| Welcome, Guest |
You have to register before you can post on our site.
|
| Forum Statistics |
» Members: 13,797
» Latest member: schhqq
» Forum threads: 1,679
» Forum posts: 6,736
Full Statistics
|
| Online Users |
There are currently 442 online users. » 0 Member(s) | 438 Guest(s) Baidu, Bing, DuckDuckGo, Google
|
| Latest Threads |
Default to BIOS boot
Forum: iVentoy Discussion Forum
Last Post: eilmrein
12-13-2025, 01:41 PM
» Replies: 2
» Views: 5,843
|
Remove Secation from Them...
Forum: Ventoy Plugin Forum
Last Post: Somii
12-13-2025, 12:30 PM
» Replies: 0
» Views: 72
|
About the low activity
Forum: Ventoy Discussion Forum
Last Post: Susan028
12-13-2025, 11:22 AM
» Replies: 5
» Views: 9,675
|
Lost ISO partition
Forum: Ventoy Discussion Forum
Last Post: Susan028
12-11-2025, 07:15 AM
» Replies: 1
» Views: 1,578
|
VHD don't work
Forum: Ventoy Plugin Forum
Last Post: Susan028
12-08-2025, 09:37 AM
» Replies: 2
» Views: 6,528
|
How can i recover control...
Forum: Ventoy Discussion Forum
Last Post: elreydelaswasas1
11-26-2025, 04:05 PM
» Replies: 0
» Views: 469
|
ventoy运行windows系统镜像问题
Forum: Ventoy Discussion Forum
Last Post: leo
11-21-2025, 12:29 PM
» Replies: 0
» Views: 858
|
Boot 32 bit Windows
Forum: Ventoy Plugin Forum
Last Post: Steve2926
11-07-2025, 11:03 AM
» Replies: 3
» Views: 8,361
|
Live ISO Building ?
Forum: Ventoy Discussion Forum
Last Post: Eliott
10-31-2025, 02:02 AM
» Replies: 1
» Views: 1,446
|
Menu Spacing
Forum: Ventoy Discussion Forum
Last Post: fan_boy
10-30-2025, 03:49 AM
» Replies: 0
» Views: 653
|
|
|
| How to make your own Theme for a non linux user |
|
Posted by: Sparks79 - 08-15-2022, 06:46 AM - Forum: Ventoy Plugin Forum
- Replies (3)
|
 |
I have Dozens of Iso's on my External ventoy SSD.
And the Menu looks crap and is hard to sort through and therefore takes time.
So i need help in creating a Decent Menu.
I am a Die Hard Windows User.
I have used linux a bit but I get lost very easy.
Can someone help me with info about building a menu using windows 10.
And then Transferring it over to the Ventoy SSD
|
|
|
| I think that I've messed up |
|
Posted by: C@se_G@ge - 08-15-2022, 01:06 AM - Forum: Ventoy Discussion Forum
- Replies (9)
|
 |
all,
I'm attempting to install a distribution of linux. I have previously use Ventoy to install Alma linux, but I need to intsall another distribution, so thats that. My issue is that when I boot into the Ventoy Menu, which looks like it installed correctly, the bootable .iso isn't available. Currently the flash drive I'm using is a 32gig onn. and has two partitions listed as sda1 and 2. 1 is 28.9 GiB and 2 is 32 Mib, and this is where the ventoy tool seems to live. I hope you can help me with my dilema, its a bit strange to me.
|
|
|
| 一个不知道是不是BUG的问题 |
|
Posted by: 不知道是谁 - 08-14-2022, 06:29 AM - Forum: Ventoy Discussion Forum
- Replies (2)
|
 |
使用ventoy引导wepe,进入wepe后无法弹出usb驱动器,仅使用wepe的情况下是可以做到弹出usb驱动器的
倒并不影响正常使用,只是有些情况下需要提前移除USB驱动器避免重启时再次进入u盘引导,不然只能点完重启拼手速再拔U盘了
请问这个问题是正常现像吗?希望可以解下困惑,谢谢
|
|
|
| Microsoft blocks UEFI bootloaders enabling Windows Secure Boot bypass |
|
Posted by: aboamir@gmail.com - 08-13-2022, 07:11 AM - Forum: Ventoy Discussion Forum
- No Replies
|
 |
long panda you should read this
------------------------------------------------------
Some signed third-party bootloaders for the Unified Extensible Firmware Interface (UEFI) could allow attackers to execute unauthorized code in an early stage of the boot process, before the operating system loads.
Vendor-specific bootloaders used by Windows were found to be vulnerable while the status of almost a dozen others is currently unknown.
Threat actors could exploit the security issue to establish persistence on a target system that cannot be removed by reinstalling the operating system (OS).
Elysium security researchers Mickey Shkatov and Jesse Michael discovered vulnerabilities affecting UEFI bootloaders from third-party vendors that could be exploited to bypass the Secure Boot feature on Windows machines.
Secure Boot is part of the UEFI specification designed to ensure that only trusted code - signed with a specific, vendor-supplied certificate - is executed to start the OS booting process.
The firmware bootloader runs immediately after turning on the system to initialize the hardware and to boot the UEFI environment responsible for launching the Windows Boot Manager.
[b]Overview of the boot process on UEFI systems[/b]
source: Microsoft
Eclypsium researchers found that three UEFI bootloaders that were approved by Microsoft had vulnerabilities that permitted bypassing the Secure Boot feature and executing unsigned code:
The three Microsoft-approved UEFI bootloads that were found to bypass the Windows Secure Boot feature and execute unsigned code are:- New Horizon Datasys Inc: CVE-2022-34302 (bypass Secure Boot via custom installer)
- CryptoPro Secure Disk: CVE-2022-34301 (bypass Secure Boot via UEFI Shell execution)
- Eurosoft (UK) Ltd: CVE-2022-34303 (bypass Secure Boot via UEFI Shell execution)
Microsoft has worked with the last two vendors in the list above and released security update KB5012170 to fix the problem in the provided bootloader.
As part of this fix, Microsoft has blocked all of their required certificates that were issued with the Security Update Release from July 2022.
"This security update addresses the vulnerability by adding the signatures of the known vulnerable UEFI modules to the DBX" - Microsoft
In an advisory this week about the vulnerabilities, the Carnegie Mellon CERT Coordination Center warns that code executed in the early boot stages could “also evade common OS-based and EDR security defenses.”
Carnegie Mellon CERT CC has provided a list with 23 UEFI bootloader vendors, a clear status being available for just three of them: Microsoft (impacted), Phoenix Technologies (not impacted), and Red Hat (not impacted).
The rest of the 20 vendors have also been informed about the issues but it is currently unknown if their products are affected or not.
The list includes names like Acer, AMD, American Megatrends, ASUSTeK, DELL, Google, Hewlett Packard Enterprise, HP, Lenovo, Toshiba, and VAIO Corporation.
A fix for these vulnerabilities should be delivered either by the Original Equipment Manufacturer (OEM) or the OS vendor by updating the UEFI Revocation List - the Secure Boot Forbidden Signature Database (DBX), a database of revoked signatures for previously approved firmware and software that starts systems with UEFI Secure Boot.
|
|
|
| does not boot from ventoy usb, no ventoy menu appears |
|
Posted by: sen - 08-12-2022, 12:09 PM - Forum: Ventoy Discussion Forum
- Replies (2)
|
 |
I properly installed (from Windows 10) Ventoy on a USB stick a couple of days ago and copied a Linux Mint iso and a Puppy Linux iso to the proper partition (reformatted as FAT32), but my computer refuses to acknowledge Ventoy.
I first tried it by accessing the boot menu from BIOS (UEFI, secure boot disabled). Selecting the proper boot option does nothing and I return to the BIOS screen. When I select Windows, it boots up normally. I tried switching the correct boot option to the top of the boot priority, saved and exited, but it still booted to Windows as if the option didn't exist. I also tried to boot again directly from the boot menu this time (instead of accessing the boot menu from BIOS), it still didn't work.
I have live-booted Linux Mint on this machine from this same USB stick previously (I used Etcher then) so I don't think it's a hardware problem either. Can anyone help me? This is my first time posting to a forum like this, so I hope I have provided all the information needed.
|
|
|
| Does Ventoy write to "Track 0" on the UFD? |
|
Posted by: bbertrand007 - 08-12-2022, 12:47 AM - Forum: Ventoy Discussion Forum
- No Replies
|
 |
1) During install, if MBR is chosen, does Ventoy write to the "hidden track 0" some boot code
2) Technically curious - how does Ventoy boot in BIOS mode? Does the MBR pass control to a program in the VToyEFI partition and if so, is it the same program that Bootx64.efi passes control to in UEFI mode?
|
|
|
|