):ec,03,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,14,\  00,00,00,00,00,00,00,c4,00,00,00,22,00,00,00,00,00,00,00,e8,00,00,00,1c,00,\  00,00,01,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,\  00,02,00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,\  00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,\  00,4c,00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,\  00,00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,\  00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,\  01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,\  00,00,00,20,02,00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,\  5f,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,73,00,65,00,72,00,20,\  00,47,00,72,00,6f,00,75,00,70,00,00,00,01,05,00,00,00,00,00,05,15,00,00,00,\  07,e5,3b,2b,6c,79,80,69,43,17,0a,32,ed,03,00,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Aliases\Members\S-1-5-21-725345543-1770027372-839522115\000003ED]@="?"[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Aliases\Names\__vmware__]@=hex(ec):[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Groups\00000201]"C"=hex(03):02,00,01,00,01,02,00,00,07,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,08,00,00,00,00,00,00,00,b8,00,\  00,00,1c,00,00,00,00,00,00,00,d4,00,00,00,64,00,00,00,06,00,00,00,01,00,14,\  80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,00,30,00,02,00,00,00,\  02,c0,14,00,0e,00,05,01,01,01,00,00,00,00,00,01,00,00,00,00,02,c0,14,00,ff,\  ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,00,03,00,00,00,00,00,\  14,00,11,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,00,00,18,00,1f,00,0f,\  00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,00,18,00,1f,00,0f,00,\  01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,00,00,00,00,00,05,20,\  00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,4e,00,\  6f,00,6e,00,65,00,4f,00,72,00,64,00,69,00,6e,00,61,00,72,00,79,00,20,00,75,\  00,73,00,65,00,72,00,73,00,f4,01,00,00,f5,01,00,00,e8,03,00,00,ea,03,00,00,\  eb,03,00,00,ed,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\000003EB]"F"=hex(03):02,00,01,00,00,00,00,00,92,4c,6d,4e,93,93,c9,01,00,00,00,00,00,\  00,00,00,ac,a8,d9,cd,7e,92,c8,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\  00,00,eb,03,00,00,01,02,00,00,10,02,00,00,00,00,00,00,00,00,1e,00,01,00,00,\  00,00,00,e7,77,00,00,09,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\000003ED]"F"=hex(03):02,00,01,00,00,00,00,00,30,bf,12,66,93,93,c9,01,00,00,00,00,00,\  00,00,00,14,71,04,66,93,93,c9,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\  00,00,ed,03,00,00,01,02,00,00,10,00,00,00,00,00,00,00,00,00,02,00,00,00,00,\  00,00,00,ff,ff,bb,01,91,7c"V"=hex(03):00,00,00,00,d4,00,00,00,02,00,01,00,d4,00,00,00,1e,00,00,00,00,\  00,00,00,f4,00,00,00,1e,00,00,00,00,00,00,00,14,01,00,00,16,00,00,00,00,00,\  00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,\  00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,\  2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,\  01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,\  00,00,08,00,00,00,01,00,00,00,34,01,00,00,04,00,00,00,00,00,00,00,38,01,00,\  00,14,00,00,00,00,00,00,00,4c,01,00,00,04,00,00,00,00,00,00,00,50,01,00,00,\  04,00,00,00,00,00,00,00,01,00,14,80,b4,00,00,00,c4,00,00,00,14,00,00,00,44,\  00,00,00,02,00,30,00,02,00,00,00,02,c0,14,00,44,00,05,01,01,01,00,00,00,00,\  00,01,00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,\  00,02,00,70,00,04,00,00,00,00,00,14,00,5b,03,02,00,01,01,00,00,00,00,00,01,\  00,00,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,\  02,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,\  00,00,00,00,24,00,44,00,02,00,01,05,00,00,00,00,00,05,15,00,00,00,07,e5,3b,\  2b,6c,79,80,69,43,17,0a,32,ed,03,00,00,01,02,00,00,00,00,00,05,20,00,00,00,\  20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,5f,00,5f,00,76,\  00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,00,72,00,5f,00,5f,00,\  00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,\  00,72,00,5f,00,5f,00,00,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,\  73,00,65,00,72,00,01,00,01,02,00,00,07,00,00,00,01,00,01,00,01,00,01,00,4e,\  03,9c,ca,b1,a7,ce,b2,dd,7c,07,99,08,70,3b,2d,01,00,01,00,01,00,01,00[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\Names\__vmware_user__]@=hex(ed):[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004]@=hex(03):[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004\ActSysAc]@=hex(00):01,00,00,00[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004\SecDesc]@=hex(00):01,00,04,80,48,00,00,00,58,00,00,00,00,00,00,00,14,00,00,00,02,00,\  34,00,02,00,00,00,00,00,18,00,0f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,\  00,20,02,00,00,00,00,14,00,00,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,\  01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,01,00,00,00,00,00,05,12,\  00,00,00[HKEY_LOCAL_MACHINE\SECURITY\Policy\Accounts\S-1-5-21-725345543-1770027372-839522115-1004\Sid]@=hex(00):01,05,00,00,00,00,00,05,15,00,00,00,07,e5,3b,2b,6c,79,80,69,43,17,\  0a,32,ec,03,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account]"F"=hex(03):02,00,01,00,00,00,00,00,6c,fa,c4,e3,39,92,c8,01,19,00,00,00,00,\  00,00,00,00,00,00,00,40,de,ff,ff,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,80,00,cc,1d,cf,fb,ff,ff,ff,00,cc,1d,cf,fb,ff,ff,ff,00,00,00,00,00,00,00,\  00,ee,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,03,00,00,00,\  01,00,00,00,01,00,01,00,01,00,00,00,38,00,00,00,8f,77,a7,06,85,10,72,c6,97,\  91,e3,25,44,ac,c9,79,ed,e1,60,89,95,cd,db,13,e0,e5,cb,86,58,ad,c1,78,4c,20,\  a3,89,75,17,4a,55,8d,99,15,ee,3a,8f,81,37,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Aliases\000003EC]"C"=hex(03):ec,03,00,00,00,00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,14,\  00,00,00,00,00,00,00,c4,00,00,00,22,00,00,00,00,00,00,00,e8,00,00,00,1c,00,\  00,00,01,00,00,00,01,00,14,80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,\  00,02,00,30,00,02,00,00,00,02,c0,14,00,13,00,05,01,01,01,00,00,00,00,00,01,\  00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,\  00,4c,00,03,00,00,00,00,00,14,00,0c,00,02,00,01,01,00,00,00,00,00,01,00,00,\  00,00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,\  00,00,00,18,00,1f,00,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,\  01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,\  00,00,00,20,02,00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,\  5f,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,73,00,65,00,72,00,20,\  00,47,00,72,00,6f,00,75,00,70,00,00,00,01,05,00,00,00,00,00,05,15,00,00,00,\  07,e5,3b,2b,6c,79,80,69,43,17,0a,32,ed,03,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Aliases\Members\S-1-5-21-725345543-1770027372-839522115\000003ED]@="?"[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Aliases\Names\__vmware__]@=hex(ec):[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Groups\00000201]"C"=hex(03):02,00,01,00,01,02,00,00,07,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,b0,00,00,00,02,00,01,00,b0,00,00,00,08,00,00,00,00,00,00,00,b8,00,\  00,00,1c,00,00,00,00,00,00,00,d4,00,00,00,64,00,00,00,06,00,00,00,01,00,14,\  80,90,00,00,00,a0,00,00,00,14,00,00,00,44,00,00,00,02,00,30,00,02,00,00,00,\  02,c0,14,00,0e,00,05,01,01,01,00,00,00,00,00,01,00,00,00,00,02,c0,14,00,ff,\  ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,00,4c,00,03,00,00,00,00,00,\  14,00,11,00,02,00,01,01,00,00,00,00,00,01,00,00,00,00,00,00,18,00,1f,00,0f,\  00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,00,18,00,1f,00,0f,00,\  01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,01,02,00,00,00,00,00,05,20,\  00,00,00,20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,4e,00,\  6f,00,6e,00,65,00,4f,00,72,00,64,00,69,00,6e,00,61,00,72,00,79,00,20,00,75,\  00,73,00,65,00,72,00,73,00,f4,01,00,00,f5,01,00,00,e8,03,00,00,ea,03,00,00,\  eb,03,00,00,ed,03,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\  00,00,00,00,00,00,00,00,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Users\000003EB]"F"=hex(03):02,00,01,00,00,00,00,00,92,4c,6d,4e,93,93,c9,01,00,00,00,00,00,\  00,00,00,ac,a8,d9,cd,7e,92,c8,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\  00,00,eb,03,00,00,01,02,00,00,10,02,00,00,00,00,00,00,00,00,1e,00,01,00,00,\  00,00,00,e7,77,00,00,09,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Users\000003ED]"F"=hex(03):02,00,01,00,00,00,00,00,30,bf,12,66,93,93,c9,01,00,00,00,00,00,\  00,00,00,14,71,04,66,93,93,c9,01,ff,ff,ff,ff,ff,ff,ff,7f,00,00,00,00,00,00,\  00,00,ed,03,00,00,01,02,00,00,10,00,00,00,00,00,00,00,00,00,02,00,00,00,00,\  00,00,00,ff,ff,bb,01,91,7c"V"=hex(03):00,00,00,00,d4,00,00,00,02,00,01,00,d4,00,00,00,1e,00,00,00,00,\  00,00,00,f4,00,00,00,1e,00,00,00,00,00,00,00,14,01,00,00,16,00,00,00,00,00,\  00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,\  00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,\  2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,\  01,00,00,00,00,00,00,00,00,00,00,2c,01,00,00,00,00,00,00,00,00,00,00,2c,01,\  00,00,08,00,00,00,01,00,00,00,34,01,00,00,04,00,00,00,00,00,00,00,38,01,00,\  00,14,00,00,00,00,00,00,00,4c,01,00,00,04,00,00,00,00,00,00,00,50,01,00,00,\  04,00,00,00,00,00,00,00,01,00,14,80,b4,00,00,00,c4,00,00,00,14,00,00,00,44,\  00,00,00,02,00,30,00,02,00,00,00,02,c0,14,00,44,00,05,01,01,01,00,00,00,00,\  00,01,00,00,00,00,02,c0,14,00,ff,ff,1f,00,01,01,00,00,00,00,00,05,07,00,00,\  00,02,00,70,00,04,00,00,00,00,00,14,00,5b,03,02,00,01,01,00,00,00,00,00,01,\  00,00,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,\  02,00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,\  00,00,00,00,24,00,44,00,02,00,01,05,00,00,00,00,00,05,15,00,00,00,07,e5,3b,\  2b,6c,79,80,69,43,17,0a,32,ed,03,00,00,01,02,00,00,00,00,00,05,20,00,00,00,\  20,02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,5f,00,5f,00,76,\  00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,00,72,00,5f,00,5f,00,\  00,00,5f,00,5f,00,76,00,6d,00,77,00,61,00,72,00,65,00,5f,00,75,00,73,00,65,\  00,72,00,5f,00,5f,00,00,00,56,00,4d,00,77,00,61,00,72,00,65,00,20,00,55,00,\  73,00,65,00,72,00,01,00,01,02,00,00,07,00,00,00,01,00,01,00,01,00,01,00,4e,\  03,9c,ca,b1,a7,ce,b2,dd,7c,07,99,08,70,3b,2d,01,00,01,00,01,00,01,00[HKEY_LOCAL_MACHINE\SECURITY\SAM\Domains\Account\Users\Names\__vmware_user__]@=hex(ed):

Maybe a bit too much, but this was everything sam-related the installer modified.

Joakim

#34 Lancelot

Lancelot

    Frequent Member

  • .script developer
  • 5013 posts
  • Location:Turkiye/Izmir
  • Interests:*Mechanical stuff and Physics,
    *LiveXP, BartPE, SherpyaXPE,
    *Basketball and Looong Walking,
    *Buying outwear for my girlf (Reason: Girls are stupid about buying bad stuff to make themselves uglier :))
    *Girls (Lyric: Girl,...., You will be a womann, Soon)
    *Answering questions for "Meaning of life",
    *Helping people,

    Kung with LiveXP, Fu with Peter :)
  •  
    Turkey

Posted 03 March 2009 - 04:17 PM

Can someone point me to where this project fits best? I mean, in which forum this thread strictly belongs to.

It is not more related to vistape than livexp or pebuilder, or any other PE project.

Joakim


VistaPE section is definately the wrong place :cheers:.

Portable apps sections seems to be the right place with a wrong result. Right because this is a portable application. "Wrong Result" because when a user searchs for applications to use with the PE (vistape, livexp, nativeex barabone...) (s)he will simply looks at apps script section which will result missing this wonderful work you do.


For now i guess best fits "App Scripts". Topics in "App Scripts" section very mostly can be used with other project(s) and if not warned by author on post1 (also a lot of them are in fact portable applications). This is not a script based project but I believe "App Scripts" will hit the point mostly demanded.


So my idea is:
at App Scripts section
Title:
VMware Workstation 6.5.1 [LOD]
Description:
Tested with PE (LiveXP/VistaPE) and OS (xp/2003/vista/2008)


maybe in future when there are too many LOD project topics we may have different "App Scripts - LOD" section :cheers:.


ps: I guess admins would move to section you want when you decide or you may create a new topic, further is up to you, only sharing my ideas.

#35 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 19 April 2009 - 09:37 PM

New improved loader for version 6.5.2 as well as the vc_patcher;

http://www.mediafire.../ws652_LODR.rar
http://www.mediafire...tcher_v1002.rar

Some of the fixed stuff;

- Removed the need to push any button to accept driveletter
- Fixed some bugs that prevented some services to register in 2008 server edition builds (kernel 6001)
- Fixed a bug in the vc_patcher that also throwed errors in 2008 server edition builds
- License can be auto-applied by the loader if put in a file called registration.reg. Copy this key from registry; [HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Workstation\License.ws.6.0.200907]
- Added one small tool to modify all vmware services (start/stop/install/uninstall).
- Reorganised all shortcuts generated and added a few others to the startmenu in LODR
- Removed the need for LODR_package.ini

Some information for those that do not have a license key for workstation;

You will still be able to create and modify virtual machine settings in the workstation GUI console. You will only be prevented to run the virtual machines in workstation.

RUN the vm's in player instead. It is included as well.


Joakim

#36 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 14 September 2009 - 01:08 PM

New improved version for VMware Workstation 6.5.3

ws653_LODR

from the readme.txt;
Still the same LODR concept, and some fixes of previous versions.



New:

- get_license.exe will export your license from registry and save as license.reg (put it in directory with the rest of the files).

- ws653_Preparation.exe will unpack the installer (VMware-workstation-6.5.3-185404.exe) and prepare the files. Downloads it if not present in current directory.

- The Import (conversion) wizard now works really good, even as a coldclone solution.



About Conversion Wizard:

When converting local drives (irrelevant for other type of imports), you have to tweak the WinPE key in registry. The are two shortcuts generated in startmenu, "coldclone_on" and "coldclone_off". It is important to delete the WinPE key by clicking coldclone_off prior to launching the Conversion Wizard. When you have reached "Step 2: Destination" and "Name & Location", you must set the WinPE key on by clicking coldclone_on. The reason is that the code for the Conversion Wizard comes from Converter 3.0.3, which needed a license for install-less mode. This of course has nothing to do with VMware Workstation as it was never meant for install-less mode. It's just proof that someone was lazy. Without this switching of the WinPE key, snapshots will fail. As mentioned before, license is only needed for running the vm's in Workstation (but you can of course use the free and included Player for that.).



How to:

Put the loader, ws653_LODR.exe, inside the prepared directory and execute it from a running PE.

Joakim

#37 joakim

joakim

    Silver Member

  • Team Reboot
  • 912 posts
  • Location:Bergen
  •  
    Norway

Posted 22 September 2009 - 04:36 PM

New version with support for Win7Pe based on RC1.

ws653_LODR_v4.zip

And a Visual C Runtime patcher for Win7Pe (RC1).

vc_patcher_win7rc1.zip

Does NOT work with beta sources!

Joakim




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users