MoonPoint Support Logo

 


Shop Amazon Warehouse Deals - Deep Discounts on Open-box and Used ProductsAmazon Warehouse Deals



Advanced Search
August
Sun Mon Tue Wed Thu Fri Sat
 
     
2005
Months
Aug


Mon, Aug 29, 2005 10:00 pm

RunUO Emote Script

I modified a script for RunUO, which is a software package that will allow you to run your own gaming server akin to the Ultima Online online roleplaying game. The Emote script will allow you to issue the command "[emote" to see a list of emotions or actions your character can display or issue a specific "[e " command to "emote", e.g. "[e giggle" will play a sound file for a giggle. The sounds are specific to the character's gender, e.g. if you issue the command "[e laugh" for a female character, you will hear a female laugh, whereas, if the command is issued for a male character, you will hear a male laugh. The same is true when you pick an option from the menu.

[/gaming/runuo] permanent link

Fri, Aug 26, 2005 10:45 pm

Installing RunUO 1.0.0

To set up your own RunUO server take the following steps:

  1. Download the RunUO server software from http://www.runuo.com/downloads/.
  2. Unzip the file into the directory where you want it to reside when you run it.
  3. Change the autosave value, i.e. the value that controls how often the shard saves its state to one of your liking. The default value is to save every 5 minutes. We set ours to 30 minutes, so that the delays that occur when saving are less frequent. If you wish to change the value from the default of saving every 5 minutes, edit the Scripts\Misc\AutoSave.cs file and change the "5.0" in the following line. You can edit the RunUO scripts with any text editor, e.g. Notepad.

    Original Line:

    private static TimeSpan m_Delay = TimeSpan.FromMinutes( 5.0 );

    New Line:

    private static TimeSpan m_Delay = TimeSpan.FromMinutes( 30.0 );

  4. If you have a Fully Qualified Domain Name (FQDN) for your server, e.g. shard.anolonandpointsbeyond.com in our case, you can put it in Scripts\Misc\ServerList.cs.

    Original Line:

    public const string Address = null;

    New Line:

    public const string Address = shard.anolonandpointsbeyond.com;

    You may need to change the "null" to your IP address, e.g. 192.168.0.12, if you don't have a FQDN, such as shard.anolonandpointsbeyond.com. The comment in the Serverlist.cs file states the following:

    /* Address: * * The default setting, a value of 'null', will attempt to detect your IP address automatically: * private const string Address = null; * * This detection, however, does not work for servers behind routers. If you're running behind a router, put in your IP: * private const string Address = "12.34.56.78"; * * If you need to resolve a DNS host name, you can do that too: * private const string Address = "shard.host.com"; */

    Since, if you are connected to the Internet, you are behind a router, whether it's your own or your Internet Service Provider's (ISP's), I think the statement about detecting the server's address unless it is behind a router isn't clear. Maybe the router isn't at your location, e.g. maybe you have only a cable modem, but it will be connected to your ISP's router in that case. Perhaps the author meant "a router doing Network Address Translation (NAT)", but I'm not certain.

  5. You should also change the ServerName variable in the Scripts\Misc\ServerList.cs file to one that fits your game. The default value is "RunUO Test Center".

  6. Original Line:

    public const string ServerName = "RunUO Test Center";

    New Line:

    public const string ServerName = "Anolon";

  7. By default the server will listen on TCP port 2593. If you want to have it listen on a different port, change the following line in Scripts/Misc/ServerList.cs.

    Listener.Port = 2593;

    Applications listen for connections on specific ports. Think of it like an office with multiple phone lines. Perhaps there are 10 phone numbers for the office, but Jane only answers the one that ends in 2593, e.g. 555-555-2593. If you don't know about port numbers, just accept the default value.

    If you have firewall software on the system functioning as the RunUO server, or that system sits behind a firewall, or behind a router doing Network Address Translation (NAT), then you will have to create a rule in the firewall or in the router that will allow outside connections to be made to the port on the RunUO server, i.e. to TCP port 2593. Otherwise no one on the other side of that router or firwall will be able to connect to the RunUO server.

  8. If you wish to allow multiple accounts to be created from one IP address, change the line below in Scripts\Accounting\AccountHandler.cs. E.g. you could change the "1" to a "5" to allow someone to create 5 accounts.

    Original Line:

    private static int MaxAccountsPerIP = 1;

    New Line:

    private static int MaxAccountsPerIP = 5;

  9. If you want to control who has accounts on your server, i.e. you don't want to allow people to automatically create accounts on your server, then you need to edit Scripts\Accounting\AccountHandler.cs. Change the value of "AutoAccountCreation" from "true" to "false". The script language is case sensitive so use "false" not "False".

    Original Line:

    private static bool AutoAccountCreation = true;


    New Line:

    private static bool AutoAccountCreation = false;

  10. When you are ready to start your RunUO server, get a command prompt (Click on Start then Run, then type cmd and hit enter). Then switch to the directory where the RunUO software is stored and type server and hit enter to start the shard software.

[/gaming/runuo] permanent link

Sat, Aug 20, 2005 10:05 pm

Configuring a WebRamp Entre ISDN Router as a DHCP Server

A WebRamp Entree ISDN router can be configured to function as a DHCP server. This can be done through the router's command line configuration capability by establishing a telnet connection to the router. When you have logged into the router (the default userid is "wradmin"), you can check its dhcp staruts by using the showdhcpopts command.


-> showdhcpopts

DHCP Module          :  Disabled

Domain Name          :  labyrinth.com

Gateway Address      :  192.168.  1.  2

Subnetmask id        :  255.255.255.  0

First DNS            :   10. 22.111. 53
Second DNS           :  205.197.182.100
Third DNS            :  209.150.117.251
value = 0 = 0x0

In the above example, the router's DHCP server capability is disabled, though it has already been set to provide a domain name, gateway address, subnet mask, and DNS server addresses once the DHCP server capability is re-enabled. You can change the information that it will provide to DHCP clients using the setdhcpopts command. If you want help on the command you can isse the command thelp "setdhcpopts (all arguments to the thelp command must be includied in double quotes). Once you have set the DHCP options, you can view them with the showdhcpopts command.


-> thelp "setdhcpopts"
Usage: setdhcpopts " { { -d < Domain Name > }
                       { -g < Gateway Address > }
                       { -n <-i> < ith DNS Address > } } "

Note    :    i =  {1,2,3}
value = 0 = 0x0

-> setdhcpopts "-d labyrinth.com -g 192.168.1.2 -n -1 10.22.111.53"
value = 0 = 0x0
-> showdhcpopts

DHCP Module          :  Disabled

Domain Name          :  labyrinth.com

Gateway Address      :  192.168.  1.  2

Subnetmask id        :  255.255.255.  0

First DNS            :   10. 22.111. 53
Second DNS           :  205.197.182.100
Third DNS            :  209.150.117.251
value = 0 = 0x0

With the "-d" option to setdhcpopts, you can set a domain name to be assigned to DHCP clients. The "-g" option allows you to provide the gateway address, in this case the address of of the router itself. The "-n" option allows you to set the addresses of DNS servers to be assigned to clients. The "-n" should be followed by another parameter, a dash and a number that specifies which DNS server value is being assigned, e.g. a "-1" for the first DNS server address or a "-2" for the second. That parameter should be followed by the actual DNS server address.

To specify the range of IP addresses that the DHCP server will assign use the setdhcp command.


-> thelp "setdhcp"
Usage: setdhcp " -a < Start of Address > -n < Number of Addresses > -f -p "

Note    : The value of 'Number of Addresses' must be Greater than ZERO.
value = 0 = 0x0

-> setdhcp "-a 192.168.1.50 -n 10"

 This operation may discard IP addresses that are  previously assigned/reserved.

 Are you sure you want to Continue?[y/n] :y
value = 0 = 0x0

The above setdhcp command sets the DHCP server to assign ten addresses starting at 192.168.1.50.

To actually enable the router to start functioning as a DHCP server, you need to use the enabledhcp. You need to follow that command with the saveconfig command to make the change permanent.

-> enabledhcp
Do saveconfig to save changes
value = 0 = 0x0
-> saveconfig
value = 0 = 0x0

You can then exit from the router with the exitwr command.

-> exitwr

[/network/routers/webramp] permanent link

Tue, Aug 16, 2005 7:20 pm

Arrests Made for Russian Spammer's Murder

The Russian police have announced they've caught those responsible for the murder of the man deemed Russia's number one spammer. Vardan Kushnir, who headed the English learning centers the Center for American English, the New York English Center and the Center for Spoken English was brutally murdered on Sunday, July 25. His death was caused by repeated blows to the head.

Mr. Kushnir was responsible for the transmission of millions of spam messages to Russians and others outside the country advertising the services of the companies he headed. He was well-known as a spammer in Russia and various means of exacting revenge for his spam had been tried in Russia. The American English Center's telephone numbers were widely posted on the web to encourage people to tie up the lines with calls not pertaining to purchasing the services he was advertising and his personal data was also published.The Russian deputy minister of communication recorded a message urging American Language Center to stop spamming and Rambler, one of Russia.s biggest Internet holdings, set up a calling system in its office, that played the message non-stop to the American Learning Center call-center operators and answering machines.

And a complaint was filed against him by a Moscow lawyer with the Russian Antitrust Authority, which is charged with the enforcement of ad laws. At the Antitrust Authority hearing, Kushnir claimed he had no idea who might be sending out those millions of ads for his business and the case was closed.

His death was greeted almost with jubilation by many, with Russian-language media often suggesting he got what he deserved. Some of the headlines for articles about his death included "The Spammer Had it Coming", "Spam is Deadly", "Ignoble Death Becomes Russia.s Top Spammer", "An Ultimate Solution to the Spam Problem". There was speculation in the Russian media and western media that his death might have come at the hands of someone fed up with Kushnir's spam.

But on August 14, Russian police arrested a 15-year-old girl and two boys aged 18 and 17 years of age along with a 27-year-old accomplice in connection with Kushnir's deat. They were accused of breaking into his apartment with the intent to rob him. One of the boys supposedly wielded a baseball bat to kill Kushnir. The story from the youths was that Kushnir had invited them to his place where he made passes at the 15-year-old girl. They said they tried to stop him, but Kushnir grabbed a knife and they were forced to defend themselves by hitting him on the head with an empty bottle. Their story sounds about as credible as Kushnir's claim he had no idea where all of the spam orginated from that advertised his business.

References:

  1. Russian Police Claim Biggest Spammer's Murder Solved
    MosNews
    August 15, 2005
  2. Russian Media Hails Spammer's Murder
    MosNews
    July 26, 2005
  3. Russia.s Biggest Spammer Brutally Murdered in Apartment
    MosNews July 25, 2005
  4. Russian Spammer murdered
    By John Leyden
    The Register
    July 26, 2005

[/network/email/spam] permanent link

Mon, Aug 15, 2005 5:42 pm

Vi

When I'm on a Unix or Linux system, I prefer to use the vi editor, though I also sometimes use the pico editor as well. I also much prefer the Vi IMproved (VIM) editor, which is a vi clone, to Notepad on windows systems. I've lost information I was entering in Notepad countless times on Windows systems when the system crashed or locked up. With Vim, I have a much better chance of recovering my data. Notepad also lacks the robust search and replace features of Vim, which allows you to use "regular expressions" for manipulating text. However, for someone used to only working in a Windows GUI, learning to use the capabilities of Vim will probably take a fair amount of time and would likely be difficult. But if you use Vi on a Unix or Linux system, it certainly is a much more powerful editor than Notepad when you have to use a Windows system.

I've started creating my own Vi tips to help me remember commands that I may not use frequently, but am likely to need again.

[/editors/vi] permanent link

Sat, Aug 13, 2005 11:03 pm

Cydoor cd_clint.dll False Positive

While checking a system for adware/spyware, SpyCop Spyware Remover reported that cd_clint.dll, which was in c:\windows\system32 was part of "ADWARE: Cydoor". Bazooka Spyware Scanner also reported the file as being part of Cydoor.

Though cd_clint.dll is part of Cydoor, this particular file with an MD5 checksum of 65fd7ea79f626f7b57f4d6ced6339f32 is not. Instead it is a dummy file from CEXX Labs, which is intended to allow you to execute a spyware-dependent program without fear that the program is impeding the system's performance with adware/spyware. The dummy file can be downloaded from "Dummy files for neutering spyware".

The CEXX.Org webpage providing the download states that Pest Patrol 4 also gives a false positive result for this file.

For more information on Cydoor and CD_Clint.dll see Advertising Spyware: CyDoor CD_Load.exe and CD_Clint.dll"

In addition to differences in size and MD5 checksums, you can also easily distinguish the CEXX dummy version of cd_clint.dll from the Cydoor adware version by right-clicking on the file and choosing Properties and then Version. The differences between the files are listed below. It is possible Cydoor has released multiple versions of cd_clint.dll, so the size, checksum, and version information may differ for other versions of the Cydoor cd_clint.dll Dynamic Link Library (DLL) file.

 CEXX Dummy VersionCydoor Adware Version
Filenamecd_clint.dllcd_clint.dll
Size48.0 KB (48,640)151 KB (154,624 bytes)
MD5 Checksum:65fd7ea79f626f7b57f4d6ced6339f32 8ca847eba88f8f6505956b0069983811
Download Site #1 CEXX.Org Moonpoint Support
Download Site #2 Moonpoint Support  
Properties
File Version1.0.0.03.2.1.0
DescriptionDLL (GUI)Cydoor Technologies ad-system
CopyrightCEXX Labs + Mike DombrowskiCopyright (C) Cydoor Technologies, Inc. 1999
Comments"For that EXTRA comfort and protection" This is a module of Cydoor's ad system. Additional information is available at http://www.cydoor.com
CompanyCEXX Labs - www.cexx.orgCydoor Technologies, Inc.
File Version1.0.03,2,1,0
Internal NameProjectOneCD_clint.dll
LanguageEnglish (United States)English (United States)
Legal TrademarksCYDOOR is a trademark of CYDOOR Technologies. CEXX.ORG is not affiliated with CYDOOR Technologies Cydoor Technologies(tm)
Original File Nameproject1.dllCD_Clint.dll
Product NameCEXX.ORG Spyware Condom (CYDOOR-Compatible) Cydoor Technologies ad-system
Product Version1.0.0.03,2,1,0
Special Build Description 14

Some antispyware software will report a false positive for the CEXX cd_clint.dll, identifying it as being part of Cydoor adware, apparently from the name alone. Programs I've found report a false positive and those I've found not to report it as malware are listed below.

ProgramProgram VersionDatabase/Definitions Version
False Positive Detection as Cydoor
Bazooka Scanner 1.13.03 8/8/2005
SpyCop 6.21 08-11-2005
Spy Sweeper 4.0.4 (Build 430) 492 (Updated on August 12, 2005)
No False Positive Detection
Ad-Aware SE Personal Build 1.06r1 SE1R61 10.08.2005
ClamWin 0.86.2 19:39 08 Aug 2005 (main: 33; daily 1010)
Microsoft AntiSpyware Beta1 1.0.615 5743 (8/8/2005 8:01:19 PM)
Spybot Search & Destroy 1.4 2005-08-04
Symantec AntiVirus 9.0.0.338 8/10/2005 rev. 4

I also submitted the file to Jotti's Online Malware Scan, which scanned the file with 14 different antivirus programs all of which reported "found nothing" for the file.

References:

  1. Advertising Spyware CyDoor CD_Load.exe and CD_Clint.dll
  2. Dummy files for neutering spyware
  3. Cydoor - Adware removal instructions

[/security/spyware/cydoor] permanent link

Sat, Aug 13, 2005 9:39 pm

Norton Internet Security Network Access Problem

I've spent a few days trying to resolve a problem on a system where there was no web access, but I could ping IP addresses, except for the IP address of the system itself. I finally traced the problem to the Norton Internet Security 2002 firewall software running on the system.

[ More Info ]

[/os/windows/software/security/firewall] permanent link

Sat, Aug 13, 2005 1:06 pm

Registry P3P History Key

While troubleshooting an Internet access problem on a system, I noticed a lot of entries for dubious sites in the registry under HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\. There were a lot of keys for domain names I know are associated with adware/spyware, such as 180solutions.com, brilliantdigital.com, and exactsearchbar.com. There were a lot of other dubious sounding domain names, such as casinoking.com, casinolasvegas.com, and casinodelrio.com. When I checked the values of the keys, I noticed they were all set as follows:

NameTypeData
(Default)REG_DWORD0x00000005 (5)

At Microsoft's WinInet Registry settings webpage, I found the following:

Per Site Cookie Handling

To handle site-by-site cookies, per-domain cookie decisions are stored under the HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History\<domain> key. The domains are added to the registry by WinInet when the user adds sites by using the Per Site Privacy Actions dialog box.

The default value of the <domain> key stores the decision value. The following table shows the possible values.

ValueDescription
REG_DWORD: 1 (COOKIE_STATE_ACCEPT) Accept all cookies from this site.
REG_DWORD: 5 (COOKIE_STATE_REJECT) Reject all cookies from this site.

So a value of five in the key will block cookies from a site listed with that value. The values were probably placed there by one of the antispyware programs I previously installed on the system.

Internet Explorer 6 apparently checks the P3P keys to determine whether to allow a site to place a cookie on the system as described in IE6 and cookies. P3P stands for Platform for Privacy Preferences.

References:

  1. WinInet Registry Settings
  2. IE6 and cookies
  3. P3P Public Overview

[/os/windows/registry] permanent link

Fri, Aug 12, 2005 8:41 pm

Amazon.Com Pays $40 Million for Software Patent Infringement

Amazon.com has been hoisted on its own petard. An Associated Press report on ABC News today states that Amazon paid $40 million to Soverain Software LLC to settle a software patent-infringement lawsuit. Soverain, a small Chicago-based company claimed that Amazon's website infringed on Soverain patents on network sales sysetms and Internet server access control and monitoring systems.

Amazon's own use of software patents to try and stymie competition prompted many to urge a boycott of Amazon a few years ago. Amazon claimed Barnes and Noble's use of a one-click shopping technique infringed on an Amazon software patent. Amazon settled that lawsuit in 2002, but didn't disclose details of the settlement.

Amazon essentially obtained a patent on the idea that a command from a web browser to a web server could carry with it identifying information about your identify, which is done by the use of a cookie. Unfortunately, the US Patent Office is willing to grant software patents for lots of obvious ideas and large corporations now seek to use such patents to stifle competition. And smaller ones can use such patents to reap large rewards for simply being the first to get a patent on the idea. When someone else does the hard part of actually implementing the idea, then the software patent holder takes the other company or individual to court hoping for rich rewards with little real effort involved on their part other than filing the patent application. Instead of fostering innovation as was the founding fathers' intent for patent law, the software patents limit innovation and enrich software patent lawyers and the companies who make a living from waiting on others to implement an obvious idea and then suing them or getting a patent specifically to stymie or harrass a competitor as Amazon did with the 1-Click patent.

Even one of Amazon's own founding programmers, Paul Barton Davis, labelled Amazon's 1-Click patent "a cynical and ungrateful use of an extremely obvious technology." He further stated "Amazon.com's early development relied on the use of tools that could not have been developed if other companies and individuals had taken the same approach to technological innovation that the company is now following."

But it isn't just software patents where the ridiculousness of the US Patent Office's practices is shown. Would you believe the US Patent Office granted a patent on a crustless peanut butter and jelly sandwich? Well they did. The J.M. Smucker Co. was granted a patent on a method for making "Uncrustables", which are just peanut butter and jelly sandwiches with no crust sealed in plastic. And the US Patent and Trademark Office (USPTO) has even allowed a patent on the method of moving side-to-side on a swing. No, I'm not making this up. None other than the Wall Street Journal reports this absurdity in an April 5, 2005 article at Patent No. 6,004,596: Peanut Butter and Jelly Sandwich.

Smuckers also filed a lawsuit based on its patent, going after a small grocer and caterer, Albie's Foods Inc. of Gaylord, Michigan, demanding they stop selling crustless peanut butter and jelly sandwiches.

Why are patents granted on ideas like 1-Click shopping or sealed crustless peanut butter and jelly sandwiches? One reason may be that the USPTO encourages patent examiners to approve patents quickly with minimal quibbling, since the USPTO is now supposed to be financially self-sufficent and charges per patent application processed. You can find further information on what has led to the current state of affairs with the USPTO at The Patent Trap.

References:

  1. Boycott Amazon! - GNU Project
    GNU.org
  2. Unitd States Patent: 5,960,411
    GNU.org
  3. Amazon One-Click Shopping
    June 5, 2000
  4. Patent No. 6,004,596: Peanut Butter and Jelly Sandwich
    By Sara Schaeffer Munoz
    Staff Report of The Wall Street Journal
    April 5, 2005
  5. Children Rejoice -- Peanut Butter and Jelly Patent Rejected on Appeal
    by Dennis Crouch, patent attorney at McDonnell Boehnen Hulbert & Berghoff LLP
    April 8, 2005
  6. The Patent Trap
    Garrett M. Graff
    Harvard Magazine

[/network/web/shopping] permanent link

Wed, Aug 10, 2005 11:57 am

Moving Sendmail's Maillog File

I noticed that a Solaris 5.7 system had run out of free space on the var partition. A "df -k" showed only a few bytes free.

# df -k
Filesystem            kbytes    used   avail capacity  Mounted on
/proc                      0       0       0     0%    /proc
/dev/dsk/c0t0d0s0    2052750 1420927  570241    72%    /
fd                         0       0       0     0%    /dev/fd
/dev/dsk/c0t0d0s3    1015542  953786     824   100%    /var
/dev/dsk/c0t0d0s4    5058110 3396738 1610791    68%    /home
swap                  212496     872  211624     1%    /tmp

I checked /var/log and found that log files were not being rotated and several had grown quite large. So I moved those to another partition. I then used the touch command to create new empty copies of the files and changed their protection so only root, which owned the files, had access.

touch sshd.log
touch maillog
chmod 600 sshd.log
chmod 600 maillog

But the system didn't seem to realize that I had moved those large files elsewhere. It didn't show any increase in free space with "df -k" after I moved the files. I logged into a user account, brought up Pine, and deleted several messages with large attachments. The system then showed an increase in free space and email started coming into the account again. It hadn't been coming in because there was no room to store it on the /var partition.

I then noticed the system didn't seem to be using the new files I created with the touch command. The sshd.log and maillog files weren't growing. I logged into the system with sshd, but no entry was placed in /var/log/sshd.log file for the login. And, though, new mail was coming in, no entries were placed in /var/log/maillog. When I checked the /var/log/syslog file I found that mail entries were appearing there. I checked /etc/syslog.conf and found the following entry that should put entries for sendmail email deliveries in /var/log/maillog.

mail.info                                       /var/log/maillog

And there was an entry that should have been putting entries in /var/log/sshd.log for ssh connections.

daemon.info                                     /var/log/sshd.log

The system had been placing the appropriate entries in those two files until I moved the maillog and sshd.log files. I then realized I probably needed to restart syslog. When I restarted it, the system suddenly acknowledged that I had a great deal more free space on the var partition and an "ls -l /var/log" showed the sshd.log and maillog files growing. And when I checked them I saw that entries were being added again for ssh logins and email deliveries.

# /etc/init.d/syslog stop
# /etc/init.d/syslog start
syslog service starting.

[/os/unix/solaris] permanent link

Tue, Aug 09, 2005 10:40 pm

Free Online Virus Scanners

Some antivirus vendors offer free online virus scanning services. Though in some cases you may have to purchase software from the vendor to remove the detected malware, you will at least be able to determine if the system is infected and the particular malware infecting it.

You can also use Jotti's Online Malware Scan service to submit individual files for immediate free analysis by 14 different antivirus programs.

[ More Info ]

[/security/antivirus] permanent link

Mon, Aug 08, 2005 7:13 pm

Remotely Disabling Windows XP Firewall

The Windows XP Firewall, which is turned on by default on systems running Windows XP Service Pack 2, unless they are in a domain with a Windows SBS 2003 server with an early version of Windows SBS 2003, can be turned off from another machine in the domain by using "Computer Management".

[ More Info ]

[/os/windows/xp/firewall] permanent link

Thu, Aug 04, 2005 8:20 pm

Prnmngr.Vbs

Microsoft provides a prnmngr.vbs script with Windows XP and Small Business Server (SBS) 2003 systems. This script can be found in %windir%\system32, which will normally be c:\windows\system32. The script can be used to add, delete, and list printers or printer connections. It can also be used to set or display the default printer. If you run the script using cscript without any parameters it will display the usage information shown below. If you are unfamiliar with cscript, it provides a mechanism for running VBS scripts. The "/nologo" option for cscript supresses the display of the Microsoft logo information normally displayed when a script is run with cscript. You can run the script from a command line. You need to change to the %windir%\system32 directory or include the full path to the script when you run it, e.g. cscript /nologo c:\windows\system32\prnmngr.vbs -l.

C:\WINDOWS\system32>cscript /nologo prnmngr.vbs
Usage: prnmngr [-adxgtl?][c] [-s server][-p printer][-m driver model]
               [-r port][-u user name][-w password]
Arguments:
-a     - add local printer
-ac    - add printer connection
-d     - delete printer
-g     - get the default printer
-l     - list printers
-m     - driver model
-p     - printer name
-r     - port name
-s     - server name
-t     - set the default printer
-u     - user name
-w     - password
-x     - delete all printers
-?     - display command usage

Examples:
prnmngr -a -p "printer" -m "driver" -r "lpt1:"
prnmngr -d -p "printer" -s server
prnmngr -ac -p "\\server\printer"
prnmngr -d -p "\\server\printer"
prnmngr -x -s server
prnmngr -l -s server
prnmngr -g
prnmngr -t -p "\\server\printer"

If you want to view the default printer for a system you can use the -g parameter.

C:\WINDOWS\system32>cscript /nologo prnmngr.vbs -g The default printer is Microsoft Office Document Image Writer

If you want to view all of the printers for a system and save the output to a file, such as printers.txt, you could use the following command.

C:\Documents and Settings\Administrator>cscript /nologo c:\windows\system32\prnmngr.vbs -l >printers.txt

The information that will be displayed for each printer when you use the -l option will be similar to that shown below.

Server name
Printer name HP Business Inkjet 3000 PCL 6
Share name Pam HP3000
Driver name HP Business Inkjet 3000 PCL 6
Port name USB002
Comment
Location
Print processor WinPrint
Data type RAW
Parameters
Attributes 8776
Priority 1
Default priority 0
Status Unknown
Average pages per minute 0

References:

  1. Microsoft Windows XP - Prnmngr.vbs"
  2. Handy VBS Scripts

[/languages/vbs] permanent link

Tue, Aug 02, 2005 12:15 pm

arch

On Unix and Linux systems, you can use the arch command to display the application architecture of the host system. Systems can be broadly classified by their architectures, which define what executables will run on which machines. A distinction can be made between kernel architecture and application architecture (or, commonly, just "architecture"). Machines that run different kernels due to underlying hardware differences may be able to run the same application program.

On current Linux systems, arch prints things such as "i386", "i486", "i586", "alpha", "sparc", "arm", "m68k", "mips", "ppc" and is equivalent to the uname -m command.

Due to extensive historical use of this command without any options, all SunOS 5.x SPARC based systems will return "sun4" as their application architecture. Sun discourages the use of this command and recommends the use of the uname command instead.

The Solaris version accepts a -k option, which will display the kernel architecture, such as sun4m, sun4c, etc. This defines which specific SunOS kernel will run on the machine and has implications only for programs that depend on the kernel explicitly.

Examples:

RedHat Linux 9 system with a 2.4.20-28.9 kernel

$ arch
i686

Sun Ultra 5 running Solaris 5.7

$ arch
sun4
$ arch -k
sun4u

[/os/unix/commands] permanent link

Once You Know, You Newegg AliExpress by Alibaba.com

Shop Amazon Local - Subscribe to Deals in Your Neighborhood

Valid HTML 4.01 Transitional

Privacy Policy   Contact

Blosxom logo