diff --git a/doc/chm/VeraCrypt User Guide.chm b/doc/chm/VeraCrypt User Guide.chm
index 165a6b72..1208bc68 100644
Binary files a/doc/chm/VeraCrypt User Guide.chm and b/doc/chm/VeraCrypt User Guide.chm differ
diff --git a/doc/html/Release Notes.html b/doc/html/Release Notes.html
index 0264026e..c56bd1a9 100644
--- a/doc/html/Release Notes.html
+++ b/doc/html/Release Notes.html
@@ -39,20 +39,36 @@
Release Notes
Note to users who created volumes with 1.17 version of VeraCrypt or earlier:
To avoid hinting whether your volumes contain a hidden volume or not, or if you depend on plausible deniability when using hidden volumes/OS, then you must recreate both the outer and hidden volumes including system encryption and hidden OS, discarding existing volumes created prior to 1.18a version of VeraCrypt.
-1.24-Beta1 (January 21th, 2019):
+1.24-Beta2 (January 31th, 2019):
+- All OSs:
+
+- Increase password maximum length to 128 bytes in UTF-8 encoding.
+- Speed optimization of XTS mode on 64-bit machine using SSE2 (up to 10% faster).
+- Fix detection of CPU features AVX2/BMI2. Add detection of RDRAND/RDSEED CPU features. Detect Hygon CPU as AMD one.
+
+
- Windows:
- MBR Bootloader: dynamically determine boot loader memory segment instead of hardcoded values (proposed by neos6464)
- MBR Bootloader: workaround for issue affecting creation of hidden OS on some SSD drives.
- Fix issue related to Windows Update breaking VeraCrypt UEFI bootloader.
-- Support Multi-boot for EFI system encryption.
+- Several enhancements and fixes for EFI bootloader:
+
+- Implement timeout mechanism for password input. Set default timeout value to 3 minutes and default timeout action to "shutdown".
+- Implement new actions "shutdown" and "reboot" for EFI DcsProp config file.
+- Enhance Rescue Disk implementation of restoring VeraCrypt loader.
+- Fix ESC on password prompt during Pre-Test not starting Windows.
+- Add menu entry in Rescue Disk that enables starting original Windows loader.
+
+- Better support Multi-boot for EFI system encryption.
- New security features:
- Erase system encryption keys from memory during shutdown/reboot to help mitigate some cold boot attacks
- Add option when system encryption is used to erase all encryption keys from memory when a new device is connected to the system.
- Add new driver entry point that can be called by applications to erase encryption keys from memory in case of emergency.
+- Use CPU RDRAND or RDSEED as an additional entropy source for our random generator when available.
- Add mount option that allows mounting a volume without attaching it to the specified drive letter.
- Update libzip to version 1.5.1
- Do not create uninstall shortcut in startmenu when installing VeraCrypt. (by Sven Strickroth)
diff --git a/src/Common/Tcdefs.h b/src/Common/Tcdefs.h
index 0a88a5f4..ed0c94bb 100644
--- a/src/Common/Tcdefs.h
+++ b/src/Common/Tcdefs.h
@@ -67,7 +67,7 @@ extern unsigned short _rotl16(unsigned short value, unsigned char shift);
#define VERSION_NUM 0x0124
// Release date
-#define TC_STR_RELEASE_DATE L"January 28, 2019"
+#define TC_STR_RELEASE_DATE L"January 31, 2019"
#define TC_RELEASE_DATE_YEAR 2019
#define TC_RELEASE_DATE_MONTH 1
diff --git a/src/Driver/Driver.rc b/src/Driver/Driver.rc
index 1d63a971..00340d3d 100644
--- a/src/Driver/Driver.rc
+++ b/src/Driver/Driver.rc
@@ -27,8 +27,8 @@ LANGUAGE LANG_ENGLISH, SUBLANG_ENGLISH_US
//
VS_VERSION_INFO VERSIONINFO
- FILEVERSION 1,24,2,0
- PRODUCTVERSION 1,24,2,0
+ FILEVERSION 1,24,2,1
+ PRODUCTVERSION 1,24,2,1
FILEFLAGSMASK 0x17L
#ifdef _DEBUG
FILEFLAGS 0x1L
diff --git a/src/Release/Setup Files/veracrypt-x64.cat b/src/Release/Setup Files/veracrypt-x64.cat
index 0aa3ef9a..fb2b13cf 100644
Binary files a/src/Release/Setup Files/veracrypt-x64.cat and b/src/Release/Setup Files/veracrypt-x64.cat differ
diff --git a/src/Release/Setup Files/veracrypt-x64.sys b/src/Release/Setup Files/veracrypt-x64.sys
index 7f4e9e90..c63b7a4d 100644
Binary files a/src/Release/Setup Files/veracrypt-x64.sys and b/src/Release/Setup Files/veracrypt-x64.sys differ
diff --git a/src/Release/Setup Files/veracrypt.Inf b/src/Release/Setup Files/veracrypt.Inf
index 6da982f4..6bc212df 100644
--- a/src/Release/Setup Files/veracrypt.Inf
+++ b/src/Release/Setup Files/veracrypt.Inf
@@ -10,7 +10,7 @@ signature = "$Windows NT$"
Class = "Encryption" ;This is determined by the work this filter driver does
ClassGuid = {a0a701c0-a511-42ff-aa6c-06dc0395576f} ;This value is determined by the Class
Provider = %ProviderString%
-DriverVer = 01/28/2019,1.24.2.0
+DriverVer = 01/31/2019,1.24.2.1
CatalogFile = veracrypt.cat
diff --git a/src/Release/Setup Files/veracrypt.cat b/src/Release/Setup Files/veracrypt.cat
index 1c3a2359..82d56af5 100644
Binary files a/src/Release/Setup Files/veracrypt.cat and b/src/Release/Setup Files/veracrypt.cat differ
diff --git a/src/Release/Setup Files/veracrypt.sys b/src/Release/Setup Files/veracrypt.sys
index fe2891ab..5a8b52f6 100644
Binary files a/src/Release/Setup Files/veracrypt.sys and b/src/Release/Setup Files/veracrypt.sys differ