$theTitle=wp_title(" - ", false); if($theTitle != "") { ?>
About Virtualization, VDI, SBC, Application Compatibility and anything else I feel like
XDS is an electronic differential lock, which was developed for the Golf GTI. But later on it was introduced as an option for other cars.
XDS is an advanced electronic differential lock, linked to the ESP system.
In moments of fast cornering XDS gives out exactly the right amount of power, providing pressure on the inside wheel to prevent wheel spinning. The result is better traction and a reduction of any tendency to under steer.
Golf mk6
On the Golf mk 6 it’s possible to activate XDS with VCDS by going to control module 03, ABS Brakes, then 10, Adaptation.
Channel 36 controls XDS which can be set to:
0 – default
1 – weak
2 – strong
Skoda Octavia II
It’s also possible on other cars, for instance the Skoda Octavia II where it can be coded in module 03, ABS Brakes, 07 Long Coding, Byte 17, Bit 3.
Passat B7
I wanted to know how to activate this on a Passat B7, but searching with google returned nothing.
The Dell vWorkspace (previously Quest vWorkspace) Client can save a connection to a .pit file which is very similar to an .rdp file with one big difference: it is encrypted!
I am not sure why Dell/Quest have chosen to encrypt their files but a while ago I needed to know what was in a particular pit file so I could troubleshoot an issue.
I first created a test .pit file with the client (pntsc.exe version 7.6.305.791).
For an upcoming blog post I needed to decrypt some data using the rc4 algorithm. I wanted to do this with PowerShell but sadly PowerShell and the .NET framework have no functions for it.
So I needed to implement it (download at the bottom of the post):
For an upcoming Blog post I needed to convert a Byte Array to a Hex string in PowerShell and vice versa.
PowerShell doesn’t come with HexToBin or BinToHex functions so here’s my attempt at it:
A while ago I published a tool to Encode and Decode Citrix passwords. Today I am publishing a small update to this tool that makes it scriptable by adding a COM interface.
If you start the tool without parameters you will get the GUI, just like before:
To use the COM interface you first need to register the executable with the /regserver switch:
After the registration you can call it using any language that supports COM. To get you started I wrote a few examples
19 Mar // php the_time('Y') ?>
When starting a particular web based application Java popped up the following dialog:
The dialog asks us if we want to Block potentially unsafe components so to continue we should click no. However users tend to not really read such messages and click Yes which leads to this error:
Yesterday I wrote about troubleshooting an application that used Com Port redirection in Citrix.
During the troubleshoot I noticed that the application used an ActiveX component, MSCOMM32.OCX, for serial communication.
I wanted to quickly test if the component was correctly registered so I searched the registry from HKEY_CLASSES_ROOT for mscomm32.ocx.
I write most of my code in unmanaged languages such as Delphi and C/C++. Sometimes customers ask me to interface my code to their .net code in which case I create a dll for them.
A recurring thing is that I need to return string to .net.
There are many ways to do this of course but in all cases we need to manage memory: who will allocate the memory for the string and who is responsible for freeing it?
One of my colleagues asked me to assist in troubleshooting an application called SmartWare FM running on Citrix XenApp.
This application reads data from an external device called SECUTEST.
The device is connected to a COM port which is redirected to the XenApp session. In contrast to Microsoft Remote Desktop Services COM ports are not automatically redirected in XenApp but need to be mapped via eg a logonscript (NET USE COM1: \\Client\COM1:) or using UEM.
In my case the COM port was mapped with RES Workspace Manager:
19 Feb // php the_time('Y') ?>
I was troubleshooting an unattended installation of a particular application. The install seemed to hang right away so I figured it was presenting some kind of message (error?).
Using a Window Spy tool I made the setup process visible and saw the following message:
The unattended install was supplied by the vendor and apparently they use InstallAware.
The setup tries to create a Tray Icon, probably a setup progress indicator, but this fails because there is no shell running (the installation is pushed from a deployment server).