Antivirus Nightmares

I’ve used various antivirus programs over the years and want to share my thoughts on some of them. Just recently I was running Symantec Antivirus 10 Corporate Edition. This is a no thrills antivirus program that doesn’t have any of the bloat of the retail version. A few weeks ago I came home and SAV informed me of a hacktool named SVKP.SYS in my Windows directory. I was quited alarmed, wondering how on earth I would have gotten a hacktool. I then went to play one of my favorites games, Command and Conquer Renegade only to find it did not work. Why didn’t it work? Well, it was because SAV had removed SVKP.SYS! See, I also run an addon to Renegade called Renguard. This addon ensures that I am not cheating by using various techniques. In order to prevent debugging tools such as Regmon and Filemon from disassembling and circumventing the program, it uses this tool kit to prevent Renguard from running if it detects these tools.

This is the problem with SAV. Whenever it finds a file that could be used with a virus its immediate action is to delete the file. Instead of this dumb action, how about letting the user decide what to do with the file? In the above case I would have done some research before blindly letting SAV deleting any file it wishes. In addition to doing this, SAV seems to take a ridiculous amount of RAM: 28 MB! 28 MB for what?

I then decided to try out Mcafee 8.0i. Unfortunately, it has the same problem as SAV: removing files that are not viruses, but valid security tools. Mcafee also took around the same memory (27 MB). I removed it at once as well.

I then tried NOD32. Again, it would find files that were not viruses which is really annoying, but at least NOD32 gave me the choice what to do with the files. Now that’s an anti-virus program I like to see! In addition, NOD32 only took up 18 MB vs. 28 MB for SAV and Mcafee. In addition to its small footprint, NOD32 also updates virus definitions DAILY. That means if a virus should break out you are much better protected then with Mcafee or SAV.

NOD32 is available for download for a 30 day trial.

-Soli Deo Gloria

Sony Caves In

After a boat load of bad press, law suits and warnings from the government, Sony decided to recall music CDs using its secret rootkit technology to enforce intellectual property rights. I have very strong feelings about copy protection which you can read here. This is the PDF version of a report I wrote for a class back in college. I think we may get to a point where media is plagued with so many protection systems that people will stop buying them. How much money did Sony save itself with this copy protection scheme? It has to recall all of these CDs, re-compile them, re-press them and re-release them.

Sadly, this is nothing new. Back in the good old days manufacturers intentionally put bad sectors on floppy disks so people couldn’t make backup copies of them. The problem with this approach is that floppy disks are inherently susceptible to corruption and not being able to make a backup copy seriously inhibits the user from using the software. Eventually, the manufacturers removed the copy protection due to decreasing sales.

With all of these copy protection schemes you think piracy would have slowed down or stopped. It hasn’t. In fact, the more protection schemes you have the more people you have looking for cracks. For example: Command and Conquer Renegade. This is one of my favoriate games. Despite verifying its serial online, the game requires me to keep the CD in the CD drive. Why? Well, I might have copied the CD from someone else. I have to keep removing the game CD every time I want to play another CD. Why should I have to bother myself with this? Why not go find a crack that removes the game’s ability to look for the CD? These copy protection schemes only prevent the truly clueless from bypassing them.

The music industry has made a special point of going after consumers that share music with law suits. We can only hope that consumers return the favor with this malware invasion of their personal computers.

-Soli Deo Gloria

The Power of Remote Control

Several years ago I started working in a help desk doing phone support 2 days a week. At the time we did not have remote control capability to workstations. Words cannot describe the frustration there is trying to solve something you cannot see. What I call an icon and what the user calls could be (and usually is) two different things. “Now open My Computer” says the tech and “IT IS OPEN” yells the user. Don’t laugh, it happens far too often. Eventually, the help desk did get a buggy version of workstation remote control software with Novell Zenworks 3. However, this little beast was based on IPX communications which are older and much more unreliable then TCP/IP communications. We also had problems with video acceleration crashing the remote control agent on the user’s machine, so I had to figure out a way of disabling the acceleration. We finally got Microsoft SMS 2003 for inventory management and remote control and let me tell you that is one sweet product.

Of course you probably don’t have money for SMS 2003 and that’s where VNC comes in. VNC stands for Virtual Network Computing and was originally developed by AT&T. Those nice guys at AT&T released the source code for VNC into the public domain (or more specifically: GNU…I know GNU’s not public domain, but you get the point). VNC lets you connect to a client workstation from your own workstation for…..FREE. Free? Yes, free. Everyone likes the word free including me!

So how does it work? You basically put a remote VNC host on the workstation (a mini server) and then you connect to that workstation using a VNC viewer. This is done using the standard TCP/IP protocol. It will even do it by host name (which resolves to an IP address). At my new company we didn’t have any remote control software, so I decided to use VNC on our workstations (with management approval of course). There different “flavors” of VNC: RealVNC, TightVNC, UltraVNC, etc. You can lock down VNC by using a password to keep out the bad guys. UltraVNC will do Windows authentication, RealVNC will not (unless you pony up money for the enterprise version).

In the course of using VNC you’ll notice one really annoying thing: no computer list. There’s really no way of knowing what computers have VNC and which ones don’t. That’s where VNCScan comes in. VNCScan will scan your network based on the IP parameters you give it and will search your entire network for VNC and RDP clients. How cool is that? Now this program is $39 per administrator, but there is a trial copy at the web site that is good for 30 days so you can completely test drive the program before buying (that’s PER administrator, NOT per computer!). After downloading and installing the program you make a group (or multiple groups). You then specify the starting and ending IP address. Now you can right-click on the group and pick Scan. Again, make sure you have permission from your management team to do this as this will do a port scan of your whole network. Some network administrators may get a bit upset at you if you don’t ask first.

If you are are running Windows XP SP2 like I am you’ll notice that VNCScan won’t recognize computers that are truly running VNC nor find them. What gives? Well, according to VNCScan you need a patch to boost your concurrent TCP/IP connections. That brings us to this site which claims “Since XP SP2 there are only 10 concurrent TCP connection attempts possible, while in SP1 it has not been limited.” Well, thank you Mr. Gates! I’m sure this is all part of the M$ security initiative: if you cannot run port scanners you cannot be a bad boy with Windows XP SP2. I ran the patch and sure enough, VNCScan worked like a charm. The makers of VNCScan claim you should boost the default number from 10 to 10,000, but I just did 100 and it seemed to work fine.

The amazing part did not stop there. The company I currently work for now is setup in one big Microsoft work group. There is no way of pushing programs out to users workstations (no free way at least). When I saw the option in VNCScan to right-click on a computer object and “Deploy VNC here”, I was expecting it to fail. To my surprise it actually worked! I spent countless hours trying to get programs to push out to a PC and here was VNCScan doing it like it was nothing. Now, there a few caveats to this. You need local administrator rights on the box you are trying to push VNC out to. You’ll also need Windows Script Hosting (WSH) on the target box, so this will only work with 2000, XP and beyond. Finally, I’m guessing you’ll need File And Print Sharing, Remote Registry and the Server services enabled on the target workstation (and the Windows Firewall turned OFF). I’ll going to try to decode the script they use, because it seems to work quite well. There is one bug I found in the program. The list shows computers that have VNC on them and those that don’t. If you pick “Deploy VNC Here”, VNCScan shows that computer has VNC on it after the script runs on it even if the script fails to install VNC on the computer! They need a cleaner way of determining if the installation was successful or not.

If you read up on UltraVNC you’ll also notice a program called UltraVNC SC. What can you do with this program? Well, lets say you have Joe User on the West Coast having problem with his laptop. Joe User is behind a router with a private IP address. How in the world are you going to connect to Joe User? That problem is solved with UltraVNC SC. This PDF was shamelessly pulled from a sticky in the UltraVNC forum. Simply stated: you start a VNC lister on your end opening up port 5900. You’ll need an external name or IP address which you can simply get for free from You then configure UltraVNC SC per the instructions and then throw it up on a web site. Have Joe User download the program and then run it, and bingo, he connects right into you. No fuss, no muss. Now if you don’t think that is impressive, check out Webex which offers a commercial version of this technology that goes for $149/month for one seat. Just imagine the possibilities: if you have a computer store you can configure your store logo into UltraVNC and then offer that as part of warranty service. Maybe we can dream, like those spam messages that always say, “work from home and make thousands”. Hey, maybe this is not such a bad idea after all.

Now, your security team (if you have one) will need to do a risk assessment and evaluation of VNC. I believe the authentication piece is encrypted, but the rest of the communication is not. I also noticed the administrator password I used to connect to workstations was in plaintext in the file C :Program FilesTGCSVNCScan Console .NETauth.cmd. If I should decide to register this program I believe that this issue needs to be addressed.

-Soli Deo Gloria

The E-mail Problem

Now I know why I hate AOL. A couple of years ago I subscribed to an e-mail service called Mailblocks. I had a bunch of my news letters forwarded to various aliases at Mailblocks and it worked quite nicely for curbing spam. A few months ago AOL bought out and hired all of the Mailblocks staff. I got a sickening feeling about this, but there wasn’t another e-mail service that did what Mailblocks did (Challenge/Response spam control and aliases). The service started to get slow and was down for long periods at a time. Alas, on October 16th, AOL announced it was discontinuing the Mailblocks service and was replacing it with a crappy version of its own. Yes, I said crappy. There was no mention of Challenge/Response spam control in this new e-mail service and of course you can imagine that my e-mail address would be Shudder! I’m sure there’s a few blacklists roaming out there with plastered all over them.

I quickly regained my composure and went over to This is a nice little web site that has information on all sorts of e-mail providers. If you are looking for an e-mail provider I highly suggest it. My big requirement was aliases. Why? Well, when I go to a merchant’s web site they always want my e-mail address. There’s really no way of tracking who sold your e-mail address when you have given your e-mail address to multiple providers! So I made an alias for every web site I went to. This alias would forward e-mail to a specific folder. I found that when I started to get spam in one folder I would simply delete the alias and make a new one. Once your e-mail address is on a spam list it is never coming off of it. Granted, this required a lot of work on my part, but it kept my inbox pretty darn clean.

The first e-mail provider that caught my eye was Unfortunately, they only offer 5 aliases on their own domain. Then I saw an intriguing feature: having them host your own domain name for e-mail! On went on to look at this and saw that domain registration is $8 a year. I could register my very own domain name and keep the same e-mail address as long as I wanted to. I continued on and found the e-mail provider Tuffmail. They offered unlimited e-mail aliases and 500MB of space at $25/year. That is what Mailblocks was charging and they only offered 100MB of space and 25 aliases. I also decided to register a domain in my name: literally my last name of Leinss. This name is very unique and cool. I can search the whole Internet and see everything that I posted. You will find a few of my relatives by searching on this term.

Using Tuffnames I registered for the next 10 years. What’s cool is that even if Tuffmail goes out of business I can point my MX records to the mail server of my new provider. Here’s another cool feature: forwarding domains. I can actually “park” my domain at Tuffnames (a reseller of GoDaddy) and then have it forward to my web page at Kirenet. If Kirenet goes out of business, I just move my web site to another provider and change the forwarding domain. I actually tried to keep the same e-mail address long ago with They promised a free e-mail address for life and free forwarding. After several years they were bought by another company. This company decided that free forwarding was not in their best interest and forced everyone to pony up money if you wanted your “free, lifetime e-mail address” to get forwarded to somewhere else. No grandfathering, no backing of the earlier promise, nothing. I was using this e-mail address ( on the USENET for many years and I was getting about 75 pieces of spam PER day. It was time to give up the “lifetime” e-mail address.

How do you get the best e-mail experience?

Use “disposable” e-mails for merchant web sites. Never give them your “real” e-mail address.

Never post your real e-mail address on the Internet. If you must, make sure you tailor it in a way that doesn’t look like an e-mail address. For example: on my web page I made an alias web @ If you send e-mail to web it gets forwarded to my web folder. If some nut job decides to spam that alias I just make a new one (which takes all of 30 seconds). Combined with the spam lists that Tuffmail offers (which are impressive I must say and very configurable client side) and unlimited aliases, Mr. Spam Man ain’t getting to this guy!

Give your real address to friends and acquaintances only.

-Soli Deo Gloria

Windows PE

Earlier this year Microsoft discontinued licensing MS-DOS (finally!). Let’s see: MS-DOS 1.0 came out in 1981 and now it’s 2005. 24 years for an operating system isn’t bad! Yet even after the pulling of support for MS-DOS it still is very much with us. I use a MS-DOS network bootdisk every day at work to pull down Ghost images from the server. At my last work place we were still using a DOS program for scheduling surgeries based on the old BTREIVE database technology and a DOS program to fill prescriptions in the pharmacy. Just a few weeks ago I was helping a user troubleshoot a program running in GWBASIC, an old DOS based 16-bit BASIC compiler!

Upon the arrival of Windows 2000 we had the introduction of NTFS to the masses. DOS doesn’t do NTFS without special software like NTFSDOS. Unless you pony up money for the commercial version of NTFSDOS the only thing you can do is read files from DOS. This is a serious drawback for trying to do troubleshooting and recovery data from NT systems. Microsoft’s solution: Windows PE.

What is Windows PE? Well, here’s what Microsoft says: “Microsoft® Windows® Preinstallation Environment (Windows PE) is a tool based on Microsoft Windows XP Professional that allows IT staff to build custom solutions that speed up deployment through automation so they spend less time and effort keeping desktops updated. Windows PE can run Windows setup, scripts, and imaging applications. Enterprise Agreement (EA) and Software Assurance Membership (SAM) customers received Windows PE in their October 2002 updates, and it will continue to be offered as a benefit of Software Assurance.”

Well, that isn’t very descriptive. Essentially Windows PE is a modified version of Windows XP that is designed to run from a CD-ROM disc, that is, a read-only media. As you can see above, if you aren’t a big cheese with an EA agreement you don’t get to play with Windows PE. However, if you compare the files from the Windows PE to the Windows XP Pro CD you will find most of the files are identical.

That is when Bart Lagerweij made something called the PE Builder. This allows you to make your own version of Windows PE called BartPE (BartPE is very much like Windows PE, but for legal reasons Bart isn’t able to say that). BartPE is very cool! It supports many plugins for different applications. Here’s a cool one as an example: Key Finder PE. You can boot from a Windows PE CD, run this program under Windows PE and it will give you the machine’s product key! This could be useful say if a hard drive crashed and your customer didn’t have their original key handy.

There is a complete discussion forum dedicated to BartPE over at 911CD. This technology will be very big in Windows Vista replacing what we now know as the Recovery Console. So make yourself very comfortable with technology.

– Soli Deo Gloria

To err is human…

Back in August of 1998 on a Friday night in a little Best Buy store I got my first work order. It was to install a ZIP drive into an IBM Aptiva. Having played with computers as a hobby I thought this was going to be a snap. I attempt to open the case and no go. I kept on pulling up and forward on the case and it would just not go! I headed to the Internet and found out that there was a pull release switch under the front bezel. With the case off I then found the drive bay being covered by a metal blank. Taking a pair of pliers I yanked and twisted that piece of thin metal to a certain point, then I started to use my fingers. You guessed it: slice of a finger! I was bleeding all over the customer’s computer! By this time it was near closing time and I was very frustrated at this point. I finally installed the ZIP drive, tested with a ZIP disk and threw it back together (wiping all the blood off of it of course).

A few months later I had become good friends with my boss and he told me he thought I was a idiot at first. “Why?”, I asked. “That first installation on your first day you did was really bad. You forgot to remove the front cover on the drive bay where the ZIP drive was sitting and you disconnected the floppy drive in the process! I thought you were a complete idiot.” Mea culpa! I had rushed the job: testing the ZIP drive without the front bezel on and then just slapping it together and throwing it back on the shelf. Thank goodness my career was not judged on just that one day. All be told, I’ve cracked motherboards, destroyed data and even blew up a NT 4.0 server acting as a print router (thankfully not on the same day)!

All these incidents are great because I learned from them. Fixing computers is almost like a game of chess: everyone understands all the basic rules of chess, but not everyone is a grandmaster. The more chess games you play the better you become. You might favor one opening and your opponent another. You might have all the chess knowledge in the world, but if you act impulsively you will likely lose to a less experienced player. You will make mistakes whether you like it or not.

Case in point: when faced with a crashing system in the past I would usually just rebuild a system from scratch. This might be OK in the consumer arena where people back up their data religiously to CD-Rs and other removable devices (can you feel the sarcasm?). However, that wouldn’t fly on the VP’s computer who stores all of his personal documents and kids pictures on his laptop. Pretend the computer is your opponent. You don’t want to be checkmated or stalemated, you want to win! How do you do it?

First, ask the right questions to the user:

* When did this start happening?
* Has anything changed within the last X days?
* How often do you do this function?

Then, start the troubleshooting:

* Check the event logs (assuming a NT system). Log anything suspicious.
* If you get an error message log that.
* Check startup entries using Autoruns and the processes running by using Process Explorer.

Now, research the problem:

* Input the error code or problem into Google. You’ll be surprised the wealth of information out there!

* Check Microsoft’s Knowledgebase. People all over the world contact Microsoft for tech support and you will surprised at the amount of knowledge there.

* If you still cannot figure the problem out post what you are experiencing on Experts Exchange or USENET.

You can post on USENET via Google Groups. USENET is a world wide messaging state dating back to the early 90’s. Just do a general search on what you are having a problem with (e.g. input “Outlook 98” if you were having problems with Outlook 98) to pinpoint the news group (message board) that handles such problems and post your problem there. For example: I like to frequent the news group microsoft.public.win2000.setup_deployment. This news group focuses specifically on deployment problems with Windows 2000. Not Windows 9x, not NT 4.0 or XP: just Windows 2000. The people that frequent this news group are usually very familiar with the subject at hand and this is usually the case for many other news groups. There are over 40,000 USENET news groups relating to subjects such as computers, tv sitcoms, bands, politics and anything else you can dream of. Google Groups has archived USENET messages all the way back to the early 90’s, so this is another great place to search for conversations on specific error messages and problems.

Finally, implement the solution. Sometimes people will give you 6 or 7 possible solutions. This might require more research on your part. If the problem is happening on Windows 2000 and someone gives you a fix for Windows NT 4.0 you need to realize that will probably not fix your specific problem.

How do you become a better PC Technician? Here’s what I think:

1. Experience: the more you play with computers the better you get.

2. Willingness to learn: if you think you know it all you will fail miserably.

3. Thirst for knowledge: you might think this is the same as #2, but it is not. I may be willing to learn something new, but not ambitious to go out and learn about other new things.

4. Know your limitations: Clint Eastwood said it so it must be true. Seriously, some problems go past your knowledge. In those cases you have to park your ego and go ask for someone else’s help.

– Soli Deo Gloria

Windows Vista

Microsoft recently announced the next version of Windows will be called Windows Vista. August 24th will mark the 10th anniversary of the launch of Windows 95. I remember that era very well. I was running Windows 3.1 on DOS 6.22 on a 486SX/33. When my mom went shopping at the supermarket I would always go to the magazine rack. I would read articles about “Chicago”, the codename for Windows 95 and check out screenshots of builds in progress. It was all very exciting to computer users because it was the first 32-bit Windows version for consumers. I remember reading about long filenames, the start menu, built in WINSOCK and plug and play support. Today, we don’t even think or appreciate these features. Before Windows 95 you had to name everything in the 8+3 format. Imagine MP3s being limited to the 8+3 format: madonna1.mp3, madonna2.mp3, etc. If you wanted to get on the Internet with Windows 3.1 you had to get Trumpet Winsock. By the way: did anyone ever register Trumpet Winsock? It was shareware, but no one ever seemed to care about that.

My favorite operating system of all time is Windows 2000 Professional. I remember ordering a Hands On Training (HOT) kit for $129 that included Beta 3 copies of Windows 2000 Pro, Server and Advanced server, a training CD, a sales CD and a free t-shirt. The kit also included final build, Not For Resale (NFR) copies of Pro, Server and Advanced Server, with the server versions having 10 CALs each. I just loved the shadow under the mouse: it made the operating system seem 3D like! Now we have Windows XP: product activation, skins and bloat. OK, OK, I admit it: I have a Macintosh theme on my Windows XP laptop! I look at Windows XP as a Windows 2000 add-on. It took 3 years and over 5000 developers to create Windows 2000 and it’s still going strong.

I can’t wait to try out a late beta of Windows Vista. I heard they are getting rid of the old DOS like underpinnings and are replacing the setup routine with a Windows PE like environment. You can keep up on the development of Windows Vista (a.k.a. Longhorn) by visiting Paul Thorrutt’s web site. Paul also has a nice, text based newsletter called WinInfo that he sends out packed with the latest geek news. I highly recommend it. Best of all it’s FREE!

Here are two videos on the daily workings of making a Windows build:

Windows XP Daily Build Cycle

Windows 2000 Daily Build Cycle

Voxware Meta Sound Codec (needed to listen to Windows 2000 video)

– Soli Deo Gloria


One Friday morning several months ago I encountered a very perplexing problem. A bunch of tickets called into the Help Desk about Windows 2000 machines BSODing. BSOD = Blue Screen of Death: a techie’s favorite (or not so favorite) term to describe a dead Windows machine. We determined that a patch pack pushed out the night before was likely the cause. However, the BSOD only seemed to happen on reboot and only on certain Omnitech 3200 machines and not all of them, nor all the time! Upon rebooting some of these machines several times they worked fine until later on when they were rebooted again. I even took one of them out of commission that was crashing, turned off automatic rebooting, wrote a reboot script and left the machine to reboot for 24 hours continuously. Not once did it crash!

The event log showed nothing, a Google search on the error came up with nothing and the crash could not be consisently produced on demand. The BSOD itself was very useless: an INVALID_PAGE_FAULT in NTOSKRNL. NTOSKRNL, as you know, is the heart of the Windows 2000 operating system. It was painfully obvious that it was not the cause of the crashes. We would either rebuild the machines which would fix the problem and then reapply the security patches or just tell the user to keep rebooting the system (incidentally, booting the PCs into safe mode always worked).

After several weeks of rebuilding machines we grew very tired of the situation. No one seemed to have an answer and someone was even called in on a Saturday to reboot a PC with this problem! Something had to be done! Having trial copy of Winternals Administrator Pak 5 I had access to Crash Analyser. What this tool does is it uses Microsoft’s own debugging tools to decipher the dump file and then it in turn deciphers the Microsoft debug summary to make a best guess as to what caused the crash. I grabbed the C:\WINNT\MEMORY.DMP file after turning on crash dumping on one of the machines causing an issue. Upon running the utility I found out that idechdr.sys was the file causing the crash! So, after discovering this, I went to each machine called in and uninstalled the IDE drivers in safe mode and then let Windows 2000 redetect them on the next reboot. This solution finally worked!

This does not explain however what caused this in the first place. I had an Omnitech 3200 under my desk as my work PC and never once did it fail on me with the BSOD. It’s very likely that your company won’t go out and purchase the Administrator’s Pak based on cost, so you can read Dirk Smith’s excellent article entitled How to solve Windows system crashes in minutes which uses only the freeware debugging tools directly from Microsoft.

– Soli Deo Gloria

Universal Network Boot Disk

What better way is there to compliment your new universal Ghost image and impress your boss then a universal network boot disk? A PXE server? OK, so maybe it’s not the greatest thing in the world, but it sure beats carrying around lots of floppies with you. Not to digress, but why is it that we are still using floppies? The IBM PC was invented in 1981 and here it is 2005 and just last year Microsoft sent out a white paper to companies pleading with them to support booting from USB Flash Devices (UFD). Come on guys, wake up! UFDs are bigger, more reliable and a lot more fun than floppies. Now that Windows PE 2005 supports booting from UFDs we need to pressure these companies to support booting from them.

OK, back to the network boot disk. The one I’m talking about is Bart’s Network Boot Disk. One word: freeware. Yes, freeware! I love Bart! He’s also the one that makes PE Builder. Check it out: it’s very cool stuff! Download the full BFD package and extract it to a directory. Now execute “bfd msnet A:” from the command line. This will make a self-booting network boot disk using the MS-DOS 7.1 files (an interesting side note here is that Bart has had legal problems with Microsoft and PE Builder. It’s a mystery then why he would bundle the MS-DOS 7.1 files directly into this package even though these files are available in particularly every corner of the Internet). Congrats, you just made a universal network boot disk!

Listed on the same page are driver CAB files for practically every NIC ever made! Now here’s the slick part: you can just drop in the CAB files you need into A:libndis and the disk will rebuild itself accordingly! How cool is that? You’ll notice that the drivers haven’t been updated for at least 2 years and may not include support for the latest NICs. That was the problem when we got in motherboards supporting the Intel 915 chipset. The network boot disk would not find the NIC and even when we manually picked it off the menu the driver would not work (it was a variant of the Intel Pro 100VE). Let’s look into how the boot disk works. Every PCI device has a unique hexadecimal id. Let’s boot from the network boot disk you created and run pciscan -v:

We can clearly see that there are vendor ids and device ids. Based on these two pieces of information the boot disk can determine what driver to load. If you download PCISCAN from his web site it gives a much better explaination then I give. PCISCAN gets its information from Let’s look for this vendor id in this file:

ven=10B8 “SMC”
dev=0005 “SMC9432TX EtherPower II 10/100”
ven=1011 “DEC”
dev=0002 “DC21040”
0014 “DC21041”
0009 “DC21140”
0019 “DC21143”

There is it! I booted the disk using Virtual PC 5 and this is the type of NIC it emulates. So 1011=DEC and 0009 = model DC21140. Let’s take a look inside one of these CAB files sitting in A:libndis:

  • e100b.dos
  • e100b.ini
  • ndis.pci
  • ndis.txt

If we look into ndis.pci for the above driver this is what it looks like:

ven=8086 “Intel”
dev=1002 “PRO 100 Mobile Adapters”
1031 “PRO/100 VE Network Connection”
1032 “PRO/100 VE Network Connection”
1035 “PRO/100 VM Network Connection”

So in the case of us getting the new computers in with the Intel 915 chipset we just had to get a new .DOS file and update the .PCI file with the correct hexadecimal id. You can get the latest .DOS file easily by visiting Intel’s web site. They have DOS drivers for all their NICs. We can use PCISCAN or PCI32 to find the hexadecimal id of the NIC and then add that with the appropriate description. Finally, we have to repackage them back up into a CAB file. You can download from here to do that.

The other advantages to this disk are that it randomizes the NETBIOS name so you can use it in multiple computers at the same time. You can also setup a profile which will save the work group or domain name so you don’t have to keep entering it each time. I editted the disk so that it just boots without sitting at the menu asking if you want emm386 support or not. The other thing I changed is the prompt for the second password. This can be fixed by editting the msnet.bat in Make the following changes:

—————-in this section——————-
echo MSNET: Network logon as “%p_user%”
net logon %p_user% %w_passwd% /yes /savepw:no

change to:

—————-change this——————-
net logon %p_user% %w_passwd% /domain:%logondomain% /yes /savepw:no

—————-in this section——————-
echo MSNET: Starting network services
net start workstation
if errorlevel 1 goto _abort


——————add this———————–
echo %w_passwd%> password.txt

That gets rid of the second prompt for the password. Again, note that you will have to use makev3 to repackage the files extracted from back into a CAB file. Note that since this is a DOS boot disk you’ll also need WINS support on your network to make it work. DNS alone will not cut it! The bad news is the new 64-bit processors won’t do 16-bit applications or true DOS anymore! Hopefully Windows PE will be well supported for booting purposes by the time 64-bit processing becomes popular. You can port this boot disk to a UFD as well, making boot time in 12 seconds or less so when you have inpatient techs like DAVE it will go faster for them!

– Soli Deo Gloria