I understand FBWF as it getting a copy of the files the OS uses, never touching the original files, therefore the original files can't be corrupted...
The OS is mostly "reading"; there are Linux-versions that can be run from USB and mount completely in memory - turn the PC of and it is gone. If you only have the OS on the key, and all other important info somewhere else, then a non-working machine (in case of corruption) could be "fixed" by plugging in a new bootable usb-key.
Also, you won't corrupt files by reading them; it is interrupting a write-operation that is dangerous and can cause corruption.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
there are several developers using same server under same credentials (very convenient) under rdp.
I want to be able to give and revoke access w/o changing those creds (iis apps running etc)
I understand from research that ipsec can solve that.
We install it with different keys on each programmer’s computer and configure server firewall/cisco gateway To allow rdp over ipsec only
So 1. We know whose session it is and 2. If somebody leaves we just disable his or her access.
So single account on server is ok as long as we control who gets there
1. please confirm my findings
2. please give me a pointer to some article where I can find
step by step high level instructions say we have 10 user computers and data center network like server1, server2
What do we do to implement ipsec and force rdp over ipsec only!
I didn't have any issues, either from WS 2003 to WS 2008R2 or from that to WS 2012. IF you have an option to go WS 2012 I would recommend you go straight to that. This will a make installing and maintaining SSL certificates for multiple domains much easier - and free, from Lets Encrypt.
However, I am not in a position to guarantee you no problems, if you have some particularly esoteric settings in web.config
I stopped receiving the Codeproject daily newsletter a while ago even though sending it was still enabled in my account. Tried signing up with a different account, same story. Is it still being sent out?
As a response to my question, I was indeed asked to fill out the form. I did so and now I'm receiving the letters again. Thanks very much for pointing this out!
As a background for other readers, the Canadian government passed legislation a while ago trying to reduce SPAM, so now there's a lot of permissions required for a company to send you e-mail. If you ask me, the pendulum swung a bit too far.
I'm trying to apply the Windows 10 CU to a 32GB netbook. The only thing installed on it is Windows 10 and Notepad++, and I've run the Admin Disk Cleanup, so there is nothing left to come off the drive, and there is just over 9GB free.
If I run the CU updater, it says that the CPU, RAM and free space pass the tests, and starts the download. It all downloads and then starts the verification. During the verification process, it slowly fills up the disk completely and falls over.
Looking online, if you have attached storage, the upgrade is supposed to offer to use it for temporary files, but I don't get that option regardless of what I plug in.
First question: Why doing all of this on a machine with 32 GB of HDD?
I have a laptop, which contains 32GB of SSD and I have an external storage of 500GB HDD. I do all sort of unnecessary stuff on the HDD, and keep the OS files only on the SSD, but still it is not at all helpful. Of course, whenever I plug out the HDD a lot of things go out of order, multimedia, some software etc. Plus I also had to manage a lot of stuff in the Registry to get things done properly in order to always look for executables in external storage.
What I do, for installation (if you want to install it), download the media from somewhere else. Create a bootable media (I used, copy + paste to a USB — it works, please let's not talk about formatting etc or bootables!), then start the setup from beginning and perform a clean install. I don't think there are any other ways likely. Because, at the end, no matter how much painfully you get to download the Windows 10 CU in the machine, you are going to use a USB stick to install it, so why not get it beforehand?
Trust me, 32GB of C: drive is painful and a torture which you have brung unto yourself.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
the upgrade is supposed to offer to use it for temporary files, but I don't get that option regardless of what I plug in
Basically a guess but as I read that...
The installer doesn't offer that. What you need to do is
1. Plug in the external driver
2. Alter the OS to use the external drive for temporary storage.
There might actually be several such configurations (or just one.)
3. Do the install
4. Undo step 2
5. Undo step 1
I have noticed that somehow the file listing in Windows 10 is in the form of a tree with these 3 alphabetic sections; it is there for at least both Details & Extra Large Icons. I'd like for it to go away, but I can't seem to figure it out in the menu, and I as well I can't get do a god internet search. Thanks
Basically when you "upload" a file to an email what the client, not server, does is add the file to the email. So there is no URL.
There is a specification for how this is done somewhere.
You should be able to see this for yourself by sending a short file to yourself then, in your email client, find the "view source" button (which you might need to hunt for) and then look at that. The "file" will be at the end with some header information.
Hi, I have been the lucky one at work tasked with finding and removing all corrupt files on a 10 TB network drive. I have spent a lot of time looking for a command/script/program that will search the drive and identify all corrupt files, automatically deleting them would be nice but what I need is them identified so that i don't have to keep checking every file manually. I can perform this on either Linux or windows so a command on either platform that can achieve this task would be great!
You'll need to attempt to parse files as specific file types and make sure that they can be read. That means you'll need the spec or a fast execution environment for each and every file type on the system.
If you generally have a lot of one sort of file (say, .pdf) you can speed your search up by making a script that verifies that it can open each with itextsharp, for instance.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
Last Visit: 31-Dec-99 18:00 Last Update: 30-Sep-22 13:27