Saturday, March 23, 2024

Conquering Windows 7 Automatic Updates: A Step-by-Step Guide

Conquering Windows 7 Automatic Updates:

A Step-by-Step Guide




welcome back! Today's mission: reviving automatic updates in Windows 7. We'll be using a clean Windows 7 Pro with Service Pack 1 as our test system.

First, let's see the problem. We try checking for updates, but... cue dramatic music ...an error message! Apparently, to get started, we need Internet Explorer (ugh) to download Chrome (phew, saved by the modern browser!). But hey, if you're already rocking Chrome, skip that step entirely.

Preparing the Groundwork

Now that Internet Explorer has served its (questionable) purpose, let's grab the Root Certificates Update for Chrome. This little guy is crucial, as it lays the foundation for installing the Servicing Stack Update (SSU) – the essential component managing Windows Update installations. Once the Root Certificates Update is in place, we can hunt down the SSU for Windows 7.

Understanding the Heroes: Servicing Stack Update & Update Agent

The SSU, as mentioned, is the behind-the-scenes hero, ensuring smooth update installations. The Windows Update Agent, on the other hand, is the detective on the case. It verifies what operating system you have and which updates it needs, making sure you don't get bombarded with irrelevant patches.

Restoring Communication & Speeding Things Up

By installing the updated Windows Update Agent, we re-establish communication with the update server. However, the initial update check might take forever. To avoid this frustration, we'll enlist the help of the Windows 7 Update Rollup.

This update rollup, released in 2016, is a game-changer. Instead of individually checking years' worth of updates, the Update Agent can rely on this all-in-one package, significantly speeding things up.

The Final Touches: SHA-2 and Servicing Stack Update

Next up, we need the SHA-2 Code Signing Support Update (released in 2019). This ensures compatibility with Microsoft's security protocols, which are essential for automatic updates.

Finally, we reach the third and final Servicing Stack Update. Phew! With all these updates in place, head back to Windows Update and check for updates. In our test system, this process took a reasonable amount of time, and voila! We have a whopping 169 updates waiting to be installed.

Mission Accomplished (and a Big Thank You!)

By following these steps, we've successfully revived automatic updates in Windows 7. A huge thank you to all my patrons for your support! It truly makes these adventures possible. And of course, thanks to everyone for stopping by. See you on the next video!

Friday, March 22, 2024

Avast: From Antivirus Champion to Privacy Culprit?

Avast: From Antivirus Champion to Privacy Culprit?


Avast, a company synonymous with cybersecurity for millions, faces a tarnished reputation in the wake of a major data privacy scandal. This blog post delves into the history of what transpired, Avast's response and software updates, and the significant fines imposed by the Federal Trade Commission (FTC).

A Deeper Dive: How Avast Allegedly Misled Users

Avast's claim to fame was its role as a digital guardian. Users worldwide downloaded their antivirus software and browser extensions, trusting them to be a shield against online threats. This trust, however, was demonstrably broken according to the FTC's investigation. Let's dissect the key aspects of Avast's alleged data mishandling:

  • The Jumpshot Facade: In 2014, Avast acquired a subsidiary called Jumpshot. While marketed as an analytics firm, Jumpshot allegedly served a different purpose. The FTC alleges that Avast used Jumpshot as a conduit to collect vast amounts of user browsing data. This data wasn't limited to simple browsing history; it reportedly included highly sensitive details that paint a detailed picture of a user's online life.


  • The Scope of Collected Data: The most concerning aspect of the data collection was its breadth. It allegedly encompassed:

    • Health Concerns: Website visits related to specific illnesses, medications, or medical procedures could be incredibly sensitive and reveal private health information.

    • Religious Beliefs: Visits to religious websites or forums could expose a user's religious affiliation, which can be a matter of personal privacy.

    • Political Leanings: Browsing history could potentially reveal political stances based on visited news sites or social media platforms.

    • Adult Content: Information about a user's adult entertainment preferences is highly personal and could be misused for targeted advertising or even blackmail.

  • Post settings Labels No matching suggestions Published on 3/20/24 6:00 AM Permalink Location Options Post: Edit

Wednesday, March 20, 2024

The Silent Saboteur: How Dust Can Destroy Your PC (and How to Fight Back)

The Silent Saboteur: How Dust Can Destroy Your PC 

(and How to Fight Back)

The whirring of fans, the soft glow of the monitor – for many, their PC is a trusted companion, a gateway to work, entertainment, and connection. But lurking within its metallic shell is a silent saboteur: dust. This seemingly innocuous enemy can wreak havoc on your computer's performance, stability, and even lifespan.

In this comprehensive guide, we'll delve into the dangers of dust buildup in your PC. We'll explore the technical reasons behind these dangers, the warning signs to watch out for, and most importantly, equip you with the knowledge and tools to combat this insidious threat.

The Insidious Threat: How Dust Impacts Your PC

Dust is a complex mix of organic and inorganic particles – dead skin cells, hair, fabric fibers, and even microscopic minerals. While it may seem harmless, inside your PC, dust becomes a significant threat due to its impact on two key factors: airflow and electrical conductivity.

1. Airflow Obstruction: Your PC relies on efficient airflow to dissipate heat generated by hardworking components like the CPU and GPU. Dust acts like a tiny, fluffy blanket, accumulating on fans, heatsinks, and vents. This hinders the fans' ability to draw in cool air and expel hot air, leading to a stifling internal environment.

Technical Explanation: Heat transfer relies on the principle of convection. Hot air, being less dense, rises, while cool air sinks. Fans in your PC facilitate this process by forcing cool air over heated components. Dust buildup disrupts this convection by creating an insulating layer, hindering the movement of air and trapping heat.

Imagine trying to run a marathon while wearing a thick winter coat – that's essentially what your PC components experience under heavy dust buildup.

2. Electrical Conductivity: Dust particles can hold a static charge, and as they accumulate on electrical components like circuit boards, they increase the risk of short circuits. When a stray current jumps between components due to dust-induced conductivity, it can damage delicate electronic circuitry.

Technical Explanation: Electrostatic discharge (ESD) occurs when there's a rapid transfer of electrical charge between two objects at different potentials. Dust particles, especially those containing conductive materials like metal shavings, can act as bridges for ESD events, causing damage to sensitive electronic components.

In essence, dust turns your PC into a ticking time bomb, waiting for the inevitable overheating or electrical mishap.

The Warning Signs: How to Know Your PC is Drowning in Dust

Before your PC succumbs to the dust monster, it might try to send you distress signals. Here are some key warnings to watch out for:

  • Increased Fan Noise: Dust-clogged fans have to work harder to circulate air, resulting in a noticeable increase in fan noise. This is often the first and most obvious sign of a dust buildup problem.
  • Performance Issues: Overheating components due to dust buildup can lead to performance throttling. This manifests as sluggishness, lagging, and unexpected system crashes or reboots.
  • Random Shutdowns: If your PC suddenly shuts down, especially during demanding tasks like gaming or video editing, it could be a sign of overheating caused by dust accumulation.
  • Frequent Blue Screens: The infamous blue screen of death (BSOD) can have various causes, but overheating due to dust buildup is a significant one.

If you experience any of these warning signs, it's time to take action and clean your PC!

The Cavalry Arrives: How to Dust Out Your PC Like a Pro

Before you begin, a crucial disclaimer: Dusting your PC requires careful handling. Opening your computer case and tinkering with components can be daunting for some. If you're uncomfortable doing it yourself, consider seeking professional help from a computer technician.

For the brave souls ready to tackle the dust bunny menace, here's your battle plan:

Tools of the Trade:

  • Compressed air can (dust-free!)
  • Microfiber cloth
  • Can of compressed air for electronics (optional)
  • Small, soft paintbrush (optional)
  • Phillips head screwdriver
  • Flashlight (optional)

Step 1: Power Down and Unplug

Safety first! Completely shut down your PC and unplug it from the power source. Remove all peripheral devices like external hard drives and printers.

Step 2: Prepare the Battlefield

Work in a clean, well-lit area with ample space. Place your PC on a flat surface covered with a clean towel to prevent scratches.

Step 3: Breaching the Walls (Opening the Case)

Most PC cases have side panels secured with screws. Locate the screws, consult your PC's manual if needed, and carefully remove the side panel to expose the internal components.

Step 4: The Air Cavalry - Banishing Dust with Compressed Air

Now comes the fun part (well, maybe not fun, but definitely satisfying): wielding the compressed air can to vanquish the dust bunnies. Here's how to do it effectively:

Hold the can upright: This ensures you're not spraying any liquid propellant, which can damage electronics. 

Work from top to bottom: Start by aiming the compressed air nozzle at the top vents and exhaust fans of your case. Blast short bursts of air to dislodge dust. 

Focus on critical areas: Pay special attention to the CPU heatsink and fan, the GPU heatsink and fans, and any other areas with visible dust buildup. Use short bursts here as well, and avoid spinning the fans with the air pressure.

Work your way inside: Once you've tackled the exterior vents and fans, carefully aim the compressed air can inside the case. Target dust buildup on the RAM modules, expansion slots, and other components. 

Mind your pressure: Don't hold the nozzle too close to components, as the strong air pressure can dislodge delicate components or spin fan blades too rapidly, potentially damaging them.

Step 5: Wiping Away the Remnants

Compressed air may not dislodge all the dust. Use your microfiber cloth to gently wipe down surfaces and remove any remaining dust particles. Be especially careful around delicate components like the CPU and graphics card.

Optional Steps:

For stubborn dust: If you encounter particularly stubborn dust buildup, especially in crevices, a small, soft paintbrush can be helpful for dislodging it before wiping with the microfiber cloth.

Cleaning the Case: While the case is open, you can take the opportunity to wipe it down with a damp (not dripping) microfiber cloth to remove dust and grime from the exterior.

Step 6: Reassembly and Power Up

Once you're confident you've removed most of the dust, carefully reassemble your PC. Ensure all cables are securely connected and the case panels are properly fastened with the screws. Plug your PC back in and power it on.

Step 7: The Victory Lap (and Monitoring)

Take a moment to appreciate your handiwork! Your PC should now be noticeably quieter and run cooler, potentially leading to improved performance and stability. 

However, the battle against dust is an ongoing one. It's recommended to dust your PC every 3-6 months, depending on your environment. Keep an eye out for the warning signs mentioned earlier, and dust your PC more frequently if needed, especially in dusty environments.

Preventing the Dustpocalypse: Keeping Your PC Clean 

Here are some proactive steps you can take to minimize dust buildup in your PC:

Keep your environment clean: Regularly vacuum and dust the area around your PC to prevent dust from settling inside.

Invest in good airflow: Ensure your PC case has adequate ventilation and consider adding extra case fans if necessary. 

Consider dust filters: Many PC cases come with removable dust filters on the intake vents. Clean these filters regularly with compressed air or water (depending on the filter type).

Positive air pressure: Configure your case fans to create positive air pressure. This means having more intake fans than exhaust fans, creating a slight positive pressure inside the case that helps prevent dust from entering in the first place.

By following these tips and regularly cleaning your PC, you can keep the dust bunnies at bay and ensure your PC runs smoothly for years to come. Remember, a clean PC is a happy PC (and a happy you!).

Avast: From Antivirus Champion to Privacy Culprit?

Avast: From Antivirus Champion to Privacy Culprit?

Avast, a company synonymous with cybersecurity for millions, faces a tarnished reputation in the wake of a major data privacy scandal. This blog post delves into the history of what transpired, Avast's response and software updates, and the significant fines imposed by the Federal Trade Commission (FTC).

A Deeper Dive: How Avast Allegedly Misled Users

Avast's claim to fame was its role as a digital guardian. Users worldwide downloaded their antivirus software and browser extensions, trusting them to be a shield against online threats. This trust, however, was demonstrably broken according to the FTC's investigation. Let's dissect the key aspects of Avast's alleged data mishandling:

  • The Jumpshot Facade: In 2014, Avast acquired a subsidiary called Jumpshot. While marketed as an analytics firm, Jumpshot allegedly served a different purpose. The FTC alleges that Avast used Jumpshot as a conduit to collect vast amounts of user browsing data. This data wasn't limited to simple browsing history; it reportedly included highly sensitive details that paint a detailed picture of a user's online life.

  • The Scope of Collected Data: The most concerning aspect of the data collection was its breadth. It allegedly encompassed:

    • Health Concerns: Website visits related to specific illnesses, medications, or medical procedures could be incredibly sensitive and reveal private health information.
    • Religious Beliefs: Visits to religious websites or forums could expose a user's religious affiliation, which can be a matter of personal privacy.
    • Political Leanings: Browsing history could potentially reveal political stances based on visited news sites or social media platforms.
    • Adult Content: Information about a user's adult entertainment preferences is highly personal and could be misused for targeted advertising or even blackmail.
  • Deception by Design? The FTC's core accusation hinges on Avast's alleged lack of transparency. Here's how it potentially unfolded:

    • Privacy Policy Obfuscation: The FTC claims Avast's privacy policy, the document supposed to inform users about data collection practices, may have been deliberately confusing or misleading. This lack of clarity could have made it difficult for users to understand the extent to which their data was being collected and used.
    • Silence on Jumpshot: Allegedly, Avast failed to disclose the existence of Jumpshot or its role in data collection. This lack of transparency further amplified the feeling of being misled.

The alleged "bait-and-switch" tactic, as the FTC phrased it, paints a concerning picture. Avast positioned itself as a privacy protector, only to allegedly engage in practices that directly contradicted that promise. This betrayal of trust is at the heart of the scandal and the reason millions of users feel their online privacy was compromised.

Avast's Response and Software Updates: Damage Control or Genuine Reform?

Following the FTC's accusations, Avast scrambled to contain the damage. The company issued a public statement acknowledging the investigation and expressing regret for past practices. They assured users that Jumpshot, the subsidiary responsible for data collection, had been shut down permanently.

Avast also promised a series of software updates aimed at regaining user trust. These updates included:

  • Enhanced privacy controls: Users were given more granular options to manage what data Avast collects and how it's used.
  • Clearer and more concise privacy policy: The policy was rewritten to be easier to understand and transparent about data collection practices.
  • Opt-in for data sharing: Users were explicitly asked to consent to data sharing, ensuring they were aware of how their information was being used.

However, some critics remain skeptical. They argue that these updates are merely a band-aid solution and fail to address the core issue of Avast's business model, which may still rely on monetizing user data in less transparent ways.

The FTC Flexes its Muscle: A Hefty Fine Sets a Precedent

The FTC's decision to fine Avast a significant $16.5 million sent a strong message to the tech industry. It demonstrates the agency's growing focus on data privacy and its willingness to hold companies accountable for deceptive practices.

The fine not only punishes Avast for past transgressions but also sets a precedent for other companies that may be tempted to prioritize profits over user privacy.

The Road Ahead: Can Avast Regain User Trust?

Avast faces an uphill battle in rebuilding user trust. Regaining consumer confidence requires more than just updated software and public statements. Here are some key steps Avast could take:

  • Independent audits: Regular, independent audits of Avast's data collection practices can demonstrate transparency and accountability.
  • Stronger privacy by design: Avast needs to prioritize user privacy throughout the software development lifecycle.
  • Increased user education: Educating users about data privacy and empowering them to manage their information is crucial.

The outcome of Avast's journey will be closely watched by the tech industry as a whole. Can a company regain user trust after a major privacy breach? Only time will tell if Avast's actions speak louder than their past mistakes.

Saturday, January 13, 2024

Collection of Windows 3.x Websites

Dust Off Your Floppies: Your One-Stop Shop for Reliving (and Reviving) Windows 3.x Magic

Remember the satisfying "thunk" of a floppy disk, the hypnotic glow of the green phosphor screen, and the endless tinkering in DOS prompts? Whether you're a seasoned techie yearning for simpler times, a professional wrestling with legacy systems, or just a curious newcomer drawn to the charm of retro computing, prepare to dive headfirst into the glorious world of Windows 3.x!

Forget spending hours scouring forgotten corners of the internet. This curated collection is your ultimate portal to a treasure trove of resources, ready to reignite your nostalgia, rescue you from legacy system headaches, and introduce a new generation to the software that shaped computing history.

From brain-bending games that tested your mettle to utilities that squeezed every byte of performance from your 386, and productivity tools that laid the groundwork for modern software giants. So, grab your mouse with its delightful two buttons, settle in for a journey down memory lane, and prepare to be amazed by the ingenuity and innovation that brought computers to the masses.

This is a running list of websites that have software, patches, and documentation for Windows 3.x and related software.

Microsoft Software Library Mirror (conradshome.com)

Excerpts from The Microsoft Software Library

This archive contains a mirror of The Microsoft Software Library contents dated 10 October 1991 through 12 August 1998.

Windows 3.1 | 3.11 | WFWG | Resources | Downloads (conradshome.com) 

A collection of drivers for Windows 3.x

Completely FREE Software - Windows & DOS freeware

The CFS site has links to many, many thousands of completely free – and legal – Windows and DOS programs. We have access to archives dating back to the early 1980s!

All listed freeware is freely available to all visitors, as are all our exclusive program reviews. Over 2,600 programs are downloadable from this site. Many of those programs are not available through any other Website.

My Windows Page | Windows 3.1, 95, 98 & ME Abandonware & Freeware 

A small collection of various utilities for Windows 3.x

Networking software for DOS and Windows 3.x (dds.nl)

You want to access files and/or printers located on other machines on the network, but you are using DOS. You might also have Windows 3.x (the "regular" one, not Windows for Workgroups because if you have WfW you're better off using its TCP/IP stack). Does that mean you are out of luck? Fortunately, no. There are several software packages which allow you to connect to SMB/NetBIOS servers such as Samba, Windows NT, Windows 95, Windows for Workgroups, Warp 4/Connect, Warp Server etc. etc.

The Programmer's Corner » Windows 3.X Files (pcorner.com)

A treasure trove of all manner of software for Winnows 3.x including same games.

Windows 3.x (System) | VETUSWARE.COM

"the biggest free abandonware collection in the universe"

Windows 3.1x Software (gaby.de) 

Utilities, Extensions, Patches and Fixes, Multimedia Applications. All Software on this site is, if not stated otherwise, Freeware.

Software Library: Windows 3.x Games - Internet Archive 

A wide and varied collection of Shareware programs for the Windows 3.0/3.1/3.1.1 systems of the early 1990s. Many are written in visual Basic

Windows 3.1: Best Software Selections - United & Co (unitedandco.net)

Windows 3.1 is one of the most popular graphical interfaces for DOS, but what is the right software for you?Here you can look at various software tested and shown in working order, what they offer and the things we came across along the way.

Software Collections - Windows 3.x (centrin.net.id)

A collection of mostly networking and Internet connectivity software

Bertola FTP: Utilities for Windows 3.x

a small collection of various utilities for windows 3.x

Directory of drivers/video (steptail.com)

A collection of Video Card drivers for Windows 3.x

[DaveCentral] - welcome to DaveCentral, Software Archive

A relic of the past preserved by the internet archive! Dave Central has "loads of shareware, freeware and demos

Classic - Windows 3.x Software (archive.org) 

"Tucows is a leading distributor of e-business services and applications on the Internet. With a network of more than 5,000 Managed Service Providers (Internet Service Providers, Web hosting companies, Domain Name Resellers and others) in more than 100 countries around the world, we believe Tucows is the largest network of its kind.

The Tucows site offers over 30,000 software titles in libraries located around the world, providing users with a fast local download."

Welcome to WinSite! 

With the continuing support of the shareware, freeware developer community, we present an amazing array of software. Games, utilities. Things that make your printer print better, and tools and utilities to help you computer better. Our collection is carefully selected. Checked for viruses. Approved by humans, for the use of humans. Note: The site is a bit difficult to navigate but it still hosts software for Windows 3.x

Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer Software (archive.org)

Another large collection of shareware categorized, with descriptions.

Wednesday, November 30, 2022

Windows 3.x Driver and Utility Collection for VMWare and Virtualbox

This disc image is a collection of drivers and utilities needed for MS-DOS and Windows 3.x formerly called 31pack.iso

File Manifest:

C:.
├───AMDPCNET
│ ├───DOS
│ │ License.txt
│ │ oemsetup.inf
│ │ pcntnd.dos
│ │
│ └───WFW311
│ License.txt
│ oemsetup.inf
│ pcntn3.386
│ pcntnd.dos
│ pcntnd.nif
│ protocol.ini
├───CDROM
│ CDROM.SYS
│ INSTALL.EXE
│ README.TXT
├───DOSIDLE
│ ├───V0200
│ │ DOSIDLE.EXE
│ │ DOSIDLE.TXT
│ │ FILE_ID.DIZ
│ │ WHATSNEW.TXT
│ │
│ └───V0210
│ DOSIDLE.ASM
│ DOSIDLE.EXE
│ DOSIDLE.TXT
│ FILE_ID.DIZ
│ WHATSNEW.TXT
├───EUROFONT
│ 8514FIX.FON
│ 8514SYS.FON
│ COURE.FON
│ COURF.FON
│ SERIFE.FON
│ SERIFF.FON
│ SMALLE.FON
│ SMALLF.FON
│ VGAFIX.FON
│ VGASYS.FON
├───EURO_DEU
│ ARIAL.TTF
│ ARIALBD.TTF
│ ARIALBI.TTF
│ ARIALI.TTF
│ COUR.TTF
│ COURBD.TTF
│ COURBI.TTF
│ COURI.TTF
│ EURO_GDI.EXE
│ IS_DOS.EXE
│ KBDBE.DLL
│ KBDDA.DLL
│ KBDFI.DLL
│ KBDFR.DLL
│ KBDGR.DLL
│ KBDIC.DLL
│ KBDIT.DLL
│ KBDNE.DLL
│ KBDNO.DLL
│ KBDPO.DLL
│ KBDSF.DLL
│ KBDSG.DLL
│ KBDSP.DLL
│ KBDSW.DLL
│ KBDUK.DLL
│ LICENSE.TXT
│ README.TXT
│ README.WRI
│ SSERIFE.FON
│ SSERIFF.FON
│ TIMES.TTF
│ TIMESBD.TTF
│ TIMESBI.TTF
│ TIMESI.TTF
│ W31_EURO.BAT
├───MSCDEX
│ MSCDEX.EXE
│ README.TXT
├───MSCLIENT
│ ADDNAME.EX_
│ AM2100.DO_
│ AVEXTRA.TXT
│ COMDEV.IN_
│ DEPCA.DO_
│ DNR.EX_
│ E20ND.DO_
│ E21ND.DO_
│ ELNK.DO_
│ ELNK16.DO_
│ ELNK3.DO_
│ ELNKII.DO_
│ ELNKMC.DO_
│ ELNKPL.DO_
│ EMSBFR.EX_
│ EXP16.DO_
│ EXPAND.EXE
│ HOSTS
│ I82593.DO_
│ IBMTOK.DO_
│ IFSHLP.SY_
│ IPCONFIG.EX_
│ LICENSE.TXT
│ LM21DRV.UP_
│ LMHOSTS
│ MSDLC.EX_
│ NDIS39XR.DO_
│ NDISHLP.SY_
│ NE1000.DO_
│ NE2000.DO_
│ NEMM.DO_
│ NET.EX_
│ NET.MS_
│ NETBIND.COM
│ NETH.MS_
│ NETWORKS
│ NI6510.DO_
│ NMTSR.EX_
│ NWLINK.EXE
│ OEMDLC.INF
│ OEMODI.IN_
│ OEMRAS.IN_
│ OEMTCPIP.INF
│ OLITOK.DO_
│ PE2NDIS.DO_
│ PENDIS.DO_
│ PING.EX_
│ PRO4.DO_
│ PRORAPM.DW_
│ PROTMAN.DO_
│ PROTMAN.EX_
│ PROTOCOL
│ RASCOPY.BA_
│ README.TXT
│ SERVICES
│ SETUP.EXE
│ SMCMAC.DO_
│ SMC_ARC.DO_
│ SOCKETS.EX_
│ STRN.DO_
│ TCPDRV.DO_
│ TCPTSR.EX_
│ TCPUTILS.INI
│ TINYRFC.EX_
│ TLNK.DO_
│ UMB.CO_
│ VBAPI.386
│ VSOCKETS.386
│ WCNET.INF
│ WCSETUP.INF
│ WCSYS.INI
│ WINSOCK.DL_
│ WIN_SOCK.DL_
│ WORKGRP.SY_
│ WSAHDAPP.EX_
│ WSOCKETS.DL_
├───SB16
│ AWEDRV.PVL
│ CSP.PVL
│ CT3DSE.PVL
│ DISK.ID
│ DRIVER.PVL
│ FILE_ID.DIZ
│ INSTALL.EXE
│ INSTALL.PVL
│ LICENSE.TXT
│ PROGRAM.PVL
│ README.COM
│ README.TXT
│ SB16DRV.PVL
│ WINAPPL.PVL
│ WINDRV.PVL
├───TCP32B
│ ARP.EXE
│ FTP.EXE
│ HOSTS.SAM
│ IPCONFIG.EXE
│ LICENSE.TXT
│ LMHOSTS.SAM
│ MSTCP32.DEF
│ MTCPIP32.HLP
│ NBTSTAT.EXE
│ NETSTAT.EXE
│ NETWORKS
│ OEMSETUP.INF
│ PING.EXE
│ PROTOCOL
│ README.TXT
│ ROUTE.EXE
│ SERVICES
│ TCP32UI.DLL
│ TELNET.EXE
│ TELNET.HLP
│ TRACERT.EXE
│ VDHCP.386
│ VIP.386
│ VNBT.386
│ VTCP.386
│ VTDI.386
│ VUDP.386
│ WINSOCK.DLL
│ WSASRV.EXE
│ WSOCK.386
│ WSTCP.386
├───VGAPATCH
│ vgapatch.com
│ vgapatch.txt
│ vgapatchj.txt
├───WFWY2KDE
│ INSTALL.BAT
│ README.TXT
│ WINFILE.Y2K
├───WFWY2KUP
│ INSTALL.BAT
│ README.TXT
│ WINFILE.Y2K
└───WQGHLT
GPL.TXT
README.TXT
WQGHLT
WQGHLT.386
WQGHLT.ASM
WQGHLT.DEF
WQGHLT.LNK
WQGHLT.MAP
WQGHLT.OBJ
WQGHLT.SYM