Bienvenido! - Willkommen! - Welcome!

Bitácora Técnica de Tux&Cía., Santa Cruz de la Sierra, BO
Bitácora Central: Tux&Cía.
Bitácora de Información Avanzada: Tux&Cía.-Información
May the source be with you!

Monday, February 28, 2011

VSSVC.exe missing from your system? You may receive an error message that indicates the VSSVC.exe file is missing, damaged, or the wrong version. To download and install a DLL file, you will first need to download the Microsoft® Windows® Operating System DLL file and register it on your computer.
. Steps:

  1. Download the Microsoft® Windows® Operating System DLL file using the download link on this page and save the file to one of the folders as seen in step 3. Microsoft® Windows® Operating System .EXE files do not need to be manually registered.
  2. Backup the old version of the DLL file.
  3. Click Start > Run and type in the following command:
Windows 95, 98, or Me:
regsvr32 \windows\system\VSSVC.exe

Windows NT or 2000:
regsvr32 \WINNT\system32\VSSVC.exe

Windows XP or Vista or Windows 7:
regsvr32 \windows\system32\
To replace the VSSVC.exe file:
  1. Close all open programs.
  2. Click Start, point to Find, and then click Files or Folders.
  3. In the Named box, type VSSVC.exe.
  4. In the Look in box, click My Computer, and then click Find Now.
  5. In the search results list, right-click VSSVC.exe, and then click Rename.
  6. Type VSSVC.exe.old, and then press ENTER. If there are multiple copies of the VSSVC.exe file in the list, rename each copy.
For information about how to copy files, click Start, click Help, click the Index tab, type copying, and then click the appropriate Help topic.
When you start the program that uses the DLL or EXE file, the program checks for necessary files. The programs should start normally.

Download Microsoft® Windows® Operating System VSSVC.exe
Microsoft® Windows® Operating System EXE (Executable) Files:
Download "missing or corrupted VSSVC.exe":
  1. Download the file to a folder on your computer
  2. Scan the .EXE file using an Anti-Virus Scanner like AVG or Norton Anti-Virus
  3. Run the Microsoft® Windows® Operating System .EXE file by double-clicking the file

download it!(Windows XP32bit)
Press Start and select Run.
Type CMD and press Enter.
Type regsvr32 "filepath\filename.dll" and press Enter. (ex. regsrv32 "C:\Windows\system32\filename.dll")
From a command line:
vssadmin list shadows
vssadmin list writers
vssadmin list providers
To re-install VSS and repair MS Software Shadow Copy Provider service.
HP support told me that VSS would be "re-installed" with that installation and that any corrupt or missing files, services, registry entries, etc. would be fixed. I have not yet installed that package because I had my doubts from the beginning.


Descripcion: Microsoft Volume Shadow Copy Service proxy/stub
Producto: Microsoft Windows Operating System
Fabricante: Microsoft Corporation
Versión: 5.1.2600.0
Descargar vss_ps.dl
Download swprv.dll
Download eventcls.dll
Download vssui.dll
Download msxml.dll

Volume Shadow Copy Service

The Volume Shadow Copy Service (VSS) is a new service in Windows XP and Windows Server 2003. It is essentially a framework facilitating communication between applications, storage subsystems, and storage management applications (including backup applications) in order to define, persist and exploit point-in-time copies of storage data. Windows 2003 server and client versions
Download Volume Shadow Copy Service SDK 7.2

Make sure VSSVC.EXE is running
Q. Why am I getting a VSS error when I try to backup a drive?
A. This error can occur if VSS (Volume Shadow Services) is not running properly on your system. This is not a DriveImage error. It is usually caused by poorly configured Windows systems.
inicio - ejecutar: services.msc
Please verify in Settings->Control Panel->Administrative Tools->Services that the following services are enabled:
MS Software Shadow Copy Provider
Volume Shadow Copy
Also make sure you are able to stop and start these services.
Possible reasons for VSS failures:
For VSS to work, at least one volume in your computer must be NTFS. If you use only FAT drives, VSS will not function.
The required NTFS volume does not need to be identical with the volume you want to image.
You should make sure that VSSVC.EXE is running in your task manager. If the problems persist, registering "oleaut.dll" and "oleaut32.dll" using "regsvr32" might help.
Without VSS you still can make images with locking or without locking.
DriveXML is returning:
Could not initialize Windows Volume Shadow Service (VSS). ERROR C:\Program Files (x86)\Runtime Software\Drivelmage XML\vss64.exe failed to start. ERROR TIMEOUT Make sure VSSVC.EXE is running in your task manager. Click Help for more information.
VSSVC.EXE is running in Task Manager, as is VSS64.exe. Looking at the FAQ on the Runtime webpage this turned up:
Please verify in Settings->Control Panel->Administrative Tools->Services that the following services are enabled:
MS Software Shadow Copy Provider
Volume Shadow Copy
Also make sure you are able to stop and start these services.
As part of the problem with MS Software Shadow Copy Provider service.
Component Service woudn't expand.
MS Provider service woudn't start.
Error error 0x8000ffff when trying to run regsvr32 /i swprv.dll or vssadmin list providers
Here is how I fixed it.
1) Deleted registry entry for SwPrv. (In fact some application deleted the service before, but I've imported it from the other computer). This is to allow COM+ app import later.
2) Deleted com3 key and COM+ folders as per messages and links above. Rebooted. This is to re-install COM+
3) Re-installed COM+ as per links above and MS recommendations. Now I was able to expand Component Services down to My Computer, but there was no MS Provider application there.
4) From the working computer with the same OS version I've exported MS Software Shadow Copy Provider application. To do so, Start Component Services, expand to "COM+ Applications", right-click on "MS ... Provider" name and choose "Export" from the menu. On the next screen choose "Export user identities with roles"
It will ask you for file name and location and it will create MSI package.
Copy the package to the troubled computer.
5) On the computer-in-need:
- start component services
- expand to "my computer" node
- right-click on "COM+ Applications" and choose "new" --> "Application"
- choose "Install pre-built application" button and navigate to the MSI package. Keep all defaults.
After the process completes, there is proper COM+ application as well as the service installed.
If there is any errors during the process, there is some left-over running and it is necessary to clean the registry and reboot then repeat COM+ install.

At this point you should be able to start both Shadow Copy-ralated services.
I had correct reply yto vssadmin list providers (it was error 0x8000ffff before)
I was getting an error 0x8000ffff in reply to vssadmin list writers and Event ID 8193 was logged in the App log. Backup was working at this point but without Shadow Copy.

Then I followed the steps from
At command prompt::
Cd windows\system32
Net stop vss
Net stop swprv
regsvr32 ole32.dll
regsvr32 vss_ps.dll
Vssvc /Register
regsvr32 /i swprv.dll ----
I was able to register it, before Iwas getting error 0x8000ffff
regsvr32 /i eventcls.dll
regsvr32 es.dll
regsvr32 stdprov.dll
regsvr32 vssui.dll
--- I had XP, I guess this should work for 2003 only.
regsvr32 msxml.dll ---
the last 3 depend on what XML versions you have installed.
regsvr32 msxml3.dll --- if you get error here, re-install corresponding XML version
regsvr32 msxml4.dll

If errors, navigate to
C:\Windows\System32 directory and try the regsvr32 commands again.
2. After completing the registration of the DLL’s  type:
vssadmin list writers
3. You should see the writers listed.
4. Open Ntbackup and attempt to backup file or systemstate.
VSS needs NT Backup to work, if I remember correctly and its twin service MS Software Shadow Copy Provider (SwPrv)
You need NT Backup, too. For services, VSS and MVSC need to be Manual. Also, don't screw with anything that toasts MMC, or you're in a world of potential hurt here. Indexing is totally unneeded as an explicit service (I haven't used ot for over year in my installs)--but there are inter-component aspects extant (that's why you keep coming across references): we can remove it, but parts we keep that we need still imprint it on various interfaces--and it's one of these part you most likely made angry. Shadow Copy would certainly qualify...

They also indicate that I need more files (stdprov.dll, eventcls.dll) which are not on the partition with the new install.
Performing the steps of the 1st link I am able to restore and start the "MS Software Shadow Copy Provider" on my own system (where it was not installed either as I discovered today), but not the "Volume Shadow Copy" (VSS).
Furthermore "vssadmin list providers" output is OK.

Friday, February 25, 2011

"your original record reports 244 heads...

while your new target drive reports 255 heads drive image"

DriveImageXML command line parameters
A. For the backup there are the following commands:
/bx Backup drive x, e.g. /bc
/tx Write backup files to x, e.g. /td:\backups\drive_c
/r Raw mode, e.g. /r or /r-
/s Split image, e.g. /s or /s-
/c Compression (fast), e.g. /c or /c-
/c1 Compression (fast), e.g. /c1
/c2 Compression (good, but slow), e.g. /c2
/v Try VSS first, e.g. /v, do not use with /l
/l Try locking first, e.g. /l, do not use with /v
Q. What about command line parameters for restoring a drive?
A. There currently are not any.


Remember that DriveImageXML images drives ;), NOT disks!
Indeed; I wouldn't want it to image the entire disk, just the drives on the disk that I specify.
And indeed, without ALSO the MBR and DISK SIGNATURE you won't be able to boot the restored "backup" easily. :ph34r:

Thursday, February 24, 2011

Der Lügenbaron im Computer

Bootstrapping or booting refers to a group of metaphors that share a common meaning: a self-sustaining process that proceeds without external help.
The term is often attributed to Rudolf Erich Raspe's story The Surprising Adventures of Baron Munchausen, where the main character pulls himself out of a swamp by his hair (specifically, his pigtail), but the Baron does not, in fact, pull himself out by his bootstraps. Instead, the phrase appears to have originated in the early 19th century United States (particularly in the sense "pull oneself over a fence by one's bootstraps"), from a similar tall tale.[1][2]


stop error 0x000024

"zuualctoci5.sys" (virus?)
error message on your Windows XP computer:
"Stop 0x00000024"
Cause of the Error
This error message indicates a problem in the Ntfs.sys file. This is a driver file that is required to enable your system to read and write to the drives that have the NTFS file system on them.
Note: You may receive a stop error message, Stop 0x23 if FAT16 or FAT32 file systems are on your computer.
Resolution Method
The following are some of the methods that you can use to resolve the Stop 0x00000024 or NTFS_FILE_SYSTEM error messages.
  • If you have SCSI hard disks and other devices on the computer, check their cabling and ensure that there are no termination problems between the SCSCI devices and SCSI controllers. It is recommended that you regularly check System and Application logs in the Event Viewer regarding SCSI or FASTFAT error messages.
  • You must ensure that the drivers for any Advanced Technology Attachment (ATA) hardware or other hardware on the system are regularly updated and are compatible with your operating system.
  • System maintenance and security tools such as backup utilities, antivirus programs, and third-party disk managers may generate the error message if they are not compatible with Windows XP. Many times, some monitoring programs and diagnostic tools may come packaged with other software and cause problems on your system.
  • You can run diagnostic tools to ensure the integrity of different volumes on your hard disk. You can use the following methods to check the disk volumes for errors:
  • Method 1: Perform the following steps:
    1. Open Start menu, select Run, type cmd, and then select OK.
    2. Type chkdsk drive: /f and then press Enter.
    This command will detect and try to fix any structural problems with the file system on the drive specified in the command.
  • Method 2: Perform the following steps:
    1. Open the My Computer window.
    2. Right-click the hard disk drive letter you want to check and then select Properties.On the Tools tab, click the Check Now button in the Error-checking section.
    3. In the Check disk options dialog box, select the Scan for and attempt recovery of bad sectors or/and Automatically fix file system errors check boxes and then click the Start button.
    Note: If your system is currently using the volume you are trying to check, you may receive a message prompt to ask whether you would like to delay the disk error checking until the PC is restarted. If you say yes, the disk checking will be done the next time you start your system. In case the error prevents you from starting the computer, you must try to use the Recovery Console or the Safe Mode to check the disks.
  • The error may occur if the amount of non-paged pool memory on the PC goes down. To resolve the error in this case, you may need to add more memory (RAM) to the PC to increase the amount of non-paged pool memory that is available to the kernel.
Additional Recommendations...
Driver Update: Many errors are related to driver problems such as obsolete, outdated or incompatible drivers. A driver update tool is recommended to scan your system for corrupted and outdated drivers and to ensure that all your drivers stay up-to-date.

Wednesday, February 23, 2011

hamachi ha perdido la conexion con el motor

Solución Taringa

Solución ítaca

Cosa succede al povero Hamachi? Come potrà continuare a scorrazzarci sulle autostrade del sicuro traffico crittografato, senza il suo proverbiale motore trainante?
Non può. Ecco perchè, a questo scomodo errore che ultimamente imperversa sulla mia macchina ad ogni ibernazione del sistema, serve un workaround che non richieda più di un paio di click (un doppio click, per essere precisi) per risolvere il problema.
Senza dilungarsi sulle motivazioni che causano la perdita di connessione, sembra che disabilitare la scheda di rete virtuale e riavviare il servizio, sia un metodo efficace e veloce per risolvere il problema, almeno sulla mia macchina :D
Per farlo si può scegliere la faticosa strada di aprire la mmc, riavviare a mano il servizio, poi aprire la gestione delle schede di rete1, disabilitare  e riabilitare la scheda virtuale, e infine avviare la GUI.
Oppure, con enorme risparmio di energia, si può creare un semplice script da eseguire con un doppio click ogni volta che hamachi ha bisogno di andare dal meccanico.
Potete scaricare il file qui sotto, rinoninandolo da .txt in .bat dopo averlo scaricato, e avendo l’accortezza, solo se avete un sistema a 32 bit e non uno a 64bit, di sostituire l’ultima riga:

Solución retro (uso de hamachi 1.03)
HAMACHI A PERDIDO CONEXION CON EL MOTOR, y cuando lo lograba abrirlo se me cerraba al ratito este problema me tenia cabezon.

asi que la solucion la encontre de esta manera:

instelalen hamachi la version 1.0.3

aki se los dejo para q lo descargen :

descomprimir e instalar:
Esta "OPCION ES MUY IMPORTANTE " iniciar hamachi automaticamente cuando inicie windows con esta opcion tu HAMACHI YA NO PERDERA CONEXION CON EL MOTOR

por otra parte sera molestoso por que siempre se abrira cada ves que prendas la computadora pero eso lo puedes evitar cada ves que apagues la computadopra antes le das en la opcion en el hamachi DESCONECTAR y lo sierras de ahi lo apagas la compu asi ya no aparecera el hamachi cuando prendas la computadora (esto no evitara que hamachi inicie con windows)

cuando vuelvas a prender la computadora ya solo seria cuestion de conectarlo denuevo

ahora ya puedes usar la version 2.0.2 Dandole en actualizar hamachi

bueno espero haverles ayudado en mi post
solo lo hice para poderlos ayudar a los que an tenido mi problema con la version 2.0.2

nota: tambien puedes quedarte con la version 1.0.3 esa version no tiene problemas con conexion de motor q tanto molesta

Failed to connect to the engine

I have this issue on several of my Clients, however, hamachi2 starts anyway and eventually connects. I just  do not get the interface to pop-up until i manuall start hamachi2.
Based on this I suspect an addition of DependOnService stringwith the correct value(tcpip?,lanmanworkstation?,NetBIOS?, NetBT?) in the HKLM\SYSTEM\CurrentControlSet\Services\Hamachi2Svc key would solve the problem
[put two ampersand symbols instead of ASAS]

When you put the start of the UI it in the Startup folder it might get started before the Hamachi2 tunnel service is up and running.
Put a delay in front of it. There are other more elegant sollutions. But this simple one works for me.
C:\Windows\System32\cmd.exe /c sleep 20 ASAS start "" /MIN "C:\Program Files\LogMeIn Hamachi\hamachi-2-ui.exe"

I wrote this little program for fixing the issue.
it set Hahachi service autostart to manual.
It start hamachi
Download link:
The best solution... in case you guys haven't notice at the services where the logmein thing is... it says at properties clearly what the path to the actual executable is... and that is hamachi tunneling exe not the ui one... and also you can see a -s at it... well ta da! make a shortcut to the exe (the one with tunneling engine thing:hamachi-2.exe) and add at path a -s. this also opens hamachi for me... i mean no need to use the other shortcut well at least for me...
I added a download also in case you guys can't make it work... oh... and notice that the path to the downloaded shortcut i put is for my computer... change it accordingly to ur path.
(Read more at link)
After getting the Hamachi 2 update (without a prior notice, nicely done… No more auto update if they continue to break stuff) I started to notice a bunch of XPs receiving this error after a reboot: Failed to connect to the engine.
Hamachi is auto started, at boot, because we have a shortcut in the startup folder. No other way to auto start the free version (as far as I know).
Yet, when starting Hamachi manually after the PC had booted, there were no more errors. So it’s clear Hamachi tried to start before the engine (see services.msc -> LogMeIn Hamachi Engine or something) was started.
And reinstalling Hamachi only seemed to work on one of the XPs.
As there’s no easy way to delay the starting up of a program, I used some dirty vbs and batch… Kinda.
Here’s my solution:
Place both scripts in the Hamachi directory (c:\program files\logmein hamachi\)
Set WshShell = CreateObject("WScript.Shell")
WshShell.Run chr(34) & ".\hamachi.bat" & Chr(34), 0
Set WshShell = Nothing
@echo off
ping -n 30 >NUL
"C:\Program Files\LogMeIn Hamachi\hamachi-2-ui.exe"
Hamachi.vbs will start the bat file. This seems to be the only way to prevent a command prompt from opening (and staying open all the time).
Hamachi.bat will ping itself for 30ish seconds (don’t think there’s a cleaner way to do this…) and then start the Hamachi GUI.
If you’re still having problems, increase 30 to something like 60 or even more.
Anyway, last thing you’ll need to do is to make a shortcut of hamachi.vbs, and drag it into the startup folder.
Reboot, wait a bit, and enjoy.
You can do this without vbs. Just use “start” before path to hamachi:
 @echo off
  ping -n 30 >NUL
  start “C:\Program Files\LogMeIn Hamachi\hamachi-2-ui.exe”
You can also use “hidcon.exe” to start your bat file in hidden console widow.
> hidcon hamachi.bat
I found this tool rather hard to find now…
so I’ve uploaded it here:
MD5: B2DADAB18C318443301D0087CD7200BA

How to install a Hamachi gateway PC


What are the steps for installing the gateway PC?  The only way I've seen is to add a PC as a client, then delete the client, then readd as the gateway.   But when it is done in this order, the gateway PC does not take on an IP address from its subnet.  It has an 5.x.x.x IP address.
Got it working by installing the client connection first and have it sitting unassigned, then create the network.  Creating the network first, then assigning the gateway does not work.  Also since I'm installing on a VM, had to turn on the "Promiscuous Mode" on my VMWare virtual switch.
If you have already created the network, then you want to click edit to the right of the Network Name, then choose add/remove members.  You can specify members AND the gateway at the same time.

Hamachi2 - How to set a static port? (Magic option)

You will not need to if you are willing to enable UPnP in your router, as the latest version of Hamachi will attempt to Map ports for you.
If you still wish to map a static port, please see this doc
 How do I set a static port for incoming traffic?
In some circumstances, you may need to set a static TCP or UDP port for Hamachi2 to use when accepting connections.  This is most commonly needed when you have a computer behind a router/NAT that doesn't support NAT, or its support of NAT is poor.  In this case, you would need to set up a static port forward on the router/NAT, and then fix a static port in Hamachi2.
For Port Fowarding, (please note that every device is different) very detailed info per device can be found on  If you are setting up port forwards, it is easiest to set them up for both TCP and UDP protocols, and to keep them the same number.
Hamachi2 Configuration for Windows
  1. Click System option.
  2. Select Preferences.
  3. Click the Settings button.
  4. If you are in the Basic Settings view, click the Advanced Settings link at the bottom.
  5. Scroll down to the Peer Connections section, and enter the port values you set up in your port forward settings of the router/NAT in the Local TCP Address and Local UDP Address.
  6. You do not need to enter an IP Address, just the port number into the short box (See note below).
  7. Restart Hamachi2.
note Note:
You do need to enter an IP Address if you have more than one active Internet connection.  Enter the IP Address of the local sdaptor you wish Hamachi2 to connect through.

Windows NT6.1 can not connect to win NT5.2

Source 2
Your routers needs to be connected DIRECTLY to your main (desktop) computer, not through another device. I had mine going through a VOIP adapter. I removed this, and how it works.
Probs sharing Vista/XP
I could get to the Windows XP Pro SP3 computer with my Windows 7 Pro laptop, but got the error message when trying to open the shared folder. Some of these guys are reporting the issue correctly and I believe they did everything right. My tip, which did solve the problem was to add a registry entry that will increase the IRPStackSize to 15. Turns out for me the issue had nothing to do with networking. You can look here to help you solve your issue and read about the solution:
The article you linked to:
IMPORTANT: Type "IRPStackSize" exactly as it is displayed because the value name is case-sensitive
The article the Event Viewer links to:
Using Regedit on the win XP PCs, open the following registry key:
So should I be using IRP or Irp? 
 Use 20 as size!
IRPStacksize errors only occurred when trying to access Shares of a Computer (laptops). Not transferring, just accessing.
Data Type: DWORD
Default: 0x4
Maximum: 0xC
Increasing this value requires some memory from the non-allocated memory pool, but the impact should not be noticeable.
NOTE: It is not always advisable to set the IRPStackSize value to its maximum of 12. Generally, you should start the value at 4 and work your way up, increasing the value by 1 each time. The problem may still occur if the value is too high
"Ah, women. They make the highs higher and the lows more frequent." - Friedrich Nietzsche
"'It's the law' is just an excuse for the unintelligent and unimaginative to remain that way" - Me
Although the permissions were set to "everyone" you also have to go to the
security tab, click edit, click add, type everyone in the box, click apply 

Try turning off "Password Protect Sharing" under Control Panel > Network and Sharing Center ... I tried that and haven't had any troubles since. Once that is turned off filesharing is basically the same as XP
Adjust OneCare through the following steps and that seemed to solve his problem:
Windows Live OneCare -
Change OneCare Settinge -
Firewall connection tool -
Tick relevant options (Network discovery, file and print settings, etc) -
OK -
Advanced Settings -
Change file sharing from 'Do not share files and printers" -
OK -

change the workgroup name on the Vista machine from "workgroup" to MSHOME. Theen create a password on Vista User Account. I went onto view network computers on my XP machine, and the laptop (Vista) was sat there waiting. double clicked it, entered the user name which was the user account name on the laptop, entered the password and it was done.
Make sure that file sharing is on, password protect is off and a Private Network id defined via Network/Sharing center. I also had sharing set on both system's C-root drives plus applicable printers, dvd and external HDD.
To make it work:
1. Get into ms-explorer,
2. Right-click on the c-drive that you're trying to access..
3. select properties.
4. select Security tab
5. see if User Name 'everyone' is in the list of defined users.
6. If it isn't, add it to the list by selecting 'advanced',then 'edit' then 'add'.. just type in the word 'anyone' in the user box and click ok. It is now added with limited permissions. Select it again and this time select 'edit'... click on 'full control' for the everyone user.
7. If it was already there OR if you just did step #6 above, make sure you give user 'anyone' Full-Control via the dit option above.
Keep going... you're not finished......
8. Go into 'advanced' again and look for user 'anyone' select it for 'edit'. If you don't see it, go back to step #6...
9. Once found and when in 'edit', give user 'anyone' FULL-CONTROL' permissions.
10. You may be given a few 'cannot grant permission' messages, but just keep clicking ok until the process completes... a few minutes.
You should now be able to connect without errors.

Probs sharing Seven/XP
Mark - Apr 3, 2010
On the windows 7 machine, go to the network and sharing center. Click on the "Advanced sharing settings".
Almost towards the bottom, there should be a "File Sharing Connections" section, which is probably defaulted to the 128-bit encryption. Change it to the 40 or 56 bit encryption and your XP machine should show up.
For sharing between Windows 7 and Windows XP you have to set your Windows 7 computer to the lower encryption setting before it will see the Windows XP computers on your network.
by Gunnar in Sweden
If you're using Windows Firewall, you can skip this section, because Windows Firewall automatically opens the correct ports for file and printer sharing when you turn on network discovery. If you're using another firewall, you must open these ports yourself so that your computer can find other computers and devices that have files or printers that you want to share.
To find other computers running Windows Vista, open these ports:
*UDP 3702
*TCP 5357
*TCP 5358
To find other computers running earlier versions of Windows, and to use file and printer sharing on any version of Windows, open these ports:
*UDP 137
*UDP 138
*TCP 139
To find network devices, open these ports:
*UDP 1900
*TCP 2869

Saturday, February 19, 2011

Hamachi Tutorials

Hamachi VPN Client

Hamachi offers secure network connectivity across public networks, allowing you to create private virtual networks on demand without dedicated hardware or additional IT infrastructure. The application can be run as a Windows Service using FireDaemon. FireDaemon will allow you to have the application start automatically at boot prior to login, allow you to start multiple instances of the application and so forth. This HOWTO will show you how set it up. You can also use Trinity or PanelDaemon to manage FireDaemon and other Windows services via a web browser.
Hamachi Setup Under FireDaemon

  1. Download the latest Hamachi files from the Hamachi from here
  2. By default Hamachi installs to "C:\Program Files\LogMeIn Hamachi" so for the purposes of this HOWTO, we will use that directory.
  3. Install FireDaemon Pro into the directory of your choice (typically C:\Program Files\FireDaemon). FireDaemon can be downloaded from here.
FireDaemon Monitors and limits CPU and memory thresholds and restart groups of services

Hamachi configuration is done through its GUI. Configure any options you want to use and create or join a network. Also make sure that when you close the GUI; Hamachi is connected to a network, otherwise next time the service starts, Hamachi will not be connected to a network

Hamachi has 2 executable in its folder. hamachi-2.exe is the tunneling client and hamachi-2-ui is the GUI component. The tunneling client is installed as a windows service by default.
Next start the FireDaemon GUI from the desktop shortcut. Click on the "Create a new service definition" button in the toolbar (or type Ctrl+N) and enter the information into the fields as you see below. Obviously adjust paths to suite your installation.

Hamachi does not require any parameters to function. Also note that the service name cannot be "hamachi" as the Hamachi tunneling client is already using that name.

Now click on the Settings tab. If you DON'T want to see Hamachi running, uncheck the Interact with Desktop check box & select “Hidden” from the “Show Window” dropdown. Also uncheck Graceful Shutdown as Hamachi doesn't respond to it. You can optionally run Hamachi as the user you installed it as. In the Logon Account field type your username (eg. Administrator) and then enter the user's password twice in the Password and Confirm fields. If you are using Windows XP and you enter the same username/password combo as the user you installed Hamachi with, you will see the GUI on your desktop. In Windows Vista, the GUI can only be displayed in its own desktop via Interactive Services pop-up (this is a limitation in Vista and cannot be bypassed).

Now click on the Advanced tab. You can change the Process Priority to allocate more CPU time to Hamachi or specify which CPU or core Hamachi will run on (in the case of multi-processor, hyperthreaded or multi-core CPUs).

Now click on the Dependencies tab. Make sure the service depends on your Web Server service to ensure that the Web Server is up prior to starting Hamachi.

Now click on the Install button to install and start hamachi!

Hamachi Tutorial - How to config Hamachi
Click: Start
Click: Control Panel
Click: Network & Internet Connections. OR w/e... Its something like that.
Click: Network Connections
...Now a new window should have came up orrrr it should have just took you there.
...To Network connections
Near the Directory you should see an Advanced button...
Click it than click: Advanced Settings.
A new window should appear.
You should see two lists.
One will be at the top and other at the bottom of the window.
You should see "Hamachi" in the top list and an up and down arrow on the sides.
Click Hamachi that is in the list than click the up button untill hamachi is at the top of the list and is your top priority network!
Control Other Computers Remotely
What is this about? Well imagine not just accessing but securely controlling your home computer from anywhere in the world even if the computers are protected behind NAT routers. Or if you need to help a friend or family member with computer problems from far away, forget trying to explain everything over the phone, just take over their computer and fix it yourself. They can see everything you do and learn. You can do all this without paying for extra software.
The title is a little deceiving. It takes more than just the free program Hamachi to do this on any computer other than Win XP Pro. You also need UltraVNC (or get it from the UltraVNC home page) which is a free open source program you can download from the web.
I'll talk about some more things you can do after setting this up at the end of the article. Let's get to it.

How to backup Logmein Hamachi

How to use my Hamachi 2 Backup



Virtual private networks

The concept
Local area networks (LANs) are the internal networks of organisations, meaning connections between the machines that belong to a particular organisation. These networks are becoming more and more frequently connected to the Internet, using interconnection equipment. Very often, companies have a need to communicate over the Internet with subsidiaries, customers, or even staff who may be geographically distant.
However, data transmitted through the Internet is much more vulnerable than when it is travelling over an organisation's internal network, as the path taken is not defined in advance, which means that the data has to go through a public network infrastructure belonging to different entities. For this reason, it is not impossible that somewhere along the line, a nosy user might listen to the network or even hijack this signal. Therefore, information which is sensitive for an organisation or business should not be sent under such conditions.
The first solution to fulfill this need for secure communications involves linking remote networks using dedicated lines. However, as most businesses aren't able to link two remote local area networks with a dedicated line, it is sometimes necessary to use the Internet as a transmission medium.
A good compromise involves using the Internet as a transmission medium with a tunneling protocol, which means that the data is encapsulated before being sent in an encrypted manner. The term Virtual Private Network (VPN for short) is used to refer to the network artificially created in this way.
This network is said to be virtual because it links two "physical" networks (local area networks) using an unreliable connection (the Internet), and private because only computers which belong to a local area network on one end of the VPN or the other can "see" the data.
The VPN system, then, can provide a secure connection at a lower cost, as all that is needed is the hardware on either end. On the other hand, it cannot ensure a quality of service comparable to a leased line, as the physical network is public and therefore not guaranteed.

Operation of a VPN
A virtual private network relies on a protocol called a tunneling protocol; that is, a protocol that encrypts the data which runs from one end of the VPN to the other.
Virtual private network (VPN)
The word "tunnel" is used to symbolise the fact that, between the moment the data enters the VPN and when it leaves, it is encrypted, and therefore incomprehensible to anyone not located at either end of the VPN, as if the data were travelling through a tunnel. In a two-machine VPN, the VPN client is the part which encrypts and decrypts the data on the user's end, and the VPN server (or more often remote access server) is the element that decrypts the data on the organisation's end.
That way, whenever a user needs to access the virtual private network, his/her request is transmitted unencrypted to the gateway system, which connects to the remote network using the public network's infrastructure as an intermediary, then transmits the request in an encrypted manner. The remote computer then provides the data to the VPN server on its network, which sends the reply encrypted. When the user's VPN client receives the data, it is decrypted, and finally sent to the user.
Tunneling protocols
The main tunneling protocols are:
  • PPTP (Point-to-Point Tunneling Protocol) is a layer 2 protocol developed by Microsoft, 3Com, Ascend, US Robotics and ECI Telematics.
  • L2F (Layer Two Forwarding) is a layer 2 protocol developed by Cisco, Northern Telecom and Shiva. It is now nearly obsolete.
  • L2TP (Layer Two Tunneling Protocol), the outcome of work by the IETF (RFC 2661), brings together the features of PPTP and L2F. It is a layer 2 protocol based on PPP.
  • IPSec is a layer 3 protocol created by the IETF that can send encrypted data for IP networks.
The PPTP protocol
The principle of PPTP (Point To Point Tunneling Protocol) involves creating frames with the protocol PPP and encapsulating them using an IP datagram.
Thus, with this kind of connection, remote machines on two local area networks are connected with a point to point connection (including an authentication/encryption system), and the packet is sent within an IP datagram.
The PPTP protocol
This way, the local area network's data (as well as the addresses of the machines found in the message's header) is encapsulated within a PPP message, which is itself encapsulated within an IP message.
The L2TP protocol
L2TP is a standard tunneling protocol (standardised in an RFC) which is very similar to PPTP. L2TP encapsulates PPP frames, which are themselves encapsulating other protocols (such as IP, IPX or NetBIOS).
The IPSec protocol
IPSec is a protocol defined by the IETF which is used to make data transfers secure on the network layer. It is actually a protocol which makes security improvements to the IP protocol in order to ensure the privacy, integrity, and authentication of data sent.
IPSec is based around three modules:
  • IP Authentication Header (AH), which involves integrity, authentication and protection from replay attacks on packets.
  • Encapsulating Security Payload (ESP), which defines packet encryption. ESP provides privacy, integrity, authentication and protection against replay attacks.
  • Security Association (SA) which defines key exchange and security settings. SAs include all information on how to process IP packets (the AH and/or ESP protocols, tunnel or transportation mode, the security algorithms used by the protocols, the keys used, etc.) The key exchange is done either manually or with the exchange protocol IKE (most of the time), which enables both parties to hear one another.

Previous page Next page

ARP cache y problemas

How to Clear the ARP Cache
Inicio- ejecutar - cmd
arp -d *
ARP es un protocolo que se usa para convertir las direcciones IP a direcciones Ethernet o del nivel 2 que estés usando, es decir, direcciones físicas.
Información sobre ARP:
El caché ARP es almacenado en la memoria RAM por parte del sistema operativo y es una tabla en la que se almacenan asignaciones de capa de enlaces de datos (direcciones MAC) y la capa de direcciones de red (direcciones IP). En ocasiones puede dañarse y al estar corrupto impide la visualizacion de sitios web, aunque si le damos ping a esta direccion si obtengamos respuesta para corregir esto podemos hacerlo reparando la conexion de red.
1.- Abrimos el estado de conexion de área local (Mis Sitios de Red, Ver conexiones de red, Conexion de area Local).
2.- En la pestaña de Soporte le damos Reparar.
En ocasiones marca el error de Windows no puede terminar de reparar el problema porque la siguiente operación no pudo completarse: Limpiando el cache ARP. Para asistencia, póngase en contacto con la persona que gestiona su red.
Este es un error comun de windows xp y podemos solucionarlo hay que detener el servicio Enrutamiento y Acceso Remoto para esto hay que ir a:
1.- Ejecutar y poner: services.msc
2.- Buscamos Servicio de Enrutamiento y Acceso Remoto (Routing and Remote Access) y  doble click.
3.- En estado de servicio le damos detener y listo, podemos repetir los primeros dos pasos que mencione antes y ya se eliminara el contenido del caché.
Si no funciona: Después de hacer todos los pasos dejar desactivado el enroutamiento y acceso remoto y en la pestaña de “soporte” regresar a propiedades del protocolo de internet (TCP/IP) y seleccionar obtener dirección IP automáticamente, de ahi una vez mas en reparar y reinicié el explorador, ya con eso tuve acceso a internet de nuevo

Warning symbol on Hamachi connection to partner PC

[failed to connect to VPN tunnel]
Try looking for a different or additional firewall product on the problem machine, like McAfee Security Center (totally hostile to VPNs) or ZoneAlarm or whatever. These are especially suspect if you can chat but cannot ping. 
check out this link for VPN on Windows XP xp.php3 
Hamachi works across NAT routers, even if there are NAT routers at both ends of the connection. In nearly all cases it doesn't require any reconfiguring of the routers - no port-forwarding required. All machines running the Hamachi client are simply and individually visible, even if they are all behind the same router.
Clearing the arp cache fixes 90% of connection problems to the internet. - apart from manually clearing the cache by using a command code or in services, i mainly use the connection repair - double click your connection, wireless or wired then the support tab at the top of that window and then repair. fixes 90% of internet connectivity problems. if repair does not work or fails use one of the commands to clear the arp-cache manually.
What I had to do was tell the connection to not use the remote gateway to connect through internet. On the XP machine (works on Vista and 7 also) go to the properties of the VPN connection. Click on the Networking tab and double click Internet Protocol Version 4 (TCP/IPv4). Click Advanced and uncheck the box for "Use default gateway on remote network." This will route all of your local traffic through whatever network you're locally connected to, and any remote traffic through the VPN connection. This also assumes that you're not trying to route your internet traffic through the VPN. If you leave this option set, then you will not be able to access any local network resources without manually specifiying routes to get to them. This is the default design of VPN :D
Nice work! Did the trick for me.
Could connect to the vpn but not the servers on the network. Thought it was the router because on other wireless networks I could connect fine. This solution did the trick however. Thanks.
Do the following in the command prompt:
route delete
where is your LAN network ID (usually xx.xx.xx.0)
The lack of connectivity is generally either vpn client configuration based, or the firewall on the local pc's that are unable to pass traffic would be the first thing i would check.
Generally if a vpn client successfully connects, that means that handshake portion is over, a secure connection has been established (port 51) ... however data is unable to use this tunnel for some reason ergo port 500 is blocked or if that is not the case then the traffic is getting to the far end but not returning via the tunnel, (in this case that is not true, as 2 of the PC's are using the same configuration and most likely the same tunnel on the firewall (remote dialup clients) with traffic returning to them.
so back to basics:
1) check the client vpn configurations
a) make sure that the client is setup to "only connect manually" or has split horizon enabled.
2) check that the firewall has not blocked port 500 on the PC, if you are unable to view the blocked list, then
create an exception rule for ports 51 and ports 500 inbound and outbound.
may be that you have a worm which is causing this trouble.
arp-cache worm. it's the only way this can go wrong.
worms publisher: microsoft updates.
I have 5 office computers all running Windows XP Pro SP3. THey are all on my home office network - same subnet. They have an identical VPN configuration to one of my customers. I will refer to them as A, B, C, D and E.
A, B and C can connect to my client using VPN but cannot ping anything on the remote network. Once the connection is made these computers can't access anything on the local lan either. D and E can connect to the remote network and can ping the router and other resources on both the local and remote LAN.
The fix:
I wanted to compare the routing table of a successful and non successful connection so I was on computer A and remoted in to computer E using remote desktop. While remoted in I successfully connected to my customer using VPN. I minimized that window and then remotely accessed computer B from computer A. I then fired up a VPN connection and low and behold I was able to ping and access resources on the remote network. I couldn't believe it. I disconnected both remote desktop sessions and logged on at the console of B. I then established a VPN to my customer successfully. Computer B seemed to be "fixed". To make sure that nothing changed on the customer's end I went back to computer A and tried to make a VPN connection. I made the connection to the customer but could not ping or access resources on the remote LAN. So, I still had the problem with A and C.
I then did a remote desktop session from computer B to A and while on A established my VPN session to my customer and then everything was fixed on A. I did the same to C and now that one works as well.
Does anybody have a clue as to why this worked?
Vista makes the distinction between local and www connections, but not winxp.
I run Hamachi, but with a yellow caution sign on right hand side (failed to connect to VPN tunnel).
What did I do?
I uninstalled the Hamachi network adapter via device manager, and then uninstalled Hamachi software. After restarting the computer, I proceeded to install Hamachi afresh, from which point on the software worked fine.
For Rome: Total War engine to connect its Lan gameplay through Hamachi, you must make sure that Hamachi is first place on the Connections list.
[Network and Sharing Center - Manage Network Connections - Advanced - Advanced Settings - Adapters and Bindings - Connections]
For Linux I had the same problem, but I've searched a little bit around and found next section is the CHANGES-file
 * Added an option of keep-aliving tunnels. When enabled, it will cause
Hamachi to send out small UDP packet over the tunnel if there was no
  outbound traffic for a specified number of seconds. Default value is
  90 seconds.
  To modify the value add the following line into ~/.hamachi/config:
   KeepAlive 123
  where 123 is an idle timeout in seconds. Minimum allowed values is 10.
  To disable tunnel keep-alives, set KeepAlive to 0.
 I've tried this on my Linux-clients (6 are running) with value 10 and they all stay online.
The file 'config' does not exist anymore, but I've created it and restarted hamachi.
 Works fine for me.
Edit: I still get yellow warnings in the Hamachi² client, but the connection stays alive! And that was the most important to realise!

Wednesday, February 16, 2011

Arris WTM 552G cablemodem
  Internet Settings
WAN MAC address

Connection Type
Subnet mask
Wan IP
Default gateway
DNS Address
Network settings

IP address
Subnet mask
DHCP Server
Use telnet (
Inicio - ejecutar
Estos modems cambian automáticamente el password
un programa que genera el password del dia se llama ARRIS Password of the day:
default seed 


Monday, February 14, 2011

Tuning-Tipps für Windows Vista

  Windows Vista ist extrem Ressourcen-Hunrig. Der Grund ist, es läd zig Treiber, Dateien und Dienste, die nicht wirklich auf jedem Rechner benötigt werden, sozusagen prophylaktisch. So wird sichergestellt, dass der Benutzer immer alle eventuell anstehenden Aufgaben, ohne groü konfigurieren zu müssen, erledigen kann. De Facto ist das aber eine immense Verschwendung an RAM und CPU-Zeit. Auf einer normalen Workstation werden so, nach meiner Schätzung 15-20% an Leistung verschenkt.
Mit diesem kleinen Guide kann man Windows Vista mit kostenlosen Mitteln für sein eigenes System optimieren. Die verwendeten Tools sind Freeware. Bei mir hat das ganze 510 Punkte beim 3DMark 06 Zuwachs gebracht, gegenüber einer Neuinstallation von Vista; was in Worten bedeutet, dass Vista nach diesem Maünahmen nun etwas schneller ist als XP.
Als allererstes schalten wir ein paar Dienste ab, die wir nicht benötigen. Von Fall zu Fall wird der Bedarf nach Diensten natürlich variieren. Ihr seht hier ein paar Screens, die ich bei mir gemacht habe.
Was brauchen wir noch?
Im Heft 10/2008 der ComputerBild gibt es ein Tuning-Tool Names "CB Windows Optimierer". Das ist eine kleine, aber hilfreiche und wirkungsvoller Sammlung von Windows-Tweaks (funktioniert auch unter XP). Wenn man mit der Maus links über ein Tweak geht, erscheint auf der rechten Seite eine kurze Erklärung, was dieser Tweak bewirkt. Das Tool kann man leider nirgendwo runterladen, man muss sich die Zeitung kaufen. Eine Download-Location habe ich aber doch endeckt (schickt mir eine PM und ich schicke euch den Link). Jedenfalls sind die Tweaks, die mit diesem Tool durchgeführt werden sehr wirkungsvoll.
Wir benötigen als nächstes das Tool "Autoruns". Dieses bekommt man hier:
Anders als der Windows eigene Taskmanager zeigt es alles aber auch wirklich alles an, was beim Systemstart geladen wird. Hier unten habe ich die ensprechenden Registerreiter genannt, wo man nur Häkchen entfernen muss.
Reiter: Everything
Windows Defender (Selbst wenn der Defender deaktiviert ist läd Vista eine msascui.exe. Wer eine eigene Firewall installiert hat benötigt den Defender nicht)
Microsoft Windows Mail 7 (benötigt man nur, wenn man im Netzwerk Mails versendet)
Microsoft Windows Madia Player (Nur Autostart deaktivieren, wenn man alternative Player verwendet)
History (Wenn man mit Firefox surft, kann man die IE-History getrost abschalten)
Windows Firewall (selbst wenn der Dienst deaktiviert ist wird das Controllpanel ansonsten geladen. Jede andere Firewall ersetzt gleichzeitig diese Firewall und den Windows-defender)
Smardcard Credential Provider und
Smartcard Pin Provider (Auch wenn der Smartcarddienst deaktiviert ist läd Vista die erforderlichen Bibliotheken, was ja vollkommen sinnlos ist)
Reiter: Scheduled Tasks
MicrosoftWindowsBluetoothUninstallDeviceTaskBl uetooth Uninstall Device Task (diesen Task braucht man nur, wenn man Blutooth-Geräde verwendet)
MicrosoftWindowsDefragScheduledDefragDatenträg erdefragmentierungsmodul (Selbst wenn kein Defrag geplant ist, reserviert Vista einen Schedule als Platzhalter)
Reiter: Services
Schedule (nur abschalten, wenn man keinen Taskplaner verwendet)
WinDefend (nur abschalten, wenn man den WindowsDefender nicht verwendet)
Reiter: Drivers
Vista will es allen Usern recht machen und läd hier fast alle Treiber, die nötig sein könnten. Dabei werden auch Treiber geladen, die für den Einzelnen vollkommen unnötig sind. Z.B. wird ein Modem-Treiber geladen, obwohl man vielleicht mit DSL unterwegs ist. Hier kann man also das Laden des Modem-Treibers unterbinden.
Abschliessend sei noch erwähnt, dass man sehr vorsichtig mit Autoruns umgehen soll. Wenn man hier Fehler macht, zerschiesst man sich möglicherweise sein System. Die Registrierungsdatenbank ist sehr schnell zerstört und dann läuft nix mehr. Also Vorsicht!
Ich verwende Vista 64 Bit SP1, diese Tipps sollten aber auch bei der 32-Bit-Version etwas bringen.

MS und iihre durchsuchbare Update-Datenbank

Microsoft hat heute mit dem so genannten Microsoft Update Katalog eine durchsuchbare Datenbank gestartet, in der sich alle Patches, Treiber und Service Packs wiederfinden, die über die verschiedenen Update-Dienste der Produkte des Softwarekonzerns ausgeliefert werden.
Der Nutzer kann dort verfügbare Updates ohne Einschränkungen herunterladen, auch wenn es gar nicht für sein System gedacht ist. Für Administratoren gibt es zudem äuüerst nützliche Funktionen, die einen direkten Import der Updates aus dem Katalog in WSUS 3.0, System Center Essentials 2007 oder System Center Configuration Manager 2007
Die wichtigste Funktion des Microsoft Update Katalog ist die Suche nach Schlüsselwörtern, Knowledge-Base-Einträgen, Hinweisen des Microsoft Security Response Centers, Treiberhersteller, Treibermodell, Treiberversion, Produkt oder Produktklasse. Für bestimmte Suchanfragen kann zudem ein RSS-Feed angelegt werden, der über neue Updates informiert.
Der Download der Updates erfolgt über den intelligenten Hintergrundübertragunsdienst BITS. Mit einer Art "Einkaufskorb" kann man zudem diverse Updates sammeln und diese dann gebündelt herunterladen. Der Katalog wird in allen wichtigen Sprachen angeboten, in denen Windows Vista erhältlich ist.

Monday, February 7, 2011

unwanted script in Hotmail Microsoft Live on Firefox 3.6

  • "Clear the Cache": Tools - Options - Advanced - Network - Offline Storage (Cache): "Clear Now"
  • "Remove the Cookies" from sites that cause problems: Tools - Options - Privacy - Cookies: "Show Cookies"

Start Firefox in Safe Mode to check if one of the add-ons is causing the problem (switch to the DEFAULT theme: Tools - Add-ons - Themes).
  • Don't make any changes on the Safe mode start window.
  • To clear your browsing history, cookies, and temporarily cached files at once, see Clear Recent History.
  • To clear your browsing history, cookies, and temporarily cached files at once, see Clearing private data.
  • To prevent websites from storing cookies on your computer, see Blocking cookies.
 Delete all cookies
To delete all cookies stored on your computer:
  1. Click on the Tools menu and select Clear Recent History....
  2. Set Time range to clear to Everything.
  3. Click on the arrow next to Details to expand the list of history items.
  4. Select Cookies and make sure that other items you want to keep are not selected.


  5. Click Clear Now to clear the cookies and close the Clear Recent History window.
  1. Click on the Tools menu and select Clear Private Data....
  2. Click to select Cookies and make sure that other items you want to keep are not selected.
  3. Click Clear Private Data Now to clear the cookies and close the Clear Private Data window.

Sunday, February 6, 2011 utils

For more information about installing the utilities, click here
If you want to add one or more of the following utilities into your Web site, click here

Password Recovery Utilities
Network Monitoring Tools
Web Browser Tools
Video/Audio Related Utilities
Internet Related Utilities
Desktop Utilities
Outlook/Office Utilities
Programmer Tools
Disk Utilities
System Utilities
Other Utilities

CACLS for windows XP
How Do I Get the Security tab in Folder Properties?
First, your hard drive must be formatted NTFS for this tab to show up.
Second, if you're running XP Pro, you must open Windows Explorer, go to Tools, Folder Options, View and uncheck Use Simple File Sharing.
Third, if you're running XP Home, Simple File Sharing is enforced by default and cannot be disabled.  You must boot the computer into Safe Mode and log in with the Administrator account, in order to see the Security tab.  A work around for XP Home, so that you don't have to enter Safe Mode, can be found here.
WARNING:  Adjusting the permissions on a drive, file or folder can lock even the Administrator account out of that drive/file/folder.  Deny Permissions take precedence over Allow Permissions, regardless of your group membership.  Administrators are members of the User's group, by default.  Uncheck Allow, rather than using Deny.  This page last updated 11/25/2005XCACLS windows 2000
CACLS: Capacidades de permisos de grupo
Siga estos pasos para cambiar las ACL de todos los archivos y directorios en la unidad C para permitir control total grupo local Administradores:
  1. Abra un símbolo del sistema.
  2. Tipo:
    cacls c:\ /t /e /g administradores: f
    /t of trash DACLs
    /e of edit DACLs
    /g of grant
Topics for CACLS (Modify Discretionary Access Control Lists)
How do the CACLS Switches work? Here is a purely personal view of how to understand the CACLS syntax.  Begin by dividing the CACLS command into three parts thus: CACLS  1) folder name   2) replace, edit or revoke entries   3) grant user permission
Example: cacls  c:\home   /t     /g guyt:F
1) cacls c:\home - this is the path to the folder whose permissions you wish to change.
2) /t - replace (with guyt's permissions). Note, /t wipes out everyone else's permissions.  An alternative would be /e meaning edit or append permissions.
3) /g guyt:f - Think of /g as standing for Grant.  In this instance, the command grants guyt full control.  An alternative would be :r (read). Note the colon: incidentally, with cacls there isn't a comma in sight.

Displays or modifies discretionary access control list (DACL) files.
Syntax cacls FileName [/t] [/e] [/c] [/g User:permission] [/r User [...]] [/p User:permission [...]] [/d User [...]]
Parameters FileName   : Required. Displays DACLs of specified files.
/t   : Changes DACLs of specified files in the current directory and all subdirectories.
/e   : Edits a DACL instead of replacing it.
/c   : Continues to change DACLs, ignoring errors.
/g   User : permission   : Grants access rights to the specified user. The following table lists valid values for permission.
Change (Write)
Full Control
/r   User   : Revokes access rights for the specified user.
/p   User : permission   : Replaces access rights for the specified user. The following table lists valid values for permission.
Change (Write)
Full Control
/d   User   : Denies access for the specified user.
/?   : Displays help at the command prompt.
  • Use the following table to interpret the results.
    ACE applies to
    This folder and files
    This folder and subfolders
    The ACE does not apply to the current file/directory.
    No output message
    This folder only
    This folder, subfolders and files
    Subfolders and files only
    Subfolders only
    Files only
  • You can use wildcards (that is, ? and *) to specify multiple files.
  • You can specify more than one user.
Formatting legend
Information that the user must supply
Elements that the user must type exactly as shown
Ellipsis (...)
Parameter that can be repeated several times in a command line
Between brackets ([])
Optional items
Between braces ({}); choices separated by pipe (|). Example: {even|odd}
Set of choices from which the user must choose only one
Courier font
Code or program output