Building A Simple Answer File for Automate the Installation using System Image Manager

A simple answer file includes basic Windows Setup configuration and minimum Windows Welcome customizations. This example does not import any special drivers, applications, or packages. At the end of this walkthrough, you can run Windows Setup with this answer file to create an unattended installation.

Step 1: To complete this walkthrough, you need the following:

  • Windows System Image Manager (Windows SIM) installed on a computer. (Windows AIK Feature)
  • An authorized copy of the Windows Vista/7 product DVD.
  • Removable media, such as a floppy disk or a USB flash drive (UFD).
  1. On your technician computer, insert the Windows Vista product DVD into the local DVD-ROM drive.
  2. On the desktop of the technician computer, navigate to the \Sources directory on your DVD-ROM drive. Copy the Install.wim file from the Windows product DVD to a location on the computer.
  3. Open Windows SIM. On the desktop of the computer, click Start, point to Programs, point to Microsoft Windows OPK (or Windows AIK), and then clickWindows System Image Manager.
  4. On the File menu, click Select Windows Image.
  5. In the Select a Windows Image dialog box, navigate to the location where you saved the Install.wim file, and then click Open.
  6. On the File menu, click New Answer File.

Step:2 In this step, you define basic disk configuration and Windows Welcome settings.

  1. In the Windows Image pane of Windows SIM, expand the Components node to display available settings.
  2. On the expanded list of components, add the following components to your answer file by right-clicking the component and then by selecting the appropriate configuration pass. This action will add the component to your answer file in the specified configuration pass. A configuration pass is a phase of Windows installation. Different parts of the Windows Vista operating system are installed in different configuration passes. You can specify settings to be applied in one or more configuration passes.
Component Configuration Pass
Microsoft-Windows-Setup\DiskConfiguration\Disk\CreatePartitions\ CreatePartition windowsPE
Microsoft-Windows-Setup\DiskConfiguration\Disk\ModifyPartitions\ ModifyPartition windowsPE
Microsoft-Windows-Setup\ImageInstall\OSImage\InstallTo windowsPE
Microsoft-Windows-Setup \UserData windowsPE
Microsoft-Windows-International-Core-WinPE windowsPE
Microsoft-Windows-International-Core-WinPE\SetupUILanguage windowsPE
Microsoft-Windows-Shell-Setup \OEMInformation specialize
Microsoft-Windows-Shell-Setup \OOBE oobeSystem
Microsoft-Windows-Deployment\Reseal oobeSystem
Microsoft-Windows-Shell-Setup\Autologon auditSystem

All the settings you added must appear in the Answer File pane. Select and configure each setting as specified below.

Component Value
Microsoft-Windows-International-Core-WinPE InputLocale = <Input Locale>SystemLocale = <System Locale>UILanguage = <UI Language>

UserLocale = <User Locale>

Microsoft-Windows-International-Core-WinPE\SetupUILanguage UILanguage = <UI Language>
Microsoft-Windows-Setup\DiskConfiguration WillShowUI = OnError
Microsoft-Windows-Setup\DiskConfiguration\Disk DiskID = 0WillWipeDisk = true
Microsoft-Windows-Setup\DiskConfiguration\Disk\CreatePartitions\CreatePartition Extend = falseOrder = 1Size = 15000 (Note: you can adjust Size accordingly; this example uses 15 gigabytes.

Type = Primary

Microsoft-Windows-Setup \DiskConfiguration\Disk\ModifyPartitions\ModifyPartition Active = trueExtend = falseFormat = NTFS

Label = OS_Install

Letter = C

Order = 1

PartitionID = 1

Microsoft-Windows-Setup\ImageInstall\OSImage\ WillShowUI = OnError
Microsoft-Windows-Setup\ImageInstall\OSImage\InstallTo DiskID = 0PartitionID = 1
Microsoft-Windows-Setup \UserData AcceptEula = true
Microsoft-Windows-Setup \UserData\ProductKey Key = <product key>WillShowUI = OnError
Microsoft-Windows-Shell-Setup \OEMInformation Manufacturer = <company name>HelpCustomized = falseSupportPhone = <support number>

SupportURL = <support URL>

SupportHours = <support hours>

Microsoft-Windows-Shell-Setup\OOBE ProtectYourPC = 1NetworkLocation = Work
Microsoft-Windows-Deployment\Reseal ForceShutdownNow = falseMode = Audit
Microsoft-Windows-Shell-Setup\AutoLogon Enabled = trueLogonCount = 5Username = Administrator

 Validate the answer file

In this step, you validate the settings in your answer file and then save them to a file.

  1. In Windows SIM, click Tools, and then click Validate Answer File.
    The setting values in the answer file are compared with the available settings in the Windows image.
  2. If the answer file validates successfully, a “success” message appears in the Messages pane. Otherwise, error messages appear in the same location.
  3. If an error occurs, double-click the error in the Messages pane to navigate to the incorrect setting. Change the setting to fix the error, and then revalidate.
  4. On the File menu, click Save Answer File. Save the answer file as Autounattend.xml.
  5. Copy Autounattend.xml to the root of a floppy disk or UFD.

Video Walkthrough

Have a Look at Microsoft Springboard Series Video

How to Build Simple Answer File

How to Remove Recycler Folder Virus/Autorun Virus

This is very common virus in Windows operating systems and annoying computer users.  It spreads itself via removable media like USB flash memory cards or pen drives. Once inside your computer then can disable your anti-virus program, block access to computer protection websites and slow down speed of  your computer.  How to remove it? Lets start:

Stop It from Task Manager

  • Press the “Ctrl,” “Shift” and “Esc” keys at the same time to start the Task Manager or launch the task manager from “Ctrl”, “Alt” and “Del” option.
  • Click the “Processes” tab in the Task Manager’s window and select “ctfmon.exe.”
  • Click “End Process” at the bottom of the window and close the Task Manager.

Remove from Registry

  • Go to the “Start” menu, type “regedit” in the “Start Search” box or in Run option and hit “Enter” to start the Registry Editor.
  • Browse to and delete the following entry:
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ActiveSetup\ Installed Components\ {08B0E5C0-4FCB-11CF-AAX5-90401C608512}
  • Close the Registry Editor.

Delete the File

  • Go to the “Start” menu, type “ctfmon.exe” in the “Start Search” box and hit “Enter” or search entire computer/all partitions.
  • Right-click the search result(s) and select “Delete.
  • Restart your computer.
Note: You must create registry backup in order to meet any abnormal behavior or accidental deletion of registry entry other than I have describe above.  If your Regedit, Folder Options and Task Manager is disabled by Autorun Virus then Download this “Remove Restriction Tool“.  Which is very smart tool to re-enable all your disabled options by the viruses.  In the last, scan your all USBs/Pen Drives with Flash Disinfector to remove recycler virus from them.

Using Recycler Virus Removal Tool to delete the virus automatically

Autorun Remover is a specialized autorun removal tool to clean the autorun type virus including recycler virus, with it, you can get rid of the autorun.inf and recycler.exe easily and quickly.

  1. Download and install Autorun Virus Remover;
  2. if you USB drives has autorun.inf folder in it, insert it into computer;
  3. Execute the tool, Click ‘Start’ to execute the scan.

If Autorun Remover is blocked by the recyclers virus then run system in safe mode and try again. To do this reboot your system and tap F8 repeatedly when system starts up.

Autorun Virus Remover is the most effectively autorun antivirus software in the market, with the product, it is an easy job for you to block any autorun.inf virus from USB drives.

Windows 8 Themes

I have already shared the article on step by step installing windows 8 consumer preview in virtual environment.  Now its time to share some popular themes for Windows 8.  Microsoft has made some changes in themes.  These themes will not work on Windows 7, but Windows 7 themes can be installed on Windows 8.  Enjoy!….



The another common issue of corruption and infection of Explorer.exe Windows OS by Viruses/Malwares.  Follow these guidelines to fix the issue:

Option No. 1

  • CTRL-Alt-Del to bring up Task Manager.
  • Click File | New Task(run).
  • Type regedit in the Run box and click OK.
  • Browse to the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution.options

  • Under this key there will be subkeys named explorer.exe and iexplorer.exe. Delete the explorer and iexplorer keys entirely. They should not be listed under the Image File Execution.Options key.
  • If Explorer.exe is not automatically loading when windows start then change the following registry key:


  • In Winlogon, on the right side, there should be a value called “Shell”.
    Double click this value.  Make sure only ‘Explorer.exe’ is the value of Shell, if anything else is there , simply delete it and leave ‘Explorer.exe’ .
  • Close the Registry Editor.
  • Restart the computer.

Note: You must create registry backup in order to meet any abnormal behavior or accidental deletion of registry entry other than I have describe above.  If your Regedit, Folder Options and Task Manager is disabled by Autorun Virus then Download this “Remove Restriction Tool“.  Which is very smart tool to re-enable all your disabled options by the viruses.

Option No. 2
Click Start>>>click All Programs>>> click Accessories>>> right-click Command Prompt>>> and then click Run as administrator.

If you are prompted for an administrator password or for a confirmation>>> type the password>>> or click Allow

Type the following command>>> and then press ENTER:

SFC /scannow

A message will appear stating that ‘The system scan will begin’.  Be patient because the scan may take some time.

Iif any files require a replace SFC will replace them.  You may be asked to insert your Win7 DVD for this process to continue.

If everything is okay you should, after the scan, see the following message “Windows resource protection did not find any integrity violations”

After the scan has completed, close the command prompt window, restart the computer and check.

The sfc /scannow command scans all protected system files and replaces incorrect versions with correct Microsoft versions.

If the above steps fail I would suggest you to deal with Malware.

Read Article regarding removal of Malware :

What is Cloud Computing

World is moving fast and now everyone is migrating their data online for better safety and quick access. Cloud Computing is a new computing service through which users can access shared resources, software and information over a network. Cloud Computing is a general term that delivers hosted services on the internet. It is a new technology where no installation of applications is required and users can access the files on any computer with internet access.

Yahoo, Gmail, Google Docs etc are the best real time examples of Cloud Computing where you don’t have to install any application on your system or server. Cloud Computing provides computation, data access, data management, storage resources to users and they can use it without having any knowledge of cloud infrastructure.



Types of Clouds

There are two types of clouds Public and Private.

  • Public Cloud: Public Cloud is open for all the users connected to the internet. Here everyone shares and uses the same information without interrupting other users using the same cloud. This type of cloud requires very high bandwidth.
  • Private Cloud: Private Cloud is only for the members or users of an organization which helps them to work use shared resources quickly and efficiently. This doesn’t require very high bandwidth.

How Does Cloud Computing Works

Before proceeding to concept of how it works first of all imagine a scenario in your mind. Suppose you are hosting a website on your machine or on local server then you have to install WAMP on windows or LAMP on Linux to keep your website live. However if you deploy your website on the cloud then you don’t have to think about your system configuration and operating system running on your machine or server. Now it the headache of the cloud service provider to give you require configuration and bandwidth on their server.

Now we will shift our focus How Does Cloud Computing Works? Cloud Computing is done through various layers known as Cloud Layers. There are five different layers used in Cloud Computing. Here is brief overview of each layer.

  • Cloud Application Layer:- This layer is also known as Software as a Service (SaaS). It is most utilized and visible (Front-end) layer to the end-users using the cloud. This layer is completely for the use of users. Sometimes you have to pay some fee to use SaaS applications.
  • Cloud Software Environment Layer: This is the second layer of Cloud Architecture and it is also known as Platform as a Service (PaaS). In this layer Application Developers role comes in play, Here developers develops and install new applications and deploys it on cloud to give more flexibility to cloud users.
  • Cloud Software Infrastructure Layer: this is a basic cloud service layer which is also known as Infrastructure as a Service (IaaS). It is a physical layer which manages the data, storage, firewalls etc on the cloud. This layer can be categorized into three parts: Computational resources, Data Storage and Communications.
  • Software Kernel: This layer is also known as Operating System (OS) layer which ensures the system is working correctly and all the required applications have installed on it. This layer basically provides the software management for the physical servers that compose the cloud.
  • Hardware and Firmware: This is the last and backbone layer of our Cloud which is also known as Hardware as a Service (HaaS) or Virtualization layer. This layer is the foundation of our cloud technology. In this layer, large number of virtual machines are connected and configured for the hosting of cloud.

Pros and Cons of Cloud Computing


  • It is not much expensive software to setup a cloud server.
  • Applications can be easily migrated from one physical server to another.
  • It is most reliable service to store data and data can be recovered after any disaster.
  • Avoid Expense of updates and maintenance.
  • Access program and files from anywhere.
  • Run complicated programs without the technical experience.
  • Allows the experts to do updates and preventative maintenance quickly
  • It works smoothly and has high performance.
  • It provides high security to our data and can recover any time after any misshapen.
  • You don’t have to purchase licence copy of same software to run in an organization.


Nothing is perfect in this world. Everything has some drawbacks along with their benefits.

  • Security is the major advantage in Cloud Computing but you have to trust on the cloud service providers for that.
  • Whole our database is on third party’s hand and which again comes down to trust.

Cloud Computing has garnered so much popularity in short span of time and there are big named brands like Google, Yahoo, Amazon etc which are investing heavily in it.