AdminPE10 1.8 (2017) GB

AdminPE10 1.8 (2017) GB|2.90 GB
The boot disk / flash drive of the system administrator AdminPE (WinPE10 - Win10) is designed to work with stand-alone Windows 10.

The advantages of AdminPE10:
· Built-in support: USB3.0, ACHI, GPT disks, Apple HFS, Lan / Wi-Fi, download from UEFI, DISM, WMI, AutoIt.
· Integration into the system (instead of the standard WinRE / full).
· Download over a local area network (PXE / UEFI PXE)
· Download on Microsoft computers (Surface Pro)
· Access to any private directories on the disk (* NTFS)
· Running programs on behalf of TrustedInstaller
A large number of programs for:
· Works with an autonomous system (registry / restore / autoload / event logs)
· Testing equipment (CPU / RAM / HDD / motherboard)
· Work with the local network (network scanners / remote administration programs)
· Work with hard disks (separation / moving / copying / erasing)
· Work with passwords (hacking / selecting / resetting the user's password)
· Works with damaged filesystems (file / partition recovery)

The assembly is based on WinPE10 (Win10) and contains:
• MSDaRT 8 / 8.1 / 10 Rus
• Recovery Enviroment
• Remote Desktop Client
• Total Commander 8.52a TechAdmin RC12 (stripped down, for working with files)
• Acronis Universal Restore Rus (x64) (with support for Windows 10)
• Acronis True Image 2014/2016 Rus Plus Pack
• Acronis Disk Director 12 Rus
• Paragon Hard Disk Manager Pro
• Minitool Partition Wizard 8.1 Professional Rus
• Reset Windows Password 5 Rus / En
• Norton Ghost v8 / 11
• AIDA64 5.75 Rus
• FindAndMount
• R-Studio 8 Rus
• WinRAR 5.21 Rus
• ImageForWindows 3.02 Rus
• WinNTSetup 3
• Imagine

The main features of the WinPE10 boot disk are:
Download in UEFI x64 (Secure Boot) mode
Download on tablets (TabletPC x86 UEFI)
Download over a local area network (PXE / UEFI PXE)
Download on Microsoft computers (Surface Pro)
Downloading to Apple computers (iMac, MacBook Pro / Air)
Integration into the system (instead of the standard WinRE / full)

Treatment of an infected MBR (Main Boot Record)
Treatment of Trojans-blockers (SMS extortionists)
Treatment of known and unknown viruses and Trojans
Treatment of the system partition from Virus.Win32.Sality / Virut

Backing Up Your Operating System
Backing Up Installed Drivers
Backing up user documents
Backing up the keys from the installed software

Viewing the event log (.evt / .evtx)
Viewing memory dumps (.dmp)
View a list of installed hardware
View a list of installed software (s)
View the system's on / off log
Browsing the SYSTEM, SOFTWARE, SAM registry hives
View and reset passwords for user accounts
Viewing network addresses and other system settings
View a list of system services and the drivers that are started
View a list of startup programs and system drivers
View any directories on the system and other disks (NTFS *)
- Editing the boot record (MBR / PBR)
Boot Loader Configuration (BCD)
Editing and restoring registry hives
Editing User Account Properties
- Enabling the ACHI driver (Windows 7/8)
Enabling the Administrator account
Enable one-time restore menu (W8)
Enable or disable installed devices
- Recovery of corrupted NTLDR bootloader
Restoring the bootloader configuration BOOTMGR (BCD)
- Create an administrator account to log on to the system
Running the command line on behalf of SYSTEM without logging in

Defining an external IP address
Full scan of the local network
Mass check of computer availability
Monitoring on-offs of computers
Inventory of equipment in the local network
Remote control of computers in the local network
Testing the bandwidth of the local network

Defragment hard disks and partitions
Defragment individual files and directories
Testing for the presence of faulty sectors
Restore deleted and damaged partitions
Recovering information from damaged media
Recovering damaged Office documents and other
Separation, copying, erasing hard disks and partitions
Reading and writing from Apple HFS partitions (manually connected)

Memory test for errors (including in UEFI)
Hard disk test on the BAD sector (DOS / Windows)
Stability test of the whole system (stress test)
Test the keyboard (and individual keys)

Description to the composition of the file:
AdminPE10_UEFI.iso is the main image, contains ALL utilities and WinPE10 x86 / x64.
How to use: burn the image to disk using Nero, or UltraISO.

BOOTMGR.iso is an image to boot using the standard BOOTMGR from Microsoft, instead of GRUB4DOS.
The GRUB4DOS menu with utilities will not be there, just the WinPE10 menu.
How to use: unpack all files from AdminPE10_UEFI.iso into it

DOS.rar is an addon containing the DOS environment with utilities.
How to use: unzip to the root of the bootable USB flash drive with replacement.

Docs - help folder in .mht format and instructions for creating a bootable USB flash drive UEFI / GRUB in pictures.
How to use: open and read.

Changes in version 1.8:
+ Added
- Removed
^ Updated
* Corrected
# Temporary excluded

+ Added a new section of the site:
Download from your Android device
Download from an encrypted USB flash drive (BIOS)
The computer does not see the boot drive?

+ Added video instructions (on YouTube channel):
[Misafirler Kayıt Olmadan Link Göremezler Lütfen Kayıt İçin Tıklayın ! ]
Transferring OS and user data to a new computer (+ sound)
Erasing free disk space (+ sound)
Reinstalling Windows 7 from an Acronis image (with saving data and a copy of the system) (+ sound)
Quick search for files on NTFS (Everything) (+ sound)
Hiding hard disk partitions from disk management programs (+ sound)
Installing Windows Server 2008 R2 x64 on a new hard disk (MBR) (+ sound)
Protecting the boot drive with a password (with AES encryption) (+ sound)

+ In the local disks menu, the item "DiskCryptor" was added, containing:
Lock Disk (DiskCryptor)
Lock all disks (DiskCryptor)
Unlock using password (DiskCryptor)

+ A BitLocker item has been added to the local disks menu, containing:
Lock Drive (BitLocker)
Unblock using a password (BitLocker)
Unlock using the key (BitLocker) (with Shift pressed)
Unlock using the recovery key (BitLocker)

^ LinX v0.7.0 (2017.1.014) Rus (x86 / x64) - ALWAYS REPLACE OLD VERSIONS, THEY HAVE A CRITICAL BAG !.
^ SysInternals Autoruns 13.62 Rus (x86 / x64)
^ Disk Cryptor is built into the PE kernel (also the command line is dccon.exe)
^ Kaspersky Virus Removal Tool 2015 (x86 / x64) (bases updated to Jan 31, 2017)
^ AVZ (bases updated until January 31, 2017)

^ Encrypted Disk Cryptor drives with the AdminPE password (register is important!) Will be connected automatically when the system starts.
^ Encrypted Disk Cryptor disk containing a $ dcfunm $ dummy file (the register is important!) Will be dismounted automatically when trying to safely extract it.
^ If for some reason the bootable USB flash drive was not detected after boot,
then when you connect any stick with AdminPE labels will be copied from it automatically,
and variables will be created indicating that it is a bootable medium, and the programs are on it.

- Virus Total Uploader (obsolete, new version requires .NET)
System requirements:
Minimum: DDR2 1GB x86 / 2GB x64, Core2Duo 2.x
Optimum: USB3, DDR3 4GB, Core-i3 / 5
Experience with Windows OS

MD5: B7D88FC3B9126D47673C17EE81904D05
SHA-1: 8F40DB6CFE418E5F42CE44AFBBCDC22950CB1229

Release date: 02.2017
Build version: 1.8
Developer: AdminPE
Bit depth: 32bit, 64bit (UEFI)
Language: English
Tabletka: Not required
Size: 2.90 GB

[Misafirler Kayıt Olmadan Link Göremezler Lütfen Kayıt İçin Tıklayın ! ]