Jump to content

IcemanND

Patron
  • Posts

    3,252
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by IcemanND

  1. join the forum and send the email. then never visit again.
  2. Shouldn't even need to reset the accounts, just rejoin the machine to the existing account as is. Do it all the time.
  3. First thing I see is this: set docsfolder=%docsfolder:\chris.txt=% If you are after setting dodsfolder to say c:\chris.txt it should be set docsfolder=%docsfolder%:\chris.txt other wise it will stay being just the drive letter. Second I believe the way you are setting the environment variable, by adding it to the registry requires a reboot before it is available in any applications or command windows other than the original window it was created in.
  4. Imaging software options other than Ghost: http://www.msfn.org/board/index.php?showtopic=100299 Using Microsoft Windows PE: http://www.msfn.org/board/index.php?showtopic=101383
  5. Any of the script languages built into the OS (CMD, VB, etc.) will give you that ability along with many others. It all depends upon what you are comfortable with and what you want it to look like.
  6. It depends upon the manufacturer and the system. Most manufacturers provide some form of bootable media image you can create floppies or a bootable cd with to update the bios, some also have utilities that can be run from within windows to update the bios.
  7. From microsoft scriptcenter should list all computer in an OU, modify line 3 for you OU and domain Const ADS_SCOPE_SUBTREE = 2 'set ADLOOKUP value to your ORG and OU ADLOOKUP = "Select Name, Location from 'LDAP://OU=AA, DC=COMPANY, DC=com' " Set objConnection = CreateObject("ADODB.Connection") Set objCommand = CreateObject("ADODB.Command") objConnection.Provider = "ADsDSOObject" objConnection.Open "Active Directory Provider" Set objCOmmand.ActiveConnection = objConnection objCommand.CommandText = _ ADLOOKUP _ & "Where objectClass='computer'" objCommand.Properties("Page Size") = 1000 objCommand.Properties("Searchscope") = ADS_SCOPE_SUBTREE Set objRecordSet = objCommand.Execute objRecordSet.MoveFirst Do Until objRecordSet.EOF Wscript.Echo "Computer Name: " & objRecordSet.Fields("Name").Value Wscript.Echo "Location: " & objRecordSet.Fields("Location").Value objRecordSet.MoveNext Loop
  8. Well to just get the data you can install it as a secondary hard drive in another system and copy the data off. As far as getting it to work in your other system you will need an XP cd to do the repair. And even then sometimes it won't work when changing between processor brands.
  9. BartPE is a bootable (typically) cd based mini XP environment. You can get the builder app at http://nu2.nu/pebuilder/ Any cd that you can boot from and access the installed hard drive will work, you can do it from the XP recovery console also it just requires alot of typing.
  10. Not sure if it will help now or not. Your original issue with the windws\system32\config\system being corrupted is a registry issue. Easily fixed if you have not turned off system restore. You can do this from the XP recovery console, but it is easier from BartPE with some form of file explorer installed. Boot from BartPE, launch preferred file explorer. browse to c:\windows\system32\config create new directory called BACKUP copy files from current folder (CONFIG) to newly created BACKUP folder. Delete: default SAM SECURITY software system Open second file explorer. browse to "C:\System Volume Information" (it is a hidden system folder so you may need to change your view to see it) Inside will be a _restore{*} folder where * is a unique GUID Open this folder to see all of your available Restore point folders (RPxxx, where xxx is a number) find the last one created before you had the issue and open that folder, for example RP64, not the date and time stamp on the folder. Inside RP64 open the snapshot folder. from this folder copy: _REGISTRY_MACHINE_SAM _REGISTRY_MACHINE_SECURITY _REGISTRY_MACHINE_SOFTWARE _REGISTRY_MACHINE_SYSTEM _REGISTRY_USER_.DEFAULT to C:\windows\system32\config now in C:\windows\system32\config rename the above files: _REGISTRY_MACHINE_SAM to SAM _REGISTRY_MACHINE_SECURITY to SECURITY _REGISTRY_MACHINE_SOFTWARE to SOFTWARE _REGISTRY_MACHINE_SYSTEM to SYSTEM _REGISTRY_USER_.DEFAULT to .default This step is not mandatory, it depends upon if you had made changes to your system at the time the restore point was created that you want to revert also, I usually don't do this step. reboot the machine in safe mode and perform a system restore to the restore point you used the backup registry files from.
  11. MOVED. Could be any number of things, a service that is running under his credentials, a scheduled task set tu run under his creds, an dapplication that itself required a local/AD user account (like backup software).
  12. Add Repartition=Yes to [unattended] section of you Winnt.sif file.
  13. XP pro or Home? try this? Press CTRL-ALT-DEL bring up the Task Manager From File menu select New Task Enter Explorer.exe click ok if it finishes loading scan system for malware.
  14. First, is the example minus actual data what you really have? Because that is tab delimited not comma delimited. and how do you know if values 2/4/5/6 were not in the file?
  15. First you have to have at least one account on the machine. The rest of the accounts can be removed when logged in with an administrative account through the Users and groups console under computer management, just right click on the account to remove and select delete. Then you can go to the Users folder and delete the associated profile folder.
  16. http://www.msfn.org/board/index.php?showtopic=101383 http://www.msfn.org/board/index.php?showtopic=100299
  17. I didn't find them on any of the Vista disks I have.
  18. do you want to remove the profile of the user from the Users folder or are you after deleting the account entirely from the OS?
  19. Apparently he doesn't believe Microsoft's own documentation.
  20. HKCU only exists when the OS is running. You would need to add this to the appropriate user hive in HKU.
  21. Taking a guess something deleted or modified the userinit key in the registry. If you have a BartPE cd or WindowsPE cd you can boot from you can mount the problematic registry and restore the key then scan you machine for malware. the key is: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit And the value should be (including trailing comma): C:\windows\system32\userinit.exe,
  22. Warez discussion is prohibited. Check out rule number 1. http://www.msfn.org/board/index.php?showtopic=18408 CLOSED
  23. if it's missing userint.exe or the associated registry key he can't log into the machine, even in safe mode. He'll need to boot from other media or in another machine to fix that issue before you can do anything else, or perform a repair, may work but is a little extreme.
×
×
  • Create New...