?
Solved

UEFI tool disk like Hiren's

Posted on 2014-11-20
12
Medium Priority
?
494 Views
Last Modified: 2015-12-01
Hi,

I need a "tool disk" witch looks like Hiren or F4UBCD or PE to make some work on computers supporting only UEFI. I will write that to a USB stick from Rufus.

Any clue? I keep googling and found nothing :(

Thank you in advance!
0
Comment
Question by:Emmanuel Nadeau
  • 3
  • 3
  • 2
  • +2
10 Comments
 

Author Comment

by:Emmanuel Nadeau
ID: 40456396
I am sorry I used this as an example.

I am looking to buy a solution that can help me do my IT job with UEFI only systems such as Microsoft Surface.
0
 
LVL 100

Expert Comment

by:John Hurst
ID: 40456409
That's fine. You have clarified and let's see what other say.

I keep discrete tools on my consulting laptop instead of a boot disk.  I use Lenovo machines and they have a number of bootable USB tools for Windows 8 / 8.1
0
 
LVL 2

Expert Comment

by:kittuskattus
ID: 40456410
I may be wrong but I thought that Hiren's and F4 are no longer illegal? They took the step a few years back of removing the illegal software and everything on them is freeware or licensed under Gnu GPL

You can use Easy2Boot http://www.easy2boot.com/ to put all your iso files on a single USB key and which supports UEFI boot.

Kit
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 
LVL 30

Expert Comment

by:Thomas Zucker-Scharff
ID: 40456460
Sardu has everything you need
0
 

Author Comment

by:Emmanuel Nadeau
ID: 40456475
I am reding on Sardu's website, thus, tried to run it, says it might go corrupt. Doesn't start good to me. Nothing as a doc to explain how it works quickly. Not here to read (lol) just need to freakin erase the CSC folder from a tablet Surface with Win8.1 for a customer witch is due for tomorrow. Jeez, hope to find out, quick! As I promised :)
0
 
LVL 93

Expert Comment

by:nobus
ID: 40456812
for making a bootable usb stick, i use YUMI : http://www.pendrivelinux.com/yumi-multiboot-usb-creator/
you can add very easily bootable iso's in the grub section
0
 
LVL 2

Expert Comment

by:kittuskattus
ID: 40456907
To reset CSC you can just run this command from an elevated command prompt:

reg add HKLM\SYSTEM\CurrentControlSet\services\CSC\Parameters /v FormatDatabase /t REG_DWORD /d 1

Reboot and the CSC database should reinitialise
0
 
LVL 30

Accepted Solution

by:
Thomas Zucker-Scharff earned 1500 total points
ID: 40457224
0
 

Author Comment

by:Emmanuel Nadeau
ID: 41342048
I've requested that this question be deleted for the following reason:

hjkghkh
0
 
LVL 30

Expert Comment

by:Thomas Zucker-Scharff
ID: 41342125
Although I like my answer  (of course) and have no dislike of points and the lovely emails, I believe that, at the very least the answer in ID: 40456907 (kittusKattus) should be accepted as well (although I have no knowledge pertaining to the actual usefulness of this answer - it sounds right.  If I was the OP I would have tried it.)
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Although free tools can be helpful to a limited extent, it’s better to stick to paid versions for business use.
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question