Jump to content

Search the Community

Showing results for tags 'entries.ini'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General
    • Announcements
    • General Discussion
    • Introduction
  • WinCert Member Projects
    • Win Toolkit
    • HeiDoc.net Projects
    • Windows Post-Install Wizard (WPI)
    • WPI, nLite and RVM Addons
    • DX WinNT6.x True Integrator
    • Switchless installers
    • XP Theme Source Patcher
    • OS Transformation Packs
    • Installer Repacks
  • WinCert.net International
    • WinCert.net Turkish
    • WinCert.net Italian
    • WinCert.net French
    • WinCert.net Spanish
    • WinCert.net Dutch
    • WinCert.net German
  • Microsoft Operating Systems and Software
    • Microsoft Windows
    • Microsoft Windows Server Family
    • Microsoft Office
    • Tips and Tricks
  • News, Support, Discussion
    • Software Field
    • Hardware Field
    • Networks and Security Field
    • Games Hangout
    • Scripting and Programming
    • Drivers Field
  • The Design Art Forum
    • Graphics Showcase
    • Windows Customization
    • Web Design/Hosting/Administering
  • Miscellaneous
    • Site and Forum Issues

Calendars

  • Community Calendar

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 2 results

  1. In the current version of NT6.x True Integrator, is it still necessary to append the entries.ini file? ie: entries_java7u7.ini The reason I ask is because I have noticed several true addon makers in the forum do not adopt this convention. Their addons simply contain entries.ini. It seems redundant considering the entire addon is contained in a cab file. Is this an old requirement from older versions of the tool?
  2. entries.ini commands supported by DX WinNT6.x True Integrator [sysPrepOC] Component_Name=advpack.dll,LaunchINFSection,INF_FileName,SectionName ;or Component_Name=setupapi.dll,InstallHinfSection,INF_FileName,SectionName ;;;example [SysPrepOC]Unlocker=advpack.dll,LaunchINFSection,Unlocker.inf,UnlockerSilverlight=setupapi.dll,InstallHinfSection,MSSlight.inf,Silverlight[General];;;example [General]BuildDate=2010-10-27T11:05:11ZDescription="Freeware tool which overcomes a Windows bug"Language=EnglishTitle=UnlockerVersion=1.9.0WebSite=http://ccollomb.free.fr/unlocker/processorArchitecture=x86 ; --> Warning: this key is used to force addon integration only in a certain system architecture; if present OS architecture is not the one defined in this key, DX WinNT6.x True Integrator skips the AddOnForceLang=Italiano ; --> Warning: this key is used to force addon integration only in a certain system language; if present OS language is not the one defined in this key, DX WinNT6.x True Integrator skips the AddOnReleaseType=True AddOnCustomizedby=OnePieceCopyright=CEDRICK 'NITCH' COLLOMBCompany=CEDRICK 'NITCH' COLLOMBInstallPackageName=Unlocker.infLastUpdateTime=2010-10-27T11:05:11Zabout Dirids:http://msdn.microsof...8(v=VS.85).aspx about Security Descriptor Definition Language to be used in [securityRegistry*Integration] and in [securityFiles*Integration]: http://msdn.microsof...7(v=VS.85).aspx http://msdn.microsof...e/cc982153.aspx http://blogs.technet...ove-part-1.aspx http://technet.micro...y/cc512610.aspx [securityRegistryBeforeIntegration] ;;;example [SecurityRegistryBeforeIntegration]"CLASSES_ROOT\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""CURRENT_USER\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""CURRENT_USER\Software\Classes",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""MACHINE\SOFTWARE\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""MACHINE\SYSTEM\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""MACHINE\SECURITY\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""MACHINE\SAM\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""MACHINE\COMPONENTS\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\.DEFAULT\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\DefaultUsers\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)"[securityRegistryAfterIntegration];;;example [SecurityRegistryAfterIntegration]"USERS\S-1-5-18_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\SystemProfile_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\S-1-5-18\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\SystemProfile\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\S-1-5-19_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\LocalService_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\S-1-5-19\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\LocalService\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\S-1-5-20_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\NetworkService_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\S-1-5-20\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\NetworkService\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\S-1-5-21*_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\UserProfile_Classes\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\S-1-5-21*\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\UserProfile\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)""USERS\SMIStoreMachine\Name",0,"D:P(A;CIOI;GR;;;BU)(A;CIOI;GA;;;BA)(A;CIOI;GA;;;SY)(A;CIOI;GA;;;CO)" DX WinNT6.x True Integrator loads this HIVES as default, so like previous example if want to add reglines in HKLM\Software, you need to use MACHINE\%KEY_SOFTWARE%, if you want to add or delete reglines in HKLM\System instead, you need MACHINE\%KEY_SYSTEM% "%MountDir%\Windows\System32\config\SOFTWARE" = %KEY_SOFTWARE%"%MountDir%\Windows\System32\config\SYSTEM" = %KEY_SYSTEM%"%MountDir%\Windows\System32\config\SECURITY" = %KEY_SECURITY%"%MountDir%\Windows\System32\config\SAM" = %KEY_SAM%"%MountDir%\Windows\System32\config\COMPONENTS" = %KEY_COMPONENTS%"%MountDir%\Windows\System32\config\DEFAULT" = %KEY_DEFAULT%"%MountDir%\Users\default\ntuser.dat" = %KEY_NTUSER%"%MountDir%\Windows\system32\smi\store\Machine\schema.dat" = %KEY_SCHEMA%"%MountDir%\WINDOWS\system32\config\systemprofile\NTUSER.DAT" = %KEY_NTUSER_SP%"%MountDir%\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_SP%"%MountDir%\Windows\ServiceProfiles\LocalService\NTUSER.DAT" = %KEY_NTUSER_LS%"%MountDir%\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_LS%"%MountDir%\Windows\ServiceProfiles\NetworkService\NTUSER.DAT" = %KEY_NTUSER_NS%"%MountDir%\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_NS%"%MountDir%\Users\Administrator\NTUSER.DAT" = %KEY_NTUSER_ADMIN%"%MountDir%\Users\Administrator\AppData\Local\Microsoft\Windows\UsrClass.dat" = %KEY_USRCLASS_ADMIN%[securityFilesBeforeIntegration];;;example [SecurityFilesBeforeIntegration]%11%\FileName.exe,0,"D:P(A;;GA;;;BA)(A;;GR;;;SY)(A;;GR;;;BU)"%PROGRAMDATA%,0,"D:PAI(A;;0x1200a9;;;SY)(A;OICIIO;GXGR;;;SY)(A;;FA;;;BA)(A;OICIIO;GA;;;BA)(A;;0x1200a9;;;BU)(A;OICIIO;GXGR;;;BU)"%10%\regedit.exe,0,"D:P(A;CI;GR;;;LS)(A;CI;GR;;;BU)(A;CI;GR;;;PU)(A;CI;GA;;;BA)(A;CI;GA;;;SY)(A;CI;GA;;;CO)"[securityFilesAfterIntegration];;;example [SecurityFilesAfterIntegration]%11%\FileName.exe,0,"D:P(A;;GR;;;BA)(A;;GR;;;SY)(A;;GR;;;BU)"%ALLUSERSPROFILE%,0,"D:P(A;CI;GR;;;BU)(A;CI;GA;;;BA)(A;CI;GA;;;SY)(A;CI;GA;;;CO)"%16422%,0,"D:P(A;CI;GR;;;BU)(A;CI;GA;;;BA)(A;CI;GA;;;SY)(A;CI;GA;;;CO)"[TweaksAddReg];;;example [TweaksAddReg]HKLM, "%KEY_SOFTWARE%\ProgramName", "Test", %REG_SZ%, "Test....."HKLM, "Test\Test2", "Test2", %REG_SZ%, "Test2.....";;;see example in [ProcessesToRun*Integration] where RegHive has been loaded in HKLM\Test[TweaksDelReg];;;example [TweaksDelReg]HKLM, "%KEY_SOFTWARE%\ProgramName"SourceFiles = Directory where the addon has been extractedMountDir = Directory where the image has been mounted Warning: %MountDir% is an optional variable, there's no need for it as MountDir is always DIRID 24 (Root directory of the system disk), so %24%\ is always mount directory destination[ProcessesToRunBeforeIntegration] ;;;example [ProcessesToRunBeforeIntegration]reg load HKLM\Test "%Mountdir%\Windows\System32\config\RegHive""%SourceFiles%\ResHacker.exe" -delete "%16422%\Internet Explorer\iexplore.exe", "%16422%\Internet Explorer\iexplore.exe", Icon,,"%SourceFiles%\ResHacker.exe" -addoverwrite "%16422%\Internet Explorer\iexplore.exe", "%16422%\Internet Explorer\iexplore.exe", "%SourceFiles%\Icon.res",,,"%SourceFiles%\ResHacker.exe" -delete "%MountDir%\Program Files\Internet Explorer\iexplore.exe", "%MountDir%\Program Files\Internet Explorer\iexplore.exe", Bitmap,,"%SourceFiles%\ResHacker.exe" -addoverwrite "%MountDir%\Program Files\Internet Explorer\iexplore.exe", "%MountDir%\Program Files\Internet Explorer\iexplore.exe", "%SourceFiles%\Bitmap.res",,,[ProcessesToRunAfterIntegration];;;example [ProcessesToRunAfterIntegration]reg unload HKLM\Test"%SourceFiles%\ResHacker.exe" -delete "%MountDir%\windows\system32\FileName.exe", "%MountDir%\windows\system32\FileName.exe", Bitmap,,"%SourceFiles%\ResHacker.exe" -addoverwrite "%MountDir%\windows\system32\FileName.exe", "%MountDir%\windows\system32\FileName.exe", "%SourceFiles%\Bitmap.res",,,"%SourceFiles%\ResHacker.exe" -delete "%11%\FileName.exe", "%11%\FileName.exe", Icon,,"%SourceFiles%\ResHacker.exe" -addoverwrite "%11%\FileName.exe", "%11%\FileName.exe", "%SourceFiles%\Icon.res",,,Warning, these sections do same job of [securityFiles*Integration] sections but in different ways; they've been added for they who find hard to understand microsoft guides about "Security Descriptor Definition Language", so you can use these too; anyway it is suggested to use [securityFiles*Integration] section, safer e also faster1 = gives Admin permissions for a file or a directory 2 = when destination is a directory, gives Admin permission for all files and subdirectories of specified directory 3 = when destination is a directory, if it doesn't exist will be automatically created [FilePermissionsBeforeIntegration] ;;;example [b][FilePermissionsBeforeIntegration][/b]%10%\regedit.exe,1%COMMONPROGRAMFILES%,1%16426%\Filename.exe,1[FilePermissionsAfterIntegration];;;example [FilePermissionsAfterIntegration]%10%\test.exe,1%PROGRAMFILES(X86)%,1%16428%\Test,3[AddProgram];;;example [AddProgram]Filerefox.exe;orinstall_flash_player.exe -install -force"SetUp XXX.exe" /S[string] ;;;example [Strings]LANGNAME = "English"LANGUAGE = "ENU"MuiCultureDirectory = "en-US"LangIdHex = "409"Lang = "EN"LCID = "0409"UnlockerTip = "Freeware tool to overcome a Windows bug";or use multi localabout International INF Files http://msdn.microsof...8(v=VS.85).aspx [Strings.0409]LANGNAME = "English"LANGUAGE = "ENU"MuiCultureDirectory = "en-US"LangIdHex = "409"Lang = "EN"LCID = "0409"UnlockerTip = "Freeware tool to overcome a Windows bug"[Strings.0410]LANGNAME = "Italiano"LANGUAGE = "ITA"MuiCultureDirectory = "it-IT"LangIdHex = "410"Lang = "IT"LCID = "0410"UnlockerTip = "Strumento freeware per superare un bug di Windows"DX WinNT6.x True Integrator adds as default these keys in Strings section REG_SZ = 0x00000000REG_EXPAND_SZ = 0x00020000REG_DWORD = 0x00010001REG_QWORD = 0x000B0001REG_BINARY = 0x00000001REG_MULTI_SZ = 0x00010000REG_NONE = 0x00020001REG_KEYONLY = 0x00000010REG_KEYONLY_COMMON = 0x00002000REG_UNKNOWN = 0x00030001REG_NOCLOBBER = 0x00000002REG_DELVAL = 0x00000004REG_OVERWRITEONLY = 0x00000020REG_APPEND = 0x00000008 ;Append a given value to that of an existing named value entry. This flag is valid only if FLG_ADDREG_TYPE_MULTI_SZ is also set. The specified string value is not appended if it already exists.REG_64BITKEY = 0x00001000REG_32BITKEY = 0x00004000REG_SZ_64BITKEY = 0x00001000REG_SZ_32BITKEY = 0x00004000REG_SZ_NOCLOBBER = 0x00000002REG_SZ_NOCLOBBER_64BITKEY = 0x00001002REG_SZ_NOCLOBBER_32BITKEY = 0x00004002REG_SZ_DELVAL = 0x00000004REG_SZ_DELVAL_64BITKEY = 0x00001004REG_SZ_DELVAL_32BITKEY = 0x00004004REG_SZ_OVERWRITEONLY = 0x00000020REG_SZ_OVERWRITEONLY_64BITKEY = 0x00001020REG_SZ_OVERWRITEONLY_32BITKEY = 0x00004020REG_EXPAND_SZ_64BITKEY = 0x00021000REG_EXPAND_SZ_32BITKEY = 0x00024000REG_EXPAND_SZ_NOCLOBBER = 0x00020002REG_EXPAND_SZ_NOCLOBBER_64BITKEY = 0x00021002REG_EXPAND_SZ_NOCLOBBER_32BITKEY = 0x00024002REG_EXPAND_SZ_DELVAL = 0x00020004REG_EXPAND_SZ_DELVAL_64BITKEY = 0x00021004REG_EXPAND_SZ_DELVAL_32BITKEY = 0x00024004REG_EXPAND_SZ_OVERWRITEONLY = 0x00020020REG_EXPAND_SZ_OVERWRITEONLY_64BITKEY = 0x00021020REG_EXPAND_SZ_OVERWRITEONLY_32BITKEY = 0x00024020REG_DWORD_64BITKEY = 0x00011001REG_DWORD_32BITKEY = 0x00014001REG_DWORD_NOCLOBBER = 0x00010003REG_DWORD_NOCLOBBER_64BITKEY = 0x00011003REG_DWORD_NOCLOBBER_32BITKEY = 0x00014003REG_DWORD_DELVAL = 0x00010005REG_DWORD_DELVAL_64BITKEY = 0x00011005REG_DWORD_DELVAL_32BITKEY = 0x00014005REG_DWORD_OVERWRITEONLY = 0x00010021REG_DWORD_OVERWRITEONLY_64BITKEY = 0x00011021REG_DWORD_OVERWRITEONLY_32BITKEY = 0x00014021REG_QWORD_64BITKEY = 0x000B1001REG_QWORD_32BITKEY = 0x000B4001REG_QWORD_NOCLOBBER = 0x000B0003REG_QWORD_NOCLOBBER_64BITKEY = 0x000B1003REG_QWORD_NOCLOBBER_32BITKEY = 0x000B4003REG_QWORD_DELVAL = 0x000B0005REG_QWORD_DELVAL_64BITKEY = 0x000B1005REG_QWORD_DELVAL_32BITKEY = 0x000B4005REG_QWORD_OVERWRITEONLY = 0x000B0021REG_QWORD_OVERWRITEONLY_64BITKEY = 0x000B1021REG_QWORD_OVERWRITEONLY_32BITKEY = 0x000B4021REG_BINARY_64BITKEY = 0x00001001REG_BINARY_32BITKEY = 0x00004001REG_BINARY_NOCLOBBER = 0x00000003REG_BINARY_NOCLOBBER_64BITKEY = 0x00001003REG_BINARY_NOCLOBBER_32BITKEY = 0x00004003REG_BINARY_DELVAL = 0x00000005REG_BINARY_DELVAL_64BITKEY = 0x00001005REG_BINARY_DELVAL_32BITKEY = 0x00004005REG_BINARY_OVERWRITEONLY = 0x00000021REG_BINARY_OVERWRITEONLY_64BITKEY = 0x00001021REG_BINARY_OVERWRITEONLY_32BITKEY = 0x00004021REG_MULTI_SZ_64BITKEY = 0x00011000REG_MULTI_SZ_32BITKEY = 0x00014000REG_MULTI_SZ_APPEND = 0x00010008REG_MULTI_SZ_APPEND_64BITKEY = 0x00011008REG_MULTI_SZ_APPEND_32BITKEY = 0x00014008REG_MULTI_SZ_NOCLOBBER = 0x00010002REG_MULTI_SZ_NOCLOBBER_64BITKEY = 0x00011002REG_MULTI_SZ_NOCLOBBER_32BITKEY = 0x00014002REG_MULTI_SZ_DELVAL = 0x00010004REG_MULTI_SZ_DELVAL_64BITKEY = 0x00011004REG_MULTI_SZ_DELVAL_32BITKEY = 0x00014004REG_MULTI_SZ_OVERWRITEONLY = 0x00010020REG_MULTI_SZ_OVERWRITEONLY_64BITKEY = 0x00011020REG_MULTI_SZ_OVERWRITEONLY_32BITKEY = 0x00014020REG_NONE_64BITKEY = 0x00021001REG_NONE_32BITKEY = 0x00022001REG_NONE_NOCLOBBER = 0x00020003REG_NONE_NOCLOBBER_64BITKEY = 0x00021003REG_NONE_NOCLOBBER_32BITKEY = 0x00024003REG_NONE_DELVAL = 0x00020005REG_NONE_DELVAL_64BITKEY = 0x00021005REG_NONE_DELVAL_32BITKEY = 0x00024005REG_NONE_OVERWRITEONLY = 0x00020021REG_NONE_OVERWRITEONLY_64BITKEY = 0x00021021REG_NONE_OVERWRITEONLY_32BITKEY = 0x00024021REG_KEYONLY_64BITKEY = 0x00001010REG_KEYONLY_32BITKEY = 0x00004010REG_KEYONLY_NOCLOBBER = 0x00000012REG_KEYONLY_NOCLOBBER_64BITKEY = 0x00001012REG_KEYONLY_NOCLOBBER_32BITKEY = 0x00004012REG_KEYONLY_DELVAL = 0x00000015REG_KEYONLY_DELVAL_64BITKEY = 0x00001015REG_KEYONLY_DELVAL_32BITKEY = 0x00004015REG_KEYONLY_OVERWRITEONLY = 0x00000030REG_KEYONLY_OVERWRITEONLY_64BITKEY = 0x00001030REG_KEYONLY_OVERWRITEONLY_32BITKEY = 0x00004030REG_KEYONLY_COMMON_64BITKEY = 0x00003000REG_KEYONLY_COMMON_32BITKEY = 0x00006000REG_KEYONLY_COMMON_NOCLOBBER = 0x00002002REG_KEYONLY_COMMON_NOCLOBBER_64BITKEY = 0x00003002REG_KEYONLY_COMMON_NOCLOBBER_32BITKEY = 0x00006002REG_KEYONLY_COMMON_DELVAL = 0x00002005REG_KEYONLY_COMMON_DELVAL_64BITKEY = 0x00003005REG_KEYONLY_COMMON_DELVAL_32BITKEY = 0x00006005REG_KEYONLY_COMMON_OVERWRITEONLY = 0x00002020REG_KEYONLY_COMMON_OVERWRITEONLY_64BITKEY = 0x00003020REG_KEYONLY_COMMON_OVERWRITEONLY_32BITKEY = 0x00006020REG_UNKNOWN_64BITKEY = 0x00031001REG_UNKNOWN_32BITKEY = 0x00032001REG_UNKNOWN_NOCLOBBER = 0x00030003REG_UNKNOWN_NOCLOBBER_64BITKEY = 0x00031003REG_UNKNOWN_NOCLOBBER_32BITKEY = 0x00034003REG_UNKNOWN_DELVAL = 0x00030005REG_UNKNOWN_DELVAL_64BITKEY = 0x00031005REG_UNKNOWN_DELVAL_32BITKEY = 0x00034005REG_UNKNOWN_OVERWRITEONLY = 0x00030021REG_UNKNOWN_OVERWRITEONLY_64BITKEY = 0x00031021REG_UNKNOWN_OVERWRITEONLY_32BITKEY = 0x00034021; ServiceType valuesSERVICE_KERNEL_DRIVER = 0x00000001SERVICE_FILE_SYSTEM_DRIVER = 0x00000002SERVICE_ADAPTER = 0x00000004SERVICE_RECOGNIZER_DRIVER = 0x00000008SERVICE_WIN32_OWN_PROCESS = 0x00000010SERVICE_WIN32_SHARE_PROCESS = 0x00000020SERVICE_INTERACTIVE_PROCESS = 0x00000100SERVICE_INTERACTIVE_SHARE_PROCESS = 0x00000120; StartType valuesSERVICE_BOOT_START = 0x00000000SERVICE_SYSTEM_START = 0x00000001SERVICE_AUTO_START = 0x00000002SERVICE_DEMAND_START = 0x00000003SERVICE_DISABLED = 0x00000004; ErrorControl valuesSERVICE_ERROR_IGNORE = 0x00000000SERVICE_ERROR_NORMAL = 0x00000001SERVICE_ERROR_SEVERE = 0x00000002SERVICE_ERROR_CRITICAL = 0x00000003SPSVCINST_TAGTOFRONT = 0x00000001SPSVCINST_ASSOCSERVICE = 0x00000002SPSVCINST_DELETEEVENTLOGENTRY = 0x00000004SPSVCINST_NOCLOBBER_DISPLAYNAME = 0x00000008SPSVCINST_NOCLOBBER_STARTTYPE = 0x00000010SPSVCINST_NOCLOBBER_ERRORCONTROL = 0x00000020SPSVCINST_NOCLOBBER_LOADORDERGROUP = 0x00000040SPSVCINST_NOCLOBBER_DEPENDENCIES = 0x00000080SPSVCINST_NOCLOBBER_DESCRIPTION = 0x00000100COPYFLG_WARN_IF_SKIP = 0x00000001COPYFLG_NOSKIP = 0x00000002COPYFLG_NOVERSIONCHECK = 0x00000004COPYFLG_FORCE_FILE_IN_USE = 0x00000008COPYFLG_NO_OVERWRITE = 0x00000010COPYFLG_NO_VERSION_DIALOG = 0x00000020COPYFLG_OVERWRITE_OLDER_ONLY = 0x00000040COPYFLG_REPLACEONLY = 0x00000400COPYFLG_REPLACE_BOOT_FILE = 0x00001000COPYFLG_NOPRUNE = 0x00002000this is the integration sequence as executed by DX WinNT6.x True Integrator 1 [FilePermissionsBeforeIntegration] 2 [securityFilesBeforeIntegration] 3 [ProcessesToRunBeforeIntegration] 4 [securityRegistryBeforeIntegration] 5 Offline Install Execution (installs addon AddOn) 6 [TweaksAddReg] 7 [TweaksDelReg] 8 [securityRegistryAfterIntegration] 9 [ProcessesToRunAfterIntegration] 10 [securityFilesBeforeIntegration] 11 [FilePermissionsAfterIntegration]
×
×
  • Create New...