Ready to distribute your software masterpiece? Don't wrestle for weeks with a complicated installation builder. Spend just a few minutes with Centurion Setup, and it will build a professional software installer in a self-contained, compressed executable.
Centurion Setup and the installers that it creates run on all versions of Windows® 10, 8, 2012, 7, 2008, Vista, 2003, XP, and 2000, including 64-bit versions.
Installers created by Centurion Setup may be distributed completely royalty-free.
A Centurion Setup installer is bullet-proof and extremely reliable. You will never get a complaint from a customer that the installation program has crashed.
Can install Device drivers, Control Panel extensions, and .MSI packages.
COM files can be installed and registered with the operating system. This includes ActiveX controls and .TLB type libraries.
Registry keys and values can be installed and uninstalled. For user-specific data, a separate value can be installed for every user.
To satisfy special needs, a batch of MS-DOS commands can be executed before and after both installation and uninstallation. Another batch can be run after the installer exits, perhaps to launch a custom configuration program.
The installer can add exceptions to the Windows Firewall.
Centurion Setup's installers can be digitally signed. Uncheck the "Verify Integrity" box on the Build branch so that the installer will not report that it has been damaged.
A restore point can be created before installation.
The installer can install to a default location or ask the end-user where the files should be installed.
The installer can create Desktop and/or Start Menu shortcuts to any installed file. Desktop shortcuts can optionally be placed in a folder. Desktop and Start Menu shortcuts can optionally be made available to all users or only the user who installed the product.
Any installed file can be configured to open during bootup.
A patch installer can be created. Centurion Setup can automatically determine what files have changed and should therefore be included in the patch.
The installer can display an image in the background, a solid color, or a transition from one color to another. The background can optionally cover the taskbar, or leave it visible. There can even be no background at all.
After the installer is built, it can be automatically placed in a .ZIP file.
The installer can require the end-user to enter a password before installation can begin.
The installer can be encrypted with a random key. If a virus scanner is producing a false positive, simply rebuild the installer.
The installer can be bloated (with random data) to any size to help discourage piracy.
The installer can refuse to install on certain platforms, such as Windows 2000.
Fonts can be installed and registered with the Operating System so that they are available to all applications. The end-user can be given the option to keep the font during uninstallation.
The installer can replace locked files during the next reboot.
Installers can be set to expire after a certain date. After the expiration date, the installer will no longer install.
Both 32 and 64 bit applications are supported.
The installer can loosen the security settings of the product's folder so that all users will have rights to use it.
The installer verifies its intergrity to ensure that it has not been damaged, altered, or infected by viruses.
The installer can delete existing files based on date or size criteria. This can be useful when installing over old versions of your software.