On Mon, Jan 3, 2011 at 16:34 PM, Martin Burnicki
<martin.burni...@meinberg.de> wrote:
>> I have configured the w32time service to start automatically, but it
>> does not seem to start automatically, so my system time is approximately
>> 2 minutes behind until I run "net start w32time && w32tm /resync" in an
>> elevated (with administrative privileges) cmd.exe session.
>
> So this is already a different problem which should be fixed. Ntpdate should
> also be able to set the correct system time initially, but I'm not sure the
> NTP package can even be built for Windows on IA32.

http://davehart.net/ntp/win/x86/ has a lot of evidence that should
assure you.  By the way, now would be a good time to verify the
current ntp-dev sources build on VC6 and the result works, as another
-dev -> -stable transition is about due.  It's been just over a year
since 4.2.6 came out, and a lot of good stuff has been introduced in
4.2.7.

I am aware of no one else building NTP on Windows using a compiler
older than Visual Studio 2008 recently, despite highly duplicative and
maintenance-heavy vc6, vs2003 and vs2005 project files.  I wish there
were others with access to VC6 reporting problems sooner, but I expect
once again it will be left to you and I to ping-pong through any vc6
build issues that have crept up.

> Hm, BTW, I don't know how I could load such a kernel driver under Windows?
> Under NT you could install non-PNP drivers like a service, and then load
> them with "net start my_kernel_driver". In current systems drivers are
> loaded by the kernel automatically, e.g. if a PCI card is detected which is
> handled by that driver. Don't know if you can still load a kernel driver
> manually.

I believe so, to the extent you can load the driver at all:  Most new
Windows installations are x64, and Microsoft makes it enough of a pain
to use unsigned drivers on 64-bit versions of Windows that I suspect
it's impractical for unattended use.  I believe unsigned drivers are
still allowed in x86 installs of Vista and Win7, likely with a few
layers of Danger! popups.  This is a bit of a looming brick wall for
my serialpps.sys hack, unless some kind soul manages the unlikely feat
of getting it through WHQL driver certification and signed by
Microsoft..

Cheers,
Dave Hart
_______________________________________________
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Reply via email to