The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,839 other subscribers

Archive for the ‘Windows’ Category

SequoiaView Homepage

Posted by jpluimers on 2019/07/01

I thought I had scheduled a blog post about the great tool on [WayBackSequoiaView Homepage, but didn’t. In the mean time, Paolo Buffa posted an overview with a really nice historic perspective:

Is amazing from how many years I’m using this program, and how many operating systems it managed to go thru almost unscathed, without modification.

Paolo Buffa

Source: [Archive.is] SequoiaView: a piece of history. – Data Center IT – Spiceworks

I still use it, despite it being quite old: 2002 era, written in Delphi 5. It’s beautiful in part because of its anciency, but also because it is so simple and intuitive that I still use it regularly.

The age also shows in the web page (which when writing it was still on-line): The SequiaView home page link above is actually a classic frame inside [WayBackThe SequoiaView Homepage. Back then, it was already starting to be considered obsolete to write HTML using frameset [WayBackFraming (World Wide Web) – Wikipedia.

The SequoiaView [WayBack] Download Page even points to non-existing ftp-download URLs via counter CGI scripts:

None of them have been archived by the WayBack machine: https://web.archive.org/web//ftp://ftp.win.tue.nl/pub/home/sequoia//

To verify alternative downloads, just check these hashes:

hash command filename hash output
$ md5 Sequoia1.3Install.zip MD5 (Sequoia1.3Install.zip) = 28d356f2bafe258805794257c284a075
$ md5 Sequoia1_3XPInstall.exe MD5 (Sequoia1_3XPInstall.exe) = 142586a5cc7a0139bde8c13e5cc4d301
$ shasum Sequoia1.3Install.zip 762ab30177a7f6a0d4f173fd2442ba7b61df4c2e Sequoia1.3Install.zip
$ shasum Sequoia1_3XPInstall.exe c1db10a0f7d36adbc14b5a7a3f08fc35db1bee8b Sequoia1_3XPInstall.exe

I’ve a copy in my archive that I just use in a portable way: just copy over SequoiaView directory with these files in it:

  • Archives.col
  • DEFAULT.COL
  • Images.col
  • License.txt
  • Movies.col
  • ReleaseNotes.txt
  • Sequoia.cnt
  • Sequoia.exe
  • SEQUOIA.HLP
  • Sound.col

You can download this from gist.github.com/jpluimers/b0df9c2dba49010454ca6df406bc5f3d (ef94f1875377f4054e3a434f8942e1749f0af74a.zip).

A few things that could be fixed (if ever hopefully MagnaView open sources it: [WayBack] @jpluimers More @magnaview did you ever consider to open source the Delphi code for http://www.win.tue.nl/sequoiaview/ or give someone NDA access to fix some bugs?):

  • Access violation when re-scanning a drive
  • Option to show multiple links to the same physical file
  • Indication of more rights  needed to index a file or directory
  • Better explorer integration (via context menu)

Read the rest of this entry »

Posted in Delphi, Delphi 5, Development, Power User, Software Development, Windows | Leave a Comment »

Windows Security From The Ground Up — Decent Security

Posted by jpluimers on 2019/06/28

Because so few people actually make more than 10% of these simple steps: [WayBack] Windows Security From The Ground Up — Decent Security (How to secure a Windows computer).

It starts with BIOS update, configuration, TPM, then secure boot into a bitlocker encrypted drive with a Windows installation that has UAC set to high, and a safe web browsing environment.

via

–jeroen

Posted in Power User, Windows | Leave a Comment »

ServiceDependencyViewer

Posted by jpluimers on 2019/06/28

Since CodePlex is sunsetting, some archived locations of ServiceDependencyViewer.zip:

It helps you investigate dependencies of Windows Services.

–jeroen

 

 

Posted in Power User, Windows | Leave a Comment »

Enable remote desktop on Windows – SystemPropertiesRemote.exe

Posted by jpluimers on 2019/06/24

The easiest way to enable remote desktop access on Windows is by running SystemPropertiesRemote.exe.

There are alternatives using the command prompt that edit registry settings and network firewall in the links below, but they are all more cumbersome.

Links mostly via enable remote desktop on windows – Google Search

I need to check out:

  • which of the above are really old
  • how to find out if WinRM is enabled
  • see if this can be done over WinRM
  • see if this can be done with PSShell
  • see if PowerShell is a good successor to the now deprecated netsh
    • you want to enable the remote desktop group in a language and windows version neutral way, not just port 3389

Some registry entries:

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]

"RemoteDesktop-UserMode-In-TCP"="v2.28|Action=Allow|Active=TRUE|Dir=In|Protocol=6|LPort=3389|App=%SystemRoot%\\system32\\svchost.exe|Svc=termservice|Name=@FirewallAPI.dll,-28775|Desc=@FirewallAPI.dll,-28756|EmbedCtxt=@FirewallAPI.dll,-28752|"
"RemoteDesktop-UserMode-In-UDP"="v2.28|Action=Allow|Active=TRUE|Dir=In|Protocol=17|LPort=3389|App=%SystemRoot%\\system32\\svchost.exe|Svc=termservice|Name=@FirewallAPI.dll,-28776|Desc=@FirewallAPI.dll,-28777|EmbedCtxt=@FirewallAPI.dll,-28752|"
"RemoteDesktop-Shadow-In-TCP"="v2.28|Action=Allow|Active=TRUE|Dir=In|Protocol=6|App=%SystemRoot%\\system32\\RdpSa.exe|Name=@FirewallAPI.dll,-28778|Desc=@FirewallAPI.dll,-28779|EmbedCtxt=@FirewallAPI.dll,-28752|Edge=TRUE|Defer=App|"
"RemoteAssistance-In-TCP-EdgeScope"="v2.28|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=%SystemRoot%\\system32\\msra.exe|Name=@FirewallAPI.dll,-33003|Desc=@FirewallAPI.dll,-33006|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=TRUE|Defer=App|"
"RemoteAssistance-Out-TCP"="v2.28|Action=Allow|Active=TRUE|Dir=Out|Protocol=6|Profile=Public|App=%SystemRoot%\\system32\\msra.exe|Name=@FirewallAPI.dll,-33007|Desc=@FirewallAPI.dll,-33010|EmbedCtxt=@FirewallAPI.dll,-33002|"
"RemoteAssistance-PnrpSvc-UDP-In-EdgeScope"="v2.28|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|LPort=3540|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|Name=@FirewallAPI.dll,-33039|Desc=@FirewallAPI.dll,-33040|EmbedCtxt=@FirewallAPI.dll,-33002|Edge=TRUE|Defer=App|"
"RemoteAssistance-PnrpSvc-UDP-OUT"="v2.28|Action=Allow|Active=TRUE|Dir=Out|Protocol=17|Profile=Public|App=%systemroot%\\system32\\svchost.exe|Svc=pnrpsvc|Name=@FirewallAPI.dll,-33037|Desc=@FirewallAPI.dll,-33038|EmbedCtxt=@FirewallAPI.dll,-33002|"

–jeroen

Posted in Power User, Windows | Leave a Comment »

List of applications behind the various control panel links – via “Stop user access to control panel”

Posted by jpluimers on 2019/06/21

An interesting set of apps behind the various control panel links from [WayBack] Stop user access to control panel. Even though from 2013, many still work.

I edited most because:

  • some had the form control /name - Microsoft.AutoPlay but the – should have been between the name and the command.
  • none had the commands in code format so it was hard to see what you have to run

Add Hardware – Wizard hdwwiz.cpl
Administrative Tools – control admintools
Advanced System Properties ?
Advanced tab System – PropertiesAdvanced.exe
Computer Name – tab sysdm.cpl or SystemPropertiesComputerName.exe
Prevention tab – SystemPropertiesDataExecutionPrevention.exe
Hardware tab – SystemPropertiesHardware.exe
System Protection tab – SystemPropertiesProtection.exe
Remote tab – SystemPropertiesRemote.exe
AutoPlay – control /name Microsoft.AutoPlay
Backup and Restore Center – control /name Microsoft.BackupAndRestoreCenter
Backup Status and Configuration – sdclt.exe
BitLocker Drive Encryption – control /name Microsoft.BitLockerDriveEncryption
Bluetooth Devices – bthprops.cpl
Date And Time – timedate.cpl or control date/time
Display Settings – desk.cpl
Default Programs – control /name Microsoft.DefaultPrograms
Device Manager – devmgmt.msc
Disk Manager – diskmgmt.msc
Ease of Access Center – access.cpl or Utilman.exe
Game Controllers –  joy.cpl
Indexing Options – control /name Microsoft.IndexingOptions
Internet Options – inetcpl.cpl
Keyboard Properties – control keyboard
Mouse Properties – main.cpl or control mouse
Network and Sharing Center – control /name Microsoft.NetworkandSharingCenter
Network Connections – ncpa.cpl or control netconnections
Offline Files – control /name Microsoft.OfflineFiles
Parental Controls – control /name Microsoft.ParentalControls
Pen and Input – Devices TabletPC.cpl
People Near Me – collab.cpl or p2phost.exe
Phone and Modem Options – telephon.cpl or control telephony
Power Options – powercfg.cpl
Printers – control printers
Problem Reports and Solutions – wercon.exe
Programs and Features – appwiz.cpl
Regional and Language Options – intl.cpl or control international
Scanners and Cameras – sticpl.cpl
Secure Online Key Backup – control /name Microsoft.SecureKeyBackup
Security Center – wscui.cpl
Sound – mmsys.cpl
Speech Recognition Options – control /name Microsoft.SpeechRecognitionOptions
Sync Center – mobsync.exe
System – control /name Microsoft.System
Tablet PC Settings – control /name Microsoft.TabletPCSettings
Task Scheduler – control schedtasks
Text to Speech – sapi.cpl or control speech
User Accounts – nusrmgr.cpl or Netplwiz.exe or control userpasswords
User Accounts (advanced) – control userpasswords2
Volume Mixer – SndVol.exe
Welcome Center – control.exe /name Microsoft.WelcomeCenter
Windows Defender – MsAsCui.exe
Windows Firewall – Firewall.cpl or FirewallControlPanel.exe
Windows Firewall Settings – FirewallSettings.exe
Windows Sidebar Properties – control.exe /name Microsoft.WindowsSidebarProperties
Windows SideShow – control.exe /name Microsoft.WindowsSideshow
Windows Update – control.exe /name Microsoft.WindowsUpdate

–jeroen

Posted in Power User, Windows | Leave a Comment »

Copy the full path of a file from Windows Explorer

Posted by jpluimers on 2019/06/14

Every now and then, I learn a “new” feature that has existed for a very long time.

This time it is about the Copy as Path feature from Windows Explorer context menu:

  1. hold the shift key, then right click any file or directory
  2. select Copy as Path

This was introduced in Windows Vista ([WayBack] How to Get Windows Vista and 7’s “Copy as Path” Option in Windows XP Context Menu? – AskVG).

By default the Copy as Path is not in the context menu: you have to press the shift key. In the past, I used tools like ClipName from the PC TimeWatch people – Freeware « The Wiert Corner – irregular stream of stuff.

Seems I do not use that any more for just copying one filename, only for copying multiple.

Related:

–jeroen

Posted in Power User, Windows, Windows Explorer / Windows Shell | Leave a Comment »

“Nobody” Can Ping My Windows 10 Computer

Posted by jpluimers on 2019/06/10

A problem with ICMP can be that you if you allow File and Printer Sharing, that ICMPv4 and ICMPv6 for both Private and Public networks are only allowed for the Local subnet.

For Domain networks, however it is allowed for Any subnet.

You can see the difference in this picture:

The solution presented at [WayBack] Nobody Can Ping My Computer – Technet MSDN library is to add a less restrictive set of rules:

  1. In the Windows Firewall with Advanced Security snap-in, click Inbound Rules in the tree, and click New Rule in the Actions Pane.
  2. Click Custom and click Next.
  3. Click All programs and click Next.
  4. For Protocol type, select ICMPv4.
  5. Click Customize for Internet Control Message Protocol (ICMP) settings.
  6. Click Echo Request, click OK, and then click Next.
  7. Under Which local IP address does this rule match? and for Which remote IP address does this rule match click either Any IP address or These IP Addresses. If you click These IP addresses, specify the IP addresses and click Add, then click Next.
  8. Click Allow the connection, and then click Next.
  9. Under When does this rule apply?, click the active profile, any or all profiles (Domain, Private, Public) to which you want this rule to apply, and then click Next.
  10. For Name type a name for this rule and for Description an optional description. Click Finish.
  11. Repeat steps for ICMPv6, selecting ICMPv6 for Protocol Type instead of ICMPv4.

You can also add these rules using the netsh advfirewall command as shown at [WayBack] How to Allow Pings (ICMP Echo Requests) Through Your Windows Firewall

–jeroen

Posted in Power User, Windows, Windows 10 | Leave a Comment »

When %windir%Temp is filling up your disk: some notes

Posted by jpluimers on 2019/06/07

On my research list as I’m not sure if these are related:

–jeroen

Posted in Power User, Windows | Leave a Comment »

svnrdump for dumping and loading remote svn repositories – twm’s blog

Posted by jpluimers on 2019/05/31

One day I will likely need svnrdump:

Since I keep forgetting what the tool is called and how to use it: svnrdump is a tool that can dump a remote svn repostory to a text file and also load that text file into a different remote svn repository…

Via: [WayBack] Since I keep forgetting what the tool is called and how to use it: svnrdump i…

–jeroen

Posted in *nix, Development, DVCS - Distributed Version Control, Power User, Subversion/SVN, Windows | Leave a Comment »

How to clear screen artifacts without rebooting Windows (multiple versions) – Super User

Posted by jpluimers on 2019/05/20

  1. go to control panel | display
  2. change the screen resolution. the artifact will go away
  3. click on cancel when windows asks you if you want to keep the new resolution.

this works on laptops too.

[WayBackUser mahesh – Super User answering [WayBackHow to clear screen artifacts without rebooting Windows (multiple versions) – Super User

–jeroen

Posted in Power User, Windows, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Vista, Windows XP | Leave a Comment »