Search found 78 matches
- 2022-Apr-22, 9:03 pm
- Forum: Windows VBScript
- Topic: Arguments are overriden when using Drag&Drop
- Replies: 1
- Views: 115
Re: Arguments are overriden when using Drag&Drop
My first thought would be to add a batch file, drag a file onto the batch file,which then calls the VBScript using cscript.exe passing whatever arguments you want, which could include %* for the dropped filename(s).
- 2022-Apr-17, 9:25 am
- Forum: General Tech News
- Topic: Muting your mic doesn’t stop big tech from recording your audio
- Replies: 1
- Views: 184
Muting your mic doesn’t stop big tech from recording your audio
Muting your mic reportedly doesn’t stop big tech from recording your audio https://thenextweb.com/news/muting-your-mic-doesnt-stop-big-tech-recording-your-audio They used runtime binary analysis tools to trace raw audio in popular video conferencing applications as the audio traveled from the app to...
- 2022-Apr-14, 11:16 am
- Forum: Windows CMD Shell
- Topic: How to differentiate between similar filename extensions?
- Replies: 6
- Views: 362
Re: How to differentiate between similar filename extensions?
All of this makes me extremely hesitant to alter the way that Windows handles filenames on an existing system. Turning off 8.3 filename generation does not affect any pre-existing files, it simply means that all new files you generate will have long filenames only. So you can turn it off, copy the ...
- 2022-Apr-12, 5:12 pm
- Forum: Windows CMD Shell
- Topic: How to differentiate between similar filename extensions?
- Replies: 6
- Views: 362
Re: How to differentiate between similar filename extensions?
Confirmed, if you turn off 8.3 generation using:
Then DIR *.jpe will not return the jpeg files.
Also 8.3 filename generation is turned off by default in all new (fresh install) Windows installations.
Code: Select all
FSUTIL.exe behavior set disable8dot3 1
Also 8.3 filename generation is turned off by default in all new (fresh install) Windows installations.
- 2022-Apr-09, 11:00 am
- Forum: Windows CMD Shell
- Topic: DELPROF2 no more developed
- Replies: 1
- Views: 228
Re: DELPROF2 no more developed
Thanks for the heads up, I have added a PowerShell example to the page as another alternative. I'm assuming that will handle UWP apps.
- 2022-Apr-02, 7:42 pm
- Forum: Windows VBScript
- Topic: VBScript to display current power plan
- Replies: 1
- Views: 241
Re: VBScript to display current power plan
In this line
it looks like you have an extra 'r' at the end of the line.
Also try running it with cscript.exe to see if that works before wrapping it into an HTA.
Code: Select all
var wmi = GetObject("winmgmts:{impersonationLevel=impersonate}r");
Also try running it with cscript.exe to see if that works before wrapping it into an HTA.
- 2022-Mar-30, 10:37 am
- Forum: Windows CMD Shell
- Topic: Robocopy /IM
- Replies: 0
- Views: 210
Robocopy /IM
I updated the robocopy page yesterday to add the /IM and /COMPRESS options /IM (include modified) has the help text " include modified files (differing change times) " which doesn't make sense as copying files with a different last modified time or file size is the default action of Roboco...
- 2022-Mar-26, 11:50 am
- Forum: Windows CMD Shell
- Topic: SLEEP command problem
- Replies: 1
- Views: 194
Re: SLEEP command problem
Sleep is a Resource Kit tool, which is given at the top of the page . If you don't have the relevant resource kit installed it is not going to be available, but some alternatives are also listed. Also notice that when a command is listed with its file extension Sleep.EXE rather than just Sleep, that...
- 2022-Mar-07, 6:12 pm
- Forum: Windows CMD Shell
- Topic: Disabled Extensions
- Replies: 1
- Views: 383
Re: Disabled Extensions
Thanks npocmaka I have made a few updates and added a link to the StackOverflow question.
- 2022-Mar-02, 10:14 am
- Forum: General Tech News
- Topic: Microsoft volunteering into cyberdefense of Ukraine via the New York Times
- Replies: 0
- Views: 539
Microsoft volunteering into cyberdefense of Ukraine via the New York Times
Within three hours, Microsoft threw itself into the middle of a ground war in Europe — from 5,500 miles away. The threat center, north of Seattle, had been on high alert, and it quickly picked apart the malware, named it “FoxBlade” and notified Ukraine’s top cyberdefense authority. Within three hou...