实现用于用户支持的预安装环境介质

R. Gibson, D. Dyar
{"title":"实现用于用户支持的预安装环境介质","authors":"R. Gibson, D. Dyar","doi":"10.1145/1294046.1294076","DOIUrl":null,"url":null,"abstract":"The creation and usage of a Preinstallation Environment (PE) media for use as a User Services tool for cleaning/repairing security attacks, data recovery and repairing Windows installations. As happens occasionally, a Windows installation is corrupted and a user receives an error indicating the inability to logon to the system. While in some cases a simple Check Disk (ChkDsk /r) at the command prompt is sufficient to fix the error. At times, a Master Boot Record needs to be fixed (FixMBR) or a reconfiguration of the boot settings (BootCFG) is needed. Still other times, the operating system needs to be completely reinstalled. In cases such as these, a user's data needs to be accessed. In our environment the hard drive is usually pulled from the chassis and transported to another office on campus to attach to a secondary system and recovery tools are then run at that location. From a security standpoint, an infected/hacked machine is often also pulled or an expensive Winternals CD must be used to identify the infected files. While this is in theory now, we are building and testing a bootable PE device in which a system can boot from this CD or USB device and then tools can be run or data recovered at the location of the system itself. We then propose to create additional devices for the members of the desktop support staff who are dispatched to identify security breaks or malfunctioning hardware.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Implementing preinstallation environment media for use in user support\",\"authors\":\"R. Gibson, D. Dyar\",\"doi\":\"10.1145/1294046.1294076\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The creation and usage of a Preinstallation Environment (PE) media for use as a User Services tool for cleaning/repairing security attacks, data recovery and repairing Windows installations. As happens occasionally, a Windows installation is corrupted and a user receives an error indicating the inability to logon to the system. While in some cases a simple Check Disk (ChkDsk /r) at the command prompt is sufficient to fix the error. At times, a Master Boot Record needs to be fixed (FixMBR) or a reconfiguration of the boot settings (BootCFG) is needed. Still other times, the operating system needs to be completely reinstalled. In cases such as these, a user's data needs to be accessed. In our environment the hard drive is usually pulled from the chassis and transported to another office on campus to attach to a secondary system and recovery tools are then run at that location. From a security standpoint, an infected/hacked machine is often also pulled or an expensive Winternals CD must be used to identify the infected files. While this is in theory now, we are building and testing a bootable PE device in which a system can boot from this CD or USB device and then tools can be run or data recovered at the location of the system itself. We then propose to create additional devices for the members of the desktop support staff who are dispatched to identify security breaks or malfunctioning hardware.\",\"PeriodicalId\":277737,\"journal\":{\"name\":\"Proceedings of the 35th annual ACM SIGUCCS fall conference\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 35th annual ACM SIGUCCS fall conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1294046.1294076\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 35th annual ACM SIGUCCS fall conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1294046.1294076","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

创建和使用预安装环境(PE)介质,作为用户服务工具,用于清理/修复安全攻击、数据恢复和修复Windows安装。正如偶尔发生的那样,Windows安装被损坏,用户收到一个错误,指示无法登录到系统。虽然在某些情况下,在命令提示符下简单的检查磁盘(ChkDsk /r)足以修复错误。有时,需要固定主引导记录(FixMBR)或需要重新配置引导设置(BootCFG)。还有一些时候,操作系统需要完全重新安装。在这种情况下,需要访问用户的数据。在我们的环境中,硬盘驱动器通常从机箱中取出并运输到校园的另一个办公室,连接到二级系统,然后在该位置运行恢复工具。从安全的角度来看,被感染/被黑客攻击的机器通常也会被拖走,或者必须使用昂贵的wininternals CD来识别受感染的文件。虽然这是理论上的,但我们正在构建和测试一个可引导的PE设备,其中系统可以从这个CD或USB设备引导,然后可以在系统本身的位置运行工具或恢复数据。然后,我们建议为被派去识别安全漏洞或故障硬件的桌面支持人员创建额外的设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Implementing preinstallation environment media for use in user support
The creation and usage of a Preinstallation Environment (PE) media for use as a User Services tool for cleaning/repairing security attacks, data recovery and repairing Windows installations. As happens occasionally, a Windows installation is corrupted and a user receives an error indicating the inability to logon to the system. While in some cases a simple Check Disk (ChkDsk /r) at the command prompt is sufficient to fix the error. At times, a Master Boot Record needs to be fixed (FixMBR) or a reconfiguration of the boot settings (BootCFG) is needed. Still other times, the operating system needs to be completely reinstalled. In cases such as these, a user's data needs to be accessed. In our environment the hard drive is usually pulled from the chassis and transported to another office on campus to attach to a secondary system and recovery tools are then run at that location. From a security standpoint, an infected/hacked machine is often also pulled or an expensive Winternals CD must be used to identify the infected files. While this is in theory now, we are building and testing a bootable PE device in which a system can boot from this CD or USB device and then tools can be run or data recovered at the location of the system itself. We then propose to create additional devices for the members of the desktop support staff who are dispatched to identify security breaks or malfunctioning hardware.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The dual os classroom: if you build it, will they come? Looking for the magic formula: evaluating our it communication mix A campus-wide solution to supporting rich media capture, conversion, & production: the media conversion lab at the University of Michigan Is3pace: casting the information security spell for cultural change Getting it into the orientation mix
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1