Some light reading… Not I.T. but does relate to it.

Live serves up its lessons in funny ways sometimes.
In the master bedroom there is a ceiling fan. It has a rotating fan switch that allows you to select multiple speed for the fan from the wall switch, High, Medium, and Low. There is no need to pull the chain.
It worked when we moved in and worked for years afterwards. Shortly after having our kitchen and bathroom remodeled it started acting a little funny. The ceiling fan would turn on by using the wall switch, but it would only work on one speed, Low speed. Turning the knob to High or Medium did nothing.
Because it occurred within a few months of the remodel and because our house’s wiring has always been a little bit flakey anyway, I figured that there must be some sort of electrical problem.

I checked the wiring in the switch box. All good.
I checked the wiring in the ceiling fan box. All good.
I checked the fuse box (which is actually a circuit breaker box, who knew?). Good as far as I could tell.
I boned up on electricity and how home electrical systems work. I did Internet research. I read books. I checked out more books from the library. I read How To websites. I read forums for electricians, homeowners, contractors, and do it yourselfers.

I bought a Voltmeter to test with. All good.
I bought an electrical outlet tester to make sure no outlets were miswired, or missing their ground connection, or whatever.

Finally, for whatever reason, I bought a new ceiling fan switch. I knew it wouldn’t work, but it was cheap and I figured what the heck.

I changed the ceiling fan switch out, and rewired it exactly like it was before.
Guess what?
IT WORKED!

I fixed the ceiling fan by doing the most obvious thing there was. I would have started there in our last house which was a new construction house in the suburbs, but because our house was older, with some quirks and because we had recently remodeled, I assumed it was something to do with the house, not something obvious.

Today’s Life Lesson
Don’t make things harder than they are.

The simplest answer is usually the right one.

Everyone already knows this. Don’t let the circumstances or current situation distract you from this truth. Whether it’s a problem at work, at home, with your car, or with your house, always start at the easiest possible thing to try and then work your way up to the harder stuff. It will save you a lot of trouble.

Talk to your boss or your spouse. Fill up your car’s gas tank and check the oil and other fluids. Do these things before moving on to elaborate schemes, carefully crafted letters or emails, or changing things like the serpentine belt.
Start easy. It will work most of the time, and that means that more of your problems will be easier to solve instead of more of your problems being harder to solve.

How to fix Server Manager Errors after installing updates (HRESULT:0x800F0818 / HRESULT:0x800B0100)

Symptoms
You install several Updates. After the successful installation, you notice you cannot add or remove features/roles in the Server Manager.

Error: Unexpected error refreshing Server Manager: Exception from HRESULT:0x800F0818

Alternatively you can also get:
Server Manager: Unexpected error refreshing Server Manager: No signature was present in the subject. (Exception from HRESULT: 0x800B0100)

Resolution

First you run the Microsoft Update Readiness Tool located here: https://support.microsoft.com/kb/947821
After the scan has completed check: C:WindowslogsCBSChecksur.log. You should see the following errors:

Checking Package Manifests and Catalogs
(f) CBS MUM Corrupt 0x00000000 servicingPackagesPackage_for_KB978601~31bf3856ad364e35~amd64~~6.0.1.0.mum Expected file name Package_for_KB978601_server~31bf3856ad364e35~amd64~~6.0.1.0.mum does not match the actual file name
(f) CBS MUM Corrupt 0x00000000 servicingPackagesPackage_for_KB979309~31bf3856ad364e35~amd64~~6.0.1.0.mum Expected file name Package_for_KB979309_server~31bf3856ad364e35~amd64~~6.0.1.0.mum does not match the actual file name

Or

(f) CBS MUM Corrupt 0x800B0100 servicingPackagesPackage_for_KB978601~31bf3856ad364e35~amd64~~6.0.1.0.mum servicingPackagesPackage_for_KB978601~31bf3856ad364e35~amd64~~6.0.1.0.cat Package manifest cannot be validated by the corresponding catalog
(f) CBS MUM Corrupt 0x800B0100 servicingPackagesPackage_for_KB979309~31bf3856ad364e35~amd64~~6.0.1.0.mum servicingPackagesPackage_for_KB979309~31bf3856ad364e35~amd64~~6.0.1.0.cat Package manifest cannot be validated by the corresponding catalog

Or

(f) CBS MUM Missing 0x00000002 servicingpackagesPackage_114_for_KB955839~31bf3856ad364e35~amd64~~6.0.1.0.mum
(f) CBS MUM Missing 0x00000002 servicingpackagesPackage_83_for_KB955839~31bf3856ad364e35~amd64~~6.0.1.0.mum

Further down you will see:

Unavailable repair files:
servicingpackagesPackage_for_KB978601~31bf3856ad364e35~amd64~~6.0.1.0.mum
servicingpackagesPackage_for_KB979309~31bf3856ad364e35~amd64~~6.0.1.0.mum
servicingpackagesPackage_for_KB978601~31bf3856ad364e35~amd64~~6.0.1.0.cat
servicingpackagesPackage_for_KB979309~31bf3856ad364e35~amd64~~6.0.1.0.cat

These files need to be copied into: %systemrootWindowsServicingPackages

1. You first need to gain control over that folder. In order to do this use the following commands:

This makes the current logged on user (needs to have Administrative privileges) owner of that folder:
takeown /F c:WindowsServicingPackages /D y /R

Then assign full control using:
cacls c:WindowsServicingPackages /E /T /C /G “UserName”:F

This will grant you full control over the directory.

Optionally you can download this ZIP. Inside you have 2 REG Files. If you install TakeOwnership.reg you will have a handy Take Ownership entry in the right click menu every time you use it on a Folder.

clip_image001

2. Now you need to gather the missing or corrupted files from the checksur log:

– Download the KB Files for the missing files:
servicingpackagesPackage_for_KB978601~31bf3856ad364e35~amd64~~6.0.1.0.mum

– Unpack them using the following command:
Expand -F:* UpdateKBXXXX.msu x:DestinationDirectory

After you expand you will see a UpdateKBXXXX.cab File. Expand it as well:
Expand -F:* UpdateKBXXXX.CAB x:DestinationDirectoryCAB

Inside of this cab you will need to grab 2 files: update.mum and update.cat

3. Rename the gathered update.mum and update.cab files exactly as they are specified in the checksur.log:
Ex.: update.mum for KB978601 will be:

Package_for_KB978601~31bf3856ad364e35~amd64~~6.0.1.0.mum

Do the same for all the other missing/corrupt files and place them into the directory specified in checksur.log (/servicing/packages)
After these steps the problem should be fixed. No reboot required.

If the Server Manager is not working even after doing these steps, run the Update Readiness Tool again and double-check the steps described above.

Tudor Dimboianu
– Support Engineer / Enterprise Platforms Support (Core)

Critical vulnerability in Firefox 3.5 and Firefox 3.6

5.11.10 – 09:50am

Firefox updates and patches are now complete. Just opening Firefox will update these vulnerabilities and update for you automatically.

26.10.10 – 02:30pm

Issue:
Mozilla is aware of a critical vulnerability affecting Firefox 3.5 and Firefox 3.6 users. We have received reports from several security research firms that exploit code leveraging this vulnerability has been detected in the wild.

Impact to users:
Users who visited an infected site could have been affected by the malware through the vulnerability. The trojan was initially reported as live on the Nobel Peace Prize site, and that specific site is now being blocked by Firefox’s built-in malware protection. However, the exploit code could still be live on other websites.

Status:
We have diagnosed the issue and are currently developing a fix, which will be pushed out to Firefox users as soon as the fix has been properly tested.

In the meantime, users can protect themselves by doing either of the following:

Credit:
Morten Kråkvik of Telenor SOC

Microsoft is due to issue its biggest ever Patch Tuesday, with 16 bulletins set to be addressed.

Microsoft has planned its biggest ever Patch Tuesday for October, with a total of 49 vulnerabilities set to be fixed.

This is over three times the number of security holes fixed in last month’s Patch Tuesday.

Of the 16 bulletins, four have been rated critical, where the flaws could lead to remote code execution. These four affected all versions of Windows.

One of the critical vulnerabilities affects Internet Explorer versions 6, 7 and 8, whilst two of the flaws, classed as “important,” affected Microsoft Office – one for Word and one for Excel on all platforms.

This Patch Tuesday announcement also marked the first time Microsoft Word 2010 had been included in an advisory.

The vulnerabilities are due to be patched on 12 October.

Why did Netregistry go down on the 28th Sep 2010??

The loose-knit confederation of internet activists who organise under the banner “Anonymous” appeared to hit Australia again this morning, with Operation Payback targeting a distributed denial of service (DDoS) attack against the Australian Federation Against Copyright Theft (AFACT).

AFACT represents a number of content producers such as movie and television studios and aims to reduce the impact of copyright infringement in Australia. The group has been involved in a high-profile lawsuit against national broadband provider iiNet. DDoS attacks attempt to cripple internet infrastructure through delivering a flood of data to servers and network infrastructure.

“Realise, you are forcing our hand by ignoring us. You forced us to DDoS when you ignored the people, ATTACKED the people, LIED TO THE PEOPLE! You are forcing us to take more drastic action as you ignore us, THE PEOPLE, now,” an individual claiming to represent Anonymous stated in a letter released before the attacks.

Anonymous is well known in Australia’s technology sector for what appeared to be several similar DDoS attacks earlier this year against Federal Government websites and other communications systems in protest against Labor’s mandatory internet filtering policy.

Three and half hours after the attacks were timed to begin on the AFACT site, AFACT and hosting partner Netregistry experienced the effects – with the copyright group’s site going down at 8AM this morning. This story was broken, to our knowledge, by iTNews.

“The attack consisted of 60,000 active HTTP connections and an approximate 100 megabits per second of additional bandwidth being transferred from this particular cluster where the site was located,” a Netregistry spokesperson said, adding that the attacks mainly originated from Chile and Columbia.

“The AFACT website was offline due to Netregistry engineers suspending it as the target of the attack. All other sites on the shared infrastructure remained operational, albeit with some service degradation,” they added. Anonymous had planned to attack AFACT for at least 12 hours.

“We’re delighted to say our infrastructure proved to be highly resilient in the face of a particularly heavy and determined DDoS attack. All affected websites remained online and were back to full performance reasonably quickly, only experiencing intermittent connection problems throughout the day,” said Netregistry chief executive Larry Bloch.

“Of course, the very nature of a DDoS attack means prevention is impossible. However, a combination of our cloud hosting infrastructure and active management dramatically reduced the potential impact for thousands of affected businesses.”

“This incident vindicates our multi-million dollar ten year investment in our shared cloud hosting infrastructure. It is remarkable that a shared cloud hosting service costing our clients around $10 per month withstood one of the hacker community’s most determined, coordinated DDoS attacks without failing.”

The AFACT attacks also affected other Netregistry sites – although an exact figure on how many sites was affected hasn’t been released. Sites affected ranged from small businesses to government sites. The hosting company posted a statement on its website for customers to make them aware that the organisation knew what was going on and what measures were been taken.

“Impact to the cluster during the peak of the attack resulted in performance degradation to websites. However, the unique cloud hosting infrastructure pioneered by Netregistry was able to scale up and carry the additional load without failing,” said a Netregistry spokesperson.

“There were some minor ancillary issues discovered during the attack that affected our infrastructure, but these were promptly resolved as they were identified with minimal customer impact.”

“No loss of data occured, the services resumed operation once the attackers IP ranges were blocked. Email was delayed in delivery, however no bounces were caused by the issue,” the site added. The Netregistry site stated that “Zeus cluster (PHP clients not utilising Apache)” had issues.

AFACT executive director Neil Gane said that this was the first attack of its kind experienced by AFCT. The executive was unable to comment on the estimated damage the attacks caused or what measures AFACT would take to identify the attackers and if they would be referring to authorities. The organisation’s site is back up at time of publication.

The attacks on AFACT follow an onslaught of attacks on Stichting Bescherming Rechten Entertainment Industrie Nederland, the Motion Picture Association of Australia, the Recording Industry Association of America (RIAA), the British Phonographic Industry (BPI) and Aiplex Software an Indian software firm that was hired to launch a DDoS attack on peer to peer hub the Pirate Bay.

Read more: https://www.news.com.au/technology/anonymous-targets-afact-with-operation-payback/story-e6frfrnr-1225931688025?area=technology#ixzz10t1dijMi

MS Office 2007 / 2010 upgrade protection

Have you purchased Office 2007 since March 5th, 2010?  If so, you can now activate and download your free upgrade to Office 2010.

Microsoft Office 2010 has just been released and ready to be purchased however if you purchased a new copy of Office 2007 or a new computer that came with Office 2007 since March 5th, 2010, then you’re entitled to an absolutely free* upgrade to Office 2010.

Get your Office 2010 upgrade now