Jump to content

uid0

Member
  • Posts

    353
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United Kingdom

Everything posted by uid0

  1. Without bundling 7zip it would have been 2kb, and you could include the cmd file within CODE tags.
  2. I don't know what the web site says, but it can image single partitions, to a file, on local HD or to the network.
  3. Couldn't see any restrictions about using it on multiple machines, or servers - nice find
  4. How were the DVDs + HDs attached? I'd check the master / slave status primary / secondary ide, don't use cable select, check the bios boot order? Which HD(s) are bootable?
  5. StuckRects2 gets written when you click shutdown - so cancel the shutdown, and then copy out the registry key.
  6. I don't think LLXX lives here any more, so here's some links http://www.911cd.net/forums//index.php?s=&...ost&p=98308
  7. You're relying on the patches reaching you before the exploits do. Good luck with that.
  8. If you pay for all the software you use, and use it within the terms of the licences, sure. But I think Thinstall is quite expensive...
  9. For the services that are crashing, in properties click the recovery tab, then change each failure response to "restart the service" Then once a day/week/month, check the event viewer system log for errors from Service Control Manager, and complain to your supplier until they fix it
  10. Have you played with the recovery tab for these? You could call a cmd script to Blat you an email and restart the service. (Although some service failures will stop outgoing email from working...) People have recommended Servers Alive (not free) but I've not tried it.
  11. del /f /q "%userprofile%\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk" before you add yours, obviously this leaves the "show desktop.scf"
  12. Why not use HKEY_CURRENT_USER At the time cmdlines.txt runs, the current user is the default user, so tweaks here affect all subsequently added users
  13. How is that sensible? If only one of those windows update patches reaches you after the exploit does, the length of your ftp password wont matter at all. Yes, Nlite isn't a security solution, but neither is blind faith in Microsoft. Reducing your exposure by blocking ports you don't need open is just common sense.
  14. I don't think you can put comments inline: Also you probably want to change this to HKEY_CURRENT_USER:
  15. regjump: http://www.microsoft.com/technet/sysintern...us/Regjump.mspx
  16. This is how I use optimumX shortcut.exe: shortcut.exe /F:"%USERPROFILE%\SendTo\Notepad.lnk" /A:C /T:"%windir%\Notepad.exe" shortcut.exe /F:"%USERPROFILE%\SendTo\Metapad.lnk" /A:C /T:"%windir%\Metapad.exe" shortcut.exe /F:"%USERPROFILE%\SendTo\Frhed.lnk" /A:C /T:"%windir%\Frhed.exe" shortcut.exe /F:"%USERPROFILE%\Application Data\Microsoft\Internet Explorer\Quick Launch\cmd.lnk" /A:C /T:"%SystemRoot%\system32\cmd.exe" shortcut.exe /F:"%USERPROFILE%\Application Data\Microsoft\Internet Explorer\Quick Launch\explorer.lnk" /A:C /T:"%SystemRoot%\explorer.exe" /I:"%SystemRoot%\explorer.exe,1" shortcut.exe /F:"%USERPROFILE%\Start Menu\Programs\Startup\bginfo.lnk" /A:C /T:"%SystemRoot%\bginfo.cmd" /I:"%SystemRoot%\bginfo.exe" /R:7 Apparently copying wpa.* doesn't work any more, but if your system is royalty oem you can preactivate
  17. Allegedly it's the personal edition just re-branded "SE", although the download version doesn't come with the linux recovery iso.
  18. Here's one: ren *.ima *.img
  19. Don't know about outlook, but you could use Blat with task scheduler
  20. Just HP automating your windows install, nothing to worry about. If you look in the msfn unattended guide section, you can see how it works.
  21. You could try exporting: [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\StuckRects2] "Settings"=hex: which only gets written on shutdown, or cancelled shutdown
  22. I've used wprompt before, but at 5kb it's now looking bloated
  23. I read this somewhere: @ECHO OFF ipconfig/all | FIND /I "IP Address">> IP.txt for /f " tokens=14* delims=, " %%i in (IP.txt) DO SET IPAddress=%%j NBTSTAT -a %IPAddress% | FIND /I "MAC Address">> net.txt for /f " tokens=3* delims=, " %%i in (net.txt) DO SET MACAddress=%%j echo %MACAddress%>> mac.txt del net.txt;ip.txt echo %MACAddress% pause (Not tried it)
  24. You could try squid and dansguardian - this allows you to deny by site, file types and file extensions
×
×
  • Create New...