Wendelin,
I know if even such a rule to use internal OS copy functions for creating
temporarily copies (which would maintain ADS files) would exist this would >> not guarant that Office apps would follow the rule and would not create
and copy their own data only, but if such a rule would exist I would
expect that at least MS office apps would apply it.
Does your MS-supplied (with the OS) "file explorer" show if a file has an
ADS atached ? And allows you to access (create/delete/read/write) them ?
If not, why do you think any other MS product would ?
By the way, "nice" to see that ADS - which was available as far back as XP - still has next-to-no suport in Win10 ...
Regards,
Rudy Wieser
streams64.exe libcs50-10.1.1.zip
Wendelin,
I know if even such a rule to use internal OS copy functions for creating
temporarily copies (which would maintain ADS files) would exist this would >> not guarant that Office apps would follow the rule and would not create
and copy their own data only, but if such a rule would exist I would
expect that at least MS office apps would apply it.
Does your MS-supplied (with the OS) "file explorer" show if a file has an
ADS atached ? And allows you to access (create/delete/read/write) them ?
If not, why do you think any other MS product would ?
By the way, "nice" to see that ADS - which was available as far back as XP - still has next-to-no suport in Win10 ...
Regards,
Rudy Wieser
It's supported, because it is used to track the security zone
of a file (caused by where it was downloaded from). This feature
is "half-baked",
but it's the usual thing of "dogfooding a feature" and proving that
ADS works.
compare result of DIR to DIR /R on the same folder to see if an alternate file exisits
I had to google for that "/R" switch, as it isn't present on XP(sp3). But
its good to see that win10 has at least *some* support for it - even if it needs a command-console to be able to use it.
NT fully supports it.
They're just not meant to be used visibly.
The trouble is that ADS depends on NT. Moving a file to
an FAT32 partition or writing to DVD will remove and ADS
attachments.
It's mostly basic kernel32 functionality. I wrote a small
program some years ago to list ADS files and optionally
delete them, in the interest of avoiding malware.
As Paul said, the whole idea was half-baked to begin with.
Then they decided to use it to tag downloaded files, as though
downloaded files are inherently dangerous.
Instead, it's ADS files that are dangerous. There should
be a way to disable them, but it's very basic API level.
On 5/18/2024 6:50 AM, R.Wieser wrote:
did not move it. You don't defragment SSD drives, and (apparently)
the $MFT has no compaction routine. So how that slot changed, I
haven't a clue at the moment. One of the reasons I ran this check,
was to see if it moved. And it did. Which is... disappointing<SNIP>
NT fully supports it. They're just not meant to be used
visibly. As I understand it, the original putrpose was to
match MS Office on Windows and Mac.
And you can use it to create files which are (nearly)
undeletable and unreadable:
echo 123abc>passwords.::$DATA
echo xyz>>passwords.::$DATA
Try to read or delete the created file.
And you can use it to create files which are (nearly)
undeletable and unreadable:
Herbert,
And you can use it to create files which are (nearly)
undeletable and unreadable:
echo 123abc>passwords.::$DATA
echo xyz>>passwords.::$DATA
Try to read or delete the created file.
-- delete
del passwords?
-- display contents
more < passwords.::$DATA
:-)
Regards,
Rudy Wieser
Disk space use as reported by Explorer is not the
same as space actually used on disk. It's typically off by some
10%. Even the Softies don't seem to understand it. When they
first came out with the winsxs calamity, one MS official said that
there's actually nothing in that folder. It's just mirrors. Another
official said there's actually nothing anywhere else -- it's all
just mirrored from winsxs to system folders. Whatever it is, the
bloat is quite real. That makes it even harder to keep track of
what's actually on disk. Too much MS funny business.
On 5/19/2024 3:34 AM, Herbert Kleebauer wrote:
And you can use it to create files which are (nearly)
undeletable and unreadable:
echo 123abc>passwords.::$DATA
ADS files are fully readable, deletable, etc. via basic
kernel32 functions like CreateFile, ReadFile, DeleteFile, etc.
My own program only adds the more obscure NTQueryInformationFile
to those methods.
Paul,
del passwords.Could Not Find D:\passwords.
That is why I used
"del passwords?"
, using the "?" wildcard to catch the "."
Regards,
Rudy Wieser
del passwords.Could Not Find D:\passwords.
echo 123abc>passwords.::$DATA
The above echo doesn't generate an ADS. The syntax is
just used to create a file with a name ending with a "."
And such filenames are not supposed to exist and therefore
Windows gets in trouble when you want to view its content
or delete it.
echo 123abc>passwords.::$DATA
The above echo doesn't generate an ADS.
I'm afraid I don't understand what you're talking about.
That is why I used
"del passwords?"
, using the "?" wildcard to catch the "."
The problem is, typically one part of
a command sees "passwords." and the
other part of the command sanitizes that
and makes "passwords" from it
I know if even such a rule to use internal OS copy functions for creating temporarily copies (which would maintain ADS files) would exist this would not guarant that Office apps would follow the rule and would not create
and copy their own data only, but if such a rule would exist I would
expect that at least MS office apps would apply it.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 439 |
Nodes: | 16 (2 / 14) |
Uptime: | 07:26:10 |
Calls: | 9,147 |
Files: | 13,433 |
Messages: | 6,041,549 |