|
I see you're from Canada. Have you been asked to fill out the Email Consent Form[^], which was mandated by your government?
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
As a response to my question, I was indeed asked to fill out the form. I did so and now I'm receiving the letters again. Thanks very much for pointing this out!
As a background for other readers, the Canadian government passed legislation a while ago trying to reduce SPAM, so now there's a lot of permissions required for a company to send you e-mail. If you ask me, the pendulum swung a bit too far.
|
|
|
|
|
Well that is interesting.
|
|
|
|
|
I'm trying to apply the Windows 10 CU to a 32GB netbook. The only thing installed on it is Windows 10 and Notepad++, and I've run the Admin Disk Cleanup, so there is nothing left to come off the drive, and there is just over 9GB free.
If I run the CU updater, it says that the CPU, RAM and free space pass the tests, and starts the download. It all downloads and then starts the verification. During the verification process, it slowly fills up the disk completely and falls over.
Looking online, if you have attached storage, the upgrade is supposed to offer to use it for temporary files, but I don't get that option regardless of what I plug in.
I'd be grateful for any suggestions!
|
|
|
|
|
First question: Why doing all of this on a machine with 32 GB of HDD?
I have a laptop, which contains 32GB of SSD and I have an external storage of 500GB HDD. I do all sort of unnecessary stuff on the HDD, and keep the OS files only on the SSD, but still it is not at all helpful. Of course, whenever I plug out the HDD a lot of things go out of order, multimedia, some software etc. Plus I also had to manage a lot of stuff in the Registry to get things done properly in order to always look for executables in external storage.
What I do, for installation (if you want to install it), download the media from somewhere else. Create a bootable media (I used, copy + paste to a USB — it works, please let's not talk about formatting etc or bootables!), then start the setup from beginning and perform a clean install. I don't think there are any other ways likely. Because, at the end, no matter how much painfully you get to download the Windows 10 CU in the machine, you are going to use a USB stick to install it, so why not get it beforehand?
Trust me, 32GB of C: drive is painful and a torture which you have brung unto yourself.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
hairy_hats wrote: the upgrade is supposed to offer to use it for temporary files, but I don't get that option regardless of what I plug in
Basically a guess but as I read that...
The installer doesn't offer that. What you need to do is
1. Plug in the external driver
2. Alter the OS to use the external drive for temporary storage.
There might actually be several such configurations (or just one.)
3. Do the install
4. Undo step 2
5. Undo step 1
|
|
|
|
|
I have noticed that somehow the file listing in Windows 10 is in the form of a tree with these 3 alphabetic sections; it is there for at least both Details & Extra Large Icons. I'd like for it to go away, but I can't seem to figure it out in the menu, and I as well I can't get do a god internet search. Thanks
|
|
|
|
|
swampwiz wrote: I can't seem to figure it out in the menu Have you checked all the View settings, especially "Group by"?
|
|
|
|
|
OK, I see. I was getting confused because I still wanted to have the files sorted by Name.
|
|
|
|
|
Hello there. I am trying to find upload URL of any of the above email providers using wireshark. I have tried the following filter and tried to see where I go but in vein.
ip.addr == MY_IP_ADDRESS && http
I have tried to Follow TCP Stream , Follow HTTP Stream on several http packets but, again, I could not find the upload url of a file.
How do I find file upload URL of any of the above email providers? Thanks for any input.
modified 30-May-17 6:40am.
|
|
|
|
|
Not exactly sure what you mean but perhaps...
Basically when you "upload" a file to an email what the client, not server, does is add the file to the email. So there is no URL.
There is a specification for how this is done somewhere.
You should be able to see this for yourself by sending a short file to yourself then, in your email client, find the "view source" button (which you might need to hunt for) and then look at that. The "file" will be at the end with some header information.
It will look something like the following
...
--------------1C04F503A23694EFB77EC37B
Content-Type: text/xml;
name="pom.xml"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
|
|
|
|
|
Hi, I have been the lucky one at work tasked with finding and removing all corrupt files on a 10 TB network drive. I have spent a lot of time looking for a command/script/program that will search the drive and identify all corrupt files, automatically deleting them would be nice but what I need is them identified so that i don't have to keep checking every file manually. I can perform this on either Linux or windows so a command on either platform that can achieve this task would be great!
Thanks in advance!
|
|
|
|
|
Define corrupt.
=========================================================
I'm an optoholic - my glass is always half full of vodka.
=========================================================
|
|
|
|
|
That's a hell of a project.
You'll need to attempt to parse files as specific file types and make sure that they can be read. That means you'll need the spec or a fast execution environment for each and every file type on the system.
If you generally have a lot of one sort of file (say, .pdf) you can speed your search up by making a script that verifies that it can open each with itextsharp, for instance.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Hi folks,
Thank you for addressing my issue here. I have a win8.1 pro installation and I purchased a third party software package last year installed remotely. The third party built the software and activated Bitlocker encryption. This year I needed to decrypt for maintenance. The problem is that Bitlocker starts decrypting and then quickly starts re-encrypting. Basically I cannot decrypt from the control panel. My guess is that there is a hidden process that is keeping the drive encrypted. Any help or suggestion would be appreciated.
ps. I can use kernel monitoring tools under guidance.
Thank you.
|
|
|
|
|
Alright, what third-party product did you use, and also enabled it to encrypt your drives? Ever heard of ransomware?
Secondly, would you be able to decrypt that drive and read the content from within the software application they provided you? If, there is a system service that keeps blocking you from reading the content, contact their team, or sales department and ask them to guide you on this one.
Also, please in future make sure you only buy such services from vendors you can trust.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
>...what third-party product did you use...
This is a fellow who installs automotive diagnostic software (for a specific German brand)
>...Ever heard of ransomware?
Yes I have, I've been working with this fellow for about 3 years and never had a problem.
>...Secondly, would you be able to decrypt that drive and read the > content from within the software application they provided you?
The software is a copy of what a dealership would have and thus does not need encryption. The encryption on my drive is probably to keep me from collecting all files and build the system on someone else's machine.
What I really need is someone to guide me through using something like process explorer or gmer.
edit: My machine in question here has not been attacked with ransomware, it is and has been functioning normally as any user of a drive encrypted with Bitlocker. The problem is when I needed to turn off Bitlocker did the abnormal functionality show up.
modified 30-Apr-17 17:56pm.
|
|
|
|
|
Member 13161686 wrote: This is a fellow who installs automotive diagnostic software (for a specific German brand) Then you should be talking to him.
|
|
|
|
|
It's better for me to be a couple of steps ahead of this fellow. If and when I figure how to kill the process responsible for this inconvenience, I plan on restarting it up when I'm done with my disk maintenance.
Do you, however, know how to write an executable that listens for a user's decrypt command to Bitlocker (from the control panel) and prevent decrypting? Or would you know how to track down a process like this? This is why I came to this forum.
Thank you
|
|
|
|
|
How could we? We know nothing about the programs that this person has installed. As I said before, you need to talk to him for assistance.
|
|
|
|
|
Quote: As I said before, you need to talk to him for assistance.
I'm aware of what you said but I would like to stay a couple of steps ahead of this person I'm also not sure if you have considered the fact that if this person has installed this hidden process without my knowledge, that would that person help me to remove it. Just take the example of the Sony DRM rootkit episode some years back. This is a similar scenario.
Quote: We know nothing about the programs that this person has installed
Actually you should not have to know anything about the installer. He has installed a hidden process that listens for certain Bitlocker commands (decrypting, for example) and blocks the command at the kernel level. The Sysinternals tools as well as gmer are out there and I'm familiar with their use. All I need is guidance on what to look for on how this hidden process hooks into calls I make to Bitlocker to decrypt my drive.
|
|
|
|
|
Member 13161686 wrote: All I need is guidance on what to look for You know what to look for, something that is using Bitlocker commands. As I already said, we know nothing about this software or how it works, so there is really nothing to suggest.
|
|
|
|
|
|
Zeeshan,
After conversing back and forth with a couple of other folks on this form I see they don't understand what I'm looking for.
I'm looking for someone who has knowledge on using Sysinternals tools and other similar tools to just give me some tips on what to look for. What I'm looking for is this hidden process that intercepts my Bitlocker command (to decrypt) I make from the control panel and prevents Bitlocker from decrypting.
|
|
|
|
|
Member 13161686 wrote: I have a win8.1 pro installation and I purchased a third party software package last year installed remotely. Too idiotic to be true.
You'd go trough the trouble to lock something locally (meaning you don't trust your employees), just to trust some random company?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|