v

您的位置:VeryCD软件网络软件

软件资源事务区


《远程部署工具》(EMCO Remote Deployment Enterprise )v5.5.40.160[压缩包]

  • 状态: 精华资源
  • 摘要:
    发行时间2012年
    制作发行EMCO Software
    语言英文
  • 时间: 2012/03/15 13:24:59 发布 | 2012/03/15 15:23:56 更新
  • 分类: 软件  网络软件 

MTina

精华资源: 3862

全部资源: 3863

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名远程部署工具
英文名EMCO Remote Deployment Enterprise
资源格式压缩包
版本v5.5.40.160
发行时间2012年
制作发行EMCO Software
语言英文
简介

IPB Image


软件类型:软件>网络软件
软件性质:破解软件
操作系统:Windows
应用平台: Windows 2000 (with SP4 or later), Windows XP, Windows XP x64, Windows 2003, Windows 2003 x64, Windows Vista, Windows Vista x64, Windows 2008, Windows 2008 x64, Windows 2008 R2, Windows 7, Windows 7 x64
问题反馈: http://emcosoftware.com/support
网站链接:http://emcosoftware.com/remote-deployment
软件介绍:

EMCO Remote Deployment Enterprise 是 一款pc 软件应用程序自动化网络远程部署工具。它可帮助您执行跨网络的应用程序安装或卸载。检测到的文件系统和注册表的更改可以自动转换到安装包中。

IPB Image


IPB Image

IPB Image

IPB Image


IPB Image



======================================

下载链接来自sharevirus,
未经过安装测试与安全检测,使用者后果自负与本论坛无关
软体版权归原作者及其公司所有,如果你喜欢,请购买正版


======================================



With EMCO Remote Deployment the process of remote software installation is extremely easy and consists of just two steps: deployment package creation and its remote installation. If you have original installation or uninstallation to be replicated on remote PCs, the first step can be fully automatic. You only need to press the button in EMCO Remote Deployment and make a system snapshot to capture current state of file system, registry and services. Then you can follow installation or uninstallation procedure and as soon as it will be completed you need to make another system snapshot. Comparing information from two snapshots application can automatically detect changes and generate deployment package.

Finally, when package is ready, you can scan network to detect available PCs and select those where you plan to install package. Remote deployment process is executed in parallel on multiple PCs and works invisible for remote users.


Remote Software Deployment


Any installation or uninstallation process, executed locally, can be replicated to one or multiple remote PCs to perform mass remote software installation or uninstallation. No client modules installation or special remote PCs configuration is required.
Unattended software installation and uninstallation
Mass application deployment to remote PCs
Silent deployment process on remote side


Automatic Deployment Package Generation

Deployment package is automatically prepared by taking two OS snapshots: before and after running application installation or uninstallation procedures. Detected file system, registry and other changes are included into the package.
Package generation for any installation and uninstallation
Fast snapshoting process that takes less than 1 minute
Snapshoting of processes that require system reboot

Remote Deployment Services

Automated deployment gives you an ability to remotely install software to any node in your network, located in domain or workgroup. You only need to have an administrative access to remote PC in order to make remote installation.
Schedule deployment by adding task to Windows schedule
Execution of defined process before and after deployment
E-mail notifications upon remote installation completion


Deployment Package Settings

Deployment package includes set of file system, registry and services changes that can be replicated to remote PCs. It is environment-independent, so you can deploy it to computers with different OS and system settings.
Using system variables instead of platform-specific paths
Automatic filtering of configured resources modification
Starting and stopping services in scope of installation


EMCO Remote Deployment System Requirements

Computer running EMCO Remote Deployment must meet following requirements.
Minimum Hardware Requirements
1 GHz Intel Pentium processor or equivalent
512MB of RAM
250MB of free disk space
Recommended Hardware Requirements
2 GHz Intel Pentium processor or equivalent
1GB of RAM
500MB of free disk space
Supported Platforms

Windows 2000 (with SP4 or later), Windows XP, Windows XP x64, Windows 2003, Windows 2003 x64, Windows Vista, Windows Vista x64, Windows 2008, Windows 2008 x64, Windows 2008 R2, Windows 7, Windows 7 x64
Requirements
Administrative rights on the local computer
Enabled NetBIOS over TCP/IP
Requirements for Remote Computers

Remote computers, accessed by EMCO Remote Deployment must meet following requirements.
Platform: Windows 2000 (with SP4 or later), Windows XP, Windows XP x64, Windows 2003, Windows 2003 x64, Windows Vista, Windows Vista x64, Windows 2008, Windows 2008 x64, Windows 2008 R2, Windows 7, Windows 7 x64
An access with a Local or Domain administrator rights
Enabled NetBIOS over TCP/IP
Enabled File and Printer sharing
Enabled access to the ADMIN$ share
An ability to ping the computer within 1500 ms
Started services: Computer Browser, Remote Registry
TCP ports opened: 135, 139, 445, 6245
UDP ports opened: 137, 138


代码
                                                      
                   LineZer0!  ²        ²  ²   
            ²²² ²           ²  ²²  ² ²±
            ±²²       ²         ²²²² ²²²
             ² ²   ²    ² ² ²²
             ²  ²² ² ²  ²²² ²    ²
             ²²   ²² ²    ²²² ²² ²   ²
            ²    ²²² ² ²²²  ²² ±²   ²²±
            ²  ²  ²²²  ²²²  ²²±
        ² ±²  ²  ²²  ²²²²± ± ²
          ² ²°²  ² ² ²²² ² ±  ²²   
        ² ²  ²²    ² ²²  ²     ² ²
       ²²   ² ²²²² ²   ² ²  ²² 
       ²² ²²²    ²  ² ² ²²²  ²²± ²²
     ²²²  ²  ²²²   ²²²  
  cpN²²² ±² ²²±±²²²²²°² ²± ²²²cRo
   ²² ±²²²²²      ²²²  ²²²²²²²± ²²
²²²² ±±²²²²²     ²        ²²  ²²    ²²²²²±± ²²²²
  ² ²²   ²²²² ²²  presents  ²  ²±²²   ²² ²
²²   ²            ²²             ²        ²   ²²
²² ²²±  ²                  ²              ²  ±²² ²²
²² °°                                                           °° ²²
   ²                                                           ²
     ²      Remote.Deployment Enterprise v5.5.40.160         ²
                                                             
   ²²²              Release Date : 2012-03-09                ²²²
²²                     Nfo Date : 2012-03-09                  ²²
²² ²                                                                     ² ²²
²      Num. Disks : xx/03                       OS : Windows            ²
²        Nfo Time : 13:37                 Rel Type : Keygen             ²
²         Cracker : Team Lz0               Archive : lz0*.zip           ²
²          Packer : Team Lz0                Rating : Your choice        ²
²        Supplier : Team Lz0              Language : English            ²
²      Protection : N/A                                                 ²
²                                                                       ²
²    Requirements : N/A                                                 ²
²                 : Always use a firewall.                              ²
²   Publisher URL : http://emcosoftware.com/                            ²
²       Publisher : EMCO                                                ²
²                                                                       ²
²            (-)  Keyfile / License          (-)  Emulator              ²
²            (-)  Patch                      (-)  Serial                ²
²            (-)  Cracked .EXE / .DLL        (-)  Retail                ²
²            (x)  Keygen                     (-)  Trainer               ²
²  ²       (-)  Loader                     (-)  Other            ²  ²
² ²                                                                 ² ²
²²                                                             ²²
   ²² ²               1999 - 2012               ² ²²
     ²   ²²    °°°                   °°°    ²²   ²
     ²²² ² ² °±±  ²²  ±±° ² ² ²²²   
   ²²²    ² ±²²             ²²± ²    ²²²
²²          ²²²²   + I N F O +   ²²²          ²²
²² ²                ²²²²               ²                ² ²²
²                                                                     ²
²     Automated Remote Deployment of Software Applications to           ²
²     Network PCs                                                       ²
²     Integrated remote deployment tool for one-click software          ²
²     distribution across the local network. It helps you to make       ²
²     remote software deployment by replicating changes, performed      ²
²     by any application installation or uninstallation, across the     ²
²     network. Detected file system and registry changes can be         ²
²     automatically transformed to installation package, ready for      ²
²     remote deployment. Deployment process is silent and               ²
²     clientless, and it doesn't require any configuration of remote    ²
²     PCs.                                                              ²
²                                                                       ²
² ²                                                                 ² ²
²²                                                               ²²
   ² ²²                                       ²² ²
     ²  ²²    °°°                   °°°    ²²  ²
     ²²² ² ² °±±  ²²  ±±° ² ² ²²²   
   ²²²    ² ±²²             ²²± ²    ²²²
²²          ²²²²+ I N S T A L L +²²²          ²²
²² ²                ²²²²               ²                ² ²²
²                                                                     ²
²     1) Unpack and install.                                            ²
²     2) Use the key generator to generate a valid serial.              ²
²     3) Enjoy this release!                                            ²
²                                                                       ²
²     NOTE: For obvious reasons you should always make sure that        ²
²           the title is restricted access to internet by a firewall    ²
²           to avoid any problems. Further, when running our            ²
²           keygens/patches you might need to run it with admin         ²
²           rights while in Vista/Win7 to ensure that it has            ²
²           enough privileges.                                          ²
²                                                                       ²
² ²                                                                 ² ²
²²                                                               ²²
   ² ²²                                       ²² ²
     ²  ²²    °°°                   °°°    ²²  ²
     ²²² ² ² °±±  ²²  ±±° ² ² ²²²   
   ²²²    ² ±²²             ²²± ²    ²²²
²²          ²²²²   + J O I N +   ²²²          ²²
²² ²                ²²²²               ²                ² ²²
²                                                                     ²
²     So you are interested in joining one of the most successful       ²
²     groups of all time? Then you might want to continue reading.      ²
²     Not only can we offer whatever your heart might desire, but       ²
²     becoming part of the group will also be one of the more           ²
²     significant decisions you perhaps will take.                      ²
²                                                                       ²
²     Ever since our beginning in 1999 we’ve strived to make a group    ²
²     that not only is a group of knowledge, but a gathering of         ²
²     people that wants friendship, devotion, respect and fun. Hard     ²
²     work is what has brought us where we are today, and hard work     ²
²     is also what we would expect from you.                            ²
²                                                                       ²
²     Given the amount of hours we all put into this every day, we      ²
²     like to see our self as a secondary family. We strive to take     ²
²     care of each other and thus – mutual respect is the essence of    ²
²     our group. We never pushed for being elite, as we do not believe  ²
²     that any of us deserve the mark of the elitists. Every member     ²
²     of our group is taught to honor the next guy or gal with the      ²
²     same respect as he or her demands for themselves. The same        ²
²     thought applies to how we look at other groups.                   ²
²                                                                       ²
²     Are you ready to become part of a family? Do you think you have   ²
²     what it takes? Then now is the time to get up and contact us.     ²
²     Perhaps you will find a new road to follow with us. Open          ²
²     positions are as follows, but if you do feel you have something   ²
²     to contribute with but feel that it doesn’t match any of the      ²
²     open positions, then do contact us and let us be the judge        ²
²     of that.                                                          ²
²                                                                       ²
²     CRACKERS                                                          ²
²     Do you have a thrill to find solutions to various protection      ²
²     schemes? May it be unpacking, patching, finding algorithms        ²
²     or emulating? We’re always open for individuals that want to      ²
²     expand their knowledge in reversing. You are required to have     ²
²     some former knowledge in reversing as we do not tutor people      ²
²     from scratch. Former experience from other scene groups is        ²
²     good, but not a necessity. Unsure if you qualify? Contact us,     ²
²     and we’ll decide based on your qualities. Be prepared that        ²
²     we will demand examples of previous work.                         ²
²                                                                       ²
²     CODERS                                                            ²
²     You’re enthusiastic about coding, you love to optimize and        ²
²     integrate various projects; we always have projects ranging       ²
²     from smaller ones to large ones that are in need of attendance.   ²
²     If you are joining our family as a coder you will be appointed    ²
²     a variety of projects that will push you to do your best and      ²
²     will probably also serve as a great way of becoming an even       ²
²     greater coder. Projects are ranging from database integrations,   ²
²     IRC bots, and cracktros to tools and security oriented            ²
²     development. Examples of previous work will be required and       ²
²     experience beyond 2 years is also a requirement.                  ²
²                                                                       ²
²     SUPPLIERS                                                         ²
²     Do you have access to good titles? Perhaps you work as an         ²
²     engineer, network administrator, or by any other means can        ²
²     acquire the latest versions of what you have access to? Then      ²
²     feel free to contact us and let us know what you have. We do      ²
²     not focus on anything in particular and as such you will find     ²
²     that we do titles ranging from CAD/CAM to more common graphics,   ²
²     music and programming titles – as well as ordinary shareware      ²
²     titles. Contact us today and we will see if your titles are       ²
²     something we’d like to put some effort into.                      ²
²                                                                       ²
²     SITES                                                             ²
²     You’ve been running a dedicated and well supported site for       ²
²     more than 6 months, the site has grown some reputation and your   ²
²     staff as well as the chosen link location is security oriented.   ²
²     We do not accept sites that are running of rented boxes;          ²
²     neither do we accept sites located in United States of America,   ²
²     Germany or Austria. The speed of the site does not matter, what   ²
²     do matter is that it’s stable, it’s secure and above all – the    ²
²     entire site as well as crew is operating encrypted. You feel      ²
²     that this might be you? Then let us know today, and we will       ²
²     be getting back to you shortly.                                   ²
²                                                                       ²
²     BOX OPERATORS                                                     ²
²     You have been running hosting services for years; either being    ²
²     BNC solutions or IRC daemons – or perhaps just have some boxes    ²
²     that you might think we can use. You’re an administrator of a     ²
²     network and have complete control over the box, the network       ²
²     area and access levels. If so, then you are someone we are        ²
²     interested to talk to. Keep in mind that we do not offer any      ²
²     boxes residing in the same countries as mentioned under “SITES”.  ²
²                                                                       ²
²     Remember, we all started out somewhere so do not keep yourself    ²
²     from contacting us thinking you aren’t good enough to help out,   ²
²     let us decide that.                                               ²
²                                                                       ²
² ²                                                                 ² ²
²²                                                               ²²
   ² ²²                                       ²² ²
     ²  ²²    °°°                   °°°    ²²  ²
     ²²² ² ² °±±  ²²  ±±° ² ² ²²²   
   ²²²    ² ±²²             ²²± ²    ²²²
²²          ²²²²  + L E G A L +  ²²²          ²²
²² ²                ²²²²               ²                ² ²²
²                                                                     ²
²     Our releases are made to make sure that the end-user is able      ²
²     to fully test a title before going into a purchase as well as     ²
²     give the end-user an opportunity to make backup copies of         ²
²     titles he or she already owns. Please do respect our stance       ²
²     on this and make sure that you buy the required licenses upon     ²
²     deciding to buy the product. Respect the software authors         ²
²     that have put time, money and effort into creating the title      ²
²     you now have in your hand.                                        ²
²                                                                       ²
²         1. You should only use this title for the period of time      ²
²            as you decide if this is the right product for you         ²
²            personally or for your business. Upon deciding             ²
²            that this is the product you are looking for then          ²
²            we encourage you to buy the necessary licenses.            ²
²                                                                       ²
²         2. If you already own this title then this release can be     ²
²            used as a substitute to the original disks for backup      ²
²            and archiving purposes. This is convenient if you          ²
²            own a large set of various titles that all require         ²
²            dongles to run and you keep on mixing up the dongles.      ²
²            Our releases have removed those checks and thus will       ²
²            be more convenient to use. Again, this should only         ²
²            be the case if you own the required licenses.              ²
²                                                                       ²
²         3. We do not wish for our releases to be widely spread        ²
²            across web boards, P2P networks and the like. While we     ²
²            do know that occurs we strongly urge people to not         ²
²            share these titles at such places.                         ²
²                                                                       ²
²         4. The group is not involved with the spreading of the        ²
²            release, partial files or any of the cracks. The           ²
²            distribution of our releases are all done by third         ²
²            parties – and as such according to the laws of the         ²
²            countries where our members reside, it is not our          ²
²            responsibility what others decides to do with              ²
²            these releases.                                            ²
²                                                                       ²
²         5. You are NOT allowed to distribute our titles with the      ²
²            intent of earning money. This title is not yours to        ²
²            sell. We, as a group, do not participate in such           ²
²            actions and we plead to those that are thinking about      ²
²            selling pirated titles, reconsider – not only are you      ²
²            hurting us seeing our releases being abused, but above     ²
²            all – you are actually stealing profit from the            ²
²            software authors.                                          ²
²                                                                       ²
²         6. We do not take any responsibility of computer or data      ²
²            loss that may occur from using our releases. Keep in       ²
²            mind that you are using a third party solution that        ²
²            does not come from the original software authors.          ²
²            However we strive to make perfect releases so the          ²
²            chances of something like that happening are slim.         ²
²                                                                       ²
²         7. The usage of our cracks is legal in most countries         ²
²            outside of the United States, if and only if you own a     ²
²            complete copy of the program or game. But you are          ²
²            required to read the end user license agreements (EULAs)   ²
²            that comes with the various titles to be sure that you     ²
²            are not violating any agreements.                          ²
²                                                                       ²
²     According to the DMCA ACT in the United States you have no        ²
²     rights to circumvent any copy protection. Keep this in mind       ²
²     as the penalties for doing so there are harder than if you        ²
²     stole the actual title from the self. Our base of operation       ²
²     however is not located in the states, and thus we are not         ²
²     bound by any of the legislations like “no electronic theft act”   ²
²     “digital millennium copyright act” or “the patriot act”. But      ²
²     you as a end-user might be, so be certain to read the EULAs       ²
²     that you agree to upon installing something to make sure          ²
²     you are not breaking any domestic laws.                           ²
²                                                                       ²
²     Finally, we do encourage you to explore the open source           ²
²     community. In most cases you will find open and free software     ²
²     that does exactly what you need, and it won’t cost you            ²
²     anything. At the same time you can enjoy the feeling of           ²
²     doing something good, and support the open source community.      ²
²                                                                       ²
²     By using this release you agree to the statement written above,   ²
²     and accept that the responsibility to whet ever the usage of      ²
²     this title is legal or not is with you and you only. Make sure    ²
²     that you understand the potential risks of using this release.    ²
²                                                                       ²
² ²                                                                 ² ²
²²                                                               ²²
   ² ²²                                       ²² ²
     ²  ²²    °°°                   °°°    ²²  ²
     ²²² ² ² °±±  ²²  ±±° ² ² ²²²   
   ²²²    ² ±²²             ²²± ²    ²²²
²²          ²²²² + G R E E T S + ²²²          ²²
²² ²                ²²²²               ²                ² ²²
²                                                                     ²
²           HERiTAGE, RAZOR1911, F4CG, EMPHASiS, ZENiTH, MYTH           ²
²             GHOST RiDERS, LEGENDS NEVER DiE, ENFUSiA, BiN             ²
²                    FATiGUED COURiERS NETWORK (FCN)                    ²
² ²                     CHEMiCAL REACTiON (CRO)                     ² ²
²²                                                               ²²
   ² ²²                                       ²² ²
     ²  ²²    °°°                   °°°    ²²  ²
     ²²² ² ² °±±  ²²  ±±° ² ² ²²²   
   ²²²    ² ±²²             ²²± ²    ²²²
²²          ²²²²+ C O N T A C T +²²²          ²²
²² ²                ²²²²               ²                ² ²²
²                                                                     ²
²     If you want to contact the group either for a open membership     ²
²     position, for a site offer or just want to let us know that       ²
²     some release might be flawed, then we welcome your response.      ²
²     However we do not send out releases, files from releases,         ²
²     cracks or information to where you might find this. For quick     ²
²     response you might want to search for us online, if you can       ²
²     manage to wait then send us an email on the address below.        ²
²                                                                       ²
²    ²                  EMAIL : linezer0@nerdshack.com             ²    ²
² ²                UPDATED : 4th of November 2011                ²
²²                                                               ²²
   ²                                                       ²
     ²   ²                                      ²   ²
         ²                                  ²   
     ² ²²²    °°°            °°°    ²²² ²
            ² ² ² °±±   ²²          ²²   ±±° ² ² ²
               ² ±²²               ²²± ²   
                  ²²²²²²                     ²²²²²²   
                    ²²²    ascii proudly done   ²²²²
                       ²²     by cpN of cRo     ²²
                        ²²       in 2oo6       ²²
                         ²                 ² 
                           ²² ²         ² ²²
                            ²²²  ²  ²²²
                                ²  ²
                                     ²²
                                      ²
                                       






正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有20网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。