Quantcast
Channel: Intel Communities : All Content - General Questions
Viewing all articles
Browse latest Browse all 6470

What are: hexnamed exes in \Windows\Installer\{C1DD4078-51FD-42...etc}\

$
0
0

While examining icon choices for my WiDiApp's Properties in Win7Pro64, [Change Icon] presents a Look In: (%SystemRoot%\Installer\{C1DD4078-51FD-42CC-91DA-AD4369D5F973}\xxx.exe

in a directory that contains 4 differently named exe's with hex (Registry-style) components in their names, and running fc /b in the CLI (cmd.exe) shows they are bit-identical!

On my computer their names happen to be "NewShortcut"(sequential eg 1,2,3 etc.)(hex-number).exe.

 

Why does this operate differently from the conventional manner of showing a program's exe's icon(s) and offering a look-in showing the exe's installed \location\name, which I am calling a "conventional manner" because in decades of playing with Windows and some Linux OSes, I have never before seen this.

Seems like a resource hog to me: 216KB for each, and I only installed ONE instance of Intel WiDi (which works beautifully for me). Why four bit-identical216KB exes used apparently just to create "New Shortcuts?"

 

Does anyone on any forum know how this stuff actually works?

Does anyone know why the departure from conventional programming?

 

I broadcast my ignorance. I don't believe the only proper way to understand this stuff is to be a programmer, nor should it be: that is the thinking that was in force during the so-called Middle Ages in Europe and Britain, when it got you killed to demonstrate skill and knowledge without membership in the relevant Guild. Kind of, and sometimes exactly, like today's unions.

 

We have cars being taken remote control of via Internet hacking. We have massive instances of people being pwned by Routers and PC BIOSes and Phones being hacked at the firmware level, and the persons' data held ransom, and their identities being stolen, and governments going blah blah blah instead of people learning and using awareness and understanding to at least resist, and harden themselves to attack if not counterattack (which I would if I could by every means possible).

 

So to me it is relevant, WTF is going on with this departure from conventional programming. What OTHER programs function similarly?

And if we ever do get an explanation (that may be never, I understand that much) how do we respond to it?

For the old folks: Hey, "Alfie, what's it --- -----?"

 


Viewing all articles
Browse latest Browse all 6470

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>