Remko Weijnen's Blog (Remko's Blog)

About Virtualization, VDI, SBC, Application Compatibility and anything else I feel like


14,691 views

XDSXDS is an electronic differential lock, which was developed for the Golf GTI. But later on it was introduced as an option for other cars.

XDS is an advanced electronic differential lock, linked to the ESP system.

In moments of fast cornering XDS gives out exactly the right amount of power, providing pressure on the inside wheel to prevent wheel spinning. The result is better traction and a reduction of any tendency to under steer.

Golf mk6
On the Golf mk 6 it’s possible to activate XDS with VCDS by going to control module 03, ABS Brakes, then 10, Adaptation.

Channel 36 controls XDS which can be set to:

0 – default
1 – weak
2 – strong

Skoda Octavia II
It’s also possible on other cars, for instance the Skoda Octavia II where it can be coded in module 03, ABS Brakes, 07 Long Coding, Byte 17, Bit 3.

Passat B7
I wanted to know how to activate this on a Passat B7, but searching with google returned nothing.

Read the rest of this entry »

  • 3 Comments
  • Filed under: Automotive
  • 2,870 views

    The Dell vWorkspace (previously Quest vWorkspace) Client can save a connection to a .pit file which is very similar to an .rdp file with one big difference: it is encrypted!

    I am not sure why Dell/Quest have chosen to encrypt their files but a while ago I needed to know what was in a particular pit file so I could troubleshoot an issue.

    I first created a test .pit file with the client (pntsc.exe version 7.6.305.791).

    SNAGHTML6c0786d

    Read the rest of this entry »

  • 1 Comment
  • Filed under: Quest
  • 3,346 views

    For an upcoming blog post I needed to decrypt some data using the rc4 algorithm. I wanted to do this with PowerShell but sadly PowerShell and the .NET framework have no functions for it.

    File:RC4.svg

    So I needed to implement it (download at the bottom of the post):

    Read the rest of this entry »

  • 1 Comment
  • Filed under: PowerShell
  • 13,815 views

    For an upcoming Blog post I needed to convert a Byte Array to a Hex string in PowerShell and vice versa.

    PowerShell doesn’t come with HexToBin or BinToHex functions so here’s my attempt at it:

    Read the rest of this entry »

  • 1 Comment
  • Filed under: PowerShell
  • 2,142 views

    A while ago I published a tool to Encode and Decode Citrix passwords. Today I am publishing a small update to this tool that makes it scriptable by adding a COM interface.

    If you start the tool without parameters you will get the GUI, just like before:

    Encrypt | Decrypt Password | Hash | Citrix | Ctx1

    To use the COM interface you first need to register the executable with the /regserver switch:

    CtxPass /RegServer

    After the registration you can call it using any language that supports COM. To get you started I wrote a few examples

    Read the rest of this entry »

    2,567 views

    When starting a particular web based application Java popped up the following dialog:

    Java has discovered application components that could indicate a security concern

    The dialog asks us if we want to Block potentially unsafe components so to continue we should click no. However users tend to not really read such messages and click Yes which leads to this error:

    Error connecting to Central Configuration

    Read the rest of this entry »

  • 5 Comments
  • Filed under: Java
  • 4,012 views

    Yesterday I wrote about troubleshooting an application that used Com Port redirection in Citrix.

    During the troubleshoot I noticed that the application used an ActiveX component, MSCOMM32.OCX, for serial communication.

    I wanted to quickly test if the component was correctly registered so I searched the registry from HKEY_CLASSES_ROOT for mscomm32.ocx.

    Read the rest of this entry »

    4,547 views

    I write most of my code in unmanaged languages such as Delphi and C/C++. Sometimes customers ask me to interface my code to their .net code in which case I create a dll for them.

    A recurring thing is that I need to return string to .net.

    There are many ways to do this of course but in all cases we need to manage memory: who will allocate the memory for the string and who is responsible for freeing it?

    Read the rest of this entry »

  • 3 Comments
  • Filed under: .NET, C#, C++, Delphi
  • 7,539 views

    SecutestOne of my colleagues asked me to assist in troubleshooting an application called SmartWare FM running on Citrix XenApp.

    This application reads data from an external device called SECUTEST.

    The device is connected to a COM port which is redirected to the XenApp session. In contrast to Microsoft Remote Desktop Services COM ports are not automatically redirected in XenApp but need to be mapped via eg a logonscript (NET USE COM1: \\Client\COM1:) or using UEM.

    In my case the COM port was mapped with RES Workspace Manager:

    image

    Read the rest of this entry »

    2,055 views

    I was troubleshooting an unattended installation of a particular application. The install seemed to hang right away so I figured it was presenting some kind of message (error?).

    Using a Window Spy tool I made the setup process visible and saw the following message:

    image

    The unattended install was supplied by the vendor and apparently they use InstallAware.

    The setup tries to create a Tray Icon, probably a setup progress indicator, but this fails because there is no shell running (the installation is pushed from a deployment server).

    Read the rest of this entry »

    Blogroll


    Categories


    Archives