PureBytes Links
Trading Reference Links
|
If you accidentally delete any original Windows 9x/ME file, example
Win98 dated 5-11-98 8:01PM, it's no big deal. You can restore the
file by using the C:\WINDOWS\COMMAND\Extract.exe command on your
Windows CD. Chances are the EXTRACT.EXE command is also on the
Windows CD. Open a DOS window and change drives to your Windows
CD-ROM, e.g.: T:.
SEARCH for the "sulfnbk.exe" file using the extract search command on
the Windows CD. You must be in the folder which contains all the
"CAB" files on the Windows CD:
T:\win98>EXTRACT /A /D PRECOPY1.CAB sulfnbk.exe
Microsoft (R) Cabinet Extraction Tool - Version (16) 1.00.603.0
(08/14/97)
Copyright (c) Microsoft Corp 1994-1997. All rights reserved.
Cabinet PRECOPY1.CAB
05-11-1998 8:01:00p A--- 45,056 sulfnbk.exe
Cabinet PRECOPY2.CAB
1 File 45,056 bytes
EXTRACT like this:
T:\win98>EXTRACT /L C:\TEMP PRECOPY1.CAB sulfnbk.exe
Your "sulfnbk.exe" file is now in your C:\TEMP folder. MOVE this file
to your C:\WINDOWS\COMMAND folder.
Daniel.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
C:\WINDOWS\COMMAND>extract /?
Microsoft (R) Cabinet Extraction Tool - Version (16) 1.00.603.0
(08/14/97)
Copyright (c) Microsoft Corp 1994-1997. All rights reserved.
EXTRACT [/Y] [/A] [/D | /E] [/L dir] cabinet [filename ...]
EXTRACT [/Y] source [newname]
EXTRACT [/Y] /C source destination
cabinet - Cabinet file (contains two or more files).
filename - Name of the file to extract from the cabinet.
Wild cards and multiple filenames (separated by
blanks) may be used.
source - Compressed file (a cabinet with only one file).
newname - New filename to give the extracted file.
If not supplied, the original name is used.
/A Process ALL cabinets. Follows cabinet chain
starting in first cabinet mentioned.
/C Copy source file to destination (to copy from DMF disks).
/D Display cabinet directory (use with filename to avoid
extract).
/E Extract (use instead of *.* to extract all files).
/L dir Location to place extracted files (default is current
directory).
/Y Do not prompt before overwriting an existing file.
<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
Sonnysark@xxxxxxx wrote:
> I just found out that the virus alert was a hoax ... do not delete
> the
> sulfnbk.exe file.
>
>
>> This is a hoax and a particularly viscious one at that. This
>> particular hoax
>> has the potential to create problems
>> even if it isn't a virus. If you follow the 'instructions'
>> contained in
>> the hoax and delete sulfnbk.exe you may not be able to restore
>> long file
>> names (file names are sometimes truncated internally within the
>> operating
>> system and restored when displayed). This could mean that when a
>> systems
>> function ends abnormally, the file names are abbreviated the next
>> time you
>> start your system you will see only truncated files names.
>> Microsoft's
>> 'fix' for that is (or at least was) to have you run the
>> sulfnbk.exe utility
>> to restore the long file names. Of course, depending on how your
>> particular
>> version of Windows works, the problem may not arise. If it does,
>> you may
>> have to get a copy of the utility if you don't like dealing with
>> truncated
>> file names. It would be of interest to know whether any of you
>> who deleted
>> sulfnbk.exe ever have any problems.
>>
>> This is an especially annoying hoax because not only does it
>> instruct the
>> poor unsuspecting users to do damage to their own systems, but
>> most of the
>> references to the hoax on the Web are in Spanish/Portugese.
>
|