IT tutorials
 
Windows
 

Configuring Windows 8 Computers : Using System Support Tools (part 1) - Working with Disk Cleanup, Verifying System Files with File Signature Verification

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/12/2012 11:31:17 AM
Windows 8 provides a wide range of support tools. Tools that are available include the following:
  • Backup (Sdclt.exe) Opens the Windows 7 File Recovery tool, which you can use to back up and restore user and system files. 

  • Built-In Diagnostics Scans the system, examining hardware components and software configurations for problems. This information can be used to troubleshoot and resolve performance and configuration issues.

  • DirectX Diagnostic Tool (Dxdiag.exe) Runs a diagnostic tool that you can use to troubleshoot problems with Microsoft DirectX. DirectX is used to speed up the performance of applications, provided that the system hardware supports this feature.

  • Disk Cleanup (Cleanmgr.exe) Runs the Disk Cleanup utility, which examines disk drives for files that aren’t needed. By default, Disk Cleanup examines temporary files, the Recycle Bin, and various types of offline files to see whether there are files that can be deleted.

  • Disk Defragmenter (Dfrgui.exe) Runs the Optimize Drives utility, which examines disk drives for fragmentation and can then be used to defragment the drive. A drive with many fragmented files can reduce the system’s performance. 

  • File Signature Verification Utility (Sigverif.exe) Used to check operating system files that have been digitally signed. Any critical files that aren’t digitally signed are displayed in a results list. The complete list of system files checked is available in a log file stored in %SystemRoot%\Sigverif.txt.

  • Offer Remote Assistance Enables you to offer remote assistance to a user. 

  • Remote Assistance Enables you to create a remote assistance invitation that can be used to get remote help from a technician. 

  • System Configuration (Msconfig.exe) Enables you to manage system configuration information. You can configure normal, diagnostic, and selective startup as well.

  • System Restore (Rstrui.exe) Opens the System Restore utility, which can be used to create restore points or roll back a system to a specific restore point.

The tools you might want to take a closer look at now include Disk Cleanup, File Signature Verification, and System Configuration.

Working with Disk Cleanup

Disk Cleanup checks disk drives for files that aren’t needed. You can start to work with Disk Cleanup by completing the following steps:

  1. Open Disk Cleanup by typing cleanmgr in the Apps Search box and then pressing Enter, or by tapping or clicking the related option on the Apps screen.

  2. If the computer has multiple hard disk drives, the Drive Selection dialog box is displayed. Use the Drives drop-down list to choose the drive you want to clean up, and then tap or click OK.

    Disk Cleanup then examines the selected drive, looking for temporary user files that can be deleted and user files that are candidates for deletion. The more files on the drive, the longer the search process takes.

    When Disk Cleanup finishes its initial run, you can add temporary system files that can be deleted and system files that are candidates for deletion by tapping or clicking Clean Up System Files, selecting a system drive to examine, and then tapping or clicking OK. You will then see a report similar to the one shown in Figure 1.

    File categories that you might see in the report include the following:

    • Downloaded Program Files Contains programs downloaded for use by your browser, such as ActiveX controls and Java applets. These files are temporary and can be deleted.

    • Files Discarded By Windows Upgrade Contains files from a previous upgrade that were not identified as Windows system files. After you’ve saved any necessary data from previous Windows installations, including user data, you can use this option to remove the related files and free up space.

    • Hibernation File Cleaner Contains details about the state of the computer when it enters hibernation. If the computer doesn’t use hibernation, you can remove this file to free up space.

      Use Disk Cleanup to help you find files that can be deleted.

      Figure 1. Use Disk Cleanup to help you find files that can be deleted.

    • Microsoft Office Temporary Files Contains temporary files and logs used by Microsoft Office. These files can be deleted to free up space.

    • Offline Files Contains local copies of network files that you’ve designated for offline use. These files are stored to enable offline access and can be deleted.

    • Offline Web Pages Contains local copies of webpages that you’ve designated for offline use. These files are stored to enable offline access and can be deleted.

    • Previous Windows Installation(s) Saved under %SystemDrive%\Windows.old, these files are from previous Windows installations. After you’ve saved any necessary data from previous Windows installations, including user data, you can use this option to remove the related files and free up space.

    • Temporary Offline Files Contains temporary data and work files for recently used network files. These files are stored to enable working offline and can be deleted.

    • Recycle Bin Contains files that have been deleted from the computer but not yet purged. Emptying the Recycle Bin permanently removes the files.

    • Temporary Files Contains information stored in the Temp folder. These files are primarily temporary data or work files for applications.

    • Temporary Internet Files Contains webpages stored to support browser caching of pages. These files are temporary and can be deleted.

    • Thumbnails Contains thumbnails of pictures, videos, and documents created by Windows 8. When you first access a folder, Windows 8 creates thumbnails of pictures, videos, and documents. These thumbnails are saved so that they can be quickly displayed the next time you open the folder. If you delete thumbnails, they are re-created the next time you open the folder.

  3. Use the check boxes provided in the Files To Delete list to choose files that you want to remove. Then tap or click OK. When prompted to confirm the action, tap or click Yes.

Verifying System Files with File Signature Verification

Critical files used by the operating system are digitally signed. Digital signatures help prove the authenticity of these files and ensure that it is easy to track changes that might cause problems on a system. When you are having problems that cannot easily be explained, such as happens when a system becomes unstable after an application is installed, it is a good idea to verify that critical system files haven’t been changed. You can do this by using the File Signature Verification utility.

The executable file for the File Signature Verification utility is Sigverif.exe. You can start and work with the File Signature Verification utility by completing the following steps:

  1. Type sigverif in the Apps Search box, and then press Enter. This starts the File Signature Verification utility, as shown in Figure 2.

    Use the File Signature Verification utility to help you verify system files.

    Figure 2. Use the File Signature Verification utility to help you verify system files.

  2. By default, the File Signature Verification utility displays a list of system files that aren’t digitally signed and writes verification results to %SystemRoot%\System32\Sigverif.txt. Before you verify file signatures, you might want to specify logging options. If so, tap or click Advanced. As Figure 3 shows, the verification results are saved to a log file, and by default, any results you generate overwrite any results that you previously generated, and results are saved to a log file named Sigverif.txt. To help you track changes in files, you might want to append results rather than overwrite. If you append rather than overwrite, you can more easily identify changes. When you are finished working with the logging options, tap or click OK to return to the main window.

    Modify the default logging options as necessary.

    Figure 3. Modify the default logging options as necessary.

  3. Tap or click Start to run the File Signature Verification utility. In the results, notice the list of files displayed in the File Signature Verification utility report. These files don’t have digital signatures and could have been maliciously replaced by other programs of the same name. Tap or click Close to return to the main window. If you suspect a problem, review event logs and other error reports to see if any of these files show up in the error reports.

  4. If you want to review the verification log, tap or click Advanced, and then tap or click View Log. You also can use Microsoft Notepad to open the verification log, which is located in %SystemRoot%\System32\Sigverif.txt by default. Check the log to see if there are files that have been altered since they were installed. Files are listed by status, such as Signed and Not Signed. Note the modification date and version of the file. If a computer has been having problems since a certain date, and critical files were changed on this date, this could be the source of the problem. For example, perhaps a program was installed that overwrote a critical file with an older version.

 
Others
 
- Windows Server 2008 Server Core : Working with Data - Working with File Associations and Types, Working with ODBC Data Sources
- Windows Server 2008 Server Core : Working with Data - Performing Bulk File Transfers with the XCopy Utility
- Windows Server 2008 Server Core : Working with Data - Validating File Operations with the Verify Command, Performing Backups with the WBAdmin Utility
- Windows Small Business Server 2011 : Partitions and Volumes (part 4) - RAID-5 Volumes, Mounting a Virtual Hard Disk, Mounting a Volume
- Windows Small Business Server 2011 : Partitions and Volumes (part 3) - Adding a Mirror, Drive Failure in a Mirrored Volume
- Windows Small Business Server 2011 : Partitions and Volumes (part 2) - Extending or Shrinking a Volume
- Windows Small Business Server 2011 : Partitions and Volumes (part 1) - Adding a Partition or Volume
- Windows Small Business Server 2011 : Disk Management - Managing Disks
- Supporting Computers Running Windows 8 (part 2) - Getting Advanced System Information, Working with WMI Control
- Supporting Computers Running Windows 8 (part 1) - Working with the Computer Management Console, Getting Basic System and Performance Information
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us