Welcome, Guest |
You have to register before you can post on our site.
|
Forum Statistics |
» Members: 11,294
» Latest member: renatsoft
» Forum threads: 1,519
» Forum posts: 6,284
Full Statistics
|
Online Users |
There are currently 159 online users. » 1 Member(s) | 155 Guest(s) Bing, Google, Yandex, Epictetus
|
|
|
Is there a way to avoid having execute permissions added automatically to files? |
Posted by: lostipod - 02-15-2022, 01:11 AM - Forum: Ventoy Discussion Forum
- Replies (2)
|
|
Hello there. I noticed when I put files on a Ventoy drive that execution permissions get added to Owner, Group and Other (chmod a+x). I tried using the -r option when running Ventoy2Disk.sh and then created a separate partition with the remaining space on the drive, but execute permissions were still added to files when copied there. Is there a way to add regular files (non .iso / .img) to a Ventoy drive without having execution permissions added automatically?
|
|
|
【Solved】Issue: ventoy-1.0.66, Boot Conf Replace Plugin, SystemRescue 9.01 64Bit |
Posted by: JuppFlassbeck - 02-13-2022, 12:26 PM - Forum: Ventoy Plugin Forum
- Replies (5)
|
|
(https://sourceforge.net/projects/systemr...o/download)
I've been using SystemRescue since version 8. To make it work, I had to provide additional parameters to the boot-command -
for the 32 bit-version it is img_label=VolumeName and img_loop=path_to_iso
and
for the 64 bit version only the img_loop parameter.
I've done this with the Boot Conf Replace Plugin and a modified grubsrcd.cfg and sysresccd_sys.cfg file.
This worked until the version 9.01 of SystemRescue. With 9.01 it only works with the 32 bit-version, but not with the 64 bit-version, that ends the bootprocess with an error-message that it can not find the init-files.
If I start the 64 bit-version and then press Tab, I can see that the additional parameter is been provided, but it does not work. When I select in ventoy the compatible mode by pressing Ctrl-i, then start the 64 bit-version and hit Tab, I see the original boot-command without the img_loop parameter, if I then provide the img_loop-parameter manually it starts without error, so I presume that it is an error in the plugin. I now switched back to version 9.00 for the 64 bit-version and that is working again
|
|
|
WePE里面的CGI备份还原工具打不开 |
Posted by: lihanchen - 02-09-2022, 04:33 AM - Forum: Ventoy Discussion Forum
- Replies (1)
|
|
双击没反应,工具是用PECMD加载的
用wepe安装器直接安装到U盘就能打开,用ventoy加载ISO就打不开
试过WePE版本2.0-2.2
试过多个U盘,两台不同的电脑,开关memdisk
Ventoy+WePE里面其他软件都能打开,自己的CGI绿色版也能开
WePE里面双击CGI图标会在程序目录下创建一个ventoy文件夹,里面有WinLogin.exe,说明这个问题跟ventoy环境还是有一定关系
|
|
|
Drive X: is small. |
Posted by: hyun9358 - 02-08-2022, 09:33 PM - Forum: Ventoy Discussion Forum
- Replies (2)
|
|
In the early stages of Windows Setup, press Shift+F10 to go to the cmd window.
At this time ...
Drive X: is small.
I want to get more capacity.
Can I modify the controls in Ventoy?
|
|
|
Windows VHD Plugin - Veracrypt Whole Disk Encryption |
Posted by: trymeout - 02-07-2022, 05:45 PM - Forum: Ventoy Plugin Forum
- No Replies
|
|
Is there a way to have a Windows VHD that is fully encrypted using Veracrypt. Veracrypt is a free, open source disk encryption software which you can use to encrypt your Windows installation. It is an FOSS alternative BitLocker.
I tried two different approaches and neither worked. I first tried to boot up the Windows VHD in Ventoy and install Veracrypt and encrypt the system. Before Veracrypt encrypts the system drive, it will do a test to ensure it will work by rebooting Windows and ensuring your prompted with the Veracrypt password page. I was not prompted with the password page, no matter how I setup the system drive encryption.
I also tried booting up the Windows VHD in VirtualBox and installed Veracrypt and encrypted the system. It worked in Virtualbox but when I copied that Windows VHD file onto my Ventoy drive and booted it up, I get a Windows bootloader error and I am unable to boot into Windows since it is unable to prompt me the Veracrypt boot loader to decrypt the system.
Any help will be most appreciated!
|
|
|
|