the upgrade is supposed to offer to use it for temporary files, but I don't get that option regardless of what I plug in
Basically a guess but as I read that...
The installer doesn't offer that. What you need to do is
1. Plug in the external driver
2. Alter the OS to use the external drive for temporary storage.
There might actually be several such configurations (or just one.)
3. Do the install
4. Undo step 2
5. Undo step 1
I have noticed that somehow the file listing in Windows 10 is in the form of a tree with these 3 alphabetic sections; it is there for at least both Details & Extra Large Icons. I'd like for it to go away, but I can't seem to figure it out in the menu, and I as well I can't get do a god internet search. Thanks
Basically when you "upload" a file to an email what the client, not server, does is add the file to the email. So there is no URL.
There is a specification for how this is done somewhere.
You should be able to see this for yourself by sending a short file to yourself then, in your email client, find the "view source" button (which you might need to hunt for) and then look at that. The "file" will be at the end with some header information.
Hi, I have been the lucky one at work tasked with finding and removing all corrupt files on a 10 TB network drive. I have spent a lot of time looking for a command/script/program that will search the drive and identify all corrupt files, automatically deleting them would be nice but what I need is them identified so that i don't have to keep checking every file manually. I can perform this on either Linux or windows so a command on either platform that can achieve this task would be great!
You'll need to attempt to parse files as specific file types and make sure that they can be read. That means you'll need the spec or a fast execution environment for each and every file type on the system.
If you generally have a lot of one sort of file (say, .pdf) you can speed your search up by making a script that verifies that it can open each with itextsharp, for instance.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
Thank you for addressing my issue here. I have a win8.1 pro installation and I purchased a third party software package last year installed remotely. The third party built the software and activated Bitlocker encryption. This year I needed to decrypt for maintenance. The problem is that Bitlocker starts decrypting and then quickly starts re-encrypting. Basically I cannot decrypt from the control panel. My guess is that there is a hidden process that is keeping the drive encrypted. Any help or suggestion would be appreciated.
ps. I can use kernel monitoring tools under guidance.
Alright, what third-party product did you use, and also enabled it to encrypt your drives? Ever heard of ransomware?
Secondly, would you be able to decrypt that drive and read the content from within the software application they provided you? If, there is a system service that keeps blocking you from reading the content, contact their team, or sales department and ask them to guide you on this one.
Also, please in future make sure you only buy such services from vendors you can trust.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
This is a fellow who installs automotive diagnostic software (for a specific German brand)
>...Ever heard of ransomware?
Yes I have, I've been working with this fellow for about 3 years and never had a problem.
>...Secondly, would you be able to decrypt that drive and read the > content from within the software application they provided you?
The software is a copy of what a dealership would have and thus does not need encryption. The encryption on my drive is probably to keep me from collecting all files and build the system on someone else's machine.
What I really need is someone to guide me through using something like process explorer or gmer.
edit: My machine in question here has not been attacked with ransomware, it is and has been functioning normally as any user of a drive encrypted with Bitlocker. The problem is when I needed to turn off Bitlocker did the abnormal functionality show up.
It's better for me to be a couple of steps ahead of this fellow. If and when I figure how to kill the process responsible for this inconvenience, I plan on restarting it up when I'm done with my disk maintenance.
Do you, however, know how to write an executable that listens for a user's decrypt command to Bitlocker (from the control panel) and prevent decrypting? Or would you know how to track down a process like this? This is why I came to this forum.
As I said before, you need to talk to him for assistance.
I'm aware of what you said but I would like to stay a couple of steps ahead of this person I'm also not sure if you have considered the fact that if this person has installed this hidden process without my knowledge, that would that person help me to remove it. Just take the example of the Sony DRM rootkit episode some years back. This is a similar scenario.
We know nothing about the programs that this person has installed
Actually you should not have to know anything about the installer. He has installed a hidden process that listens for certain Bitlocker commands (decrypting, for example) and blocks the command at the kernel level. The Sysinternals tools as well as gmer are out there and I'm familiar with their use. All I need is guidance on what to look for on how this hidden process hooks into calls I make to Bitlocker to decrypt my drive.
After conversing back and forth with a couple of other folks on this form I see they don't understand what I'm looking for.
I'm looking for someone who has knowledge on using Sysinternals tools and other similar tools to just give me some tips on what to look for. What I'm looking for is this hidden process that intercepts my Bitlocker command (to decrypt) I make from the control panel and prevents Bitlocker from decrypting.
>...You'd go trough the trouble to lock something locally (meaning you don't trust your employees), just to trust some random company?
I'm a one-man company diagnosing vehicles at the customer site. I've used this guy for the last three years he is trustworthy with my data. The software is his build and he likely wants to keep his customers from selling the native installation he provides.
There is no problem using the encrypted drive since its a regular Bitlocker use case. I can access my data and programs as a user/admin should. The problem is with possibly a hidden service that keeps Bitlocker encrypted and I know I can find that service given time, tools and some guidance (ergo my coming to this forum).
edit: Bitlocker has not kept me from a windows login and accessing my account, there is no abnormal functionality here. The problem here is turning off Bitlocker because I needed to do some maintenance work and noticed that Bitlocker turns off then quickly re-encrypts.
I wouldn't. If you were paying my expenses, I might entertain you with arguments for that position
Just to be clear, I'm not interested in you coding anything for me. I'm just asking you how would you code something like that eg. write some code that creates a hidden process and intercepts calls to the Bitlocker "Turn Bitlocker off" command issued from the user control panel.
The taskmanager shows the executables location.
I'm already aware of the Sysinternals suite of tools that give a lot more information regarding system processes. It's just now I need to know what to look for when tracking down what is intercepting the Bitlocker command I issue from the control panel.
If you are the owner of the machine than it will be easy to turn off or halt.
I am the owner of the machine and if were easy to find the hidden process I suspect is on my machine, I would not need to find someone for whom it is easy.
Last Visit: 31-Dec-99 18:00 Last Update: 25-Sep-23 14:30