Jump to content

edg21

Member
  • Posts

    196
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Posts posted by edg21

  1. If windows sets a computer name that is already on the network, then one will automatically be generated using the owner name entered, and some random numbers.

    Wow, I didn't know it did that. I know if you set it yourself manually & there is another comp on the network with the same name it just does it & then bitches about it later.

  2. netfx.msi:

    start /wait %systemdrive%\install\NetFramework\netfx.msi /QB

    my hotfix install:

    echo Installing MS Hotfixes....This might take awhile...
    start /wait %systemdrive%\install\hotfix\js56nen.exe /Q:A /R:N
    start /wait %systemdrive%\install\hotfix\Q323255.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q328310.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q329048.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q329115.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q329170.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q329390.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q329441.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q329834.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\q330994.exe /Q:A /R:N
    start /wait %systemdrive%\install\hotfix\Q331953.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q810565.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q810577.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q810833.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q811493.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q811630.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q817287.EXE /Q:A /R:N
    start /wait %systemdrive%\install\hotfix\Q817606.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\q822925.EXE /Q:A /R:N
    start /wait %systemdrive%\install\hotfix\KB819639.exe /Q:A /R:N
    start /wait %systemdrive%\install\hotfix\KB821557.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\KB823559.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q814033.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q815021.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\Q823718.exe /C:"dahotfix.exe /q /n" /q
    start /wait %systemdrive%\install\hotfix\KB824105.exe /Q /M /Z
    start /wait %systemdrive%\install\hotfix\KB824146.exe /Q /M /Z

  3. huh???? why is it spamming, if i remember rightly you told us all about the wonderfull :excited:  inf method in my topic, just repaying the favour...lol...

    and will you stop telling everyone your way is easier, that is what i meant before about you leading people over to your way, that is the difference between me and you, i let people decide, you dictate...........

    Someone sounds bitter :) I personally still use batch files to install everything because I'm lazy. My way is the easiest for me. Both your ways are great, but does it really matter what your UNATTENDED install looks like? You're not gunna be there watching it when you use it are you? lol

  4. XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W]
                              [/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U]
                              [/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z]
                              [/EXCLUDE:file1[+file2][+file3]...]

     source       Specifies the file(s) to copy.
     destination  Specifies the location and/or name of new files.
     /A           Copies only files with the archive attribute set,
                  doesn't change the attribute.
     /M           Copies only files with the archive attribute set,
                  turns off the archive attribute.
     /D:m-d-y     Copies files changed on or after the specified date.
                  If no date is given, copies only those files whose
                  source time is newer than the destination time.
     /EXCLUDE:file1[+file2][+file3]...
                  Specifies a list of files containing strings.  Each string
                  should be in a separate line in the files.  When any of the
                  strings match any part of the absolute path of the file to be
                  copied, that file will be excluded from being copied.  For
                  example, specifying a string like \obj\ or .obj will exclude
                  all files underneath the directory obj or all files with the
                  .obj extension respectively.
     /P           Prompts you before creating each destination file.
     /S           Copies directories and subdirectories except empty ones.
     /E           Copies directories and subdirectories, including empty ones.
                  Same as /S /E. May be used to modify /T.
     /V           Verifies each new file.
     /W           Prompts you to press a key before copying.
     /C           Continues copying even if errors occur.
     /I           If destination does not exist and copying more than one file,
                  assumes that destination must be a directory.
     /Q           Does not display file names while copying.
     /F           Displays full source and destination file names while copying.
     /L           Displays files that would be copied.
     /G           Allows the copying of encrypted files to destination that does
                  not support encryption.
     /H           Copies hidden and system files also.
     /R           Overwrites read-only files.
     /T           Creates directory structure, but does not copy files. Does not
                  include empty directories or subdirectories. /T /E includes
                  empty directories and subdirectories.
     /U           Copies only files that already exist in destination.
     /K           Copies attributes. Normal Xcopy will reset read-only attributes.
     /N           Copies using the generated short names.
     /O           Copies file ownership and ACL information.
     /X           Copies file audit settings (implies /O).
     /Y           Suppresses prompting to confirm you want to overwrite an
                  existing destination file.
     /-Y          Causes prompting to confirm you want to overwrite an
                  existing destination file.
     /Z           Copies networked files in restartable mode.

    The switch /Y may be preset in the COPYCMD environment variable.
    This may be overridden with /-Y on the command line.

  5. Firewalls do not help you from stop from getting viruses. Common sense does.

    First off you could have a Trojan on your pc that sends information out to the owner of the Trojan. XP firewall DOES NOT stop any information being sent out. That makes a firewall good.

    Also Norton does not detect all Trojans. In fact it's one of the worse to detect Trojans. If you do not know Trojans and viruses are 2 different items.

    Also XP does not stop DDOS attacks, meaning it does not make you stealth. You may be shown stealth but the attacker does get a response back from the XP firewall which tell the attacker you are there. Other firewalls such as mcafee and zone alarm do not send any response which lets the attacker move on.

    I haven't had a firewall on my system for over a year. Have I received any viruses? Nope. That is because I use common sense and do not use the view feature in outlook or outlook express nor do i open any attachments or click links from e-mail I get from people I do not know.

    You might want to start looking at firewalls and what they should and shouldn't do. BTW XP firewall effects other apps working properly on the net. If you haven't noticed you have just been lucky.

    I'm not here to argue. It's your PC, I'm just stating the facts because security on the net is one of my primary jobs.

    I'm aware of what a trojan is in comparison to a virus :rolleyes: I played around with sub7 in it's infancy :) so yes... I know about trojans. I also know that I've had to fix plenty of clients computers because they thought they needed to add a firewall & ended up with screwed tcp/ip stacks and/or screwed winsock files. So I'm very aware of how they work & I still don't think they're needed in most situations.

  6. Everything else is now working OK just this **** ATI Control Panel left.  Anyone managed it yet?

    Here's my setup:

    if exist %systemdrive%\windows\system32\atiddc.dll goto atiyes
    goto atino

    :ATIYES
    ECHO.
    ECHO Installing ATI Control Panel for Catalyst 3.7...
    unrar x %systemdrive%\install\ati_cp37\ati_cp37.rar %systemdrive%\install\ati_cp37
    start /wait %systemdrive%\install\ati_cp37\Setup.exe -s -f1"%systemdrive%\install\ati_cp37\setup.iss"
    goto finish

    :ATINO
    goto finish

    setup.iss =

    [InstallShield Silent]
    Version=v6.00.000
    File=Response File
    [File Transfer]
    OverwrittenReadOnly=NoToAll
    [{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-DlgOrder]
    Dlg0={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdWelcome-0
    Count=4
    Dlg1={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdLicense-0
    Dlg2={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdAskDestPath-0
    Dlg3={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdFinishReboot-0
    [{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdWelcome-0]
    Result=1
    [{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdLicense-0]
    Result=1
    [{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdAskDestPath-0]
    szDir=C:\Program Files\ATI Technologies\ATI Control Panel
    Result=1
    [Application]
    Name=ATI Control Panel
    Version=3.00.000
    Company=ATI Technologies
    Lang=0009
    [{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdFinishReboot-0]
    Result=1
    BootOption=0

  7. XP firewall was thrown out with the first test. As quoted on Screensavers "It's a piece of junk".

    Hmmm... I didn't get blaster or <insert virus name here> so I don't see how it's a piece of junk. I just installed NAV2k4 a couple days ago (haven't had a virus scanner for about 6 months) & it says my system is clean. Tell me... how is that junk? I can see how some people would like being able to have control over what goes in/out of their computer, but the fact is that in most cases it's just not needed. The built in XP firewall works just fine. And my norton is currently shutdown... because I don't need it. I don't d/l bulls*** from random places, nor do I open emails from people I don't know.

  8. I was reading somewhere that you are allowed to install 1 copy of Office XP on up to 2 computers such as a desktop and laptop.  Does anyone know if this is true?  Thanks.

    They're not gunna break down your door if you install it on multiple computers in your house :) If that's what your concerned about.

  9. Personally, I've found that the built in XP firewall along with a up to date virus scanner such as NAV prevent almost all virus/trojan infections. I download in excess of 2gb a day from various sources & I haven't had a virus in over 2 years. The chances of someone using a uncrecognized trojan/virus on you are pretty slim. I suggest firewalls to people who are paranoid/ignorant of how computers work. ie: Joe Bob downloading anything & everything from Kazaa that has Britney or Christina's name on it :)

  10. I have seen that others here install and then kill the process once the actual install is over. I prefer the simple method: I just copy all the winamp files and shortcuts to the target machine, then run a .reg file for creating the file associations. All winamp settings are in it's .ini file. (I wish they were all like this ...)

    Would you mind posting said reg file? Right now my batch sets the file associations via cmd line...

  11. The following batch file snippet displays a simple menu (without a question-mark at the end of the prompt) and prompts for the users choice, defaulting to option 2 after 5 seconds :

    @ECHO OFF
    ECHO 1. MS-DOS Editor.
    ECHO 2. MS-Windows. (default)
    ECHO 3. Defrag the hard-drive.
    ECHO 4. Quit.
    CHOICE /C:1234 /N /T:2,5 Please choose a menu option.
    IF ERRORLEVEL == 4 GOTO QUIT_MENU
    IF ERRORLEVEL == 3 GOTO DEFRAG_HD
    IF ERRORLEVEL == 2 GOTO RUN_WIN
    IF ERRORLEVEL == 1 GOTO RUN_EDIT
    :RUN_EDIT
    CALL EDIT
    :RUN_WIN
    CALL WIN
    :DEFRAG_HD
    DEFRAG c:
    :QUIT_MENU

    credit: http://www.cs.ntu.edu.au/homepages/bea/hom...escription.html

  12. That's good news edg21. Let me ask a couple of questions: Is your Remote Connection made from the dial-up to a static IP, or is it possible to go from a static IP to a dial-up, or even dial-up to dial-up?

    I think you are saying that you need your dial-up ISP to be a "Dynamic DNS provider." Then the provider would have the means to provide the equivalent of an IP.

    Man, am I learning a lot on this forum!

    ardi

    It does not matter if you are connecting to your pc via dialup or an always on connection. What does matter is that if the computer you are attempting to connect to uses a dymanic IP you will need to know the new ip everytime it updates. In order to make things easier you would use a dynamic DNS provider such as the ones listed at the bottom of this thread. Read up a bit on those sites & you'll find yourself setup & ready to go in no time.

    http://www.dyns.net

    http://www.dyndns.com

  13. Yes, remote desktop will work via a dialup connection, however you will need to know the IP of the computer you are trying to connect to. Since Dialup is almost always a dynamic IP you can use one of the several Dynamic DNS providers on the internet to associate the IP with a name which will be much easier to remember :) I use remote desktop on a daily basis & it works great.

×
×
  • Create New...