HomeSubject Indexunattended installation
Subject Index

unattended installation

Vulnerabilities in unattended installations

When an unattended installation of Windows NT 4.0 is performed, the installation parameters are included in the Unattend.txt file. A vulnerability exists because the installation process copies the parameter file to a file in %windir%\system32 ($winnt$.inf for a normal unattended...

Perform an unattended setup

While unattended setup is generally most applicable in a wide-scale deployment effort, it can be a useful tool in small networks for duplicating new systems. Unattended setup can even be useful on a single workstation. For example, you might use...more

Creating answer files

One option for automating setup of a Windows 2000 Server (or client) is to create an unattended setup file (also called an answer file) that includes answers used by the setup program. Creating this setup file can take quite a...more

Answer file entries

Most of the time, you'll use the Windows 2000 Setup Manager Wizard to create unattended setup files. But this tool isn't perfect, and sometimes you'll still have to rely on your editing skills with Notepad or some other text editor....more

Unattended installation from the CD

Windows 2000 includes support for unattended installation performed directly from the CD. All you have to do is create an answer file (in Notepad or with Windows 2000 Setup Manager Wizard), modify a few entries, and put the answer file...more

Other subjects related to "unattended installation"

Contact Us | Authors | Subject Index | RSS Feeds

Copyright ©2007