Afer upgrading to Win 10, I was trying to add shortcuts of my programs to the "all apps" start menu section through copying the program shortcuts to %appdata%\Microsoft\Windows\Start Menu\Programs. This worked with most of the apps but it seems that windows refused to make this work for some ones, mainly portable ones, instead of being added to the "all apps" section some of the apps just get pinned to the start menu.
I really checked tons of webpages trying to found a solution to this and just can't found anything to solve this bug (they just answered how to add a shortcut in the most common case but doesn't tell what to do when that method fails). It was just by accident that I could find a solution, That's why I added this question to the site which I'm going to answer myself just to share this little trick.
Move that shortcut to C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs. At this point most apps should appear on "all apps" start menu section, but if the apps just get pinned to the start menu, continue with the next steps.
Create a shortcut to the new created exe copy using right click over this file and selecting send to/desktop(create shortcut) and here is the trick, once the shortcut is created, rename it so it has the same name that the real shortcut to the program has, once renamed move this shortcut to C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs overwriting the real shortcut that is in there.
Once again create a shortcut of the real program exe file with send to/desktop(create shortcut) and rename it so it has the same name than it had before, once this is done move the shortcut to C:\Users\%UserName%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs
If, of course, you're in the unfortunate position of not having that log entry, your best bet is to go through and see if you can determine when, precisely, it was installed, and correlate that with the Security Event Logs to determine with had an interactive logon session at that time.
The Adobe installer logs might be more helpful in narrowing down the precise time of install too, as it's possible your logging level didn't even log a non-MS application installation in the Event Logs. Either way, it's probably a matter of finding the precise time, and going through the Security logs to determine who had an open type 2 or type 10 logon during that time.
It's really kind of a pain, and if you're the one who's going to be relegated to log diving, it might not be a horrible idea to do a quick cost/benefit breakdown of how much it's going to cost to ferret out this [not-entirely-conclusive] information, because it's not exactly a smoking gun. It'll give you a pretty strong case as to who did it, but unless you have a high enough logging level to see which user called the installer, it's not going to be considered definitive proof. (Or at least I've never seen it taken that way.)
Using Event Viewer, you can filter the Application log for Event ID 11707. Search by the particular date/time you think the program was installed and it will also list a user name. Very useful if you need to track who is installing what, when.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Another option is to use free supervisor tool It allows to restart the crashed app, plus it allows to monitor two or more apps at once and it will automatically close these apps when supervisor's window is closed.
The usual approach is to run what is known as a guardian process. This is a separate process, often a service, that monitors the state of the main process. When the guardian detects that the main service has died, it re-spawns it.
the BAT file will run yourprogram, and then pause and wait around in the background until the program exits. After that it will run "some other event". This used to be kind of annoying if you wanted to run multiple things at once, but here it's actually useful. Using this, it's possible to make it run a loop that restarts the program (and reruns the bat file) as soon as it exits. Combine this with -a-completly-hidden-batch-file, and you'll never even see it happening.
If the program you are running requires admin rights, the solution I found was using psexec ( -us/sysinternals/bb897553.aspx) to run both the program and the bat with elevated privileges. In that case the BAT will look like:
Then you run the bat as administrator, or run the second line (without the psexec part) from task scheduler with elevated privileges. BEWARE: running it as a normal user and clicking "no" on the UAC prompt gave me a BSOD, probably because it looped "can't run program because of lacking privileges" a couple of billion times or something :)
"If you register for restart and the application encounters an unhandled exception or is not responsive, the user is offered the opportunity to restart the application; the application is not automatically restarted without the user's consent. "
Do you need to actively interact with your application's GUI? Some of the Service Wrappers (designed to run any application as a Windows Service) will monitor your application and restart it when it fails, but be sure investigate Session 0 Isolation to ensure that it won't get in the way.
You may use some special app like BDV SystemEvents or any other. It allows you to specify application which will be started if some another application is closed. Specify the same application as a Condition and as an Action and you will get expected results.
I want a way that nobody else, except me, can go there and close this program. A way that only authorized people (me or any other authorized by me) would be able to interact with the computer and/or this opened program preventing it from being closed from anyone else.
Download the latest versions of Actual Tools utilities: Actual Window Manager, Actual Multiple Monitors, Actual Virtual Desktops, Actual Title Buttons, Actual Transparent Window, Actual Window Minimizer, Actual Window Guard, Actual Window Menu,...
You can do this with Windows Kiosk Software Download kiosk software KioWare for Windows . If the program is an exe, the security measures are slightly different, and how secure the app is from users being able to access the OS depends on the app itself.
Here is an example that runs notepad, keeps it on top of KioWare by making KioWare its owner window, and closes it at session end. To use it, replace the entire contents of CustomToolbarCode.js with the code below:
Another example we were able to integrate web into the PowerBuilder program. A fault is that the web cache gets filled up and it does not want to paint the page. So we have do an temp internet files to resolve.
Hola, buenos das, soy nuevo, aun no he recibido mis Q30 pero ya he encontrado la aplicacin para PC en la pagina oficial y luego e instalado un emulador BlueStacks 5, y parece que funcionar. Por ahora me sale en el PC la pantalla del mvil o algo parecido. Cuando me llegue lo conectar por bluetooth al pc, y os comentare. Gracias.
The Soundcore App, primarily designed for mobile users, poses a challenge for Windows users seeking to enhance their audio experience. However, the solution lies in using emulators like BlueStacks or MEmu Play, enabling the use of the Soundcore App on PCs.
If the program has neither its own uninstall program, nor a listing in the Add/RemovePrograms control panel, you mighttry installing it again, and then trying to uninstall it viathe Add/Remove Programs control panel.
Blocking a program in a firewall is a security measure that protects systems from unwanted access. This process monitors resource consumption, limits internet access, blocks inbound access from malicious sources, and prevents outbound access from installed apps. Learn how to block a program in a firewall by exploring when to allow or block programs, methods to permanently or temporarily block in Windows or MacOS, and the common troubleshooting tips.
When deciding whether to allow or block a program in a firewall, assess its legitimacy and potential risks of controlled system access. Your network firewall automatically prevents unauthorized access, but new apps may require manual or prompted exception additions to manage communication and handle blocking issues.
This method for blocking a program in the firewall works for Windows 11, but the process is similar for Windows 10 and previous versions. You can successfully restrict a specific software from accessing the internet by navigating to the advanced settings of Windows Defender Firewall. Follow the steps below.
There are various ways to open Windows Defender Firewall. To get started, go to System and Security in the Control Panel and pick Windows Defender Firewall. You can also type Windows Defender Firewall in the search bar or locate it in the Windows Security folder in the Start menu. Another method is to find it in Settings under Update and Security, or by using the command control firewall.cpl.
Click Advanced settings to pull up the Windows Defender Firewall with the Advanced Security panel. This provides detailed configuration choices for managing firewall rules. You can use this to establish rules that allow or restrict individual programs or services, giving you fine-grained control over network access. This interface allows you to customize firewall settings based on your security requirements.
In the Windows Defender Firewall with Advanced Security console, select Outbound Rules from the left pane. This section contains a comprehensive set of outbound firewall rules that control the outgoing traffic from your machine. You can access these rules to monitor and change the permissions issued to programs and services for outbound communication.
c80f0f1006