Check For Update Windows 10

0 views
Skip to first unread message

Christina Smith

unread,
Aug 5, 2024, 1:34:04 PM8/5/24
to winnmulgingrang
Isthere a way to check the Splunk version number in Windows? Having a hard time tracking it down. Add/Remove Programs lists "a" version number (i.e. "107.2.31363") but that is not matching up to the publish splunk version / build numbers. I'm not seeing the Version property as being set on splunk.exe or splunkd.exe etc. Thanks!

This section contains descriptions of common bug check codes that are displayed on the blue bug check screen. This section also describes how you can use the !analyze extension in the Windows Debugger to display information about a bug check code.


Provide the stop code parameters to the !analyze command to display any available parameter information. For example, to display information on Bug Check 0x9F: DRIVER_POWER_STATE_FAILURE, with a parameter 1 value of 0x3, use !analyze -show 0x9F 0x3 as shown here.


When a bug check occurs, a dump file may be available that contains additional information about the contents of memory when the stop code occurred. To understand the contents of memory during a failure, knowledge of processor memory registers and assembly is required.


Live Dump stop codes to not reset the OS, but allow for the capture of memory information for abnormal situations where the operating system can continue. For information about live dumps, see Bug Check Code Reference - Live Dump.


Sometimes when I'm doing a little project I'm not careful enough and accidentally add a dependency for a DLL that I am not aware of. When I ship this program to a friend or other people, "it doesn't work" because "some DLL" is missing. This is of course because the program can find the DLL on my system, but not on theirs.


To do this you need to install Cygwin (basic installation, without additional packages required) on your Windows and then just start Cygwin Terminal. Now you can run your favorite Linux commands, including:


The safest thing is have some clean virtual machine, on which you can test your program. On every version you'd like to test, restore the VM to its initial clean value. Then install your program using its setup, and see if it works.


Dll problems have different faces. If you use Visual Studio and dynamically link to the CRT, you have to distribute the CRT DLLs. Update your VS, and you have to distribute another version of the CRT. Just checking dependencies is not enough, as you might miss those. Doing a full install on a clean machine is the only safe solution, IMO.


On your development machine, you can execute the program and run Sysinternals Process Explorer. In the lower pane, it will show you the loaded DLLs and the current paths to them which is handy for a number of reasons. If you are executing off your deployment package, it would reveal which DLLs are referenced in the wrong path (i.e. weren't packaged correctly).


Currently, our company uses Visual Studio Installer projects to walk the dependency tree and output as loose files the program. In VS2013, this is now an extension: -9bba-44a1-be59-0fbf6151054d. We then package these loose files in a more comprehensive installer but at least that setup project all the dot net dependencies and drops them into the one spot and warns you when things are missing.


In the NDepend Project Properties panel, you can define what application assemblies to analyze (in green) and NDepend will infer Third-Party assemblies used by application ones (in blue). A list of directories where to search application and third-party assemblies is provided.


If a third-party assembly is not found in these directories, it will be in error mode. For example, if I remove the .NET Fx directory C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319, I can see that .NET Fx third-party assemblies are not resolved:


In the past (i.e. WinXP days), I used to depend/rely on DLL Dependency Walker (depends.exe) but there are times when I am still not able to determine the DLL issue(s). Ideally, we'd like to find out before runtime by inspections but if that does not resolve it (or taking too much time), you can try enabling the "loader snap" as described on -loadlibrary-failures.aspx and -us/library/windows/hardware/ff556886(v=vs.85).aspx and briefly mentioned LoadLibrary fails; GetLastError no help


To view ".dll" dependencies and other useful information in Windows - i can highly recommend the CFF Explorer ( _id=388) its free and very useful. You can view "import" and "export" dependencies of the ".dll" file and many other functions. And it comes with a GUI - so you dont have to use the cli ...


Since the past 6 months we have been getting around 50-70 random computers every month not booting up after the pending reboot after installation of monthly patches from Microsoft. The computers get stuck at the HP logo (All of our computers are HP elitebook but different generations) with spinning wheel.


After creating a windows dump file and analysing it with help from Microsoft, they have identified the problem to be the Checkpoint zone alarm firewall driver vsdatant.sys interfering with letting Microsoft drivers loading. As I have noticed the vsdatant.sys driver is loading at high priority at kernel stage and therefore blocking everything else.


We are not able to recreate the problem, it affects random computers every month, one month a computer can install the patches and boot up after restart without problem other month same computer is failing. Troubleshooting this has not been easy.


When booting in safe mode or disabling the vsdatant.sys file temporarly the computer boots up and finnishing up the patch installation. And then when we enable it we cant restart the computer without any isse.


We created a ticket to Checkpoint and awaiting response. April patches just released and when deploying to a pilot group we already got one crashed computer so we are not confident enough to rollout the patches.


We are only using CheckPoint endpoint VPN on the computer and are using Windows defender as main firwall/antivirus. We had a working solution since Windows 7 where we never got any issue, after upgrading to Windows 10 we only upgraded the VPN client on the computers to a supported version for the specific Windows release, no change in config has been done on the server side. From my understanding that should not be necessary since the only policy that is downloaded to the client when using the VPN is just IP rules. However, my knowledge of the network part is limited... but since its working fine for so many computers and random computers are failing i dont think thats an issue. Worth mentioning is that we use UEFI, SecureBoot. Is Secureboot maybe causing this?


We have more than 5000 Clients and work with a Change Mgmt (ITIL conform) - this takes a very long time period to organizice /test/ create a Empirum-paket/ get approval /rollout in all over the world in my company.


To make sure you're protected by the latest security updates, Google Chrome can automatically update when a new version of the browser is available on your device. With these updates, you might sometimes notice that your browser looks different.


The browser saves your opened tabs and windows and reopens them automatically when it restarts. Your Incognito windows won't reopen when Chrome restarts. If you'd prefer not to restart right away, click Not now. The next time you restart your browser, the update will be applied.


A word of warning: using default Notepad on big files can be very slow, so better not use it for files larger than a megabyte or a few. In my case, it took about 30 seconds to display a 12 MiB file. Notepad++, however, was able to display a 120 MiB executable almost instantly.


If you have a HEX-Editor available, the offset of PE Signature is located at offset 0x3C. The signature is PE\0\0 (letters "P" and "E" followed by two null bytes), followed by a two-byte Machine Type in Little Endian.


The relevant values are 0x8664 for a 64-bit executable and 0x014c for a 32-bit one (64 86 and 4c 01 respectively when adjusted for endianness, but any decent hex editor will automatically handle endianness when you search for a hex value). There are a lot more possible values, but you probably won't ever encounter any of these, or be able to run such executables on your Windows PC.


Many people have the excellent 7-zip installed, and have added the 7-Zip folder to their PATH. 7-zip understands file formats other than ZIP and RAR, such as MSI files and PE executables. Simply use the command line 7z.exe on the PE file (Exe or DLL) in question:


A simple method is to run it (assuming you trust it) and take a look at the process tab in task manager. 32bit processes will show "* 32" at the end of the process name. If it's not something your willing to run on your computer you can try EXE Explorer. It will show a whole bunch of info on executables including if it's 32 or 64bit.


Here's a Powershell solution, no external dependencies or anything. Open Powershell, paste the function in there (hit Enter twice so that you return to the prompt), then use it as in my examples below the function:


Even an executable marked as 32-bit can run as 64-bit if, for example, it's a .NET executable that can run as 32- or 64-bit. For more information see -do-i-determine-if-a-net-application-is-32-or-64-bit, which has an answer that says that the CORFLAGS utility can be used to determine how a .NET application will run.


If you are on Windows 7, on a Windows Explorer, right click on the executable and select Properties.At the properties window select the Compatibility tab.If under the Compatibility Mode section you see Windows XP, this is a 32 bit executable.If you see Windows Vista, it is 64 bit.


I haven't seen this mentioned. There is a PE viewer program called CFF Explorer by NTCore, which can provide you this information. It can be downloaded and run as portable, but you can install it as well, if you wish.


I know they are many answers here, but none of them are really portable and require some kind of tool to use. I wanted to solve this in a programmatic way for all platforms. This will work on anything with a C compiler.

3a8082e126
Reply all
Reply to author
Forward
0 new messages