Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.comp.os.windows-11    |    Steaming pile of horseshit Windows 11    |    4,852 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3,255 of 4,852    |
|    T to Paul    |
|    Re: Followup: Only one usage of each soc    |
|    14 Dec 25 23:38:37    |
      From: T@invalid.invalid              On 12/14/25 9:44 PM, Paul wrote:       > On Sun, 12/14/2025 10:58 PM, T wrote:       >> On 12/14/25 11:31 AM, Paul wrote:       >>> Just out of curiosity, have you ever captured an*entire*       >>> backup session with Process Monitor ?       >>       >> No. Don't even know how.       >>       >>       >>> I bet if your Cobian session was backing up D:       >>> on the customer machine, this socket issue doesn't happen.       >>>       >>> Paul       >>       >> It has two tasks. both back up the same thing. One goes to       >> the vsftp server, the other goes to a USB drive.       >>       >>       >> The backup to the USB drive, do not have the issue.       >>       >> Also Cobian uses the \\?\ file format (which I forget       >> what it is called), so it have no issue with long       >> file names.       >       > 2.9MB . Uses the ETW subsystem. Sorta like STrace on Linux/Unix       > but miles better at it. Can also trace network activity (a relatively       > recent addition). This is not GDB or WinDBG, and it only debugs       > certain kinds of operations (the way STrace does for files).       >       > https://learn.microsoft.com/en-us/sysinternals/downloads/procmon       >       > Usage is simple.       >       > 1) Start it running.       > 2) Now, start the thing being studied (A Cobian backup). Note the time on the       > clock when the Cobian is kicked off.       >       > 3) In the ProcMon File menu, select File:Capture Events to "Stop Trace".       >       > 4) The hard part is Filter definition. The trace has a lot of info.       > We don't want to look at it all.       >       > Select "Process" "Begins With" "Cobian"       >       > That would filter out noise from the OS.       >       > Now, you might see Registry events or you might see       > CreateFile/ReadFile/WriteFile activity. You can select to       > only see those, for example. You could ask it to include       > network packets.       >       > Click Apply.       >       > A Filter gets you down to maybe 100,000 events. Looking at timestamps       > (maybe), you can consider only a portion of the trace when scrolling       > through it. Otherwise, a 20 minute trace might be too big to analyze.       >       > It's a simple tool, but it relies on your cleverness to design filters       > to get the most value from it.       >       > You can save a trace as a PML file (ticking the boxes so the *whole*       > trace is saved). Then, you can open that file any time you feel up       > to it, for a bash at the filtering and analysis. During the run, all       > the Process Names are recorded. What it does not record, is if       > you do "tasklist /svc" in a terminal, that maps PID to a service       > such a "wuauserv", and collecting this info to go with a tracing       > activity, helps you later understand when "some PID starts doing stuff".       > Using the captured tasklist output, you have a handy reference       > as to "what PID 1234 is" in the trace.       >       > Paul              I am writing that down. Thank you!              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca