Forum Replies Created
-
AuthorPosts
-
I like your creativity, but after doing some research following a comment that was added to the Youtube page I found this analysis of the song/clip which made me aware of the message that is brought with this song.
I knew the song and admit I like the refrain, but knowing more about it, gives me a sour aftertaste.
Hope you understand! π
Arris
Option #1 – See if you can find some more detailed information in the Application log file: Start -> Run -> eventvwr.msc -> Windows LogsApplication.
Option #2 – Start to monitor the system activity after clicking the uninstall button using Sysinternals Process Monitor and stop it after the error messages has appeared.
Now scroll through the output of Process Monitor and see if you can find actions that result in something other than SUCCESS. Also, filtering the output using the most right buttons in the menu bar might help getting a more clear view on the output.Option #3 – Enable verbose logging for Windows Installer: go to Start -> Run -> gpedit.msc -> Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows Installer -> Logging, Enable it and at least add ‘v‘ to the options.
Now go to Start -> Run -> %tmp% and clear the directory. Run the uninstaller and look in the MSI[RandomSymbols].log file created to get more details about what went wrong.Hope you can locate the problem using one of these methods! π
Merged your topic with this one because they are very similar.
Another possibility to configure a default profile is to create a new user with Administrator-rights, log in into that account, configure it and then replace the C:UsersDefault folder.
1. Create a new user as explained here.
2. Log in into the newly created account and configure the user account to your needs.
3. Log out and log in as another user with Administrator rights and configure Windows Explorer to show hidden files and folders: Go to Windows Explorer -> press left Alt -> Click Folder Options in the Tools menu -> Go to the View tab and select Show hidden files, folders and drives.
4. Navigate to the C:Users folder, rename or move the Default folder and then rename the folder of the user you created in step 1 to Default.
5. To clean up, undo the configuration change done in step 3.Didn’t test it, but I expect this will work fine. In contrast to the solution offered before, you don’t have to find out all registry keys of the various settings yourself which makes this a lot easier! π
Probably the solution in the following topic also works for Windows Server 2008 R2: [localurl=viewtopic.php?f=18&t=645:2bowdwte]Set default preferences for all accounts[/localurl:2bowdwte]
Good luck and let me hear if you got it working! π
Try registering the spp.dll file by running regsvr32.exe spp.dll in the at the Command Prompt: Start -> Run -> cmd -> OK -> cd [folder of spp.dll] -> regsvr32 spp.dll.
Hope this works for you! π
Aviv00 is right; Windows Server 2008 uses less ram than Windows 7 and Vista which both require a minimum of 1GB of memory. See also halladayrules’ reply in this related topic: [localurl=viewtopic.php?f=18&t=1284:1vovu593]Some guidance needed[/localurl:1vovu593].
Nice review, halladayrules! π At least on the surface, it looks this build hasn’t changed very much compared to Server 2008 R2, so let’s wait for the next leak or public beta π
To keep the forum free of illegal stuff, lets close this topic. Anyone who wants these files will be able to find them anyway without the help of this forum. π
1. Download True Image Home 2011 from http://www.acronis.com/homecomputing/products/trueimage/.
2. Extract ATIH2011_trial_en-US.exe using 7-Zip.
3. Open AcronisTrueImage.msi using Orca MSI Editor (download from this page), and drop the following lines ([table].[name]):InstallUISequence.InstallRestrictionsForm
InstallUISequence.DetectRestrictedProducts
InstallExecuteSequence.DetectRestrictedProducts
LaunchCondition."NOT InstallRestrictions"
6. Save the msi and install Acronis True Image Home on your Windows Server OS.
Just did some trial and error testing to find this out. It took a little while but it turned out “Restrict” was the keyword to search for.
Enjoy! π
Hello z3r0tech,
What does the Device status section in the General tab of the item with the exclamation mark in the Device Manager say?
You can try to install the driver manually by downloading the Windows 7 x64 driver (as you have already done) and extract/install it as explained in the Manual section of the Drivers page in the manual.
If that doesn’t work, maybe installing the Desktop Experience feature helps.
Good luck! π
Arris
2nd May 2011 at 12:28 in reply to: Catalyst 11.4a Hotfix 8.84.9RC2 Apr27 Server 2008 R2 Ready #51801Thanks for your Catalyst-contributions! π Will be useful for many people here.
@rent-a-hero wrote:
boot slower than xp and 7
Hibernating instead of shutting down might be an option. At least works fine for me. π Otherwise, search the forum as you already mentioned; due to the contribution of knowledge of many people, there is a treasure of information around here! π
Welcome at the forum! π XP is getting increasingly retired so switching to Windows 6.0 (Server 2008/Vista) or Windows 6.1 (Server 2008 R2/7) is a good choice, also for games which need the new DirectX 11.
Enjoy your stay! π
13th April 2011 at 17:50 in reply to: Using Two-Factor Authentication To Further Harden Your PC #51739Thanks for your explanation; I didn’t know these attacks, however the second attack is not really feasible for most people π
I would expect the hiberfil.sys file is also encrypted and only accessible after you have unlocked the filesystem using the BitLocker USB key, but apparently it isn’t…
Read somewhere that while powered on, the encryption/decryption key is stored in plain text (or reversible encryption) in memory. If you turn off the PC, physically freeze the memory with some spray to slowdown the fadeout process of the contents of the memory, boot from an external medium and dump the contents of the memory, it is possible to find the key to decrypt the data on the hard drive. This is only possible if no TPM chip is used.
Besides that there is also the Evil Maid Attack developed by the hacker Joanna Rutkowska which replaces the boot loader and sniffs the password entered.
Cool stuff indeed! π
As you can see in the [localurl=viewforum.php?f=25:36q905dx]Wish List forum[/localurl:36q905dx], people are [localurl=viewtopic.php?f=25&t=1080:36q905dx]still working[/localurl:36q905dx] on this. It seems there are some licensing issues that are still in the way of getting it working. I’d suggest looking for a Windows Media Center alternative for time being. There are some listed [localurl=viewtopic.php?f=11&t=61:36q905dx]here[/localurl:36q905dx].
About the TV tuner device, downloading the Windows 7 drivers from the ATI TV Wonderβ’ HD 600 Hi-Speed USB Support Page and installing them using one of the methods in the Drivers tutorial should work fine.
Good luck! π
-
AuthorPosts