|
hairy_hats wrote: the upgrade is supposed to offer to use it for temporary files, but I don't get that option regardless of what I plug in
Basically a guess but as I read that...
The installer doesn't offer that. What you need to do is
1. Plug in the external driver
2. Alter the OS to use the external drive for temporary storage.
There might actually be several such configurations (or just one.)
3. Do the install
4. Undo step 2
5. Undo step 1
|
|
|
|
|
I have noticed that somehow the file listing in Windows 10 is in the form of a tree with these 3 alphabetic sections; it is there for at least both Details & Extra Large Icons. I'd like for it to go away, but I can't seem to figure it out in the menu, and I as well I can't get do a god internet search. Thanks
|
|
|
|
|
swampwiz wrote: I can't seem to figure it out in the menu Have you checked all the View settings, especially "Group by"?
|
|
|
|
|
OK, I see. I was getting confused because I still wanted to have the files sorted by Name.

|
|
|
|
|
Hello there. I am trying to find upload URL of any of the above email providers using wireshark. I have tried the following filter and tried to see where I go but in vein.
ip.addr == MY_IP_ADDRESS && http
I have tried to Follow TCP Stream , Follow HTTP Stream on several http packets but, again, I could not find the upload url of a file.
How do I find file upload URL of any of the above email providers? Thanks for any input.
modified 30-May-17 6:40am.
|
|
|
|
|
Not exactly sure what you mean but perhaps...
Basically when you "upload" a file to an email what the client, not server, does is add the file to the email. So there is no URL.
There is a specification for how this is done somewhere.
You should be able to see this for yourself by sending a short file to yourself then, in your email client, find the "view source" button (which you might need to hunt for) and then look at that. The "file" will be at the end with some header information.
It will look something like the following
...
--------------1C04F503A23694EFB77EC37B
Content-Type: text/xml;
name="pom.xml"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
|
|
|
|
|
Hi, I have been the lucky one at work tasked with finding and removing all corrupt files on a 10 TB network drive. I have spent a lot of time looking for a command/script/program that will search the drive and identify all corrupt files, automatically deleting them would be nice but what I need is them identified so that i don't have to keep checking every file manually. I can perform this on either Linux or windows so a command on either platform that can achieve this task would be great!
Thanks in advance!
|
|
|
|
|
Define corrupt.
=========================================================
I'm an optoholic - my glass is always half full of vodka.
=========================================================
|
|
|
|
|
That's a hell of a project.
You'll need to attempt to parse files as specific file types and make sure that they can be read. That means you'll need the spec or a fast execution environment for each and every file type on the system.
If you generally have a lot of one sort of file (say, .pdf) you can speed your search up by making a script that verifies that it can open each with itextsharp, for instance.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Hi folks,
Thank you for addressing my issue here. I have a win8.1 pro installation and I purchased a third party software package last year installed remotely. The third party built the software and activated Bitlocker encryption. This year I needed to decrypt for maintenance. The problem is that Bitlocker starts decrypting and then quickly starts re-encrypting. Basically I cannot decrypt from the control panel. My guess is that there is a hidden process that is keeping the drive encrypted. Any help or suggestion would be appreciated.
ps. I can use kernel monitoring tools under guidance.
Thank you.
|
|
|
|
|
Alright, what third-party product did you use, and also enabled it to encrypt your drives? Ever heard of ransomware?
Secondly, would you be able to decrypt that drive and read the content from within the software application they provided you? If, there is a system service that keeps blocking you from reading the content, contact their team, or sales department and ask them to guide you on this one.
Also, please in future make sure you only buy such services from vendors you can trust.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
>...what third-party product did you use...
This is a fellow who installs automotive diagnostic software (for a specific German brand)
>...Ever heard of ransomware?
Yes I have, I've been working with this fellow for about 3 years and never had a problem.
>...Secondly, would you be able to decrypt that drive and read the > content from within the software application they provided you?
The software is a copy of what a dealership would have and thus does not need encryption. The encryption on my drive is probably to keep me from collecting all files and build the system on someone else's machine.
What I really need is someone to guide me through using something like process explorer or gmer.
edit: My machine in question here has not been attacked with ransomware, it is and has been functioning normally as any user of a drive encrypted with Bitlocker. The problem is when I needed to turn off Bitlocker did the abnormal functionality show up.
modified 30-Apr-17 17:56pm.
|
|
|
|
|
Member 13161686 wrote: This is a fellow who installs automotive diagnostic software (for a specific German brand) Then you should be talking to him.
|
|
|
|
|
It's better for me to be a couple of steps ahead of this fellow. If and when I figure how to kill the process responsible for this inconvenience, I plan on restarting it up when I'm done with my disk maintenance.
Do you, however, know how to write an executable that listens for a user's decrypt command to Bitlocker (from the control panel) and prevent decrypting? Or would you know how to track down a process like this? This is why I came to this forum.
Thank you
|
|
|
|
|
How could we? We know nothing about the programs that this person has installed. As I said before, you need to talk to him for assistance.
|
|
|
|
|
Quote: As I said before, you need to talk to him for assistance.
I'm aware of what you said but I would like to stay a couple of steps ahead of this person I'm also not sure if you have considered the fact that if this person has installed this hidden process without my knowledge, that would that person help me to remove it. Just take the example of the Sony DRM rootkit episode some years back. This is a similar scenario.
Quote: We know nothing about the programs that this person has installed
Actually you should not have to know anything about the installer. He has installed a hidden process that listens for certain Bitlocker commands (decrypting, for example) and blocks the command at the kernel level. The Sysinternals tools as well as gmer are out there and I'm familiar with their use. All I need is guidance on what to look for on how this hidden process hooks into calls I make to Bitlocker to decrypt my drive.
|
|
|
|
|
Member 13161686 wrote: All I need is guidance on what to look for You know what to look for, something that is using Bitlocker commands. As I already said, we know nothing about this software or how it works, so there is really nothing to suggest.
|
|
|
|
|
|
Zeeshan,
After conversing back and forth with a couple of other folks on this form I see they don't understand what I'm looking for.
I'm looking for someone who has knowledge on using Sysinternals tools and other similar tools to just give me some tips on what to look for. What I'm looking for is this hidden process that intercepts my Bitlocker command (to decrypt) I make from the control panel and prevents Bitlocker from decrypting.
|
|
|
|
|
Member 13161686 wrote: I have a win8.1 pro installation and I purchased a third party software package last year installed remotely. Too idiotic to be true.
You'd go trough the trouble to lock something locally (meaning you don't trust your employees), just to trust some random company?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
>...You'd go trough the trouble to lock something locally (meaning you don't trust your employees), just to trust some random company?
I'm a one-man company diagnosing vehicles at the customer site. I've used this guy for the last three years he is trustworthy with my data. The software is his build and he likely wants to keep his customers from selling the native installation he provides.
There is no problem using the encrypted drive since its a regular Bitlocker use case. I can access my data and programs as a user/admin should. The problem is with possibly a hidden service that keeps Bitlocker encrypted and I know I can find that service given time, tools and some guidance (ergo my coming to this forum).
edit: Bitlocker has not kept me from a windows login and accessing my account, there is no abnormal functionality here. The problem here is turning off Bitlocker because I needed to do some maintenance work and noticed that Bitlocker turns off then quickly re-encrypts.
modified 30-Apr-17 18:15pm.
|
|
|
|
|
Member 13161686 wrote: I've used this guy for the last three years he is trustworthy with my data. If that was the case you would not be posting here.
If the only problem is that the third-party app starts encrypting after decrypt, then you should contact that vendor. None of us would know any details on the software.
Member 13161686 wrote: The software is his build and he likely wants to keep his customers from selling the native installation he provides. Very unlikely. There's easier ways to prevent idiots from selling your application.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Alright, then how would you write something that behaves similarly to what I have on my machine? Then please let me know how would I track it down using the different tools freely available.
Just to be clear, your executable must be listening for a user to issue a "Turn Bitlocker off" command from the control panel, and prevent the drive from being decrypted.
|
|
|
|
|
Member 13161686 wrote: Alright, then how would you write something that behaves similarly to what I have on my machine? I wouldn't. If you were paying my expenses, I might entertain you with arguments for that position.
Member 13161686 wrote: Then please let me know how would I track it down using the different tools freely available. The taskmanager shows the executables location.
Member 13161686 wrote: Just to be clear, your executable must be listening for a user to issue a "Turn Bitlocker off" command from the control panel, and prevent the drive from being decrypted. If you are the owner of the machine than it will be easy to turn off or halt.
Which third party-software? What company?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Quote: I wouldn't. If you were paying my expenses, I might entertain you with arguments for that position
Just to be clear, I'm not interested in you coding anything for me. I'm just asking you how would you code something like that eg. write some code that creates a hidden process and intercepts calls to the Bitlocker "Turn Bitlocker off" command issued from the user control panel.
Quote: The taskmanager shows the executables location.
I'm already aware of the Sysinternals suite of tools that give a lot more information regarding system processes. It's just now I need to know what to look for when tracking down what is intercepting the Bitlocker command I issue from the control panel.
Quote: If you are the owner of the machine than it will be easy to turn off or halt.
I am the owner of the machine and if were easy to find the hidden process I suspect is on my machine, I would not need to find someone for whom it is easy.
|
|
|
|