Jump to content

gosh

Patron
  • Posts

    2,341
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by gosh

  1. Couldn't you just install the ftp service on your computer and configure the other computer to upload the backup to the ftp site on the internet? -gosh
  2. r-studio from r-tt.com is the best but itll set you back $100, or handy recovery. There's a free crappy version of handy recovery. You can get around the 1 file per day limitation by simply deleting the handy recovery registry key each time before you run it. But i look at data recovery like insurance. You probably spend hundreds, maybe thousands of dollars every year on car insurance, and yet unless you get into an accident you never get any value out of your money. For just $100 you can get the best data recovery program and can use it unlimited times. To me that's better than insurance. Spend the $100 for r-studio. -gosh
  3. Date/Time Posted 2007-12-03 20:14:27 (UTC) File en_windows_xp_service_pack_3_release_candidate_1_x86_60967.exe Self-Extracting Executable File Size 336 MB SHA-1 Hash a2ca583dedcd86837796111a632efa29a23f4cc0 Description Windows XP SP3 Release Candidate is a cumulative service pack that includes all previously released updates for Windows XP, including security updates, out-of-band releases, and hotfixes.
  4. It's a registry key: 763.250: DoInstallation:DoRegistryUpdates failed The section is ProductInstall.GlobalRegistryChanges.Install 763.250: DoRegistryUpdates:UpdSpInstallFromInfSection Failed for ProductInstall.GlobalRegistryChanges.Install error: 0x5 What is happening is an inf section is not able to update a registry key because access is denied. If you extract or run sp3 it should have an update folder. In this folder should be a 1 meg inf file such as update.inf. Open this inf and search for ProductInstall.GlobalRegistryChanges.Install. Under this section note what registry keys it mentions, and check the registry permissions for these keys. -gosh
  5. If you see it as a process in taskmgr it should say the logon account it is using. -gosh
  6. You are making the classic mistake thinking that if you experience a problem, then everyone must be experiencing the same problem - they're not. In that url you posted i only saw 1 other person than you experiencing this issue - the msft guy in that url didnt confirm it was a known issue. Like the msft guy said it might be a problem with your environment. -gosh
  7. sfc.dll is loaded on startup by winlogon.exe, you would have to edit winlogon i assume -gosh
  8. Windows xp had a known issue with 3rd party programs causing registry damage because they left the registry open when the computer was shutting down. The solution was the xp hive cleanup utility, i believe. It seems vista has the same issue. As cluberti elluded to, some 3rd party program you've installed is not compatible with vista. Check each program for updates and make sure it's compatible. -gosh
  9. saw this on http://blogs.technet.com/davidcervigon/arc...e-probarlo.aspx , thought it was funny -gosh
  10. Does system restore give the same error? It sounds like you have a problem with scripting, IE, user registry keys Reinstall IE run sfc /scannow Check registry permissions mentioned in that article talking about blank system restore screen install scripten.exe -gosh
  11. I think the second link doesn't work. I tried this in my server 2003 VM, seemed to slow things down a bit and didn't seem to work. I'll keep playing with it. -gosh
  12. 2 ways: 1 - Have script check for presence of this key, it's ONLy created when you boot into safe mode, it's deleted when you reboot. HKLM\System\CCS\Safeboot\Option\optionvalue=1 2 - Modify C:\WINDOWS\Web\safemode.htt , which is what you see on your desktop when you boot into safe mode. This is what causes you to get that prompt when you boot into safe mode. -gosh
  13. When you buy windows, you actually are buying the license to use the software, not the software itself. So just selling the product key should be legal. -gosh
  14. Why would you want sidebar on a server????? -gosh
  15. You could add many folders but that will add complexity, it's better just to put everything in the same folder. -gosh
  16. Uninstall device make sure it's not listed in device manager - if it is remove it, remove any unknown devices delete infcache.1 from windows\inf delete any oemXXX.inf files from windows\inf Delete setupapi.log in windows reinstall device/drivers if it doesn't work post your setupapi.log check for driver update with manufactor -gosh
  17. I was thinking recently, which character in the tv show "the office" would you be and why? I would be Dwight, because he's very smart and everyone likes him -gosh
  18. The end user would have to have that variable on there computer so i dont think that's gonna work. -gosh
  19. And can you write to that folder (permissions) -gosh
  20. Those came originally with Plus! Digital Media Edition i believe. I remember being able to use the dances on xp pro back in 2003. -gosh
  21. You probably didn't restart the computer or the tcpip service -gosh
  22. all that does is modify the registry key. You can't use it for an unattended install. -gosh
  23. Do you have a drive overlay? If you've used 3rd party disk software you probably have, such as maxblast. What happens if you use diskpart to create the partition? Have you used linux? It's something in the MBR or maybe a MBR virus causing the issue, i suspect a drive overlay. -gosh
  24. 34 min mark is hardware stage and basic presetup tasks. Why dont you post your setupact.log and setuplog.txt so we can give you a definite answer rather than guessing? -gosh
  25. MPS Reports MPS Reports are Microsoft Product Support reports. It is a tool used by Microsoft Support to gather more information about a problem computer. Typically MS support would have customer run the file, then email the resultant cab back to support. Then MS support would look through the cab for anything that might be related to the problem. MPS reports is also good when a new version of windows is launched to be able to find a bug. You can download MPS reports at microsoft download center http://www.microsoft.com/downloads/details...;DisplayLang=en Anytime a friend of mine has a computer problem i have him run this and send me the cab file. MPS reports doesn't include any passwords so it's harmless to send to people. Typically i would use MPS reports to see what is hooking into the explorer process, look at event viewer logs, and to get a general idea what software they are running. What mps reports is is basically a batch file that runs a bunch of command line tools and saves all output in a .cab file. These tools are very handy to have! Some might not be public. Download MPS reports and open it using winrar (right click on it > open with winrar) to see the command line files. Since the files can be redirected theyre great for scripting. Tools included Choice.exe Prompts user to make a choice, yes or no clusmps.exe Clusmps.exe --------- Created By Shon Hauck Utility to parse the cluster configuration and generate a detailed report. In order for this utility to work properly the cluster hive must be loaded under, HKLM as Cluster. Example, HKLM\Cluster The Cluster Reporting Tool will create a file called <ComputerName>_CLUSTER_MPS_INFORMATION.TXT The Computer Name is the local computer name on the server the utility is to be run. Example, (If the tool is going to be run on this system the file name will be: %computername%_CLUSTER_MPS_INFORMATION.TXT Usage: (Switches can be placed in any order.) ============================================= Clusmps.exe [/P:[Target Path]] [/G] [/D] /P Is the target location for the Report File /G Will add a GUID to Resource Name Table in the report /S Will dump out a list of all users for the privilages cluster needs to operate Example: Clusmps.exe "/P:C:\Report Folders\Cluster" /G /S NOTE: Do not include a \ at the end of your path. Follow the example above diskmap.exe Usage: diskmap.exe /d<drive#> [/h] /d<drive#> 'drive#' is the number of the physical drive to be checked. (Must be specified.) /h Hexidecimal output. (default is decimal) dumpel.exe DUMPEL Usage: dumpel -f file [-s \\server] [-l log [-m source]] [-e n1 n2 n3..] [-r] [-t] [-d x] -d <days> Filters for event last days (number larger than zero) -e nn Filters for event id nn (up to 10 may be specified) -f <filename> Output filename (default stdout) -l <name> Dumps the specified log (system, application, security) -b Dumps a backup file (use -l to specify file name) -m <name> Filters for events logged by name -r Filters out events logged by name (must use -m too) -s <servername> Remote to servername -t Use tab to separate strings (default is space) -c Use comma to separate fields -ns Do not output strings -format <fmt> Specify output format. Default format is dtTCISucs where t - time d - date T - event type C - event category I - event ID S - event source u - user c - computer s - strings DumpEVT.exe Microsoft ® Windows NT DumpEVT Usage: J:\Flats\Microsoft\Tools\MPS Reports\MPSRPT_PFE\bin\DumpEVT.exe PathtoStoreFiles -c (Optional Parameter to Clear Event Logs after Backup is done) -s (Optional Parameter to Skip Backing up the Eventlog specified. Can use more then once.) Example: Dumpevt d:\ -c -s Security -s Application This will dump all event logs except Security and Application It will also Clear the event log that it does backup, and no others. fltrfind.exe Displays a list of filters that are installed in Windows FLTRFIND [/K:KeyName] [/?] /K: Search a ControlSet other that CurrentControlSet Keyname Must contain the full path to a valid ControlSet registry key i.e. system\ControlSet001 or test\ControlSet002 /? Displays this help screen htdump.exe C:\Data\Users\Administrator>"J:\Flats\Microsoft\Tools\MPSReports\MPSRT_PFE\bin\htdump.exe" /? Processors are not hyperthreading capable A physical processor exposes logical processor(s): 0 A physical processor exposes logical processor(s): 1 System has 2 logical processors exposed by 2 physical processors netdom.exe \netdom.exe" /? The syntax of this command is: NETDOM HELP command -or- NETDOM command /help Commands available are: NETDOM ADD NETDOM RESETPWD NETDOM RESET NETDOM COMPUTERNAME NETDOM QUERY NETDOM TRUST NETDOM HELP NETDOM REMOVE NETDOM VERIFY NETDOM JOIN NETDOM MOVENT4BDC NETDOM MOVE NETDOM RENAMECOMPUTER NETDOM HELP SYNTAX explains how to read NET HELP syntax lines. NETDOM HELP command | MORE displays Help one screen at a time. Note that verbose output can be specified by including /VERBOSE with any of the above netdom commands. The command completed successfully. OEMInBox.exe SYNTAX: J:\Flats\Microsoft\Tools\MPSReports\MPSRPT_PFE\bin\OEMInBox.exe [<ServerName>] [-v] <ServerName> : Machine name (OPTIONAL) -v : Verbose mode (OPTIONAL) rpcdump.exe RPCDump:Rpc endpoint diagnostic utility. /S Name of server to interogate.(Defaults to local if not specified) /V Verbose Mode. /I Ping all registered endpoints. /P Protocol:(default ncacn_ip_tcp) ncacn_np (Connection-oriented named pipes) ncacn_mq (Datagram (connectionless) over the Microsoft Message Queue Server) ncadg_ipx (Datagram (connectionless) IPX) ncacn_spx (Connection-oriented SPX) ncacn_http (Connection-oriented TCP/IP using Microsoft Internet Information Server as HTTP proxy.) ncacn_nb_nb (Connection-oriented NetBEUI) ncacn_nb_tcp (Connection-oriented NetBIOS over TCP) ncacn_nb_ipx (Connection-oriented NetBIOS over IPX) ncacn_ip_tcp (Connection-oriented TCP/IP) ncacn_at_dsp (AppleTalk DSP) ncadg_ip_udp (Datagram (connectionless) UDP/IP) ncacn_vns_spp (Connection-oriented Vines SPP transport) ncacn_dnet_nsp (Connection-oriented DECnet transport) ncacn_nb_xns (Connection-oriented XNS) e.g. rpcdump /s foo /v /i secinspect.exe 0001.030 Sector Inspector Copyright Microsoft Corporation 2004 =========================================================================== Command Line Help =========================================================================== Display Help Screen SECINSPECT.EXE -h SECINSPECT.EXE -? Generate a standard report that includes a complete hex dump. SECINSPECT.EXE Generate Report with no no hex dump information. SECINSPECT.EXE -n Dump a sector range using 64 bit LBN. SECINSPECT.EXE -dsec DeviceName LBN NumberOfSectors Example: SECINSPECT.EXE -dsec \\.\c: 63 2 Dump a sector range using Cylinder, Head, Sector notation. SECINSPECT.EXE -dchs PhysicalDrive C/H/S NumberOfSectors Example: SECINSPECT.EXE -dchs PhysicalDrive0 5/121/12 30 Dump a file in hex. showpriv.exe Displays the trustees assigned to a privilege (user right). © 1999 Microsoft Corporation. Usage: showpriv <privilegename> where <privilegename> is a valid Windows NT privilege string. Example: showpriv SeSecurityPrivilege Privileges: SeCreateTokenPrivilege SeAssignPrimaryTokenPrivilege SeLockMemoryPrivilege SeIncreaseQuotaPrivilege SeMachineAccountPrivilege SeTcbPrivilege SeSecurityPrivilege SeTakeOwnershipPrivilege SeLoadDriverPrivilege SeSystemProfilePrivilege SeSystemtimePrivilege SeProfileSingleProcessPrivilege SeIncreaseBasePriorityPrivilege SeCreatePagefilePrivilege SeCreatePermanentPrivilege SeBackupPrivilege SeRestorePrivilege SeShutdownPrivilege SeDebugPrivilege SeAuditPrivilege SeSystemEnvironmentPrivilege SeChangeNotifyPrivilege SeRemoteShutdownPrivilege SeUndockPrivilege SeSyncAgentPrivilege SeEnableDelegationPrivilege SubInACL.exe SubInAcl version USAGE ----- Usage : SubInAcl [/view_mode] [/test_mode] [/output=FileName] /object_type object_name [/action[=parameter] [/action[=parameter]]... /view_mode : /noverbose /verbose (default=/verbose=2) /verbose=1 /verbose=2 /test_mode : /notestmode (default=/notestmode) /testmode /object_type : /service /keyreg /subkeyreg /file /subdirectories /share /clustershare /kernelobject /metabase /printer /onlyfile /action : /display(default) /setowner=owner /replace=[DomainName\]OldAccount=[DomainName\]New_Account /changedomain=OldDomainName=NewDomainName /migratetodomain=SourceDomain=DestDomain /findsid=[DomainName\]Account[=stop] /suppresssid=[DomainName\]Account /confirm /ifchangecontinue /cleandeletedsidsfrom=DomainName /testmode /accesscheck=[DomainName\]Username /setprimarygroup=[DomainName\]Group /grant=[DomainName\]Username[=Access] /deny=[DomainName\]Username[=Access] /revoke=[DomainName\]Username Usage : SubInAcl [/view_mode] /playfile file_name Usage : SubInAcl /help [keyword] SubInacl /help /full keyword can be : features usage syntax sids view_mode test_mode object_type domain_migration substitution_features editing_features - or - any [/action] [/object_type] Other tools Included Checksym.exe dcdiag.exe devon.exe dmdiag.exe dosdev.exe gpotool.exe gpresult.exe memsnap.exe netdiag.exe pstat.exe qfecheck.exe repadmin.exe tlist.exe whoami.exe UnsgnDrv.exe -gosh
×
×
  • Create New...