Especially when updating Adobe Flash Player components (for example, Flash10k.ocx) at Secunia’s behest after updating that software for security reasons, I have to jump through some hoops to delete the offending file. Until recently, this meant shutting down Secunia altogether (it uses Flash, too, and thus locks the very file it seeks to have removed) so that I could delete that file, then restarting it to restore my system to normal operation.
This also pops up occasionally in other situations, either because a file is locked by the OS, in use by an application, or otherwise declared off-limits for deletion. I’ve even resorted to booting my system into Linux, then running an NTFS file system driver, to hunt down and remove the most stubbornly insistent of Windows files. No more!
I stumbled across a great, free utility called Unlocker this weekend (here’s a link to the FileHippo download, but you can grab this puppy from any or all of the major shareware sites including CNET, SoftPedia, and so forth, as well). I found myself facing the need to delete some orphaned Windows Update files left behind by Vista or XP on my Asus EeePC 1000HE notebook this weekend, and found reference to this utility in forum posts that explained how to root out and remove these items. Here’s a screencap of the soon-to-be-deleted items from the Recycle Bin after Unlocker worked its magic:
Unlocker moved the 2e242ef69985… directory and all of its contents into the Recycle Bin
The software installs quickly and easily (warning: Unlocker Assistant works fine with XP, but with neither Vista nor Windows 7), and you can invoke the program through the Start button menu hierarchy (Start Unlocker) or right-click on an object inside Windows Explorer to take advantage of the program’s shell extension. After that, you can choose to delete any object you want inside the Windows file system. Obviously this means you’ll need to proceed with caution because the tool will cheerfully and compliantly trash key Windows files as well as other items perhaps more worthy of deletion. A great tool, even so!
French developer Cedrick Collomb did a nice job with this tool. But it will inform you that a more recent version is available when you first run it, even though activating the supplied link for same triggers a 403 (Access forbidden) HTTP error. I’ve e-mailed him to see if this can be fixed, but in the meantime you’ll need to stand pat with version 1.9.0 which, as I’ve already mentioned, is widely available on major shareware and download sites. Enjoy!
I’ve got an Asus EeePC 1000HE netbook, and this weekend I went through a machine refresh for the Windows 7 Professional installation on that machine (I could run Windows 7 Starter on this box, and very well might if I had to pay retail for my Windows OSes, but I like the ability to use RDP to remote in from my primary desktop when I’m working at home). I finally got around to reading the Asus Windows 7 “Self-Upgrade” guide and learned that I should update my BIOS and some drivers to get the best performance from this unit. Along the way, I also learned some interesting lessons, and made some equally interesting observations.
Asus offers a ROM-driven EZ Flash utility on its notebook and netbook PCS — and for all I know, for its motherboards, too…goes off to look, and yes it applies to some, but not all Asus motherboards as well — that lets you simply copy a BIOS update to the root of a UFD and use it at boot time to flash the BIOS. Interestingly, this utility only works with UFDs formatted in the FAT16 format. I tried a FAT32 formatted UFD, and while the utility found the file and said it was reading it, it hung without changing anything until I switched the formatting over to FAT16 (described simply as FAT in the Microsoft Format tool)
How the Win7 Format Utility Reports FAT16: It Appears as Plain “FAT” format
And, of course, to format a UFD to FAT/FAT16, it must be 4 GB or smaller in size (Windows won’t let you format a larger UFD to FAT16 because 4GB is its absolute file/volume size limit). Once I figured this out, everything went pretty smoothly with the BIOS update, and when installed it did shave about 22 seconds off my previous boot time, as reported in Soluto for that machine.
I also learned that while some 1000HE models support AHCI for speedier SATA access, my machine isn’t one of those (and that dampens my enthusiasm for installing an SSD in that box because it will limit its performance as well). I went through a few interesting contortions to get all the right drivers installed too, particularly the x86 PC ACPI driver that the 1000HE needs to enable use of its various control and function buttons. The “key” to that problem was to find and install a Windows 7 “EeeInstantKey” utility which not only provided programmatic access to key management functions, but the necessary Windows 7 driver as well (it doesn’t show up in Device Manager so it’s not directly accessible for update through more conventional techniques).
For a while, during the period when all the new drivers and software changes were taking root, my boot time zoomed from around 2:35-2:45 to a whopping 8 minutes. But after all the installs and refreshes took hold, the boot time dropped to 2:08-2:15. I’m not sure the results justify the efforts that went into obtaining them, but I did get to learn quite a bit along the way.
Check out this TechNet blog: “Microsoft Research – free holiday booty.” It profiles and depicts five very cool, free tools you can download and play with from Microsoft Research:
- Kodu comes from the FUSE labs team. It’s a visual programming language built specifically for creating games that’s also simple and fun enough to appeal to kids, and let them get right to work.
- AutoCollage is a program that uses computer vision and image processing to make collages from a collection of photos. It uses face detection, various relevancy and saliency filters, and other cool MS technologies to grab interesting parts of pictures, and then employs object selecting and blending technologies to combine images into an AutoCollage. Neat!
- Photosynth takes photos and combines them to create a 3D scene from their visual content, and provides a POV (point of view) engine that then lets you view and move around inside that virtual world. This technology has been used by organizations that include National Geographic, NASA, and the Obama inauguration team to create “synths,” among thousands of other such environments also available online.
- WorldWide Telescope provides tools for viewing our universe but also enables developers to produce customized visualizations for astronomical and planetary data. It’s a real tour-de-force illustration of effective data use, and should become a popular and powerful educational tool at all levels.
- Team Crossword is another FUSE labs goody — namely, a Web-based collaborative tool for creating and sharing crossword puzzles with your friends. Use it to start a puzzle, and then invite friends and colleagues to work together to solve it!
I hope you get time to look at and play with at least one or two of these items as you while away the hours before we all go back to the grind next Monday. Happy New Year!!
In keeping with my wont to look for and report on the lighter side of IT during that fallow period between Christmas and New Year’s here’s a terrific slide show from eWeek.com. Entitled “Kroll Ontrack’s Top 10 Data Storage Disasters of 2010.” Like the old Letterman Top 10 Lists, it’s numbered in reverse order and includes the following items:
10. A Square Peg in a Round Hole: a laptop gets fried when the wrong charger gets plugged into its power port
9. Double Data Recovery: A foolproof redundant backup scheme fails when somebody accidentally overwrites data on a set of six drives stored in a fireproof safe
8. Keeping the memories alive: Kroll saves precious memories when they recover the only photos remaining of a now-deceased family member from the wiped drive on a stolen (and recovered) laptop
7. Meat the experts: hard disk meets cured ham but data recovery is a complete success
6. Up in the air: a frequent flyer leaves a laptop in an airport coffee bar; subsequent detonation by the bomb squad prevents any data recovery
5. The flying squash: a woman in a hurry to get to work puts her notebook on top of her car to buckle her child into its car seat; when she backs out of the garage, the laptop flies off the car and she runs over the HD; no recovery possible
4. Laptop kitty disaster: when a young kitten uses a laptop for a litter box, Ontrack recovers the HD contents anyway
3. Fire drop: When running out of his burning apartment to escape a fire, a photographer drops his notebook; Ontrack still manages to score a complete recovery of precious photos for charity work
2. The Ants Go Marching In: After a flood in Europe leaves a PC submerged for over two days, its drive is sent to Ontrack for recovery, where an ant is found clinging to a drive head. The data survives, but the ant is a goner.
1. Laptops underwater: To protect his laptop during a beach visit, a man stashes it inside a plastic bag and takes it swimming with him. The bag leaks, but Ontrack manages to recover the data anyway.
I’m glad I’ve never left a laptop atop my car: I’ve sure sent plenty of cups and bottles flying, though. Nice to know occasional moments of lunacy or thoughtlessness never go completely unnoticed. Here’s a case where 80% of incidents result in recovery of some or all the potentially lost data, albeit at considerable cost. Happy New Year!
In researching a vexing IE problem on one of my Windows 7 desktops, I stumbled across a treasure trove of troubleshooting tools that are readily available to all Windows 7 users and admins. I had never run across many of these, and am glad to have a new place to turn when trouble pops up and is in need of shooting. Here’s what you can do to see Windows 7 long and impressive list of troubleshooting tools (aka “troubleshooters”).
1. Click Start, Control Panel.
2. If in icon view, click “Troubleshooting;” if in category view type “Troubshooter” into the search box.
3. Either way, click “Troubleshooting.”
4. Click “View All” in the left hand column of the Troubleshooting window to produce a complete list of troubleshooting utilities.
Windows 7 Complete List of Troubleshooters
The one that caught my eye was entitled “Internet Explorer Performance,” where you’ll find a tool to check for defective add-ons (a common cause of IE issues on my own and many other machines). There are quite a few others worth exploring there, too: check it out!
Wow! I just scanned through the Windows 7 news reports on Google, and found myself inundated with information, plans, and announcements related to Windows 7 on tablet PCs. Topics covered under this general heading include everything from rumors and reports of planned changes to the Win7 OS itself to support ARM and other non-traditional processors, to mostly CES-related announcements from numerous notebook PC vendors with so-called Windows 7 tablets in their futures (including MSI, Asus, HP, ECS, Toshiba, Samsung, IN Media, and many others).
Aside from seeking to address a bad (and richly deserved) case of “iPad envy,” what’s really going on here? After just traveling with a 15″ notebook PC (an HP dv6) in coach on Delta, I think I can understand the desire for a light and compact machine that makes working on the plane less of a travail, but I’m not sure that a tablet is the answer for those interested in more than reading e-mail, catching up on Facebook, and surfing the Web.
Looking beyond home and consumer situations, where tablets are sure to be a big hit (for many of the same reasons that the iPad continues to rule the touch-based “thin and light” machine realm), the only place I really see touch-based units succeeding is in special-use applications: the signature pad and tracking devices that both UPS and FedEx use; the tracking and reporting handhelds that nearly every service and utility tech seems to carry nowadays; ditto for rental car check-in devices; and so forth. I could see an entirely usable replacement for medical staff who routinely carry a clip-board with tracking, status, and other forms, but I’m not sure there’s enough other stuff like that going on in the corporate world to justify a big influx of tablets for more general applications.
If you think I’m wrong, or have other examples of situations and applications tailor-made for tablet use, please share them here. Otherwise, I’m thinking that conventional desktop and notebook PCs will continue to function as the corporate information consumption and creation tools of choice for the foreseeable future.
Those who read my blog regularly know that Paul Thurrot and his SuperSite for Windows often provide grist for this particular mill. Today I’d like to point at two of his recent and stellar efforts in exploring how Microsoft can improve on what it did right with Windows 7, and do even better with Windows 8 — namely:
- How Microsoft Can Fix Windows 8, Part 2: Virtualize Compatibility
- How Microsoft Can Fix Windows 8, Part 1: User State Virtualization
In the first item in this two-part series, Thurrot makes the point that Microsoft defines “…user state virtualization as a way to ‘separate the user’s data and settings from the physical device and replicate it centrally…’” and then goes on to observe that “…Windows should be configured in such a way that these things are separated in separate hard drive partitions or, preferably, on separate physical disks. Furthermore, the user data and settings should be replicated to some central location for redundancy and data recovery reasons.” In the second part, he clearly and cogently lays out why so many third-party vendors (Zinstall, Prowess, and others) and Microsoft itself (Windows XP mode) have been chasing the rainbow involved in grabbing and virtualizing the Windows XP environment with older, incompatible-with-Win7 applications installed as a way of delivering continued access to important apps and services even when current Windows environments can no longer do that directly.
Put these things together, and you have the foundation for a user computing experience that remains accessible on any of the possible platforms where a user might wish to compute, including smartphones; tablets, netbooks, and other touch devices; and more conventional desktop and notebook PCs. You also have a user computing experience that provides an easy way to continue running outmoded legacy apps inside clean, portable envelopes that will also be accessible across that same continuum of computing devices. Put them all together, and suddenly, you’ve got a prescription for a Windows 8 that’s as much an improvement over Windows 7, as Windows 7 proved to be over XP and Vista.
Let’s hope somebody heavy and insightful at Microsoft is reading Thurrott’s musings and taking them very seriously indeed. This sounds like just what the doctor ordered, and very much what MS needs to do not only to keep itself on top of the OS pecking order, but also to deliver the kinds of cloud-based and device-independent computing that users everywhere are coming to expect.
OK, now I’ve been through the update cycle on all of my Windows 7 PC (all 8 of them), and have seen anywhere from 11 to 15 updates ger processed on each one (another item for Silverlight popped up later in the day, after the first batch came out). Here’s the deal on the 17 security bulletins and the other 5 miscellaneous updates that appeared on January 14:
|2146400*||MS10-090||Cumulative IE Update|
|2296199*||MS10-091||OpenType Font (OTF) Driver|
|2447961||MS10-094||Windows Media Encoder|
|2385678*||MS10-095||Windows versions (XP, Vista, 7, …)|
|2423089*||MS10-096||Windows Address Book|
|2443105||MS10-097||Internet Connection Signup Wizard|
|2436673*||MS10-098||Windows Kernel-mode drivers|
|2440591||MS10-099||Routing & Remote Access (RRAS)|
|2442962*||MS10-100||Consent User Interface|
|2207559*||MS10-101||Windows Netlogon Service|
|2292970||MS10-103||MS Office Publisher|
|2455005||MS10-104||MS SharePoint Server|
|0968095||MS10-105||MS Office Graphics Filters|
|2407132||MS10-106||MS Exchange Server|
|2443685*||No bulletin||December 2010 cumulative time zone update|
|890830*||No bulletin||December 2010 Malicious Software Removal tool|
|2412171*||No bulletin||Office Outlook 2007 Update|
|2466076*||No bulletin||Office Outlook 2007 Junk Mail Filter update|
|2477244*||No bulletin||Update for Microsoft Silverlight|
|None||No bulletin||List of current Windows Security Bulletins|
The final 6 entries in the table include 5 other updates pushed out along with the December Security Bulletins, which explains why they are marked “No bulletin” (because they’re not covered by security bulletins). The very last entry provides a link to the list of current security bulletins, which readers may also find interesting. Items marked with an asterisk represent those that I actually saw installed on one or more of my machines. So far, their impact seems negligible except that navigating between folders in Outlook 2007 now takes quite a bit longer than it did before the related updates were applied.
In a fascinating phone call with Samit Patel of App-DNA.com last Monday (12/13/2010) I learned more about that company’s Windows applications analysis technology called AppTitude, specifically in light of ongoing, planned, and upcoming enterprise-class migrations from older Windows desktop versions to Windows 7. Along the way, I also learned that the same technology that App-DNA brings to operations wishing to streamline and manage that migration process will also work for other likely migrations, including virtualization efforts aimed at Hyper-V, VMWare, Citrix XenApp, Xen Desktop, and so forth (in fact, AppTitude won “Best of Show” at Citrix Synergy 2010).
Let me be very clear as to why I describe AppTitude as an analysis tool rather than a migration tool, even though it can be an important or even invaluable part of the migration process. AppTitude does not actually do migration; rather, it analyzes elements from what Patel calls an “enterprise’s definitive software library” (the collection of installable images, programs, and executable files it uses to generate desktop environments for end users) to determine where potential software conflicts or problems might exist, and then to implement automated remediation strategies or techniques to address them.
Most migration tools work by observing runtime behavior of specific instances of desktop environments, but AppTitude constructs a static virtual model for each of the elements it finds in an organization’s software library. This permits the tool to leverage information from packages or items that would normally be handed off to IT professionals for packaging and/or deployment, and to decompose underlying software API calls and object references to find dependencies within the code that may or may not be compatible with a Windows 7 runtime environment. Says Patel: “The real value comes from going beyond MSI tables for portable executables to analyze headers and other data, and to access pre-installation (PE) data to see if it will run or not.” This technique does not require actual installation, so no observation of runtime behavior is needed. In fact, the 60,000 or so data points that AppTitude collects for application library entries suffice to answer these all-important questions:
- Will it install?
- Will it run properly (or at all)?
The biggest problem with other tools and approaches that require migration by trial and error, or by runtime observation, is that this approach cannot possibly follow all potential cases or use scenarios. Patel offered a telling example of how an application that might be subject to batch script invocation every other Sunday wouldn’t manifest problems in a runtime environment unless testing happened to occur on that particular day, or run long enough to come up against this schedule (neither of which is terribly likely, he also opines). Only a tool like AppTitude that systematically examines every possible cross-reference, all internal code structures and external references, and scripts or other automated processes that might invoke the application can possibly catch potential gotchas that could emerge.
The approximately 60,000 data points that AppTitude gathers about applications are what represent the so-called “application DNA” that gives this company its name, and its tool so much punch. Though AppTitude doesn’t actually DO migration per se, it can (and has) helped large organizations anticipate and remediate potential issues when conducting the migration process. Patel indicated that use of App-DNA resulted in price reductions of up to two-thirds for competitive bids for extremely large migrations, as opposed to more labor-intensive and time-consuming approaches to performing migration using the runtime approach. Even better, those winning bids also included timelines that were less than one-third as long as the losing bids based on runtime methodology.
App-DNA prices its offerings on a per-application basis, but enterprise licenses based on the total number of endpoints (as is the case with Citrix Xen and other desktop management environments) are also available. With Windows 7 spearheading the need for future migrations, Windows 8 in the offing for 2014, and virtualization or mobile interface migrations also in the mix in many enterprises, AppTitude appears to offer the opportunity to pay for itself many times over for organizations with thousands of desktops and hundreds to thousands of applications to manage (and migrate).
Holy Moly! I just took a quick look at the Microsoft Security Bulletin Advance Notification for December 2010 (this is a temporary placeholder for the actual security bulletin, which will be released at the same time Microsoft posts its updates to the Windows Update Service, so the final bulletin may be in place by the time you read this). There are 17 security updates in the queue for this month, which is certainly the highest number I’ve seen. In fact, according to Mark Reavey of the Microsoft Security Response Center (MSRC) this is the highest number of updates ever released on a Patch Tuesday. See his MSRC blog “December 2010 Advance Notification Service is released” (12/9/2010) for some interesting information about total bulletin counts, vulnerabiliites covered, and information security trends.
Among the most interesting tidbits from this blog is the declaration that Microsoft “…will be closing the last Stuxnet-related issues this month. This is a local Elevation of Privilege vulnerability and we’ve seen no evidence of its use in active exploits aside from the Stuxnet malware.” Likewise, an older (reported in November 2010 in MS Security Advisory 2458511) Remote Code Execution vulnerability in Internet Explorer that affects versions 6, 7, and 8 will also be addressed in the December security updates. Finally, Reavey also points to an interesting article from Microsoft Security Research & Defense entitled “On the effectiveness of DEP and ASLR” (DEP is Data Execution Prevention, and ASLR is Address Space Layout Randomization, two techniques Microsoft uses to good effect to limit the impact of exploit attempts, especially those that seek to leverage buffer overflow weaknesses).
It will be interesting to read more details about this month’s security updates when Microsoft posts them to its update servers at about 11 AM Pacific time today (-08:00 UCT). I’ll post further on what’s in the mix in a follow-up blog tomorrow.