Jump to content

5h4rk

Members
  • Posts

    2
  • Joined

  • Last visited

Everything posted by 5h4rk

  1. i know it sounds cliché, but what i do with mine, seeing as i dont have much luck with my usb drives, is always keep an up to date backup of my multipass, that way, if the drive dies, i always have a backup to fall back on and dont need to go through the whole process of rebuilding it.
  2. hi guys, after browsing this board and having learnt a few interesting things, i thought it was time i contributed with something myself. i have seen a lot of people having trouble installing certain apps to their multipasses, i know certain apps gave me a hard time, but search and research never hurt anyone, so in the the end i managed to make my multipass with the programs i suppose i need, for now. on my multipass i have the following programs: BT4 R1 Hirens boot CD memtest Paragon Backup Partition Magic 5.3 Kaspersky Rescue Disk Trinity Rescue Kit Ultimate Boot Cd 5.0.3 here is the tree: |-- Boot | |-- konboot.gz | |-- memdisk | |-- memtest.bin | |-- memtest.exe | `-- soa.xpm |-- [BOOT] | `-- Bootable_NoEmulation.img |-- bootbt4 | |-- bootsplash | |-- grub | | |-- bt4.xpm.gz | | |-- menu.lst | | `-- stage2_eltorito | |-- initrd800.gz | |-- initrdfr.gz | |-- initrd.gz | |-- memtest86+.bin | `-- vmlinuz |-- boot.catalog |-- casper | |-- filesystem.manifest | |-- filesystem.manifest-desktop | |-- filesystem.squashfs | `-- sedIMqeji |-- CLEAN |-- Ghost11 | |-- Ghost32.exe | |-- GHOSTERR.TXT | |-- Ghost.exe | |-- Ghostexp.exe | `-- GhostSrv.exe |-- grldr |-- HBCD | |-- Astra.uha | |-- BiosBoot.uha | |-- boot.gz | |-- chntpw | |-- chntpw.gz | |-- CopyR.uha | |-- CopyWipe.uha | |-- dban.gz | |-- DCC.uha | |-- DosNav.uha | |-- ESTest.uha | |-- FastLynx.uha | |-- FileMave.uha | |-- FWizard.uha | |-- grldr | |-- HDAT2.uha | |-- HddErase.uha | |-- HddTools.uha | |-- HWiNFO.uha | |-- isolinux.bin | |-- isolinux.cfg | |-- Keyboard.bat | |-- Killdisk.uha | |-- konboot.gz | |-- linux | |-- MBRUtil.uha | |-- memdisk | |-- memtest.gz | |-- menu.c32 | |-- menu.lst | |-- MHDD.uha | |-- Mini98.uha | |-- Mix.uha | |-- Network.uha | |-- NSSI.uha | |-- Ntfs4Dos.uha | |-- ntldr.gz | |-- NtPwd.uha | |-- PCI32.uha | |-- plpbt.bin | |-- pResizer.uha | |-- PtEdit.uha | |-- QuickVie.uha | |-- ReadNtfs.uha | |-- RegView.uha | |-- SavePart.uha | |-- smartbm.gz | |-- SystemAn.uha | |-- TestDisk.uha | |-- Tools.uha | |-- uharc.exe | |-- VC.uha | |-- Victoria.uha | |-- Vivard.uha | |-- WinTools | | |-- 7-Zip.bat | | |-- AlternateStreamView.bat | | |-- AngryIPScanner.bat | | |-- AsteriskLogger.bat | | |-- Autologon.bat | | |-- Autorun.csv | | |-- Autorun.exe | | |-- AutoRuns.bat | | |-- BartsStuffTest.bat | | |-- BellaVista.bat | | |-- BlueScreenView.bat | | |-- BootICE.bat | | |-- BootSect.bat | | |-- BulkRenameUtility.bat | | |-- CCleaner.bat | | |-- Cleanup.bat | | |-- ComboFix.bat | | |-- ComboFix.exe | | |-- ContentAdvisorPasswordRemover.bat | | |-- CoolWebSearch_Remover.bat | | |-- CPorts.bat | | |-- CPUz.bat | | |-- Defraggler.bat | | |-- DeleteDoctor.bat | | |-- DependencyWalker.bat | | |-- DialAFix.bat | | |-- DisableAutorun.bat | | |-- DisableCompressOldFiles.bat | | |-- DiskCryptor.bat | | |-- DiskDigger.bat | | |-- DiskMan4.bat | | |-- DiskView.bat | | |-- DoubleDriver.bat | | |-- DriveImageXML.bat | | |-- DriverBackup.bat | | |-- DrWebCureIt.exe | | |-- DskSpeed.bat | | |-- DTemp.bat | | |-- EasyUHA.exe | | |-- EditHosts.bat | | |-- ERDComputerManagement.bat | | |-- ERDExplorer.bat | | |-- ERUNT.bat | | |-- Explore2fs.bat | | |-- EzPCFix.bat | | |-- FastCopy.bat | | |-- Fat32Formatter.bat | | |-- FileDisk.bat | | |-- Files | | | |-- 7-Zip.uha | | | |-- BellaVista.uha | | | |-- BootICE.uha | | | |-- BootSect.uha | | | |-- BulkRenameUtility.uha | | | |-- Cleanup.uha | | | |-- CoolWeb.uha | | | |-- CpuZ.uha | | | |-- Cygwin1.uha | | | |-- DDriver.uha | | | |-- DependencyWalker.uha | | | |-- DialAFix.uha | | | |-- DiskCryptor.uha | | | |-- DiskDigger.uha | | | |-- DriveImageXML.uha | | | |-- Explore2fs.uha | | | |-- EzPCFix.uha | | | |-- FastCopy.uha | | | |-- FileDisk.uha | | | |-- Files.uha | | | |-- FixHDC.uha | | | |-- GImageX.uha | | | |-- GlaryRegistryRepair.uha | | | |-- GMER.uha | | | |-- GPU-Z.uha | | | |-- H2testw.uha | | | |-- HDDScan.uha | | | |-- HDHacker.uha | | | |-- HDTune.uha | | | |-- HijackThis.uha | | | |-- HxD.uha | | | |-- InfraRecorder.uha | | | |-- IrfanView.uha | | | |-- JkDefrag.uha | | | |-- KeyTweak.uha | | | |-- LicenseCrawler.uha | | | |-- Malwarebytes.uha | | | |-- MbrFix.uha | | | |-- MBRWiz.uha | | | |-- mkisofs.uha | | | |-- NirSoft.uha | | | |-- NTFSAccess.uha | | | |-- NTREGOPT.uha | | | |-- Opera.uha | | | |-- PartFind.uha | | | |-- PartitionRecovery.uha | | | |-- PartitionWizard.uha | | | |-- PasswordRenew.uha | | | |-- PCwizard.uha | | | |-- Piriform.uha | | | |-- PuTTY.uha | | | |-- RegEditPE.uha | | | |-- RemoveFakeAntivirus.uha | | | |-- Restoration.uha | | | |-- SelfImage.uha | | | |-- SmartDriverBackup.uha | | | |-- SmartPartitionRecovery.uha | | | |-- SmitfraudFix.uha | | | |-- SM.uha | | | |-- SoftPerfectFileRecovery.uha | | | |-- SpybotSD.uha | | | |-- SpywareBlaster.uha | | | |-- SRunners.uha | | | |-- SumatraPDF.uha | | | |-- SuperAntiSpyware.uha | | | |-- Sysinternals.uha | | | |-- TeamViewer.uha | | | |-- TightVNC.uha | | | |-- TotalCmd.uha | | | |-- TrueCrypt.uha | | | |-- TweakUI.uha | | | |-- UltimateWindowsTweaker.uha | | | |-- Unlocker.uha | | | |-- UpdateChecker.uha | | | |-- USBGrub.uha | | | |-- VFD.uha | | | |-- Victoria.uha | | | |-- VideoMemoryStressTest.uha | | | |-- WDDataLifeguardDiagnostic.uha | | | |-- WindirSt.uha | | | |-- WindowsGate.uha | | | |-- WinKeyFinder.uha | | | |-- Xp-AntiSpy.uha | | | `-- XXClone.uha | | |-- FixHDC.bat | | |-- GetDataFAT.bat | | |-- GetDataNTFS.bat | | |-- Ghost32.bat | | |-- GhostExp.bat | | |-- GImageX.bat | | |-- GlaryRegistryRepair.bat | | |-- GMER.bat | | |-- GPU-Z.bat | | |-- Grub4DosInstaller.bat | | |-- H2testw.bat | | |-- HBCDCustomizer.exe | | |-- HDDScan.bat | | |-- HDHacker.bat | | |-- HDTune.bat | | |-- HijackThis.bat | | |-- HxD.bat | | |-- IBProcMan.exe | | |-- IEPassView.bat | | |-- InfraRecorder.bat | | |-- InstalledCodec.bat | | |-- IrfanView.bat | | |-- JkDefrag.bat | | |-- KeyTweak.bat | | |-- KillBox.exe | | |-- LicenseCrawler.bat | | |-- MailPassView.bat | | |-- Malwarebytes.bat | | |-- MbrFix.bat | | |-- MBRUtility.bat | | |-- MbrWizard.bat | | |-- MemTest.bat | | |-- MessenPass.bat | | |-- MonitorTester.bat | | |-- MyUninstaller.bat | | |-- NetworkPasswordRecovery.bat | | |-- NewSID.bat | | |-- NTFSAccess.bat | | |-- NtRegOpt.bat | | |-- OpenedFilesView.bat | | |-- Opera.bat | | |-- PageDfrg.bat | | |-- PartitionFindAndMount.bat | | |-- PartitionRecovery.bat | | |-- PartitionWizard.bat | | |-- PartSaving.bat | | |-- PasswordFox.bat | | |-- PasswordRenew.bat | | |-- PCI32.bat | | |-- PCWizard.bat | | |-- PhotoRec.bat | | |-- ProcessActivityView.bat | | |-- ProcessExplorer.bat | | |-- ProcessMonitor.bat | | |-- ProceXP.exe | | |-- ProduKey.bat | | |-- ProtectDriveFromAutorunVirus.bat | | |-- PstPassword.bat | | |-- PuTTY.bat | | |-- RawCopy.bat | | |-- Recuva.bat | | |-- RegEditPE.bat | | |-- RegFromApp.bat | | |-- RegistryBackup.bat | | |-- RegRestoreWizard.bat | | |-- RegScanner.bat | | |-- RegShot.bat | | |-- RemoveFakeAntivirus.bat | | |-- RemoveRestrictionsTool.bat | | |-- RemoveWGA.bat | | |-- Restoration.bat | | |-- RootkitRevealer.bat | | |-- SearchMyFiles.bat | | |-- SelfImage.bat | | |-- ShadowCopy.bat | | |-- ShellMenuNew.bat | | |-- ShExView.bat | | |-- ShowHiddenDevices.bat | | |-- Shredder.bat | | |-- SilentRunners.bat | | |-- siw.exe | | |-- SmartDriverBackup.bat | | |-- SmartPartitionRecovery.bat | | |-- SmartSniff.bat | | |-- SM.bat | | |-- SmitFraudFix.bat | | |-- SnapShot.bat | | |-- snapshot.exe | | |-- SniffPass.bat | | |-- SoftPerfectFileRecovery.bat | | |-- SpaceMonger.bat | | |-- Speccy.bat | | |-- Splitter.exe | | |-- SpybotSD.bat | | |-- SpywareBlaster.bat | | |-- StartupCPL.bat | | |-- StartupMonitor.exe | | |-- SumatraPDF.bat | | |-- SuperAntiSpyware.bat | | |-- TCPView.bat | | |-- TeamViewer.bat | | |-- TestDisk.bat | | |-- TightVNCServer.bat | | |-- TightVNCViewer.bat | | |-- TotalCommander.bat | | |-- TrueCrypt.bat | | |-- TweakUI.bat | | |-- UltimateWindowsTweaker.bat | | |-- Undelete.bat | | |-- UnknownDevices.bat | | |-- Unlocker.bat | | |-- UnstoppableCopier.bat | | |-- UpdateChecker.bat | | |-- UsbDeView.bat | | |-- USBFormat.bat | | |-- Victoria.bat | | |-- VideoMemoryStressTest.bat | | |-- VirtualFloppyDrive.bat | | |-- WDDataLifeguardDiagnostic.bat | | |-- WinDirStat.bat | | |-- WindowsGate.bat | | |-- WinKeyFinder.bat | | |-- WirelessKeyView.bat | | |-- WriteProtectUSBDevicesOnThisPC.bat | | |-- xp-AntiSpy.bat | | |-- XP-Key-Reader.bat | | |-- XpTCPIPWinsockRepair.bat | | `-- XXClone.bat | |-- XP | |-- XpAutorun.cmd | |-- XP.BIN | |-- XP.CA_ | |-- XP.DAT | `-- XPLOADER.BIN |-- hirens | `-- menu.lst |-- images | |-- memtest.bin | |-- ParagonBk.iso | `-- pmagic-5.3.iso |-- konboot | |-- menu.lst | `-- menu.lst~ |-- liveusb |-- memdisk |-- menu2.lst |-- menu2.lst~ |-- menu.lst |-- menu.lst~ |-- mt86 | `-- menu.lst |-- pb9 | `-- menu.lst |-- pm5 | `-- menu.lst |-- rescue | |-- liveusb | |-- menu.lst | |-- menu.lst~ | `-- rescue.iso |-- sources | |-- boot.wim | `-- TRANS.TBL |-- StartHBCD.cmd |-- Trk3 | |-- AUTORUN.INF | |-- boot.cat | |-- bootlogo.jpg | |-- captive | |-- disableautorun.exe | |-- initrd.trk | |-- isolinux.bin | |-- isolinux.cfg | |-- kernel.trk | |-- memdisk | |-- memtest.x86 | |-- menu.lst | |-- mkpxelinux | |-- pxelinux.0 | |-- pxelinux.cfg | |-- share | | `-- pi | | |-- pi.fr | | |-- unpi.cfg | | `-- unpi.fr | |-- syslinux | |-- syslinux.cfg | |-- syslinux.exe | |-- trinity.ico | |-- trkramfs | |-- trspack-1_0.exe | |-- trsrun-1_0.exe | |-- trsrun-1_0-nq.exe | `-- vesamenu.c32 `-- ubcd503 |-- menu.lst |-- menu.lst~ `-- ubcd503.iso 23 directories, 397 files to keep the root of the drive a bit cleaner what i did was make a menu.lst the would link me to another menu.lst file that is located in the particular programs folder, seeing as some of them need the iso image in the same directory as the menu.lst file, for ex, UBCD. this way i keep the menu.lst file uncluttered, making it easier to work with if i have to make changes on that particular program's file. on the root of the drive i have this menu.lst file: splashimage /Boot/soa.xpm default 11 timeout 600 title MULTIPASS ################BOOT HARD DRIVE############################### title Boot the First Hard Disk rootnoverify (hd1) chainloader +1 title -= BackTrack 4 R1 =- configfile /bootbt4/grub/menu.lst title Hirens Boot CD configfile /hirens/menu.lst title KONBOOT configfile /konboot/menu.lst title MemTest86+ 4.1 configfile /mt86/menu.lst title Paragon Backup 9 configfile /pb9/menu.lst title Parted Magic 5.3 configfile /pm5/menu.lst title TRINITY RESCUE KIT 3.4 configfile /Trk3/menu.lst title ULTIMATE BOOT CD configfile /ubcd503/menu.lst title KAV 2010 Rescue.iso configfile /rescue/menu.lst BACKTRACK i made a folder on the root of the drive, named it bootbt4, and extracted the contents of the downloaded iso file to it. i then edited the menu.lst in the grub folder to this: # By default, boot the first entry. default 0 # Boot automatically after 30 secs. timeout 30 splashimage=/boot/grub/bt4.xpm.gz foreground e3e3e3 background 303030 title Start BackTrack FrameBuffer (1024x768) kernel /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent rw quiet vga=0x317 initrd /bootbt4/initrd.gz title Start BackTrack FrameBuffer (800x600) kernel /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent rw quiet vga=0x314 initrd /bootbt4/initrd800.gz title Start BackTrack Forensics (no swap) kernel /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent rw vga=0x317 initrd /bootbt4/initrdfr.gz title Start BackTrack in Safe Graphical Mode kernel /bootbt4/vmlinuz BOOT=casper boot=casper xforcevesa rw quiet initrd /bootbt4/initrd.gz title Start Persistent Live CD kernel /bootbt4/vmlinuz BOOT=casper boot=casper persistent rw quiet initrd /bootbt4/initrd.gz title Start BackTrack in Text Mode kernel /bootbt4/vmlinuz BOOT=casper boot=casper nopersistent textonly rw quiet initrd /bootbt4/initrd.gz title Start BackTrack Graphical Mode from RAM kernel /bootbt4/vmlinuz BOOT=casper boot=casper toram nopersistent rw quiet initrd /bootbt4/initrd.gz title Memory Test kernel /bootbt4/memtest86+.bin title Boot the First Hard Disk root (hd0) chainloader +1 KONBOOT for konboot, i downloaded the zip file, which i extracted to my hard drive, then zipped it using gzip. i then put this gz file in the boot folder, where i also have memdisk and memtest.bin files, which it needs to boot. menu.lst for konboot: .:=| KONBOOT |=:. title Kon-Boot\nWindows (any/blank password) and Linux (kon-usr) Login Without a Password find --set-root /Boot/konboot.gz kernel /Boot/memdisk initrd /Boot/konboot.gz title .:=| BACK TO MAIN SELECTION MENU |=:. configfile /menu.lst HIRENS BOOT CD for hirens i extracted the iso to its folder on the root of the drive, named HBCD. i then created another folder named hirens, and put this menu.lst in there: splashimage /Boot/soa.xpm color green/black magenta/black default 11 timeout 600 title .:=| Hiren's 11 - BootCD (MS-DOS based programs) |=:. find --set-root /HBCD/boot.gz kernel /HBCD/memdisk initrd /HBCD/boot.gz title .:=| Hiren's 11 - Mini XP (Based on Windows XP) |=:. find --set-root /HBCD/XPLOADER.BIN chainloader /HBCD/XPLOADER.BIN title .:=| BACK TO MAIN SELECTION MENU |=:. configfile /menu.lst i havent tried to replace the HBCD folder menu.lst with this one yet to see if it works, but if anyone wants to try it out and post the results, you are welcome. i also created a folder called images, which is where i put some iso files, that can work from there. in there i have: memtest.bin Paragon Backup.iso Partition Magic.iso the menu.lst are put in folders in the root of the drive, with only the menu.lst in there. memtest86+ menu.lst is located at /m86/menu.lst splashimage /Boot/soa.xpm color green/black magenta/black default 11 timeout 600 title .:=| MemTest86+ 4.1 |=:. find --set-root /images/memtest.bin kernel /images/memtest.bin boot title .:=| BACK TO MAIN SELECTION MENU |=:. configfile /menu.lst Paragon Backup, same procedure as memtes, file is located at /pb9/menu.lst splashimage /Boot/soa.xpm color green/black magenta/black default 11 timeout 600 #Direct mapping: read the direct mapped image. Fast than Memory mapping. title .:=| Paragon Backup 9 Exp. (Backup e Restauro de PCs) |=:. find --set-root /images/ParagonBk.iso map --mem /images/ParagonBk.iso (hd32) map --hook root (hd32) chainloader (hd32) boot title .:=| BACK TO MAIN SELECTION MENU |=:. configfile /menu.lst and Partition magic as well, /pm5/menu.lst splashimage /Boot/soa.xpm color green/black magenta/black default 11 timeout 600 #Direct mapping: read the direct mapped image. Fast than Memory mapping. title .:=| Parted Magic 5.3 (Mini-Linux*Gestor de Particoes) |=:. find --set-root /images/pmagic-5.3.iso map --mem /images/pmagic-5.3.iso (hd32) map --hook root (hd32) chainloader (hd32) boot title .:=| BACK TO MAIN SELECTION MENU |=:. configfile /menu.lst KASPERSKY RESCUE DISK kaspersky was a bit tricky, but after a bit of searching i got it. first i created a file named liveusb (NO EXTENSION!!!!!) on the root of the drive (idk if it is needed, but i put it there anyway.) i then created a folder and named it rescue. it must be named this to work, otherwise when it loads it wont be able to find the bootable device. in this folder i created another file named liveusb again (again i dont if it is needed, i do know that one of the the 2 liveusb files is needed, so i use them both). naturally we have the menu.lst file here, and the iso, which has to be named rescue.iso, for the same reason as the folder name (yes, i tried changing the names and editing the menu.lst, but it wouldnt work). the menu.lst: #splash color text test splashimage /Boot/soa.xpm color green/black magenta/black # set color_highlight=magenta/black #splashimage /Boot/soa.xpm default 11 timeout 600 title KAV 2010 Rescue.iso map /recue/rescue.iso (0xff) || map --mem /rescue/rescue.iso (0xff) map --hook root (0xff) chainloader (0xff) TRINITY RESCUE KIT for trinity i created a folder on my hard drive and extracted the iso contents to it. do not name that folder trk3, but whatever else you like. once extracted, copy all the contents of the trk3 to the folder you created, then you can delete the trk3 folder, seeing as you have its contents in the main folder. you can also delete the [bOOT] folder, it wont be needed. now you can rename that folder to trk3, and copy it to the root of your drive. when you edit the menu.lst file, make sure that the vollabel is the same as the name you gave your usb drive (in my case my drive is named, wait for it...... MULTIPASS, lol), otherwise it wont work the menu.lst: default splashimage /Trk3/bootlogo.xpm.gz title Trinity Rescue Kit 3.4 (default mode, with text menu) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkmenu vollabel=MULTIPASS timeout 100 initrd /Trk3/initrd.trk title TRK 3.4 In failsafe mode (No menu, VGA, noacpi, noapic) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose acpi=off noapic pci=conf1 vga=1 vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Running from RAM (best >= 512mb, 256mb min) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkinmem trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Run 'mclone' in client mode (!) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 mclone vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Simple VGA mode (debugging of kernel output) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=1 pci=conf1 splash=off trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Virusscan all drives (Clamav, non interactive) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 virusscan vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Try more pcmcia and usb nics (when not detected) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 pcmcia trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Try more SCSI drivers (when disks not detected) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 scsidrv trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 With a secure shell server enabled kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 sshd vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Execute local scripts on harddrive of PC kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 locscr vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 As bootserver to boot other TRK clients kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkbootnet trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Fileshare all drives as guest, no security kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 smbguest trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Single user mode (no menu) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 runlevel 1 vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Acpi=off, noapic PCI=^bios (Alternate boot 1) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose acpi=off noapic pci=bios trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Acpi=off, noapic PCI=any (Alternate boot 2) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose acpi=off noapic trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 PCI=conf2 (Alternate boot 3) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf2 trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Verbose startup for debugging (no menu) kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 debugging vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 SSH, boot- and guest fileserver, run from RAM kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 sshd trkinmem smbguest trkbootnet trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 Run from RAM, run mclone as client kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 trkinmem mclone vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 With proxyserver support enabled kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 proxy trkmenu vollabel=MULTIPASS initrd /Trk3/initrd.trk title TRK 3.4 All devices set to read-only kernel /Trk3/kernel.trk ramdisk_size=65536 root=/dev/ram0 vga=788 splash=verbose pci=conf1 allro vollabel=MULTIPASS initrd /Trk3/initrd.trk title Memory tester: Memtest86+ v1.65 kernel /Trk3/memtest.x86 title .:=| BACK TO MAIN SELECTION MENU |=:. configfile /menu.lst ULTIMATE BOOT CD for ubcd i just created a folder in the root of my drive named ubcd503, and stuck the iso in there. the menu.lst file must also be in this folder for UBCD to boot. menu.lst: splashimage /Boot/soa.xpm color green/black magenta/black default 11 timeout 600 title ULTIMATE BOOT CD find --set-root /ubcd503/ubcd503.iso map --mem /ubcd503/ubcd503.iso (hd32) map --hook chainloader (hd32) boot all these programs are working for me, i tried them on 3 laptops, and they all work, including Konboot. i hope this helps anyone who, like me, struggled with some of these apps. i should also add that i did this on a 8GB thumb drive with one partition for the multipass, which is hidden, and another partition for data and backups, both are formatted in FAT32. as a last note, to everyone on this board, and especially the HAK5 staff, keep up the good work, its because i actually learned something that i keep coming back here, and as for the show, well all i can say is its amazing, i saw stuff on there i didnt even dream was possible cheers 5h4rk
×
×
  • Create New...