• Simple way to use Twain driver scanners in W10

    From John C.@3:633/10 to All on Sat Jan 17 07:23:14 2026
    Microsoft desperately wants you to use WIA and not Twain drivers. To
    that end, one of their updates made it so that my otherwise perfectly functioning scanner didn't show up in most of my graphics programs
    (Irfanview being a major exception.)

    Google Gemini told me that if I simply configured my graphics programs
    (eg. Adobe Photoshop Elements) to always run in Administrator mode, the
    problem would go away.

    This worked for me, so if any of you out there also experienced this
    problem you might want to give it a try.

    HTH.

    --
    John C. I filter crossposts, various trolls & dizum.com. Doing this
    makes this newsgroup easier to read & more on-topic. Take back the tech companies from India & industry from China.


    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Paul@3:633/10 to All on Sat Jan 17 11:29:37 2026
    On Sat, 1/17/2026 10:23 AM, John C. wrote:
    Microsoft desperately wants you to use WIA and not Twain drivers. To
    that end, one of their updates made it so that my otherwise perfectly functioning scanner didn't show up in most of my graphics programs
    (Irfanview being a major exception.)

    Google Gemini told me that if I simply configured my graphics programs
    (eg. Adobe Photoshop Elements) to always run in Administrator mode, the problem would go away.

    This worked for me, so if any of you out there also experienced this
    problem you might want to give it a try.

    HTH.


    That's not a preferred way to run applications in Ring 3.

    That's not Safe Hex.

    And on some OSes (not Windows), the application
    programs are coded to check for attempts to elevate, and the
    program will not allow running elevated. That is intended to
    show you how "unpreferred" it is to run Ring3 elevated, and
    how other OSes nanny their users.

    *******

    We run Regedit that way, because it actually needs permissions
    to get the job done, and in some cases, even Administrator
    isn't enough. To remove a TrustedInstaller permission on a
    Registry entry (a malware trick), takes elevating Regedit
    to TrustedInstaller.

    But operating a scanner, we should try to avoid that game.

    Maybe the scanner application that comes with the scanner,
    you can use the Compatibility tab on the EXE and get the
    necessary fluid operation that way.

    Using a copy of Vuescan, stands a good chance of doing
    the job properly. That gives the possibility of a "newer path"
    to the hardware.

    A lot of "friction" in the OS, comes from "exploits" that must
    be covered off. That's why we are being asked to remove
    certain drivers, by an OS notification. It isn't entirely
    a themed "hatred", but it is recognition that a thing
    like a TWAIN driver isn't signed. Signing is not a panacea,
    as files have been signed by Black Hats using materials they
    got by breaking into some site. When you operate a business,
    your signing computer should be air-gapped, so that can't happen.

    Two drivers now operate in "separate" containers. The NVidia
    driver. The RealTek NIC driver. In the case of NVidia, the
    web site will refer to the Standard Driver, which would work
    on windows 7. Whereas the newer (nameless driver standard)
    is the containerized version. And that tends to be associated
    with W10/W11. Eventually, all drivers will be containerized,
    which means again, lots of older code implementations will
    not be compatible with the newer OSes.

    Paul

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From John C.@3:633/10 to All on Mon Jan 19 05:52:06 2026
    Paul wrote:
    John C. wrote:

    Microsoft desperately wants you to use WIA and not Twain drivers. To
    that end, one of their updates made it so that my otherwise perfectly
    functioning scanner didn't show up in most of my graphics programs
    (Irfanview being a major exception.)

    Google Gemini told me that if I simply configured my graphics programs
    (eg. Adobe Photoshop Elements) to always run in Administrator mode, the
    problem would go away.

    This worked for me, so if any of you out there also experienced this
    problem you might want to give it a try.

    HTH.

    That's not a preferred way to run applications in Ring 3.> That's not Safe Hex.

    Sure, if I was running all -or just certain of- my applications in administrator mode it would be. However, I've been using Adobe Photoshop Elements 2.0 for literally decades and know that it's a really for real
    Adobe program, so I don't see the harm in running it in administrator mode.

    Likewise, the installed driver for my Canon Canoscan 8400F flatbed
    scanner and I didn't install it to run in administrator mode. If PSE 2
    wants to do so though, I don't see any risk in that either.

    Paul, can you please explain -explicitly- why running Adobe Photoshop
    Elements 2.0 in administrator mode would be unsafe hex?

    And on some OSes (not Windows), the application
    programs are coded to check for attempts to elevate, and the
    program will not allow running elevated. That is intended to
    show you how "unpreferred" it is to run Ring3 elevated, and
    how other OSes nanny their users.

    *******

    We

    Hmmm... just curious... Paul, are you a Microsoft employee?

    run Regedit that way, because it actually needs permissions
    to get the job done, and in some cases, even Administrator
    isn't enough. To remove a TrustedInstaller permission on a
    Registry entry (a malware trick), takes elevating Regedit
    to TrustedInstaller.

    That makes sense too.

    But operating a scanner, we should try to avoid that game.

    Well why then? What risk is there?

    Maybe the scanner application that comes with the scanner,
    you can use the Compatibility tab on the EXE and get the
    necessary fluid operation that way.

    The scanner application that came with my Canon Canoscan 8400F flatbed ("Canonscan Tool Box for Windows") has a dreadfully poor UI and has
    always been riddled with bugs. I refuse to use it and always have.
    Accordingly, I only installed the driver.

    Using a copy of Vuescan, stands a good chance of doing
    the job properly. That gives the possibility of a "newer path"
    to the hardware.

    No. I won't pay money to use their software so I can resolve a problem
    like this one. Period. And I know from experience that Linux Mint can
    easily run my scanner without any issues.

    This is the problem with the computing industry. Those running it
    believe that everybody is fully capable of vomiting money indefinitely.

    Many people have to function on a limited income. What about them?
    Should they be forced to go by the wayside?

    A lot of "friction" in the OS, comes from "exploits" that must
    be covered off. That's why we are being asked to remove
    certain drivers, by an OS notification. It isn't entirely
    a themed "hatred", but it is recognition that a thing
    like a TWAIN driver isn't signed. Signing is not a panacea,
    as files have been signed by Black Hats using materials they
    got by breaking into some site. When you operate a business,
    your signing computer should be air-gapped, so that can't happen.

    Two drivers now operate in "separate" containers. The NVidia
    driver. The RealTek NIC driver. In the case of NVidia, the
    web site will refer to the Standard Driver, which would work
    on windows 7. Whereas the newer (nameless driver standard)
    is the containerized version. And that tends to be associated
    with W10/W11. Eventually, all drivers will be containerized,
    which means again, lots of older code implementations will
    not be compatible with the newer OSes.

    So here's what I see happened from my viewpoint (IOW, IMO):

    1. Microsoft is contacted by some scanner manufacturer (in this case,
    Canon but others might have been part of this action as well) and whined
    to that they can't sell any scanners because their products last too
    long (planned obsolescence wasn't implemented adequately and with enough
    total disregard for the consumer.)

    2. MS disables Twain drivers, using "security" -yet again- as their
    catch-all excuse to do so.

    3. Canon removes most or all drivers for their older scanners from their website and refuses to provide newer ones for legacy scanners.

    4. People who own older Canon scanners and who are either not
    technically proficient enough to deal with this artificial,
    _act-of-collusion_ (IMO) problem -or who don't have the time to do so-
    bite the bullet and buy a new scanner. But Canon isn't through with them
    yet:

    5. Canon stops putting certain abilities into their scanners and makes
    it necessary to additionally purchase yet another scanner which has
    those abilities. At the same time, they jack their prices up
    unreasonably in an attempt to increase their bottom line.

    What might have transpired between Canon and Microsoft in order for this
    to happen is anybody's guess. All I know is that this whole thing
    (again, IMO) might additionally be an attempt to establish precedent
    which will allow M$ to pull this kind of stunt with other hardware.
    Which, of course, it is now doing anyway.

    When my scanner suddenly quit working in Windows 10 Pro because of an
    update, I was FURIOUS! And this is not the first piece of expensive,
    still mechanically and electrically sound hardware that this happened
    to. My Logitech X-540 suddenly lost the ability to function in 5.1 mode
    for example. Eventually I also found a way to get around that, but it's slightly buggy.

    At this point, I am giving serious consideration to employing a simple
    tactic to put an end to being forced to deal with W10 issues on an
    almost daily basis:

    1. Run an air-gapped W7 system and NEVER allow it to go online.
    2. Also run a very inexpensive system with an alternative OS for going
    online.

    Microsoft has completely lost my trust and has earned my thorough
    disgust. I am not alone in these sentiments either, I can assure you.

    --
    John C. I filter crossposts, various trolls & dizum.com. Doing this
    makes this newsgroup easier to read & more on-topic. Take back the tech companies from India & industry from China.


    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)
  • From Paul@3:633/10 to All on Mon Jan 19 12:37:46 2026
    On Mon, 1/19/2026 8:52 AM, John C. wrote:
    Paul wrote:
    John C. wrote:

    Microsoft desperately wants you to use WIA and not Twain drivers. To
    that end, one of their updates made it so that my otherwise perfectly
    functioning scanner didn't show up in most of my graphics programs
    (Irfanview being a major exception.)

    Google Gemini told me that if I simply configured my graphics programs
    (eg. Adobe Photoshop Elements) to always run in Administrator mode, the
    problem would go away.

    This worked for me, so if any of you out there also experienced this
    problem you might want to give it a try.

    HTH.

    That's not a preferred way to run applications in Ring 3.> That's not Safe Hex.

    Sure, if I was running all -or just certain of- my applications in administrator mode it would be. However, I've been using Adobe Photoshop Elements 2.0 for literally decades and know that it's a really for real Adobe program, so I don't see the harm in running it in administrator mode.

    Likewise, the installed driver for my Canon Canoscan 8400F flatbed
    scanner and I didn't install it to run in administrator mode. If PSE 2
    wants to do so though, I don't see any risk in that either.

    Paul, can you please explain -explicitly- why running Adobe Photoshop Elements 2.0 in administrator mode would be unsafe hex?

    Two image libraries were exploited, by specially crafted images.

    (This has also happened with movie player codecs, and the problem
    is serious enough from a probabilities perspective, that movie
    players run in a container for safety. We cannot find all the
    bugs in decoders, too many lines of code.)

    I believe it was the JPEGLIB for sure, and the other one might
    have been TIFFLIB. The companies using the FOSS libraries for
    image processing, used those libraries *without reviewing them*.

    When the management at the software companies reviewed the incident,
    I think their reaction would be "yikes! We've been using code
    without review???".

    After the exploits happened in the field, the companies then
    broke open the libraries they had been blindly compiling and
    linking, to find that the basic "C hardening" had not been done.
    There might be six C library routines, which a compiler will
    remind you, "don't use X, use routine X2". Actually, the addition
    of those warnings in the compiler, might be traceable to the
    JPEGLIB incident. Add automation to the compiler, to warn people
    about the weak sauce in the C standard library.

    The incidents resulted in two things. It resulted in improvements
    to the libraries in question. But it also made an addition to
    the workflow happen, which is review of materials being imported
    from FOSS-land for "freshness and quality". There are some
    libraries, which were poorly commented and mysterious,
    and for such libraries, that caused "extreme friction" in
    the community regarding reuse of code. The code was of such
    poor composition, that even experts in big companies were not
    exactly sure what the intention of the code was. Opaque would
    be the word.

    That happened at work. There were two modules that were key to
    some expensive hardware working correctly. Two designers had
    worked on the modules. There were *no comments*. Assembler
    level sequences (probably semaphores) were in there. After the
    two individuals left, eventually someone attempted to open the
    modules, and discovered the Chinese Puzzle inside. The management
    response was to lock the modules so they could not be changed.
    That's how "unsafe" working in there was.

    *******

    Adobe Photoshop Elements 2.0 *might* be pretty old. Could the
    program have existed during the JPEGLIB exploit era ? Could
    a new exploit be discovered by fuzzing ?

    We don't know. What Safe Hex should we use ? The safest.

    An exploit is pretty lame, if it requires a user to elevate.
    That would be a weak sauce. Normally people would not even
    bother to wait around for "UAC abusers" to happen along so
    they can tip over their machine. Any exploit issued on purpose
    these days, will be of the type to self-elevate, and it
    comes with its own burglars toolkit to do necessary jobs.

    For example, every malware issued, has the kit in it to
    ruin all the Restore Points, which is why in an incident
    where a machine is compromised, you just delete all the RP
    without even thinking about it (as the repair person).
    That's because, by experience, no malware worthy of the name,
    enters Windows without injecting copies of itself into the RP.
    There are actually SDK for malware, which have all the features
    as tick boxes.

    +-+
    | | Infect all Restore Points
    +_+

    That's how automated and organized the Black Hats are.

    If you read the articles about malware now, there can be
    a detailed description of the progression once inside the
    machine. But many of the articles also include the statement
    "we don't know how the code got inside the machine". The attack
    mechanism was shielded well enough, they cannot determine
    which library got tipped over, whether it was elevated or not.
    Again, the offense is winning at the stuff, the defenders not
    so much.

    When someone in another group, made comments showing their
    machine was exploited, would I be surprised that Windows Defender
    missed it ? Not surprised at all. WD is not known for heuristic
    detection features, and any unique attack code is just going to
    waltz right in ("signature not created for it yet"). While
    we use and trust WD for the job, as people who view the scoreboard
    for malware, the malware is winning and we are losing. We rate
    WD as being "as good as the average product in the ecosystem".

    This is why we take as few risks as is practicable.

    The only reason I don't have malware on the machine, is because
    no nation state picked me as a target. At the right time, they
    will tip over *all* the machines, in unison... And it is unlikely
    that even Safe Hex individuals will be shielded. I'm not being
    "smug" about this shit. I know I'm defenseless as long as
    the network cable is connected, and I move *any* files from
    outside the machine, inside the machine.

    Paul

    --- PyGate Linux v1.5.2
    * Origin: Dragon's Lair, PyGate NNTP<>Fido Gate (3:633/10)