• sfc question

    From T@21:1/5 to All on Wed May 24 01:26:41 2023
    Hi All,

    Win 10 home 21H2 & 22H2

    I worked on a customer yesterday with major
    performance issues. I fixed!

    One of the issues was a `jump 0` problem (dog
    chasing his tail) trying to update from 21H2
    to 22H2. 100% disk usage. I manually upgraded
    him to 22H2 from ISO and that fixed that (the
    disk 100%).

    His antivirus ran all the way through
    his hard drive without issue either. I did
    remove about 40 pieces of junkware -- shhhheesh.
    His hard drive passed diagnostics too. Fast
    startup was off and I got a couple of nice
    reboots too.

    But what I find odd still is that under 21H2,
    `sfc /scannow` froze at 40%. And under 22H2 it
    froze at 10%. Weird.

    Other than that, the dead came back to life and
    his computer is running quite nicely.

    You guys have any thoughts on the sfc matter?

    Many thanks,
    -T

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to All on Wed May 24 16:15:12 2023
    On 5/24/2023 4:26 AM, T wrote:
    Hi All,

    Win 10 home 21H2 & 22H2

    I worked on a customer yesterday with major
    performance issues.  I fixed!

    One of the issues was a `jump 0` problem (dog
    chasing his tail) trying to update from 21H2
    to 22H2.  100% disk usage.  I manually upgraded
    him to 22H2 from ISO and that fixed that (the
    disk 100%).

    His antivirus ran all the way through
    his hard drive without issue either.  I did
    remove about 40 pieces of junkware -- shhhheesh.
    His hard drive passed diagnostics too.  Fast
    startup was off and I got a couple of nice
    reboots too.

    But what I find odd still is that under 21H2,
    `sfc /scannow` froze at 40%.  And under 22H2 it
    froze at 10%.  Weird.

    Other than that, the dead came back to life and
    his computer is running quite nicely.

    You guys have any thoughts on the sfc matter?

    Many thanks,
    -T


    Well, the online help is not helping.

    You can see the developers have never had to deal
    with a "problem" with their creation.

    *******

    PS C:\ > sfc /?

    Microsoft (R) Windows (R) Resource Checker Version 6.0
    Copyright (C) Microsoft Corporation. All rights reserved.

    Scans the integrity of all protected system files and replaces incorrect versions with
    correct Microsoft versions.

    SFC [/SCANNOW] [/VERIFYONLY] [/SCANFILE=<file>] [/VERIFYFILE=<file>]
    [/OFFWINDIR=<offline windows directory> /OFFBOOTDIR=<offline boot directory> [/OFFLOGFILE=<log file path>]]

    /SCANNOW Scans integrity of all protected system files and repairs files with
    problems when possible.
    /VERIFYONLY Scans integrity of all protected system files. No repair operation is
    performed.
    /SCANFILE Scans integrity of the referenced file, repairs file if problems are
    identified. Specify full path <file>
    /VERIFYFILE Verifies the integrity of the file with full path <file>. No repair
    operation is performed.
    /OFFBOOTDIR For offline repair, specify the location of the offline boot directory
    /OFFWINDIR For offline repair, specify the location of the offline windows directory
    /OFFLOGFILE For offline repair, optionally enable logging by specifying a log file path

    e.g.
    sfc /SCANNOW
    sfc /VERIFYFILE=c:\windows\system32\kernel32.dll
    sfc /SCANFILE=d:\windows\system32\kernel32.dll /OFFBOOTDIR=d:\ /OFFWINDIR=d:\windows
    sfc /SCANFILE=d:\windows\system32\kernel32.dll /OFFBOOTDIR=d:\ /OFFWINDIR=d:\windows /OFFLOGFILE=c:\log.txt
    sfc /VERIFYONLY

    *******

    That means we get Procmon running, then filter on SFC later on,
    and see where it stops. Perhaps Windows Defender or Tamper Proofing
    setting are a problem ?

    https://learn.microsoft.com/en-us/sysinternals/downloads/procmon

    *******

    from Reddit, I get:

    "I know it sounds dumb, but try hitting enter a few times.
    I've had scans get stuck until I do that."

    Perhaps for an online scan, it is doing some network activity,
    and it is stalled as it waits for a missing resource on the
    server end.

    Modern ProcMon, now includes the logging of
    networking events. The only problem with this, is the network
    identifiers in the listing, are things like "Akamai" and this is
    generally useless for any forensic class work. If all the sooper
    sekret Microsoft internal IPs end up as "Akamai" (a CDN), the situation
    is hopeless. That's what happened the first time I needed that. You
    can use Wireshark (but only for the simpler things in life).

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From ...winston@21:1/5 to All on Wed May 24 17:43:56 2023
    T wrote:
    Hi All,

    Win 10 home 21H2 & 22H2

    I worked on a customer yesterday with major
    performance issues.  I fixed!

    One of the issues was a `jump 0` problem (dog
    chasing his tail) trying to update from 21H2
    to 22H2.  100% disk usage.  I manually upgraded
    him to 22H2 from ISO and that fixed that (the
    disk 100%).

    His antivirus ran all the way through
    his hard drive without issue either.  I did
    remove about 40 pieces of junkware -- shhhheesh.
    His hard drive passed diagnostics too.  Fast
    startup was off and I got a couple of nice
    reboots too.

    But what I find odd still is that under 21H2,
    `sfc /scannow` froze at 40%.  And under 22H2 it
    froze at 10%.  Weird.

    Other than that, the dead came back to life and
    his computer is running quite nicely.

    You guys have any thoughts on the sfc matter?

    Many thanks,
    -T

    Did you use updated media for the ISO?
    The Microsoft 22H2/21H2 MCT/Visual Studio/etc. routes(for Win11/Win10)
    for creating USB/DVD/ISO was updated this month(May 2023) with new code
    for a staged deployment of addressing a Secure Boot vulnerability.

    <https://msrc.microsoft.com/blog/2023/05/guidance-related-to-secure-boot-manager-changes-associated-with-cve-2023-24932/>

    Quick Summary:
    Update Boot Media, image after applying May 2023 cumulative update,
    after applying the May update use updated boot media(USB/DVD/ISO) for installation/re-installation/repair.

    Further info see: <https://msrc.microsoft.com/blog/2023/05/guidance-related-to-secure-boot-manager-changes-associated-with-cve-2023-24932/>
    then read <https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d>

    For your sfc issue:
    Don't run sfc unless its known that the Windows Image and Component
    store *do not* need restoring Health and Component Cleanup.

    DISM /Online /Cleanup-Image /CheckHealth
    DISM /Online /Cleanup-Image /ScanHealth
    DISM /Online /Cleanup-Image /RestoreHealth

    DISM /Online /Cleanup-Image /AnalyzeComponentStore
    DISM /Online /Cleanup-Image /StartComponentCleanup

    Note: After 'fixing' anything always run the Check, Scan, Analyze DISM commands.

    Finally, the use of an ISO[1] has a long history of successfully
    updating a feature update upgrade when other routes(Windows Update,
    Online Upgrade/Update Assistant and MCT USB/DVD routes fail).

    [1] Especially when the expanded/extracted ISO files(after mounting) are
    copied to a new folder on the Windows partition(or spare internal drive partition), unmount the ISO and then run setup.exe from that folder
    **instead of the mounted ISO**! i.e. Don't run the ISO mounted as a
    virtual drive. Once upgraded, delete the ISO folder.


    --
    ...w¡ñ§±¤ñ

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From T@21:1/5 to All on Wed May 24 17:05:58 2023
    T24gNS8yNC8yMyAxMzoxNSwgUGF1bCB3cm90ZToNCj4gUGVyaGFwc8KgZm9ywqBhbsKgb25s aW5lwqBzY2FuLMKgaXTCoGlzwqBkb2luZ8Kgc29tZcKgbmV0d29ya8KgYWN0aXZpdHksDQo+ IGFuZMKgaXTCoGlzwqBzdGFsbGVkwqBhc8KgaXTCoHdhaXRzwqBmb3LCoGHCoG1pc3NpbmfC oHJlc291cmNlwqBvbsKgdGhlDQo+IHNlcnZlcsKgZW5kLg0KDQpUaHVtcGVkIHJldHVybiBh IGJ1bmNoLCBjdHJsLWMsIGN1c3Mgd29yZHMgb3IgdHdvIGV0Yy4NCg0KSSBoYXZlIHNlZW4g dGhpcyBpc3N1ZSB3aXRoIGluc3RhbGxpbmcgRG90IE5ldA0KeWVhcnMgYWdvLiAgSWYgSSBo YWQgYSBVU0IgZmxhc2ggZHJpdmUgdGhhdCB3YXMNCnJlYWQgb25seSwgdGhlIGluc3RhbGxl ciB3b3VsZCBsb2NrICh3aXRoIHJlZ3VsYXINCnJlYWQvd3JpdGUsIHlvdSBjb3VsZCBzZWUg dGhlIGluc3RhbGxlciBzY2FubmluZw0KdGhlIHN0dXBpZCBmbGFzaCBkcml2ZSdzIGxlZCku ICBUaGlzIGN1c3RvbWVyDQpoYWQgYWJvdXQgZml2ZSBVU0IgZmxhc2ggZHJpdmVzIHNob3dp bmcuICBTaW5jZQ0KSSB3YXMgcmVtb3RlZCBpbiwgSSBjb3VsZCB0byByZW1vdmUgdGhlbS4N Cg0KU28gSSB3b25kZXIgLi4uDQo=

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From T@21:1/5 to All on Wed May 24 17:36:42 2023
    T24gNS8yNC8yMyAxNDo0MywgLi4ud2luc3RvbiB3cm90ZToNCj4gVCB3cm90ZToNCj4+IEhp IEFsbCwNCj4+DQo+PiBXaW4gMTAgaG9tZSAyMUgyICYgMjJIMg0KPj4NCj4+IEkgd29ya2Vk IG9uIGEgY3VzdG9tZXIgeWVzdGVyZGF5IHdpdGggbWFqb3INCj4+IHBlcmZvcm1hbmNlIGlz c3Vlcy7CoCBJIGZpeGVkIQ0KPj4NCj4+IE9uZSBvZiB0aGUgaXNzdWVzIHdhcyBhIGBqdW1w IDBgIHByb2JsZW0gKGRvZw0KPj4gY2hhc2luZyBoaXMgdGFpbCkgdHJ5aW5nIHRvIHVwZGF0 ZSBmcm9tIDIxSDINCj4+IHRvIDIySDIuwqAgMTAwJSBkaXNrIHVzYWdlLsKgIEkgbWFudWFs bHkgdXBncmFkZWQNCj4+IGhpbSB0byAyMkgyIGZyb20gSVNPIGFuZCB0aGF0IGZpeGVkIHRo YXQgKHRoZQ0KPj4gZGlzayAxMDAlKS4NCj4+DQo+PiBIaXMgYW50aXZpcnVzIHJhbiBhbGwg dGhlIHdheSB0aHJvdWdoDQo+PiBoaXMgaGFyZCBkcml2ZSB3aXRob3V0IGlzc3VlIGVpdGhl ci7CoCBJIGRpZA0KPj4gcmVtb3ZlIGFib3V0IDQwIHBpZWNlcyBvZiBqdW5rd2FyZSAtLSBz aGhoaGVlc2guDQo+PiBIaXMgaGFyZCBkcml2ZSBwYXNzZWQgZGlhZ25vc3RpY3MgdG9vLsKg IEZhc3QNCj4+IHN0YXJ0dXAgd2FzIG9mZiBhbmQgSSBnb3QgYSBjb3VwbGUgb2YgbmljZQ0K Pj4gcmVib290cyB0b28uDQo+Pg0KPj4gQnV0IHdoYXQgSSBmaW5kIG9kZCBzdGlsbCBpcyB0 aGF0IHVuZGVyIDIxSDIsDQo+PiBgc2ZjIC9zY2Fubm93YCBmcm96ZSBhdCA0MCUuwqAgQW5k IHVuZGVyIDIySDIgaXQNCj4+IGZyb3plIGF0IDEwJS7CoCBXZWlyZC4NCj4+DQo+PiBPdGhl ciB0aGFuIHRoYXQsIHRoZSBkZWFkIGNhbWUgYmFjayB0byBsaWZlIGFuZA0KPj4gaGlzIGNv bXB1dGVyIGlzIHJ1bm5pbmcgcXVpdGUgbmljZWx5Lg0KPj4NCj4+IFlvdSBndXlzIGhhdmUg YW55IHRob3VnaHRzIG9uIHRoZSBzZmMgbWF0dGVyPw0KPj4NCj4+IE1hbnkgdGhhbmtzLA0K Pj4gLVQNCj4+DQo+IERpZCB5b3UgdXNlIHVwZGF0ZWQgbWVkaWEgZm9yIHRoZSBJU08/DQo+ IFRoZSBNaWNyb3NvZnQgMjJIMi8yMUgyIE1DVC9WaXN1YWwgU3R1ZGlvL2V0Yy4gcm91dGVz KGZvciBXaW4xMS9XaW4xMCkgDQo+IGZvciBjcmVhdGluZyBVU0IvRFZEL0lTTyB3YXMgdXBk YXRlZCB0aGlzIG1vbnRoKE1heSAyMDIzKSB3aXRoIG5ldyBjb2RlIA0KPiBmb3IgYSBzdGFn ZWQgZGVwbG95bWVudCBvZiBhZGRyZXNzaW5nIGEgU2VjdXJlIEJvb3QgdnVsbmVyYWJpbGl0 eS4NCj4gDQo+IDxodHRwczovL21zcmMubWljcm9zb2Z0LmNvbS9ibG9nLzIwMjMvMDUvZ3Vp ZGFuY2UtcmVsYXRlZC10by1zZWN1cmUtYm9vdC1tYW5hZ2VyLWNoYW5nZXMtYXNzb2NpYXRl ZC13aXRoLWN2ZS0yMDIzLTI0OTMyLz4NCj4gDQo+IFF1aWNrIFN1bW1hcnk6DQo+ICDCoFVw ZGF0ZSBCb290IE1lZGlhLCBpbWFnZSBhZnRlciBhcHBseWluZyBNYXkgMjAyMyBjdW11bGF0 aXZlIHVwZGF0ZSwgDQo+IGFmdGVyIGFwcGx5aW5nIHRoZSBNYXkgdXBkYXRlIHVzZSB1cGRh dGVkIGJvb3QgbWVkaWEoVVNCL0RWRC9JU08pIGZvciANCj4gaW5zdGFsbGF0aW9uL3JlLWlu c3RhbGxhdGlvbi9yZXBhaXIuDQo+IA0KPiBGdXJ0aGVyIGluZm8gc2VlOg0KPiA8aHR0cHM6 Ly9tc3JjLm1pY3Jvc29mdC5jb20vYmxvZy8yMDIzLzA1L2d1aWRhbmNlLXJlbGF0ZWQtdG8t c2VjdXJlLWJvb3QtbWFuYWdlci1jaGFuZ2VzLWFzc29jaWF0ZWQtd2l0aC1jdmUtMjAyMy0y NDkzMi8+DQo+IHRoZW4gcmVhZA0KPiA8aHR0cHM6Ly9zdXBwb3J0Lm1pY3Jvc29mdC5jb20v ZW4tdXMvdG9waWMva2I1MDI1ODg1LWhvdy10by1tYW5hZ2UtdGhlLXdpbmRvd3MtYm9vdC1t YW5hZ2VyLXJldm9jYXRpb25zLWZvci1zZWN1cmUtYm9vdC1jaGFuZ2VzLWFzc29jaWF0ZWQt d2l0aC1jdmUtMjAyMy0yNDkzMi00MWE5NzVkZi1iZWIyLTQwYzEtOTlhMy1iM2ZmMTM5Zjgz MmQ+DQo+IA0KPiBGb3IgeW91ciBzZmMgaXNzdWU6DQo+ICDCoERvbid0IHJ1biBzZmMgdW5s ZXNzIGl0cyBrbm93biB0aGF0IHRoZSBXaW5kb3dzIEltYWdlIGFuZCBDb21wb25lbnQgDQo+ IHN0b3JlICpkbyBub3QqIG5lZWQgcmVzdG9yaW5nIEhlYWx0aCBhbmQgQ29tcG9uZW50IENs ZWFudXAuDQo+IA0KPiBESVNNIC9PbmxpbmUgL0NsZWFudXAtSW1hZ2UgL0NoZWNrSGVhbHRo DQo+IERJU00gL09ubGluZSAvQ2xlYW51cC1JbWFnZSAvU2NhbkhlYWx0aA0KPiBESVNNIC9P bmxpbmUgL0NsZWFudXAtSW1hZ2UgL1Jlc3RvcmVIZWFsdGgNCj4gDQo+IERJU00gL09ubGlu ZSAvQ2xlYW51cC1JbWFnZSAvQW5hbHl6ZUNvbXBvbmVudFN0b3JlDQo+IERJU00gL09ubGlu ZSAvQ2xlYW51cC1JbWFnZSAvU3RhcnRDb21wb25lbnRDbGVhbnVwDQo+IA0KPiBOb3RlOiBB ZnRlciAnZml4aW5nJyBhbnl0aGluZyBhbHdheXMgcnVuIHRoZSBDaGVjaywgU2NhbiwgQW5h bHl6ZSBESVNNIA0KPiBjb21tYW5kcy4NCj4gDQo+IEZpbmFsbHksIHRoZSB1c2Ugb2YgYW4g SVNPWzFdIGhhcyBhIGxvbmcgaGlzdG9yeSBvZiBzdWNjZXNzZnVsbHkgDQo+IHVwZGF0aW5n IGEgZmVhdHVyZSB1cGRhdGUgdXBncmFkZSB3aGVuIG90aGVyIHJvdXRlcyhXaW5kb3dzIFVw ZGF0ZSwgDQo+IE9ubGluZSBVcGdyYWRlL1VwZGF0ZSBBc3Npc3RhbnQgYW5kwqAgTUNUIFVT Qi9EVkQgcm91dGVzIGZhaWwpLg0KPiANCj4gWzFdIEVzcGVjaWFsbHkgd2hlbiB0aGUgZXhw YW5kZWQvZXh0cmFjdGVkIElTTyBmaWxlcyhhZnRlciBtb3VudGluZykgYXJlIA0KPiBjb3Bp ZWQgdG8gYSBuZXcgZm9sZGVyIG9uIHRoZSBXaW5kb3dzIHBhcnRpdGlvbihvciBzcGFyZSBp bnRlcm5hbCBkcml2ZSANCj4gcGFydGl0aW9uKSwgdW5tb3VudCB0aGUgSVNPIGFuZCB0aGVu IHJ1biBzZXR1cC5leGUgZnJvbSB0aGF0IGZvbGRlciANCj4gKippbnN0ZWFkIG9mIHRoZSBt b3VudGVkIElTTyoqIcKgIGkuZS4gRG9uJ3QgcnVuIHRoZSBJU08gbW91bnRlZCBhcyBhIA0K PiB2aXJ0dWFsIGRyaXZlLsKgIE9uY2UgdXBncmFkZWQsIGRlbGV0ZSB0aGUgSVNPIGZvbGRl ci4NCg0KQWZ0ZXIgSSBmaWd1cmVkIG91dCBJIHdhcyBkZWFsaW5nIHdpdGggYSBqbXAgMCBm cm9tDQp0aGUgMjJIMiBhdXRvIHVwZGF0ZSBhbmQgdGhlIHNmYyBmcm96ZSBvbiBtZSwgSQ0K ZGlkIGENCg0KICAgICBkaXNtIC9PbmxpbmUgL2NsZWFudXAtaW1hZ2UgL3JldmVydHBlbmRp bmdhY3Rpb25zDQoNClJlYm9vdCBhbmQgbm8gc3ltcHRvbSBjaGFuZ2UuICBIYXJkIERyaXZl IHdhcyBiYWNrDQphdCAxMDAlLg0KDQpJIGRvd25sb2FkZWQgdGhlIElTTyB3aXRoIHRoZSBN ZWRpYSBDcmVhdGlvbiBUb29sLg0KDQpXaGVuIEkgd2VudCB0byBtYW51YWxseSBtb3VudCB0 aGUgSVNPLCBJIGZvdW5kIHRoYXQNCiJtb3VudCIgZGlkIG5vdCBleGlzdCBvbiB0aGUgcmln aHQgY2xpY2sgY29udGV4dCBtZW51Lg0KDQpIbW1tbS4gIFNvIEkgdXNlZCB0aGUgcG93ZXIg c2hlbGwgYXMgYWRtaW4gbWV0aG9kOg0KDQogICAtLT4gUG93ZXIgc2hlbGwgYXMgYWRtaW5p c3RyYXRvcg0KICAgIC0tPiBNb3VudC1EaXNrSW1hZ2UgLUltYWdlUGF0aCAiUEFUSFxUT1xJ U09GSUxFIg0KICAgICAgICBOb3RlIHRoYXQgeW91IGhhdmUgdG8gZW50ZXIgdGhlIHdob2xl IHN0aW5raW4nIHBhdGguDQogICAgICAgIEZvciBleGFtcGxlOg0KICAgICAgICAgICBNb3Vu dC1EaXNrSW1hZ2UgLUltYWdlUGF0aCBjOlxEcml2ZXJzXE1pY3Jvc29mdFxXaW5kb3dzLTIy SDIuaXNvDQoNCkkgZG8gYmVsaWV2ZSwgaWYgSSByZW1lbWJlciwgdGhhdCB0aGUgaXNvIG1v dW50ZWQgYXMNCmRyaXZlIEU6DQoNCkkgZGlkIG5vdCB0cnkgdG8gZml4IHRoZSBtb3VudCBj b250ZXh0IHByb2JsZW0gYXMgSQ0Kd2FzIGFib3V0IGluc3RhbGwgYSB3aG9sZSBuZXcgYnVp bGQuDQoNCkFmdGVyIDIySDIgd2hlbiBvbiB3aXRob3V0IGlzc3VlLCBJIG5ldmVyIHdoZW4g YmFjaw0KYW5kIGRvdWJsZSBjaGVja2VkIHRoZSByaWdodCBjbGljayBjb250ZXh0IGlzc3Vl Lg0KDQpUaGUgY3VzdG9tZXIgc3RpbGwgY3V0cyBDRCdzIGFuZCBoZSBhZG9yZSBSb3hpbydz DQpjdXR0ZXIuICBUaGF0IHdhcyB0aGUgZGVmYXVsdCBvbiB0aGUgY29udGV4dCBtZW51Lg0K TWF5YmUgdGhlIGhhZCBzb21ldGhpbmcgdG8gZG8gd2l0aCB0aGUgbWlzc2luZyAibW91bnQi Lg0KDQpBbmQgbWF5YmUgYWxsIHRoZSBleHRyYSBmbGFzaCBkcml2ZXMgaGUgaGFkIG1vdW50 ZWQgaGFkIHNvbWV0aGluZyB0byBkbyANCndpdGggdGhlIHNmYyBmcmVlemUgdXAuDQoNCkFu eXdheSwgSSBzdG9wcGVkIHRyb3VibGVzaG9vdGluZyBhcyBoaXMgY29tcHV0ZXINCmNhbWUg YmFjayB0byBsaWZlIGFuZCB3YXMgcnVubmluZyByYXRoZXIgbmljZWx5DQphZnRlciB0aGUg YnVpbGQgdXBkYXRlIGFuZCBhbGwgdGhlIGNsZWFuIHVwIEkgZGlkLg0KDQoNCg==

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to All on Wed May 24 21:26:04 2023
    On 5/24/2023 8:05 PM, T wrote:
    On 5/24/23 13:15, Paul wrote:
    Perhaps for an online scan, it is doing some network activity,
    and it is stalled as it waits for a missing resource on the
    server end.

    Thumped return a bunch, ctrl-c, cuss words or two etc.

    I have seen this issue with installing Dot Net
    years ago.  If I had a USB flash drive that was
    read only, the installer would lock (with regular
    read/write, you could see the installer scanning
    the stupid flash drive's led).  This customer
    had about five USB flash drives showing.  Since
    I was remoted in, I could to remove them.

    So I wonder ...

    You should be able to eject USB flash drives.

    A harder thing to do, is "reload" them once they've
    been ejected. There are codes which claim to be
    able to do that, but no strong evidence they work
    in every possible circumstance.

    https://www.uwe-sieber.de/drivetools_e.html

    The problem is, there are "more things in heaven and earth"
    when it comes to USB, and no end of device states. For example,
    having an optical drive tray locked after an OS reboot (to
    a different OS). Some states you can park hardware in, require
    power cycling to defeat them. This is why "mere software" is
    simply not capable of recovering from every possible parking state.
    The people who park the devices, are more clever than the people
    who unpark them.

    While some installers have an irritating habit of
    unpacking on randomly selected partitions (top level),
    I see less mention of this today than in the past. There
    would be a folder name, with a lot of numbers in the name.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From captain_penis@21:1/5 to All on Wed May 24 21:54:43 2023
    You must be really proud of yourself, Skippy!
    Now be a good boy and clean Gampaw's penis
    with your mouth.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From T@21:1/5 to All on Wed May 24 19:22:23 2023
    T24gNS8yNC8yMyAxODoyNiwgUGF1bCB3cm90ZToNCj4gQcKgaGFyZGVywqB0aGluZ8KgdG/C oGRvLMKgaXPCoCJyZWxvYWQiwqB0aGVtwqBvbmNlwqB0aGV5J3ZlDQo+IGJlZW7CoGVqZWN0 ZWQuDQoNCg0KSSBqdXN0IHJlYm9vdCB3aGVuIEkgbmVlZCB0aGVtIHJlbW91bnRlZC4NCg0K QnV0IGluIHRoaXMgaW5zdGFuY2UsIEkganVzdCBkaWQgbm90IHRoaW5rDQpvZiBpdC4NCg==

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)