Jump to content

Tripredacus

Supervisor
  • Posts

    13,292
  • Joined

  • Last visited

  • Days Won

    24
  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by Tripredacus

  1. Ok let's preface this with MAKE A BACKUP FIRST... which hopefully wouldn't be a required thing to say. First of all, when you are dealing with permissions, you can see an account name there, but it isn't a user account. The groups or other things (such as TrustedInstaller or System) are not user accounts nor groups. The groups solely exist elsewhere in the system. These references are Security Contexts. You have duplicates in your list because there are some that have an inheritance, and others that you (or whatever) have added manually. If you want to remove the inherited context rights, you have a few ways of doing it: 1. Remove them using the UI (may not stick) 2. Remove the permission propagation of child objects from the parent object itself. The Inherited From column is telling you which object that is. 3. You can uncheck the "Include Inheritable Permissions" box, which should remove all of the Security Contexts that have inherited permissions. However, before any of this is done, you need to make sure that SYSTEM still has the correct permissions, otherwise it can cause problems. Removing it using #2 or #3 could remove it from the list entirely, which is not advisable. If you know which account is trying to do this action that is being recorded into Event Viewer, verify it on the Effective Permissions tab.
  2. 1. No. 2. My process is to first find the hardware id (already done here) then look into the INFs to find exactly which driver to use. If it is "unknown to me hardware" then I would first test the driver with drvload in the PE itself. This would allow me to install the driver, then use Diskpart to immediately see if the disk is detected. This saves a lot of time when mounting and adding drivers to images. Then when I find the driver that allows diskpart to see the disk, then integrate that driver into the image.
  3. I believe that the duplicates are normal, at least we can think that there is a limitation in the UI. As long as each have different inheritances, when a Security Context appears an additional time in the permissions list, with one inheritance and one "not inherited" it means that the "not inherited" permissions are in addition to the inherited. You can try, adding SYSTEM security context additionally to read, so that it too would have a "not inherited" listing. Then uncheck "include inheritable permissions from this object's parent" box. That should invalidate the already present inherited items. Account Unknown is likely an account that no longer exists on the system. Previous user account, or a temporary account created by a program during installation. When the account is removed from the system, it still can exist in permissions for objects, as seen here. Search the registry for that SID to see if you can determine what that account originally was or what created it. It is normal for the checkbox to uncheck after replacing. Another unusual UI design choice, it should have been a button rather than a checkbox I think.
  4. Links would have to be hosted on Microsoft owned servers (not counting personal Onedrive folders) in order to be posted here.
  5. Storage driver seems to be VEN_8086&DEV_1C03, which shows mshdc.inf is loaded. Because it has this name (not oem) it is an inbox driver. These do not always work in all situations, usually needing an actual driver from the manufacturer (Intel in this case) to use disks in certain situations... such as mSATA/NVME or sometimes for some SSDs. Alas, Lunix saves the day... again. :p
  6. It is due to the nature of the data, which was not alluded to here. The string has been posted in the private section of the forum. It is a best practice to not leave bugged code in public view once it has been identified. That was the reason it was removed.
  7. Ok the next thing to determine is what exactly is happening when the connection is lost. Does the NIC report media disconnected? Is it possible that connection still exists but name resolution fails? Are there any relevant logs in Event Viewer when the connectivity issue arises? It is extremely helpful if the no-connection situation can be replicated, otherwise troubleshooting can be a bit difficult. The simple test is to run pings. You want to know if the issue is at the machine or somewhere else down the line. I would run 2 cmd windows set to run ping on two different IP addresses, using -t option (which will make it run until a break (Ctrl+C) is used, or CMD is closed. The two addresses would be first, a popular website such as google. The IP address might be different in your country, but at the moment for me it is 172.217.12.206. The second address would be one within your LAN. If not the cable modem, or a router, or perhaps another physical computer/device on the same subnet. ping -t 172.217.12.206 ping -t 192.168.0.1 the second being an example address, you'd have to determine what IP to put. Note: whichever IPs you use for the outside and inside addresses, make sure you get replies to them first by using regular ping (no -t) to make sure you get responses. Then run them using -t for the recurring ping. Then you can leave these up on another monitor, or just minimize them. When you are accessing the internet and the connection stops working, then open them up and see if they are both still getting replies or not. If both still have replies, but your internet doesn't work, you can try to ping a domain name, like google.com (not -t required) or use nslookup to see if name resolution is working. If the ping to the internal network is working but not the one to the internet, then you know where the problem lies. If both pings show no replies, then we know it is a problem with the computer itself, be it hardware or software.
  8. I've never had to use drivers for a disk, only for the controller. You'll need a way to see the devices without drivers, use a program like NirSoft's Devmanview. Make sure to get the one for your WinPE's architecture. https://www.nirsoft.net/utils/device_manager_view.html Unfortunately, when I search for y460p on Lenovo's support site, it says it can't find it.
  9. 1st post general question, 2nd post general answer. Hey Vits USA, let's try to be more specific around here, we don't post general links and hope a user fixes their problem by reinstalling Windows or disappearing from the forum forever! What type of networking are you referring to? Is it wired or wireless? We can start there.
  10. It would be helpful to post a picture of what you are seeing.
  11. The timeline appears correct. It was around this time that Sony had been putting wireless built into their VAIO notebooks (and unfortunately RAID1 on their VAIO desktops).. but those were not rosy times. In fact it had major problems back then and my own experiences with wifi made me sit on that technology until draft-N products were being sold at retail. Remember those early days of wireless, before smart phones but a large majority of households had cordless phones... that ran on the same or similar frequencies (including microwaves) as the wireless devices in VAIO notebooks, meaning you could not access the internet while you were on the phone or cooking a snack!
  12. ^ Confirmed! Doesn't seem to have anything to do with the words. Changing them still has the error, but something like 1::2 doesn't cause a problem.
  13. IDK but any website that changed your mouse cursor into a dragon can't be that bad.
  14. Your picture with the 995 message is not loading for me, it shows a blue "image not found" image.
  15. Bad word filter is working properly. This new version is even "smart" enough to no longer censor Fukushima!
  16. There seems to be some information missing from the report... BUT it also notes the service is not available. You need to revert any changes you made in regards to the Software Licensing Protection Service, and then run the report again. Based just on this, it would appear that the active product key cannot unlock the OS. It will not try to activate if LocalGenuineState says anything besides Genuine. Does this computer have a Windows COA on it or does it just have the Windows 8 sticker? examples: https://www.microsoft.com/en-us/howtotell/Hardware.aspx?tab=PCPurchase
  17. You can see what the program is doing by using Process Monitor. Open ProcMon, add the process names to the filte, then you start monitoring and then run your program that generates the error. As soon as the error appears, stop the monitor. If this is the first time you are running ProcMon, sometimes it will start as soon as you open and/or accept the EULA. In that case, stop the monitor, then clear the log, then add the things to the filter. If there are no leads from that, you may want to enable the advanced output (under Filter). However, using ProcMon may be a problem concerning some games. It may be useful enough for detecting an OS check error, but some games have DRM that will not run if ProcMon is active, or has been run at some point during the current Explorer session. Something I ran into when trying to debug NHL 08 many moons ago. So there is the potential to get an altogether different error when trying to run the game, if that game has any detection response to programs like that.
  18. Certainly install media may have some in there. I do not remember exactly, but it is likely the image I used had some updates in it already, more than stock DVD would. You will likely find that OEM Recovery DVDs will not have a lot of updates in them, because those increase the ISO size and it is more expensive to have the Replicator press onto Dual Layer discs...
  19. Since Windows 8.0 was released. MS originally didn't want to release a 32bit OS with Windows 8 and later, but the business community (aka their customers) reacted as expected aka badly. So now we have 32bit OS still around thanks to that.
  20. What hardware are you testing on or are you using a VM? I remember not seeing any systems with UEFI capability in the desktop boards until 2011, so there was no way for me to test these capabilities when Vista (or even SP1) came out. It was a thing on Server boards, but the ones I remember having UEFI 2.0 would only allow an EFI boot with RAID enabled. And then by 2011, I was only trying to get UEFI PXE boot to work. I recall those "early" days of UEFI 2.3.1, it took manufacturers a bit of time to iron out the bugs in their implementation. If you are using hardware for testing, you probably want to use something from 2013 or newer.
  21. I only install updates as need be. On my newest build, it has just the service pack for Windows 7 in it, and any updates that were "required" when installing specific programs, or any that were redists that were installed by programs.
  22. Since it only has 2 GB RAM, I can guess it is going to be architecture locked to booting 32bit EFI applications only. So make your USB key using the boot media for Windows 10 32bit OS, and set it to boot EFI.
  23. Yeah, there are tasks for each of those, but you cannot see them. You would need to impersonate our favorite security context, Trusted Installer, to even see them. But seeing the output like this, all in one place, is better than dealing with the Task Scheduler, which buried everything in a bunch of folders... Which is the "folders" you are seeing being referenced, not folders on your hard drive. Start first with disabling tasks that you know are relating to services or options you have disabled. Even if something is disabled, a task may exist to attempt something, and when it cannot (or a child process cannot) then you can get a log in event viewer. The Task Scheduler in Windows Vista and newer OS is one thing I never cared for. It seems like everything got way more complicated for some reason.
  24. When you say XP Emulation mode, do you mean the "XP Mode" virtual machine? https://technet.microsoft.com/en-us/library/hh859554.aspx When I upgraded to Windows 7, I just basically put a blank hard drive into my XP computer and then installed Win7 on it. I still have full access to the other disks that were in my XP computer, and even most programs can be run from those old installations! Microsoft Office need not apply, however. For an email client, I can only recommend Mozilla Thunderbird, but it can have difficulties with some MS Exchange configurations.
×
×
  • Create New...