Remko Weijnen's Blog (Remko's Blog)

About Virtualization, VDI, SBC, Application Compatibility and anything else I feel like


1,846 views

The Dell vWorkspace (previously Quest vWorkspace) Client can save a connection to a .pit file which is very similar to an .rdp file with one big difference: it is encrypted!

I am not sure why Dell/Quest have chosen to encrypt their files but a while ago I needed to know what was in a particular pit file so I could troubleshoot an issue.

I first created a test .pit file with the client (pntsc.exe version 7.6.305.791).

SNAGHTML6c0786d

Read the rest of this entry »

  • 1 Comment
  • Filed under: Quest
  • 1,247 views

    For an upcoming blog post I needed to decrypt some data using the rc4 algorithm. I wanted to do this with PowerShell but sadly PowerShell and the .NET framework have no functions for it.

    File:RC4.svg

    So I needed to implement it (download at the bottom of the post):

    Read the rest of this entry »

  • 1 Comment
  • Filed under: PowerShell
  • 5,948 views

    For an upcoming Blog post I needed to convert a Byte Array to a Hex string in PowerShell and vice versa.

    PowerShell doesn’t come with HexToBin or BinToHex functions so here’s my attempt at it:

    Read the rest of this entry »

  • 1 Comment
  • Filed under: PowerShell
  • 1,640 views

    A while ago I published a tool to Encode and Decode Citrix passwords. Today I am publishing a small update to this tool that makes it scriptable by adding a COM interface.

    If you start the tool without parameters you will get the GUI, just like before:

    Encrypt | Decrypt Password | Hash | Citrix | Ctx1

    To use the COM interface you first need to register the executable with the /regserver switch:

    CtxPass /RegServer

    After the registration you can call it using any language that supports COM. To get you started I wrote a few examples

    Read the rest of this entry »

    2,030 views

    When starting a particular web based application Java popped up the following dialog:

    Java has discovered application components that could indicate a security concern

    The dialog asks us if we want to Block potentially unsafe components so to continue we should click no. However users tend to not really read such messages and click Yes which leads to this error:

    Error connecting to Central Configuration

    Read the rest of this entry »

  • 5 Comments
  • Filed under: Java
  • 2,718 views

    Yesterday I wrote about troubleshooting an application that used Com Port redirection in Citrix.

    During the troubleshoot I noticed that the application used an ActiveX component, MSCOMM32.OCX, for serial communication.

    I wanted to quickly test if the component was correctly registered so I searched the registry from HKEY_CLASSES_ROOT for mscomm32.ocx.

    Read the rest of this entry »

    2,974 views

    I write most of my code in unmanaged languages such as Delphi and C/C++. Sometimes customers ask me to interface my code to their .net code in which case I create a dll for them.

    A recurring thing is that I need to return string to .net.

    There are many ways to do this of course but in all cases we need to manage memory: who will allocate the memory for the string and who is responsible for freeing it?

    Read the rest of this entry »

  • 3 Comments
  • Filed under: .NET, C#, C++, Delphi
  • 5,640 views

    SecutestOne of my colleagues asked me to assist in troubleshooting an application called SmartWare FM running on Citrix XenApp.

    This application reads data from an external device called SECUTEST.

    The device is connected to a COM port which is redirected to the XenApp session. In contrast to Microsoft Remote Desktop Services COM ports are not automatically redirected in XenApp but need to be mapped via eg a logonscript (NET USE COM1: \\Client\COM1:) or using UEM.

    In my case the COM port was mapped with RES Workspace Manager:

    image

    Read the rest of this entry »

    1,213 views

    I was troubleshooting an unattended installation of a particular application. The install seemed to hang right away so I figured it was presenting some kind of message (error?).

    Using a Window Spy tool I made the setup process visible and saw the following message:

    image

    The unattended install was supplied by the vendor and apparently they use InstallAware.

    The setup tries to create a Tray Icon, probably a setup progress indicator, but this fails because there is no shell running (the installation is pushed from a deployment server).

    Read the rest of this entry »

    767 views

    Yesterday I was asked to investigate a problem with a presentation pc. Even though the volume was set maximal there was not audio output.

    The machine was used to connect to a Citrix XenApp desktop and RES Workspace Extender was used to integrate local applications in the XenApp desktop.

    The local sound volume control was published as a subscribed application so I launched that and verified that the volume was set to Maximum:

    Volumeregeling

    I decided to launch the local explorer shell and noticed that there were two volume control icons in the Traybar:

    Volume Controls

    Read the rest of this entry »

    Donate


    Blogroll


    Categories


    Archives