Display an interface for users to open or execute files, print documents, send e-mail, visit Web sites, browse CDs or play music when your CD is inserted. It supports bitmap, icon, JPEG, EMF, WMF image files, bitmap buttons and labels. Display still or animated GIF, AVI, HTML and RTF files. Main Page, Splash Screen, Screen Background, Agreement Form, Security Form, Exit Form and unlimited Sub Pages. Page Shadow, Page FadeIn and FadeOut, and many effects. 19 Objects: Button, ImageButton, Shape, Image, SimpleText, Label, Link, Text, ScrollText, TextBox, RichText, Explorer, Flash, AVI, MediaPlayer, SlideShow, Edit, RadioButton and CheckBox. Page Template and Object Template make it more easy. AutoRun Pro Features: • Display of every registered document (e.g.: TXT, DOC, HTML) via automatic start of the corresponding application. • Print of every registered document (e.g.: TXT, DOC, HTML) via automatic start of the corresponding application. • Start any program. • Start the default browser with document URL. • Send email. • Integrated Web browser and internal commands. • Integrated sound player. • Integrated AVI video player. • Integrated RTF (Rich Text) viewer. • Integrated Media Player. • Slide Show images (Photo album), more than 100 styles. • Background color, Gradient color and Transparent Form. • Background sound. • Splash screen, splash screen sound. • Full screen background and logo image. • License agreement. You can display a license agreement before any files are launched. The user is required to accept the license in order to continue. If the user does not accept the license, then the AutoRun exits. You can protect your CD from being started by unlicensed users by requiring users to submit a User Name and Password or an Authentication Code. Show information or confirm exit before program exits • Unlimited Sub Pages. • Page FadeIn, FadeOut. • Page Shadow. • Images include bitmap, icon, JPEG, EMF, WMF, GIF (Static or Animated), PNG images. • Page template. • Object template. • CD Icon and Page icon can be displayed in the title bar. • Test without burning CD. • Burn project to CD-R/CD-RW directly with built-in CD Burner. • Create a single executable file. BitLocker is a full disk encryption feature included with Windows Vista and later. It is designed to protect data by providing encryption for entire volumes. Completely Visual – No programming required AutoRun Pro Enterprise makes it easy for anyone to create professional looking CD-ROM/DVD-ROM autorun menus. AutoRun Pro Enterprise II is a powerful visual tool to create professional autorun (autoplay) interfaces and presentations for your CD/DVDs. AutoRun is the handy Windows feature that automatically starts a program when, for example, you insert a CD-ROM in your PC's drive. Whether you're a network. • Publish project to new folder. • Create ISO CD-ROM image file. • Install Software - You may want to install a default viewer for the files if the user does not have one on his computer. For example, if you are launching a PDF file, you may want to include Adobe Acrobat Reader software on your CD and install it if the user does not already have it installed. You can define one or more files to be installed. • Create tabbed notebook style application for autorun CDs. It is very easy. • Create drop down menu bar for pages like most standard windows to make your page more professional. • CD expire date, Specifies an expiration date for the CDs. • Customized hint let users use customized tool tip window instead of the original system tool tip window. • No programming knowledge required. • No registry entry necessary. • Runs from CD-ROM without installation. • No runtime module required. Create your own custom autorun menus, interactive presentations, multimedia applications, and custom software in just minutes. AutoRun Pro Enterprise II features a completely visual drag and drop environment. Jul 30, 2017. Free Download AutoRun Pro Enterprise 14.13.0.440 - Create interactive multimedia applications and professional autorun CD menus even if you don't ha. Simply add content such as buttons, photos and text to your pages and position them using your mouse. Even if you have absolutely no programming experience you'll be able to get started creating your own custom applications in just minutes. AutoRun Pro Enterprise II is a popular design tool for rapid creation of autorun CD browsers and presentations. Offering a simple point-and-click design environment, AutoRun Pro Enterprise II allows anyone, regardless of computer competence and creative ability, to blend texts, images, video and audio into an interactive front-end for CDs and DVDs. In doing this, you can make use of wizards, templates and demos that let you jumpstart your autorun project in minutes. The end result can be compiled as a single executable file and burned onto a CD or DVD disk directly using the built-in CD Burner. The best in AutoRun Pro Enterprise II is that it has been designed with the ordinary user in mind, the one who doesn't want to take the time to learn how to use a complicated design tool or hire a designer to do the work. It lets you create and edit a front-end in much the same way as you would design a presentation in Microsoft PowerPoint. Just click, drag, position in the desired area and preview to see whether you have the intended result. In just a few clicks, you can create a main page, a splash screen, an agreement form, a security form and an exit form, plus add the unlimited number of sub pages. Pages can be connected by using transition effects like page fade in, fade out and others. You can elaborate pages by adding buttons, images, simple text, links and many other objects and associate each of them with actions so that end users can interact with and navigate through the front-end content. The front-end can let them open and execute files, print documents, send email, visit web sites, browse CD and more. AutoRun Pro Enterprise II is a powerful visual tool to create professional autorun (autoplay) interfaces and presentations for your CD/DVDs. It is the easiest way to create, edit professional autorun (autoplay) interface and generate autorun files for CD/DVDs in a WYSIWYG environment, just click, point, place and test (preview). So all is visual, fast, simple. AutoRun Pro is easy to learn, with demos and wizards you can get started in just minutes! AutoRun Pro Enterprise II Features • Display of every registered document (e.g.: TXT, DOC, HTML) via automatic start of the corresponding application. • Print of every registered document (e.g.: TXT, DOC, HTML) via automatic start of the corresponding application. • Start any program. • Start the default browser with document URL. • Send email. • Integrated Web browser and internal commands. • Integrated sound player. • Integrated RTF (Rich Text) viewer. • Integrated Media Player. • Slide Show images (Photo album), more than 100 styles. • Background color, Gradient color and Transparent Form. • Background sound. • Splash screen, splash screen sound. • Full screen background and logo image. • License agreement. You can display a license agreement before any files are launched. The user is required to accept the license in order to continue. If the user does not accept the license, then the AutoRun exits. You can protect your CD from being started by unlicensed users by requiring users to submit a User Name and Password or an Authentication Code. Show information or confirm exit before program exits • Unlimited Sub Pages. • Page FadeIn, FadeOut. • Images include bitmap, icon, JPEG, EMF, WMF, GIF (Static or Animated), PNG images. • Page template. • Object template. • Using the drag-and-drop interface to link files for opening documents and running executable programs. • CD Icon and Page icon can be displayed in the title bar. • Test without burning CD. • Burn project to CD-R/CD-RW directly with built-in CD Burner. • Create a single executable file. • Publish project to new folder. • Create ISO CD-ROM image file. • Install Software - You may want to install a default viewer for the files if the user does not have one on his computer. For example, if you are launching a PDF file, you may want to include Adobe Acrobat Reader software on your CD and install it if the user does not already have it installed. You can define one or more files to be installed. • Create drop down menu bar (main menu), tool bar and status bar for pages like most standard windows to make your page more professional. • Create popup menu, you can define the pop-up menu that appears when the user clicks on an object or page background with the right mouse button, like most professional applications. • CD expire date, Specifies an expiration date for the CDs. • Set object(s) Enable or Disable, Show or Hide Object(s). • No programming knowledge required. • No registry entry necessary. • Runs from CD-ROM without installation. • No runtime module required. Contents • • • • • • • • • History [ ] BitLocker originated as a part of Microsoft's architecture in 2004 as a feature tentatively codenamed 'Cornerstone', and was designed to protect information on devices, particularly in the event that a device was lost or stolen; another feature, titled 'Code Integrity Rooting', was designed to validate the integrity of Microsoft Windows boot and system files. When used in conjunction with a compatible (TPM), BitLocker can validate the integrity of boot and system files before decrypting a protected volume; an unsuccessful validation will prohibit access to a protected system. BitLocker was briefly called Secure Startup prior to Windows Vista being. Availability [ ] BitLocker is available on: • Ultimate and Enterprise editions of and • Pro and Enterprise editions of and • Pro, Enterprise, and Education editions of • and later Initially, the graphical BitLocker interface in Windows Vista could only encrypt the volume. Starting with Windows Vista with Service Pack 1 and Windows Server 2008, volumes other than the operating system volume could be encrypted using the graphical tool. Still, some aspects of the BitLocker (such as turning autolocking on or off) had to be managed through a command-line tool called manage-bde.wsf. The latest version of BitLocker, first included in Windows 7 and Windows Server 2008 R2, adds the ability to encrypt removable drives. On or Windows Vista, read-only access to these drives can be achieved through a program called BitLocker To Go Reader, if, or filesystems are used. In addition, a new command-line tool called manage-bde replaced the old manage-bde.wsf. Starting with Windows Server 2012 and Windows 8, Microsoft has complemented BitLocker with the Microsoft Encrypted Hard Drive specification, which allows the cryptographic operations of BitLocker encryption to be offloaded to the storage device's hardware. In addition, BitLocker can now be managed through. Finally, Windows 8 introduced in its Enterprise edition, which BitLocker can protect. Device encryption [ ], and core edition of Windows 8.1 include device encryption, a feature-limited version of BitLocker that encrypts the whole system. Logging in with a with administrative privileges automatically begins the encryption process. The recovery key is stored to either the Microsoft account or, allowing it to be retrieved from any computer. While device encryption is offered on all versions of 8.1, unlike BitLocker, device encryption requires that the device meet the (formerly ) specifications, which requires, non-removable RAM (to protect against cold boot attacks) and a TPM 2.0 chip. Encryption modes [ ] There are three authentication mechanisms that can be used as building blocks to implement BitLocker encryption: • Transparent operation mode: This mode uses the capabilities of TPM 1.2 hardware to provide for a transparent user experience—the user powers up and logs into Windows as normal. The key used for is sealed (encrypted) by the TPM chip and will only be released to the OS loader code if the early boot files appear to be unmodified. The pre-OS components of BitLocker achieve this by implementing a Static Root of Trust Measurement—a methodology specified by the (TCG). This mode is vulnerable to a, as it allows a powered-down machine to be by an attacker. • User authentication mode: This mode requires that the user provide some authentication to the pre-boot environment in the form of a pre-boot or password. • USB Key Mode: The user must insert a USB device that contains a startup key into the computer to be able to boot the protected OS. Note that this mode requires that the BIOS on the protected machine supports the reading of USB devices in the pre-OS environment. The key may also be provided by a for reading a cryptographic. Using CCID provides additional benefits beyond just storing the key file on an external USB thumb drive, because the CCID protocol hides the private key using a cryptographic processor embedded in the smartcard; this prevents the key from being stolen by simply being read off the media on which it is stored. The following combinations of the above authentication mechanisms are supported, all with an optional recovery key: • TPM only • TPM + PIN • TPM + PIN + USB Key • TPM + USB Key • USB Key • Password only Operation [ ] BitLocker is a encryption system. (A volume spans part of a, the whole drive or more than one drive.) When enabled, TPM and BitLocker can ensure the integrity of the trusted boot path (e.g. BIOS and boot sector), in order to prevent most offline physical attacks and boot sector malware. In order for BitLocker to encrypt the volume holding the operating system, at least two -formatted volumes are required: one for the operating system (usually C:) and another with a minimum size of 100 MB, which remains unencrypted and the operating system. (In case of Windows Vista and, however, the volume's minimum size is 1.5 GB and must have a drive letter.) Unlike previous versions of Windows, Vista's 'diskpart' command-line tool includes the ability to shrink the size of an NTFS volume so that this volume may be created from already allocated space. A tool called the BitLocker Drive Preparation Tool is also available from Microsoft that allows an existing volume on Windows Vista to be shrunk to make room for a new boot volume and for the necessary files to be transferred to it. Once an alternate boot partition has been created, the TPM module needs to be initialized (assuming that this feature is being used), after which the required disk encryption key protection mechanisms such as TPM, PIN or USB key are configured. The volume is then encrypted as a background task, something that may take a considerable amount of time with a large disk as every logical sector is read, encrypted and rewritten back to disk. The keys are only protected after the whole volume has been encrypted, when the volume is considered secure. BitLocker uses a low-level device driver to encrypt and decrypt all file operations, making interaction with the encrypted volume transparent to applications running on the platform. (EFS) may be used in conjunction with BitLocker to provide protection once the operating system is running. Protection of the files from processes and users within the operating system can only be performed using encryption software that operates within Windows, such as EFS. BitLocker and EFS, therefore, offer protection against different classes of attacks. In Active Directory environments, BitLocker supports optional key escrow to Active Directory, although a schema update may be required for this to work (i.e. If the Active Directory Services are hosted on a Windows version previous to Windows Server 2008). BitLocker and other full disk encryption systems can be attacked by a. Once the malicious bootloader captures the secret, it can decrypt the Volume Master Key (VMK), which would then allow access to decrypt or modify any information on an encrypted hard disk. By configuring a TPM to protect the trusted boot pathway, including the and, BitLocker can mitigate this threat. (Note that some non-malicious changes to the boot path may cause a check to fail, and thereby generate a false warning.) Security concerns [ ] According to Microsoft sources, BitLocker does not contain an intentionally built-in; without a backdoor there is no way for law enforcement to have a guaranteed passage to the data on the user's drives that is provided by Microsoft. In 2006 the expressed concern over the lack of a backdoor and tried entering into talks with Microsoft to get one introduced, although Microsoft developer and other Microsoft spokesmen state that they will not grant the wish to have one added. Microsoft engineers have said that agents also put pressure on them in numerous meetings in order to add a backdoor, although no formal, written request was ever made; Microsoft engineers eventually suggested to the FBI that agents should look for the of the key that the BitLocker program suggests its users to make. Although the AES encryption algorithm used in BitLocker is in the, its implementation in BitLocker, as well as other components of the software, are; however, the code is available for scrutiny by Microsoft partners and enterprises, subject to a. The 'Transparent operation mode' and 'User authentication mode' of BitLocker use TPM hardware to detect if there are unauthorized changes to the pre-boot environment, including the and. If any unauthorized changes are detected, BitLocker requests a recovery key on a USB device. This cryptographic secret is used to decrypt the Volume Master Key (VMK) and allow the process to continue. Nevertheless, in February 2008, a group of security researchers published details of a so-called ' that allows full disk encryption systems such as BitLocker to be compromised by booting the machine off removable media, such as a USB drive, into another operating system, then the contents of pre-boot memory. The attack relies on the fact that for up to several minutes (or even longer if cooled) after power has been removed. There is the Bress/Menz device described in US Patent 9,514,789 that can accomplish this type of attack. Use of a TPM alone does not offer any protection, as the keys are held in memory while Windows is running. Similar full disk encryption mechanisms of other vendors and other operating systems, including and, are vulnerable to the same attack. The authors recommend that computers be powered down when not in physical control of the owner (rather than be left in a ) and that the encryption software be configured to require a password to boot the machine. Once a BitLocker-protected machine is running, its keys are stored in memory where they may be susceptible to attack by a process that is able to access physical memory, for example, through a or channel. Starting with Windows 8 and Windows Server 2012 Microsoft removed the Elephant Diffuser from the BitLocker scheme for no declared reason. Dan Rosendorf's research shows that removing the Elephant Diffuser had an 'undeniably negative impact' on the security of BitLocker encryption against a targeted attack. Microsoft later cited performance concerns, and noncompliance with the (FIPS), to justify the diffuser's removal. Starting with Windows 10 version 1511, however, Microsoft added a new FIPS-compliant encryption algorithm to BitLocker. On 10 November 2015, Microsoft released a security update to mitigate a security vulnerability in BitLocker that allowed authentication to be bypassed by employing a malicious key distribution center, if the attacker had physical access to the machine, the machine was part of domain and had no PIN or USB protection. In October 2017, it was reported that in a code library developed by, which had been in widespread use in security products such as and TPMs, enabled private keys to be inferred from. This could allow an attacker to bypass BitLocker encryption when an affected TPM chip is used. Microsoft released an updated version of the firmware for Infineon TPM chips that fixes the flaw via Windows Update. See also [ ] • • • • • References [ ]. TechNet Library.. February 15, 2012. Retrieved 2012-03-02. TechNet Library. March 22, 2012. Retrieved 2007-09-05. Windows for Business. Archived from on November 17, 2016. From the original on November 17, 2016. Archived from on November 17, 2016. • ^ Hakala, Trudy (29 November 2016).... Retrieved 15 December 2016. TechNet Library. March 22, 2012. Retrieved 2007-09-05. • Ferguson, Niels (August 2006). Retrieved 2008-02-22. • Ferguson, Niels (August 2006). Retrieved 7 October 2016. • ^ (2004)... Archived from (PPT) on August 27, 2006. Retrieved January 30, 2015. • (September 9, 2005).. Supersite for Windows.. Retrieved March 14, 2015. • ^ (April 22, 2005). Retrieved March 14, 2015. • (April 21, 2005). Retrieved June 9, 2015. • Hynes, Byron (June 2008).. TechNet Magazine. Retrieved 2008-07-18. Retrieved 2013-09-07. 2 November 2009. 23 August 2012. 13 September 2011. Retrieved 12 December 2016. Retrieved 2016-10-07. Windows Mobile 6.5 Dev Center.. 8 April 2010. Retrieved 6 July 2014. • Cunningham, Andrew (17 October 2013).... Retrieved 6 July 2014. Windows Help portal.. Archived from on May 2, 2016. • Thurrott, Paul (June 4, 2013).. Paul Thurrott's SuperSite for Windows.. Retrieved June 10, 2013. Data Encryption Toolkit for Mobile PCs: Security Analysis. April 4, 2007. Retrieved 2007-09-05. MSDN Library. February 19, 2008. Retrieved 2008-07-18. MSDN Library. February 19, 2008. Retrieved 2008-07-18. MSDN Library. February 19, 2008. Retrieved 2008-07-18. MSDN Library. February 19, 2008. Retrieved 2008-07-18. MSDN Library. February 19, 2008. Retrieved 2008-07-18. MSDN Library. February 19, 2008. Retrieved 2008-07-18. March 22, 2012. April 30, 2007. September 7, 2007. From the original on February 19, 2008. • ^ Andrew, Bettany (2013).. Microsoft Press. • Jerry, Honeycutt (2012).. • Ou, George (June 8, 2007).... System Integrity Team Blog. March 2, 2006. Archived from on February 9, 2010. • Stone-Lee, Ollie (February 16, 2006)... Retrieved 2009-06-12. • Evers, Joris (March 3, 2006).. CBS Interactive. Retrieved 2008-05-01. • Franceschi-Bicchierai, Lorenzo.. Retrieved 2016-10-07. • Thurrott, Paul (2015-06-10).. Retrieved 2016-10-07. • Microsoft.. Retrieved 2016-10-07. • Byron, Hynes.. TechNet Magazine. Retrieved 2007-08-21. • ^ Halderman, J. Alex;; Heninger, Nadia; Clarkson, William; Paul, William; Calandrino, Joseph A.; Feldman, Ariel J.; Appelbaum, Jacob; (February 21, 2008). (PDF) (Thesis).. Archived from (PDF) on September 4, 2011. Retrieved 2017-04-01. March 4, 2011. Retrieved 2011-03-15. Retrieved 2016-10-07. • Rosendorf, Dan (May 23, 2013). Archived from (PDF) on May 22, 2016. Retrieved 7 October 2016. • Lee, Micah (4 June 2015).. The Intercept. Retrieved 2016-10-07. Security TechCenter.. 10 November 2015. Retrieved 12 November 2015. • Goodin, Dan (16 October 2017).... • Busvine, Douglas (16 October 2017).. Retrieved 2017-10-20. External links [ ] • • • • •.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2019
Categories |