Skip to content

Commit

Permalink
Merge pull request MicrosoftDocs#351 from MicrosoftDocs/master
Browse files Browse the repository at this point in the history
Deployment for Feb 2021 publish
  • Loading branch information
lukekim authored Feb 23, 2021
2 parents 8f4f824 + e705e9c commit 06334f7
Show file tree
Hide file tree
Showing 5 changed files with 50 additions and 41 deletions.
10 changes: 5 additions & 5 deletions sysinternals/downloads/coreinfo.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,15 +4,15 @@ title: Coreinfo
description: Coreinfo is a command-line utility that shows you the mapping between logical processors and the physical processor.
ms:assetid: 'c5e117b5-d674-4409-914d-17bcac43f1fd'
ms:mtpsurl: 'https://technet.microsoft.com/Cc835722(v=MSDN.10)'
ms.date: 04/28/2020
ms.date: 02/22/2021
---
# Coreinfo v3.5
# Coreinfo v3.52

**By Mark Russinovich**

Published: April 28, 2020
Published: February 22, 2021

[![Download](/media/landing/sysinternals/Download_sm.png)](https://download.sysinternals.com/files/Coreinfo.zip) [**Download Coreinfo**](https://download.sysinternals.com/files/Coreinfo.zip) **(367 KB)**
[![Download](/media/landing/sysinternals/Download_sm.png)](https://download.sysinternals.com/files/Coreinfo.zip) [**Download Coreinfo**](https://download.sysinternals.com/files/Coreinfo.zip) **(370 KB)**

## Introduction

Expand Down Expand Up @@ -163,4 +163,4 @@ Logical Processor to Group Map:
**** Group 0
```

[![Download](/media/landing/sysinternals/Download_sm.png)](https://download.sysinternals.com/files/Coreinfo.zip) [**Download Coreinfo**](https://download.sysinternals.com/files/Coreinfo.zip) **(367 KB)**
[![Download](/media/landing/sysinternals/Download_sm.png)](https://download.sysinternals.com/files/Coreinfo.zip) [**Download Coreinfo**](https://download.sysinternals.com/files/Coreinfo.zip) **(370 KB)**
48 changes: 26 additions & 22 deletions sysinternals/downloads/psexec.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,7 @@ psexec [\\computer[,computer2[,...] | @file]][-u user [-p psswd][-n s][-r servic
| **-d** | Don't wait for process to terminate (non-interactive). |
| **-e** | Does not load the specified account’s profile. |
| **-f** | Copy the specified program even if the file already exists on the remote system. |
| **-i** | Run the program so that it interacts with the desktop of the specified session on the remote system. If no session is specified the process runs in the console session. |
| **-i** | Run the program so that it interacts with the desktop of the specified session on the remote system. If no session is specified the process runs in the console session. This flag is **required** when attempting to run console applications interactively (with redirected standard IO). |
| **-h** | If the target system is Vista or higher, has the process run with the account's elevated token, if available. |
| **-l** | Run process as limited user (strips the Administrators group and allows only privileges assigned to the Users group). On Windows Vista the process runs with Low Integrity. |
| **-n** | Specifies timeout in seconds connecting to remote computers. |
Expand All @@ -80,15 +80,17 @@ psexec [\\computer[,computer2[,...] | @file]][-u user [-p psswd][-n s][-r servic
You can enclose applications that have spaces in their name with
quotation marks e.g.

**psexec \\\\marklap"c:\\long name app.exe"**
```cmd
psexec \\marklap "c:\\long name app.exe"
```

Input is only passed to the remote system when you press the Enter key.
Typing Ctrl-C terminates the remote process.

If you omit a user name, the process will run in the context of your
account on the remote system, but will not have access to network
resources (because it is impersonating). Specify a valid user name in
the Domain\\User syntax if the remote process requires access to network
the `Domain\User` syntax if the remote process requires access to network
resources or to run in a different account. Note that the password and
command are encrypted in transit to the remote system.

Expand All @@ -102,44 +104,46 @@ works](https://www.itprotoday.com/compute-engines/psexec) and gives tips
on how to use it:

The following command launches an interactive command prompt on
\\\\marklap:

**psexec \\\\marklap cmd**
`\\marklap`:


```cmd
psexec -i \\marklap cmd
```

This command executes IpConfig on the remote system with the /all
This command executes IpConfig on the remote system with the `/all`
switch, and displays the resulting output locally:

**psexec \\\\marklap ipconfig /all**

```cmd
psexec -i \\marklap ipconfig /all
```

This command copies the program test.exe to the remote system and
This command copies the program `test.exe` to the remote system and
executes it interactively:

**psexec \\\\marklap -c test.exe**

```cmd
psexec -i \\marklap -c test.exe
```

Specify the full path to a program that is already installed on a remote
system if its not on the system's path:

**psexec \\\\marklap c:\\bin\\test.exe**

```cmd
psexec -i \\marklap c:\bin\test.exe
```

Run Regedit interactively in the System account to view the contents of
the SAM and SECURITY keys::

**psexec -i -d -s c:\\windows\\regedit.exe**

```cmd
psexec -i -d -s c:\windows\regedit.exe
```

To run Internet Explorer as with limited-user privileges use this
command:

**psexec -l -d "c:\\program files\\internet explorer\\iexplore.exe"**
```cmd
psexec -l -d "c:\program files\internet explorer\iexplore.exe"
```

[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/PSTools.zip) [**Download PsTools**](https://download.sysinternals.com/files/PSTools.zip) **(3.5 MB)**

Expand Down
4 changes: 2 additions & 2 deletions sysinternals/downloads/sdelete.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ version of the file is created.
The only way to ensure that deleted files, as well as files that you
encrypt with EFS, are safe from recovery is to use a secure delete
application. Secure delete applications overwrite a deleted file's
on-disk data using techiques that are shown to make disk data
on-disk data using techniques that are shown to make disk data
unrecoverable, even using recovery technology that can read patterns in
magnetic media that reveal weakly deleted files. *SDelete* (Secure
Delete) is such an application. You can use *SDelete* both to securely
Expand Down Expand Up @@ -121,7 +121,7 @@ can. *SDelete* does this using non-cached file I/O so that the contents
of the NT file system cache will not be thrown out and replaced with
useless data associated with *SDelete*'s space-hogging file. Because
non-cached file I/O must be sector (512-byte) aligned, there might be
some left over space that isn't allocated for the *SDelete* file even
some leftover space that isn't allocated for the *SDelete* file even
when *SDelete* cannot further grow the file. To grab any remaining space
*SDelete* next allocates the largest cached file it can. For both of
these files *SDelete* performs a secure overwrite, ensuring that all the
Expand Down
19 changes: 8 additions & 11 deletions sysinternals/downloads/winobj.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,17 +4,17 @@ title: WinObj
description: The ultimate Object Manager namespace viewer is here.
ms:assetid: 'f5aabfba-811c-4b35-8d76-e64fd7083177'
ms:mtpsurl: 'https://technet.microsoft.com/Bb896657(v=MSDN.10)'
ms.date: 11/25/2020
ms.date: 02/22/2021
---

WinObj v2.23
WinObj v3.00
============

**By Mark Russinovich**

Published: November 25, 2020
Published: February 22, 2021

[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/WinObj.zip) [**Download WinObj**](https://download.sysinternals.com/files/WinObj.zip) **(1.5 MB)**
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/WinObj.zip) [**Download WinObj**](https://download.sysinternals.com/files/WinObj.zip) **(1.4 MB)**
**Run now** from [Sysinternals Live](https://live.sysinternals.com/Winobj.exe).


Expand All @@ -26,16 +26,13 @@ just curious about the Object Manager namespace.

*WinObj* is a 32-bit Windows NT program that uses the native Windows NT
API (provided by NTDLL.DLL) to access and display information on the NT
Object Manager's name space. Winobj may seem similar to the Microsoft
Object Manager's namespace. Winobj may seem similar to the Microsoft
SDK's program of the same name, but the SDK version suffers from
numerous significant bugs that prevent it from displaying accurate
information (e.g. its handle and reference counting information are
totally broken). In addition, our WinObj understands many more object
types. Finally, Version 2.0 of our WinObj has user-interface
enhancements, knows how to open device objects, and will let you view
and change object security information using native NT security
editors.

types. Finally, Version 3.0 of our WinObj has user-interface
enhancements (including a dark theme), knows how to open device objects, provides dynamic updates when objects are created/destroyed, and allows searching and filtering.

## Installation and Use

Expand All @@ -62,7 +59,7 @@ Object Manager name space, and Mark's October 1997 [WindowsITPro
Magazine](https://www.windowsitpro.com/) column, "Inside the Object
Manager", is (of course) an excellent overview.

[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/WinObj.zip) [**Download WinObj**](https://download.sysinternals.com/files/WinObj.zip) **(1.5 MB)**
[![Download](/media/landing/sysinternals/download_sm.png)](https://download.sysinternals.com/files/WinObj.zip) [**Download WinObj**](https://download.sysinternals.com/files/WinObj.zip) **(1.4 MB)**
**Run now** from [Sysinternals Live](https://live.sysinternals.com/Winobj.exe).

**Runs on:**
Expand Down
10 changes: 9 additions & 1 deletion sysinternals/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ title: Windows Sysinternals | Microsoft Docs
description: Library, learning resources, downloads, support, and community. Evaluate and find out how to install, deploy, and maintain Windows with Sysinternals utilities.
ms:assetid: '2b0d74e3-5962-455a-b35a-248979737b61'
ms:mtpsurl: 'https://technet.microsoft.com/Bb545021(v=MSDN.10)'
ms.date: 01/11/2021
ms.date: 02/22/2021
---

# ![Windows icon](/media/landing/sysinternals/Windows_logo_46x50px.png) Windows Sysinternals
Expand All @@ -25,6 +25,14 @@ You can view the entire Sysinternals Live tools directory in a browser at [https

## What's New [![RSS icon](/media/landing/sysinternals/rss.gif)](https://techcommunity.microsoft.com/plugins/custom/microsoft/o365/custom-blog-rss?board=Sysinternals-Blog) ##

### What's New (February 22, 2021)

- [WinObj v3.0](~/downloads/winobj.md)
This major update to WinObj adds dynamic updates, quick search, full search, properties for more object types, as well as performance improvements. It's also the first Sysinternals tool to feature a dark theme.

- [Coreinfo v3.52](~/downloads/coreinfo.md)
This update to CoreInfo adds reporting for CET (shadow stack) support.

### What's New (January 11, 2021)

- [Sysmon v13.00](~/downloads/sysmon.md)
Expand Down

0 comments on commit 06334f7

Please sign in to comment.