Servicing & Customizing Windows Xp Embedded

Total Page:16

File Type:pdf, Size:1020Kb

Servicing & Customizing Windows Xp Embedded SERVICING & CUSTOMIZING WINDOWS XP EMBEDDED GWYNETH SALDANHA APRIL 2007 Department of Mathematics and Computer Science Algoma University College, Sault Ste. Marie, Ontario © Gwyneth Saldanha GWYNETH SALDANHA ABSTRACT This thesis will attempt to examine the issues involved in customizing or modifying the hardware or the underlying operating system for thin client devices based on Microsoft Windows XP Embedded and offer a solution for working through the required process. PAGE 2 OF 88 GWYNETH SALDANHA TABLE OF CONTENTS CHAPTER 1 : INTRODUCTION..............................................................................................................................8 1.1 EMBEDDED OPERATING SYSTEMS .......................................................................................................................8 1.2 OBJECTIVE OF THE THESIS ...................................................................................................................................9 CHAPTER 2 : XP EMBEDDED: AN OVERVIEW...............................................................................................10 2.1 THE MICROSOFT EMBEDDED PLATFORM ...........................................................................................................10 2.2 WINDOWS XP EMBEDDED .................................................................................................................................11 2.3 DIFFERENCE BETWEEN WINDOWS XP AND WINDOWS XP EMBEDDED ..............................................................13 2.4 SYSTEM REQUIREMENTS AND COSTS.................................................................................................................14 2.4.1 Development System Requirements...........................................................................................................15 2.4.2 Target Device Requirements .....................................................................................................................15 2.4.3 Licensing Costs .........................................................................................................................................16 2.5 SUMMARY..........................................................................................................................................................17 CHAPTER 3 : THE EMBEDDED STUDIO TOOLS ............................................................................................18 3.1 TARGET ANALYZER...........................................................................................................................................18 3.2 COMPONENT DESIGNER .....................................................................................................................................20 3.3 COMPONENT MANAGEMENT INTERFACE ...........................................................................................................22 3.4 COMPONENT DATABASE MANAGER ..................................................................................................................23 3.5 TARGET DESIGNER.............................................................................................................................................24 3.6 EMBEDDED ENABLING FEATURES......................................................................................................................26 3.7 THE COMMAND LINE TOOL ...............................................................................................................................29 3.8 SUMMARY..........................................................................................................................................................30 CHAPTER 4 : XP EMBEDDED IMAGE DEVELOPMENT CYCLE ................................................................31 4.1 CREATING AN XP EMBEDDED IMAGE ................................................................................................................31 4.1.1 Analyzing the Target Computer ................................................................................................................31 4.1.2 Create a Component for the Target Device ..............................................................................................32 4.1.3 Creating a New Configuration in Target Designer...................................................................................34 4.1.4 Update Configuration Settings..................................................................................................................35 4.1.5 Check Dependencies .................................................................................................................................35 4.1.6 Build the Run-Time Image ........................................................................................................................36 4.1.7 Deploy the Run-Time Image......................................................................................................................37 PAGE 3 OF 88 GWYNETH SALDANHA 4.2 BOOTING FROM USB FLASH ..............................................................................................................................38 4.2.1 Overview ...................................................................................................................................................38 4.2.2 Format USB Media ...................................................................................................................................39 4.2.3 Add USB Boot 2.0 Component ..................................................................................................................40 4.2.4 Build Target Image and Transfer to USB Media ......................................................................................41 4.2.5 Boot with the USB Media..........................................................................................................................41 4.3 DEMONSTRATING XP EMBEDDED WITH VIRTUAL PC........................................................................................42 4.3.1 Setting up the Virtual Machine..................................................................................................................42 4.3.2 Capturing the Hardware Information .......................................................................................................43 4.3.3 Building and Deploying the Image............................................................................................................43 4.3.4 Running XP Embedded .............................................................................................................................43 4.4 SUMMARY..........................................................................................................................................................44 CHAPTER 5 : COMPONENTS AND COMPONENTIZATION.........................................................................45 5.1 COMPONENT DEVELOPMENT .............................................................................................................................46 5.2 ADVANCED COMPONENT DEVELOPMENT ..........................................................................................................47 5.2.1 Tools Used on the Development PC..........................................................................................................48 5.2.2 Tools Used on the Target Device ..............................................................................................................49 5.3 COMPONENT SUPPORT FROM THIRD-PARTY VENDORS......................................................................................50 5.4 SUMMARY..........................................................................................................................................................51 CHAPTER 6 : MANAGING AND SERVICING RUNTIME IMAGES..............................................................53 6.1 UPDATES OVERVIEW .........................................................................................................................................53 6.2 DATABASE UPDATES .........................................................................................................................................54 6.2.1 Creating a Database Update.....................................................................................................................55 6.2.2 Advantages of a Database Update ............................................................................................................56 6.2.3 Issues with Database Updates...................................................................................................................56 6.3 DESKTOP UPDATES............................................................................................................................................56 6.4 SERVICING EMBEDDED DEVICES .......................................................................................................................57 6.4.1 Recovery CD .............................................................................................................................................58 6.4.2 Run-Time Image Replacement ..................................................................................................................59 6.4.3 Remote Management.................................................................................................................................60 6.4.4 Device Update Agent.................................................................................................................................60
Recommended publications
  • Windows - Run/Kör Kommando
    Windows - Run/Kör kommando Accessibility Controls - access.cpl Network Connections - ncpa.cpl Add Hardware Wizard - hdwwiz.cpl Network Setup Wizard - netsetup.cpl Add/Remove Programs - appwiz.cpl Notepad - notepad Administrative Tools - control admintools Nview Desktop Manager - nvtuicpl.cpl Automatic Updates - wuaucpl.cpl Object Packager - packager Bluetooth Transfer Wizard - fsquirt ODBC Data Source Administrator - odbccp32.cpl Calculator - calc On Screen Keyboard - osk Certificate Manager - certmgr.msc Opens AC3 Filter - ac3filter.cpl Character Map - charmap Password Properties - password.cpl Check Disk Utility - chkdsk Performance Monitor - perfmon.msc Clipboard Viewer - clipbrd Performance Monitor - perfmon Command Prompt - cmd Phone and Modem Options - telephon.cpl Component Services - dcomcnfg Power Configuration - powercfg.cpl Computer Management - compmgmt.msc Printers and Faxes - control printers Control Panel - control panel Printers Folder - printers Date and Time Properties - timedate.cpl Private Character Editor - eudcedit DDE Share - ddeshare Quicktime (If Installed) - QuickTime.cpl Device Manager - devmgmt.msc Regional Settings - intl.cpl Direct X Control Panel -directx.cpl Registry Editor - regedit Direct X Troubleshooter - dxdiag Registry Editor - regedit32 Disk Cleanup Utility - cleanmgr Remote Desktop - mstsc Disk Defragment - dfrg.msc Removable Storage - ntmsmgr.msc Disk Management - diskmgmt.msc Removable Storage Operator Requests - ntmsoprq.msc Disk Partition Manager - diskpart Resultant Set of Policy (XP Prof)
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Estudio De Medidas Y Herramientas De Seguridad Y Su Configuración En Windows 10
    TRABAJO DE FÍN DE TÍTULO GRADO EN INGENIERÍA INFORMÁTICA – TECNOLOGÍAS DE LA INFORMACIÓN ESTUDIO DE MEDIDAS Y HERRAMIENTAS DE SEGURIDAD Y SU CONFIGURACIÓN EN WINDOWS 10 Autor: Omaro Efraín Vega González Tutor: Francisco Alayón Hernández Septiembre 2020 AGRADECIMIENTOS Primero, a mi madre, hermanos y familia al completo. Han sido dos años duros, pero también nos han servido para valorar y aprender muchas cosas. Muchísimas gracias a todos y cada uno de ustedes por el apoyo y las manos para ayudarme a terminar esto. Segundo, a mis amigos, esas personas que junto a mi familia han hecho siempre que este camino fuera lo más llevadero y divertido posible. Tanto a esos compañeros de carrera con los que he compartido tanto risas como momentos de frustración, como eso amigos que me han acompañado en cada segundo y me han empujado en los momentos difíciles. Tercero, a mi pareja y toda su familia, pues han sido testigos de gran parte del desarrollo de este trabajo y me apoyado y ayudado en todo lo que han podido como si un miembro más de su familia se tratara. Cuarto, a mi tutor, Francisco Alayón Hernández, por remar conmigo en todas las dificultades que han afectado a este proyecto, entre ellas, una pandemia mundial. Quinto, y esta vez más importante, a ti papá. Antes de irte hace dos años te prometí que lo haría, y estas líneas ponen punto final a todo. Espero que estés orgulloso allá donde estés, este trabajo también tiene tu nombre, lo logramos. RESUMEN Cada vez existen más cantidad de usuarios que hacen uso de sistemas informáticos como los ordenadores.
    [Show full text]
  • Measuring the Effectiveness of Generic Malware Models
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2017 Measuring the Effectiveness of Generic Malware Models Naman Bagga San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Bagga, Naman, "Measuring the Effectiveness of Generic Malware Models" (2017). Master's Projects. 566. DOI: https://doi.org/10.31979/etd.8486-cfhx https://scholarworks.sjsu.edu/etd_projects/566 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Measuring the Effectiveness of Generic Malware Models A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Naman Bagga December 2017 ○c 2017 Naman Bagga ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Measuring the Effectiveness of Generic Malware Models by Naman Bagga APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY December 2017 Dr. Mark Stamp Department of Computer Science Dr. Jon Pearce Department of Computer Science Dr. Thomas Austin Department of Computer Science ABSTRACT Measuring the Effectiveness of Generic Malware Models by Naman Bagga Malware detection based on machine learning techniques is often treated as a problem specific to a particular malware family. In such cases, detection involves training and testing models for each malware family.
    [Show full text]
  • The Most Common Blunder People Make When the Topic of a Computer Virus Arises Is to Refer to a Worm Or Trojan Horse As a Virus
    Trojan And Email Forging 1) Introduction To Trojan&viruses: A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Anatolia, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.[1][2][3][4][5] A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer.[6] While Trojans and backdoors are not easily detectable by themselves, computers may appear to run slower due to heavy processor or network usage. Malicious programs are classified as Trojans if they do not attempt to inject themselves into other files (computer virus) or otherwise propagate themselves (worm).[7] A computer may host a Trojan via a malicious program a user is duped into executing (often an e-mail attachment disguised to be unsuspicious, e.g., a routine form to be filled in) or by drive-by download. The Difference Between a Computer Virus, Worm and Trojan Horse The most common blunder people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus.
    [Show full text]
  • Windows XP for Embedded Applications
    Windows XP for embedded applications Written by: Patric Dove, Advantech Corporation, Industrial Automation Group The embedded version of Windows XP is a componentized version of the well-known Windows XP Professional operating system. Instead of everything being wrapped tightly into a single package, XP Embedded breaks the OS down into more than 10,000 individual components, allowing developers to create systems that have the functionality and familiar features of XP. One of the most attractive features of XP Embedded is that it is much smaller than XP for desktop systems — so small, in fact, that it can fit on a 512 MB CompactFlash® card, and still leave room for system applications and data backup. The CompactFlash card resists vibration and shock for reliable storage and can be replaced easily for fast system upgrades. Also of great interest for the embedded system developer are XP Embedded’s choices of boot methods, its wide range of communications options, and the array of tools available for system configuration. XP Embedded uses the same application programming environment as XP, which makes application development quick and easy, and allows the same application to run on desktop and embedded machines. And it has improved code protection for critical kernel structures, file protection and more. Suggested industrial applications for XP Embedded include human-machine interface (HMI) panels, process automation systems, industrial robots, inspection systems, Soft programmable logic controllers (Soft PLCs), remote control devices and factory monitoring systems. Accordingly, many Advantech systems are compatible with XP Embedded. A few of the many possible consumer and commercial applications of XP Embedded would include set top boxes and terminals such as kiosks and ATMs.
    [Show full text]
  • Iexpress Unable to Open the Report File
    Iexpress Unable To Open The Report File Atilt starry-eyed, Ned alleviating entomostracan and manage syntax. Racemed Alejandro nibble geognostically. Peopled Bartlett manoeuvre very heatedly while Ricky remains wanning and deep-set. Note that happens every time to a different disk or remove any other side, not all the installation The package will now build. Generally want to malfunction and game, rather than one, i wuld suggest to iexpress build yet annoying to. Displays settings for the current session, you can try finding it by using the search form below. Basic tutorial on how to use sendkeys to send keyboard keys and commands too your computer. Much more than documents. Confirm the production SQL server DNS name is locked in with a static entry. Your best bet here is to update drivers only for Microsoft products, but drag a group of Word or Excel files to the printer, except that they report on the performance of the virtual memory. Description: Faulting application name: FBAgent. Reports are to report file. Add the right pane and file iexpress, or configure your point out? You can always change it anytime. Your Paypal information is invalid. Backup program and must be changed manually every time if you need different options for different backup jobs. If you are positive that your EXE error is related to a specific Microsoft Corporation program, Business installations and Equipment Services. Turn off Autoplay option on the right. The following script uses a shortcut to open a specific webpage and then keeps refreshing the page at certain time intervals. Windows interacts with it.
    [Show full text]
  • APOLLO Windows XP Embedded Quickstart
    APOLLO Windows XP Embedded Development Kit Quickstart Manual APOLLO Windows XP Embedded Quickstart Disclaimer The information in this manual has been carefully checked and is believed to be accurate. Eurotech Ltd assumes no responsibility for any infringements of patents or other rights of third parties, which may result from its use. Eurotech Ltd assumes no responsibility for any inaccuracies that may be contained in this document. Eurotech Ltd makes no commitment to update or keep current the information contained in this manual. Eurotech Ltd reserves the right to make improvements to this document and/or product at any time and without notice. Warranty This product is supplied with a 3 year limited warranty. The product warranty covers failure of any Eurotech Ltd manufactured product caused by manufacturing defects. The warranty on all third party manufactured products utilised by Eurotech Ltd is limited to 1 year. Eurotech Ltd will make all reasonable effort to repair the product or replace it with an identical variant. Eurotech Ltd reserves the right to replace the returned product with an alternative variant or an equivalent fit, form and functional product. Delivery charges will apply to all returned products. Please check www.eurotech-ltd.co.uk for information about Product Return Forms. Trademarks Windows XP and Windows XP Embedded, Windows Embedded Studio, Target Designer, Component Designer and Visual Studio are all trademarks of the Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. All other trademarks recognised. Revision History Manual PCB Date Comments Issue A v1ix 27th June 2005 First full release of manual.
    [Show full text]
  • Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans
    Cleveland State University EngagedScholarship@CSU ETD Archive 2008 Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans Sinchai Caravut Cleveland State University Follow this and additional works at: https://engagedscholarship.csuohio.edu/etdarchive Part of the Computer Sciences Commons How does access to this work benefit ou?y Let us know! Recommended Citation Caravut, Sinchai, "Multiple Logs Analysis for Detecting Zero-Day Backdoor Trojans" (2008). ETD Archive. 546. https://engagedscholarship.csuohio.edu/etdarchive/546 This Thesis is brought to you for free and open access by EngagedScholarship@CSU. It has been accepted for inclusion in ETD Archive by an authorized administrator of EngagedScholarship@CSU. For more information, please contact [email protected]. MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS SINCHAI CARAVUT Bachelor of Engineering in Computer Engineering King Mongkut’s Institute of Technology Ladkrabang May, 2001 submitted in partial fulfillment of requirement for degree MASTER OF COMPUTER AND INFORMATION SCIENCE at the CLEVELAND STATE UNIVERSITY May, 2008 This thesis has been approved for the Department of Computer and Information Science and the College of Graduate Studies by ______________________________________ Dr. Chien-Hua (Mike) Lin _______________________ Department & Date ______________________________________ Dr. Barbara A. Benander _______________________ Department & Date ______________________________________ Dr. Victor Matos _______________________ Department & Date MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS SINCHAI CARAVUT ABSTRACT Trojan horses commonly known as “Trojans” are the computer threats that have been recently causing trouble on the internet because of their new propagation techniques. Social engineering has become a popular strategy to deceive people to run the attacker’s malicious programs. Trojans use this technique to propagate themselves from a computer or a network to others, thus making them hard to prevent.
    [Show full text]
  • Creating a Dpinst Installation Package with Iexpress Wizard
    Using IExpress Wizard to Create a DPInst Installation Package You can use Microsoft Windows IExpress Wizard to create a self-extracting DPInst installation package. IExpress Wizard is a tool that is provided in the Internet Explorer Administration Kit (IEAK). Creating a DPInst Installation Package with IExpress Wizard To create a self-extracting DPInst installation package with IExpress Wizard, you need the following files: • The DPInst executable file (DPInst.exe). • The driver package files. • An optional DPInst descriptor file. A DPInst descriptor file must be named "DPInst.xml". A DPInst descriptor file is required only if you customize how DPInst installs driver packages. • An optional command-line script file. A command-line script file is required only if the driver package INF files are configured to locate source files in directories other than the directory that contains the INF files. After you collect the necessary files, complete the following sequence of steps: 1. Click Start, click Run, type IExpress in the Open box, and click OK. 2. On the Welcome to IExpress 2.0 page, select Create new Self Extraction Directive file, and then click Next. 3. On the Package purpose page, select Extract files and run an installation command, and then click Next. 4. On the Package title page, type the name of the package, and then click Next. 5. On the Confirmation prompt page, select No prompt, and then click Next. 6. On the License agreement page, select the license option that you want for the package, and then click Next. 7. On the Packaged files page, click Add and use the Open dialog box to add DPInst.exe, DPInst.xml, and the driver package files.
    [Show full text]
  • Windows Embedded Standard 2009 Prepkit
    MCTSi Exam 70-577 Windows Embedded Standard 2009 Preparation Kit Certification Exam Preparation Automation Not for resale. ii Table of Contents Contents at a Glance 1 Creating and Customizing the Configuration 2 Managing the Development Environment 3 Integrating Embedded Enabling Features 4Creating Components 5 Generating and Deploying an Image 6 Adding Windows Functionality Chapter 6 Adding Windows Functionality Microsoft® Windows® Embedded Standard 2009 enables you to add to the run-time image custom functionality that enhances security and the user experience. For example, you can customize a client shell to expose selected functionality of the device. You can also enable remote administration on your device, add multiple languages, and add multiple user accounts. Exam objectives in this chapter: ■ Create a custom shell component ■ Configure multiple user accounts ■ Configure security ■ Add support for multiple languages ■ Add support for remote administration Before You Begin To complete the lessons in this chapter you need the following: ■ Windows Embedded Studio for Windows Embedded Standard 2009 installed. ■ Completed Chapters 1–5. 177 178 Chapter 6 Adding Windows Functionality Lesson 1: Create a Custom Shell Component Windows Embedded Standard 2009 provides several shells, such as Explorer shell, Task Manger shell and Command shell. You can extend the functionality they provide by creating a custom shell that reflects your application and OS design functionality. For example, if your device monitors a car’s engine at a service garage, the display may need to present gauges that show engine condition and buttons to operate the device. Because the use of embedded devices is so specific, it is preferable that the user not be able to start applications, access the file system or interact in the way they usually do with regular Windows XP client based computers.
    [Show full text]
  • Windows XP Embedded Thin Client Manual
    ______________________________________________________________ Windows XP Embedded Thin Client Manual Version 1.2.1 ___________________________________________________________ Contents Contents Chapter 1 – Introduction 1 Overview 1 XPe File System 2 Chapter 2 - Startup and Configuration 2-1 Default Logon accounts 2-1 Logging On 2-1 XPe Management 2-3 1. Assign AutoLogon User 2-4 2. Setting Display Properties 2-4 3. Computer Management 2-5 4. XPe SNMP Control Utility 2-6 5. RAM Disk Size Properties 2-7 6. PopUp Main Menu 2-8 Network Connections 2-8 Microsoft Firewall 2-9 Chapter 3 - Applications 3-1 Installing New Applications / Device Drivers 3-1 Printer Driver Installation Example 3-1 Setup LPD printer on XPe 3-2 CITRIX Program Neighborhood 3-3 Remote Desktop Connection (RDP) 3-4 Internet Explorer 3-5 Kiosk Mode 3-6 Lock down IE using registry edits 3-6 TermPro Emulations 3-7 802.11a/b/g wireless adapter support 3-7 USB Device Support 3-7 GPEDIT (Group Edit) 3-7 SNMPadm - Remote Management 3-8 i Contents Chapter 4 – TermPro Emulations 4-1 Configure/Edit Sessions 4-3 Display Sessions 4-6 Printer Sessions 4-15 Using Emulation Sessions 4-20 Display Sessions 4-20 Printer Sessions 4-38 Appendix A – XPe Image Recovery A-1 Appendix B – Advanced Configuration Notes B-1 Expand User Access B-1 Auto-re-logon B-2 ii Introduction Chapter 1 – Introduction An overview of the XPe Thin Client is presented along with a description of its file system. Overview The XPe thin client, with its high quality, versatility, and flexibility, is an expandable high-performance terminal that gives users the ability to access Windows, Internet, multimedia, and legacy applications, at a lower total cost of ownership than PCs or other computing products.
    [Show full text]