Jump to content

Shotgun

Member
  • Posts

    457
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    Puerto Rico

Posts posted by Shotgun

  1. @Mchart: VLK does not work that way. I can install the VLK only if I PAY additional licenses for the PCs where it is going to be installed. We paid for 50 licenses (1 license per PC), and we already have that quantity installed. To install on further PCs would violate the agreement.

    Since some of the PCs were adquired from other institutions, and some were transferred from other offices (not covered under the current VLK agreement) we just can't substitute the OEM and Retail versions with the VLK version, without first buying the VLK client licences for those PCs.

    @leedogg: Nice proggie but as rotjong said, the systems are trashed (they do not boot up).

    @prathapml: I'll try what you PM me. Thanks!

    I have what key corresponds to which system, so it's just a matter of identifying the type (VLK, OEM, Retail) so that I can change the SETUPP.INI file in the UCD so that I can reinstall each system to the type of key that each PC is supposed to have. We may have an audit in a few months, so the PCs MUST have the exact type (and key) that was installed and reported on the last audit.

    It would be very time-consuming to try to install the VLK UCD and find out after the text-install part that the key for that particular system is NOT a VLK but an OEM one. I just want to identify what type beforehand so that I can prepare 3 CDs for each type, then re-install XP pro on each PC without having to wait 10-20 minutes for each PC to find out I used the wrong key type for that PC.

  2. I have a series of computers that may need to be reinstalled (WinXP Pro), because some funny guy put a Linux CD and trashed the partition tables (btw: the buster was identified and suspended from the school)

    The XP Repair process did not help a bit, neither some commercial tools we have. Since they are public computers, there is no backup for those PCs.

    The thing is that I have the Licence Keys for XP Pro, but some of the computers used MSVLK, others had OEM keys and yet others had Retail Keys. Don't ask me why so many different key types, when I got this job, the computers were already installed that way.

    I have a UXPCD, but it's made to accept only VLK keys. The thing is... I have NO IDEA how to identify the keys between VLK, OEM and Retail keys.. The previous admin had them listed in an Excel file, but did not distinguish which between them. The file has only the license numbers (about 30) but does not say anywhere if the key is for VLK, OEM or Retail.

    How do I identify which type is each key?

  3. Does anyone know if WinRAR corrupts ISO files?

    Have you compared the file extracted from the ISO with WinRAR to the one extracted with Daemon Tools?

    IF they are different I would say that WinRAR is corrupting the files, or eitheir it is not able to interpret the ISO encoding so well as advertised.

    No offense, but it serves to show what most of us always say about ISO files... They were NOT designed to be tampered with!

    btw: why do you have WinXP in an ISO? don't you have the original CD?

  4. Well, at a local bank I saw something like a usb device that looked like a trackpad, but it was really a fingerprint reader. They use it there to login to Windows with just placing their finger on it. Don't really know who makes it or how it works, but seeing it definitely confirms that such device could be obtained online.

    I'll google it to see what I can find.

  5. 1st Page 2000

    7-zip

    A2 (A squared)

    Adaware SE

    Advanced IP Scanner

    Advanced LAN Scanner

    Advanced Port Scanner

    Astrotite

    Avast Antivirus

    AVI Synth

    Azureus

    CD Burner XP Pro

    CD image

    CD Image GUI

    CheckPrinter

    CiDial

    CPU-z

    CurrProcess

    Daemon Tools

    DeepBurner

    Dev C++

    DIVx 5.x

    EasyMD5

    Firefox

    Foxit PDF Reader

    Foxmail

    freePDF

    GIMP

    Gmail Notifier

    Graphcalc

    Hijack This

    JB Labs Secure Notes

    KlipFolio

    LeechFTP

    Miranda IM

    MS Baseline Security Analyzer

    NetStumbler

    nMap for Windows

    Notepad++

    Opera 7.54

    Proxomytron

    PuTTY

    Quicktime Alternative

    Real Alternative

    RegCleaner

    Servant Salamander

    Spybot Search & Destroy

    Start Menu Cleaner

    Startup Control Panel

    Steve Gibson's Wizmo

    Tiny Personal Firewall 2.0.14

    VCD Gear

    Virtualdub

    WebTool

    wGet

    WinSFV

    XPCreate

    Xplode

    Yahoo Toolbar

    Zoom Video Player

  6. If what you mean to do is that if cell #1 equals cell #2, if they are equal one of them turns red (you did not specify which one), else (cell #1 <> cell #2) then one of them turns blue.

    IF that is what you want, maybe this could help.

    Let's say you have a number on A1 and if it equals that of A2 then A3 would become Red, else A3 would be Green

    If ActiveSheet.Range("A1").Value = ActiveSheet.Range("A2").Value Then
       ActiveSheet.Range("A3").Interior.ColorIndex = 3
    Else
       ActiveSheet.Range("A3").Interior.ColorIndex = 4
    End If

    Where ColorIndex is (search in MS Excel VB reference help file):

    • 3 = Red
    • 4 = Green
    • 5 = Blue.. .and so on

    If THAT is NOT what you are trying to do, please be more SPECIFIC! ;)

  7. Most of the time (@home) I use MSN v6.2

    On places I can't use MSN, I use miranda since it does not require to be installed to use it. You can run it from an USB drive (I have a 256mb) and you can chat even on places where the MSN app is blocked and you can't install anything on the PC (Internet cafe anyone?). It's very good considering its free.

  8. But this only disallow some visual entries, disallow some programs to run. If the user changes it's name and if he has some power rights, he will ba able to install software.

    Exactly. That's why Software policies in 2003 AD is so effective. It not only identifies a program by its INTERNAL name(the one the file got compiled), but also by a checksum of the program content.

    That way, no matter what name the file has in the disk, it won't get executed.

  9. Count me among the "ignorants". :thumbup

    I use Opera and FF almost exclusively. I only use IE for Windows Update.

    Everyone is entitled to his/her opinion, but keeping courtesy and respect to each other.

    I don't want to get (again) into a "holy" war about which browser, OS, spyblocker, antivirus, productivity package, skin, GUI, mediaplayer, TV show or politic candidate is better than... whatever. It's a waste of time.

  10. Yes. BUT from a Windows Server 2003 domain. It has a Software Policies section under Computer Configuration -> Administrative Templates.

    Windows 2000 servers does not have that section in GPO. I don't know if an admin template is available to let W2K domains implement it. If anyone has the info on where to get that, please post the url.

  11. Separated. I would have chosen married, if not that who knows what got into my wife's brain that made her decide to leave the house. It's been 1 1/2 months and I miss her like hell. Don't really know how it's going to end, but everyone tells me to leave her alone and "think it out". If she returns, good; if not, so be it.

  12. You mean inside Notepad? I don't think is possible (hardcoded in application). You can add "Shell Context" options for specific file extensions, and even for Drives and folders.

    Since the "Cut, copy, paste and delete" are internal functions within notepad, I don't think there are any registry entries to change them.

    Please correct me if I'm wrong.

  13. A firewall would be the best option.

    Be sure to lock out (password) the firewall configuration interface, otherwise your configuration will be easily bypassed. Also, make sure that your firewall can be installed as a service, so it will be harder to circumvent.

    The next best option would be to to use another PC as a gateway to the Internet and control the settings and firewalling on the gateway PC. Secure passwords should be used on any options you consider.

×
×
  • Create New...