Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

if exists, [file] was unexpected at this time.

Home Forums Scripting General Scripting if exists, [file] was unexpected at this time.

Viewing 1 post (of 1 total)
  • Author
    Posts

  • krayzie
    Member
    #155765

    hey guys

    im trying to run a command to uninstall some novell products apon logon


    @echo
    off
    REM REMOVE NOVELL PRODUCTS

    if exists c:Novellremoval.txt goto :exit else goto :uninstall

    :uninstall
    :Run Windows XP specific commands here.
    echo Windows XP

    REM NCL
    CALL \fileserverNovelluninstallAcu.exe

    REMzen works

    MsiExec.exe /x{7878B1D4-B2CB-4EA8-9A0A-7E0575D23B96} /quiet

    echo Novell client removed on %date% on %time% by %username% > c:Novellremoval.txt

    goto :exit

    :exit

    [/CODE]

    but when i run the .bat i get the “c:Novellremoval.txt was unexpected at this time.”

    any help wil be muchly appreciated

    thanks[CODE]

    @echo
    off
    REM REMOVE NOVELL PRODUCTS

    if exists c:Novellremoval.txt goto :exit else goto :uninstall

    :uninstall
    :Run Windows XP specific commands here.
    echo Windows XP

    REM NCL
    CALL \fileserverNovelluninstallAcu.exe

    REMzen works

    MsiExec.exe /x{7878B1D4-B2CB-4EA8-9A0A-7E0575D23B96} /quiet

    echo Novell client removed on %date% on %time% by %username% > c:Novellremoval.txt

    goto :exit

    :exit

    [/CODE]

    but when i run the .bat i get the “c:Novellremoval.txt was unexpected at this time.”

    any help wil be muchly appreciated

    thanks

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: