ftp.delorie.com/archives/browse.cgi   search  
Mail Archives: djgpp/2009/01/01/05:46:13

X-Authentication-Warning: delorie.com: mail set sender to djgpp-bounces using -f
X-Recipient: djgpp AT delorie DOT com
Date: Thu, 1 Jan 2009 05:28:55 -0500 (EST)
From: Jude DaShiell <jdashiel AT shellworld DOT net>
To: djgpp AT delorie DOT com
Subject: Re: errors using C++ libraries
In-Reply-To: <fe137193-3c79-4ae8-82b7-2f0e438942fc@g1g2000pra.googlegroups.com>
Message-ID: <Pine.BSF.4.64.0901010516160.34163@freire1.furyyjbeyq.arg>
References: <fe137193-3c79-4ae8-82b7-2f0e438942fc AT g1g2000pra DOT googlegroups DOT com>
MIME-Version: 1.0
Reply-To: djgpp AT delorie DOT com
Errors-To: nobody AT delorie DOT com
X-Mailing-List: djgpp AT delorie DOT com
X-Unsubscribes-To: listserv AT delorie DOT com

It's entirely probable MacCaffee or spysweeper trashed something on your 
system.  I've worked over at Smartco.org for long enough to have heard 
accounts of such things happening from the technicians that straighten out 
computers coming in for repair. A couple questions.  Do you have more than 
one computer you can use or removeable hard drives?  There are sleds for 
hard drives that can be installed in computers and locked in the frames so 
they can be used.  If either of these is a possibility and you learned how 
to use dos and dos doesn't scare you, you might set up another hard drive 
with djgpp and dos on it or set up another computer with both on it and 
install everything new and load your program on by floppy or other 
removeable media then try another build cycle and see what happens on a 
known clean system.  I wouldn't install any of the spyblaster or MacCaffee 
stuff since you suspect one or both for now.  If the program is needing to 
connect to the network you're going to need a second clean machine and a 
serial cable to another computer neither of which has any way to connect 
to the internet in order to test it and be sure.  Failing this, I suspect 
you'll be shooting in the dark for some time.  It's possible both 
suspicious programs have logs you can review which may have your library 
files named in them.  That's why I like to have programs like this 
quarrantine files rather than attempt to fix them because that way it's a 
middle ground between fixing and removal and so long as you know your 
quarrantine path or paths you can check things out.  Wish I could help 
more.


- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019