Search This Blog

Sunday, January 31, 2010

News

Nintendo's Iwata dismisses iPad, 3D gaming
In AP report, Nintendo's Satoru Iwata says he doesn't believe Apple's iPad provides the kind of value some hoped it would. He also doesn't see much value in 3D gaming. 1/29/2010 10:18 AM
Read more Open in browser
Boeing puts 787 Dreamliner through stall tests
Company says that it has put its much-anticipated new plane through more than 50 stall tests and expects to do dozens more. So far, so good. 1/29/2010 8:52 AM
Read more Open in browser
Apple icon drops pants, suggests you e-mail your senator
In a PSA in support of the Clean Energy Jobs and American Power Bill, "Get a Mac" icon Justin Long encourages you to e-mail your senator. He also reminds you he's the Mac guy. 1/28/2010 4:46 PM
Read more Open in browser
McGraw-Hill on iPad launch: We didn't get booted; we weren't part of it
Remarks by CEO led some to believe the publisher was privy to iPad details before the launch, but that wasn't the case. It was never part of the event to begin with, says a spokesman. 1/28/2010 2:26 PM
Read more Open in browser
Who will buy the iPad?
The tech-savvy set has expressed mostly disappointment with Apple's latest device. But that doesn't appear to be Apple's intended audience. 1/28/2010 12:05 PM
Read more Open in browser
Expert sees security issues with the iPad
Security expert says things like strong encryption and an access control feature are missing from Apple's new iPad tablet device. 1/28/2010 10:55 AM
Read more Open in browser
Debating the merits of Apple's iPad
CNET writers Ina Fried and Josh Lowensohn hash out some of the pressing issues about the iPad: its merits, its faults, and what to look forward to in future iterations. 1/28/2010 9:12 AM
Read more Open in browser
$1 million for first perfecto in MLB 2K10
Almost any major league pitcher who threw a perfect game would be a millionaire. Now 2K Sports is offering a million dollars to the first gamer to toss one in its hit baseball video game. 1/28/2010 7:43 AM
Read more Open in browser
How 'Avatar' may predict the future of virtual worlds
When James Cameron invented a camera that integrated footage of actors directly into his digital universe, it may have presaged the worlds millions will spend time in one day. 1/28/2010 1:30 AM
Read more Open in browser
iPad unites Apple's media and mobile ambitions
The new tablet epitomizes Apple's direction as a mobile device maker and gatekeeper of media. 1/28/2010 1:30 AM
Read more Open in browser

Sunday, June 7, 2009

Server 2008 Commands based on Tasks

Task: View system information
Msinfo32
Set
Systeminfo

Task: View user information
Whoami

Task: Manage users and groups
Net accounts
Net group
Net localgroup
Net user

Task: View or change computer name
Hostname
Netdom renamecomputer

Task: Join or leave a domain
Netdom join

Task: Log off or shut down
Logoff
Shutdown

Task: Configure networking
Ipconfig
Netsh interface
Netsh routing
Route

Task: Configure Windows Firewall
Netsh advfirewallTask: Configure Internet Protocol security (IPsec)
Netsh ipsec
Scregedit.wsf

Task: Activate Windows
Slmgr.vbs

Task: Manage services
Net continue
Net pause
Net start
Net stop
Sc
Tasklist

Task: Manage processes
Taskkill
Tasklist
Taskmgr

Task: Manage tasks
At
Schtasks

Task: Collect and analyze performance data
Logman
Relog
Typeperf

Task: View events and manage event logs
Wevtutil

Task: Manage disks and storage
Compact
Defrag
Diskpart
Diskraid
Mountvol

Task: Manage Volume Shadow Copy Service (VSS)
Vssadmin
Cacl

Task: Manage file systems and file permissions
Convert
Fsutil
Icacls
Takeown

Task: Manage files
Openfiles
Sigverif

Task: Manage shares and share permissions
Net share

Task: Manage the registry
Reg
Regedit

Task: Install and manage drivers
Driverquery
Pnputil
Sc

Task: Install and manage updates
Pkgmgr
Scregedit.wsf
Systeminfo
Wuauclt
Wusa

Task: Install roles and features
Oclist
Ocsetup

Task: Install applications
Msiexec

Task: Manage Group Policy
Gpresult
Gpupdate
Secedit

Task: Manage certificates
Certreq
Certutil

Task: Manage Terminal Services (Remote Desktop for Administration)
Change
Logoff
Msg
Mstsc
Qappsrv
Qprocess
Query
Qwinsta
Reset session
Rwinsta
Shadow
Tscon
Tsdiscon
Tskill

Thursday, May 21, 2009

WMI Asset Logger System Management Tool for remote controling the Windows systems

Intro

WMI Asset Logger is a multifaceted utility that has the ability to return a great deal of information about windows based computer systems on your network, all from the convenience of your Windows XP workstation. WMI Asset Logger is also much more than that too, it is an administrator’s friend. Once you have scanned your network the true power of WMI Asset Logger comes out. Using the right-click speed menu enables you to quickly perform many tasks. Simply right-click on the desired host and choose Remote Control (initiate RDP Session), Remote Management Console, Install Software, View/Browse/Delete Shares, View/Start/Stop Processes on remote systems, and more. If you have administrative rights to a XP workstation, but the firewall is preventing you from getting results, simply right-click on the system and disable the XP firewall. Wait one minute, and rescan the system.

Tired of having client/server based tools that blue-screen remote hosts? Or tired of dealing with messy Logon scripts to gather important information? WMI Asset Logger does not require any client-side installations and is a stand alone application. WMI Asset Logger uses all the tools that already exist on your XP Workstation to perform its duties. These utilities are native to windows and are much more stable than any add-on could hope to be. WMI Asset Logger also monitors its own progress too, if a client system hangs up WMI Asset Logger and you have to terminate it, it will automatically blacklist the computer system that was being scanning when it was terminated.

Just need a down dirty quick inventory of NetBIOS -> IP -> MAC -> FQDN relationships? Not a problem, simply perform an IP Inventory using WMI Asset Logger. WMI Asset logger will blaze through a list of 2000 computer with impressive speeds, and will even return the IP Address of systems that are currently off-line, allowing you to determine if a system’s account may need to be deleted. (No IP information typically means the PC hasn’t been seen in the duration of a DHCP lease cycle).

You can enumerate a list of hosts to scan using the master browser list, or through the use of ADSI (Active Directory Server Interface). WMI Asset logger can also import text files as well as directly import DSQUERY COMPUTER text dumps too. And as a last resort an IP Ping Sweeper that will ping every IP Address that exists between any two addresses. WMI Asset Logger has the ability to save scans to Tab delimited text files, Straight to Microsoft Excel, or directly to your default printer, and now as of version 5.7f, dump your scans straight to the included MS Access Database.

Features

  • Microsoft Access Database Support - no limitations on number of clients.
  • FREELY LICENSED FOR PERSONAL AND CORPORATE USE.
  • Windows Management Instrumentation (WMI) Network Scanning.
  • DNS Forward/Reverse look-up tool.
  • InstallNow! Use WMI to remotely install software packages in real-time.
  • Dump Advanced WMI report of any computer straight to HTML or XLS.
  • View, Create, and Stop remote processes on any computer (requires necessary user rights).
  • View, Explore, Map, and Delete remote shares, including hidden shares!
  • Perform an IP Inventory. This generates a list of NetBIOS --> IP --> MAC --> FQDN for all your windows hosts. (amazingly fast too)
  • NEW! Script Runner ! RUN YOUR OWN EXTERNAL VBS, BAT, or CMD FILES USING WMI Asset Logger!
  • Remote software installation, this copies files to the remote computer and adds a RunOnce registry entry. This causes the installation to run silently in the background the next time the PC is re-booted.
  • Remotely start/stop Windows XP Firewall Service! Sometimes the Windows XP Firewall will prevent the WMI interface from responding on the remote system. WMI Asset Logger can disable the firewall of the remote host so you can still get results.
  • Use of Alternate User credentials for WMI scanning.
  • Import DSQUERY COMPUTER text file dumps directly into WMIAL.
  • Alternate user passwords are encrypted for security purposes.
  • In-depth information on systems that return results via WMI.
  • Right-click speed menu system and Hot-Key enabled menu systems.
  • Dump straight to your default printer, from WMIAL, with out the need for any third-party software. No need to open results in Excel or Word to print.
  • Dump directly to Microsoft Excel 97, 2000, XP, and 2003!
  • Right-click management of scanned systems, and remote control(Remote Control requires Windows XP)
  • Push software to large numbers of computers with a few simple clicks.
  • Non-proprietary Information storage for flexibility and portability. (TAB Delimited Text file dumps).
  • Text File importing, scan a specific list of systems with-out having to muddle through an expansive list of computers in the Network Neighborhood.
  • Fall back Registry scanning in the event WMI is not present or errors out.
  • Reboot or shutdown remote hosts.
  • Result type filtering, great for finding systems that don’t have WMI, or for finding systems where your access is denied (which means you need to go add your global admin groups)
    OS Filtering. You can use this to filter out NT, XP, or 2000 systems.
  • IP Ping utility, use PING to generate a list of scan candidates from just about any range of IP Addresses.
  • Browse List Enumeration for faster scanning and ADSI Enumeration for pulling domain member list.
  • You can dump multiple domains into the list for scanning, and then select systems across domains to scan in the even you have people spread out over a few locations or states.
  • Automated E-Mailing of the results via. SMTP

To Download this tool click on this link

TRUECRYPT Data Security Open Source Tool

TrueCrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted or decrypted right before it is loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).

Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph.Let's suppose that there is an .avi video file stored on a TrueCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the TrueCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, TrueCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading next small portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types, not only for video files.

Note that TrueCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile).

To Download the Truecrypt Link

Expanding Virtual Disk of VMware Server in Windows

To expand an existing partition, the Virtual Machine must be shutdown and powered off. The vmware-vdiskmanager utility resides in the directory that VMWare server was installed. Open a command prompt and navigate to the VMWare server directory.

C:\Program Files>cd VMware

C:\Program Files\VMware>cd "VMware Server"

C:\Program Files\VMware\VMware Server>vmware-vdiskmanager -x 25GB "d:\VM\ForumTest\ForumDB.vmdk"
Using log file C:\DOCUME~1\Jakki\LOCALS~1\Temp\vmware-jakki\vdiskmanager.log

Grow: 100% done.
The old geometry C/H/S of the disk is: 2610/255/63
The new geometry C/H/S of the disk is: 3263/255/63
Disk expansion completed successfully.

WARNING: If the virtual disk is partitioned, you must use a third-party
utility in the virtual machine to expand the size of the
partitions. For more information, see:
http://www.vmware.com/support/kb/enduser/std_adp.php?p_faqid=1647
You should now see the new size of the virtul disk. Also, notice the Warning message above. You will need to use a third party tool such as Partition Magic or Acronis Disk Director to resize the partition inside the Virtual Machine Operating System.
To list all available options for vmware-vdiskmanager, just enter the following at a command prompt:
vmware-vdiskmanager.exe /?

Sunday, May 17, 2009

Steps for installing server roles on a 2008 Server Core installation

To see the roles installed on the server, we should use oclist command.

DNS Server role
To install the DNS Server role
1. At a command prompt, type:
start /w ocsetup DNS-Server-Core-Role

After this by using dnscmd from the command prompt we can configure the configuration part like adding DNS zones & records, One more easy way is there by using remote management we can configure all these configurations from the remote server by using DNS management GUI console.

To uninstall the DNS server role

start /w ocsetup DNS-Server-Core-Role /uninstall

IMPORTANT: Server role should be mentioned with case sensitive.

DHCP Server role
To install the DHCP Server role
1. At a command prompt, type:
start /w ocsetup DHCPServerCore
2. Configure a DHCP scope at the command prompt by using netsh, or by remotely using the DHCP snap-in from Windows Server 2008.
3. If the DHCP server is installed in an Active Directory domain, you must authorize it in Active Directory. The DHCP Server service does not start automatically by default. Use the following procedure to configure it to start automatically and to start the service for the first time.

To configure and start the DHCP Server service
1. At a command prompt, type:
sc config dhcpserver start= auto
2. Start the service by typing:
net start dhcpserver
start /w ocsetup DHCPServerCore /uninstall at the command prompt will uninstall the DHCP Server role

To install File Services role features

For File Replication Service, type the following at a command prompt:
start /w ocsetup FRS-Infrastructure

For Distributed File System service, type:
start /w ocsetup DFSN-Server

For Distributed File System Replication, type:
start /w ocsetup DFSR-Infrastructure-ServerEdition

For Services for Network File System (NFS), type:
start /w ocsetup ServerForNFS-Base
start /w ocsetup ClientForNFS-Base

Hyper-V role
To install the Hyper-V role, at a command prompt, type:
start /w ocsetup Microsoft-Hyper-V
To manage Hyper-V on a Server Core installation, use the Hyper-V management tools to manage the server remotely. These tools are available for Windows Server 2008 and Windows Vista Service Pack 1.

Print Services role
To install Print Services role features
For the Print Server feature, type the following at a command prompt:
start /w ocsetup Printing-ServerCore-Role
For the Line Printer Daemon (LPD) service, type:
start /w ocsetup Printing-LPDPrintService
To add a printer to the print server
1. Determine the IP address or host name of the printer. This may be on the printer's test or printer configuration page or you might need to refer to the manufacturer's documentation for instructions.
2. Verify that the print server can communicate with the printer through the network by pinging the printer from the print server.
3. On another computer running Windows Vista or Windows Server 2008, open the Print Management console and add the server running the Server Core installation.
4. Expand the entry for the print server running a Server Core installation, right-click Drivers, and then click Add Driver. The Add Printer Driver Wizard starts.
5. Complete the wizard to install the printer driver for your printer.
6. In the Print Management console, right-click Printers and then click Add Printer. The Network Printer Installation Wizard starts.
7. Click Add a TCP/IP or Web Services printer by IP address or hostname and then click Next.
8. Enter the printer's host name or IP address (the port name will be the same by default), and then click Next.
9. Make any necessary changes to the printer name, contact information, or sharing status, and then click Next.

Web Server (IIS) role
To install the Web Server role
For the default installation, type the following at a command prompt and press ENTER:
start /w pkgmgr /iu:IIS-WebServerRole;WAS-WindowsActivationService;WAS-ProcessModel

For an installation that includes all of the options, type the following at a command prompt and press ENTER:

start /w pkgmgr /iu:IIS-WebServerRole;IIS-WebServer;IIS-CommonHttpFeatures;IIS-StaticContent;IIS-DefaultDocument;IIS-DirectoryBrowsing;IIS-HttpErrors;IIS-HttpRedirect;IIS-ApplicationDevelopment;IIS-ASP;IIS-CGI;IIS-ISAPIExtensions;IIS-ISAPIFilter;IIS-ServerSideIncludes;IIS-HealthAndDiagnostics;IIS-HttpLogging;IIS-LoggingLibraries;IIS-RequestMonitor;IIS-HttpTracing;IIS-CustomLogging;IIS-ODBCLogging;IIS-Security;IIS-BasicAuthentication;IIS-WindowsAuthentication;IIS-DigestAuthentication;IIS-ClientCertificateMappingAuthentication;IIS-IISCertificateMappingAuthentication;IIS-URLAuthorization;IIS-RequestFiltering;IIS-IPSecurity;IIS-Performance;IIS-HttpCompressionStatic;IIS-HttpCompressionDynamic;IIS-WebServerManagementTools;IIS-ManagementScriptingTools;IIS-IIS6ManagementCompatibility;IIS-Metabase;IIS-WMICompatibility;IIS-LegacyScripts;IIS-FTPPublishingService;IIS-FTPServer;WAS-WindowsActivationService;WAS-ProcessModel

Known issues for installing a server role on a Server Core installation of Windows Server 2008 R2

1)You cannot use the Active Directory Domain Controller Installation Wizard (Dcpromo.exe) on a server running Server Core installation. You must use an unattend file with Dcpromo.exe to install or remove the domain controller role. Alternately, you can run Dcpromo.exe on another computer running Windows Server 2008 R2 and use the wizard to save an unattend file that you can then use on the server running Server Core installation.

2)Dcpromo.exe will restart the computer immediately when the installation is complete or when Active Directory is removed unless RebootOnCompletion=No is included in the answer file.

3)The Web Server (IIS) role supports a subset of ASP.NET in Server Core installations of Windows Server 2008 R2. The following IIS features are available in Server Core installations of Windows Server 2008 R2, see the section “Web Server (IIS) role.”

Wednesday, April 22, 2009

How to create Automated installation Answer file for XP

Windows Setup Manager provides a straightforward wizard interface. To create an answer file for a fully automated installation by using Windows Setup Manager, use these steps:
1. In Windows Explorer, locate the folder where you extracted Windows Setup Manager (setupmgr.exe). Double-click setupmgr.exe. Windows XP Professional starts the Windows Setup Manager Wizard.
2. Click Next. The New Or Existing Answer File page appears.
3. Ensure that the Create A New Answer File is selected, and then click Next. The Windows Setup Manager Wizard displays the Product To Install page, which provides the following three options:
❑ Windows Unattended Installation
❑ Sysprep Install
❑ Remote Installation Services
4. Ensure that Windows Unattended Installation is selected, and then click Next. The Windows Setup Manager Wizard displays the Platform page.
5. Ensure that Windows XP Professional is selected, and then click Next. The Windows Setup Manager Wizard displays the User Interaction Level page, shown in Figure 3-2, which has the following five options:
❑ Provide Defaults. The answers you provide in the answer file are the default answers that the user sees. The user can accept the default answers or change any of the answers supplied by the script.
❑ Fully Automated. The installation is fully automated. The user does not have the chance to review or change the answers supplied by the script.
❑ Hide Pages. The answers provided by the script are supplied during the installation. Any page for which the script supplies all answers is hidden from the user, so the user cannot review or change the answers supplied by the script.
❑ Read Only. The script provides the answers, and the user can view the answers on any page that is not hidden, but the user cannot change the answers.
❑ GUI Attended. The text-mode portion of the installation is automated, but the user must supply the answers for the graphical user interface (GUI) mode portion of the installation.


6. Select Fully Automated, and then click Next. The Windows Setup Manager Wizard displays the Distribution Folder page. The Setup Manager Wizard can create a distribution folder on your computer or network containing the required source files. You can add files to this distribution
folder to further customize your installation.
7. Select No, This Answer File Will Be Used To Install From A CD, and then click Next. The Windows Setup Manager Wizard displays the License Agreement page.
8. Select I Accept The Terms Of The License Agreement, and then click Next.

9. Type your name in the Name box and your organization in the Organization box, and then click Next. The Windows Setup Manager Wizard displays the Display Settings page.
10. Leave the default settings on the Display Settings page, and then click Next. The Windows Setup Manager displays the Time Zone page.
11. Select the appropriate time zone, and then click Next. The Windows Setup Manager Wizard displays the Providing The Product Key page.
12. Type in the appropriate product key.
13. Click Next. The Windows Setup Manager Wizard displays the Computer Names page, shown
in Figure 3-4. Notice that you have three choices:
❑ Enter a series of names to be used during the various iterations of the script.
❑ Click Import and provide the name of a text file that has one computer name per line listed. Setup imports and uses these names as the computer names in the various iterations of the script.
❑ Select Automatically Generate Computer Names Based On Organization Name to allow the system to automatically generate the computer names to be used.


14. In the Computer Name text box, type a name for the computer, and then click Add. Repeat this step to add additional computers to the installation.
15. Click Next. The Windows Setup Manager Wizard displays the Administrator Password page,
which appears with the following two options:

❑ Prompt The User For An Administrative Password
❑ Use The Following Administrative Password (127 Characters Maximum)
Notice that you have the option to encrypt the Administrator’s password in the answer file. You also have the option to have the Administrator log on automatically, and you can set the number of times you want the Administrator to log on automatically when the computer is restarted.
16. Ensure that Use The Following Administrative Password (127 Characters Maximum)
is selected, and then type a password in the Password text box and the Confirm Password box.
17. Select Encrypt Administrator Password In Answer File, and then click Next. The Windows Setup Manager Wizard displays the Networking Components page, shown in Figure 3-5, with the following two options:
❑ Typical Settings. Installs Transmission Control Protocol/Internet Protocol (TCP/IP), enables Dynamic Host Configuration Protocol (DHCP), installs the Client For Microsoft Networks protocol, and installs File And Printer Sharing For Microsoft Networks for each destination computer
❑ Customize Settings. Allows you to select and configure the networking components to be installed

18. Configure network settings as appropriate for your network, and then click Next. The Windows Setup Manager Wizard displays the Workgroup Or Domain page.
19. If the computer will join a workgroup, type the workgroup name. If the computer will join a domain, click Windows Server Domain, and then type the name of the domain. If a computer that will join a domain does not already have a computer account in that domain, you can have Windows Setup create such an account during installation. Click Create A Computer Account In The Domain, and then enter the credentials for an account that has permission to create new computer accounts in the domain. Click Next to continue. The Windows Setup Manager Wizard displays the Telephony page.
20. Select the appropriate setting for What Country/Region Are You In.
21. Type the appropriate setting for What Area (Or City) Code Are You In.
22. If necessary, type the appropriate setting for If You Dial A Number To Access An Outside Line, What Is It.
23. Select the appropriate setting for The Phone System At This Location Uses, and then click Next. The Windows Setup Manager Wizard displays the Regional Settings page. The default selection is Use The Default Regional Settings For The Windows Version You Are Installing, but you can also specify different regional settings.
24. Configure the regional settings, and then click Next. The Windows Setup Manager Wizard displays the Languages page, which allows you to add support for additional languages.
25. Select additional languages if they are required for the computers on which you will install Windows XP Professional, and then click Next. The Windows Setup Manager Wizard displays the Browser And Shell Settings page with the following three options:
❑ Use Default Internet Explorer Settings
❑ Use An Autoconfiguration Script Created By The Internet Explorer Administration
Kit To Configure Your Browser
❑ Individually Specify Proxy And Default Home Page Settings
26. Make your selection, and then click Next. The Windows Setup Manager Wizard displays the Installation Folder page with the following three options:
❑ A Folder Named Windows. This is the default selection.
❑ A Uniquely Named Folder Generated By Setup. Setup generates a unique folder name so that the installation folder will be less obvious. This folder name is recorded in the Registry, so programs and program installations can easily access the Windows XP Professional system files and folders.
❑ This Folder. If you select this option, you must specify a path and folder name.
27. Make your selection, and then click Next. The Windows Setup Manager Wizard displays the Install Printers page, shown in Figure 3-6, which allows you to specify a network printer to be installed the first time a user logs on after Setup.

28. Add any printers that you want to configure during installation, and then click Next. The Windows Setup Manager Wizard displays the Run Once page. This page allows you to configure Windows to run one or more commands the first time a user logs on.
29. To add a command, type the command in the Command To Run text box, and then click Add. Click Next when you are finished adding commands. The Windows Setup Manager Wizard displays the Additional Commands page. This page allows you to specify additional commands to be run at the end of the unattended setup before any user logs on to the computer.
30. To add a command, type the command in the Command To Run text box, and then click Add. Click Finish when you are finished adding commands. The Windows Setup Manager Wizard displays a dialog box indicating that the Windows Setup Manager has successfully created an answer file. It also prompts you for a location and a name for the script. The default is a file named unattend.txt in the folder from which you launched Windows Setup Manager.
31. Accept the default name and location, or type an alternate name and location. Click OK to continue. The Windows Setup Manager Wizard displays the Setup Manager Complete page,
indicating that new files were created:
❑ unattend.txt is the answer file.
❑ unattend.udb is the uniqueness database file created if you supply multiple computer names.
❑ unattend.bat is a batch script that will launch the Windows installation using the answer file and uniqueness database file.
32. On the File menu, click Exit.