The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,854 other subscribers

Archive for the ‘Power User’ Category

Call Everything with search pattern as parameter? – voidtools forum

Posted by jpluimers on 2019/03/25

[WayBack] Call Everything with search pattern as parameter? – voidtools forum:

C:\Program Files\Everything\Everything.exe -search """aaa bbb"""

The extra quotes are needed to get through 2 layers of de-quoting.

Related: [WayBack] How to apply quotes from the command line – voidtools forum

–jeroen

Posted in Everything by VoidTools, Power User, Windows | Leave a Comment »

How to passthrough SATA drives directly on VMWare ESXI 6.5 as RDMs

Posted by jpluimers on 2019/03/25

I’m surely going to need this gist one day: [WayBackHow to passthrough SATA drives directly on VMWare ESXI 6.5 as RDMs

–jeroen

Posted in ESXi6.5, Power User, Virtualization, VMware, VMware ESXi | Leave a Comment »

ESXi 6.5.0a hang after “balloonVMCI loaded successfully”

Posted by jpluimers on 2019/03/25

No Google results for “balloonVMCI loaded successfully”.

I had this when booting from a USB installation of ESXi 6.5.0.a.

It got resolved with ESXi 6.5.0 Update 1. Apparently the first version has issues booting on a SuperMicro-X10SRH-CF from a USB stick.

It’s a bit tricky to get the accompanying VMware-VMvisor-Installer-6.5.0.update01-5969303.x86_64.iso as the my VMware site is a bit broken (even if you have the license, it says you are not entitled), but luckily the ESXi 6.5 update 1 download page [Cache/Archive.is] has the hashes:

MD5SUM: 6d71ca1a8c12d73ca75952f411d16dc7
SHA1SUM: 5a38ae10162e0a1395b12ea31cba6342796f6383
SHA256SUM: f6e5000dff423c275b3ffbdfe08145f369d04b8c4ade5a413f2ef2a029a5e3ef

You also need a good USB stick. If it’s not good enough, you get errors like “Host Local Swap Location has not been enabled” during boot**.

–jeroen

** full log at for instance [WayBack] 2017-02-03T03:00:01Z crond[66604]: crond: USER root pid 87677 cmd /usr/lib/vmwar – Pastebin.com

Posted in ESXi6.5, Mainboards, Power User, SuperMicro, Virtualization, VMware, VMware ESXi, X10SRH-CF | Leave a Comment »

Windows: force a CHKDSK of a non system disk at boot time

Posted by jpluimers on 2019/03/22

Just out of curiosity, I wanted to try run a CHKDSK at boot time of a non-system disk.

The trick appears to be to ensure something locks the drive. An easy way to do that is have a command prompt open inside a directory on that drive.

The below example show just that: a regular command prompt locking the E: drive and an administrative command prompt scheduling the check at boot time:

In text

Regular command prompt:

Microsoft Windows [Version 10.0.15063]
(c) 2017 Microsoft Corporation. All rights reserved.

C:\Users\jeroenp>e:

E:\>cd $RECYCLE.BIN

E:\$RECYCLE.BIN>

Administrative command prompt:

C:\WINDOWS\system32>chkdsk /R /F E:
The type of the file system is NTFS.

Chkdsk cannot run because the volume is in use by another
process.  Chkdsk may run if this volume is dismounted first.
ALL OPENED HANDLES TO THIS VOLUME WOULD THEN BE INVALID.
Would you like to force a dismount on this volume? (Y/N) n

Chkdsk cannot run because the volume is in use by another
process.  Would you like to schedule this volume to be
checked the next time the system restarts? (Y/N) y

This volume will be checked the next time the system restarts.

C:\WINDOWS\system32>

–jeroen

Posted in Power User, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1 | Leave a Comment »

New for the D850: Nikon ES-2 film digitizing adapter set – scan film at 45.7MP | Nikon Rumors

Posted by jpluimers on 2019/03/22

This thread also has a nice discussion on alternatives to scanning film and slides: [WayBackNew for the D850: Nikon ES-2 film digitizing adapter set – scan film at 45.7MP | Nikon Rumors

–jeroen

Posted in About, LifeHacker, Personal, Photography, Power User | Leave a Comment »

VMware ESXi 6.5.0 Patch History

Posted by jpluimers on 2019/03/21

Interesting way to keep your ESXi rug up to date:

[WayBack] Keep track of VMware ESXi patches, subscribe by RSS, Twitter and E-Mail! – Brought to you by @VFrontDe: VMware ESXi 6.5.0 Patch History.

There is an RSS feed: http://feeds.feedburner.com/Esxi650PatchTracker and in depth information at [WayBackVMware ESXi Patch Tracker – Help.

Clicking on the link next to Imageprofile will popup a screen with instructions how to upgrade your ESXi box to that level, for instance:

# Cut and paste these commands into an ESXi shell to update your host with this Imageprofile
# See the Help page for more instructions
#
esxcli network firewall ruleset set -e true -r httpClient
esxcli software profile update -p ESXi-6.5.0-20170702001-standard \
-d https://hostupdate.vmware.com/software/VUM/PRODUCTION/main/vmw-depot-index.xml
esxcli network firewall ruleset set -e false -r httpClient
#
# Reboot to complete the upgrade

I wish there was a similar thing for [WayBackESXi Embedded Host Client as I could not find any of the esxui VIB files mentioned there at esxui site:https://esxi-patches.v-front.de.

By the time you read this I really hope these two esxui things have been fixed:

–jeroen

Posted in ESXi6.5, Power User, Virtualization, VMware, VMware ESXi | Leave a Comment »

Keep a Changelog

Posted by jpluimers on 2019/03/20

Lot’s of tips (and translations!) on how to Keep a Changelog [WayBack].

There are lots of useful tips, ranging from content (how to write, what to include) to technicalities (order of entries, unreleased, version numbering, date format) that might seem unimportant but in practice makes using the changelog.

The really cool thing: the site has a changelog of itself showing the best practices.

via:

–jeroen

Posted in Development, Documentation Development, Encryption, Let's Encrypt (letsencrypt/certbot), Security, Software Development | Leave a Comment »

How can I open a cmd window in a specific location? – Stack Overflow

Posted by jpluimers on 2019/03/19

Based on [WayBack] How can I open a cmd window in a specific location? – Stack Overflow:

cmd /K "pushd ""D:\Versioned Stuff\wiert.me"""

The quoting is required for paths having spaces, so I always include them just in case I ever have a path with spaces.

If I want it with bash, then I run it as follows:

cmd /K "pushd ""D:\Versioned Stuff\wiert.me""" && "C:\Program Files\Git\bin\bash.exe"

Documentation: [WayBack] CD Change Directory – Windows CMD – SS64.com

–jeroen

Posted in CommandLine, Console (command prompt window), Development, Power User, Software Development, Windows | Leave a Comment »

openssl: checking out RSA private key files in .rsa and .pem format

Posted by jpluimers on 2019/03/19

While checking out an issue with the SSH server for ContinuaCI issue (see info below), I wanted to look at the files leading to the issue: .pem and .rsa files with the private key for the SSH server.

So I browsed through my series of openssl related articles to see if I already had made a script better explaining the cryptic openssl command-line parameters. I didn’t have it yet, but it turned out to be really simple:

C:\ProgramData\VSoft\ContinuaCI\SSHD>"C:\Program Files (x86)\Git\usr\bin\openssl.exe" rsa -in server_keypair.rsa
writing RSA key
-----BEGIN RSA PRIVATE KEY-----
...
-----END RSA PRIVATE KEY-----
C:\ProgramData\VSoft\ContinuaCI\SSHD>"C:\Program Files (x86)\Git\usr\bin\openssl.exe" rsa -in server_keypair.rsa -text
Private-Key: (1024 bit)
modulus:
    ..:..:..:.....
publicExponent: 35 (0x23)
privateExponent:
    ..:..:..:.....
prime1:
    ..:..:..:.....
prime2:
    ..:..:..:.....
exponent1:
    ..:..:..:.....
exponent2:
    ..:..:..:.....
coefficient:
    ..:..:..:.....
writing RSA key
-----BEGIN RSA PRIVATE KEY-----
...
-----END RSA PRIVATE KEY-----
C:\ProgramData\VSoft\ContinuaCI\SSHD>"C:\Program Files (x86)\Git\usr\bin\openssl.exe" rsa -in server_keypair.pem
Enter pass phrase for server_keypair.pem:
unable to load Private Key
2675996:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:529:
2675996:error:23077074:PKCS12 routines:PKCS12_pbe_crypt:pkcs12 cipherfinal error:p12_decr.c:108:
2675996:error:2306A075:PKCS12 routines:PKCS12_item_decrypt_d2i:pkcs12 pbe crypt error:p12_decr.c:139:
2675996:error:0907B00D:PEM routines:PEM_READ_BIO_PRIVATEKEY:ASN1 lib:pem_pkey.c:141:
C:\ProgramData\VSoft\ContinuaCI\SSHD>"C:\Program Files (x86)\Git\usr\bin\openssl.exe" rsa -in server_keypair.pem -passin pass:password
unable to load Private Key
2675996:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:529:
2675996:error:23077074:PKCS12 routines:PKCS12_pbe_crypt:pkcs12 cipherfinal error:p12_decr.c:108:
2675996:error:2306A075:PKCS12 routines:PKCS12_item_decrypt_d2i:pkcs12 pbe crypt error:p12_decr.c:139:
2675996:error:0907B00D:PEM routines:PEM_READ_BIO_PRIVATEKEY:ASN1 lib:pem_pkey.c:141:

The command-lines use the [WayBack]rsa tool with:

  • the -in parameter
  • (for the first file) the -text parameter to dump it into human readable form
  • (for the second file) the -passin parameter with a [WayBackpass phrase argument pass:password.

The server_keypair.pem file (having the header -----BEGIN ENCRYPTED PRIVATE KEY----- and footer -----END ENCRYPTED PRIVATE KEY-----) was a password protected RSA private key where somehow ContinuaCI had the wrong password for.

I’m not sure it’s a good idea that the server_keypair.pem file has not password at all.

Read the rest of this entry »

Posted in Continua CI, Continuous Integration, Development, OpenSSL, Power User, Security, Software Development | Leave a Comment »

Periods of drought reveals historic landscape and soil changes

Posted by jpluimers on 2019/03/18

Periods of long drought can reveal historic changes in the landscape and soil.

One example was posted last year at [Archive.is] Je bent een Sassemer als … of the natural ice staking area in Sassenheim, The Netherlands, which is part of a polder.

Historically, creeks were running through it, and later on drainage tubes were laid into the ground:

Read the rest of this entry »

Posted in History, LifeHacker, Power User | Leave a Comment »