Free Essay

Windows Recovery

In:

Submitted By harry12345
Words 760
Pages 4
WINDOWS 7 RECOVERY ENVIRONMENT ON A USB STICK

STEP 1

PREPARE THE USB STICK

• A 1 gigabyte USB stick will more than suffice.

• Use DISKPART to prepare the USB stick to be bootable

DISKPART

• Powerful

• Dangerous if misused

• Command-line program

RUN DISKPART

Ctrl + Esc | type Powershell or Cmd in the “Search Box’ | hit Enter|

Type DISKPART | hit Enter

Enter following DISKPART commands:

List disk (optional to help you specify the correct “index” number)

select disk 1 (for the case of 1 hard drive, assigned index of 0, and 1 USB stick)

detail disk (info will help verify that you’ve selected the desired USB stick)

clean {Removes all partition or volume formatting from disk with focus)

create partition primary {create a primary partition|

select partition 1 {select the partition you just created)

active (mark the partition as Active, ie, a system bootable partition)

format quick fs=fat32 (format the partition as Fat32)

assign (assign next available drive letter to the volume)

exit (exit DISKPART and return to the command-shell prompt)

Type EXIT | hit ENTER Exit from the command-shell.

REMOVE THE USB STICK

STEP 2

DOWNLOAD & INSTALL WIN 7 AUTOMATED INSTALLATION KIT (AIK)

The Win 7 AIK is a set of tools and documentation that support the configuration and deployment of Windows® operating systems

DOWNLOAD THE AIK

The Windows® Automated Installation Kit (AIK) for Windows® 7 RC download URL is:

http://www.microsoft.com/downloadS/details.aspx?familyid=60A07E71-0ACB-453A-8035-D30EAD27EF72&displaylang=en

You will be downloading a 1.40 GB (1,505,271,808 bytes) ISO file.

BURN THE AIK ISO FILE

Win 7 comes with a very primitive command-line ISO burner, named, ISOBURN.EXE which is located in your \windows directory. You can use ISOBURN.EXE, I did, to burn the ISO to a DVD.

Don’t have a computer with Win 7 installed handy? Use the free Active@ ISOBURNER. The URL is: http://software.lsoft.net/IsoBurner-Setup.exe

Burn the ISO to a DVD.

INSTALL THE AIK

Run the AutoRun.Inf file on the DVD.

Take a short break while the Win 7 Automated Installation Kit (AIK) is installed.

After installation, you will have: • \Program Files\Windows AIK folder (with sub-folders)

• Entry for Windows AIK in your “All Programs” menu.

STEP 3

BUILD A PE (Pre-Execution Environment) DIRECTORY

Microsoft PE tools expect a certain directory structure. Use COPYPE.CMD to build this directory structure.

COPYPE.CMD is located in C:\Program Files\Windows AIK\Tools\PETools.

With Windows Explorer (Win + E) navigate to: C:\Program Files\Windows AIK\Tools\PETools

Shift + right-click on C:\Program Files\Windows AIK\Tools\PETools

Select “Open command windows here”.

Now that you’re at a DOS prompt, enter:

COPYPE.CMD x86 C:\WinRE where you use x86 or amd64 as appropriate.

Hit Enter key and the copype.cmd will run.

Note: winre as a folder name is not sacred, just the name used in this tutorial.

After the PE directory structure is built, then:

Type EXIT and hit Enter (to close the command window and return).

STEP 4

EXTRACT WINRE.WIM FROM THE PRODUCT DVD

Make directories:

CD C:\

MD \OSimage

MD \OSimage\mount

Copy Install.Wim from your product DVD. M: represents your DVD drive.

COPY M:\Sources\install.wim C:\OSimage

Change to the directory with DISM.EXE . Do NOT use \windows\system32\dism.exe.

CD c:\”program files\windows aik\tools\servicing”

DISM /MOUNT-WIM /MOUNTDIR:C:\OSIMAGE\mount /WIMFILE:C:\OSIMAGE\INSTALL.WIM /INDEX:1

Copy the WinRE.WIM to C:\WinRe

copy C:\OSIMAGE\mount\windowssystem32\recovery\winre.wim C:\winre

Unmount the Install.Wim file.

DISM /UNMOUNT-WIM /MOUNTDIR:C:\OSIMAGE\mount /DISCARD

STEP 5

PREPARE THE WINDOWS BOOT IMAGE

Mount the Window RE file

DISM /MOUNT-WIM /MOUNTDIR:C:\winre\mount /WIMFILE:C:\winre\winre.wim /INDEX:1

Dismount the WinRE.Wim file

DISM /UNMOUNT-WIN /MOUNTDIR:C:\WINRE\mount /COMMIT

STEP 6

PUT THE WINDOWS RECOVERY ENVIRONMENT ON THE USB STICK

Copy, WITH RENAME, the image file to the \iso\sources subfolder

COPY C:\WINRE\WINRE.WIM C:\WINRE\ISO\SOURCES\BOOT.WIM

Copy the entire \winre\iso folder and its subfolders to the usb stick

Xcopy c:\winre\iso\*.* d:\ /e

Congratulations!

You may now “Eject” your USB stick.

Shutdown your computer. Insert your RE (Recovery Environment) USB stick, start your computer, and you will end up at the System Recovery window.

This assumes that you’ve previously booted into the BIOS setup and moved “Boot from USB” to the top of the boot order.

Similar Documents

Free Essay

Carnival Cruis

...arm movement: outsweep, insweep, and recovery. The movement starts with the outsweep. From the initial position, the hands sink a little bit down and the palms face inward, and the hands rotate outward and move apart. During the outsweep the arms stay almost straight and parallel to the surface. The outsweep is followed by the insweep, where the hands point down and push the water backwards. The elbows stay in the horizontal plane through the shoulders. The hands push back until approximately the vertical plane through the shoulders. At the end of the insweep the hands come together with facing palms in front of the chest and the elbows are at the side at the body. In the recovery phase the hands are moved forward again into the initial position under water. The entire arm stroke starts slowly, increases speed to the peak arm movement speed in the insweep phase, and slows down again during recovery. The goal is to produce maximum thrust during the insweep phase, and minimum drag during the recovery phase. As a variant, it is possible to recover the arms over water. This reduces drag, but requires more power. Some competitive swimmers use this variant in competition. Another variant is the underwater pull-down, similar to the push phase of a butterfly stroke. This stroke continues the insweep phase and pushes the hands all the way to the back to the sides of the hip. This greatly increases the push from one stroke, but also makes recovery more difficult. This style is well suited...

Words: 753 - Pages: 4

Premium Essay

Nt1230 Project

...Home Hospice Care (HHC) Project May 22, 2015 [pic] This project involves establishing a client-server based network in the Home Hospice Care building along with a wireless network (WLAN). We will be installing a Windows 2012 Server running the required Medical Management software along with a backup solution. The diagram below shows the current floor plan for HHC. It should be noted that more workstations, printers and laptops will be added (see next page). Additionally, wireless access points will be setup in the bullpen areas, designed with limited distance access. Floor Plan of Home Hospice [pic] The above illustration shows the floor plan for HHC. The equipment in the table below is what we’ll be requiring: |Employee Title |Computers | | |Needed | [pic] The table below indicates level of file permissions for the various positions [pic] Network Disaster Recovery Plan (This Draft will be finalized when approved by Management) Home Hospice Care (HHC) Emergency notification contacts |Name |Address |Home Phone |Mobile/Cell Phone | |Office Manager | | | | |Director of Prof Svcs | ...

Words: 1030 - Pages: 5

Free Essay

Breaking Food Addiction: the Story of Amber

...society that puts blame and shame on the obese. But an involvement with a 12 step program put her on a path to truth of self, recovery and eventually life changing weight loss. “Prior to being introduced to 12 steps, my life was about food and the acquisition of it,” said Amber. Only 48 months ago Amber weighed nearly 320 lbs with a dress size of 26. Tired of fad diets and breaking self promises, she turned to the help of the well-known 12 steps for addiction and as she put it ‘got real’ about her food addiction. She found a long term solution for her food issues in understanding the science of addiction to food and by committing herself to the 12 steps of addiction recovery. Both Amber and her colleague Dr. Vera Tarman agree that weight loss is only a result of the recovery process for the food addict. Amber went from sneaking food and staying away from public interactions to becoming an advocate for food addiction in the public eye, truly a real life success story. “The process of surrendering to addiction is difficult for most people,” said Dr. Tarman, Canada’s foremost food addiction expert. “For those people like Amber who embrace the science behind food addiction and the need to change the way they think and act; the results of recovery can be remarkable.” Today Amber has lost over 150 lbs and more importantly is totally committed to the recovery process, including abstinence from sugars and starch. “It’s one day at a time for me, like it is for most people recovering...

Words: 360 - Pages: 2

Free Essay

Sobriety

...drinking, to aquire a foundation for sobriety, and to providing service for the still sick and suffering alcoholic. There is a formal part of our Alcoholics Anonymous philosophy of life is four absolutes,the twelve steps,and the twelve traditions. Our sobriety had to become number one to gain a spirituality,mental,also physical well being while working the program. Because the Absolutes are not specifically repeated in our Steps or Traditions, some of us are inclined to forget them. Yet in many old time groups where the solid spirit of our fellowship is so strongly exemplified, the Absolutes receive frequent mention. A twelve-step program is a set of guiding principles outlining a course of action for recovery from addiction, compulsion, or other behavioral problems. The Twelve Traditions of twelve-step programs provide guidelines for relationships between the twelve-step groups, members, other groups, the global fellowship, and society at large. Often there are special beginner's, or "First Step,"meetings that are attended both by newcomers and those who have been sober a long time. The home group provides a foundation where they go every week, so people get to know them. Part of the home group functions are...

Words: 672 - Pages: 3

Free Essay

Help

...Questions 1. What happens to the data on the drive sent in for an RMA and can it be retrieved a. Customer confidentiality is a priority to Western Digital. When a drive is received at our facility, it is put through a rigorous testing process for analysis. During this process, all data on the drive is completely erased, and therefore irrecoverable. b. Consequently, if you need to recover the data on the drive, you must do so before returning the drive to us. As was stated in the above paragraph, once we receive the drive, all data is completely erased and irrecoverable. If you need data recovery, please click on the link below for a list of WD data recovery partners. Once they recover your data, you can then send the drive in for replacement. c. Answer ID 70: Can I recover data on my drive, obtain a circuit board, repair my drive, or find a list of WD data recovery partners?. 2. How to reset a WD My Cloud, Mirror, EX2, or EX4 Personal Cloud drive d. WD My Cloud i. With the device powered on, please insert a paperclip or narrow tipped pen into the Reset button slot on the back of the device, which is located right above the USB port of the unit. ii. Press and hold down the Reset button for four seconds. When the button is released, the device will reboot. This process may take up to three minutes to complete. e. Performing a System Restore through the Reset button iii. The Reset button may also be used to perform a System...

Words: 386 - Pages: 2

Premium Essay

Security Domains and Strategies Project

...User Domain: The first layer of security in a multi-layer security plan. It’s also the weakest in the IT Infrastructure. Certain protocols and procedures need to be followed. • Implement and Conduct Security Awareness Training. • Implement Acceptable Use Policy (AUP). • Monitor employee behaviors. • Restrict access to users to certain programs and areas. Workstation Domain: The second layer of security in a MLS plan. This is where most users connect via Workstation computers, PDA’s, Laptops and smartphones. • Admins create a strong password policy, by making a minimum amount of characters with capitalization and numbers • Enable Up to date anti-virus programs. • Implement a mandated Employee Security Awareness Training. • Limit access to company approved devices only. • Disable CD drives and USB ports. LAN Domain: The third layer of security in the MLS plan. This is the collection of computers in an area to one another or to a common connection medium. To prevent the unauthorized access, recommend implementing the following: • Physically secure the wiring closets and data centers. • Implement encryption procedures. • Implement strict access policies and second-level authentication. • Implement WLAN network keys that require a password for wireless access. • Implement LAN server and configuration standards, procedures, and guidelines. LAN-to-WAN Domain: The fourth layer in the MLS plan. This is where the IT infrastructure is linked to a wide area network and the...

Words: 574 - Pages: 3

Premium Essay

Lab 10 Assessment Worksheet

...scans at a time? Each computer can only be scanned at a time. 7. What portion of the scan takes longer? Is it necessary to perform this scan every time? Full scan. No, but you should run a full scan periodically. 8. Are the scans saved locally, and if so where? Yes, C:\users\username\SecurityScans folder 9. Could you exclude patches to be scanned for? No. 10. Which are some of the major recommendations that you would provide to secure any Windows system? Harden the operating system FIRST; install only the necessary services; use server roles when possible; SCW to apply least privilege principle to applications; remove or disable unneeded services, user accounts and extra application components; only open the minimum required ports at the firewall; define unique user accounts; user strong authentication; use encrypted connections for all communications; encrypt file, folders and volumes that contain private data; develop and maintain a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP); disable any server...

Words: 368 - Pages: 2

Premium Essay

Malicious Attacks

...Information System Engineer for a videogame development company. The organization network structure have been identified by the company as having 2- firewall, 1- Web/FTP server, 1-Microsoft Exchange Email Server, Network Intrusion Detection System(NIDS), 2-Windows Server 2012 Active Directory Domain Controllers(DC) 3-File servers 1-Wireless access point(WAP) 100-Desktop/Laptop computers VoIP telephone system. The CIO of this company has just received a report of malicious activities on the rise and has become extremely concerned with the protection of intellectual property and highly sensitive data maintained by his organization. As part of my job task with the organization, I will identify and draft a report identifying potential malicious attacks, threats, and the vulnerabilities that is specific to his organizations. It has been requested that in the report, I give a brief scenario explanation and how what kind of potential impact it will have on the organization. Any threat is alarming because it could damage the assets of the company if this is true we first need to have a Business Continuity Plan (BCP) which allows the company to keep operating in case of an attack. My order of planning would be to discover the disaster recovery...

Words: 401 - Pages: 2

Free Essay

Project Scope Statement

...financial planning by reducing the effort involved in budgeting and planning for new telephone units, computers, network, classroom equipment and server systems. Provide for the cost effective and timely purchasing and installation of new equipment while decreasing the deployment time for new equipment; and disposal of old and obsolete equipment. ------------------------------------------------- Deliverables Dell Desktops and laptops Cisco Routers, switches, and Ip phones will be installed and configured Firewalls will be installed Blade server holding case will be provided Internet services will be provided by Install Cat 6 cable and fiber optic cable Connector’s trays and cable racks will be installed Software i.e. Microsoft Server 2008R2, Windows 7, Exchange Server, Citrix Carpe Diem, Anti-Virus , Spam Server, VPN Server, Web Server, Hummingbird will be installed All servers for the network will be installed Technical requirements Hardware and Software...

Words: 11532 - Pages: 47

Premium Essay

Test

...compliance.3. Download of non-business videos using the internet to an employee-owned computer.A. Enable content filtering and antivirus scanning at the entry and exit points of theinternet. Enable workstation auto-scans and auto-quarantine for unknown file types.4. Malware infection of a user¶s laptop.L. Use workstation antivirus and malicious code policies, standards, procedures, andguidelines. Enable an automated antivirus protection solution that scans and updatesindividual workstations with proper protection.5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure.Provide no access without proper credentials.6. LAN server operating system vulnerabilities.F. Define vulnerability window policies, standards, procedures, and guidelines.Conduct LAN domain vulnerability assessments.7. Download of unknown file types from unknown sources by local users.B. Apply file transfer monitoring, scanning, and alarming for unknown filetypes and sources.8. Errors and weaknesses of network router, firewall, and network applianceconfiguration file.H. Conduct post configuration penetration tests of the layered security solutionwithin the LAN-to-WAN Domain. Test inbound and outbound traffic and fix any gaps.9. WAN eavesdropping.M. Use encryption and virtual private network (VPN) tunneling for secure IPcommunications.10. WAN Denial...

Words: 372 - Pages: 2

Premium Essay

Disaster Planning and Management

...Ronald R. Yager Iona College, New Rochelle, NY 10801 ABSTRACT Recent events such as hurricanes, tsunamis, earthquakes, power outages, and the threat of pandemics have highlighted our vulnerability to natural disasters. This vulnerability is exacerbated by many organizations’ increasing dependence on computer, telecommunications, and other technologies, and trends toward integrating suppliers and business partners into everyday business operations. In response many organizations are implementing disaster recovery planning processes. In this paper we discuss how to identify threats and scenarios; how to articulate the disaster recovery strategies; and four elements of the generic disaster recovery plan: Mitigation, preparedness, response, and recovery. We then provide examples of software that can help disaster recovery professionals in the planning and implementation process. Finally we present some trends that will reinforce the criticality of the issue. Keywords: Disaster Recovery Planning; Business Continuity Planning; Risk Assessment INTRODUCTION Several major natural disasters that have occurred in the past few years have placed disaster management on the front pages: The Tsunami of late 2004, Hurricanes Katrina and Rita, and the earthquake in Pakistan in 2005 affected both life and property and emphasized our vulnerability to natural threats. EM-DAT (2006) figures complied by the Belgian Université Catholique de Louvain’s Center for Research on the Epidemiology of Disasters...

Words: 7241 - Pages: 29

Premium Essay

Rookie

...Business Continuity Planning (BCP) Sample Plan For Nonprofit Organizations Introduction The following is a ABC disaster recovery plan. Please note that this plan is provided to generate ideas only on the creation of an organization’s plan. It is not intended to be a complete work. Plans can be developed using many different formats this represents just one. Additionally, not every recovery function is represented and not every plan component is presented. 1.0 Overview 1.1 Policy Statement It is the Policy of ABC Company (“ABC”) to maintain a comprehensive Business Continuity Plan for all critical organization functions. Each department head is responsible for ensuring compliance with this policy and that their respective plan component is tested no less than annually. ABC’s Disaster Recovery efforts exercise reasonable measures to protect employees, safeguard assets, and client accounts. 1.2 Introduction This document is the Business Continuity Plan for ABC located at 911 Recovery Drive, Any Town, USA 99999. It has been developed in compliance with the National Fire Protection Association (NFPA) Standard 1600. This plan was specifically designed to guide ABC through a recovery effort of specifically identified organization functions. At the onset of an emergency condition, ABC employees and resources will respond quickly to any condition, which could impact ABC’s ability to perform its critical organization functions. The procedures contained within have been...

Words: 3620 - Pages: 15

Free Essay

Introducing Transaction Log Files

...Introducing Transaction Log Files Each SQL Server 2000 database has at least one transaction log file and can have multiple transaction log files spread across a number of disks. Each transaction log file is a separate operating system file and is used by only one database. Each transaction log file generally has the .ldf filename extension (this extension is not required). Each transaction log has a logical filename that is used in Transact-SQL statements and a physical filename that is used by the Windows operating system. Additional file properties include the file ID number, initial file size, file growth increment (if any), and maximum file size. Unlike data files that contain pages, transaction log files contain a series of transaction log records. A sequential log sequence number (LSN) identifies each transaction log record. Regardless of the number of physical log files, SQL Server 2000 treats the transaction log as one continuous log. SQL Server 2000 logically divides each physical transaction log file into a number of virtual log files (VLFs). The number and size of virtual log files are determined dynamically based on the size of each transaction log file. Each transaction log file has at least two VLFs. Each growth increment (if any) is treated as a separate physical file with its own VLFs. The number or size of VLFs cannot be configured or set directly by the database administrator. SQL Server 2000 tries to maintain a small number of virtual file logs because it...

Words: 2158 - Pages: 9

Premium Essay

Post Implementation

...Post Implementation Review Report Section 5.6.7 5 SECURITY The purpose of this section is to determine if the system provides adequate security of data and programs. In addition to access security, procedures for backup, recovery, and restart had been reviewed. 5.1 Data Security Unleashed as an online system, has transaction logging for us to review the adequacy of its data safeness. We do have concern of data security as the implementation group mentioned, the system only asks for user name and password for access. We suggest we add a feature that after entering user name and password on the website, each authorized user need to click on a link which generates a random security code which is sent to the phone (SMS) and email registered with theirs accounts. They need to enter this security code before they are allowed access. The code expires in 10 minutes. (Hall, 2011) 5.2 Disaster Recovery Unleash is an online software which brings out our concern about data recovery, data might get corrupt if the client is experiencing internet traffic or reginal blackout. Thus fore, we suggest Unleash backups transfer only new or changed blocks—shrinking the backup windows, minimizing network traffic, and reducing disk capacity requirements. Because it’s not moving or storing redundant data, the client can back up more often on hourly basis, for instance, while reducing their storage footprint. We do recommend the client download Master Data and Transaction Data on a daily basis...

Words: 1170 - Pages: 5

Premium Essay

Cissp

...INTRODUCTION 4 DOMAIN 1: ACCESS CONTROL WHAT’S NEW IN ACCESS CONTROL? AN OVERVIEW 5 5 7 DOMAIN 2: SOFTWARE DEVELOPMENT SECURITY WHAT’S NEW IN APPLICATIONS SECURITY (NOW SOFTWARE DEVELOPMENT SECURITY)? AN OVERVIEW 9 9 10 DOMAIN 3: BUSINESS CONTINUITY & DISASTER RECOVERY WHAT’S NEW? AN OVERVIEW 12 12 13 DOMAIN 4: CRYPTOGRAPHY WHAT’S NEW? AN OVERVIEW 17 17 18 DOMAIN 5: INFORMATION SECURITY GOVERNANCE & RISK MANAGEMENT WHAT’S NEW? AN OVERVIEW 21 21 22 DOMAIN 6: LEGAL, REGULATIONS, INVESTIGATIONS, AND COMPLIANCE WHAT’S NEW? AN OVERVIEW 24 24 26 DOMAIN 7: SECURITY OPERATIONS WHAT’S NEW? AN OVERVIEW 28 28 29 DOMAIN 8: PHYSICAL & ENVIRONMENTAL SECURITY WHAT’S NEW? AN OVERVIEW 32 32 33 DOMAIN 9: SECURITY ARCHITECTURE & DESIGN WHAT’S NEW? AN OVERVIEW 36 36 38 DOMAIN 10: TELECOMMUNICATIONS & NETWORK SECURITY WHAT’S NEW? AN OVERVIEW 40 40 41 INFOSEC INSTITUTE’S CISSP BOOT CAMP COURSE OVERVIEW COURSE SCHEDULE 44 44 45 INTRODUCTION (ISC)²’s CISSP Exam covers ten domains which are:           Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal regulations, investigations, and compliance Operations Security Physical and Environmental Security Security Architecture and Design Telecommunications and Network Security Over the course...

Words: 11687 - Pages: 47