RBCC Posted November 6, 2010 Share Posted November 6, 2010 Dear Everyone,What security measures do I have to deal with when hacking NTOSKRNL.EXE? is there a way to circumvent them? so I add my bootscreen background? John:thumbup Link to comment Share on other sites More sharing options...
joakim Posted November 6, 2010 Share Posted November 6, 2010 Hi JohnI answered at the sevenforums; http://www.sevenforums.com/customization/106861-how-change-boot-animation-windows-7-a-32.html#post1059879You can modify the bootscreen as was done in XP, by modifying the embedded image in the kernel. However, since the kernel wil get an invalidated certificate from this hack (like all mods), you must either configure testsigning, or implement the patches as already descibed ealier, in bootmgr and winload.exe (yes I've boot with almost each and every boot-related file with bad checksum (which by definition also will have an invalidated digital certificate of course). So it is without doubt a security issue as you cannot selectively choose which files to not perform checks on. Well, you can, sort of but that is before the kernel is loaded anyway.About the colorfulness of the bootscreen, I think it is as restricted as it was for the same hack for XP. And you cannot implement both (ie bootscreen + animation). You must choose one of them.Joakim Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now