marko2002
Content Type
Profiles
Forums
Events
Posts posted by marko2002
-
-
I have the same version of SAV and use the same switches and it seems to work just great....except for one thing...
...after it's been installed, at each and every logon afterwards, an explorer window open to C:\PROGRA~\Symantec automatically opens up.
I can't figure out where the command to do this is coming from.
Bear in mind I am installing SAV10 as an unmanaged client, not a server install, or server dependent install.
Anyone ever come across this before?
Also, the tray icon seems to have disappeared, although the services are indeed running.
I know this is quite an old post, but just in case someone else is having the same problem . . .
I had exactly the same problem and it freaked me out no end trying to "google" for the problem cause it don't seem to exist - however the solution if buried deep inside the Symantec web site and is as follows . . .
This can happen if a registry entry that points to a Symantec application is formatted incorrectly.To format the registry entry correctly
On the Windows taskbar, click Start > Run.
In the Open box, type the following text:
regedit
Click OK.
Go to the following registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
In the right pane, double-click vptray.
In the Edit String dialog box, add quotation marks around the entire path.
For example, "C:\Program Files\Symantec AntiVirus\VPTray.exe"
Exit the Registry Editor.
Restart the computer.
After fixing the reg setting I just exported it and then import it back at the install stage to make absolutely certain it's there!!!
Hope this helps
Marko
0 -
Guys,
forget my RegTweaks file above, as I had started another disc from scratch and excluded all regtweaks, though the problem was still there!!!.
I even created a second disc, integrating only the RVMUpdatePack2.0.5 using Nlite, and this worked OK without any password problems at all. Usually I make other tweaks using Nlite but I refrained this time to see if the problem persisted, and it didn't therefore I can only assume that Nlite is causing the problem somehow, but HOW?????.
I know the obvious answer to this could be in what I am configuring through Nlite, but honestly there are no magic buttons I have access to that anyone else doesn't - and this is why I cant understand why no-one else seems to be having similar issues!!.
I throw myself at your mercy for any suggestions pllllleeeeeeease
***EDIT***
Just realised this guy seems to be having the same issue, although it is most definately NOT my keyboard, I've tried the discs on various computers with the same results and currently using VMWare to test!!!!.
Arrgggghhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh!!!!
0 -
Guys,
searched the forum for this one, alas to no avail though apologies if it is hidden away somewhere!.
The problem I am having at the moment is a strange one, though I can only assume it has something either to do with my reg entries or with the exclusion of certain files at the outset of my making my XPCD.
After the XPCD has installed on a workstation it auto logs on without a problem each an every time you restart, although after creating a few users and applying passwords to these accounts the system will then randomly refuse to allow a password to be entered into the password box. Those accounts which have no passwords applied to them can log on without any problem, and this problem only applies to those accounts with passwords.
As I say, this happens randomly, although once it does happen it applies to ALL password protected accounts and can only be rectified by logging on, then off using an account without a password or restarting the machine itself. You can then log on to a password protected account until the next time this issue occurs.
It is driving me absolutely crazy and I've googled the problem without any luck also . . . please help!!!.
Here's my Regtweaks file . . .
(See download at bottom)
and here's my WINNT.SIF file . . . .
;SetupMgrTag[Data]MsDosInitiated = "No"
AutoPartition=1
UnattendedInstall="Yes"
AutomaticUpdates=yes
[unattended]
NonDriverSigningPolicy = "Ignore"
DriverSigningPolicy = "Ignore"
OemPreinstall = "Yes"
OemPnPDriversPath = "D\C\A;D\C\AM\1;D\C\AM\2;D\C\AM\3;D\C\AM\4;D\C\AM\5;D\C\AM\6;D\C\AM\7;D\C\AT;D\C\AU;D\C\I;D\C\IT;D\C\N;D\C\S;D\C\SM;D\C\V;D\CPU;D\G\3\1;D\G\3\2;D\G\3\3;D\G\3\4;D\G\A\1;D\G\A\1\AVS_T200;D\G\A\1\WDM;D\G\A\1\WDM\1;D\G\A\1\WDM\2;D\G\A\2;D\G\A\3;D\G\A\4;D\G\A\5;D\G\AS\1;D\G\AS\2;D\G\I\1;D\G\I\2;D\G\I\3;D\G\I\4;D\G\I\5;D\G\M\1;D\G\M\2;D\G\M\3;D\G\M\4;D\G\M\5;D\G\N\1;D\G\N\2;D\G\N\3;D\G\N\4;D\G\S\1;D\G\S\2;D\G\S\3;D\G\S\4;D\G\S3\1;D\G\S3\2;D\G\S3\3;D\G\T;D\G\V\1;D\G\V\2;D\G\V\3;D\G\V\4;D\G\V\5;D\G\V\6;D\G\X\1;D\G\X\1\WDM;D\G\X\2;D\L\3\1;D\L\3\2;D\L\3\3;D\L\AD;D\L\AM;D\L\AU;D\L\B;D\L\BU\1;D\L\BU\2;D\L\BU\3;D\L\C\1;D\L\C\2;D\L\C\4;D\L\CO\1;D\L\CO\2;D\L\CO\3;D\L\CO\4;D\L\CO\5;D\L\D\1;D\L\D\2;D\L\D\3;D\L\D\4;D\L\D\5;D\L\D\6;D\L\D\7;D\L\D\8;D\L\DA\1;D\L\DA\2;D\L\DA\3;D\L\I;D\L\IN;D\L\L\1;D\L\L\2;D\L\L\3;D\L\L\3\B;D\L\L\4;D\L\L\5;D\L\LI\1;D\L\LI\2;D\L\LI\3;D\L\LI\4;D\L\LI\5;D\L\LI\6;D\L\LI\7;D\L\M;D\L\MI;D\L\N\1;D\L\N\2;D\L\N\3;D\L\N\4;D\L\N\5;D\L\N\6;D\L\N\7;D\L\N\8;D\L\N\9;D\L\NV\123;D\L\NV\123\PreNRM\Win2K;D\L\NV\123\PreNRM\WinXP;D\L\NV\16x;D\L\NV\4a;D\L\NV\4i;D\L\NV\4x0;D\L\NV\pro;D\L\O\1;D\L\O\2;D\L\O\3;D\L\O\4;D\L\O\5;D\L\O\6;D\L\O\7;D\L\O\8;D\L\R\1;D\L\R\2;D\L\S\1;D\L\S\2;D\L\SM\1;D\L\SM\2;D\L\SM\3;D\L\SM\4;D\L\SM\5;D\L\SM\6;D\L\SM\7;D\L\SM\8;D\L\SM\9;D\L\SM\A;D\L\SU\1;D\L\SU\2;D\L\SU\3;D\L\SU\4;D\L\SU\5;D\L\SU\6;D\L\SU\7;D\L\SU\8;D\L\SU\9;D\L\SU\A;D\L\SU\B;D\L\T;D\L\TR\2;D\L\TR\3;D\L\U\1;D\L\U\2;D\L\U\3;D\L\U\4;D\L\U\5;D\L\V\1;D\L\V\2;D\L\V\3;D\L\X;D\M\3\1;D\M\3\2;D\M\3\3;D\M\A\1;D\M\A\2;D\M\A\3;D\M\A\4;D\M\A\5;D\M\A\6;D\M\A\7;D\M\A\8;D\M\AD\1;D\M\AD\2;D\M\AD\3;D\M\AD\4;D\M\AD\5;D\M\AD\6;D\M\AD\6\C;D\M\AD\7;D\M\AD\8;D\M\AD\9;D\M\AD\A;D\M\AM;D\M\AR;D\M\AT;D\M\AU\1;D\M\AU\2;D\M\AU\3;D\M\AU\4;D\M\AU\5;D\M\D;D\M\H\1;D\M\H\1\R;D\M\H\2;D\M\H\3;D\M\H\4;D\M\H\5;D\M\H\6;D\M\H\7;D\M\H\8;D\M\I\1;D\M\I\2;D\M\IN\1;D\M\IN\2;D\M\IT;D\M\J;D\M\L\1;D\M\L\2;D\M\L\3;D\M\L\4;D\M\N\123;D\M\N\4A;D\M\N\4AR;D\M\N\4I;D\M\N\4IR;D\M\P\1;D\M\P\2;D\M\P\2\A;D\M\P\3;D\M\P\4;D\M\P\5;D\M\P\6;D\M\P\7;D\M\P\8;D\M\Q\1;D\M\Q\2;D\M\Q\3;D\M\Q\4;D\M\S\1;D\M\S\2;D\M\S\3;D\M\S\4;D\M\S\5;D\M\S\5\A;D\M\S\6;D\M\S\7;D\M\S\8;D\M\S\9;D\M\S\A;D\M\S\B;D\M\S\C;D\M\SI\1;D\M\SI\2;D\M\SI\3;D\M\V\1;D\M\V\2;D\M\VM;D\S\A;D\S\AV;D\S\C\1;D\S\C\2;D\S\C\3;D\S\CI\F\1;D\S\CO\G\1;D\S\CO\G\2;D\S\CR\1;D\S\CR\2;D\S\CR\3\Win2k_xp;D\S\CR\4;D\S\CR\5;D\S\CR\6;D\S\H\1;D\S\H\2;D\S\H\3;D\S\M\1;D\S\M\2;D\S\M\3;D\S\M\4;D\S\M\5;D\S\M\6;D\S\M\7;D\S\M\8;D\S\M\9;D\S\M\A;D\S\M\B;D\S\M\C;D\S\M\D;D\S\N;D\S\R\1;D\S\R\2;D\S\R\3;D\S\S;D\S\S\D\1;D\S\S\D\2;D\S\S\F\1;D\S\S\F\2;D\S\S\P;D\S\S\S;D\S\S\U;D\S\SC;D\S\SI\1;D\S\SI\2;D\S\SM\A\1;D\S\SM\A\2;D\S\SM\A\3;D\S\SM\A\4;D\S\SM\A\5;D\S\SM\A\6;D\S\SM\A\7;D\S\SM\A\8;D\S\SM\C\1;D\S\SM\C\2;D\S\SM\D\1;D\S\SM\D\2;D\S\SM\E;D\S\SM\G\1;D\S\SM\G\2;D\S\SM\G\3;D\S\SM\G\4;D\S\SM\G\5;D\S\SM\G\6;D\S\SM\G\7;D\S\SM\H\1;D\S\SM\H\2;D\S\SM\H\3;D\S\SM\H\4;D\S\SM\I\1;D\S\SM\I\2;D\S\SM\IN;D\S\SM\S;D\S\T\1;D\S\T\2;D\S\T\3;D\S\T\4;D\S\T\5;D\S\T\6;D\S\TR;D\S\V\1;D\S\V\2;D\S\Y\1;D\S\Y\2;D\S\Y\3;D\W\3\1;D\W\3\2;D\W\3\3;D\W\3\4;D\W\3\5;D\W\3\6;D\W\3\7;D\W\A;D\W\AI\1;D\W\AI\2;D\W\AS;D\W\AT\H;D\W\AT\I;D\W\AV;D\W\B\1;D\W\B\2;D\W\B\3;D\W\B\4;D\W\B\5;D\W\B\5\3;D\W\B\6;D\W\B\7;D\W\B\8;D\W\B\9;D\W\B\A;D\W\BL\1;D\W\BL\2;D\W\BL\3;D\W\BL\4;D\W\BL\5;D\W\BL\6;D\W\BL\7;D\W\BL\8;D\W\BL\9;D\W\BR;D\W\BR\A;D\W\BR\D;D\W\BU\1;D\W\BU\2;D\W\BU\4;D\W\BU\5;D\W\BU\7;D\W\BU\8;D\W\BU\9;D\W\BU\A;D\W\C\1;D\W\C\2;D\W\CO\1;D\W\CO\2;D\W\CO\3;D\W\CO\4;D\W\CO\5;D\W\CO\6;D\W\CR\1;D\W\CR\2;D\W\CR\3;D\W\CR\4;D\W\D\1;D\W\D\2;D\W\D\2\A;D\W\D\2\D;D\W\D\2\E;D\W\D\2\F;D\W\D\3;D\W\D\3\C;D\W\D\3\D;D\W\D\3\E;D\W\D\4;D\W\D\4\K;D\W\D\4\L;D\W\D\4\M;D\W\D\4\P;D\W\D\5;D\W\D\6;D\W\D\7;D\W\D\8;D\W\D\9;D\W\D\A;D\W\D\B;D\W\D\B\B;D\W\D\C;D\W\D\C\C;D\W\D\D;D\W\D\D\B;D\W\D\E;D\W\D\E\B;D\W\D\E\C;D\W\DE;D\W\E\1;D\W\E\2;D\W\E\3;D\W\E\4;D\W\E\5;D\W\E\6;D\W\E\7;D\W\E\8;D\W\E\9;D\W\E\A;D\W\E\B;D\W\E\C;D\W\E\D;D\W\E\E;D\W\E\F;D\W\E\G;D\W\E\H;D\W\E\I;D\W\E\J;D\W\EN\1;D\W\EN\2;D\W\G\1;D\W\G\2;D\W\I\1;D\W\I\2;D\W\I\3;D\W\I\4;D\W\I\5;D\W\I\6;D\W\L\1;D\W\L\2;D\W\L\3;D\W\L\3\2;D\W\L\4;D\W\L\5;D\W\L\6\3;D\W\L\6\A;D\W\L\7;D\W\L\8;D\W\L\9;D\W\L\9\2;D\W\L\A;D\W\L\B;D\W\L\C;D\W\L\C\2;D\W\L\C\26;D\W\L\C\3;D\W\L\C\4;D\W\L\C\A;D\W\L\D;D\W\L\E;D\W\L\E\4;D\W\L\E\A;D\W\L\F;D\W\LI\1;D\W\LI\2;D\W\LI\3;D\W\LI\3\2;D\W\LI\4;D\W\LI\5;D\W\LI\6\3;D\W\LI\6\A;D\W\LI\7;D\W\LI\8;D\W\LI\9;D\W\LI\9\2;D\W\LI\A;D\W\LI\B;D\W\LI\C;D\W\LI\C\2;D\W\LI\C\26;D\W\LI\C\3;D\W\LI\C\4;D\W\LI\C\A;D\W\LI\D;D\W\LI\E;D\W\LI\E\4;D\W\LI\E\A;D\W\LI\F;D\W\M;D\W\MI;D\W\MIN\1;D\W\MIN\2;D\W\N\1;D\W\N\2;D\W\N\3;D\W\N\4;D\W\N\4\3;D\W\N\5;D\W\N\6;D\W\N\7;D\W\N\8;D\W\O\1;D\W\O\2;D\W\O\3;D\W\O\4;D\W\P;D\W\R\1;D\W\R\2;D\W\RE\1;D\W\RE\2;D\W\RE\3;D\W\S\1;D\W\S\2;D\W\S\3;D\W\S\4;D\W\SE\1;D\W\SE\2;D\W\SE\3;D\W\SE\4;D\W\SE\5;D\W\SI\1;D\W\SI\2;D\W\SI\2\U;D\W\SI\3;D\W\SI\3\U;D\W\SIT\1;D\W\SIT\2;D\W\SIT\3;D\W\SIT\4;D\W\SIT\5;D\W\SIT\6;D\W\SIT\7;D\W\SIT\8;D\W\SIT\9;D\W\SIT\A;D\W\SIT\B;D\W\SIT\C;D\W\SIT\D;D\W\SM\1;D\W\SM\2;D\W\SM\3;D\W\SM\4;D\W\SM\5;D\W\SM\6;D\W\SM\7;D\W\SM\7\WINXP;D\W\SM\8;D\W\SM\9;D\W\SM\A;D\W\SM\B;D\W\SM\C;D\W\SM\C\2;D\W\SM\D;D\W\SU\1;D\W\SU\2;D\W\SU\3;D\W\SU\4;D\W\SU\5;D\W\SU\6;D\W\SU\7;D\W\SU\8;D\W\SU\9;D\W\SU\A;D\W\SU\B;D\W\SU\C;D\W\SU\D;D\W\SU\E;D\W\SU\G;D\W\SU\H;D\W\SU\I;D\W\U\1;D\W\U\2;D\W\U\3;D\W\U\4;D\W\U\5;D\W\U\6;D\W\X\1;D\W\X\2;D\W\X\3;D\W\X\4;D\W\X\5;D\W\X\6;D\W\X\7;D\W\Z\2;D\W\Z\3;D\W\Z\4"
UnattendMode=FullUnattended
OemSkipEula=Yes
TargetPath=\WINDOWS
Repartition=Yes
UnattendSwitch="yes"
WaitForReboot="No"
KeyboardLayout="United Kingdom"
[GuiUnattended]
Arguments = "/Q /C START /MIN /HIGH %SystemDrive%\D\BTS_DPs_M3.cmd"
DetachedProgram = "CMD.exe"
AdminPassword="xxxxxxx"
EncryptedAdminPassword=NO
AutoLogon=Yes
AutoLogonCount=1
OEMSkipRegional=1
TimeZone=85
OemSkipWelcome=1
[userData]
ProductKey=xxxxx-xxxxx-xxxxx-xxxxx-xxxxx
FullName="User"
OrgName="N/A"
ComputerName=MYPC
[Display]
BitsPerPel=32
Xresolution=1024
YResolution=768
Vrefresh=85
[TapiLocation]
CountryCode=44
[RegionalSettings]
LanguageGroup=1
SystemLocale=00000809
UserLocale=00000809
InputLocale=0809:00000809
[branding]
BrandIEUsingUnattended=Yes
Home_Page=xxxxxxxxxxxxxxxxxxxxx
AllowedSites=http://xxxxxxxxxxxxxx;http://xxxxxxxxxxxxxx
0 -
[quote name='marko2002' date='Aug 1 2005, 02:08 AM']As an after thought, the install switch for Ad-Aware SE Professional 1.06 is simply . . .
[quote]"%systemdrive%\Install\AdAware\AdAwarePro1.06.exe" /SILENT[/quote]
Therefore I guess you could install the app using the above line, then run the update using . . .
[quote]C:\PROGRA~1\Lavasoft\AD-AWA~1\Ad-Aware.exe +update +auto[/quote]I'm trying this myself to see if this will work, will re-post my findings!
Cheers
[right][post="363944"]<{POST_SNAPBACK}>[/post][/right][/quote]
Hmm - does fine with the install and will actually execute Ad-Aware and attempt to update it, though it prompts you when asking 'Do you want to check for updates!!'. Even pressing yes then fails with an error explaining it can't connect to Lavasoft, guess it must be something to do with the fact that Windows isn't fully loaded at this stage.
Only other option is to basically install using the above switch, then create a batch file (for the Admin) and integrate this into the Startup folder on the installation files. Please correct me if anyone else can think of anything!
Cheers
Marko0 -
I think you can leave your product key empty so it will ask for it later (not during the install) I remember reading something about that long ago.
** EDIT ** I think it is related to sysprep... old memory...
For the computer name, you can leave a * which will result in a random generated name based on the Organisation Name...
I tried using this method a while ago myself, and although it does produce a rather annoying error message (using WINNT.SIF) it still does allow you to carry on and enter the required info.
0 -
In that case, he should put the winnt.sif file on a floppy disk...
I'm sure we'd all be most grateful for a little more info regarding the process
0 -
I think the guy actually means inserting the PC name/key 'BEFORE' the installation process starts rather than half way through the process!. Would be nice to have such a facility.
0 -
As an after thought, the install switch for Ad-Aware SE Professional 1.06 is simply . . .
[quote]"%systemdrive%\Install\AdAware\AdAwarePro1.06.exe" /SILENT[/quote]Therefore I guess you could install the app using the above line, then run the update using . . .
[quote]C:\PROGRA~1\Lavasoft\AD-AWA~1\Ad-Aware.exe +update +auto[/quote]
I'm trying this myself to see if this will work, will re-post my findings!
Cheers0 -
Guys, these are the switches I use ONCE the app is installed to automatically start, update, scan and delete all traces of spyware, though I guess with a little thought it's possible to install it and then run the below command though for my purposes I would only be interested in the program updating itself rather than performing a scan which would involve using only the "+update" command. To have the program update itself and then exit immediately you would use both the "+update +auto" command.
Initialise, Auto Update Definitions, Full Scan, Exit
[quote]C:\PROGRA~1\Lavasoft\AD-AWA~1\Ad-Aware.exe /full +update -mru +archives +auto[/quote]
Hope this helps
Marko0 -
for use .reg , you must use :
regedit /s YourRegFile.reg
the "reg" allow to add/remove/edit directly a registry value.
the "/s" allow silent way.
Goodbye.
Ask and you shall receive!!!!!
Sonic, many many thanks for this m8 - works like a charm and thanks too riverrm for the info.
0 -
Hi Guys, this is my first post on this fantastic forum so be gentle!
Strangely enough, I'm on XP and having exactly the same issue myself - that is my RegTweaks.reg file doesn't seem to automatically run, though when I run this once logged in it's fine (with the obvious exception of the regtweaks which need to be run from cmdlines.txt).
My cmdlines.txt is . . .
[COMMANDS]"REGEDIT32.EXE /S RegTweaks.reg"".\RunOnceEx.cmd"
"BTS_DPs_ROE.cmd"
. . . and the RegTweaks.reg file is in the $OEM$ folder along with the cmdlines.txt file.
Any idea's anyone?????
Cheers
Marko
0
Unattended Install OS tweaks Question:edit
in Unattended Windows 2000/XP/2003
Posted
For most tweaks, this can be done via a reg file built into your unattended installation - more info on this can be found at this thread: http://www.msfn.org/board/index.php?showtopic=66127 although for changing the screen res I know the pain I had trying to figure this one out, though eventually came across a great util file called 1365VidChng.exe (zipped and attached to this post) which when placed in your "XPCD\$OEM$\$$\System32" folder can be executed from your "RunOnce" file using the command "1365VidChng.exe 1024x768x16@1 -q". You obviously change the values 1024x768 to your preferred res and the last figure, 16, determines your colour depth. I've used this for a while now and it has always worked spot on every time.
1365VidChng.zip