Solved

chkdsk dump

Posted on 2006-11-03
6
585 Views
Last Modified: 2013-12-04
i believe there has been some disk corruption while fixing for rootkits. on bootup chkdsk /f throws a lot of text. how can i save the demped text to put for further analysis?
0
Comment
Question by:drmanno
  • 3
  • 2
6 Comments
 
LVL 15

Expert Comment

by:mattisflones
ID: 17870483
You cant!
There is no way a pre boot program can save the file to the disk.
0
 
LVL 23

Accepted Solution

by:
phototropic earned 125 total points
ID: 17870494
Start - Control Panel - Administrative Tools - Event Viewer - Application
Look for the most recent example of "winlogon" under the "source" column. Double click it to see results...
0
 

Author Comment

by:drmanno
ID: 17870543
phototropic, right on the dot. the log had complete text that i barely read when it was flying off the screen. thanks a lot.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 15

Expert Comment

by:mattisflones
ID: 17870564
Ah.. that text..
:-)
0
 

Author Comment

by:drmanno
ID: 17870726
never mind, mattisflones, it evades all of us, sometimes. have a great one.
0
 
LVL 15

Expert Comment

by:mattisflones
ID: 17870927
:-) Right back at ya..
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sample IT Security policies 3 94
Cannot Take Ownership of Folder 9 64
Secure coding guides/standards for Cobol programming 10 248
internet access from windows servers 4 64
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

948 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now