|
Hi,
I need sme help regarding HIDDEN PARTITIONS.like::
What exactly it is?
What is its use?
Can we access it via any programming language(MFC/Win32 API)?
When we format whole Hard disk,hidden partition is also gets formatted or not?
Help Help Help
|
|
|
|
|
Hidden partitions are used by some disreputable manufacturers in place of Recovery CDs, also used by disreputable manufacturers but more expensive. Reputable manufacturers distribute real OS CDs with the operating system you paid for intact and licensed. Hidden partitions usually contain a system image of the original setup so that it can be easily restored by the press of a key on bootup. You may be able to access it using a custom program, depending upon the protections assigned to it, and the user permissions of the account that you use to run the program - it wouldn't hurt to try.
The FORMAT command works on logical drives, not partitions, so FORMAT C: will destroy the C: drive, but not the D: drive contained in the same extended partition. Of course, that will rarely happen, as the C: drive is usually created in a Primary partition, which can only contain one logical drive, and the rest of the logical drives on the same hard drive are created in an Extended partition (which can hold 4 logical drives). My server is a bit weird, as it has C on Drive 0, D and E on a second physical drive (Drive 1), and boots from J (on Drive 0), but that's not the norm.
The usual procedure is to use FDISK to create a Primary partition on physical Drive 0, then allocate the rest of the drive to an Extended partition. Primary partitions are bootable, so a logical drive C is created on the Primary partition. Additional logical drives are created in the Extended partition. Each logical drive is then formatted using FORMAT, and the OS is installed on the logical drive in the Primary partition. Running FORMAT on one logical drive will not affect the other logical drives on the same physical drive, or within the same partition.
"If it's Snowbird season, why can't we shoot them?" - Overheard in a bar in Bullhead City
|
|
|
|
|
Hi Roger,
But what actually i would like to know is:
(1) How I can attain a situation in which system at boot time will ask for "press h to boot from hidden partition"
(2) How I can transfer the control to hidden partiton booting.
(3) Is it possible to program BIOS?...so that at boot time it will automatically transfers control to hidden partition address.
"Everything that glitters is not GOLD"
|
|
|
|
|
hi ,
i am interested to join u r discussion.I am also dont know how os actually stores the details about hidden folder
.Is it some what related to window registry & if u both are knowing anything about win registry pls reply me
|
|
|
|
|
Hey,
This group is not for windows registry. But then also if u wanna join,we dont mind.
Actually what u want to know abt windows registry?
Be point to point.
|
|
|
|
|
Hi,
I want to know how to get the status of RAM i.e
(1) how much size it is having?
(2) How many memory locations are available(free)?
(3) How many memory locations are in bad state?
(4) what is the status of DATA BUS(working or not)?
(5) what is the status of Address BUS(working or not)?
All these things i need to check prior to OS installations.
So is there any way to get it?
Help me please
|
|
|
|
|
The Power On Self Test (POST) in the BIOS tests all these functions, then loads the OS. If the PC gets through POST, the memory is good.
"If it's Snowbird season, why can't we shoot them?" - Overheard in a bar in Bullhead City
|
|
|
|
|
POST is meant as a simple check and doesn't test memory particularly thoroughly. Also, most systems now come configured for 'Quick POST' which is even less thorough.
For a deeper memory test, try Windows Memory Diagnostic[^] or memtest86[^].
Stability. What an interesting concept. -- Chris Maunder
|
|
|
|
|
but sir can u tell me the way by which i am able to use the post execution information.if yes explain me.
|
|
|
|
|
I think these information could be obtain from the CMOS configuration. It will display for your the amount of your memory. For windows operating system if you want to check the status of the memory try to use the command mem in the MS-DOS prompt.
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
Ya mike. It is possible to execute all sorts of programs even bfor OS loads but condition is, no OS dependencies like WIn API`s etc.
-Try to get the things you like, else you will be forced to like the things you get!
Cheers
Tom;)
|
|
|
|
|
Scan all servers and change login to anonymous
|
|
|
|
|
rapace wrote:
Scan all servers and change login to anonymous
So... where is your question...???
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
my response is that when you login to a server you are generally prompted with UserID and a Password.
the question is then:
Is it possible to scan several servers and change the login userID and password to anonymous? (Therefore anyone can have access to these servers)
|
|
|
|
|
rapace wrote: Is it possible to scan several servers and change
Try username@domainname.ext but your domain must be join with other relate domain.
|
|
|
|
|
Hai,
I dont know whether this is the right place for my question...anyway...
I want to write a batch file in dos that deletes files and subfolders in a particular folder that are greater than 1 hr old.
I could'nt figure out how to that time diff.
I appriciate ur help..thanks in advance.
|
|
|
|
|
I can't recall any method of doing time/date calculations from the command line in DOS; it may not have been supported. If the OS you're using is new enough, you should be able to use the Windows Scripting Host (WSH) service to create a text file of files and folders that meet the 1 hour old criterion, then use the pipeline character to input the list to the DEL command.
"If it's Snowbird season, why can't we shoot them?" - Overheard in a bar in Bullhead City
|
|
|
|
|
You should discover the script in the microsoft scripting center.[^] It contain a lot of script that could perform a lot of task.
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
OK - this is a bit longer than I expected, but it does the job and shows you the techniques to extend it. This code does assume that you are running WinNT 4 or later. I have only tested it on XP.
You can find lots of info about building batch files in Windows NT Shell Scripting, by Tim Hill. A chapter of this book is available on the Code Project web site.
Mark
=============== batch script ======================================
@echo off
setlocal enabledelayedexpansion
::===============================================================
:: Oldfiles.bat
:: Usage: Oldfiles [minutes]
:: Arguments: Minutes - the maximum age of files
::
:: This script looks through the files in the current directory
:: (and its sub-directories) and lists all the files that are older
:: than the number of minutes entered on the command line.
:: Specify the number of minutes to check for
if [%1]==[] (
set /a AGELIMITMIN = 60
) else (
rem This should fail if %1 is not a valid number
set /a AGELIMITMIN = %1
)
rem Note that %TIME% is in 24 hour format, unlike the timestamp on files
echo %TIME%
:: format hh:mm:ss.ss - 24hr clock
for /f "tokens=1-3 delims=: " %%a in ("%TIME%") do (
set CHH=%%a & set CMIN=%%b & set CSS=%%c
)
echo %DATE%
:: format DDD MM/DD/YYYY
for /f "tokens=1-4 delims=/ " %%a in ("%DATE%") do (
set WDAY=%%a & set CMON=%%b & set CDD=%%c & set CYYYY=%%d
)
::strip any leading zeros so the math will work (leading zeros imply octal)
::hours don't have leading zeros, just a leading space
if %CSS% LSS 10 set CSS=%CSS:~1,1%
if %CMIN% LSS 10 set CMIN=%CMIN:~1,1%
rem knock off any leading or trailing spaces
set /a CHH = CHH
set /a CDD = CDD
set /a CMON = CMON
::calculate the number of minutes since the start of the month
set /a TMSTAMP = CDD*24*60 + CHH*60 + CMIN
set /a LIMITSTAMP = TMSTAMP - AGELIMITMIN
echo CurMin = %TMSTAMP% LIMIT = %LIMITSTAMP%
rem here's where we set the time period of 1 hour
if %LIMITSTAMP% LSS 0 (
echo This program does not work in the first
echo %AGELIMITMIN% minutes of a month!!
echo Quitting
echo.
goto :EOF
)
rem echo %HH% %MIN% %SS%
rem echo %WDAY% %DD%/%MON%/%YYYY%
::loop recursively through all the files in the current directory
:: and all lower directories
for /r %%I in (*.*) do (
rem echo %%~tI %%I
set OLD=TRUE
rem MM/DD/YYYY HH:MM PM
call :PARSEFILETIME %%~tI
set /a FTMSTAMP = DD*24*60 + HH*60 + MIN
rem Find any files that are older than the limit
rem these checks assume that AGELIMIT is less than a month
if !YYYY! GEQ !CYYYY! (
if !MON! GEQ !CMON! (
if !FTMSTAMP! GEQ !LIMITSTAMP! (
rem file is newer than the cutoff time
set OLD=FALSE
)
)
)
if [!OLD!]==[FALSE] (
echo %%I is new enough. %%~tI !HH!:!MIN! !FTMSTAMP!
) else (
rem Here is where you would delete old files
rem or you could accumulate the names in a file
rem for later deletion
rem echo %%I is too old and will be deleted.
)
)
::Now loop through the directories
for /r /d %%I in (*.*) do (
rem echo %%~tI %%I
set OLD=TRUE
rem MM/DD/YYYY HH:MM PM
call :PARSEFILETIME %%~tI
rem echo !YYYY!/!MON!/!DD! !HH!:!MIN!
set /a FTMSTAMP = DD*24*60 + HH*60 + MIN
rem Find any directories that are older than the limit
rem these checks assume that AGELIMIT is much less than a month
if !YYYY! GEQ !CYYYY! (
if !MON! GEQ !CMON! (
if !FTMSTAMP! GEQ !LIMITSTAMP! (
rem file is newer than the cutoff time
set OLD=FALSE
)
)
)
rem echo %%I %%~tI !FTMSTAMP!
if [!OLD!]==[FALSE] (
echo %%I is new enough. %%~tI !HH!:!MIN! !FTMSTAMP!
) else (
rem Here is where you would delete old directories
rem echo %%I is too old and will be deleted.
)
)
goto :EOF
::================================================
:: PARSEFILETIME
:: Arguments: Timestamp
:: format MM/DD/YYYY HH:MM PM (format from %~t)
:: Returns: sets variables MON, DD, YYYY, HH, MIN
::================================================
:PARSEFILETIME
set RET=FALSE
rem Should do some checks for valid format
for /f "tokens=1-6 delims=:/ " %%a in ("%*") do (
set MON=%%a
set DD=%%b
set YYYY=%%c
set HH=%%d
set MIN=%%e
set AMPM=%%f
)
rem set /a math thinks leading zeros imply octal numbers,
rem so get rid of them
if %MON% LSS 10 set MON=%MON:~1,1%
if %DD% LSS 10 set DD=%DD:~1,1%
if %HH% LSS 10 set HH=%HH:~1,1%
if %MIN% LSS 10 set MIN=%MIN:~1,1%
rem echo !MON! !DD! !YYYY! !HH! !MIN!
rem deal with 12:30 am = 00:30 hrs and 12:30 pm = 12:30 hrs
if !HH! EQU 12 set /a HH=!HH! - 12
if [%AMPM%]==[PM] set /a HH=!HH! + 12
rem Should return false if format is wrong
set RET=TRUE
goto :EOF
|
|
|
|
|
Hi,
I have an email server: MS Exchange Server
How can I configure the email server checks for valid email address before sending
Thanks in advance
|
|
|
|
|
As far as I'm aware Exchange already checks for address validity. It's a tricky thing to check as although RFC2822[^] lists the valid characters, in practice some email systems do not conform to this specification and permit characters not permitted in RFC2822.
If a user specifies an address that is not a valid domain (right-hand side of @), Exchange (if configured for direct delivery) will be unable to resolve the MX records in DNS for that domain, and will abandon the message with a non-delivery report [NDR] (a type of delivery status notification [DSN]). If a user specifies an invalid local-part (left-hand side of @), the receiving server will abandon the message with its own NDR. If the return address is invalid or incorrect, Exchange will abandon sending the NDR. If it detects that it would be trying to send an NDR for an NDR in response to a message that it originated (detecting its own address in the Received headers), it will not send the NDR.
If you're configured to use a Smart Host, Exchange will pass outgoing messages directly onto the smart host rather than checking the domain part. If the domain part is invalid the smart host will generate an NDR.
By default Exchange attaches the whole of the original message to the NDR when it is generated. We have had a problem with our upstream ISP blocking access to their SMTP server (we use a Smart Host configuration) due to a large amount of viral content originating from our server. Investigation showed that this was incoming viral content that couldn't be delivered to a user on our server (invalid destination address), and therefore was attached to the NDRs.
I've now limited the maximum size of any DSN to strip off any attachments, which saves bandwidth. To do this, see XCON: Option to Strip Attachments for Messages That Generate an NDR[^]. You must spell the registry keys exactly as written - even if you think it's misspelled! This originally caught me out.
To check your Exchange setup for errors, download the Exchange Best Practices Analyzer Tool[^].
Stability. What an interesting concept. -- Chris Maunder
|
|
|
|
|
How to create a Virtual Drive as like GMail Drive.
Purpose : Sync Files local Machine to Server Storage Area. (as like Gmail Drive and its Properties.)
can this done using Shell Programming ?
pls suggest.
Sriram
|
|
|
|
|
I found the way to mount and create virtual drive for floopy disk in here.[^] Please check it and let me know whehter is match what you need or not...
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|
|
Hi there.
Thanks for your link. its really nice.
i have a requirement of Creating a Virtual Drive as like Google Gmail Drive.
any other source of Creating Virtual Drive as like VFD ?
Regards
Sriram
|
|
|
|
|
Try to search in www.google.com .
A thousand mile of journey, begin with the first step.
APO-CEDC
Save Children Norway-Cambodia Office
|
|
|
|