Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


  • Content count

  • Donations

  • Joined

  • Last visited

Community Reputation

0 Neutral

About Shadowpp

  1. Not sure if this is the rigth forums for this but here goes.... My scenario: - I install an app as Admin that contains registry keys to be written in the HKCU key. - Then I run the app as User which causes the app to self-repair to write the HKCU registry data for User - I then uninstall the app as Admin The problem is that the HKCU entries for User remain upon uninstall of the app. How can I ensure all HKCU registry entries for User are removed when Admin uninstalls the app? From my research it seems that I should be able to accomplish this with either the RemoveRegistry or Registry tables by specifiying the full path to the keys I need to delete. However as the uninstall is running as Admin it seems I would need to specify the removal of the User keys from HKEY_USERS but how I would not know the correct path for the key? Thanks in advance.
  2. In case anyone is interested... Server and Domain Isolation Using IPsec and Group Policy http://www.microsoft.com/technet/security/...ec/default.mspx
  3. In case anyone was interested.... http://www.microsoft.com/technet/prodtechn...t/winupdte.mspx
  4. The April Security releases will most likely be built on a new installer. There are some new command line switches and some old switches that will no longer be supported. To see the changes check out KB 832475 Description of the new features in the package installer for Windows - http://support.microsoft.com/?id=832475
  5. WINPE & Ghost32

    After further examination it seems that the drive is locked open due to a pagefile which is in use by WINPE. I am guessing that this is created becuase I am not using the /inram switch as the pc only has 64MB of RAM. Anyone have any ideas? Thanks again
  6. WINPE & Ghost32

    After searching the forums I see that people are sucessfully using the above combination to drop an image to a hard drive. I am having trouble. I am asking for help. I have created a WINPE cd and I can boot to it no problem. My startnet.cmd: @echo off factory -winpe copy warning.exe r:\ r:\warning.exe cls Echo Please Remove the CD and cycle power on the computer.... Warning.exe (Compiled Wise Script): Get Registry Key HARDWARE\DESCRIPTION\System\CentralProcessor\0 place in Variable SPEED If SPEED Less Than "1000" then Set Variable CONTINUE to Beep 2000 milliseconds at 500 Hz Custom Dialog "ATTENTION!" If CONTINUE Equals (Ignore Case) "YES" then Execute Ghost32.exe -clone,mode=restore,src=NT.gho,dst=1 -sure (Wait) End End Exit Installation All works great until Ghost launches and I get an error message: The destination disk cannot be locked (643) Please advise. And thanks.
  7. Registry Hack to hide Task bar

    @MCT - Thanks for your time and help but I have already spent quite a bit of time doing regshot compares but have not found an answer yet. Also the key you pasted did not resolve the issue. I am still searching for a solution....anyone is welcome to help
  8. I first search the forums but did not discover anything relating to hiding the taskbar entirely. If I missed it, pleae send me a link. Otherwise, any help would be appreciated.
  9. Grant "Log on as Service" to group

    Found the answer.......in case anyone is curious: ntrights -u Administrators +r SeServiceLogonRight The file NTRights.exe comes from the Resource Kit.
  10. It seems that the "Log on as Service" right does not include the Administrator group by default. Does anyone know of a way to add this right to the Administrator group from the command line? Thanks in advance.
  11. Export Regsitry ACL?

    I am in need of a method to export XP registry ACL values. I have tried to acomplish this using a variety of registry tools such as reg.exe, regdmp.exe, etc... but no joy. I know I can import ACL permissions using regini but I want to be able to see the original settings before I overwrite them. Any advice would be very appreciated.
  12. Can someone tell me why after a machine is build using my unattend.txt the IP property pages does not reflect the DNS info in bold below that I am specifying in my unattend.txt? [Networking] InstallDefaultComponents=No [NetAdapters] Adapter1=params.Adapter1 [NetClients] MS_MSClient=params.MS_MSClient [NetServices] MS_SERVER=params.MS_SERVER [NetProtocols] MS_TCPIP=params.MS_TCPIP [params.MS_TCPIP] DNS=No UseDomainNameDevolution=No EnableLMHosts=Yes AdapterSections=params.MS_TCPIP.Adapter1 [params.MS_TCPIP.Adapter1] DHCP=Yes DNSServerSearchOrder=, WINS=No NetBIOSOptions=0 DNSDomain=blah.blah.com Any help would be appreciated...
  13. I have been using the unattend process I developed (with the help of this site, of course) and all is generally well. I use this process to install xp on a variety of desktop platforms....Dell GX260's, HP d530's, Comapq Evo's, etc... On all other systems the "Preparing Installation" phase maybe takes 10-15 minutes.....but on the Evo it takes much much longer. It eventually chugs its way thru and machine is built correctly. Any thought on why only these types of systems would be slower than the rest? Thanks in advance
  14. Does anyone know if Autologin can be achieved using sysprep.inf (or any method for that matter) if the local system "administrator" account has been renamed? If not any thoughts on how a single autologin could occur using a renamed account? Thanks in advance....