A Reuters story from the WinHEC conference in China has got the Windows press and blog environment abuzz enough that it’s being widely re-reported in most such outlets. In the story, Terry Meyerson, the chief exec for Microsoft’s OS unit announced that Microsoft will offer free upgrades to all Windows users, regardless of whether they’re upgrading from a legitimately licensed older copy of the OS, or something else (such as a pirated copy of the OS, for example). Meyerson is quoted as follows: “We are upgrading all qualified PCs, genuine and non-genuine, to Windows 10,” According to the story, Microsoft’s “plan is to ‘re-engage’ with the hundreds of millions of users of Windows in China.”
Given the high degree of piracy in China — Ars Technica quotes a BSA study that claims that “74 percent of commercial software in China is unlicensed” — this is actually a very clever move that will let MS find out who’s using their software and, hopefully, bring them into the fold of paying customers for add-ons such as Office 365 subscriptions, media subscriptions, and so forth. In addition, Ed Bott over at ZDNet followed up with MS and reported further that “…the plan to allow free upgrades for non-genuine copies of Windows applies to all markets and is not limited to China.” Bott even released this helpful upgrade matrix chart that shows how the upgrades will go, incidentally also revealing that Windows 7 users are eligible for the free upgrade as well.
Windows 7 and 8 versions will be eligible for the free Windows 10 upgrade, as shown. [Source: Neowin via ZDNet]
This is interesting news, and should be well-received globally, especially in those parts of the world where piracy is overlooked or tolerated. I think it’s a great way for MS to hook up with such users, and could redound to their benefit in the longer term. At any rate, it should be very interesting indeed to see how it all plays out and if it will ultimately pay off.
Over at Thurrott.com this morning, I found a simply fascinating story about a new version of “OS compression” that’s making its debut in Windows 10. The ultimate source for this info is a March 16 Blogging Windows post entitled “How Windows 10 achieves its compact footprint.” So far, there’s nothing else about this on TechNet or others Windows technical sources, though social.microsoft.com does have a couple of threads that address the kinds of issues to which Mr. Thurrott refers when he indicates that smaller Windows 8.1 devices that use WIMBOOT (a different and older form of OS compression that requires a separate recovery partition on the system/boot storage device) must jump through some special hoops to upgrade from 8.1 to Windows 10 without encountering hiccups along the way.
The MS blog post indicates that Windows 10 “gives back approximately 1.5 GB of storage for 32-bit and 2.6 GB of storage for 64-bit Windows. Phones will also be able to use this same efficient compression algorithm and likewise have capacity savings with Windows 10.” In addition, the post explains that MS is “…redesigning Windows Refresh and Reset functionalities to no longer use a separate recovery image (often preinstalled by manufacturers today) in order to bring Windows devices back to a pristine state. This reduces Windows’ storage footprint further as the recovery image on typical devices can range in size from 4 GB to 12 GB, depending on the make and model.” Here’s a pie chart from the blog post that’s entitled “Example Savings on 64-bit Windows:”
On a 32 GB set-up (typical for low-end tablets and many phones) 6.6 GB of savings is significant.
The post goes on further to explain that compression is selective and is intended not to “adversely affect system responsiveness.” Factors considering when assessing compression include: amount of RAM available (which determines how often files must be retrieved from storage), and speed at which the device’s CPU can run the compression algorithm. By studying Windows 8 system compression and related performance, MS claims it has improved overall behavior and efficiency in Windows 10. It should be interesting to learn more about how things work — especially installation, reset and recovery — and to see what MS does to address “bringing upgrade to low capacity devices.” Good stuff! Now, if Mark Russinovich (or somebody on his team) will only dig into this in depth for the next edition of Windows Internals, and MS will publish some info about this on TechNet, we’ll all probably understand it a whole lot better…
Thanks to a recent article at MakeUseOf.com I came across this weekend, I’ve been wondering if there isn’t some master repository of keyboard shortcuts for the latest and soon-to-be-greatest Windows desktop OS. That article was entitled “7 Quick Tips & Hacks to Optimize Your Windows 10 Experience” and appeared last Thursday (3/12/2015), and came to me the long way around via MajorGeeks.com who in turn picked it up from NTCompatible.com (all good sites, BTW). But after looking around for an exhaustive, all-encompassing source for Windows 10 keyboard shortcuts I don’t seem to be able to find one. I went through the most common combinations to see what I could learn for myself, but would request that those who know of other sources for such info please share it in comments here.
Properly used, keyboard shortcuts can be real time-savers in Windows. Using them means knowing which combos produce desired — and intended — results.
Alphabetic Windows-Key combos
If a letter is missing from the list below, that means it didn’t cause anything to happen on either of the two Win10 test machines I ran it on. That may or may not be significant, so please consider this an experimental reference rather than an authoritative one.
Windows-A Launches Action Center Windows-D Launches (or switches) active Windows Desktop(s) Windows-E Launches File Explorer Windows-F Launches Search pane Windows-H Launches Share pane Windows-I Launches Settings pane Windows-K Launches Connect utility (Bluetooth) Windows-L Launches Lock screen Windows-P Launches Connect utility (Bluetooth) Windows-R Launches Run dialog box Windows-U Launches Ease of Access Center widget Windows-X Launches Administrative Tools menu Windows-1 Launches first application from taskbar, left-to-right ... ... Windows-<n> Launches nth application from taskbar (n is limited by number of items visible) Windows-+ Launches magnifier widget
I’m going to have to do some more research before I can assemble a reasonably complete set of multi-key Windows keyboard shortcuts (like the famous “three-fingered salute” of CRTL-ALT-DEL that brings up the shift user pane, or Shift-ALT-ESC which brings up Task Manager). I’ll pull this together over the next week or two and follow up with another posting on that topic.
I went to print a phone card for my wife this morning, and wound up lost for a while in the “Hall of Mirrors” section of the Windows OS. In this case, I knew I needed to print to the Dell color printer upstairs (it helps to show color on the phone card for higher visibility access to its all important access numbers and codes), but I found myself unable to access that printer from my Windows 10 test machine. After resolving some network issues (a reset of the home network with the introduction of a new high-speed boundary device from Time Warner was the culprit there) I found myself looking at a half-dozen relic printer listings from PCs no longer on the network that I knew I would never need again. So of course, I set about learning how to remove them from the Windows 10 test machine.
On an AD network, this kind of thing is relatively easily handled with GPOs and scripts that will clean out stale devices. My home network doesn’t have AD, so I had to do it the old-fashioned way — namely by pruning the registry on the machine in question. I’m assuming that enough readers here have to deal with BYOD or end-user devices that may include registry entries outside the AD umbrella, so hopefully what I just learned will be of some benefit.
I’d much rather see two items I can actually pick, than 6 of which I can only pick two.
I wound up searching the registry for machine names for those PCs that proferred print drivers to the network, but were no longer present on the network. And lo and behold, they show in the HKCR\Local Settings\Printers\Roamed key therein, one entry per such printer that starts with the machine name for the PC that’s no longer in service or available. In my particular case, this included machine names for some PCs I’ve either sold (the Fujitsu Q704 hybrid tablet), loaned to family members (the Dell XPS12, loaned to my sister while she was recovering from a hip replacement, still not recovered), or whose OSes have been upgraded (my production PC, now running Windows 8.1, and my son’s AIO, now ditto). The upshot of all this is that now when I go into the Add Printer window on the test machine, I see only entries for printer (and shared printers) actually available on the network right now, instead of devices going back as far as the purview of the Windows registry on the machine in use (which can go back quite a ways, as some of these machines have been upgraded from Windows 7 to 8 to 8.1 and even through several preview versions of Windows 10, as on the test machine in question).
I’m inclined to close this blog post with a reminder that deleting keys from the registry is irreversible unless you back them up before you remove them, so the safest course of action is always to back the whole registry up before you start messing with it. Should worst come to worst, you can simply replace the damaged results of your bungled editing efforts with the presumably pristine version you captured before you starting messing around. In my case, I wasn’t worried, because I was only messing with entries for machines no longer present on the network. Even so, I still backed up anyway. You should do likewise.
Back in 2011, I blogged here about a program named DriverStore Explorer. Aka RAPR, this is a CodePlex project that when run in administrative mode enables users to see all drivers in the Windows DriverStore and to selectively delete those that aren’t in active use at the moment (find that blog at “Check Out DriverStore Explorer” which posted nearly 3.5 years ago). This weekend, in prepping a couple of machines to take on the road, I was pleasantly surprised to get back 1.5 to 2.5 GB of disk space on those systems’ boot drives simply by excising old drivers no longer in use. I also discovered two valuable techniques to make better use of the program for this task (cleaning up outdated or unused drivers), which I’ll describe in the following paragraphs.
Sorting the entries by the ‘Driver Class’ column lets you see all instances of the same driver together in groups. [Click Image for full-size version]
As the foregoing caption describes, sorting the entries in RAPR on the Driver Class column groups drivers together by type, as shown for example in the preceding screenshot by multiple instances of the NVIDIA Display Adapters (2) and Microsoft Human Interface Devices (4). By doing this on the machines I was cleaning up, I could see all the drivers for each device grouped together, and identify those with older dates likely (but not always) to no longer be in use. Thus, this describes the first technique for driver cleanup: use this mechanism to group drivers together so you can easily compare their version numbers and associated dates. It also leads directly into the second technique.
That second technique is probably best described as “try deleting the oldest drivers (or lowest version numbers) first, one at a time; do likewise for multiple instances of the same driver.” Windows does install multiple instances of identical drivers when a system hosts multiple instances of the devices to which they’re associated. That’s why you see four instances of the HID drivers in the preceding screenshot (I like to leave the penultimate graphics driver version on my systems, as well as the most current one, to enable Device Manager to roll back to that penultimate version if the most current one leads to system instability, as it sometimes does): the system that produced this screenshot has four such devices installed, all of which use the same driver. Here’s the nice feature of RAPR that keeps you out of trouble with experimental deletion attempts: if you try to delete a driver that’s in active use, it will block the initial attempt (you can still use the “Force Deletion” checkbox to remove it anyway, but I don’t recommend that unless you’ve got another and hopefully better driver ready to replace that item on hand). That’s why deleting drivers one at a time, slow and frustrating as it may seem, is the best approach to clean-up: it quickly lets you determine which drivers are in use, and focus on removing those that are sitting idle.
As I said in the lead-in paragraph, space savings that result can be helpful, especially on tablets or laptops with limited storage. On a 256 GB SSD (or larger drive), saving 1.5 to 2.5 GB or more isn’t terribly dramatic. Though still useful, this technique is best applied to systems whose system/boot drives are 128 GB or less, where saving space for unused drivers means making valuable room for data, paging, and other key elements of storage. Try out my driver two-step: I think most power users and admins can’t help but be tickled with the results. RAPR also works on every version of Windows I’ve tried since 2011, which means Vista, 7, 8, 8.1 and 10 on the desktop, and 2003, 2008, and 2012 on the server side (including R2 versions).
Anybody who’s read this blog for any length of time has witnessed me repeatedly and enthusiastically recommending Stardock’s great product, Start8, as a Windows start menu add-in/replacement for Microsoft’s current flagship OS. In fact, I run it on every single one of my Windows 8 machines, which means I’ve purchased six copies of the program, according to the number of keys I see registered in my account at the Stardock website. The program normally goes for $5, but if you look around online you can usually find coupons for 20% off or thereabouts, which brings the price down to an eminently worthwhile $4 a pop.
With a version number of 0.5, you *know* it’s an early beta release!
That’s why my ears perked up earlier this week when I read announcements on the usual Windows 10 news sources (for me that means Thurrott.com, Neowin.net, and WinBeta.org) that Stardock was releasing a beta version of their menu replacement for Windows 10, to be called Start10. Very quickly after digging in, however, I discovered an expensive catch: you must either buy a standalone license for Stardock’s bundle product called Object Desktop Manager ($50 new, $35 upgrade from other Stardock products, annual renewal fees apply) or a subscription to same ($10 for the first month, $4 a month thereafter, continues until you manually turn it off) to gain access to this software.
I’ve got to say that while Start10 appears to be a worthy successor to the excellent Start8 product, I’m more than slightly miffed at the tactics that Stardock is using to capitalize on interest in Start 10, to the tune of nearly ten times the cost for the product by itself (for the upgrade price, 12-plus times for those who might have to buy a new Object Desktop Manager license). Ditto for “encouraging” buyers to opt into a recurring subscription license that requires a manual opt-out to escape from. Sigh.
Having bitten the bullet and coughed up $35 to see what’s what with the new Start10 beta I can say it’s a lot more like Start8 (and the Windows 7 Start menu environment it was modeled after) than the native Start button environment on Windows 10. It looks and handles pretty much the same as previous versions, and brings with it the virtues of comfort and familiarity that convey from the previous version, and with my own personal Windows history back to the XP, Vista, and Windows 7 environments with which it establishes strong continuity. But I’ve learned to navigate in Windows 10 pretty darn well without Start10, and for now, I’m installing the beta only on one of my test rigs (the Dell Venue 11 Pro 7130).
While the program is nice, and works as expected, I can’t help but think it’s at least questionable, if not an outright rip-off, to use the desire from Windows-heads like me to check out a new release of a well-crafted and highly usable Windows 8 program for Windows 10 to extract significantly more money from its would-be users than they have to pay for the Windows 8 equivalent (and will probably have to pay for the standalone version, if history is any guide, after Windows 10 goes into public release). Stardock management: are you reading this blog post? Does this opinion swing any weight with you? If so, please make the beta available for free, or let people pay $4 to try it out, instead of sticking it to them to the tune of significantly more. I always thought Stardock was a standup outfit that built great products, but this whole experience has left a bad taste in my mouth. Please fix this, and restore my enthusiasm and respect for your otherwise great products, or at least give early adopters a good reason to pay extra to opt into the beta version early. As things stand, I just don’t get it right now. And until the price gets real, perhaps you shouldn’t get Start10, either!
This weekend, I installed a HighPoint RocketU 1144C on my production PC, in search of solutions to a USB 3 drive access problem. There’s a PLX PCIe 8609 DMA controller on that board, apparently associated with managing the PCI channels that this 4x device uses. And although the drivers shipped with the board got it up and running no problem, the PLX chipset showed up as an known “Base System Device” in my Device Manager after the install until I went out and found the necessary driver on the HighPoint site, courtesy of some partial pointers on the ASUS Republic Of Gamers (ROG) website that alluded to this issue along with the tell-tale Device ID string PCI\VEN_10B5&DEV_8609 &SUBSYS_860910B5&REV_BA.
The first time I installed the driver I got an error message from Windows saying it was a known problem, with the yellow warning sign in Device Manager showing it as disabled. If only I’d rebooted, I would have seen this message go away. Instead I kept searching for a newer driver, which proved my undoing. Norton Internet Security 2015 (NIS) didn’t squawk when I downloaded a file named Plx_pcie_8609_dma _controller_driver.zip, though it most assuredly should have. The sole contents of said ZIP file is the file eponymously named Plx_pcie_8609_dma _controller_driver.exe, and NIS didn’t squawk about it either while I installed it, though strange things started happening immediately thereafter.
Here’s the litany: In IE, Firefox and Chrome (those malefactors are thorough, I have to give them that) I started getting warning about SSL certificates with no revocation data (never a good sign) and advertising started popping up all over the place. After reading about Lenovo’s recent Superfish debacle quite a bit recently, I had a pretty good idea that an SSL hijack had occurred, along with some serious adware injections. A full system scan from Norton turned up nothing amiss, though I found mysterious new directories in my Program Files (x86) directory, new startup processes linked to same, and the usual symptoms of a successful malware exploit on my machine. Sigh. A quick return to my most recent Restore Point (dated yesterday) took care of all the symptoms, after which I was able to delete the unwanted folders that had popped up on my system/boot drive, and the files that lived in them.
I’m usually pretty careful about where I download files from, and NIS usually steers me clear of stuff I don’t really want on my PC anyway. But for some reason, this dastardly download got past my own common sense (the first line of defense) and my security suite (my second line) to deposit unwanted software of a decidedly unfriendly sort on my machine. I realize that adware isn’t necessarily malware, but if it represents something I don’t want on my machine, and makes it difficult for me to remove itself from the runtime environment, it’s bad enough for me to make it go away, no matter what lengths I must go to see it gone. And so it was with this stuff, whatever it happened to be.
The moral of the story is: don’t let your desires to find the right driver or other piece of software overrule your common-sense understanding of what’s safe to access online. I’m not sure why NIS didn’t squawk about the website from whence the download came — subsequent reputation research shows it questionable at best, and downright nasty at worst — but I should have known from the URL that the website was suspect. Please learn from my recent mistake, and stick to known good driver resources, like vendor sites, the driver download and tools suppliers (DriverAgent, Driver Detective, RadarSync, and so forth), and that great French national treasure, Station Drivers, instead. Now that it’s all fixed, all I can say is “Ouch!”
By and large, I’ve got to give Dell credit for a winning solution in their 11″ Venue Pro tablet with detachable keyboard. It’s on par, features and power-wise with equivalent Surface Pro 3 models but the Broadwell Mobile processor makes the unit run at least 20° C cooler than the SP3 does at similar load levels. In fact, even at full load the unit’s operating temperature never seems to exceed 41° C (as compared to typical operating temperatures for the SP3 in the high fifties to mid-sixties °C, depending on overall system load). And with no fan, there’s no need to worry about fan noise either (the SP3 isn’t bad, but I sometimes find myself wondering who’s running a leaf blower at this time of year, when I realize that it’s the high-pitched whine of that unit’s fan in full swing).
Compact tablet with replaceable battery good; plug in clamshell with extra battery better!
But since I’ve installed Windows 10 on this unit — it mostly runs quite nicely, BTW, and switches seamlessly between tablet mode and desktop mode, and undocks from the keyboard without a hiccup — I’ve had a couple of interesting problems with this unit. First and foremost, every time it goes to sleep or gets rebooted, I lose my network connection and have to go into Settings to re-establish same manually (even when instructed to reconnect automatically, it does not do so). Second, and somewhat more irritating, when the machine is left to its own device management, the Windows Driver Foundation — User Mode Driver (WUDFHost.exe) constantly consumes 24-27% of the unit’s CPU power. If I end that task, I can reclaim the CPU cycles, but I lose the Intel HID Sensor collection that includes the tablet’s orientation (gyroscope) sensor and probably the Near Field Communications (NFC) sensor as well (though I have no NFC devices, and thus no way to check its presence or absence after disabling that sensor collection).
This is mildly irritating, to say the least, but not an uncommon set of circumstances when beta-testing a new OS on a new hardware platform. Dell supports Windows 7 and 8.* versions for the Venue 11 Pro, but doesn’t officially support Windows 10 on that platform yet (though I’m sure they’re dealing with the same issues themselves, and no doubt working on a fix, though it’s unlikely to result in driver changes until the OS goes into RTM or GA status later this year). To misquote Ry Cooder in this connection, I observe “Well, that’s the way it goes, down in Hollywood…” These are the kinds of things one learns to work around, when working one’s way into a new OS. Sigh.
In reading over an interesting article on Ars Technica this morning, I realized that many online sources (including the otherwise redoubtable Ars) that describe how to reinstall Windows to eliminate OEM-provided “bundleware” tend to leave managing Windows drivers as an exercise for the IT pro or Windows enthusiast tasked with that job. There’s no need to jump through numerous hoops to take a snapshot of installed drivers prior to a Windows reinstall, though. Instead, I’d recommend any of a number of good utilities that will happily collect this information for you to make it available to Device Manager once you’re far enough along in the reinstall process to use the “Update driver” option on a driver-by-driver basis within that framework.
Thus, for example, eSupport’s for-a-fee DriverAgent tool includes a built-in driver backup facility, as do most other such driver management tools. Those who don’t wish to lay out any cash to back up their drivers can (and probably should) turn to the SourceForge utility named DriverBackup! instead. Either way, you can easily harvest all of your drivers with little muss or fuss involved. For easiest access, in fact, grab a USB Flash Drive and back the drivers up on that device. Then, you can point to those drivers as and when they might be needed: this can be incredibly handy in the occasional odd situation where the Windows OS installer needs a driver during the installation process, as might for example be the case on a PC that boots from a RAID drive. Ditto for post-install when looking for drivers to update or add from inside Device Manager.
As shown above, the user interface for DriverBackup! makes it trivial to grab and save a snapshot of the entire collection, which may then be used later on to restore drivers in need of update or installation once the clean (re)install is over and done with. Or, if you prefer, you can work inside Device Manager, and simply point to the destination folder for the backup on your UFD, after which Device Manager will ferret out the driver it needs for the job.
Slimware Utilities is the company behind RecImg Manager, a program that can capture and restore modern-format Windows images. This is the same kind of image that Windows 8 or 10 uses, when you elect to “refresh” a PC using the Recovery tools from the Update & Recovery option within Settings.
By default, refresh rolls you back to initial set-up; use RecImg Manager to capture a current image to use instead.
RecImg Manager will capture a snapshot of your current Windows installation, including all current software and drivers installed. In the event that you need to refresh a system, that’s most likely what you’ll want to refresh it to, rather than to its plain vanilla state immediately following its initial delivery for deployment or to a users. Normally, that’s followed by installation of various applications, tools, utilities, and current drivers — all of which might become lost if the image you use to refresh that PC doesn’t include such stuff. That’s why I’m in the habit of capturing such an image weekly, and after each time I apply Windows updates, new drivers, or other software I might wish to use again. If you keep up this regimen, you can point the “Refresh your PC” option to the most current of the RecImg Manager images available, and get all this stuff back once the refresh is completed.
Using RecImg Manager doesn’t get you off the hook for other regular backups, however: I have encountered a few situations in which the current Windows installation becomes sufficiently damaged that it won’t successfully refresh (or it might be unable to find your refresh images, which are stored in a folder named RecImg Snapshots on a drive of your choosing, and includes the all-important CustomRefresh.wim file that acts as the source for the OS refresh activity). That’s why I also capture a “System Image Backup” (now available inside the File History control panel widget) for each of my systems at least once a week also, if not more frequently. You should probably consider similar strategies as well.