You are on page 1of 20

066

01/09/2005
18:39
Page 66
System
| File extensions | The EXE |
What hides double-click
A look at the extension as used in Windows, can run a process or software
er use any program in Windows usually takes very little is enough, in fact, a si
mple click on the corresponding icon on your desktop or on a link included in th
e Start menu or even the name of a file in a folder of some ' hard drive. In fac
t, when we carry out one of these simple steps, we only invoke a file "executabl
e" able, ie, performing a variety of procedures necessary to the operating syste
m to start the program. These files can be easily distinguished from others beca
use its extension is EXE, which is nothing if not an abbreviation of the English
word "Executable (executable).
ALSO READ ...
Win number 78 Magazine, page 120, we talked in depth of file extensions
P
How is an EXE file?
An executable file contains within it a set of instructions that the computer mu
st perform. To create software developers make use of a special instrument calle
d a "compiler", which processes the instructions written in some programming lan
guage and translates them into simpler ones that can be understood and then exec
uted by the computer. In fact, when we click on a file. Exe, in most cases we ar
e only just starting the main part of the program, while the other files necessa
ry for the operation of the software (executables, dynamic libraries, configurat
ion files, etc.). are recalled later, when needed, using the references inserted
in the executable code itself.
THE MOST COMMON EXE
FILE NAME INSTALL.EXE, SETUP. EXE
Here are some typical examples of names used to identify an executable file.
DESCRIPTION
Installation files of a program self-extracting compressed file, that is able to
extract the contents to disk even if the system was not installed File WinZip o
r WinRAR to start a worm or virus that spreads by launching the executable
FILECOMPRESSO.EXE
Program.exe HAPPY99.EXE
A large family
Executable files are not only able to launch an application already installed on
your system, but can also play a number of other operations. Some of them (the
classic ones that have a name like setup.exe or install.exe) carry out the proce
dure for installing software, while others allow you to unpack a compressed file
directly into a folder on your hard drive, even though we have installed a comp
ression program like WinZip or WinRAR famous. Did you know then that the majorit
y of existing viruses and worms spread its form of executable files. It is not u
nlikely, in fact, by executing an infected file. Exe which is uncertain origin,
perhaps downloaded from the Internet or received as an attachment to any email.
The Board is therefore to be wary of executable files of dubious origin and alwa
ys rely on a good updated antivirus.
Clicking on an executable file (eg miofile.exe) Windows files and invoke system
libraries needed for its execution.
66
Win Magazine October 2005
100
27/09/2005
18:38
Page 100
System
| File extensions | The EXE |
The sorted file, Windows
We analyze the operation of the executable used to automatically start a sequenc
e of commands
guibile line of text containing the command, is run by computer and then proceed
s with the next line, all this until the end of the text. Making a. Bat is quite
simple, just a normal text editor like DOS Edit or Windows Notepad. The command
s used within a batch file are classics of the DOS command line, plus others tha
t are part of the programming language typical of batch files that create and co
ntrol structures to make incremental and, therefore, small programs . The most f
amous is certainly autoexec.bat batch file that runs automatically at boot DOS o
r Windows 95/98 and containing a series of commands for initializing the compute
r. In these operating systems the automatic extension procedures BAT stands for
"bat-file is used principalch autoexec.bat" (literally,€means "group") and mind
to set variables sisteusata to indicate a text file or to start but some progra
ms (a bit 'which contains a series of commands that what is entering collegamenc
omputer running in the same sequence with your applications in the folder which
they were written. Unlike Startup Start Menu EXE file, that when I am creating W
indows-XP). If well planned, files are not compiled and then made ready to be ca
rried. "Bat prove very execution tools, batch files are processed only powerful
because they can be used when they are opened. A-shares to automate routine task
s particular module in the system, called "interpreted or to avoid a direct inte
raction of the command you" means carried-education system with the user. Precis
ely for this reason, many viruses spread as email attachments with the extension
BAT. With few lines of code, to give an example of the dangers of these files i
s useful for making possiDue batch file automatically cleaning bile create a fil
e system. The first file to be executed once, call the setup screen disk cleanup
utility through the command "cleanmgr batch that deletes all files in a car / s
ageset. The second, however, start the cleaning process itself tella System. and
can be run whenever we want.
ALSO READ ...
Win number 80 Magazine have analyzed the functioning of egeguibili file with a.
Exe
S
birch between folders on your computer, it will definitely happen to come across
files or COM BAT: belong to the category of the binaries (just like. exe file w
e discussed on last issue) and, as such, contain instructions that are executed
from our computer. Historically. Bat file and. Com come from the MS-DOS and earl
y versions of Windows operating systems in which were widely applied. Over the y
ears slowly fell into disuse and the newer Windows systems, like 2000 and XP, co
ntinue to support them only to ensure greater compatibility with older software.
Simple commands
The files with extension. Com, an abbreviation of the English command, are real
executables, which are no larger than 64 KB. These programs are structured so as
to be loaded and run directly into the computer RAM. The most important of thes
e is the command.com file, a module that executes the commands that we put ourse
lves in the window of the DOS Command Prompt. This file is its interpretation: i
n short, when I type one, it shall analyze the syntax to check its validity and
if there are no errors, runs it.
AUTOMATIC CONTROLS
COMMAND
CD PAUSE CLS REM ECHO MKDIR (or MD) rmdir (or RD) OF RENAME (REN O) XCOPY COPY M
OVE IF GOTO CALL EXIT
Here is a list of main keywords in the text of the batch programs.
FUNCTION
Inserts a comment line displays a text directly on the monitor screen Clear Need
to move to another folder or drive temporarily stop execution of a batch progra
m creates a folder Delete a folder Delete a file or files Rename one or more fil
es Copy one or more files to another location Copy files and directory structure
contained in a directory to another location Move one or more files from one fo
lder to another Performs Performs a conditional statement is on a line marked wi
th a label spells out a batch file from another batch program ends execution of
the current batch file
100
Win Magazine November 2005
100
21/10/2005
11:25
Page 100
System
| File extensions | MSI files |
When setup does everything by itself
Let us examine an extension of the files created by Microsoft to better manage t
he installation of software
vviare installing a program has become an operation familiar to anyone who has a
cquired a bit 'of familiarity with the computer. Just double click the executabl
e package to install the software and you're done. Most of the installation file
s are easily identifiable because they generally have much explanatory names, ty
pe install.exe (or setup.exe) or even have the same program name, eg DivXCreate.
exe. It is not uncommon, however, confronted with distributed programs, especial
ly by Microsoft, through msi file. Contrary to what one might think, even if the
behavior is similar to video, these files are not self-installing executable,€
but contain a wealth of information necessary to add new functionality and featu
res to the program, remove or modify the installation.
ALSO READ ...
Win number 80 Magazine, page 66, we analyzed the operation of executable files.
Exe
A
Windows Installer
MSI files are processed by a particular system service called Windows
The installation files of Photo Story 3 (Microsoft image editor) is of type MSI.
So if it runs after installation, permtte to remove all the program files or re
store them in case of errors.
Installer, provided, of course, it's both, combined type, tables of data already
present and active within an installation package managed by Windows Installer.
system. WHAT KIND OF TABLES CONTAIN this component already intel descriptions o
f the features of application components grateful CORE in Windows XP, and change
s to be made in the register and distribuiREGISTRY developed the Windows files t
o free from FILE included in the installation package Microsoft (We SYSTEM infor
mation about tables and columns that are downloaded from the site database www.m
icrosoft.com/ bitmap images, links and other elements used PROGRAM INFORMATION p
rogram downloads). LOCATOR joint position of the files and applications currentl
y verINSTALLATION PROCEDURES Data on procedures performed during the installatio
n sion 3.1, software from precedel tooth 3.0 (previously included in Service Pac
k 2 for Windows in which the system is already a verXP ), Windows Installer no l
onger supports the mission of the older software (esemWindows 95/98/ME: If we ha
ve a pious of replacing only some files or ProQuest operating systems, we downlo
ad-yielding directly to uninstall and re install version 2.0. When the old versi
on of the program). we start an MSI file, the Windows Installer engine reads ins
tructions and data packages intelligent in it and shall copy the Precisely becau
se of their internal structure, program on your hard drive, create or use an MSI
file for packages and add more shortcuts on the desktop or installing programs
involves changing the registry keys config-many advantages over a traditional ra
tion file. Windows Installer also displayed setup exe. Here they are in detza a
dialog within the cutting where we can select the components of the software to
install or if the installation is stopped or not to upgrade. were to be successf
ul, Windows Installer can restore the original state of the system without leavi
ng alcuCosa contains an MSI file? na track. MSI files are the actual database, w
hen uninstall a software, that is, all consist of a set of tables are accurataal
l'interno its components which are stored neatly disposed mind, the various soft
ware components (files, immasenza However condigini delete files, links, etc..)
and the instructions and faces from other applications. data required to install
or remove them if the program were to stop in various situations that may prese
nfunzionare for any reason, tare. In fact, typically, the code of the installati
on is capable of repairing single MSI file are also included identifying and rep
lacing any procedures to be followed if the application is missing or corrupted
files. was never installed on the PC or if
SECRETS contained in a file MSI
100
Win Magazine December 2005
120 11/16/2005 14:23 Page 120
System
| File extensions | INI files |
INI File: Windows starts from here!
The launch of the software and the system is controlled by some configuration fi
les which contain the main settings
ALSO READ ...
Win number 78 Magazine we analyzed the meaning of file extensions.
the amount of virtual memory used to speed up all operations involving a shift o
f data within the system. The Win.ini, also of ancient date, but contains the se
ttings related to fonts, wallpapers, device drivers, etc.. Last in order of appe
arance, but the System Configuration Utility, bootable by typing msconfig not le
ast, the Start menu / Run, offers quick access to content is the file Boot.ini S
ystem.ini file, win.ini, and boot.ini. present in the Windows NT/2000/XP,€which
contains all relevant information of the variable timed match) the performance
of operating systems installed and the system to run as the default on the PC si
de. Thanks to it, during (indicated as default) The family of Major INI INI File
s are displayed at startup to boot [operating systems], which hosts inforSystem.
ini, Win.ini and Boot . ini. The file manager that allows us to choose side-tion
about the location of the System.ini systems, inherited from Windows 3.1 was th
e operating system files installed operating eseguire.Il. initially used to enab
le the set-Boot.ini is organized into two sections: the basic advantages of the
operating system. [Boot loader], in which twenty-Configuration Configuration uti
lity is adequately defined Gono possi-time visualization of the bile system shar
e the swap file and change the startup screen (shown in order to edit a file. In
i just open it with any text editor such as Windows Notepad. Alternatively, we c
an use the form on the System Configuration Utility, which is accessed using the
command msconfig in Start / Run. Under this program, you can view and edit cont
ent of. ini file that we described above and check the status of Windows service
s. Remember, though, to be very careful when handling. ini file, since inappropr
iate changes may comEcco a classic example of a Boot.ini file used for Managing
multiple operating systems installed on promise operation of our own PCs. Here i
s configured to allow the launch of three different versions of Windows XP opera
ting system. installed on two hard drives, the first of which has two partitions
: rdisk (0) partition (1) and rdisk (0) partition (2).
Q
hen turn on or restart the computer, Windows loads the settings stored in specia
l files, called "configuration file". These settings are very important for mana
ging the operation of the operating system during the entire session. Typically
configuration files are located in the C: or C: \ Windows and use the extension
INI, short for "init" (initialization). In addition to Windows, some software al
so store their boot settings using. Ini files stored within their installation f
older or in the system. A. Ini reality is nothing but a plain text file divided
into sections, brackets, inside which contains the parameter names followed by a
n equals sign and value (eg, timeout = 30).
120
Win Magazine Christmas 2005
113
10/12/2005
10:07
Page 113
| DLL files | File extensions |
System
ALSO READ ...
Win number 78 Magazine we analyzed the meaning of file extensions.
Those crazy crazy bookstores!
The proper operation of Windows and applications depends on some files "vital" f
or the PC
N
and Windows operating systems play a particularly important files identified by
the extension DLL (Dynamic Link Library). Commonly known as "DLLs" are small pie
ces of code that perform specific functions well. Are so important that their ta
mpering or cancellation may affect the operation of the system. DLL files are un
loaded in the world of the early 90's, strongly desired by the developer, always
looking for a convenient way to update their applications. In the past, when we
wanted to update software or fix a bug, it was necessary to recompile the entir
e application and re-distribute it to users. Using DLL files, however, this is m
uch easier just to replace the library that deals with a specific function to ma
ke the appropriate updates.
tions in the DLL file, when executed, are brought into play all its functions, i
ncluding those not used. Conversely, using the DLL library, computer resources a
re used only when necessary. Each medal has its reverse: the DLL files are often
due to software conflicts, since it can happen that multiple applications insta
ll different versions of the same library. The worst thing is when programs deve
loped for older versions of Windows, or made by
Classic example of an application that crashes because it is a DLL required for
its execution.
"The DLLs can cause software conflicts"
amateur programmers, trying to override the system libraries.€In this case the
security mechanism of Windows warns with a dialog box that software is trying to
replace a DLL with another older. There is no doubt: click on Yes to keep the v
ersion of the DLL file on disk and protect us from any possible error.
Advantages and disadvantages of DLL files
The use of DLL file not only facilitates the work of programmers, it will also s
ave a lot of hardware resources. If software is composed of a single block witho
ut divide function
corrupt (we can copy from another computer or found on the Internet using a sear
ch engine like Google). When we insert a new library in the system folder (C: \
Windows \ System32) is required to register, log entries that update certain con
figuration of Windows. To do so the operating system makes available the utility
regsvr32.exe. Operation is very simple: just type the DOS command prompt or the
Start menu / Run Windows command regsvr32.exe c: \ path \ nomedll.dll.
And if the file is not there?
If a DLL is changed (deleted or overwritten by another version by mistake), and
the same Windows programs may stop working properly or may even become impossibl
e to start them. In less serious cases is sufficient to repair the installation
of the program, alttre necessaPer situations is to use a DLL file in Windows you
must first carry out the stream to replace the liregistrazione. To do this we c
an use the menu command regsrv.exe brera missing or Start / Run.
MAIN FILE DLLs used by Windows
FILE
GDI32.DLL KERNEL32.DLL NETAPI.DLL Odbc32.dll SHELL32.DLL USER32.DLL WINMM.DLL CO
MDLG.DLL DDRAW.DLL DSOUND.DLL MAPI32.DLL LZ32.DLL
Some of the libraries necessary for the proper functioning of the operating syst
em.
MANAGES
The output of memory devices, processes, system resources access and control of
network connectivity to databases Opening and Closing Windows, dialog boxes, net
work connection, etc.. The menus, cursors, messages, etc.. The multimedia system
dialogs The animated graphics in the games sound effects in games E-mail File c
ompression
Win Magazine January 2006
113
107
09/01/2006
14:20
Page 107
| REG files | File extensions |
System
ALSO READ ...
Win number 78 Magazine we analyzed the meaning of file extensions.
The scalpel of the Windows Registry
To avoid compromising the operation of the system, the reg file, favorites by fr
eaks should be used with caution
ny application or open file referenced during its execution to a single large da
tabase continuously updated: the configuration register of Windows. This is wher
e all information is saved in a position to operate the system and installed pro
grams. To view and edit the contents of this database, you typically use to the
Registry System, a small program that can draw from the Start menu / Run, typing
regedit. An alternative is the reg file (short for "registry"), ordinary text f
ile containing a sequence of values to be included in the registry.
Q
Registers for all uses
Unlike what you might think, the. Reg are widespread. On the Internet there are
many sites that make available. Reg file prepared specifically for the optimizat
ion of the operating system. Sometimes they are also distributed as a patch or e
ven programs to illegally change the settings and software licenses. The. Reg fi
le, once opened, will automatically change the registry. To run it just double-c
lick on them and confirm the addition of new values to the registry. The
The Registry Editor Windows configuration allows a tree view. We can use it (ver
y carefully) to modify the registry keys, or to see the changes made by running
a. Reg.
same result is obtained using the voice Merge cha appears when you click on the
file with the right mouse button. It's always good to act with caution on the re
gistry, regardless of it being done manually or through a file. Reg. In itself t
his is indeed a very dangerous that in some cases may even lead to blocking of W
indows, it is equally true that, if carried out by
knowledge of the facts, make improvements to the stability and speed of applicat
ion and operating system.
REG file into the open
Whenever you are faced with a file.reg we downloaded from the Net is good practi
ce to give a peek inside the instructions. To do so, apriamolo using the Windows
Notepad. See that the syntax is very simple: at the beginning of the text is th
e keyword REGEDIT4 and each successive line, square brackets, the full path of t
he registry key, the name of the string to add (quotation marks) and value to se
t. Once you file, to see if a key was inserted correctly, simply launch the Regi
stry Editor and check the string value added or modified. Recall that because th
e changes to take effect, you often need to restart your computer.
To view the contents of a reg file just open it with Windows Notepad. This examp
le adds a string to a registry key: the effect is obtained by turning off advanc
ed file search in Windows XP.
Win Magazine February 2006
107
111
18/09/2006
9:47
Page 111
| CAB files | File extensions |
System
ALSO READ ...
Win number 78 Magazine we analyzed the meaning of file extensions.
Pack may be a need
Inside the Windows installation packages are the CAB files optimized to contain
dozens of files
L
and applications and all Microsoft operating systems are distributed on CD and D
VD containing dozens of file cabinet. These are nothing but real records can con
tain groups of files in "super compressed". Archives. Cabs are not only present
on the installation disks of the programs but are also found within the system f
olders in Windows XP.
The files that come from the past
80 Years Since Microsoft has felt the need to save space on the media with which
to distribute their programs. To streamline the necessary floppy disk operating
system MS-DOS was resorted to, in fact, a particular compression method called
LZSS. Only 90 Years in the Redmond company, take advantage of the compression LZ
X (learn more visit http://xavprods.free.fr/lzx) developed by programmers dell'A
miga, managed to leap on giving birth to the file cabinet, or just cab. The work
of programmers Amiga was so popular that in 1997, Jonathan Forbes, dell'LZX fat
her was as-
To extract a file from an archive. Cab using the command prompt windows, you use
the Expand tool. That process may be useful to restore damaged system files or
drivers.
summary from Microsoft to improve the compression algorithm of the cabinet. In W
indows XP is in C: \ WINDOWS \ Driver Cache \ i386 and contains all the device d
river, type the prompt cd C: \ WINDOWS \ Driver Cache \ i386 to position ourselv
es in the folder. Then using the expand command / d driver.cab, we slide to the
list of video files. To extract such as hard disk: The file msgame.sys, simply u
se the expand command driver.cab / f: mgame.sys C: \. The option / f: is used to
specify the file to extract. For a complete list of options can be used with Ex
pand, however, simply type EXPAND /?.
Wizards of the console
In Windows XP thanks to the functionality, integrity compression / decompression
of archives, the file contents. Cab can be explored without having to unzip the
m. However, it should not ever take advantage of the graphical interface too, si
nce you may need to extract a file from an archive. Cab without access to it (wh
en, for example, in the event of a crash, you must restore a corrupted file) . T
o learn how to manipulate. Cab from the command line, we can use the Command Pro
mpt in Windows XP (to start just go to Start / Run, type cmd and click OK). The
command that we learn about fiddling with the CAB to expand (in earlier versions
of Windows is used instead of extract, see the Windows CAB box 98). If we wante
d to, for example, view the contents of driver.cab
The CAB IN WINDOWS 98
In Windows 98 command that allows you to manipulate files. CAB Extract, whose sy
ntax is extract [/ y] [/ a] [/ d | s] [/ l location] cabinet_file. To find, for
example, a file inside a. Cab and extract it to a folder you must type the comma
nd prompt, extract / a <CABINET> name> file cercato> / l of <Directory destinazi
one>. To determine which file instead. Cab file contains a file without removing
it, just use the / d, typing extract / a / d <cabinet> <file name searched.
OPTIONS EXPAND
Here are all of the keywords used with this command to manipulate CAB files.
OPTION
-R-D-F /?
USED FOR ...
Rename the files that are unpacked View the list of files within the archive, sp
ecify the file name to appear on the screen to extract a list of all the command
options
Win Magazine March 2006
111
111
06/03/2006
10:24
Page 111
| NFO files, INF and LOG | File extensions |
System
COMPLETE
SOFTWARE
Let's look at extensions used for program installation and control of Internet c
onnections
ARE ON THE
CD DVD
A family of file "well informed"
It
common opinion that the only text files used are those with. txt. In fact there
are at least three extensions also notes, NFO, INF, LOG, used to indicate text f
iles that contain information or a series of operations that the computer has to
make during installation of programs. Let's see how they work.
FireLogXp is under System
Tips subheading ...
The use of the files. Nfo has spread to the Internet becoming an extension mainl
y used in the community of crackers who like to enter into compressed files inst
ructions on how to apply a patch or how to enter a serial record for a software
trial. Generally files. Nfo can be opened using the file viewer is included in W
inZip WinRar alternatively be any good text editor. It is also very common to fi
nd in them some drawings using the ASCII code.
configuration used to install programs on Windows. There. Inf file very complex,
such as those for installing device drivers or software, but to get a taste of
the syntax used for creating these files, we just analyze the most common, ie au
torun.inf. The latter is used to automatically start a CD or DVD, once inserted.
An example at hand is the autorun. Inf on the CD / DVD Win Magazine: [autorun]
open = icon = Win_Magazine.exe win.ico square brackets is inserted into the func
tion to call, then with open = indicates the executable to launch and icon = ico
n to bring up the CD / DVD use.
Pfirewall.log are stored within the file information collected by the Windows Fi
rewall when we are connected to the Internet. Its contents can be viewed in deta
il with special software like FireLogXp.
Knowledge is power
The last category to consider is that of. Log file used by Windows and applicati
ons to keep track of any errors during installation or execution and exploited b
y system administrators to check the history of Internet connections. We take, f
or example, the file generated by Pfirewall.log Windows firewall, located by def
ault in C: \ Windows. The location and connection settings can be changed drawn
from Start / Settings / Control Panel / Windows Firewall / Advanced / Security L
ogging. Like all log files in Pfirewall.log information are placed one after the
other, making it difficult to decipher the content using the Windows Notepad. I
t may be useful to use free software FireLogXP (present in the System section of
the CD / DVD Win Magazine) that displays all ports and IP addresses requested b
y worms in search of infected machines.
Installation control
Unlike the speech for documents inf. In practice file
ALSO READ ...
Win number 78 Magazine we analyzed the meaning of file extensions.
An example of an autorun.inf file. Inside it lists the operations that the PC mu
st perform after the user has inserted a CD or DVD into the player.
Win Magazine April 2006
111
078
03/30/2006
16:46
Page 78
System
| File extensions | BAK files |
When something goes wrong, the BAK file and restore points are used to reactivat
e the operating system
ALSO READ ...
Win Magazine on previous numbers we talked about the following file extensions:
EXE, INI, DLL, REG CAB, INF, LOG, NFO, BAK, COM, BAT and MSI.
A file that leverage Windows of trouble
A
ll'interno folders software installed on PCs often have files with a. bak, short
for "backup". These are just backup files of original versions. Almost all prog
rams, whether designed by developers cautious, making saving important files to
function. Thus, if a problem occurs,€you can always restore the original files
using backup copies. A typical case is that the text editor (except Notepad) whi
ch by default creates a copy. Bak of document you are making changes. To use a b
ackup, simply rename the file. Bak with the correct extension used by the softwa
re. In the case of a text document, for example, simply change. Bak. Txt. The sa
me procedure applies to all other extensions.
Inside the System Volume Information folder are stored restore points created by
Windows XP.
Start / Programs / Accessories / System Tools / System Restore. This tool allows
you to create a backup of system files, called "restore point", used when (eg a
fter installing a software or driver) the system does not work well or gives err
or messages. Restore points are contained in the System folder VoluII If Windows
backup programs are used to save copies of my Information, in the directory bac
kup, Windows XP is no exception, principal of all disk partitions as complements
' Recovery disk utility and hidden for security reasons. The system configuratio
n, are accessible from inside the directory whose name is the type _restore (xxx
x-xxxx-xxxx-xxxx) (where xxxx are letters and numbers), which contain the backup
data. To view it, from Windows Explorer click on Tools / Folder Options / V iew
: Put a check mark on Show hidden files and folders Display the contents and Sys
tem Restore tool lets you create a restore point of system folders while we rais
e and return the system to a state previous to the present.
the check from Hide protected operating system files. Windows XP Professional wi
th NTFS file system must also uncheck Use simple file sharing. We confirm all OK
. At this point, to access the contents of System Volume Information folder, cli
cchiamoci above with the right mouse button, select Sharing and Security, Securi
ty, and then add the user we logged in the system.
To avoid inadvertently delete the backup file system, by default in Windows XP S
ystem Volume Information folder is hidden and not accessible to all users of the
system.
78
Win Magazine May 2006
107
02/05/2006
17:01
Page 107
| SYS Files | File extensions |
System
Used for some important functions of the system, thanks to. Sys Windows can reco
gnize devices installed on your PC
Those files that everyone calls "driver"
mong the hundreds of files used by Windows an important role is played by those
with extension SYS. These files are used to configure the software and hardware
devices and some basic mechanisms of the operating system as virtual memory. C:
In fact, this is pagefile.sys, said an-
T
large (1 GB). In Windows XP this is a special window for the configuration file:
to reach just go to Start / Settings / Control Panel / System, go to the Advanc
ed tab, click Settings on the Performance pane, click the Change button and then
the Advanced tab . Obviously, this requires caution, because not taking appropr
iate settings, the system may hang.
when it is necessary to install hardware or software very dated.
ALSO READ ...
Win number 87 Magazine page. 111, we have examined. Inf files used for installin
g device drivers.
Intermediaries peripherals
The. Sys instead find wider use as "driver" device, that is as small programs de
veloped to allow the operating system to interface with a PC's hardware. Along w
ith. Inf, these files are essential for a mouse, video card and other hardware d
evices to be installed correctly recognized by Windows. The. Sys are located in
the folder C: \ Windows \ system32 \ drivers. To determine which files. Sys used
by a device, just click on Start / Settings / Control Panel / System, click the
Hardware tab, then click on Device Manager, expanded the entry for the device,
the Driver tab click on Details drivers.
Two old acquaintances
In DOS and previous versions of Windows files. Sys were widely used. In Windows
98, for example, config.sys and msdos.sys were crucial stages of initiation and
implementation of operating system with Config.sys was in fact possible to defin
e the environment variables or specify some specific drivers to load during boot
. These two files are also present in Windows XP but I can come into play,
The pagefile.sys file is used by Windows XP to activate the mechanism of virtual
memory. Your system has a special tool to configure the file size.
REPLACE FUNCTION IN THE 56K MODEM
ADSL is increasingly common, but an old 56K modem can be useful if we are in a p
lace where broadband is not available or to send faxes. Windows XP integrates Mo
dem.sys file compatible with most analog modems. If we, for example, a Rockwell
External V.90 K56 Voice Modem, simply connect it to COM1, then go to Start / Set
tings / Control Panel and double-click Add Hardware. The modem will be detected
and Windows XP installation will proceed. Now, let's go to Start / Settings / Co
ntrol Panel / System and the Hardware tab, click on Device Manager, if everythin
g went the right way, our modem Rockwell will be visible in the list of Windows
XP uses the file Modem.sys for the support of most analog modems. devices.
that "swap file" when RAM is exhausted, Windows XP uses the swap file on disk to
store programs or data system and ensure the continuation of the work session.
The size of pagefile.sys files are automatically set by Windows XP but if necess
ary we can change them. In order to obtain a performance increase can be conveni
ent to move this file to a second hard drive or to restrict the size if the quan
tity of RAM installed is very
Win Magazine June 2006
107
077
05/31/2006
19:28
Page 77
| ICC and ICM files | File extensions |
System
To view or print images true to the original, many devices use the information s
tored within the ICC and ICM files
... Reliable color when viewed in profile!
onitor, printers and other devices installed on computers that handle images, re
produce colors each in a different way. It happens so that the same photo does n
ot appear the same when viewed on two different monitors. To ensure that an imag
e is reproduced faithfully regardless of device used, each refers to a "color pr
ofile", ie a set of clear guidance on how to combine the basic colors and create
the exact shade of each single pixel. Thus, for example, a picture can be scann
ed, displayed on the monitor and then printed on a sheet of paper with the highe
st possible accuracy. The color profiles are stored in small text files that hav
e extension ICC (International Color Consortium) or ICM (Integrated Color Manage
ment). Initially the acronym was ICC Site
M
sclusiva Macintosh computers. Currently on the Windows profile file extension ca
n have either ICM or ICC. If your PC has Windows XP, the profile file of each de
vice are located in the folder C: \ Windows \ system32 \ spool \ drivers \ color
.
FILE FORMAT: We talked about ...
EXTENSION
EXE BAT, COM DLL REG CAB NFO MSI INI, INF, SYS LOG BAK
All extensions have already been addressed on previous issues of Win Magazine.
TYPE
Executables Executable Files Executable Files Configuration File Libraries syste
m log file archives compressed installation files and control file backup detect
ion devices
PUBLISHED ON NUMBER
80 - 81 October 2005 - November 2005 82 - 83 December 2005 - Christmas 2005 84 -
85 January 2006 - February 2006 86 - 87 March 2006 - April 2006 88 - 89 May 200
6 - June 2006
Monitor to measure
The default settings for all devices are controlled by the producers using the R
GB color scheme (Red, Green and Blue: basic colors from which you can get, combi
ned with appropriate
nations, all other shades used in the images shown on screen) that ensures a rea
sonable uniformity of view. Usually, the drivers of our monitors, for example, a
lso contain color profiles designed specifically for that model, so the purest p
ossible representation. There are also special utility, such as Adobe Gamma that
comes with Adobe Photoshop that allow you to accurately calibrate the monitor a
nd create an ICC profile. Without this, just click the right button on the deskt
op, select Properties, go to the Settings tab and press the Advanced button to a
ccess the video card settings, on the management of color monitor,€Profile and
choose the desired color.
From video to print
As for the printer's speech becomes more complex, because the fidelity of color
depends not only on the combination of ink cartridges, but also the type of pape
r used and the chosen resolution. To avoid surprises is always advisable to adju
st the print settings correctly indicating the desired quality and the card you
want to use.
Loading the proper color profile can display photos with great accuracy. Select
Adobe RGB 1998, for example, set the monitor calibration for optimal viewing wit
h Adobe programs.
Win Magazine July / August 2006
77
097
19/07/2006
12:53
Page 97
| Chk files | File extensions |
System
A simple check of the hard disk can generate CHK files. Discover what they are a
nd how to intervene after an abrupt shutdown
If a cluster is corrupt, you lose all data
No sudden blackouts or an irregular shutdown of the computer as we surf the Inte
rnet or we are dealing with our favorite game can combine more damage than you m
ight imagine. At best, just turn on your PC and start Windows again to resume fr
om where we stopped, but usually you have to put into account the damage to some
areas (clusters) of hard disk. The troubles come when they are damaged system f
iles, applications or documents. Every time you stopped abruptly, Windows XP aut
omatically performs a surface scan the hard drive to find and correct errors gen
erated in the file system. Following this, the hard disk chk files are created,
or corrupted files that Windows has renamed after attempted repair.
U
from Tools and click Check Now. To make a thorough scan disk will put a check ma
rk on the Automatically fix file system problems and search for bad sectors and
attempt recovery. If we are controlling the par-
FILE FORMAT: We talked about ...
All extensions have already been addressed on previous issues
Extension
EXE BAT, COM DLL INI MSI REG CAB NFO, INF, SYS LOG BAK ICC, ICM
TYPE
Executables Executable Files Executable Files Configuration File Libraries syste
m log file archives compressed installation files and control file backup detect
ion device color profiles
MAGAZINE PUBLISHED ON WIN ...
No 80 (October 2005) No 81 (November 2005) No 82 (December 2005) No 83 (Christma
s 2005) No 84 (January 2006) No 85 (February 2006) No 86 (March 2006) No 87 (Apr
il 2006) No 88 (May 2006) No 89 (June 2006) No 90 (July / August 2006)
ScanDisk Command
Integrated Windows ScanDisk, a valuable utility that has responsibility for moni
toring the integrity of your hard drive (or a floppy disk). To start this tool b
y clicking the right button on the drive to control, select Properties, then bri
ng on the board-
Scandisk is a Windows tool that examines the surface of the hard disk and correc
ts damaged files.
IF NOT JUST USE THE WINDOWS DOS prompt
OPTION
/ F / I / L: DIMENSIONS / R / X / V
To examine the hard drive, we can use the chkdsk command associated with the fol
lowing options:
WHAT IT IS USED
Corrects errors on the disk. NTFS controls in a less accurate index entries. NTF
S resize the log file to the value specified in kilobytes. Locates bad sectors a
nd recovers readable information. Unmount the volume control it before, increasi
ng the accuracy of the operation. On FAT/FAT32 displays the name of all files an
alyzed, NTFS any cleanup messages.
partition that hosts the operating system, click Start a window will appear aski
ng you to schedule the disk check the next time you restart the system and to wh
ich we respond Yes The same operation can be accomplished by using the chkdsk fr
om the DOS prompt or the Recovery Console The Windows XP. syntax (which also inc
ludes a control defragmentation of files only in the presence of FAT file system
) is: chkdsk [drive:] [path and filename] [options] (eg chkdsk C: / F / V) .
not been recovered. More often, however, we must put the soul in peace: the. Chk
no longer usable. Where the lost data are vital, you can use specific programs
as UnCHK (www.ericphelps.com / uncheck). To retrieve the contents of a file. Chk
, just drag the executable to UnCHK I will see a screen that will ask the locati
on to save the recovered file and the method to be used. Choosing hard drive wil
l get a more accurate recovery.
When the file system is corrupt
ScanDisk does not bother to retrieve corrupted data, but maintaining the correct
file system integrity. The correct files are stored in C: \ FOUND.000 and renam
ed FILE000.chk, FILE00.chk according to the order in which know-
Using a program like UnCHK you can retrieve the contents of a file CHK.
Win Magazine September 2006
97
081
08/24/2006
12:31
Page 81
| CPL files | File extensions |
System
Discovering the file. Cpl, the tools built into Windows XP that allow you to con
figure and optimize the operating system
The panel wonders
no instrument that differs from other operating systems is Windows Control Panel
. This is a real dashboard within which are contained the most important tools f
or administration and operating system configuration. For each icon displayed in
the Control Panel corresponds to a file. Cpl located in the C: \ Windows \ Syst
em32 or C: \ Windows \ system32 \ dllcache. Each is an applet, that is a subprog
ram that allows you to perform specific actions on the system. For example, when
ever I double-click the System icon in the Control Panel, in reality we only sta
rt the applet sysdm.cpl.
U
advantages of the Windows XP firewall is sufficient to, mix vigorously from Star
t / Run command and control firewall.cpl press the OK button.
FILE FORMAT: We talked about ...
Extension
EXE BAT, COM DLL REG CAB NFO MSI INI, INF, SYS LOG BAK ICC, ICM CHK
Extensions have already been addressed on previous issues of the journal
TYPE
Executables Executable Files Executable Files Configuration File Library System
Log files compressed archives
MAGAZINE PUBLISHED ON WIN ...
No 80 (October 2005) No 81 (November 2005) No 82 (December 2005) No 83 (Christma
s 2005) No 84 (January 2006) No 85 (February 2006) No 86 (March 2006) No 87 (Apr
il 2006) No 88 (May 2006) No 89 (June 2006) No 90 (July / August 2006) No 91 (Se
ptember 2006)
Hands off panel
A quick shortcut
A little known feature of Windows that has all the tools of the Control Panel ca
n be started by typing the corresponding box from Start / Run. The. Cpl but can
not be done alone, but you must use the program control.exe. For example, to acc
ess the set-
The tools of the yacht installation and control in the Control vanFile backup no
t used with caution, because they can comProfili color recognition devices promi
se a good file recovery system operation, especially in the hands of inexperienc
ed users. Can therefore es-sa operation for Models useful to disable the display
of adminis-trative and the Control Panel. Make wedges icons in Control Panel, d
ouble-click on mo-specificado Show only applets that are not accessible to anyon
e. For you the control panel, we set Atfarlo we can use the tool group Criterion
-substantiated, click Enable and click Agpo bootable from Start / Run command wi
th Reach. At this point we indicate nogpedit.msc. Once you open the window, I-ex
panding files. Cpl (see chart) that desideriadiamo User Configuration, click on
the mo are shown in Panel Consimbolo + place next. We perform the same control a
nd confirm our choice.
To each his own NAME
APPLET SERVICE
Here is a brief guide to the files. Cpl and their main functions.
USED FOR ...
... set specific configurations of the keyboard, modem and screen Accessibility
access.cpl to facilitate the use of the PC. Application installation ... install
or remove programs and Windows components. Appwiz.cpl Properties - Screen ... a
ccess to display properties (color, wallpaper, screen savers, etc.).. Desk.cpl f
irewall.cpl Windows Firewall ... configure the firewall in Windows. Hardware Wiz
ard ... install a device or troubleshoot it. Hdwwiz.cpl Property - Internet ...
configure the properties of your Internet connection. Inetcpl.cpl ... add or rem
ove devices such as game joysticks. Game joy.cpl ... configure the properties of
the mouse (buttons, scroll wheel, speed Properties - MAIN.CPL mouse pointer). P
roperties - Sounds and Audio Devices ... set sound card, speakers, volume and sy
stem sounds. Mmsys.cpl ... view and configure connections to the local network,
Internet Network Connections ncpa.cpl or to other computers. ... add, remove and
configure user accounts that access the User Accounts nusrmgr.cpl computer. ...
configure power management settings (off powercfg.cpl Properties - Power Option
s monitor, hard disks etc.).. ...€display information about your computer confi
guration and set the System Properties sysdm.cpl many system parameters. Phone a
nd Modem Options telephon.cpl ... configure the modem. Properties - Date and tim
e timedate.cpl ... set the time, date and time zone.
Using the command gpedit.msc can access the Group Policy window and configure th
e elements accessible from the Control Panel.
Win Magazine October 2006
81
105
09/26/2006
16:41
Page 105
| Files MSC | Software |
System
ARE ON THE
Let MSC files, essential tools for managing all functions of the operating syste
m
CD DVD
PDFs of articles on file extensions published in earlier issues of Win Magazine
are in the section System
The family of tools for Windows XP
On all know that Windows XP is an integrated Microsoft Management Console (MMC),
a tool that allows us to gain full control of the operating system and effectiv
ely manage every aspect. The secret of this console is its architecture: it work
s as a sort of container for "SnapIn", ie plug-in that can be added to it to ext
end its functionality. To invoke the console, just go to Start / Run, type comma
nd mmc and press the OK button. Windows XP already has numerous snap-in, stored
on your hard disk in the folder C: \ Windows \ System32 folder as a file with MS
C (Microsoft Management Console Snap-in Control File).
N
Services.msc snap-in allows us to view the status of all services in Windows. Cl
icking on a service you can access the screen allowing you to change the status.
The components already integrated
Some of the snap-in in Windows XP are our old friends: the utility to defragment
the hard drive, the window for the management of pe-
Reportedly, the Event Viewer, and so on. These plug-ins can be invoked directly
from the console (menu File / Open), or alternatively can be started by typing t
he file name. Msc from Start / Run or simply clicking the right mouse button ico
n My Computer on your desktop and if-
lessons from the menu that appears the heading Management.
Services are also under control
Among the available snap-ins, probably the most interesting is services.msc. Thr
ough it we can view the status of operating system services, ie all those progra
ms that run when Windows starts and, once loaded in memory, still waiting to be
used. An example of a service system is the Windows Security Center, which is re
sponsible to notify us whenever our antivirus definitions are out of date or the
firewall is disabled. Using services.msc status of each service can be changed.
To do so, we start this snap-in, click the right mouse button on the service yo
u are interested in, select Properties, then on the Startup Type drop-down menu
choose from Auto, Manual and Disabled, and confirm by clicking OK . This means,
of course, be used with caution, because disabling some services, Windows may no
t function properly or become unstable.
TO EACH HIS SNAP-IN FUNCTION
SNAP-IT FILE
CERTMGR.MSC CIADV.MSC COMPMGMT.MSC DEVMGMT.MSC dfrg.msc diskmgmt.msc Eventvwr.ms
c Fsmgmt.msc GPEDIT.MSC Lusrmgr.msc NTMSMGR.MSC NTMSOPRQ.MSC perfmon.msc RSOP. W
MIMGMT MSC secpol.msc services.msc. MSC
Here is the complete list of files. Msc available in Windows XP.
FACILITY NAME
Computer Management Indexing Services Certificates
What?
Allows you to manage security certificates View the status of the indexing servi
ce system provides access to all the utility system and manage services and appl
ications, Device Manager displays the hardware installed Run the Disk Defragment
er utility for defragmenting hard drives Disk Manager allows to create / modify
partitions on a hard disk Event Viewer View system events Show Shared Folders sh
ared folders system allows Group Policy to set security policies of the Local Us
ers and Groups System Creates / edit local users and groups View Removable Stora
ge Removable Storage including CD and DVD drives for removable storage operator
Requests Show your requests for Removable Storage Performance View the status an
d performance of the system displays a summary screen of all the criteria RSoP p
rotezioneimpostati system of the Local Security Settings Set Security Policy Ser
vices allows to start and stop system services Windows Management Infrastructure
(WMI) allows system administration through use of scripts
Win Magazine November 2006
105
103
10/23/2006
10:56
Page 103
| SCR files | Software |
System
ARE ON THE
Getting to Know the. Scr, used to give a touch of color to the monitor, but also
to infect Windows
CD DVD
PDFs of articles on file extensions published in earlier issues of Win Magazine
are present in the System section.
M'allontano from the PC and the screen saver
ati to preserve the quality of CRTs for a period of user inactivity, the screens
aver (or screensaver) have become a decorative element and in some cases a real
danger for the operating system. In the Windows screen saver in the form of file
s. Scr and are generally within the car-
tella C: \ Windows \ System32. It is true executable files, that is just double-
click a file. Scr screensaver to launch content in it. To create a screen saver
that works properly may also be necessary hours of programming (a comprehensive
tutorial is available on www.wischik.com/ scr / howtoscr.html), but there are en
ough to open a file. Scr with any hex editor to see the appropriate software as
it is a real program. facilitating the very work of creation, as Fac-screensaver
configuration (if any) of paratory Pro (www.blumentals.net/ meters screensaver
selected. Quanscrfactory, paid) or do we move away from our postaScreensaverWork
s (www.rtsoft-tion , anyone can peek at our ware.org), but decision-PC freeware.
To keep out strangers and cusamente narrower than rios just put a check mark in
direct competition on the com-restoration-password protect. commercial. Every t
ime you moved the mouse or pressed a button on the keyboard duSalvaschermo Timer
rant running the screensaver set buy running parirÀ requested to enter their p
assword set as a screen-saver to resume work on while we are far from Windows. P
C is to click the right mouse button on the danger in the free screensaver on yo
ur desktop, selection is not all gold that glitters. The ment, the Properties it
em, five-screensaver can often go trasformardi tab screen is in proper vehicle f
or viruses and trojans. saver and from the pulldown menu is well-im so always be
wary salpostare by one of the animations vaschermo downloaded from Web sites no
t affipresenti. Speaking on the reliability and received from strangers by arrow
s next to the e-mail box. Before running the screen saver, standby can adjust th
e scan the file with a good antempo of inactivity after the forty-tivirus is alw
ays recommended. Just ricorle you must start the sal-write the Sober worm was on
ly one of vaschermo while clicking Popular malicious code to use the Settings bu
tton may file. Scr to propagate boxes poDalla Properties - Screen Windows can ma
nage and configure the screen saver on your system. we open the window for being
of millions of users around the world.
N
Win Magazine December 2006
103

You might also like