About This Site I'm a Tech Guy for over 30 Years Knowledge of Computers, Networks, PC Gadgets. This site is to be used to share some of my knowledge and reviews
|
Yes I still have a 2008R2 Server but they will be replacing it hopefully soon.
When I tried to restore from a GOOD Windows backup (On a 4TB drive) I get this:
bmrui.exe – Application Error
The instruction at 0xff10b494 referenced memory at 0x00000000. The memory could not be read.
when attempt to restore system image from external hard drive.
Found the solution here
Basically I had to assign a drive letter from another PC and then re-attach it back to the server to do the restore.
Client had an issue with Exchange 2010 Information Store and Transport services stuck on starting. It also affected other services trying to start. After troubleshooting for awhile found a solution. Had to boot the server in Safe Mode in order to do anything with these services since they were stuck in starting. I changed the 2 services to disable at first. Rebooted in normal boot. Once running I changed them to Automatic with delay. I started the 2 services fine once other services started before.
One of my clients I just upgraded their PC from Windows 7 to 10. They have Office 2010 and everything was working except Excel could not see any network drives. All other apps are fine. I Googled it and came across this article. It did not help but let me search in a location that I would not expect. It described if the program is running as Administrator it might not see the network drives. I have came across this before. Usually in an elevated CMD Prompt. It also mentioned deleting a registry but would affect all Office. So I checked first for the Administrator. That was not the issue. The issue was for some reason the Excel icon was set to run in Windows XP compatible mode. Removed that and everything is back to normal.
2. Reset your WordPerfect printer settings:
- Windows Vista and Windows 7: Go to Start > All Programs > Accessories. Click Run, type “regedit” in the Open Box and click OK.
- Windows 8: On the keyboard, press Windows key + R. Type “regedit” in the Open Box and click on OK.
- All other versions of Windows: Go to Start > Run. Type “regedit” in the Open Box and click on OK.
3. In Registry Editor navigate to “PrintEngine” it is located in:
- HKEY_CURRENT_USER > Software > Corel > PrintEngine
4. Right click on the PrintEngine folder > Rename. Rename the folder to “PrintEngineOld”
5. Your printer information will be refreshed on the next launch of WordPerfect X7
Found this here.
Seems like you need to disable RSC
Quick way to disable Receive Segment Coalescing (RSC) via Powershell
Open Powershell (Admin)
Get the WiFi adapter’s NAME using
> Get-NetAdapter
Check to see if “Receive Segment Coalesing (RSC)” is on
> Get-NetAdapterRSC
a. True=RSC is enabled | False=disabled
If true use the following command to disable RSC
> Disable-NetAdapterRSC -Name Wi-Fi
Found the following HERE.
In the main (home) composition screen, from the top command bar select Format > Page > Page Setup. Select Setup tab. Under Page Definitions, highlight whatever paper size you’re using. Hit the “Edit” button below. Look at the “Source” window in the dialog box that appears. Change it from Manual to Auto Select. Hit OK to back all the way out. Done.
So I have used several browsers over the years. Netscape, IE, Firefox, Chrome, Opera, several IE replacements etc. I always go to Firefox. Customize, Full menu, Best Bookmarks etc. And one of the most secure browser ever. Oh and their add-ons are great.
Spam. Everyone gets it. If you have an email address you have all gotten spam. Maybe you have some really obscure address or you started with a spam filter from the beginning of email but that would be the minimal. We all get it. I try to encourage all my business clients to go through some spam hardware device to eliminate most. (Barracuda is a great example that some of my clients go through that eliminate a good percentage) Myself for my business I go through my ISP’s spam filter that is pretty good. Most spam filters have some control to limit spam at different degrees. Not any spam filter can catch everything. As the filters improve the bad guys spammers also improve so its a cat/mouse scenario. So what can you do. First try and go through a hardware spam utility before you even get the emails. That will likely eliminate 80% of the crap. Next is have a decent virus program. Sure I am an IT guy and I know what normally is a spam/scam/virus email. This is for the general public. For the general public they still need a decent virus protection if they do a lot of email. The problem with relying on a good virus protection is again the bad guys know how to get around it so they are usually ahead of the virus protectors so again don’t rely 100% on them. What might be more important than a good virus protection is knowing the difference between a legit email and a spam/scam/virus/ etc. People need to be educated on what could be real and what is fake. That is the best defense. I also have a Gmail account and they do a great job of filtering also but it does not catch everything. Education I believe is the best filter but not everyone can do it.
From Security Now Episode 776
A link to CheckPoint’s detailed write-up is in the show notes for anyone who’s interested. It’s very detailed and wonderful and takes us step-by-step through their process. But I’ll just hit the high points here: For every query type that a DNS server makes there’s a corresponding reply.What the CheckPoint guys found was a classic math result variable sizing mistake in the parsing logic for the reply to a “SIG” (as in signature) query which is part of DNSSEC.They discovered a mishandling of values between the 16-bit fields used by the DNS protocol and the 64-bit register math used by the code compiler. Coders know that if a 64-bit value is calculated to allocate memory, and if the result is larger than 65,535 (the maximum absolute quantity that can be represented by 16-bits), then the least 16-bits of that value will be a small integer — which is the amount of the overflow over 65,535. And if THAT smaller integer 16-bitvalue was then used to allocate memory for a buffer, the resulting buffer will be much too small to hold the larger calculated amount of data. And, of course, that’s exactly what happened.They discovered that by sending a DNS response containing a larger-than-64KB SIG record, they could cause a controlled heap-based buffer overflow of roughly 64KB more than a small allocated buffer. For hackers that’s the golden keys to the server kingdom.CheckPoint concluded their write by noting:This high-severity vulnerability was acknowledged by Microsoft and was assignedCVE-2020-1350.We believe that the likelihood of this vulnerability being exploited is high, as we internally found all of the primitives required to exploit this bug. Due to time constraints, we did not continue to pursue the exploitation of the bug (which includes chaining together all of the exploitation primitives), but we do believe that a determined attacker will be able to exploit it.Successful exploitation of this vulnerability would have a severe impact, as you can often find unpatched Windows Domain environments, especially Domain Controllers. In addition, some Internet Service Providers (ISPs) may even have set up their public DNS servers as WinDNS.We strongly recommend users to patch their affected Windows DNS Servers in order top revent the exploitation of this vulnerability.As a temporary workaround, until the patch is applied, we suggest setting the maximum length of a DNS message (over TCP) to 0xFF00, which should eliminate the vulnerability. You can do so by executing the following commands:
reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters” /v “TcpReceivePacketSize” /t REG_DWORD /d 0xFF00 /fnet stop DNS && net start DNS
Got a few calls and clients seem to be having this major issue. Searched and seems there was a MS update that has caused this. Found the following solution:
Run CMD as Administrator (Click start button and type cmd, right click on cmd.exe and run as administrator)
At the command prompt type the following command:
cd “\Program Files\Common Files\microsoft shared\ClickToRun”
then:
officec2rclient.exe /update user updatetoversion=16.0.6366.2062
For newer version type this one instead:
officec2rclient.exe /update user updatetoversion=16.0.12527.20880
It will then start download an update that should fix it.
|
|
Recent Comments