The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,402 other followers

Archive for the ‘Power User’ Category

How to check if a binary is 32 or 64 bit on Windows? – Super User

Posted by jpluimers on 2018/08/17

It seems there are a few, but only loading the binary is the sure method to know what the process will be using: [WayBackHow to check if a binary is 32 or 64 bit on Windows? – Super User and [WayBack] How do I determine if a .NET application is 32 or 64 bit? – Stack Overflow.

Details in the answers of these questions, here are a few highlights:

  • The first few characters in the binary header reveal what it was originally designed for.
  • A .NET executable might still have an x64 header for bootstrapping.
  • The Windows SDK has a tool dumpbin.exe with the /headers option.
  • You can use sigcheck.exe from SysInternals.
  • The file utility (e.g. from cygwin, which comes with msysgit) will distinguish between 32- and 64-bit executables.
  • Use the command line 7z.exe on the PE file (Exe or DLL) in question which gives you a CPU line.
  • Virustotal File detail is a way to find out if a binary is 32 bit or 64 bit.
  • Even an executable marked as 32-bit can run as 64-bit if, for example, it’s a .NET executable that can run as 32- or 64-bit. For more information see, which has an answer that says that the CORFLAGS utility can be used to determine how a .NET application will run.


Search terms: win64, win32, x64, x86_64, x86

Posted in Assembly Language, Development, Power User, Windows, x64, x86 | Leave a Comment »

Ziggo – als je geen papieren factuur meer wilt

Posted by jpluimers on 2018/08/17

Als je bij Ziggo geen papieren factuur meer wilt, kun je dat op instellen.


via: [WayBack]

Posted in LifeHacker, Power User | Leave a Comment »

Steve Losh on Twitter: “HTTP status ranges in a nutshell: 1xx: hold on 2xx: here you go 3xx: go away 4xx: you fucked up 5xx: I fucked up”

Posted by jpluimers on 2018/08/17

[WayBackSteve Losh on Twitter:

“HTTP status ranges in a nutshell:

  • 1xx: hold on
  • 2xx: here you go
  • 3xx: go away
  • 4xx: you fucked up
  • 5xx: I fucked up”


via: [WayBack] HTTP status ranges in a nutshell… – This is why I Code – Google+

Read the rest of this entry »

Posted in Communications Development, Development, HTTP, Internet protocol suite, Power User, TCP | Leave a Comment »

Upgrade to ‎Microsoft Remote Desktop 10 on the Mac App Store

Posted by jpluimers on 2018/08/17

If you are still on version 8, then note this version will be deprecated at 20180901, so it is time to upgrade to [‎Microsoft Remote Desktop 10 on the Mac App Store

[] ‎Microsoft Remote Desktop 8 on the Mac App Store is now at version 8.0.44, which changed one thing:

This update adds a dismissible banner to the app UI to message the fact that the client will be deprecated soon. You can start using the new version of Remote Desktop today by downloading Microsoft Remote Desktop 10 from the App Store.

It is easy to import your RDP desktops from version 8 into version 18: in the menu, select Connections, then Import from Microsoft Remote Desktop 8, then enter your credentials so the saved logon passwords can be imported from the [WayBack] KeyChain.

A few things to note:

  • importing the Microsoft Remote Desktop 8 fails to import the Local Resource bindings
  • in Microsoft Remote Desktop 10, editing Local Resource binding right after adding them will crash

Background reading:

The full version histories of both:

Read the rest of this entry »

Posted in Apple, Power User, Remote Desktop Protocol/MSTSC/Terminal Services, Windows | Leave a Comment »

Hack The Box :: Penetration Testing Labs

Posted by jpluimers on 2018/08/13

Cool playground:

An online platform to test and advance your skills in penetration testing and cyber security.

Source: Hack The Box :: Penetration Testing Labs

Via [WayBack] hackthebox – Penetration testing labs This is an amazing platform – super addictive! Hack The Box is an online platform al… – Jürgen Christoffel – Google+


Posted in LifeHacker, Power User, Security | Leave a Comment »

%d bloggers like this: