On Mon, Jan 3, 2011 at 16:34 PM, Martin Burnicki <martin.burni...@meinberg.de> wrote: >> I have configured the w32time service to start automatically, but it >> does not seem to start automatically, so my system time is approximately >> 2 minutes behind until I run "net start w32time && w32tm /resync" in an >> elevated (with administrative privileges) cmd.exe session. > > So this is already a different problem which should be fixed. Ntpdate should > also be able to set the correct system time initially, but I'm not sure the > NTP package can even be built for Windows on IA32.
http://davehart.net/ntp/win/x86/ has a lot of evidence that should assure you. By the way, now would be a good time to verify the current ntp-dev sources build on VC6 and the result works, as another -dev -> -stable transition is about due. It's been just over a year since 4.2.6 came out, and a lot of good stuff has been introduced in 4.2.7. I am aware of no one else building NTP on Windows using a compiler older than Visual Studio 2008 recently, despite highly duplicative and maintenance-heavy vc6, vs2003 and vs2005 project files. I wish there were others with access to VC6 reporting problems sooner, but I expect once again it will be left to you and I to ping-pong through any vc6 build issues that have crept up. > Hm, BTW, I don't know how I could load such a kernel driver under Windows? > Under NT you could install non-PNP drivers like a service, and then load > them with "net start my_kernel_driver". In current systems drivers are > loaded by the kernel automatically, e.g. if a PCI card is detected which is > handled by that driver. Don't know if you can still load a kernel driver > manually. I believe so, to the extent you can load the driver at all: Most new Windows installations are x64, and Microsoft makes it enough of a pain to use unsigned drivers on 64-bit versions of Windows that I suspect it's impractical for unattended use. I believe unsigned drivers are still allowed in x86 installs of Vista and Win7, likely with a few layers of Danger! popups. This is a bit of a looming brick wall for my serialpps.sys hack, unless some kind soul manages the unlikely feat of getting it through WHQL driver certification and signed by Microsoft.. Cheers, Dave Hart _______________________________________________ questions mailing list questions@lists.ntp.org http://lists.ntp.org/listinfo/questions