Windows Sdk V7.0a
- Windows Sdk R2
- Windows Sdk For Vista
- Windows 10 Sdk
- Windows Sdk V7.0a Windows 10
- Windows Sdk V7.0a Download
Microsoft Windows SDK, and its predecessors Platform SDK, and.NET Framework SDK, are software development kits (SDKs) from Microsoft that contain documentation, header files, libraries, samples and tools required to develop applications for Microsoft Windows and.NET Framework. Windows 7, Windows Server 2003 R2 Standard Edition (32-bit x86), Windows Server 2003 R2 Standard x64 Edition, Windows Server 2008, Windows Server 2008 R2, Windows Vista, Windows XP Service Pack 3 Platform architecture: Install this SDK on and/or create applications for platform chipsets X86, X64, and Itanium. Sep 17, 2010 Update: I have found that the best way to utilize the V7.1 SDK is to launch VS2010 from a Windows V7.1 SDK Command Prompt. If I find a better way, I will post it here. So, I realized today that I'm still building against the v7.0A SDK that ships with Visual Studio 2010 (VS2010). The “Windows release track of the SDK tools” means that whenever a new version of Windows is released, they release a new version of the SDK tools as a free download. The intention is that this release of the tools is good for targeting this release of Windows.
May 19, 2010 Windows 7, Windows Server 2003 R2 Standard Edition (32-bit x86), Windows Server 2003 R2 Standard x64 Edition, Windows Server 2008, Windows Server 2008 R2, Windows Vista, Windows XP Service Pack 3 Platform architecture: Install this SDK on and/or create applications for platform chipsets X86, X64, and Itanium. Apr 12, 2010 The Visual Studio 2010 SDK provides tools and templates for building Visual Studio extensions. By using the Visual Studio 2010 SDK, you can build your own tool windows, create menu commands, and add extensions to the new Visual Studio editor and other features. Aug 14, 2015 I have seen no evidence yet that it is possible to install Windows SDK 7.1 on Windows 10. The people posting in the Question about installing MATLAB in Windows 10 have indicated that there is an incompatibility between the redistributables and Windows 10.
-->The SignTool tool is a command-line tool that digitally signs files, verifies signatures in files, or time stamps files. For information about why signing files is important, see Introduction to Code Signing. The tool is installed in the Bin folder of the Microsoft Windows Software Development Kit (SDK) installation path.
SignTool is available as part of the Windows SDK, which you can download from https://go.microsoft.com/fwlink/p/?linkid=84091.
**Windows Server 2008 R2 and Windows 7: **
Windows Sdk R2
If you are using the WinVerifyTrust function to verify multiple embedded signatures or support strong cryptography policy, you must include the following files:
- Microsoft.Windows.Build.Signing.wintrust.dll.manifest
- Wintrust.dll (downlevel version)
If you want to perform dual signing and make SHA256 catalogs, you must include those files and the following additional files:
- Makecat.exe
- Makecat.exe.manifest
- Microsoft.Windows.Build.Signing.mssign32.dll.manifest
- Mssign32.dll (downlevel version)
- Signtool.exe
- Signtool.exe.manifest
Here is the syntax for SignTool:
signtool [Command][Options][FileName …]
The following commands are supported by SignTool.
Command | Description |
---|---|
catdb | Adds or removes a catalog file to or from a catalog database. |
sign | Digitally signs files. |
signwizard | This command is not supported. Windows Vista and earlier: Launches the signing wizard. Only a single file can be specified for the file name command-line parameter. |
timestamp | Time stamps files. |
verify | Verifies the digital signature of files. |
The following options apply to the catdb command.
Catdb option | Description |
---|---|
/d | Specifies that the default catalog database be updated. If neither the /d nor /g option is used, SignTool updates the system component and driver database. |
/gGUID | Specifies that the catalog database identified by the GUID be updated. |
/r | Removes the specified catalog from the catalog database. If this option is not specified, SignTool will add the specified catalog to the catalog database. |
/u | Specifies that a unique name be automatically generated for the added catalog files. If necessary, the catalog files are renamed to prevent name conflicts with existing catalog files. If this option is not specified, SignTool overwrites any existing catalog that has the same name as the catalog being added. |
Windows Sdk For Vista
Note
Catalog databases are used for automatic lookup of catalog files.
The following options apply to the sign command.
Sign option | Description |
---|---|
/a | Selects the best signing certificate automatically. If this option is not present, SignTool expects to find only one valid signing certificate. |
/acFileName | Specifies a file that contains an additional certificate to add to the signature block. |
/as | Appends this signature. If no primary signature is present, this signature is made the primary signature. |
/cCertTemplateName | Specifies the Certificate Template Name (a Microsoft extension) for the signing certificate. |
/cspCSPName | Specifies the cryptographic service provider (CSP) that contains the private key container. |
/dDesc | Specifies a description of the signed content. |
/dgPath | Generates the to be signed digest and the unsigned PKCS7 files. The output digest and PKCS7 files will be: PathFileName.dig and PathFileName.p7u. To output an additional XML file, see /dxml. |
/diPath | Creates the signature by ingesting the signed digest to the unsigned PKCS7 file. The input signed digest and unsigned PKCS7 files should be: PathFileName.dig.signed and PathFileName.p7u. |
/dlibDLL | Specifies the DLL implementing the AuthenticodeDigestSign function to sign the digest with. This option is equivalent to using SignTool separately with the /dg, /ds, and /di switches, except this option invokes all three as one atomic operation. |
/dmdfFileName | When used with the /dg option, passes the file’s contents to the AuthenticodeDigestSign function without modification. |
/ds | Signs the digest only. The input file should be the digest generated by the /dg option. The output file will be: File.signed. |
/duURL | Specifies a URL for expanded description of the signed content. |
/dxml | When used with the /dg option, produces an XML file. The output file will be: PathFileName.dig.xml. |
/fSignCertFile | Specifies the signing certificate in a file. Only the Personal Information Exchange (PFX) file format is supported. You can use the PVK2PFX.exe tool to convert SPC and PVK files to PFX format. If the file is in PFX format protected by a password, use the /p option to specify the password. If the file does not contain private keys, use the /csp and /k options to specify the CSP and private key container name, respectively. |
/iIssuerName | Specifies the name of the issuer of the signing certificate. This value can be a substring of the entire issuer name. |
/fd | Specifies the file digest algorithm to use to create file signatures. The default algorithm is Secure Hash Algorithm (SHA-1). Windows Vista and earlier: This flag is not supported. |
/jDLL | This flag is not supported. Windows Vista and earlier: Specifies the name of a DLL that provides attributes of the signature. |
/jpParameterName | This flag is not supported. Windows Vista and earlier: Specifies a parameter that is passed to the DLL specified by the /j command. |
/kcName | Specifies the key that contains the name of the private key. |
/nSubjectName | Specifies the name of the subject of the signing certificate. This value can be a substring of the entire subject name. |
/nph | If supported, suppresses page hashes for executable files. The default behavior is determined by the SIGNTOOL_PAGE_HASHES environment variable and by the Wintrust.dll version. This option is ignored for non-PE files. |
/pPassword | Specifies the password to use when opening a PFX file. A PFX file can be specified by using the /f option. For information about protecting passwords, see Handling Passwords. |
/p7Path | Specifies that for each specified content file, a PKCS #7 file is produced. The produced PKCS #7 file is named PathFileName.p7. |
/p7ceValue | Specifies options for the signed PKCS #7 content. Set Value to 'Embedded' to embed the signed content in the PKCS #7 file, or set Value to 'DetachedSignedData' to produce the signed data portion of a detached PKCS #7 file. If this option is not used, then the default choice is 'Embedded'. |
/p7coOID | Specifies the object identifier (OID) that identifies the signed PKCS #7 content. |
/ph | If supported, generates page hashes for executable files. This option is ignored for non-PE files. |
/rRootSubjectName | Specifies the name of the subject of the root certificate that the signing certificate must chain to. This value can be a substring of the entire subject name of the root certificate. |
/sStoreName | Specifies the store to open when searching for the certificate. If this option is not specified, the My store is opened. |
/sha1Hash | Specifies the SHA1 hash of the signing certificate. |
/sm | Specifies that a computer store, instead of a user store, be used. |
/snkFileName | This flag is not supported. Windows Vista and earlier: Specifies the SNK file that contains the strong name private key. |
/sncspName | This flag is not supported. Windows Vista and earlier.: Specifies the CSP that contains the strong name private key container. |
/snkcName | This flag is not supported. Windows Vista and earlier: Specifies the key that contains the name of the strong name private key. |
/snks {12} | This flag is not supported. Windows Vista and earlier: Specifies which strong name private key to use. If this argument is not used, the default value 2 is assumed. The following values are supported:
|
/tURL | Specifies the URL of the time stamp server. If this option is not present, then the signed file will not be time stamped. A warning is generated if time stamping fails. |
/tdalg | Used with the /tr switch to request a digest algorithm used by the RFC 3161 time stamp server.[!Note] Windows Vista and earlier: This flag is not supported. |
/trURL | Specifies the RFC 3161 time stamp server's URL. If this option (or /t) is not specified, the signed file will not be time stamped. A warning is generated if time stamping fails. This switch cannot be used with the /t switch. Windows Vista and earlier: This flag is not supported. |
/uUsage | Specifies the enhanced key usage (EKU) that must be present in the signing certificate. The usage value can be specified by OID or string. The default usage is 'Code Signing' (1.3.6.1.5.5.7.3.3). |
/uw | Specifies using 'Windows System Component Verification' (1.3.6.1.4.1.311.10.3.6). |
The following option applies to the timestamp command.
Timestamp option | Description |
---|---|
/tURL | Required. Specifies the URL of the time stamp server. The file being time stamped must have previously been signed. |
/tdindex | Used with the /tr switch to request a digest algorithm used by the RFC 3161 time stamp server.[!Note] |
/tpalg | Adds a timestamp to the signature at index. |
/trURL | Specifies the RFC 3161 time stamp server's URL. The file being time stamped must have previously been signed. Either the /tr or the /t option is required. |
/p7Path | Adds a timestamp to PKCS #7 files. |
The following options apply to the verify command.
Verify option | Description |
---|---|
/a | Specifies that all methods can be used to verify the file. First, the catalog databases are searched to determine whether the file is signed in a catalog. If the file is not signed in any catalog, SignTool attempts to verify the file's embedded signature. This option is recommended when verifying files that may or may not be signed in a catalog. Examples of files that may or may not be signed include Windows files or drivers. |
/ad | Finds the catalog by using the default catalog database. |
/all | Verifies all signatures in a file with multiple signatures. |
/as | Finds the catalog by using the system component (driver) catalog database. |
/agCatDBGUID | Finds the catalog in the catalog database identified by the GUID. |
/cCatFile | Specifies the catalog file by name. |
/d | Print the description and description URL. Windows Vista and earlier: This flag is not supported. |
/dsIndex | Verifies the signature at a certain position. |
/hash{SHA1SHA256} | Specifies an optional hash algorithm to use when searching for a file in a catalog. |
/kp | Performs the verification by using the x64 kernel-mode driver signing policy. |
/ms | Uses multiple verification semantics. This is the default behavior of a WinVerifyTrust call. |
/oVersion | Verifies the file by operating system version. The version parameter is of the form: PlatformID**:VerMajor.VerMinor.**BuildNumber The use of the /o switch is recommended. If /o is not specified SignTool may return unexpected results. For example, if you do not include the /o switch, then system catalogs that validate correctly on an older OS may not validate correctly on a newer OS. |
/p7 | Verify PKCS #7 files. No existing policies are used for PKCS #7 validation. The signature is checked and a chain is built for the signing certificate. |
/pa | Specifies that the Default Authentication Verification Policy is used. If the /pa option is not specified, SignTool uses the Windows Driver Verification Policy. This option cannot be used with the catdb options. |
/pgPolicyGUID | Specifies a verification policy by GUID. The GUID corresponds to the ActionID of the verification policy. This option cannot be used with the catdb options. |
/ph | Print and verify page hash values. Windows Vista and earlier: This flag is not supported. |
/rRootSubjectName | Specifies the name of the subject of the root certificate that the signing certificate must chain to. This value can be a substring of the entire subject name of the root certificate. |
/tw | Specifies that a warning is generated if the signature is not time stamped. |
The following display options apply to all SignTool commands.
Global option | Description |
---|---|
/debug | Displays debugging information. |
/q | Displays no output on successful execution and minimal output for failed execution. |
/v | Displays verbose output for successful execution, failed execution, and warning messages. |
The SignTool verify command determines whether the signing certificate was issued by a trusted authority, whether the signing certificate has been revoked, and, optionally, whether the signing certificate is valid for a specific policy.
SignTool returns an exit code of zero for successful execution, one for failed execution, and two for execution that completed with warnings. If the SignTool encounters an unhandled exception, however, the return value is undefined.
The following command line shows signing a file automatically using the best certificate.
signtool sign/aMyFile.exe
Note
When signing an executable file that is larger than approximately 300 megabytes for use on a computer running Windows XP with Service Pack 2 (SP2) and later, you should use catalog signing with the MakeCat tool rather than use the SignTool tool. Depending on the available system resources of the computer on which the file is verified, some applications may not be able to verify the binary signature of a large file. For more information, see KB article 922225.
-->The SignTool tool is a command-line tool that digitally signs files, verifies signatures in files, or time stamps files. For information about why signing files is important, see Introduction to Code Signing. The tool is installed in the Bin folder of the Microsoft Windows Software Development Kit (SDK) installation path.
SignTool is available as part of the Windows SDK, which you can download from https://go.microsoft.com/fwlink/p/?linkid=84091.
**Windows Server 2008 R2 and Windows 7: **
If you are using the WinVerifyTrust function to verify multiple embedded signatures or support strong cryptography policy, you must include the following files:
- Microsoft.Windows.Build.Signing.wintrust.dll.manifest
- Wintrust.dll (downlevel version)
If you want to perform dual signing and make SHA256 catalogs, you must include those files and the following additional files:
- Makecat.exe
- Makecat.exe.manifest
- Microsoft.Windows.Build.Signing.mssign32.dll.manifest
- Mssign32.dll (downlevel version)
- Signtool.exe
- Signtool.exe.manifest
Here is the syntax for SignTool:
signtool [Command][Options][FileName …]
The following commands are supported by SignTool.
Command | Description |
---|---|
catdb | Adds or removes a catalog file to or from a catalog database. |
sign | Digitally signs files. |
signwizard | This command is not supported. Windows Vista and earlier: Launches the signing wizard. Only a single file can be specified for the file name command-line parameter. |
timestamp | Time stamps files. |
verify | Verifies the digital signature of files. |
The following options apply to the catdb command.
Catdb option | Description |
---|---|
/d | Specifies that the default catalog database be updated. If neither the /d nor /g option is used, SignTool updates the system component and driver database. |
/gGUID | Specifies that the catalog database identified by the GUID be updated. |
/r | Removes the specified catalog from the catalog database. If this option is not specified, SignTool will add the specified catalog to the catalog database. |
/u | Specifies that a unique name be automatically generated for the added catalog files. If necessary, the catalog files are renamed to prevent name conflicts with existing catalog files. If this option is not specified, SignTool overwrites any existing catalog that has the same name as the catalog being added. |
Note
Catalog databases are used for automatic lookup of catalog files.
The following options apply to the sign command.
Sign option | Description |
---|---|
/a | Selects the best signing certificate automatically. If this option is not present, SignTool expects to find only one valid signing certificate. |
/acFileName | Specifies a file that contains an additional certificate to add to the signature block. |
/as | Appends this signature. If no primary signature is present, this signature is made the primary signature. |
/cCertTemplateName | Specifies the Certificate Template Name (a Microsoft extension) for the signing certificate. |
/cspCSPName | Specifies the cryptographic service provider (CSP) that contains the private key container. |
/dDesc | Specifies a description of the signed content. |
/dgPath | Generates the to be signed digest and the unsigned PKCS7 files. The output digest and PKCS7 files will be: PathFileName.dig and PathFileName.p7u. To output an additional XML file, see /dxml. |
/diPath | Creates the signature by ingesting the signed digest to the unsigned PKCS7 file. The input signed digest and unsigned PKCS7 files should be: PathFileName.dig.signed and PathFileName.p7u. |
/dlibDLL | Specifies the DLL implementing the AuthenticodeDigestSign function to sign the digest with. This option is equivalent to using SignTool separately with the /dg, /ds, and /di switches, except this option invokes all three as one atomic operation. |
/dmdfFileName | When used with the /dg option, passes the file’s contents to the AuthenticodeDigestSign function without modification. |
/ds | Signs the digest only. The input file should be the digest generated by the /dg option. The output file will be: File.signed. |
/duURL | Specifies a URL for expanded description of the signed content. |
/dxml | When used with the /dg option, produces an XML file. The output file will be: PathFileName.dig.xml. |
/fSignCertFile | Specifies the signing certificate in a file. Only the Personal Information Exchange (PFX) file format is supported. You can use the PVK2PFX.exe tool to convert SPC and PVK files to PFX format. If the file is in PFX format protected by a password, use the /p option to specify the password. If the file does not contain private keys, use the /csp and /k options to specify the CSP and private key container name, respectively. |
/iIssuerName | Specifies the name of the issuer of the signing certificate. This value can be a substring of the entire issuer name. |
/fd | Specifies the file digest algorithm to use to create file signatures. The default algorithm is Secure Hash Algorithm (SHA-1). Windows Vista and earlier: This flag is not supported. |
/jDLL | This flag is not supported. Windows Vista and earlier: Specifies the name of a DLL that provides attributes of the signature. |
/jpParameterName | This flag is not supported. Windows Vista and earlier: Specifies a parameter that is passed to the DLL specified by the /j command. |
/kcName | Specifies the key that contains the name of the private key. |
/nSubjectName | Specifies the name of the subject of the signing certificate. This value can be a substring of the entire subject name. |
/nph | If supported, suppresses page hashes for executable files. The default behavior is determined by the SIGNTOOL_PAGE_HASHES environment variable and by the Wintrust.dll version. This option is ignored for non-PE files. |
/pPassword | Specifies the password to use when opening a PFX file. A PFX file can be specified by using the /f option. For information about protecting passwords, see Handling Passwords. |
/p7Path | Specifies that for each specified content file, a PKCS #7 file is produced. The produced PKCS #7 file is named PathFileName.p7. |
/p7ceValue | Specifies options for the signed PKCS #7 content. Set Value to 'Embedded' to embed the signed content in the PKCS #7 file, or set Value to 'DetachedSignedData' to produce the signed data portion of a detached PKCS #7 file. If this option is not used, then the default choice is 'Embedded'. |
/p7coOID | Specifies the object identifier (OID) that identifies the signed PKCS #7 content. |
/ph | If supported, generates page hashes for executable files. This option is ignored for non-PE files. |
/rRootSubjectName | Specifies the name of the subject of the root certificate that the signing certificate must chain to. This value can be a substring of the entire subject name of the root certificate. |
/sStoreName | Specifies the store to open when searching for the certificate. If this option is not specified, the My store is opened. |
/sha1Hash | Specifies the SHA1 hash of the signing certificate. |
/sm | Specifies that a computer store, instead of a user store, be used. |
/snkFileName | This flag is not supported. Windows Vista and earlier: Specifies the SNK file that contains the strong name private key. |
/sncspName | This flag is not supported. Windows Vista and earlier.: Specifies the CSP that contains the strong name private key container. |
/snkcName | This flag is not supported. Windows Vista and earlier: Specifies the key that contains the name of the strong name private key. |
/snks {12} | This flag is not supported. Windows Vista and earlier: Specifies which strong name private key to use. If this argument is not used, the default value 2 is assumed. The following values are supported:
|
/tURL | Specifies the URL of the time stamp server. If this option is not present, then the signed file will not be time stamped. A warning is generated if time stamping fails. |
/tdalg | Used with the /tr switch to request a digest algorithm used by the RFC 3161 time stamp server.[!Note] Windows Vista and earlier: This flag is not supported. |
/trURL | Specifies the RFC 3161 time stamp server's URL. If this option (or /t) is not specified, the signed file will not be time stamped. A warning is generated if time stamping fails. This switch cannot be used with the /t switch. Windows Vista and earlier: This flag is not supported. |
/uUsage | Specifies the enhanced key usage (EKU) that must be present in the signing certificate. The usage value can be specified by OID or string. The default usage is 'Code Signing' (1.3.6.1.5.5.7.3.3). |
/uw | Specifies using 'Windows System Component Verification' (1.3.6.1.4.1.311.10.3.6). |
The following option applies to the timestamp command.
Timestamp option | Description |
---|---|
/tURL | Required. Specifies the URL of the time stamp server. The file being time stamped must have previously been signed. |
/tdindex | Used with the /tr switch to request a digest algorithm used by the RFC 3161 time stamp server.[!Note] |
/tpalg | Adds a timestamp to the signature at index. |
/trURL | Specifies the RFC 3161 time stamp server's URL. The file being time stamped must have previously been signed. Either the /tr or the /t option is required. |
/p7Path | Adds a timestamp to PKCS #7 files. |
The following options apply to the verify command.
Verify option | Description |
---|---|
/a | Specifies that all methods can be used to verify the file. First, the catalog databases are searched to determine whether the file is signed in a catalog. If the file is not signed in any catalog, SignTool attempts to verify the file's embedded signature. This option is recommended when verifying files that may or may not be signed in a catalog. Examples of files that may or may not be signed include Windows files or drivers. |
/ad | Finds the catalog by using the default catalog database. |
/all | Verifies all signatures in a file with multiple signatures. |
/as | Finds the catalog by using the system component (driver) catalog database. |
/agCatDBGUID | Finds the catalog in the catalog database identified by the GUID. |
/cCatFile | Specifies the catalog file by name. |
/d | Print the description and description URL. Windows Vista and earlier: This flag is not supported. |
/dsIndex | Verifies the signature at a certain position. |
/hash{SHA1SHA256} | Specifies an optional hash algorithm to use when searching for a file in a catalog. |
/kp | Performs the verification by using the x64 kernel-mode driver signing policy. |
/ms | Uses multiple verification semantics. This is the default behavior of a WinVerifyTrust call. |
/oVersion | Verifies the file by operating system version. The version parameter is of the form: PlatformID**:VerMajor.VerMinor.**BuildNumber The use of the /o switch is recommended. If /o is not specified SignTool may return unexpected results. For example, if you do not include the /o switch, then system catalogs that validate correctly on an older OS may not validate correctly on a newer OS. |
/p7 | Verify PKCS #7 files. No existing policies are used for PKCS #7 validation. The signature is checked and a chain is built for the signing certificate. |
/pa | Specifies that the Default Authentication Verification Policy is used. If the /pa option is not specified, SignTool uses the Windows Driver Verification Policy. This option cannot be used with the catdb options. |
/pgPolicyGUID | Specifies a verification policy by GUID. The GUID corresponds to the ActionID of the verification policy. This option cannot be used with the catdb options. |
/ph | Print and verify page hash values. Windows Vista and earlier: This flag is not supported. |
/rRootSubjectName | Specifies the name of the subject of the root certificate that the signing certificate must chain to. This value can be a substring of the entire subject name of the root certificate. |
/tw | Specifies that a warning is generated if the signature is not time stamped. |
The following display options apply to all SignTool commands.
Global option | Description |
---|---|
/debug | Displays debugging information. |
/q | Displays no output on successful execution and minimal output for failed execution. |
/v | Displays verbose output for successful execution, failed execution, and warning messages. |
The SignTool verify command determines whether the signing certificate was issued by a trusted authority, whether the signing certificate has been revoked, and, optionally, whether the signing certificate is valid for a specific policy.
Windows 10 Sdk
SignTool returns an exit code of zero for successful execution, one for failed execution, and two for execution that completed with warnings. If the SignTool encounters an unhandled exception, however, the return value is undefined.
Windows Sdk V7.0a Windows 10
The following command line shows signing a file automatically using the best certificate.
signtool sign/aMyFile.exe
Note
Windows Sdk V7.0a Download
When signing an executable file that is larger than approximately 300 megabytes for use on a computer running Windows XP with Service Pack 2 (SP2) and later, you should use catalog signing with the MakeCat tool rather than use the SignTool tool. Depending on the available system resources of the computer on which the file is verified, some applications may not be able to verify the binary signature of a large file. For more information, see KB article 922225.
Click Here to download ACCEL DFI Thruster EFI software. Click Here to download ACCEL DFI GEN VII software. Click Here to download Holley Dominator EFI software. Click Here to download BigStuff3 Big Comm software. For additional information, please contact our technical staff at tech@efisupply.com. All ACCEL DFI Thruster and Gen VII systems purchased from efisupply.com include an ECU calibration matched to your application. We have developed a large library of naturally aspirated and power adder calibrations for ACCEL DFI Thruster and Gen VII systems and are likely to have the file you need. Comm cable & DFI software. Thruster EFI SB. Thruster EFI system prices start at under $1200, click the link below to download a brochure containing additional information on the ACCEL DFI Thruster EFI system. Click here for more ACCEL Thruster EFI and Gen VII pricing and product information at our EFI supermarket, efisupply.com. Thruster EFI is an entry level EFI system for the masses. Whether you have a 200HP or a 1200HP engine, Nitrous, Turbocharger or Supercharger the system is capable of running it. The Only True Aftermarket Volumetric Efficiency Based EFI System in its Class. It Will Run 11 Different Ignition Configurations. EFI Software Downloads. FAST - Fuel Air Spark Technology; Holley EFI; Big Stuff 3; Accel DFI Gen 6 & 7; Edelbrock EFI; Haltech; Motec; Autronic; Link Engine Management; Vi-PEC; AEM Pro and Tuner; Performance Electronics; Desktop Support Software. Teamviewer Support Software.