Archive

Archive for the ‘System Utils’ Category

NetUse

NET USE command is used to associate a local drive letter or device name with a shared network drive or device. Most often, the NET USE command is used for network drive mapping.

The NET USE command can be used also to disconnect a computer from a shared resource, or to display information about computer network connections.

The NET USE command also controls persistent net connections.

What network resource can I connect to using NET USE?

When connecting to a network device using the NET USE command or the NET CONNECT command, you can connect to any of the following:

  • printer – LPT1 thru LPT4,
  • serial port – COM1 thru COM4,
  • AUX1 thru AUX4
  • logical drive – A: thru Z:

Logical drives are most commonly referenced devices when using the NET USE command.

Difference between NET USE and NET CONNECT

The commands NET USE and NET CONNECT are interchangeable. Originally IBM introduced the NET USE command and Microsoft used the NET CONNECT command. The NET USE command is being used more often now and is the preferred method these days.

Where NET USE is used?

The NET USE command is only available on client computers, that is most often on desktop workstations. A “client computer” in this context refers to the relationship of the computer not to the physical configuration. A client computer is the one that connects to somewhere, the one that relies on the target resource. The NETWORK.COM or CLIENT.COM modules need to be loaded for this command to work.

Before you can use any network device or drive, it must have been previously shared using the NET SHARE command from the server machine.

How do I display a list of network connections on my computer?

When you use the NET USE command without parameters NET USE retrieves a simple list of network connections. Go to your Start menu, click Run, type cmd and hit enter. Then, type NET USE and you will see a screen similar to the following output:

Status Local Remote Network
——————————————————————————-
OK H: \\client-0001\C$ Microsoft Windows Network
OK O: \\client-0105\shared Microsoft Windows Network
OK P: \\192.168.10.128\QRM Microsoft Windows Network
OK S:  \\1-nas01\teamddm Microsoft Windows Network
Disconnected X: \\01-antivirus-s\mcafeedat Microsoft Windows Network
The command completed successfully.

The NET USE is very useful to get a list of connected network devices. If  you need information about some particular network resource that you are connected to, you can use the following command:

NET USE [DeviceName]

For example, this would be the output for “NET USE H:” where “H” is your network drive.

Local name H:
Remote name   \\client-0001\C$
Resource type Disk
Status OK
# Opens 1
# Connections 1
The command completed successfully.

How do I make network connections persistent (available after reboot)?

When mapping a network drive, you can tell the computer to remember your mapping after you restart the computer. If you want to make all future connections are persistent (auto-reconnect at login), use the following:

NET USE /Persistent:Yes

or

NET USE /P:Yes

If you want to make all future connections non-persistent, use the following:

NET USE /Persistent:No

or

NET USE /P:No

In this case, mapping will be lost when the computer is restarted.

How do I connect a user to his or her HOME directory?

Connecting a user to his or her HOME directory is often used in corporate setting where each user is allocated some space on the network in addition to his or her personal computer. Making this network location available every time the user logs into his or her computer can be accomplished using the NET USE command in a login script. The following is the way it works:

NET USE [devicename | *] [password | *]] [/HOME]

for example:

NET USE H: /Home

The devicename in this case is the HOME server/folder that is defined in Active Directory (ADUC).

In case you need to use the NET USE command to connect to a password protected file share, use the following:

NET USE [driveletter:] \\ComputerName\ShareName[\volume] [password | *]

[/USER:[domainname\]username] [/PERSISTENT:No]

The following are a few examples of this:

NET USE H:\\CorporateFileServer\Users\%Username%

NET USE W: \\CorporateFileServer\GroupShare /Persistent:No

Are you wondering what the /USER is?

How to specify USER in NET USE?

If you deal with enterprise security, you may need to provide user name to the NET USE command. There are two notations for giving it the user name. In the NET USE command /USER can be specified as:

[/USER:[dotted domain name\]username][/USER:[username@dotted domain name]

Both work the same way.

Another example is:

NET USE X: \\client-0001\ernesto /USER:cappello

This command map the disk-drive device name X  with “ernesto” folder shared from “client-001” server using “cappello” account.

If you use SAMBA to share a folder from the server, you have to use:

NET USE X: \\SERVERNAME\FOLDER <SAMBA PASSWORD> /USER:<SAMBA ACCOUNT>

therefore

NET USE X: \\client-0001\xarabas_shared ********* /USER:xarabas

How do I disconnect from a share using NET USE?

If you no longer need a connection to the network share, it is a good idea to disconnect from it so that it does not drain system and network resources. You can do so by using the following NET USE command:

NET USE [driveletter:] /DELETE

This should disconnect.

Important note: You cannot disconnect from a shared directory if you use it as your current drive or if an active process is using it. You can find out whether anything is using your drive by typing the NET USE [driveletter]:

Possible problem with NET USE

Mapping to a resource shared on the network using the NET USE command has some peculiarities. You can encounter a problem when trying to connect to a network share right after you map to it (when doing so in a script).

This is because the execution of the NET USE takes some time. When using the NET USE command in a script to map to a network drive, you may want to wait until the mapping has completed before continuing with further scripting commands.

START /wait NET USE [driveletter:] \\ComputerName\ShareName

In our example we have:

Un altro esempio più specifico è :

START /wait NET USE X: \\client-0001\ernesto

The start /wait switch ensures that files can be read from the mapped drive immediately, in other words that subsequent commands in your script execute only after mapping is complete.

Syntax problem with NET USE

When using the NET USE command, you can run into some syntax-related errors. The System error 67 occurred is a very common one.

Also, if the ServerName that you provide contains spaces, you need to use quotation marks around the text. (that would be for example “Server Name”) Not providing quotation marks results in an error message: System error 85 has occurred.

Are there other related useful networking commands?

The NET SHARE command is used at the server to share a folder to others. If you want to access this shared resource from a client, you would use the NET SHARE command.

This page provides an overview of all available networking server commands: server NET commands.

NET USE syntax

The following is the syntax for NET USE:

net use

[{DEVICE | *}]

[\\COMPUTER\SHARE[\VOL]]

[{PASSWORD | *}]]

[/USER:[DOMAIN\]USER]

[/USER:[DOTTEDDOMAIN\]USER]

[/USER: [USER@DOTTEDDOMAIN]

[/SAVECRED]

[/SMARTCARD]

[{/DELETE | /PERSISTENT:{yes | no}}]

net use [DEVICE [/HOME[{PASSWORD | *}] [/DELETE:{yes | no}]]

net use [/PERSISTENT:{yes | no}]

That is about it.

CheckDiskGUI, a Graphical User Interface for the Windows CHKDSK utility

CheckDiskGUI

Do you want to check local disk drives for basic file structure, bad file records and other common disk errors in Windows? Unfortunately, the native check disk utility to scan drives for errors and issues is not user friendly. You can launch disk check utility from Windows Start Search or Run window by typing chkdsk, which runs in Command Line environment.

CheckDiskGUI is a simple Graphical User Interface (GUI) for Windows chkdsk utility which allows you to easily select drives, scan them, and analyze disk issues report.

It is similar to the fsck command in Unix operating systems that displays the file system integrity status for hard disks and floppy disk and can fix logical file system errors.

Just like Disk Check utility for Windows XP and earlier versions, it presents simple Fix and Fix and Recover options to deal with disk related issues. You can alternatively choose to only scan the disk without recovering data and performing other data loss fixes.

On the main interface, you can see all the local disk drives. You can scan multiple disks in on go or choose to scan only one disk drive at a time. From right side, choose the scan type, Read Only, Fix, or Fix and Repair to run the scanning process. It displays current disk scanning process which is being performed in Message box.

chkdisk 2

Underneath the bottom window, you can see total files which are to be scanned. If you’ve selected to only scan the drives, analyze scanning results to decide whether to apply fixes and perform recovery operation by clicking the respective option. During testing, we didn’t notice any problems while performing the disk scan, fix and recovery operations. It works on all versions of Windows.

Homepage: http://www.wieldraaijer.nl/others.html

Windows Problems Remover is Malware

3 February 2011 1 comment

Windows Problems Remover

Windows Problems Remover is a fake rogue anti-spyware program that is part of the Fake Microsoft Security Essentials infection. When this infection is installed on your computer it will display a fake Microsoft Security Essentials alert that states that it has detected an Unknown Win32/Trojan on your computer.

Windows Problems Remover screen shot


When your computer reboots you will be presented with the Windows Problems Remover screen before your normal Windows desktop is shown. It then prompts you to scan your computer, which will state that your computer is infected with numerous infections. In order to get to your normal Windows desktop, you will need to close the Windows Problems Remover program when it has finished its fake scan. As you can see this program is a scam as it is ransoming the proper operation of your computer until you purchase it. It goes without saying that you should not purchase this program for any reason.

While the program is running it will also display fake security alerts that are further used to scare you into thinking that your computer has a serious problem. Some of these alerts include:

System Security Warning

Attempt to modify register key entries is detected. Register entries analysis is recommended.

System component corrupted!

System reboot error has occurred due to lsass.exe system process failure.

This may be caused by severe malware infections.

Automatic restore of lsass.exe backup copy completed.

The correct system performance can not be resumed without eliminating the cause of lsass.exe corruption.

Warning!

Name: firefox.exe

Name: c:\program files\firefox\firefox.exe

Application that seems to be a key-logger is detected. System information security is at risk. It is recommended to enable the security mode and run total System scanning.

Just like the fake scan results, these alerts are also fake and are only being used to scare you into purchasing the program. Therefore, please ignore them.

As you can see, Windows Problems Remover was created to scare you into thinking your computer has a severe security problem so that you will then purchase this program. For no reason should you purchase Windows Problems Remover, and if you already have, you should contact your credit card company and dispute the charges stating that the program is a computer infection. Finally, to remove this infection, and any related malware, please use the removal guide below.


Automated Removal Instructions for Windows Problems Remover using Malwarebytes’ Anti-Malware:

  1. Print out these instructions as we may need to close every window that is open later in the fix.
  2. It is possible that the infection you are trying to remove will not allow you to download files on the infected computer. If this is the case, then you will need to download the files requested in this guide on another computer and then transfer them to the infected computer. You can transfer the files via a CD/DVD, external drive, or USB flash drive.
  3. The Windows Problems Remover infection will start before your normal Windows desktop appears. To access your desktop we first need to allow it to perform it’s fake scan. Therefore, when it tells you that it must perform a scan press the OK button to allow it to do so. Windows Problems Remover will now perform a fake scan and then state you need to open the License Manager. Press the OK, Open the license manager button. You will now be at a screen where you can close the program by clicking on the X at the top right of the Windows Problems Remover Window. Shown below is an image of the program screen that shows the location of the X, designated by the black arrow, that you should click on to close the program. Once you close the program, your Windows Desktop will load normally.Now that your Windows Desktop is available, we can continue with the rest of the removal process.
  4. Before we continue we should also terminate the Windows Problems Remover infection so that it does not interfere with the cleaning procedure. To do this, please download RKill to your desktop from the following link.

    RKill Download Link – (Download page will open in a new tab or browser window.)

  5. When at the download page, click on the Download Now button labeled iExplore.exe download link. When you are prompted where to save it, please save it on your desktop.
  6. Once it is downloaded, double-click on the iExplore.exe icon in order to automatically attempt to stop any processes associated with Windows Problems Remover and other Rogue programs. Please be patient while the program looks for various malware programs and ends them. When it has finished, the black window will automatically close and you can continue with the next step. If you get a message that RKill is an infection, do not be concerned. This message is just a fake warning given by Windows Problems Remover when it terminates programs that may potentially remove it. If you run into these infections warnings that close RKill, a trick is to leave the warning on the screen and then run RKill again. By not closing the warning, this typically will allow you to bypass the malware trying to protect itself so that RKill can terminate Windows Problems Remover . So, please try running RKill until the malware is no longer running. You will then be able to proceed with the rest of the guide. Do not reboot your computer after running RKill as the malware programs will start again. If you continue having problems running RKill, you can download the other renamed versions of RKill from the RKill download page. All of the files listed there are renamed copies of RKill, which you can try instead. Please note that the download page will open in a new browser window or tab.
  7. Next we have to do is fix your Windows Registry Shell value. If we do not fix this entry and is deleted, then your Windows desktop will not be displayed the next time you reboot.To fix the Shell entry, simple download the following file to your desktop. If you are having trouble downloading the file, try right-clicking on it and selecting Save as.Shell.reg Download Link
  8. Once Shell.reg has been downloaded, locate it on your desktop and double-click on it. When Windows asks if you would like the data to be merged, please allow it to do so.
  9. Now you should download Malwarebytes’ Anti-Malware, or MBAM, from the following location and save it to your desktop:Malwarebytes’ Anti-Malware Download Link (Download page will open in a new window)
  10. Once downloaded, close all programs and Windows on your computer, including this one.
  11. Double-click on the icon on your desktop named mbam-setup.exe. This will start the installation of MBAM onto your computer.
  12. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and  Launch Malwarebytes’ Anti-Malwarechecked. Then click on the Finish button. If MalwareBytes’ prompts you to reboot, please do not do so.
  13. MBAM will now automatically start and you will see a message stating that you should update the program before performing a scan. As MBAM will automatically update itself after the install, you can press the OK button to close that box and you will now be at the main program as shown below.
    MalwareBytes Anti-Malware Screen
  14. On the Scanner tab, make sure the the Perform full scan option is selected and then click on the Scan button to start scanning your computer for Windows Problems Remover related files.
  15. MBAM will now start scanning your computer for malware. This process can take quite a while, so we suggest you go and do something else and periodically check on the status of the scan. When MBAM is scanning it will look like the image below.
    MalwareBytes Anti-Malware Scanning Screen
  16. When the scan is finished a message box will appear as shown in the image below.
    MalwareBytes Anti-Malware Scan Finished Screen

    You should click on the OK button to close the message box and continue with the Windows Problems Remover removal process.

  17. You will now be back at the main Scanner screen. At this point you should click on the Show Results button.
  18. A screen displaying all the malware that the program found will be shown as seen in the image below. Please note that the infections found may be different than what is shown in the image.
    MalwareBytes Scan Results

    You should now click on the Remove Selected button to remove all the listed malware. MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so. Once your computer has rebooted, and you are logged in, please continue with the rest of the steps.

  19. When MBAM has finished removing the malware, it will open the scan log and display it in Notepad. Review the log as desired, and then close the Notepad window.
  20. You can now exit the MBAM program.

Hide or remove user account on Windows Vista/7 welcome login screen

14 January 2011 3 comments

Hide or remove user account on Windows Vista/7 welcome login screen

Many people use their computer on sharing basis with other users normally other people have their separate account, but some time you may not want other to see your user account on login screen, Windows allows you to remove your user account and hide it from from being displayed at the welcome login screen.

  1. Click “Start” e choose “Run
  2. Type “regedit
  3. Go to “HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon
  4. In the left panel, right click on “Winlogon” and click “New” and click “Key“.
  5.  

     

  6. Type “SpecialAccounts” and press “Enter“.
  7. In the left panel, right click on “SpecialAccounts” and click “New” and click “Key“.
  8. Type “UserList” and press “Enter“.
  9.  

     

  10. In right panel of “UserList“, right click on a empty area and click “New” then click “DWORD (32bit) Value“.
  11.  

     

  12. Type in the name of the user account that you want to hide and press Enter. For example the Synchronizator Account.
  13. In the right panel, right click on the user account name and click Modify.
  14. To hide the user account – Type “0” and click “OK“. (number zero not the letter)

VI: Whenever you want to use the account just unhide the it by typing 1 instead of zero.

DriverBackup

DriverBackup

DriverBackup is a fast and user-friendly free tool for drivers’s backup, restoration and removal with command line options, automatic restoration from CD\DVD and path formatting.

DriverBackup! includes also an interactive command line builder.

After downloading the compressed file (saved in .RAR, manageable by software such as WinRAR or IZArc or 7-Zip), you have to extract the contents to a folder of your choice (maybe a USB stick), to start Driver Backup tool you can start the tool double click the file “DrvBK.exe”.

By default, the interface will show Driver Backup nevertheless to translate English into Italian, simply click on Language menu and choose Italian.

In the main window, after a rapid analysis of device drivers on your system, the software will display the full list. By clicking All, OEM and Third Parties, the program will list, respectively, all drivers, those used by default in Windows and those of Third-party installed manually.
A copy of the device drivers can be saved by clicking on “Start Backup” button. Driver Backup proposes the list of drivers selected and the disk space required to create the copy security.For the operation of a driver, in fact, it may be necessary only one file. inf or dozens of different files.

OS: Windows XP, Windows Vista, Windows 7 (it does not work with Windows 2000)

Homepage: http://sourceforge.net/projects/drvback/

Download Page (version 2.1): http://sourceforge.net/projects/drvback/files/DriverBackup%21%202/DrvBK%202.1/DrvBK_21_Rev4.rar/download

IObit SmartDefrag

IObit SmartDefrag

Disk fragmentation is generally main cause of slow and unstable computer performance. Smart Defrag helps defragment your hard drive most efficiently. Smart Defrag not only defragments computer deeply but optimizes disk performance. With “Install it and forget it” feature, Smart Defrag works automatically and quietly in the background on your PC, keeping your hard disk running at its speediest. Slow down, freeze-ups and crashes will be a thing of the past. Smart Defrag is 100% free for home, organization, and business.

Features of this powerful, award-winning defragmenter program include:

  • An “Install It and Forget It” feature that works automatically and quietly in the background on your computer.
  • The ability to constantly keep your hard drive safe, error-free and running at its top speed and optimum performance.
  • Eliminates slow downs, freeze-ups and crashes.
  • IObit SmartDegrag is 100% FREE award-winning software that’s for personal, home and small business.
  • 100% safe from any spyware, adware and virus.
  • Designed for Windows Vista, XP, and 2000.
  • Distribute it freely, copy it, sell it or include it as part of a package – as long as it is left completely intact and unchanged.

OS: Windows 7, Vista, XP, and 2000

License: Freeware

Homepage: http://www.iobit.com/iobitsmartdefrag.html

Download: http://download.iobit.com/DefragSetup.exe

IObit Sma

Speccy

22 November 2010 1 comment

Speccy

Speccy is an advanced System Information tool for your PC. Need to find out what’s inside your computer? No problem! Speccy will give you all the information you need.

What’s in your computer? If you’re like most of us, you can probably name the processor (Intel or AMD, Celeron or Pentium), maybe how much RAM it has, and maybe how big the hard drive is.

When you go to a computer store and see all the bright shiny PCs laid out next to each other, most will have tags or stickers indicating the:

  • Processor brand and model
  • Hard drive size and speed
  • Amount of memory (RAM)
  • Graphics card
  • Operating system

Two or three years later, when it comes time to upgrade your computer, that tag or sticker may be long gone. Speccy was designed as a free electronic “what’s inside” sticker for your PC.

Isn’t this information in Windows?

Yes and no. Some of the basic information can be found by right-clicking My Computer and then clicking Properties. The General tab lists some statistics, and the Device Manager on the Hardware tab lists all of the hardware you’ve got installed. But it misses out lots of information that you need.

Speccy will give you detailed statistics on every piece of hardware in your computer. Including CPU, Motherboard, RAM, Graphics Cards, Hard Disks, Optical Drives, Audio support. Additionally Speccy adds the temperatures of your different components, so you can easily see if there’s a problem!

Why do I need Speccy?

At first glance, Speccy may seem like an application for system administrators and power users. It certainly is, but Speccy can also help normal users, in everyday computing life.

If you need to add more memory to your system, for example, you can check how many memory slots your computer has and what memory’s already installed. Then you can go out and buy the right type of memory to add on or replace what you’ve already got.

If you’re going to be selling your PC, you can use Speccy to quickly list out the components. Or, if you’re buying a PC, you can use Speccy to check that the computer has what the label says it has.

Also, Speccy comes in handy for support. If you’re on the phone with technical support and they want to know what video card you have installed, there’s no need to hunt around Windows. Speccy has all the information on one easy-to-understand screen.

License: Freeware

Homepage: http://www.piriform.com/speccy

Download: http://www.piriform.com/speccy/download/standard

%d bloggers like this: