• Content count

  • Joined

  • Last visited

  • Days Won


Tripredacus last won the day on May 5

Tripredacus had the most liked content!

Community Reputation

267 Excellent


About Tripredacus

  • Rank
    K-Mart-ian Legend
  • Birthday September 29

Contact Methods

  • AIM
  • Website URL

Profile Information

  • OS
    Windows 7 x64
  • Country

Recent Profile Visitors

7,610 profile views
  1. Not knowing exactly what you had experienced, I would guess it is related to how the OS can only have 1 gateway at a time. It doesn't matter if you are connecting two interfaces to one or two to two. When using automatic settings, when you connect to a new network, it will use the gateway as assigned by the DHCP server and then the existing gateway will no longer be used and the new one will. It can switch anytime a renew is done. The outward appearance to this is that you can "lose connection" when using a setup this way. It is not recommended to connect to multiple dhcp servers unless they are specifically set up to allow full access on both networks, or to use static IPs where one has a gateway (usually for internet traffic) and the other does not. This is not limited to Windows.
  2. I doubt that any software has recorded what created the file, I think that is what you are asking. You can try opening the file in a hex editor/strings viewer and see if Word had written the original file location in there somewhere.
  3. Welcome to the MSFN!
  4. It indicates that there is a fair amount of private contracts with companies that are still paying for extended support on XP. More-so than to make patches specifically available to those companies and it would be easier to make it available on the enterprise level of update support, the WSUS catalog and the MS Catalog update site.
  5. On Vista, isn't it also required to disable the automatic defrag or am I thinking of something else?
  6. Split to new topic, change title as you see fit. This guide, even made for WinPE2 or 3, is still valid for creating a WinPE 10 boot wim.
  7. One I do not understand is on Twitter. There are promoted tweets, which are ads. If that promoted tweet has a video on it, sometimes then that video will play an ad first. It is too much for me to handle this type of situation. I block the accounts where that happens, except for NHL.
  8. I'm not sure how accidental hero it is. There are some people that will register non-existant domains that are seen in advertisements or other forms of media just because.
  9. Does it not work already? Can you post your SSD model number?
  10. You can also disable password expiry with wmic, but the command needs the user account name: wmic useraccount where "name='Support'" set PasswordExpires=false I use a command like that in a .cmd I run in FirstLogonCommands for custom deployments.
  11. I typically use BisonCam / BisonCam NB Pro for testing various webcams. You can find this as the camera software for the webcams on most notebooks (Microstar, Sager, Lenovo, HP, etc). It may be labelled with a driver, but not using the driver the software has worked with (at least) testing the functionality of any webcam I have found in 10 years or so. The software installs per-user.
  12. Does there exist a list of all the protocols, destinations and ports that a Windows 10 system tries to communicate with?
  13. Not true. All Skylake systems that do not have an OS supplied by one of these 12 OEMs are also under the same situation as the Kaby Lake CPUs.
  14. RunOnce will execute under the current user context at logon. Without using something else to execute the file, you will need to invoke the rights within the .cmd file itself. There is the runas command, which you can specify a different user account to run a command with, but I believe you cannot script in a password. So it would only be useful for an account in the Administrators group (or custom group with appropriate permissions) that did not have a password on it. You should look into use Task Scheduler instead. There is more freedom to setting up the condition that way. You can say, when x user logs on, run this program as this other user.
  15. You open Regedit. Expand HKEY_LOCAL_MACHINE and make sure it is selected on the left. Click File-> Load Hive. Browse to the other hard drive to a location \Windows\System32\Config. Select the file called SYSTEM (not system.log). It will ask for a name, call it "mount_system". Now everything in there from the left is the hive from the other hard drive. You make your changes. When you are done, it is very important that you select the loaded hive on the left "mount_system" and then File->Unload Hive. You can then close regedit. Always make sure to do this or there can be problems. Regarding the registry files, there is no main file. Loading the different hives under the different main groups (HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, etc) will load different things. If you do not know which to load, fine a relative key in your regular registry. If it is HKLM\Software, you load the SOFTWARE hive under HKLM. If it is HKLM\System, then you load the SYSTEM hive. And always make sure you give the loaded hive a name that indicates it what it is, and do not give it a name that matches an existing one. If you are concerned about goofing up, make a backup of the hives on the other drive first.