LANDesk: Scheduled Task Script to Run an Hourly Script

LANDesk Script: [MACHINES] REMEXEC0=<qt/>%LDMS_CLIENT_DIR%LocalSch.exe<qt/> /del /range=%quote%1001|2000%quote% REMEXEC1001=<qt/>%LDMS_CLIENT_DIR%LocalSch.exe<qt/> /exe=%quote%C:Toolsbinhstart.exe /NOCONSOLE%quote% /cmd=<qt/>""perl C:PerlSiteLibRun-Inventory-Win7.pl -P -D""<qt/> /taskid=1001 /freq=600 /start=%quote%27 Jan 1990 01:54:31%quote% Explanation: LINE#1 The REMEXEC0 command deletes any of the LD Scheduled Tasks with id’s ranging between 1001 to 2000. This is to ensure that your command in next line will get proper task id. Doesn’t make any difference as long as /taskid is there and there are no tasks with ID that falls under the specified range. LINE#2 The REMEXEC1001 command runs the Perl script in as a hidden process with LD task id as 1001 and runs at the top […]

Read more

Run Console Applications & Batch Files, without any Window, in the background

Many times systems engineers come across the need to suppress the console window of a cmd prompt while setting up various batch and script automations to be run in silent mode. Below is the list of various options available to control the cmd console window and you need to choose the option as per your requirements:  Hidden Start (a complete solution to control console windows and also supports x64bit)  Start (helps control spawned process console)  PowerShell –WindowStyle Hidden  WshShell.Run WindowStyle = 0  Javaw.exe is a console/window less Java.exe that runs Java programs as hidden process   ————————— Hidden Start v3.2  […]

Read more

Internet Explorer: Managing Phishing Filter Prompts

By default, IE warns you if the website you are visiting might be impersonating another website. This mechanism by IE is termed as Phishing Filters. for various reasons the systems engineers/administrators require to disable this prompt for the end users essentially when they are deploying some automated web based system which they know can cause IE to prompt with it’s Phishing Filters.   IE Phishing Filter Registry: IE Phishing Filter is controlled by below registry key: [HKEY_LOCAL_MACHINESOFTWAREWow6432NodeMicrosoftInternet ExplorerPhishingFilter] "Enabled"=dword:00000001 "ShownVerifyBalloon"=dword:00000003 [HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerPhishingFilter] "Enabled"=dword:00000001 "ShownVerifyBalloon"=dword:00000003 Below is the behavioral analysis of how IE Phishing Filter Feature works and can be managed: […]

Read more