van教你制作个人winxp sp3

一、获取windows xp和windowsxp-kb936929-sp3-x86-chs.exe
将windows xp安装碟中的所有文件copy到硬盘目录下(如:D:/winxp)。从网络或通过其他途径得到windowsxp-kb936929-sp3-x86-XXX.exe,XXX=chs(中文版)
XXX=enu(英文版),本例使用中文版。
二、生成winxpsp2.iso镜像文件
运行WinISO,点击“操作→从CDROM制作ISO文件”,选中ASPI按钮,然后将输出保存到D:/winxp/winxpsp2.iso,按下“制作”按钮将Windows XP光盘制作成ISO镜像文件。(如果一开始就有winxpsp2.iso,直接将winxpsp2.iso用winrar解压即可)。
三、将windowsxp-kb936929-sp3-x86-chs.exe集成到安装文件中
拷贝windowsxp-kb936929-sp3-x86-chs.exe到D:/下,在D:/写一个批处理文件intsp3.bat:内容为:”windowsxp-kb936929-sp3-x86-chs.exe” -s:”D:/winxp”
双击bat文件,将出现解压窗口


集成成功后,会弹出成功提示。(如果提示错误,请检查.bat内容,或确认D:/winxp下的安装文件是否完整)
四、制作自动应答文件
用winrar打开D:/winxp/support/tools文件夹的deploy.cab文件将其解压到deploy文件夹下,双击其中的setupmgr.exe运行自动应答文件制作向导。根据具体需要制作自动应答文件unattend.txt,可做全自动或半制动,这个自己决定


点击[下一步]-->选择“创建新文件”-->[下一步]--> 选择“无人参与安装”-->[下一步]-->选择“Windows XP Professional”-->[下一步]à选择“用户控制”(如果全自动可选“全部自动”,按装过程中的信息就无法更改)-->[下一步]-->“创建新的分布共享”-->[下一步]-->“从下列文件夹”,选择路径“D:/winxp/I386”(刚刚存放的安装文件)-->[下一步]--> 选择共享目录,可随意,只要能找到生成的unattend.txt文件即可-->[下一步]--> 根据你的要求填写安装的默认信息,填写完整按完成,保存为winnt.sif就搞定了。

如果忘了改名字,没关系,将生成unattend.txt后将其改名为winnt.sif。接着把winnt.sif复制到D:/winxp/i386文件夹下。
五、生成winxpsp3.iso镜像文件,刻录即可用
一张你个人的windows xp sp3系统碟诞生了!
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Windows-KB841290-x86-ENU.exe MD5值:58dc4df814685a165f58037499c89e76 --------------------------------------------------------- Version: 1.0 File Name: Windows-KB841290-x86-ENU.exe Date Published: 8/22/2012 File Size: 117 KB ---------------------------------------------------------- Microsoft (R) File Checksum Integrity Verifier V2.05 README file ================================================================ 1.What is File Checksum Integrity Verifier (FCIV)? 2.Features. 3.Syntax. 4.Database storage format. 5.Verification. 6.History. 1.What is fciv? --------------- Fciv is a command line utility that computes and verifies hashes of files. It computes a MD5 or SHA1 cryptographic hash of the content of the file. If the file is modified, the hash is different. With fciv, you can compute hashes of all your sensitive files. When you suspect that your system has been compromised, you can run a verification to determine which files have been modified. You can also schedule verifications regularily. 2.Features: ----------- - Hash algorithm: MD5 , SHA1 or both ( default MD5). - Display to screen or store hash and filename in a xml file. - Can recursively browse a directory ( ex fciv.exe c:\ -r ). - Exception list to specify files or directories that should not be computed. - Database listing. - hashes and signature verifications. - store filename with or without full path. 3.Syntax: --------- Usage: fciv.exe [Commands] Commands: ( Default -add ) -add : Compute hash and send to output (default screen). dir options: -r : recursive. -type : ex: -type *.exe. -exc file: list of directories that should not be computed. -wp : Without full path name. ( Default store full path) -bp : base path. The base path is removed from the path name of each entry -list : List entries in the database. -v : Verify hashes. : Option: -bp basepath. -? -h -help : Extended Help. Options: -md5 | -sha1 | -both : Specify hashtype, default md5. -xml db : Specify database format and name. To display the MD5 hash of a file, type fciv.exe filename Compute hashes: fciv.exe c:\mydir\myfile.dll fciv.exe c:\ -r -exc exceptions.txt -sha1 -xml dbsha.xml fciv.exe c:\mydir -type *.exe fciv.exe c:\mydir -wp -both -xml db.xml List hashes stored in database: fciv.exe -list -sha1 -xml db.xml Verifications: fciv.exe -v -sha1 -xml db.xml fciv.exe -v -bp c:\mydir -sha1 -xml db.xml 4.Database storage format: -------------------------- xml file. The hash is stored in base 64. <?xml version="1.0" encoding="utf-8"?> 5.Verification: --------------- You can build a hash database of your sensitive files and verify them regularily or when you suspect that your system has been compromised. It checks each entry stored in the db and verify that the checksum was not modified. 6. History: ----------- Fciv 1.2 : Added event log. Fciv 1.21: Fixed bad keyset error on some computers. Fciv 1.22: Added -type option. Support up to 10 masks. *.exe *.dll ... Fciv 2.0: xml as unique storage. Added -both option. Fciv 2.01: Exit with error code to allow detections of problem in a script. Fciv 2.02: Improved perfs. When both alg are specified, it's now done in one pass. Fciv 2.03: Added -wp and -bp options. Fciv now stores full path or relatives paths. Fciv 2.04: Removed several options to simplify it. Fciv 2.05: Added success message if the verification did not detect any errors.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值