Category Archives: Windows 10

MS Edge 122.0.2365.106 Winget Upgrade Puzzle

Here’s a good one, right from my Windows 10 desktop this morning. As per usual practice, I ran winget upgrade –all –include-unknown to see what updates might be available after the weekend.  I promptly ran into a Catch-22 as you can see in the lead-in screencap. I call it an MS Edge 1220.2365.106 Winget Upgrade puzzle, because the package manager finds an upgrade for Edge that I can’t figure out how to install. Let me explain…

What’s the MS Edge 122.0.2365.106 Winget Upgrade Puzzle?

In a nutshell, here’s what the lead-in graphic depicts (there’s more, as you will shortly see in the following list of items):

1. Winget reports that an upgrade for Edge from version 122.0.2635.92 to …106 (first three groups of digits stay the same) is available.

2. Winget upgrade –all –include-unknown fails because “install technology of the newer version is different…” I’ve definitely seen this before. Note the error message advises an uninstall/reinstall maneuver to fix things.

3.  Winget uninstall Microsoft.Edge fails with exit code 93

4. An attempt to force the uninstall fails with the same exit code

5. A visit to Settings > Apps > All installed apps offers no uninstall option for Edge. Indeed, it’s pretty well known in Windows circles that Edge is notoriously tricky to uninstall. See, for example. this github “Remove-MS-Edge” script…

When in Doubt, Report to the Winget Team…

I have to believe this is a slight hiccup on the Winget team’s part. From long experience in working with the program daily since it was introduced at the end of June, 2020, I know that (a) Catch-22s sometimes pop up and (b) they usually get fixed fairly soon after they appear. My best guess is that this particular instance will get handled in the next few days.

For my part, I’m sending a link to this blog post to Demitrius Nelon, the leader of the Winget team via Twitter. This usually provokes immediate and corrective action. Let’s see what happens…

Stay tuned! Note: FWIW, Windows 11 versions are not subject to this gotcha. AFAICT this is a Windows 10 thing only. I even tried a repair install for Edge through its “All installed apps” entry and that didn’t help, either.  Indeed, a version check on the 122.0.2365.92 version comes back to report “all’s well”:

Note Added March 26: Gone!

Edge is still running as version 122.0.2365.92. But Winget is no longer reporting that it needs to upgrade it to 122.0.2635.106. Indeed, Winget show Microsoft.Edge now reports the latter as the current version, in need of no upgrade at all. Thanks Demetrius and team: problem solved!

Facebooklinkedin
Facebooklinkedin

NotePad Gets Gradual Spellcheck Rollout

I already know better, but couldn’t help but get excited yesterday. I read the “Spellcheck in Notepad…” MS announcement with care.  TLDR version: “Notepad gets gradual spellcheck rollout in the Canary Channel.” Fingers crossed, I checked Notepad settings. I hoped I might snap my unbroken streak and would see the new stuff.

You can see what this  feature looks like in the lead in graphic, where the spellchecker recognizes “lectrons” as a misspelling of “electrons” (that graphic comes straight from the MS announcement).

Left Behind, as NotePad Gets
Gradual Spellcheck Rollout

If you are included in the first batch of spellcheck and auto-correct endowed Notepad users, you’ll find those controls in Notepad settings. They occur beneath the “Opening Notepad” heading. The new heading reads “Spelling” and includes two toggles: first, “Spell check,” and second “Autocorrect.” By default ,Notepad turns both off when you edit a file whose type indicates some kind of markup or programming language is in use. Thus,  it might be something like .html, .xml. .py, .cs, .cpp,  .java, or .js  (IDs for the most frequently-occurring such file extensions).

Now my question is: how long do I have to wait to gain entry into the cohort that’s testing these capabilities? We’ll see. In a further triumph of hope over experience, I just checked my second Canary Channel test PC (it’s downloading and updating Notepad right now via the MS Store . . .).  No dice there, either. Stay tuned: I’m still waiting . . .

Facebooklinkedin
Facebooklinkedin

Restore Point Pros & Cons

By default, Windows 10 and 11 both turn on restore points (RPs). These may be used to return an OS environment back to a prior state. The OS typically shoots one RP daily, and takes one as it starts the WU process. In addition, app developers may include taking an RP snapshot early on during their own install processes. All this said, there are plenty of Restore Point pros & cons.

What Are Restore Point Pros & Cons?

These days you reach Restore Points through the System Protection tab in the System Properties window in Control Panel. Interestingly enough, you have to navigate through Settings > System to get there. Once you find what you’re looking for (see lead-in screencaps) you can enable or disable RPs, and also allocate a maximum percentage of the system/boot disk which these system snapshots can occupy.

RP Pros

RP’s positives include the following:

  • Convenience and ease of use: you can create an RP manually with a few mouse clicks, and it takes little time to complete one. It’s also fairly easy to revert to a Restore Point using either Windows built-in tools or one of my faves (it’s an oldie, but a goodie): System Restore Explorer. It tool 33 seconds to create one on my i7Skylake desktop, and 1:05 to restore same on that PC.
  • Provides a simple layer of system protection: can easily revert Windows to undo update, app or application, and driver changes. This is faster — but more limited in scope — than even the fastest image backup restore. As a knock-on effect: this can also undo software or library conflicts (after adding an app or application, or a new .NET version, or something else that’s similar).
  • Some cleanup when removing new software: This might be somewhere between a pro and a con.  Restoring an RP does result in removal of executable files and dlls added when installing apps. But shortcuts, preferences, and other files (including home folders — e.g. inside C:\Program Files or C:\Program Files (x86)) remain intact.

RP Cons

By contrast, RP’s negatives include:

  • No antivirus protection: restoring an RP won’t necessarily eliminate triggers for or stealth executables that cause malware infections. Thus malware can return even after using an RP.
  • No data file backup: RP copies the contents of the system volume shadow using the Volume Shadow Service (aka VSS). This does not include data files by intention. So RP provides no data restore capability (see the note at the end of this story for a 3rd-party tool that does provide such capability, however).
  • New user accounts are not protected by RP: if you define a new user account after the point in time at which an RP shapshot is created, those accounts will no longer exist when that RP is restored. That said, the User files for that account will persist. IMO, this is a kind “worst of both worlds” situation. Sigh.

My Net-Net Is: Don’t Rely Solely on RPs

Reading through the previous plusses and minuses, it’s pretty easy to see that  RPs can have value in a limited set of circumstances. But they’re no substitute for a recent image backup, and they’re no panacea for solving non-trivial Windows issues or problems.

I don’t use RPs much myself anymore myself (though I did in the Vista and Windows 7 eras). These days I rely mostly on in-place upgrade repair install for semi-serious to serious troubleshooting, and a clean install (or image restore) for outright system failures and boot problems. It’s also my repair of last resort when nothing else will produce a working Windows instance. Go figure!

Note Added March 19: More Madness

I got a comment from TenForums.com and ElevenForum.com regular “Old Navy Guy” (ONG) this morning reminding me that the NirSoft ShadowCopyView tool does allow users to view and copy certain data files from a VSS snapshot. This *does* allow access to user files and folders and adds to what you can recover from such a snapshot.

I totally forgot about this tool, and am glad to be reminded of same. More important, I’m grateful to have the chance to point this out to you, dear reader — and to make that tool known and possibly useful for you. AFAIK, this capability applies only to files and folders in the Users folder hierarchy, so if you keep stuff on a data drive — as I do — it won’t help much, or at all. But it could still be helpful nevertheless. Cheers!

Note Added March 21: Including Other Drives

Another Homer Simpson moment has come and gone for me. ONG commented again to remind me that ShadowCopyView does data drives, too. I initially wondered how VSS could accommodate drives other than the C: (boot/system) drive where the OS and other key stuff lives. Then it hit me: you must enable RP protection on those drives, too. Here’s an illustrative screencap:

Restore Point Pros & Cons.ddarrow

Turn on Protection for the D: drive so it gets VSS snapshots, too.

Maybe there’s more to this protection scheme than I originally gave it credit for. It took 12 seconds to capture an RP for my C: drive and 13-14 seconds for my D: (Data) drive on a Lenovo ThinkPad X380 Yoga. WizTree says C: contains ~80GB of data, while D: contains ~400GB. So it is indeed remarkably fast. And with VolumeShadowCopy providing access to contents, it provides workable file and folder level access to bring back items one-at-a-time or as portions of a target drive’s file hierarchy. Good stuff!

Facebooklinkedin
Facebooklinkedin

Widget Screenshot Users, Beware

Wow! Did I get an ugly surprise in the mail yesterday. I got two demand letters from a Canadian image rights company, seeking payment of US$1,334 for use of two thumbnails in a screen capture I made. Where and how did this happen? I was reporting about the introduction of the Windows News Bar (Beta) app, before the whole news and weather widget stuff rolled onto the Windows taskbar. That’s why I admonish fellow bloggers and Web content developers: “Widget screenshot users, beware!”

Ouching into Widget Screenshot Users Beware

The actual images the claimant asserts I’m using without a license are thumbnails. They measure 78×41 pixels. They’re included as an illustration of what the news bar looked like on the Windows desktop at the time (after I downloaded and installed the app).

Of course, news and weather info is now available from the taskbar. It comes courtesy of the so-called “Widgets” icon there, where the popped-up window that clicking on it produces is simply called Widgets. It shows both captions and images because it has more pixels to work with. This original design let users pick whether to see captions or images (images by default). Because I screen-capped two of their clients’ images on March 30, 2020, I must pay . . .  says the claimant.

Fair Use to the Rescue

“Not so fast,” is my response. I replied in writing  as follows:

  •  I make no money from my website
  • I was reporting news about a new MS Store app (News Bar Beta)
  • I used the image strip (5 or 6 of them altogether, if memory serves) purely to show what the app looked like, and made no reference to individual images
  • I reproduced the strip as thumbnails only, heavily cropped
  • I do not sell or license images to any third parties, and I make no money from the site, so it can’t impose commercial losses on the copyright holders

These are all part of the arguments through which “fair use” is proven in the US. I think I’m on solid ground, but it’s pretty disturbing nonetheless. Going forward, I’ll look more closely at exactly what’s in my screencaps. I’d advise you to do likewise for anything that goes online as well. Better to avoid trouble than to have to (de)fend it off.

Facebooklinkedin
Facebooklinkedin

Checking Wi-Fi Signal Strength

Here at Chez Tittel, most PCs use wired Ethernet for their network connections. That is: of the 10 PCs on various LAN segments here, 7 use GbE connections; the other 3 use Wi-Fi. But our cellphones, iPad, and other devices — including 3 thermostats — are all on Wi-Fi. It’s a mixed bag. I like to check Wi-Fi quality from time to time, so I have to thank Mauro Huculak at Windows Central. He just reminded me about what’s up with checking Wi-Fi signal strength. See his story “How to check Wi-Fi signal strength…” for a raft of potential ways in Windows 11.

Checking Wi-Fi Signal Strength: Command Line

I’m a command line junkie, so I’ll skip the various UI-based methods he describes. There’s a single command in the network shell (netsh) that will tell you what you (or I, in this case) want to know:

netsh wlan show interfaces

Mr. Huculak also provides a tasty one-liner version in his article that’s worth sharing and keeping around (cut’n’paste into a text editor like Notepad, and remove all but one space between the text on the 1st & 2nd lines, please, so it will run in Command Prompt or PowerShell):

(netsh wlan show interfaces)
-Match '^\s+Signal' -Replace '^\s+Signal\s+:\s+',''

You can see both of these at work in PowerShell on one of my Windows 11 test PCs in the lead-in graphic above. The short version produces all of the interface info for the one and only Wi-Fi interface on that machine; the long version simply shows the signal strength as a percentage (i.e. the “99%” at lower left above). You can go either way. Works the same on Windows 10, too. Very handy!

Thanks again, Mauro. Made my morning…

Facebooklinkedin
Facebooklinkedin

KB50001716 Is Puzzling

OK, then. I was reading Martin Brinkmann’s post to gHacks this morning. It’s entitled “Microsoft’s sneaky KB5001716 Windows 10 update pushes Windows 11.” I don’t think my production PC qualifies, because its Intel SkyLake i7-6700 falls outside the range of supported CPUs. So I went looking for it, and learned some useful things. Let me share them with you…

Why KB50001716 Is Puzzling

First off I went to look at WU Update History to see if KB5001716 was present (or absent). I quickly realized that reading the whole WU history was more than a little taxing on a machine that’s been running Windows 10 since 2016.

So I turned to PowerShell where some operating on the Get-WUHistory command seemed like a good idea. When I figured out my Update History had 528 entries, that idea seemed even better. You can view the update history by creating a variable named $history, like so

$history = Get-WUHistory -last 1000

This grabs up to the last 1000 entries in the history records and assigns them to the variable $history. If you look at that output it’s kind of hard to ingest from Windows Terminal. It makes more visual sense if you look at it this way:

$history | sort date -desc | Format-Table Date,KB,@{l=’Category’;e={[string]$_.Categories[0].Name}},Title

[Note the preceding lines are a single PowerShell command string. If you want to try it, cut’n’paste into a text editor and make sure it’s a “one liner” before pasting into PowerShell. This produces output that looks like this:

KB50001716 Is Puzzling.table-output

Table format is more readable, but still too much to take in.
[Click image for full-size view.]

So I changed up the command string to write it to a file. That required appending the following string:

> i7wuhist.txt

The > symbol redirects the output, and the filename resides in folder context in which PS runs. Working with a file I was able to figure out the following:

1. I had no instances of KB5001716 in there anywhere
2. There were a total of 528 entries in that file.

I also concluded that my PC’s failure to meet Windows 11 hardware requirements probably meant that the upgrade offer (and indeed KB5001716 itself) were not forthcoming. Good to know, and I learned some interesting stuff along the way.

Facebooklinkedin
Facebooklinkedin

SearchApp.Exe Sets Windows 10 Crash Record

It took me a while to count them up, but my Windows 10 production PC hit some rocks yesterday. As SearchApp.exe sets Windows 10 crash record on that PC — 49 Critical “Stopped working” events in one day — I find myself wondering if it’s time to move onto a new production PC here in the office. As you can see in the lead-in graphic, the reliability index dropped like a stone!

Cringing As SearchApp.Exe Sets Windows 10 Crash Record

Frankly, I’m not sure what to make of this. As I dig into similar reports online — as in this TenForums.com thread — I see my problem is neither unique nor necessarily pathological. But gosh! It sure it disconcerting to see so many crashes in a single day.

I know why it happened, too: my Start menu stopped working properly about mid-day yesterday. Thus, I found myself using the Windows Search box a LOT more than usual. Then I figured out I could scroll through “All apps” and get to what I needed alphabetically. Eventually, I went into Task Manager and clicked the “Restart” option in the right-click menu for File Explorer. That restored Start to normal behavior and stopped the weird search bomb from going off, apparently.

Another Brick in the Wall?

I keep thinking that the time is coming ever closer when I’m going to have to switch my production work over to a new desktop. I built one last year (an AMD 5800x, B550 mobo, 64 GB RAM, etc. etc.). Could this be Windows’ way of telling me “time to go!” Perhaps… Let me procrastinate a bit longer, please?

But as Pink Floyd put it “You can’t have any pudding if you don’t eat your meat…” So I’d best get moving in the next month or two. The beast must be fed!

Facebooklinkedin
Facebooklinkedin

CNF Conundrum Gets Some Love

OK, then. I’ve been trying to figure out why, on some of my test PCs, I get an error message when PowerShell loads my profile and tries to import the PowerToys WingetCommandNotFound (CNF) module. You can see that error message in the lead-in graphic above (from my ThinkPad P16 Mobile workstation). Thanks to some fiddling around, this CNF conundrum gets some love — finally!

I haven’t figured out how to fix the problem properly just yet. But for the nonce, if I go into PowerToys, visit CNF, uninstall and then resinstall same, it returns to work. This happens every time I open a fresh PowerShell session, so it’s at least mildly bothersome. But I’m starting to make progress on figuring things out.

How CNF Conundrum Gets Some Love

The error message keeps changing on me as I add things to the folder where the profile resides — namely %user%\documents\PowerShell. First, it complains about not being able  to find the module itself. I copy it into that folder. Then it complains about a .DLL. I copy that, too. Finally, it complains about an error handler not being able to field a thrown exception.

It’s not fixed yet, but I now know that this issue comes from my PowerShell modules path set-up. Something is wonky between those search paths (there’s one for the system, and one for my login account) and PowerToys. This happens for one of my Microsoft Accounts (MSAs)  every time I use it to log into Windows, because this information is shared across those instances through OneDrive.

What’s Next?

I’ve got to research how I should be setting things up in the OneDrive environment to get PowerShell and PowerToys to get along with each other properly. I’ll be contacting the WinGet crew (Demitrius Nelon’s team at MS) to request additional info and guidance. That’s because my online searches have only clued me into what’s going on, but not how to fix it properly.

Stay tuned: I’ll keep this one up-to-date. And I’ll probably post again, when a resolution is formulated. This just in: OneDrive is reporting multiple copies of the PS profile in its file store. Could this be related? I have to think so. Again: stay tuned…

Facebooklinkedin
Facebooklinkedin

Repair Install Fixes Instability

At the beginning of this month, I performed an in-place upgrade repair install on my Windows 10 production PC. It’s now running Build 19045.4046. You can see that this repair install fixes instability on the PC in the lead-in graphic. Over the past 20 days I’ve had only one critical event — mostly self-inflicted when testing winget Chrome update behavior (see last Friday’s post for details). Otherwise, this 2016-vintage system has been rock solid of late.

When in Doubt, Repair Install Fixes Instability

Gosh! I’ve long been a believer that an in-place upgrade repair install (IPURI) is something of a Windows cure-all. Reminder: an IPURI runs setup.exe from a mounted ISO for the same version of Windows that’s currently running on a PC. Thus, it requires the host OS to be running well enough to replace itself. See these terrrific TenForums.com and ElevenForum.com tutorials for all the details…

Thus, you can’t use this technique if you’re having boot problems, or the OS isn’t running well enough to get through  the GUI phase of a Windows upgrade. But for situations where the OS is running (but most likely, not as well as you might like) this technique works extremely well. My earlier Reliability Monitor trace, before the February 1 IPURI, looked something like a sawtooth wave on an oscilloscope. Ouch!

How to Get the Right ISO

I still use UUPDump.net to match build numbers between what’s running and the ISO I have it build for me. Then, I mount that ISO, and run setup.exe from the virtual DVD drive ID Explorer puts out there for me. Lately it’s been showing up as the E: drive; but this morning it comes up as P:. But you’ll most likely see it labeled with the initial characters of the image label like this:Repair Install Fixes Instability.recent-iso

Here’s what Explorer shows me when I mount the ISO I used on February 1 for an IPURI: Virtual DVD Drive P:

For the record, I also use the excellent Ventoy project software to boot into my various ISOs when an IPURI won’t do. Admins and power users will want to keep a USB handy with their fave ISOs for repair and recovery scenarios. I do that on a 1 TB NVMe SSD inside a USB3.2 drive enclosure. Lets me keep dozens of ISOs around, ready to boot into any of them on a moment’s notice. Good stuff!

Facebooklinkedin
Facebooklinkedin

Winget Browser Updates May Be Curious

As far as I can tell, I’ve been blogging here about the Windows Package Manager — Winget, that is — since May 2022. Indeed it’s received regular mention ever since (nearly a third of all posts). I finally observed the other day that winget won’t update a browser with any of its processes running on the target PC. Also the browsers I use (Chrome, Firefox, Edge) still make you “Relaunch” to complete any update. This includes instances when Winget updates them successfully. Hence my assertion: Winget browser updates may be curious. And I mean both in terms of effect and outcome.

If Winget Browser Updates May Be Curious, Then?

It doesn’t stop me from trying, but the update doesn’t happen at all when any related process is running. Thus, for example, if any chrome.exe items show up in Task Manager>Details view, winget breezes past the update package and does nothing. Ditto for Firefox and Edge. But it’s a good flag for me to jump into each one’s Help>About facililty which is usually more than happy to update from insider the browser itself. And again, to request a “Relaunch” when that process comes to its conclusion.

It’s all part of the learning process in working with winget to keep Windows up-to-date. Sometimes — indeed nearly all the time — winget handles update packages quite nicely on its own. At other times (less often) winget acts as a sentinel to warn me that an update is available, which I then must figure out how to install.

Here’s a short list of such programs above and beyond the browsers already mentioned: Kindle for Windows, Discord, certain EA game executables, Teams Classic, Windows Terminal (now fixed), and even Winget itself from time to time. But gosh, it’s always fun to see what’s out there and what happens when winget wrangles update packages. It’s made my life ever so much more interesting (and updates easier) since it emerged in 2022.

Facebooklinkedin
Facebooklinkedin