Show all posts by user

Re: How to run GPResult command

2 years ago, by Ann in Network Scanner Forum

Yes, you can run any external commands, including GPResult, in Settings - Applications tab. If the console window closes before you can read its output, prepend it with cmd.exe /k, for example: cmd.exe /k gpresult.exe /S %0

Re: How to disable Double reverse lookup

2 years ago, by Ann in Network Scanner Forum

To turn Double Reverse Lookup off, you need to go to Options - Additional tab, and uncheck Perform double-reverse lookup.

Re: Error when deleting a disk

2 years ago, by Ann in RAM Disk Forum

You seem to be adding the RAM disk with ramdisk.exe (GUI version) but deleting it with ramdiskc.exe (console version), and that's not a correct way to do it. If you simply need to create a disk, use it, and then delete it, please use ramdiskc.exe for every step. It's a console interface without user prompts designed to be used in scripts and automation for on-demand disks. Whereas ramdisk.e

Re: What is "Locally administered address"?

2 years ago, by Ann in WiFi Guard Forum

It is basically a MAC address set by a network administrator. MAC address can be either: Universally administered address (UAA), which is a unique address assigned to each physical device by the manufacturer. Locally administered address (LAA), which can be assigned to the device by a network administrator or by special software and override the UAA for that device. Universal address admini

Re: "The volume for a file has been externally altered" error - Resolved

2 years ago, by Ann in RAM Disk Forum

I am sorry to hear about the virus in your system. If mounting the image file at 4096 byte offset did not work, it is likely that the file system was damaged beyond repair. Especially if what you've got is a ransomware type of malware; they can encrypt parts of the file in an attempt to extort money.

Re: How to find out the number of streams

2 years ago, by Ann in Bandwidth Manager Forum

The number of streams is not really related to the number of connections passing Bandwidth Manager. It rather determines how many rules you can create and how many users can be tracked. There are two types of rules, depending on how their tracking mode is set: With the default setting, any connection within a rule shares the defined bandwidth limit. In this case, 1 rule = 1 stream. Simply determ

Re: "The parameter is incorrect" error

2 years ago, by Ann in RAM Disk Forum

Unfortunately it is hard to tell what is causing this, and it will require further investigation. It could be a Windows update, file system corruption, Visual Studio installation, or the changes in RAM Disk v4.3. For now, I would recommend trying a volatile RAM disk, i.e. a RAM disk without an image file attached. Since you are using the RAM disk for temporary compiler output, saving it between

Re: "Unable to execute file in the temporary directory. Setup aborted. Error 5: Access is denied"

2 years ago, by Ann in NetWorx Forum

It looks like an antivirus issue where the antivirus does not allow the file to be executed. Do you have any antivirus product installed? If so, you may need to deactivate it temporarily for the installation to succeed.

Re: How to detect network traffic on Xen

2 years ago, by Ann in NetWorx Forum

Please check if NetWorx has detected any virtual adapters under Settings - Main - Monitored Interfaces. If NetWorx does not show your virtual network adapter, open the hidden options, find 'Physical adapters only' option, set it to False, and restart the application. By default, the application hides the adapters that appear to be virtual.

Re: No VLAN information on Juniper switches

2 years ago, by Ann in Switch Port Mapper Forum

It has just been released. You can download the latest version from Port Mapper product page.

Re: No VLAN information on Juniper switches

2 years ago, by Ann in Switch Port Mapper Forum

It turns out that some Juniper devices have a broken Q-BRIDGE-MIB implementation, as discussed here. We have added a workaround that should work with both Juniper and non-Juniper devices. Please download the new build and let us know how it works for you.

Re: Are there any limitations on creating numerous RAM disks?

2 years ago, by Ann in RAM Disk Forum

In that case a set of volatile RAM disks is all you need. In this context 'volatile' means that data on those disks is not preserved, but of course the settings for the disks themselves are preserved, and the disks are created automatically on each launch. It works is really simply: When the system boots, the driver will allocate memory for the disks and assign drive letters to them. If the

Re: Are there any limitations on creating numerous RAM disks?

2 years ago, by Ann in RAM Disk Forum

That sounds good. Several customers use our RAM Disk as Adobe Photoshop scratch disk, so it should speed up PixInsight as well. It's probably easier to create folders from the RAM Disk software directly, however if you are going to use image files for persistent storage, this option will not be available. The reason for that is RAM Disk can automatically create new folders on a volatile RAM dis

Re: Are there any limitations on creating numerous RAM disks?

2 years ago, by Ann in RAM Disk Forum

If I understood you correctly and you are planning to create 16 RAM disks 2 GB each, it should be possible provided that you have enough available drive letters in your system. But it's probably better to create one 32 GB RAM disk with 16 folders on it instead. Hardware specifics don't really matter because RAM Disk runs above Windows HAL (hardware abstraction layer). As long as Windows can see

Re: Files saved to image despite deselected "save contents to image" setting

2 years ago, by Ann in RAM Disk Forum

We have some good news here. First of all, thank you for pursuing this and for sending the files. You were right about the bug with disk contents being saved to image when it was not supposed to happen. It was a bug in our code, but we could not reproduce it earlier because it required a very particular series of actions that was impossible guess without the additional information you provided:

Re: Discrepancy in the usage reports

2 years ago, by Ann in NetWorx Forum

It is hard to say which one is correct as DU Meter and NetWorx are used in different modes in your case. DU Meter simply monitors the number of bytes sent over a network interface. NetWorx can do that too, but in your case it's configured to track process activity, which occasionally might produce incorrect readings, depending on the network drivers installed in your system. So my advice would

Re: Enter Licence Key menu is greyed out

2 years ago, by Ann in RAM Disk Forum

It sounds like you might have tweaked some settings that led to this. To fix the issue, please try the following: 1. Quit the RAM Disk application via File - Exit in the main menu. It is crucial to use this way instead of closing the window with . 2. Open this file in Notepad: %ALLUSERSPROFILE%\SoftPerfect\RAM Disk\ramdisk.xml and change the following line <useraccess>false</use

Re: Specify transmission modification for outgoing or incoming traffic only

2 years ago, by Ann in Connection Emulator Forum

The Incoming and Outgoing options under the Transfer tab affect all features, not just the speed limit. So you can simulate one-way latency and/or loss if needed.

Re: How to get RAM disk to show in Task Manager

2 years ago, by Ann in RAM Disk Forum

If you are referring to the Performance tab in the Task Manager, tick the Hard Disk Emulation setting in the RAM Disk's properties. This will enable the emulation of a real/physical device, and it will be shown in the Task Manager as a regular disk: The purpose of Hard Disk Emulation is to emulate a complete hard disk drive with partitions indistinguishable from a real device. Some speciali

Re: Specify transmission modification for outgoing or incoming traffic only

2 years ago, by Ann in Connection Emulator Forum

No, I am afraid that's not possible. You can set corruption and/or loss in one or both directions, but not loss in one direction and corruption in another. I.e. the traffic direction setting affects all modifications in the same way.

Re: How to list devices by Ethernet or Wireless connectivity

2 years ago, by Ann in WiFi Guard Forum

Unfortunately there no way to tell if a device is connected by cable or wirelessly. Theoretically, it could be deduced from the ping response time, which is usually higher for wireless connections, but this method is not reliable.

Re: Files saved to image despite deselected "save contents to image" setting

2 years ago, by Ann in RAM Disk Forum

Thank you for reporting the results. I suspect the culprit would be the Shadow Copy Service also known as VSS. If System Restore is enabled, it might think that the user profile is crucial for system functioning and needs to be backed up. Then on next boot it realises that the user profile is missing or changed, and tries to restore it. Since Shadow Copy/VSS does NOT support standalone volumes

Re: Files saved to image despite deselected "save contents to image" setting

2 years ago, by Ann in RAM Disk Forum

Most likely, this issue is caused by one of these two: Hybrid boot. If you have hybrid boot enabled (default Windows behaviour), it will keep files between sessions. Please see this article for workarounds. Hard disk emulation. Try the same setup, but without hard disk emulation. I.e. create an image as a standalone volume and do NOT tick "Hard-disk Emulation" in RAM disk properties.

Re: How to print the list of IP addresses

2 years ago, by Ann in Network Scanner Forum

You can do it very easily: Save that list to HTML and print it from your browser. Or save it to a text file and print it from Windows Notepad.

Re: Option to wipe/overwrite contents of any file when deleted from RAM disk

2 years ago, by Ann in RAM Disk Forum

A RAM disk is a simple block storage residing in memory. It does not have the concept of files or file systems as those are of a higher-level abstraction in the OS. So it's not possible to wipe the memory holding deleted files. Moreover, such wiping is unnecessary as all memory contents completely disappear on reboot, shutdown or power loss. But if you still want to securely wipe free space on

Re: Unrecognised 192.168.0.x IP address

2 years ago, by Ann in WiFi Guard Forum

WiFi Guard always reports intranet addresses as 192.168.x.x. It's only a matter of figuring out if they belong to your devices or not. For example, if 192.168.0.1 is your router and 192.168.0.2 is your laptop, the question to ask is what's 192.168.0.5? Think of what in your place has access to the Internet: sometimes you can guess what it is from the device name or network card's manufacturer.

Re: License for occasional use at multiple customer sites

2 years ago, by Ann in Network Scanner Forum

In this case, a single device licence and the portable edition of the software is all you need. With that, you will be able to deploy Network Scanner at a customer machine whenever needed and run in there. It's okay to leave it there temporarily and run another copy on a different machine if you need to. As long as they are not used at the same time, or by other people/company, one licence is s

Re: Report and log download and upload speeds per second

2 years ago, by Ann in NetWorx Forum

NetWorx does not update any stats with 1 second resolution other than the usage graph (and that's for about an hour). If you really want to know the DL/UL rates every second, then the CSV file option should work. It is likely that the locked file errors are caused by an antivirus product on your system. For example, if NetWorx writes to the file every second and in between the antivirus looks f

Re: Does Cache Relocator require Admin privileges?

2 years ago, by Ann in RAM Disk Forum

The Cache Relocator software is not designed for multi-account systems or corporate environments. It works by creating symbolic links. On Windows, creating symbolic link requires admin privileges. If you have an admin account on that computer, you can create symbolic links manually using command prompt and the mklink command. Alternatively Chromimum-based browsers can be configured to use a spe

Re: How to scan network shares for specific files

2 years ago, by Ann in Network Scanner Forum

If you are looking for a tool to search for specific files in LAN, you can take a look at our LAN Search Pro. It is currently available for free, but it is a discontinued product, i.e. there will be no further updates, releases or support provided for this software, and some functionality may not work on newer systems.