Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 11,294
» Latest member: renatsoft
» Forum threads: 1,519
» Forum posts: 6,281

Full Statistics

Online Users
There are currently 173 online users.
» 0 Member(s) | 171 Guest(s)
Bing, Google

Latest Threads
Huge delay connecting ven...
Forum: Ventoy Discussion Forum
Last Post: Master_X
7 hours ago
» Replies: 0
» Views: 21
Windows 10 Installation i...
Forum: Ventoy Discussion Forum
Last Post: TadesaeN
Yesterday, 10:13 AM
» Replies: 16
» Views: 34,486
httpdisk.sys service erro...
Forum: iVentoy Discussion Forum
Last Post: cleao
Yesterday, 09:11 AM
» Replies: 0
» Views: 48
Trouble installing Window...
Forum: iVentoy Discussion Forum
Last Post: sklerder
04-15-2024, 10:42 PM
» Replies: 12
» Views: 580
Build Windows 11+Office21
Forum: iVentoy Discussion Forum
Last Post: SPRINKILL
04-15-2024, 03:13 PM
» Replies: 0
» Views: 75
My manager has restricted...
Forum: Ventoy Discussion Forum
Last Post: spirtman96
04-15-2024, 04:58 AM
» Replies: 3
» Views: 701
Adding custom grub entrie...
Forum: Ventoy Discussion Forum
Last Post: nguyen ha thai trong
04-12-2024, 08:51 AM
» Replies: 1
» Views: 200
iVentoy-1.0.20 release
Forum: iVentoy Discussion Forum
Last Post: petergu0326
04-12-2024, 07:02 AM
» Replies: 3
» Views: 481
PXE boot via USB Ethernet...
Forum: iVentoy Discussion Forum
Last Post: jeffshead
04-11-2024, 11:24 AM
» Replies: 7
» Views: 656
Computers are not loading...
Forum: iVentoy Discussion Forum
Last Post: ATechPCS
04-11-2024, 03:31 AM
» Replies: 6
» Views: 640

 
  在 ROG STRIX Z690-A GAMING WIFI D4吹雪主板上启动黑屏
Posted by: lujb - 08-19-2022, 02:55 AM - Forum: Ventoy Discussion Forum - Replies (1)

朋友新配一台机器,主板是:ROG STRIX Z690-A GAMING WIFI D4吹雪,用最新的引导启动机器安装时,开机后黑屏状态,无菜单出现。
改用win iso做的引导U盘启动,正常
不知何故?如何解决?

Print this item

  iso直接进pe,没有进界面,怎么解决?
Posted by: freestep - 08-16-2022, 03:23 AM - Forum: Ventoy Discussion Forum - Replies (1)

如题,做好的u盘启动后,选择老毛桃或者微pe工具箱的iso,直接就进了对应的pe系统,我想先进界面,怎么办?

Print this item

  How to make your own Theme for a non linux user
Posted by: Sparks79 - 08-15-2022, 06:46 AM - Forum: Ventoy Plugin Forum - Replies (3)

I have Dozens of Iso's on my External ventoy SSD.
And the Menu looks crap and is hard to sort through and therefore takes time.
So i need help in creating a Decent Menu.
I am a Die Hard Windows User.
I have used linux a bit but I get lost very easy.
Can someone help me with info about building a menu using windows 10.
And then Transferring it over to the Ventoy SSD

Print this item

  I think that I've messed up
Posted by: C@se_G@ge - 08-15-2022, 01:06 AM - Forum: Ventoy Discussion Forum - Replies (9)

all,
I'm attempting to install a distribution of linux. I have previously use Ventoy to install Alma linux, but I need to intsall another distribution, so thats that. My issue is that when I boot into the Ventoy Menu, which looks like it installed correctly, the bootable .iso isn't available. Currently the flash drive I'm using is a 32gig onn. and has two partitions listed as sda1 and 2. 1 is 28.9 GiB and 2 is 32 Mib, and this is where the ventoy tool seems to live. I hope you can help me with my dilema, its a bit strange to me.

Print this item

  一个不知道是不是BUG的问题
Posted by: 不知道是谁 - 08-14-2022, 06:29 AM - Forum: Ventoy Discussion Forum - Replies (2)

使用ventoy引导wepe,进入wepe后无法弹出usb驱动器,仅使用wepe的情况下是可以做到弹出usb驱动器的
倒并不影响正常使用,只是有些情况下需要提前移除USB驱动器避免重启时再次进入u盘引导,不然只能点完重启拼手速再拔U盘了
请问这个问题是正常现像吗?希望可以解下困惑,谢谢

Print this item

  Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass
Posted by: aboamir@gmail.com - 08-13-2022, 07:11 AM - Forum: Ventoy Discussion Forum - No Replies

long panda you should read this 

------------------------------------------------------


Some signed third-party bootloaders for the Unified Extensible Firmware Interface (UEFI) could allow attackers to execute unauthorized code in an early stage of the boot process, before the operating system loads.
Vendor-specific bootloaders used by Windows were found to be vulnerable while the status of almost a dozen others is currently unknown.
Threat actors could exploit the security issue to establish persistence on a target system that cannot be removed by reinstalling the operating system (OS).
Elysium security researchers Mickey Shkatov and Jesse Michael discovered vulnerabilities affecting UEFI bootloaders from third-party vendors that could be exploited to bypass the Secure Boot feature on Windows machines.
Secure Boot is part of the UEFI specification designed to ensure that only trusted code - signed with a specific, vendor-supplied certificate - is executed to start the OS booting process.
The firmware bootloader runs immediately after turning on the system to initialize the hardware and to boot the UEFI environment responsible for launching the Windows Boot Manager.

[Image: BootProcessOverview.png][b]Overview of the boot process on UEFI systems[/b]
source: Microsoft
Eclypsium researchers found that three UEFI bootloaders that were approved by Microsoft had vulnerabilities that permitted bypassing the Secure Boot feature and executing unsigned code:
The three Microsoft-approved UEFI bootloads that were found to bypass the Windows Secure Boot feature and execute unsigned code are:
  • New Horizon Datasys Inc: CVE-2022-34302 (bypass Secure Boot via custom installer)

  • CryptoPro Secure Disk: CVE-2022-34301 (bypass Secure Boot via UEFI Shell execution)

  • Eurosoft (UK) Ltd: CVE-2022-34303 (bypass Secure Boot via UEFI Shell execution) 
Microsoft has worked with the last two vendors in the list above and released security update KB5012170 to fix the problem in the provided bootloader.
As part of this fix, Microsoft has blocked all of their required certificates that were issued with the Security Update Release from July 2022.
"This security update addresses the vulnerability by adding the signatures of the known vulnerable UEFI modules to the DBX" - Microsoft
In an advisory this week about the vulnerabilities, the Carnegie Mellon CERT Coordination Center warns that code executed in the early boot stages could “also evade common OS-based and EDR security defenses.”
Carnegie Mellon CERT CC has provided a list with 23 UEFI bootloader vendors, a clear status being available for just three of them: Microsoft (impacted), Phoenix Technologies (not impacted), and Red Hat (not impacted).
The rest of the 20 vendors have also been informed about the issues but it is currently unknown if their products are affected or not.
The list includes names like Acer, AMD, American Megatrends, ASUSTeK, DELL, Google, Hewlett Packard Enterprise, HP, Lenovo, Toshiba, and VAIO Corporation.
A fix for these vulnerabilities should be delivered either by the Original Equipment Manufacturer (OEM) or the OS vendor by updating the UEFI Revocation List - the Secure Boot Forbidden Signature Database (DBX), a database of revoked signatures for previously approved firmware and software that starts systems with UEFI Secure Boot.

Print this item

  does not boot from ventoy usb, no ventoy menu appears
Posted by: sen - 08-12-2022, 12:09 PM - Forum: Ventoy Discussion Forum - Replies (2)

I properly installed (from Windows 10) Ventoy on a USB stick a couple of days ago and copied a Linux Mint iso and a Puppy Linux iso to the proper partition (reformatted as FAT32), but my computer refuses to acknowledge Ventoy.

I first tried it by accessing the boot menu from BIOS (UEFI, secure boot disabled). Selecting the proper boot option does nothing and I return to the BIOS screen. When I select Windows, it boots up normally. I tried switching the correct boot option to the top of the boot priority, saved and exited, but it still booted to Windows as if the option didn't exist. I also tried to boot again directly from the boot menu this time (instead of accessing the boot menu from BIOS), it still didn't work. 

I have live-booted Linux Mint on this machine from this same USB stick previously (I used Etcher then) so I don't think it's a hardware problem either. Can anyone help me? This is my first time posting to a forum like this, so I hope I have provided all the information needed.

Print this item

  Does Ventoy write to "Track 0" on the UFD?
Posted by: bbertrand007 - 08-12-2022, 12:47 AM - Forum: Ventoy Discussion Forum - No Replies

1) During install, if MBR is chosen, does Ventoy write to the "hidden track 0" some boot code
2) Technically curious - how does Ventoy boot in BIOS mode?  Does the MBR pass control to a program in the VToyEFI partition and if so, is it the same program that Bootx64.efi passes control to in UEFI mode?

Print this item

  Multiple partitions to use the drive for other things
Posted by: mortenmoulder - 08-11-2022, 11:11 PM - Forum: Ventoy Discussion Forum - Replies (3)

I'm not sure if this is a Ventoy specific question, but I'm hoping someone with experience can answer.

The thing is I have a robot lawnmower, a 3D printer, and some other hardware, which requires a FAT32 partition with files on it for firmware updates. Just yesterday I formatted my 128GB USB drive as FAT32 and updated my lawnmower.

Ventoy, by default, creates an exFAT partition. No issues there, as all my systems, computers, laptops, phones, etc. can read exFAT. However, if I want to use that USB drive to update stuff like my lawnmower, what would the proper way be then? Can Ventoy read all of the partitions? Should I just create a ~8GB FAT32 partition at the start of the blocks, then create an exFAT partition for the remaining?

Let me know what you think. I essentially want to use my USB drive as an "all in one" stick, that can do everything and anything.

Thanks!

Print this item

  KB5012170: Security update for Secure Boot DBX
Posted by: Van Flusen - 08-11-2022, 04:02 PM - Forum: Ventoy Discussion Forum - Replies (14)

After Windows update KB5012170 (August 9, 2022), Ventoy can no longer be booted with Secure boot enabled.

Summary

This security update makes improvements to Secure Boot DBX for the supported Windows versions listed in the "Applies to" section. Key changes include the following:

Windows devices that has Unified Extensible Firmware Interface (UEFI) based firmware can run with Secure Boot enabled. The Secure Boot Forbidden Signature Database (DBX) prevents UEFI modules from loading. This update adds modules to the DBX.

A security feature bypass vulnerability exists in secure boot. An attacker who successfully exploited the vulnerability might bypass secure boot and load untrusted software.

This security update addresses the vulnerability by adding the signatures of the known vulnerable UEFI modules to the DBX.

KB5012170

Print this item