Solved

what OLE is being used in box right now?

Posted on 2011-02-15
10
371 Views
Last Modified: 2012-05-11
is there a way to know/find/observe what applications are dependent or using OLE right now (live).

thanks
0
Comment
Question by:anushahanna
  • 3
  • 3
  • 2
  • +2
10 Comments
 
LVL 70

Accepted Solution

by:
Merete earned 168 total points
ID: 34904166
Windows 7 doesnt bundle with OE only windows Live or Outlook in offce.
Usually the icon denotes the program associated with mail
Box?
If your in an email client whatever email is received by that emial client is used by that program.
 take for example if Hotmail/ Gmail or other emails are sent to windows live then windows live is using them once they arrive in the inbox.
I'm not clear on what you ask, Post some more details anushahanna
0
 
LVL 23

Assisted Solution

by:edbedb
edbedb earned 83 total points
ID: 34904512
I don't know but I found this with google.
http://technet.microsoft.com/en-us/library/ff730364.aspx
0
 
LVL 27

Assisted Solution

by:BigRat
BigRat earned 166 total points
ID: 34905578
Using the process monitor one can see which processes have linked to OLE2.dll. That said almost every service program uses OLE marshalling to communicate with the desktop. In fact OLE in its basic form is used almost everywhere. That is unless you mean specifically OLE DB which is MS's standard way of accessing SQL Databases, then the comments above apply.
0
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

 
LVL 6

Author Comment

by:anushahanna
ID: 34907465
My understanding is D(COM) helps some services in OS, including OLE. On one server, we often have "The DCOM Server Process Launcher service terminated unexpectedly" error which we are not able to find why it crashes.. so if I can confirm there are OLE being run/used in the server- if I can confirm it, i can worry less or take it away.. that is why i am asking this.
0
 
LVL 27

Assisted Solution

by:BigRat
BigRat earned 166 total points
ID: 34907947
In my experience this problem is related to a malware infection (see http://www.computing.net/answers/security/dcom-server/25617.html)

It could also be a rootKit (http://www.securelist.com/en/analysis?pubid=168740859) but most anti-Malware programs find them.

You might find Mike Gibson's page useful http://www.grc.com//freepopular.htm
0
 
LVL 6

Author Comment

by:anushahanna
ID: 34910143
BigRat, we could not find any malwares yet on the server - no other indication. which tool were you recommending from Mike Gibson's page?

From your post # 34905578, it seems like Windows cannot do without OLE, right?

0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 168 total points
ID: 34912205
Try process explorer
Process Explorer, also known as procexp.exe, shows you information about which handles and DLLs processes have opened or loaded
http://technet.microsoft.com/en-us/sysinternals/bb896653

Process Monitor v2.94
Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity.
http://technet.microsoft.com/en-us/sysinternals/bb896645

The systernals have a complete suite of tools / utilities for many uses including rootkit revealer etc
http://technet.microsoft.com/en-us/sysinternals/bb842062
0
 
LVL 34

Assisted Solution

by:James0628
James0628 earned 83 total points
ID: 34914544
FWIW, it's Steve Gibson, not Mike.

 James
0
 
LVL 6

Author Comment

by:anushahanna
ID: 34935812
thank you-
0
 
LVL 70

Expert Comment

by:Merete
ID: 34935897
You're welcome anushahanna
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
printf performancy 11 67
Formula for calculating ROI on training 6 49
Windows 10 Sysprep problems 14 12
Shrink multiple databases at once 4 16
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question