Solved

How to change startup/shutdown background screens??

Posted on 2001-06-20
8
156 Views
Last Modified: 2010-04-13
I cannot find in any MS reference or resource book where to change the startup/shutdown screens!  Can anyone help with this??

Thank you,
Redtracer
0
Comment
Question by:Redtracer
8 Comments
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6211954
Are you asking how to changee their appearance and/or their behaviour? I am not sure it can be done.
0
 
LVL 1

Expert Comment

by:CSC_NT_Support
ID: 6212017
Well this is how you do it...I believe they can be opened up with paint. but here are the files and locations of which do what....

C:\logo.sys - Startup Logo

C:\Windows\logow.sys - Shutdown Logo

C:\Windows\logos.sys - Shutdown Complete Logo

hope it helps
__________________________________
Thanks
Jeffrey J. Riggs
CSC - NT Server Support
Onsite @ Motiva Enterprises LLC
Delaware City Refinery
__________________________________

0
 
LVL 3

Expert Comment

by:hendrik999
ID: 6212211
The answer of CSC NT Support is definitely only possible on Win9x computers.
0
 
LVL 12

Expert Comment

by:Housenet
ID: 6212800
-I havent seen a solution for this in 2000 yet..
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 12

Expert Comment

by:Housenet
ID: 6212817
-Well what do you know... Here is the answer... Intresting stuff...

http://www.3dpower.net/ubb/Forum1/HTML/000493.html
0
 
LVL 10

Expert Comment

by:trekie1
ID: 6214295
0
 
LVL 10

Accepted Solution

by:
trekie1 earned 25 total points
ID: 6214316
better link,,,also sounds rather compulicated
http://www.littlewhitedog.com/reviews_other_00021.asp
0
 

Author Comment

by:Redtracer
ID: 6224979
Thank you trekie1!  This was just what I was looking for.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Performance in games development is paramount: every microsecond counts to be able to do everything in less than 33ms (aiming at 16ms). C# foreach statement is one of the worst performance killers, and here I explain why.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now