Jump to content

Humpty

Experienced Members
  • Posts

    2,107
  • Joined

  • Last visited

Posts posted by Humpty

  1. Wonder if they could be hidden from the windows add/remove list.

     

    Try the tip below.

     

    Windows Explorer>Tools>Folder Options check Show hidden files and folders.

     

    Open sysoc.inf in the C:\WINDOWS\inf Then press Ctrl+H to open the Replace Wizard.

     

    In Replace Wizard:

     

    Find what: ,hide,

     

    Replace with: ,,

     

    Then go to control panel Add/Remove , if there were any hidden components they should now show.

  2. Quote Bold Fortune:

    One very important step before we set about deleting files together.

     

    Create a full system backup image using a good backup program like Acronis or Ghost.

     

    This backup image should be of a full install of XP. It should include all of your programs, drivers, setting changes, and tweaks applied...everything you normally do to make your Windows experience an enjoyable one.

     

    So now when you set about deleting files, you'll always have a the perfect safeguard. And you should never have to say on a forum, "I deleted this, and now that doesn't work!"

     

    Well, revert back to your backup image, and don't delete that anymore.

    I don't implement Bold's full guide and I have made my own batch file to delete what I think is safe enough using the deltree command.

     

    Bold's batch files don't actually delete any files as they are moved to a backup folder that can be easily copied and pasted back just in case.

    I have incorporated a failsafe feature into my batch files.

     

    Files and folders will be moved and saved (Not deleted permanently. Later that will be up to you.) to a backup folder on C:\. The backup folder is simply named "Backup".

     

    Within the Backup folder, you will find the files and folders you removed, in smart placement. Their order of appearance will be identical to how XP's files and folders appear on your C Drive.

     

    When you remove files and folders from the WINDOWS and system32 directories, in the Backup folder you will first see a WINDOWS folder. Within the WINDOWS folder you will see the individual files and subfolders you removed, including the system32 folder. And within the system32 folder you will see its individual files and subfolders you removed. The same applies to the Documents and Settings and the Program Files directories.

    Nevertheless still good to have images as complete backups which I have had to use on a few occassions.LOL :(

  3. If no joy after trying Hazelnut's link.

     

    You could also check in services that Windows Image Acquisition (WIA) is at least set to manual and starts when required and or set it to Auto.

     

    Provides image acquisition services for scanners and cameras.

     

    Start - Run - services.msc

  4. A critical vulnerability in VMware Inc.'s virtualization software for Windows lets attackers escape the "guest" operating system and modify or add files to the underlying "host" OS, the company has acknowledged.

     

    As of Sunday, there was no patch available for the flaw, which affects VMware's Windows client virtualization programs, including Workstation, Player and ACE. The company's virtual machine software for Windows servers, and for Mac- and Linux-based hosts, are not at risk.

    Article

  5. While I would never rely on this, here is an interesting video.

     

    Drownproof your baby

    Great vid Madmartigan :)

     

    Over here in Western Australia a pool must be fully enclosed with child/climb proof fencing by law.

     

    Tragedies still occur though, mainly in rural dams and natural waterways.

    TWO family dogs are being hailed as heroes - and may receive bravery awards - after they saved a two-year-old boy from drowning in a dam at a property near Mackay yesterday morning.

     

    Police said the dogs, a Rottweiler cross and a Staffordshire Bull Terrier, dragged the boy from the water after he had wandered on to a neighbouring property's dam.

     

    The owner of the property had heard a noise about 11am and had run to the dam, which was about 100 m from the house.

     

    The woman found the boy lying on the embankment of the dam covered in mud with the two dogs, usually thought of as aggressive breeds, by his side.

     

    Police said there were drag marks from the waters edge to where the boy was lying and small scratches on his arms from the dog's claws.

     

    "We are certain the dogs pulled him out of the dam," a police spokesman said.

     

    "It is an amazing story."

    Article

  6. Some old PC's in this story but probably still relevant in todays world.

     

    And if there's a minimum charge the I suppose that's fair enough.

    Have you ever went into one of those electronics chain stores to get your computer fixed? Did you trust them to diagnose and fix the repair?

     

    Some computer repair shops, included those associated with the big chains, aren't to be trusted.

     

    A Southern California television station reported that there's lots of fraud when it comes to computer repair.

     

    To check for fraud by computer repair shops, they had the computers checked by and expert to make sure that they were running perfectly fine. Then they disconnected the IDE, or ribbon cable that connects the hard drive to the motherboard, which shuts down brains to computer. All that was needed to repair the computer was to reattach the ribbon cable to the hard drive. With a visual inspection every repair person should have been able to see it.

     

    Here's what happened at the stores--

    Article

  7. Also, I have never seen the db file 'reappear' in the applications directory.

    Sorry, just got back to my pc.

     

    Are you sure you are looking in the right Application Data folder?

     

    Should reside at C:\Documents and Settings\"USERNAME"\Local Settings\Application Data

     

    Not C:\Documents and Settings\"USERNAME"\Application Data

     

    Of course you need to show hidden files and folders as well.

  8. After deleting the icon cache did you reboot in order for windows to recreate it?

     

    Another way to refresh the icon cache is to change the icon size by one through Display Properties - Appearance tab - Advanced - select Icon from the drop down menu and change the size.

     

    Also see lines 121 and 157, left columns, at the link below.

    Kelly's fixes

  9. There's a new botnet (a network of malicious nodes, known as "bots") gaining strength, and it's successfully infiltrating companies by bypassing traditional antivirus products.

     

    According to this news story on Dark Reading, security startup Damballa is tracking the spread of a new botnet, dubbed MayDay, that, according to the company, has already infected thousands of hosts -- almost all located in North America, Kelly Jackson Higgins reports.

     

    What's concerning about this botnet, aside from the apparent difficulty in identifying it, is that it has successfully infiltrated some -- so far -- unnamed and large networks. Also, its ability to communicate, presumably to other infected nodes, from behind the corporate firewall, makes it appear more agile than other peer-to-peer botnets.

    Article

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.