ISSUE 17.7.0 • 2020-02-17

Logo
The AskWoody PLUS Newsletter

In this issue

SMALL BUSINESS: RIP FTP: There’s a better way to share files

BEST OF THE LOUNGE: Help with upgrading to Windows 10

PATCH WATCH: The trials and tribulations of Windows 7

VIRTUAL PCS: Making an old PC virtually immortal

BEST UTILITIES: Freeware Spotlight — eToolz


SMALL BUSINESS

RIP FTP: There’s a better way to share files

Amy Babinchak

By Amy Babinchak

Back in June of last year, I wrote about how Microsoft finally got its OneDrive cloud-storage service right.

Today, I’m happy to report on the death of the classic, if somewhat cumbersome, File Transfer Protocol (FTP) — and how its end came at the hands of OneDrive for Business’s new Request Files feature. Let’s have a moment of silence for the ancient FTP’s passing.

Created back in the early ’70s as one of the first protocols developed for the then-new Internet, FTP appeared at a time when only a handful of universities and government departments might have access to it. The protocol had only basic security and no real user interface. Over the years, FTP was incorporated into some applications and FTPS added some additional security. But it’s become hopelessly antiquated in today’s world of massive Web connectivity and cloud services.

I’ve been slowly killing off FTP for years by using and recommending newer third-party file-transfer tools. But FTP still persists among my clients. For example, one of its final bastions is for transferring CAD drawings. A small number of my clients frequently upload CAD drawings for parts they’re going to manufacture or prototype for customers. Often, there will be design revisions during the production process. So a lot of big files get exchanged.

Fortunately, we might be able to put the last nail in FTP’s coffin — and rely instead on the new Receive files feature in OneDrive for Business (more info). Yes, there are numerous other secure file-sharing tools in services such as Dropbox, Box, and even Firefox Send. But OneDrive is already at hand for businesses using 365 subscriptions, and it integrates nicely with other Microsoft business products.

Here’s how Receive files works.

Configuring a OneDrive for Business file request

To start, go to your OneDrive for Business website and create a new folder for the files you’re requesting. For example, in Figure 1 I’ve created a “Receive Files” folder. Select the new folder and press the Request files button on the toolbar. (Note: You won’t see that option until you select the folder.)

Request files
Figure 1. OneDrive’s new file-sharing feature is based on requesting files from a source.

When you press the button, a new Send file request dialog box opens with a link to the folder (see Figure 2). Simply send that link to whoever has the files you wish uploaded to you. Note that this link is permanent; the file-request recipient can use it over and over to upload files to the selected folder.

Send file request screen
Figure 2. A simple dialog box provides a link to your local folder.

Alternatively, you can enter one or more email addresses and send an email directly from OneDrive. The final dialog box confirms your request (Figure 3).

File request created dialog box
Figure 3. A file-request confirmation

You’ll receive an email notification whenever files have been uploaded to the “receiving” folder. If you choose the email-address option, the recipients will see a message similar to what’s shown in Figure 4.

TITLE
Figure 4. A sample file-request email message

For better security, the person uploading the files cannot do so anonymously. They must either sign in or provide their name. This’ll help confirm that a file was uploaded by a legitimate sender. (In Figure 5, I requested files from myself, so the name field was automatically filled out. Normally, that field will start out blank.)

The file-upload dialog box
Figure 5. The file-upload dialog box requires a sender’s name.

Files in the “received” folder will have the sender’s name added as a prefix, which helps identify to whom the file belongs (see Figure 6).

Received files folder
Figure 6. Received files are tagged with the sender’s name.

Securing received files

Businesses whose Office 365 license includes “Advanced Threat Protection” (ATP) can configure additional file-sharing security. You’ll enable this in your Safe attachments policy, which will automatically scan and block any received files containing malicious content — before you open them. You can also enable Conditional Access to set location restrictions.

Look for Safe attachments (Figure 7) in the MS/Office 365 Threat Protection settings. It’s easy to miss; you’ll find it at the top of the policy page. Use the shortcut by entering https://protection.office.com/safeattachment into your browser (sign-in required) — or take the long way around by browsing through Microsoft Admin/Security/Threat Management/Policy/Safe Attachments.

Safe attachments enable window
Figure 7. As noted above, Microsoft’s Safe attachments option checks files in SharePoint, OneDrive, and MS Teams.

With Safe attachments enabled, you won’t be able to open a newly received file until ATP finishes scanning it. But a moment’s wait is well worth avoiding nasty computer infections.

Yet another security step is to limit the locations that can send files to your receiving folder. (This advanced feature requires a license that includes Conditional Access.) You set up “location” restrictions by creating a new SharePoint policy.

For example, let’s establish that files can be sent from U.S. locations only. To do so, we use the relatively simple four-step process shown in Figure 8. We start by defining allowed users and groups and then select the target application(s). Next, we define the excluded locations. And finally, we block access to those locations. Note that the new policy will affect all OneDrive and SharePoint activity. But again, it’s worth the extra security.

Creating locations policy
Figure 8. Limiting the locations that can send files is a four-step process of creating a SharePoint policy.

Keeping it clean with a bit of automation

If you’re like my clients, keeping the “receiving” folder clean will not be a natural habit. The solution is to create an expiration policy for the folder. Once set, files are automatically deleted after a fixed number of days. This will keep the folder from getting choked with obsolete data over time.

For this task, we can turn to Microsoft’s Power Automate (also included in your 365 subscription) — there’s a ready-made template (see Figure 9). In this example, I’ve set it to five days, but you can apply whatever duration suits your needs. The point is to automate the cleanup process and relieve the staff of managing it.

Power Automatic template
Figure 9. A template in Power Automatic makes it easy to sweep away accumulating, and likely obsolete, files.

The template is fairly easy to use, so I won’t go into the fine details. In short, start by choosing the folder you’d like to have automatically cleaned (see Figure 10).

Power Automatic template
Figure 10. The template for automatically cleaning out old files.

Next, expand the Condition field and edit the -[day period] (“-30” in this example; see Figure 10) to one that suits you. Finally, compose an email to be sent to selected individuals when a file has been deleted.

Don’t worry about losing anything important. Deleted files go into a recycle bin, where they can be retrieved for up to 30 days. They then drop into a secondary bin for another 90 days.

Still using FTP? As you can see, we now have a powerful, flexible, and feature-rich solution for acquiring remote files, keeping data safe, and automating the cleanup task. It’s been a long time coming.

Questions or comments? Feedback on this article is also always welcome in the AskWoody Lounge!

Amy Babinchak is the owner of three IT-related businesses: Harbor Computer Services, Third Tier, and Sell My MSP. She has been working in the IT field with small and medium businesses for more than 20 years. She’s also a Microsoft MVP and has received numerous leadership awards.


Best of the Lounge

Help with upgrading to Windows 10

Sure, the resistance to upgrading from Windows 7 to Win10 is still strong, but there are many Win7 users who are preparing to make the jump. And they have questions about the process — lots of questions.

Plus member LHiggins, for example, wants to feel confident that the upgrade will go off without a hitch. Posting in the Lounge, LHiggins queries fellow members: How much space on your hard drive is needed? Does Win10 require more RAM? Is the upgrade still free? Should you let Windows upgrade on its own, or is it best to download the Media Creation Tool and make the change with an ISO? All good questions — And AskWoody readers join forces to answer them.


Windows 10 updating

DaBoss PKCano has posted a Win10-update guide for home and small-business users. PK includes recommended settings and clear definitions for patching terminology. It’s difficult to go wrong when following PK’s advice.


Windows updating

Plus member bmshulman couldn’t get Windows Update to complete its task. The process always falls just short of completion. After trying everything that came to mind, bmshulman turned to AskWoody readers for help. Following suggestion after suggestion didn’t correct the problem. But after checking installed programs, bmshulman did the proverbial forehead slap — a forgotten third-party update blocker was the culprit. Once bitten, never forgotten!


Windows 10 1903

After two months of inactivity, a PC ought to have updates queued up. Plus member dancebert thought so. Instead, nothing showed up, even after a reboot. But with the help of fellow Loungers, dancebert found the answer: a Windows service wasn’t set to automatic. Problem solved — or was it; dancebert now has to contend with updates.


Networking

Sometimes the best solution to a new problem might be rolling back recent updates. After installing January’s patches, Plus member dwallace115’s two home PCs would no longer talk to each other — instead displaying the dreaded “Contact your network administrator … ” error message. Fellow Loungers provided suggestions, but nothing worked. Would uninstalling January’s fixes prove to be the solution? We’ll have to wait and see.


Windows 10

There appears to be no end to upgrading questions in the forum. In this case, Lounger crimsoncricket wants help with the possible fallout of moving from Win7 Home to Win10 Pro. Specifically, what settings adjustments can be made to prevent buggy updates and stop telemetry issues? Other questions include BitLocker settings, OneDrive, and Windows security.


Outlook

Plus member lenrdbik’s Outlook setup is not playing nicely with recurring tasks. Despite numerous attempts to cure the problem, including suggestions from other Lounge members, the solution remained elusive — until lenrdbik tried a last-ditch effort: a non-destructive reinstall of both Windows and Office. Sometimes extreme measures are the fastest solution.


If you’re not already a Lounge member, use the quick registration form to sign up for free.


PATCH WATCH

The trials and tribulations of Windows 7

Susan BradleyBy Susan Bradley

We’re starting the Windows 7 extended-support era … with more than our fair share of confusion.

Before I shed some light on making Extended Security Updates (ESUs) work, here’s a bit of good news for all Win7 users.

You might recall that the final free Win7 updates (January’s) included a bug that broke the “Stretch” wallpaper setting. Some systems ended up with black backgrounds. The easy fix was to use another “Choose a fit” option. But if “Stretch” is important to you — or you’d just like your Win7 copy to be as bug-free as possible — Microsoft released KB 4539601 to fix the flaw. Currently, however, you must manually download and install the patch.

The February launch of extended-support updates got off to a shaky start. The day before the first ESUs were due to land (February 11, aka Patch Tuesday), Microsoft released an “Extended Security Updates (ESU) Licensing Preparation Package” — with no real notification. KB 4538483 (32-bit and 64-bit versions) must be downloaded from the Microsoft Update Catalog and installed before you can apply ESU updates.

The patch is also needed to add Office updates — but only if you have ESU keys. If you chose to skip extended Win7 support, you’ll see Office security patches offered. (For a bit more info on this patch, see the MS Support article “Procedure to continue receiving security updates after extended support ends on January 14, 2020.”)

Note: If you attempt to install any new Windows 7 patches on a machine that isn’t licensed for extended support (doesn’t have an ESU), you’ll receive the error message “Failure to configure Windows updates. Reverting changes. Do not turn off your computer.” The update will show as “Failed” in View update history.

If you’re looking for free Windows 7 updates, you can try the Opatch service. Also, regularly check out the AskWoody forum posts in the “Win7 beyond end-of-life” section. Remember: We’ve got your back.

For Win7 users and Server 2008 R2 admins planning to go unprotected, here are six critical risks you’re already facing:

  • CVE-2020-0662 – Windows remote-code-execution vulnerability: This threat appears to be related to wireless networking and impacts only users who sign in from a domain. The solution: Most home networks have only a small risk.
  • CVE-2020-0681 – Remote-desktop client remote-code-execution vulnerability: In this case, an attacker must trick PC users into connecting to a malicious server. The solution: Use the Remote Desktop Connection (RDC) app sparingly on any unpatched Win7 machine. And when you do, connect only to servers you’ve used before and know to be safe.
  • CVE-2020-0729 – LNK remote-code-execution vulnerability: An attacker must trick the victim into clicking on a malicious .lnk file (aka “shortcuts,” more info) located on a remote drive or flash drive. An LNK vulnerability was used in the Stuxnet exploit, so this can be a serious threat to any unpatched Win7 business machines. The solution: Don’t click on LNK files and don’t use any unknown flash drives.
  • CVE-2020-0734 – Remote-desktop client remote-code-execution vulnerability: Here again, an attacker must trick someone into making a connection to a malicious server. The solution: same as above — try not to use RDC and connect only to known-safe servers.
  • CVE-2020-0738 – Media Foundation memory-corruption vulnerability: This threat is risky to anyone who randomly surfs the Internet with an unpatched Win7 system. All it takes to become infected is to open a seemingly innocuous document or webpage — or even a banner ad. The solution: For general web browsing, I recommend a tablet system such as an Android or iPad — or possibly a Chromebook.)
  • CVE-2020-0674 – Scripting engine memory-corruption vulnerability: This is an Internet Explorer zero-day bug that’s been used in targeted exploits. Remember: Just because you are not using IE doesn’t mean an attacker can’t employ the browser as an attack path. The solution: Again, be extremely careful about where you go on the Web — especially if this exploit becomes more widespread.

The sort-of good news? Aside from the IE exploit, none of the above is being actively used — at this time. That doesn’t mean one won’t show up “in the wild” at some point.

Windows 10: Microsoft released the special security update 4524244 for all versions of the OS — except Win10 1909. According to Microsoft, it “addresses an issue in which a third-party Unified Extensible Firmware Interface (UEFI) boot manager might expose UEFI-enabled computers to a security vulnerability.”

Not long after the patch was released, Microsoft pulled it from the Updated Catalog and Windows Update because it could cause Windows’ “Reset this PC” option to fail. (See Woody’s post for more information.) If you let Windows 10 install the update, I recommend removing it. So check, open Settings/Update and Security/Windows Update. Next, click View update history. If KB 4524244 is listed, click the Uninstall updates link and search for the update on the Control Panel/Installed Updates screen. Double-click it and press “Yes” to remove it. And that, class, is why we say wait at least a week before installing updates.

Microsoft also released a separate Adobe Flash Player update, 4537759,
for all versions of Win10.

February’s patch summary

We’re less than a week past February’s Patch Tuesday, and a couple of potential problems have already popped up. For example, there was a report of Windows update freezing on HP machines equipped with AMD Ryzen CPUs — probably caused by KB 4524244.

I’m also following a possibly more serious issue with KB 4532693. As Woody reported in a Computerworld post, after installing the update, some users lost their usual Windows desktops and were left with nearly blank temporary profiles. Stay tuned for more details.

- What to do: It’s the usual post–Patch Tuesday rules: Pause Windows Update for a couple of weeks while we look for any serious side effects. (As always, feel free to test the updates on a non-production machine — and report any anomalies in the AskWoody forums.) Meanwhile, take some time to test your backup-and-restore procedures.

Windows 10

For you procrastinators, keep in mind PKCano’s post on how to bump up from Win10 1803 to Version 1809. But we recommend jumping to Version 1903 at this time.

Servicing-stack updates

  • 4538674 for Versions 1903 and 1909

Cumulative Windows 10

  • 4532693 for Versions 1903 and 1909
  • 4532691 for Version 1809 and Server 2019
  • 4537762 for Version 1803 (Enterprise and Education editions only)
  • 4537789 for Version 1709 (Enterprise and Education editions only)
  • 4537765 for Version 1703 (Long-Term Servicing Channels)
  • 4537764 for Version 1607 (Long-Term Servicing Channels) and Server 2016

Windows 10 — all versions

  • 4537759 – Adobe Flash Player
  • 4524244 – Boot-loader fix: Recalled!

.NET Framework

There are no new .NET security updates this month, as noted in the .NET blog. The following are optional “quality” patches.

Windows 8.1/Server 2012 R2

As we’ve noted previously, Win7 users not ready for Windows 10 might consider Win8.1 as an alternative. Also, expect to see an Adobe Flash update.

  • 4537821 – Monthly rollup
  • 4537803 – Security-only
  • 4537767 – Internet Explorer 11 (install with the security-only update)
  • 4537759 – Flash Player
Windows 7/Server 2008 R2 SP1

If you signed up for Extended Security Updates (ESU), remember to install KB 4538483 from the Microsoft Update Catalog download site before attempting to add new security fixes. If you bought a license but see only Office updates and no security patches, post in the AskWoody forum, and we can get you fixed up.

  • 4537829 – Servicing-stack update
  • 4537820 – Monthly rollup
  • 4534314 – Security-only
  • 4537767 – Internet Explorer 11 (install with the security-only patch)
Server 2012
  • 4537814 – Monthly rollup
  • 4537794 – Security-only
  • 4537767 – Internet Explorer 11 (install with the security-only patch)
  • 4538123 – .NET Framework (no security fixes)
  • 4537759 – Flash Player
Windows Server 2008 SP2
  • 4538484 – Must install in order to obtain ESU patches
  • 4537810 – Monthly rollup
  • 4537822 – Security-only
  • 4537767 – Internet Explorer 11 (install with the security-only patch)
Office security and non-security updates

January’s updates fix several remote-code-execution and security feature–bypass vulnerabilities.

Office 2016

Office 2013 SP1

Office 2010 SP2

The following Office non-security enhancements and fixes were released February 4.

Office 2016

  • 4484253 – Project; project changes not saved
  • 4484168 – Word; synched scrolling fails when documents viewed side by side.

Office 2013 and 2010

There are no new non-security updates for Office 2013 and Office 2010.

Stay safe out there.

Questions or comments? Feedback on this article is always welcome in the AskWoody Lounge!

In real life, Susan Bradley is a Microsoft Security MVP and IT wrangler at a California accounting firm, where she manages a fleet of servers, virtual machines, workstations, iPhones, and other digital devices. She also does forensic investigations of computer systems for the firm.


VIRTUAL PCS

Making an old PC virtually immortal

Tracey CapenBy TB Capen

If you’ve spent years building, repairing, and managing PCs, you’ve probably accumulated a veritable junkyard of old PCs and parts — some still working, some not so much.

As the family IT expert and long-time technologist, I’ve lost track of the PCs I’ve bought, built, repaired, re-repaired, and decommissioned over the past several decades. What’s left of most of them is a pile of old hard drives.

For most of my computing career, my standard practice for disposing of obsolete (at least to me) machines has been to remove the hard drive and donate or recycle everything else. Then, once I’ve gone through the drive and archived important information elsewhere, I’ll typically wipe it and add it to my pile of empty-but-still-functional drives.

Occasionally, I’ll attach a spare drive to a PC via a USB-to-hard drive connector (more info) to archive files or move really big chunks of data from machine to machine.

Sometimes, however, I prefer to keep a system as it was originally intended — with a working operation system, applications, and data. And the best way I know to do that without having a bunch of boxes sitting by my desk is to transfer the full setups into virtual machines. It lets me keep old versions of Windows and, say, one or two Linux setups easily — and compactly — accessible.

Two ways to create virtual machines

The simple way to create a virtual PC (or Linux, Mac, and other OSes) is to “build” one from scratch in a virtual-PC application. The initial setup is relatively fast and easy, but you do have to install apps and add your files. (Using a service such as OneDrive is the easiest way to transfer data to the new machine.)

The other way to create a virtual system is to convert an existing hard drive into a virtual drive and then “attach” it to a new virtual PC (VPC). If it works, you have an instantly usable machine with all your apps, settings, and data in place. But that’s a big “if” — the process frequently fails and can be extremely frustrating. More on this in a minute.

The two most popular VPC apps for individual use are Oracle’s VirtualBox and VMware’s Workstation Player. Of the two, I much prefer VirtualBox; it’s frequently updated, it has a better interface (see Figure 1), and it’s completely free!

Workstation Player, on the other hand, costs U.S. $150 and, in my opinion, has nothing significantly better than VirtualBox. (You can download a free version of the app, but it apparently allows only one virtual machine. VMware is a bit vague about this. Note: The VMware site didn’t play well with my version of Firefox. If you go there, I suggest using Chrome.)

VirtualBox main menu
Figure 1. VirtualBox has an easy-to-use interface and supports numerous operating systems on virtual PCs.

Setting up a new VPC from scratch is about the same process for either product. I’ll stick with VirtualBox for my examples.

When creating VPCs, another consideration is hardware. Any mid-level-to-high-end PC will do. You primarily want lots of free physical drive space and memory. My main machine has an SSD for the primary C: drive and a 1TD hard drive for most of my storage — which includes any virtual PCs I’m currently working with. (Unused VPCs get offloaded to network-attached storage.) I have 12GB of RAM, which is sufficient for good speed; 8GB would be an absolute minimum. You can run a VPC from a network-attached drive, but it’s going to be slow.

Building a virtual Windows 7 machine from scratch

Provided you have an installation disc or media, setting up a new virtual PC takes surprisingly little effort and time. Most of the work involves installing the OS on the new virtual drive.

When you click New in VirtualBox, a setup wizard takes you through the following steps:

  • Give the VPC a name, choose its location, select the OS, and then pick the version — i.e., Microsoft Windows/Windows 7 (64-bit).

    VPC Wizard screen
    Figure 2. The opening screen of VirtualBox’s virtual machine–creation wizard

  • Set the size of the new machine’s RAM.
  • Select the virtual drive (none, create a virtual drive, or use an existing virtual drive).
  • Select the virtual-drive type: VDI (the default for VirtualBox), VHD, or VMDX. (Clicking Expert Mode will show other drive types.)
  • Use either a fixed or dynamic virtual drive. In most cases, choose “Dynamically allocated” — the actual size of the virtual drive will reflect only what you put into it.

    Fixed versus dynamic
    Figure 3. Of the two options above, Dynamically allocated generally takes up the least amount physical drive space (unless you fill the virtual drive).

  • Select the physical location of the virtual drive (which is really just a big file). A full VPC setup is made up of two parts: the virtual-drive file and a much smaller .vbox file that defines the virtual “hardware.”

    Drive location and size screen
    Figure 4. The final act of creating a VPC is establishing the virtual drive’s location and size.

At this point you have a virtual machine with an empty hard drive. The last step is to load the installation media into the physical PC and start the new VPC. The bootup process should find the Windows-installation media and begin the process of setting up Windows for the first time. It’s effectively just like setting up new hardware.

Remember: Just like a new physical installation, you’ll eventually have to enter a Windows product key — if you want to use the VPC over the long run.

Feel free to experiment with different VPC settings. And take a look at some of the advanced features in VirtualBox. For example, get to know the Virtual Media Manager tool (under File in the VirtualBox toolbar). Virtual drives are tied to specific virtual machines. But you can move the drives to other VPCs through a process of “releasing” the drive.

Migrating physical drives to virtual drives

Again, taking a drive out of an old system and converting it into a virtual drive, running in a VPC, is a great way to make a PC nearly immortal — when it works. There are only a few applications for this task, the classic tool being Microsoft’s Sysinternals Disk2vhd (Figure 5).

Disk2vhd screen
Figure 5. Disk2vhd‘s simple menu for converting physical drives to virtual drives

Two points on this free app: It has not been updated since 2014, and the downloaded version would not run on my Win10 system — I had to use the (automatically downloaded) Sysinternals Live link.

Disk2vhd is simple to use and works with drives attached via USB. Even so, read the instructions carefully. Tip: If a newly created virtual drive won’t work, try again with the “Use volume Shadow Copy” option enabled — it can make more reliable transfers.

Another option is EaseUS Todo Backup Workstation ($39 per PC/year). Among its many talents is the P2V Copy option. It’s relatively easy to use, although it appears to work only with a physical PC’s internal drives.

Again, using either tool is hit or miss. While I successfully created and used a couple of virtual drives from old Windows hard drives, most did not work. Moreover, it’s hard to know whether the problem is with the migration or with VPC settings.

For example, I was eventually able to restore an old Windows 98 system as a VPC, but it would run only in Safe Mode. More confusing, it failed initially because I’d set too much RAM. (I had to reset RAM to less than one gigabyte.) The possible lesson? You might have to spend a lot of time researching detailed requirements for old versions of Windows and experimenting with VPC configurations. (Tip: If a VPC starts to run but then crashes, you might try putting a Windows rescue disc in the DVD drive.)

Windows 10’s virtual-drive creator

Most Windows 10 users probably don’t know that the OS can create virtual drives. But they’ll always start out empty — you can’t make a virtual drive from an existing hard drive.

That said, these new virtual drives can be mapped and used as additional volumes — on both physical and virtual machines. You can, for example, detach them from a physical Windows system and use them as storage for a VPC. Just keep in mind that they are, like all virtual drives, a big file taking up space on a physical drive.

Creating a virtual drive in Win10 is really easy. Open Disk Manager and click anywhere in the window. Next, select Action in the toolbar and then click Create VHD. A dialog box (Figure 6) will pop up with fields for the new drive’s location/name and size. You also choose the disk type (format) and whether it’s fixed or dynamic. Here, too, dynamic is the better option.

Create and Attach Virtual Hard Disk screen
Figure 6. Windows 10’s simple virtual drive–creation tool

The new drive will now show up in Disk Manager’s drive list with a small, red icon. Right-click the box with the icon and select Initialize Disk from the dropdown menu. (If that doesn’t work, select the drive and click Action/Attach VHD.) In the next dialog box, set the partition type (MBR or GPT) and click OK.

Final step: Right-click the graphic of drive (box with diagonal lines) and select New Simple Volume; then follow the prompts in the wizard that appears. When you’re done, you’ll see a new mapped drive in File Explorer.

Map virtual drive screen
Figure 7. Once you’ve created a virtual drive with Win10, you can map it as a “local” volume.

That new virtual drive can have a number of uses. It can easily be copied and stored elsewhere; it can be placed on a network-attached drive; it can be ejected (but will still exist); or it can be used with a VPC.

Bottom line: Creating virtual PCs is the best way to keep obsolete operating systems alive. If they get infected or damaged, simply build a new virtual machine from scratch or use an earlier, known-good, saved copy.

Questions or comments? Feedback on this article is also always welcome in the AskWoody Lounge!

TB Capen is editor in chief of the AskWoody Plus Newsletter.


Best Utilities

Freeware Spotlight — eToolz

Deanna McElveenBy Deanna McElveen

If you’re a relatively young computer tech or system administrator, you’re living in wonderful times.

The ability to show up at a worksite with all your tools on a flash drive was the stuff of dreams for us floppy-totin’ grayhairs.

To your many portable tools, I suggest adding Austrian developer Werner Rumpeltesz’s eToolz. It’s your go-to app for everything network-related. It does the basics such as Whois, Ping, Traceroute, and DNS Lookup but can also update a target machine’s system time using various online time servers, and it will show you IP info for all local network adapters. It will also … well, let’s just dig in to it.

Start by downloading a copy from our OlderGeeks site. Next, unzip it onto a flash drive. (I assume you must have 7-Zip among your tools.)

Now just launch eToolz.exe — you’ll see the app’s initial configuration screen, shown in Figure 1. Do not just skip past this window.

eToolz first screen
Figure 1. eToolz initial setup screen

You do not want to settle for the “recommended” User data selection. This would put the saved data for the program into the AppData folder of your computer. That’s not useful if you want those saved settings to travel with you. Select the second option, “Application directory of eToolz … . (See Figure 2.) Click OK when you’re done.

Set file location
Figure 2. You want the setup configuration info stored with the eToolz files.

On eToolz’s main screen, the first item in the tools bar is DNS (see Figure 3). Enter your target domain, check all the boxes, and then click Start to get all available DNS information.

DNS info
Figure 3. The DNS-information screen

Next up is the Ping tool. (I’m not going to insult your skills by going into depth on these tools. Any IT pro worth their salt knows what information they reveal.)

Ping tool
Figure 4. The Ping test for network latency

MultiPing lets you check a range of active IPs on a network.

MultiPing test
Figure 5. MultiPing can show performance across an entire network.

Trace is simply a graphic interface for Traceroute. As you know, the tool shows the route packets travel to their destination. There’s a lot of hops between me and pizza.

Trace test
Figure 6. Trace shows how your data hops around the Internet.

Next, the Whois tool reveals public information on a particular site.

Whois screen
Figure 7. You’ll have to enter the name of the Whois server you want to use. Try Whois.iana.org.

Need to check all the available information about an email address? Mail-Check is your tool. Yes, this is the email address for Chuck E. Cheese!

Mail-Check screen
Figure 8. Mail-Check might help expose bogus email addresses.

Header Analyzer lets you paste in the entire header of an email to see all available information about the sender.

Header Analyzer tool
Figure 9. Header Analyzer is another handy tool for investigating emails.

Use HTTP-Header to view additional information passed between a client and a server (more info).

HTTP-Header tool
Figure 10. Information included with the request for the Chuck E. Cheese home page

Time is a nifty tool for quickly and accurately setting a machine’s system time, based on data from online time servers.

Time tool
Figure 11. Get precise time from online servers.

Want to look up the default ports for pretty much any service? Use the Lists tool. (I assume eToolz’s author will add other types of lists in the future.)

Lists screen
Figure 12. At this time, the Lists tool is limited to ports.

Last up is the Local Host tool. This gives you all the local network information for a specific system.

Local Host tool
Figure 13. I’m not showing you the network details for my machine. That would be nuts!

Clicking Extras from the top toolbar lets you quickly flush the DNS cache on a target machine (Figure 14). Choose Extras/Settings (Figure 15) for tweaking the various tool settings to your needs.

DNS Flush
Figure 14. Flushing the DNS cache can fix Internet-connection problems.

Settings screen
Figure 15. Use the Settings option to fine-tune the utility’s tools.

Keep checking back for updates to eToolz on its OlderGeeks.com page. I have a feeling we’ll see even more tools added to this already great piece of diagnostic freeware.

Happy Computing!

Questions or comments? Feedback on this article is always welcome in the AskWoody Lounge!

Deanna and Randy McElveen are celebrating over 20 years in the computer business, ten years running OlderGeeks.com, and more than 26 years of putting up with each other. Their computer store is in a small town in the Missouri Ozarks. Believing that happy customers are always the best advertisement, they hope to do it for another 20 years.


Publisher: AskWoody LLC (woody@askwoody.com); editor: Tracey Capen (editor@askwoody.com).

Trademarks: Microsoft and Windows are registered trademarks of Microsoft Corporation. AskWoody, Windows Secrets Newsletter, WindowsSecrets.com, WinFind, Windows Gizmos, Security Baseline, Perimeter Scan, Wacky Web Week, the Windows Secrets Logo Design (W, S or road, and Star), and the slogan Everything Microsoft Forgot to Mention all are trademarks and service marks of AskWoody LLC. All other marks are the trademarks or service marks of their respective owners.

Your email subscription:


Copyright © 2020 AskWoody LLC, All rights reserved.