Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.comp.os.windows-11    |    Steaming pile of horseshit Windows 11    |    4,852 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3,253 of 4,852    |
|    Paul to All    |
|    Re: Followup: Only one usage of each soc    |
|    15 Dec 25 00:44:29    |
      From: nospam@needed.invalid              On Sun, 12/14/2025 10:58 PM, T wrote:       > On 12/14/25 11:31 AM, Paul wrote:       >> Just out of curiosity, have you ever captured an*entire*       >> backup session with Process Monitor ?       >       > No. Don't even know how.       >       >       >> I bet if your Cobian session was backing up D:       >> on the customer machine, this socket issue doesn't happen.       >>       >> Paul       >       > It has two tasks. both back up the same thing. One goes to       > the vsftp server, the other goes to a USB drive.       >       >       > The backup to the USB drive, do not have the issue.       >       > Also Cobian uses the \\?\ file format (which I forget       > what it is called), so it have no issue with long       > file names.              2.9MB . Uses the ETW subsystem. Sorta like STrace on Linux/Unix       but miles better at it. Can also trace network activity (a relatively       recent addition). This is not GDB or WinDBG, and it only debugs       certain kinds of operations (the way STrace does for files).              https://learn.microsoft.com/en-us/sysinternals/downloads/procmon              Usage is simple.              1) Start it running.       2) Now, start the thing being studied (A Cobian backup). Note the time on the        clock when the Cobian is kicked off.              3) In the ProcMon File menu, select File:Capture Events to "Stop Trace".              4) The hard part is Filter definition. The trace has a lot of info.        We don't want to look at it all.               Select "Process" "Begins With" "Cobian"               That would filter out noise from the OS.               Now, you might see Registry events or you might see        CreateFile/ReadFile/WriteFile activity. You can select to        only see those, for example. You could ask it to include        network packets.              Click Apply.              A Filter gets you down to maybe 100,000 events. Looking at timestamps       (maybe), you can consider only a portion of the trace when scrolling       through it. Otherwise, a 20 minute trace might be too big to analyze.              It's a simple tool, but it relies on your cleverness to design filters       to get the most value from it.              You can save a trace as a PML file (ticking the boxes so the *whole*       trace is saved). Then, you can open that file any time you feel up       to it, for a bash at the filtering and analysis. During the run, all       the Process Names are recorded. What it does not record, is if       you do "tasklist /svc" in a terminal, that maps PID to a service       such a "wuauserv", and collecting this info to go with a tracing       activity, helps you later understand when "some PID starts doing stuff".       Using the captured tasklist output, you have a handy reference       as to "what PID 1234 is" in the trace.               Paul              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca