
edg21
Content Type
Profiles
Forums
Events
Posts posted by edg21
-
-
netfx.msi:
start /wait %systemdrive%\install\NetFramework\netfx.msi /QB
my hotfix install:
echo Installing MS Hotfixes....This might take awhile...
start /wait %systemdrive%\install\hotfix\js56nen.exe /Q:A /R:N
start /wait %systemdrive%\install\hotfix\Q323255.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q328310.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q329048.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q329115.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q329170.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q329390.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q329441.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q329834.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\q330994.exe /Q:A /R:N
start /wait %systemdrive%\install\hotfix\Q331953.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q810565.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q810577.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q810833.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q811493.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q811630.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q817287.EXE /Q:A /R:N
start /wait %systemdrive%\install\hotfix\Q817606.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\q822925.EXE /Q:A /R:N
start /wait %systemdrive%\install\hotfix\KB819639.exe /Q:A /R:N
start /wait %systemdrive%\install\hotfix\KB821557.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\KB823559.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q814033.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q815021.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\Q823718.exe /C:"dahotfix.exe /q /n" /q
start /wait %systemdrive%\install\hotfix\KB824105.exe /Q /M /Z
start /wait %systemdrive%\install\hotfix\KB824146.exe /Q /M /Z0 -
I'm not sure about how you would go about doing that, however you would eventually run into problems on your network because it's only a matter of time before it randomly chooses the same name.
0 -
why not just assign the association of .nfo files to notepad? Thats what i do
Yep
Associate with notepad & change font to terminal size 9.
0 -
huh???? why is it spamming, if i remember rightly you told us all about the wonderfull :excited: inf method in my topic, just repaying the favour...lol...
and will you stop telling everyone your way is easier, that is what i meant before about you leading people over to your way, that is the difference between me and you, i let people decide, you dictate...........
Someone sounds bitter
I personally still use batch files to install everything because I'm lazy. My way is the easiest for me. Both your ways are great, but does it really matter what your UNATTENDED install looks like? You're not gunna be there watching it when you use it are you? lol
0 -
Thats Good To Hear As I've Been Using Longhorn 4015 For Quite Sometime Now, No New Versions Of It ?
Though 4029 was most recent.... not sure though.
0 -
I just didn't like how you assumed that I didn't know the difference between a virus & a trojan because I didnt' agree with you. No hard feelings
0 -
XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W]
[/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U]
[/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z]
[/EXCLUDE:file1[+file2][+file3]...]
source Specifies the file(s) to copy.
destination Specifies the location and/or name of new files.
/A Copies only files with the archive attribute set,
doesn't change the attribute.
/M Copies only files with the archive attribute set,
turns off the archive attribute.
/D:m-d-y Copies files changed on or after the specified date.
If no date is given, copies only those files whose
source time is newer than the destination time.
/EXCLUDE:file1[+file2][+file3]...
Specifies a list of files containing strings. Each string
should be in a separate line in the files. When any of the
strings match any part of the absolute path of the file to be
copied, that file will be excluded from being copied. For
example, specifying a string like \obj\ or .obj will exclude
all files underneath the directory obj or all files with the
.obj extension respectively.
/P Prompts you before creating each destination file.
/S Copies directories and subdirectories except empty ones.
/E Copies directories and subdirectories, including empty ones.
Same as /S /E. May be used to modify /T.
/V Verifies each new file.
/W Prompts you to press a key before copying.
/C Continues copying even if errors occur.
/I If destination does not exist and copying more than one file,
assumes that destination must be a directory.
/Q Does not display file names while copying.
/F Displays full source and destination file names while copying.
/L Displays files that would be copied.
/G Allows the copying of encrypted files to destination that does
not support encryption.
/H Copies hidden and system files also.
/R Overwrites read-only files.
/T Creates directory structure, but does not copy files. Does not
include empty directories or subdirectories. /T /E includes
empty directories and subdirectories.
/U Copies only files that already exist in destination.
/K Copies attributes. Normal Xcopy will reset read-only attributes.
/N Copies using the generated short names.
/O Copies file ownership and ACL information.
/X Copies file audit settings (implies /O).
/Y Suppresses prompting to confirm you want to overwrite an
existing destination file.
/-Y Causes prompting to confirm you want to overwrite an
existing destination file.
/Z Copies networked files in restartable mode.
The switch /Y may be preset in the COPYCMD environment variable.
This may be overridden with /-Y on the command line.0 -
Firewalls do not help you from stop from getting viruses. Common sense does.
First off you could have a Trojan on your pc that sends information out to the owner of the Trojan. XP firewall DOES NOT stop any information being sent out. That makes a firewall good.
Also Norton does not detect all Trojans. In fact it's one of the worse to detect Trojans. If you do not know Trojans and viruses are 2 different items.
Also XP does not stop DDOS attacks, meaning it does not make you stealth. You may be shown stealth but the attacker does get a response back from the XP firewall which tell the attacker you are there. Other firewalls such as mcafee and zone alarm do not send any response which lets the attacker move on.
I haven't had a firewall on my system for over a year. Have I received any viruses? Nope. That is because I use common sense and do not use the view feature in outlook or outlook express nor do i open any attachments or click links from e-mail I get from people I do not know.
You might want to start looking at firewalls and what they should and shouldn't do. BTW XP firewall effects other apps working properly on the net. If you haven't noticed you have just been lucky.
I'm not here to argue. It's your PC, I'm just stating the facts because security on the net is one of my primary jobs.
I'm aware of what a trojan is in comparison to a virus
I played around with sub7 in it's infancy
so yes... I know about trojans. I also know that I've had to fix plenty of clients computers because they thought they needed to add a firewall & ended up with screwed tcp/ip stacks and/or screwed winsock files. So I'm very aware of how they work & I still don't think they're needed in most situations.
0 -
well i honestly use neither firewall or anti virus programs now.. i never had a virus as i dont download file i dont know nor get them from suspicious looking sites
amen.
0 -
Everything else is now working OK just this **** ATI Control Panel left. Anyone managed it yet?
Here's my setup:
if exist %systemdrive%\windows\system32\atiddc.dll goto atiyes
goto atino
:ATIYES
ECHO.
ECHO Installing ATI Control Panel for Catalyst 3.7...
unrar x %systemdrive%\install\ati_cp37\ati_cp37.rar %systemdrive%\install\ati_cp37
start /wait %systemdrive%\install\ati_cp37\Setup.exe -s -f1"%systemdrive%\install\ati_cp37\setup.iss"
goto finish
:ATINO
goto finishsetup.iss =
[InstallShield Silent]
Version=v6.00.000
File=Response File
[File Transfer]
OverwrittenReadOnly=NoToAll
[{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-DlgOrder]
Dlg0={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdWelcome-0
Count=4
Dlg1={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdLicense-0
Dlg2={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdAskDestPath-0
Dlg3={0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdFinishReboot-0
[{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdWelcome-0]
Result=1
[{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdLicense-0]
Result=1
[{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdAskDestPath-0]
szDir=C:\Program Files\ATI Technologies\ATI Control Panel
Result=1
[Application]
Name=ATI Control Panel
Version=3.00.000
Company=ATI Technologies
Lang=0009
[{0BEDBD4E-2D34-47B5-9973-57E62B29307C}-SdFinishReboot-0]
Result=1
BootOption=00 -
XP firewall was thrown out with the first test. As quoted on Screensavers "It's a piece of junk".
Hmmm... I didn't get blaster or <insert virus name here> so I don't see how it's a piece of junk. I just installed NAV2k4 a couple days ago (haven't had a virus scanner for about 6 months) & it says my system is clean. Tell me... how is that junk? I can see how some people would like being able to have control over what goes in/out of their computer, but the fact is that in most cases it's just not needed. The built in XP firewall works just fine. And my norton is currently shutdown... because I don't need it. I don't d/l bulls*** from random places, nor do I open emails from people I don't know.
0 -
I was reading somewhere that you are allowed to install 1 copy of Office XP on up to 2 computers such as a desktop and laptop. Does anyone know if this is true? Thanks.
They're not gunna break down your door if you install it on multiple computers in your house
If that's what your concerned about.
0 -
0
-
Personally, I've found that the built in XP firewall along with a up to date virus scanner such as NAV prevent almost all virus/trojan infections. I download in excess of 2gb a day from various sources & I haven't had a virus in over 2 years. The chances of someone using a uncrecognized trojan/virus on you are pretty slim. I suggest firewalls to people who are paranoid/ignorant of how computers work. ie: Joe Bob downloading anything & everything from Kazaa that has Britney or Christina's name on it
0 -
I have seen that others here install and then kill the process once the actual install is over. I prefer the simple method: I just copy all the winamp files and shortcuts to the target machine, then run a .reg file for creating the file associations. All winamp settings are in it's .ini file. (I wish they were all like this ...)
Would you mind posting said reg file? Right now my batch sets the file associations via cmd line...
0 -
Are there certain specifics to follow when burning this type of cd?
Not in particular
Just burn the ISO or BIN/CUE you have & that should be about it.
0 -
Honestly... re-check your file/directory structure, cause if it's as you say it should work just fine.
0 -
If you think the problem is the cd, then maybe you just burn another one & try it
0 -
You could write a batch file to copy the folder over the network to another location & then schedule it to run in task scheduler every 8hrs or something like that, depending on how often you wanted it backed up.
0 -
The following batch file snippet displays a simple menu (without a question-mark at the end of the prompt) and prompts for the users choice, defaulting to option 2 after 5 seconds :
@ECHO OFF
ECHO 1. MS-DOS Editor.
ECHO 2. MS-Windows. (default)
ECHO 3. Defrag the hard-drive.
ECHO 4. Quit.
CHOICE /C:1234 /N /T:2,5 Please choose a menu option.
IF ERRORLEVEL == 4 GOTO QUIT_MENU
IF ERRORLEVEL == 3 GOTO DEFRAG_HD
IF ERRORLEVEL == 2 GOTO RUN_WIN
IF ERRORLEVEL == 1 GOTO RUN_EDIT
:RUN_EDIT
CALL EDIT
:RUN_WIN
CALL WIN
:DEFRAG_HD
DEFRAG c:
:QUIT_MENUcredit: http://www.cs.ntu.edu.au/homepages/bea/hom...escription.html
0 -
That's good news edg21. Let me ask a couple of questions: Is your Remote Connection made from the dial-up to a static IP, or is it possible to go from a static IP to a dial-up, or even dial-up to dial-up?
I think you are saying that you need your dial-up ISP to be a "Dynamic DNS provider." Then the provider would have the means to provide the equivalent of an IP.
Man, am I learning a lot on this forum!
ardi
It does not matter if you are connecting to your pc via dialup or an always on connection. What does matter is that if the computer you are attempting to connect to uses a dymanic IP you will need to know the new ip everytime it updates. In order to make things easier you would use a dynamic DNS provider such as the ones listed at the bottom of this thread. Read up a bit on those sites & you'll find yourself setup & ready to go in no time.
0 -
Yes, remote desktop will work via a dialup connection, however you will need to know the IP of the computer you are trying to connect to. Since Dialup is almost always a dynamic IP you can use one of the several Dynamic DNS providers on the internet to associate the IP with a name which will be much easier to remember
I use remote desktop on a daily basis & it works great.
0 -
In the next update I won't be providing empty ISOs any longer, nor will I suggest to use WinISO or UltraISO due to the way it badly handles ISO Images.
I've always just opened the empty ISO and added files, I never "update" an ISO, I always just make a new one, and I haven't had any problems.
0 -
Try looking here: http://MSFN.org/unattended
0
random computer name(s)
in Unattended Windows 2000/XP/2003
Posted
Wow, I didn't know it did that. I know if you set it yourself manually & there is another comp on the network with the same name it just does it & then bitches about it later.