Hello everyone, today I will be talking about how to fix the error code 0x8024400A. Now this blog post ties in with my last one (How to Factory Reset Your Laptop) because after I had factory reset my laptop I had to update Windows XP. However, when I tried to update my laptop I got this error code: 0x8024400A. What followed was a series of Google search’s to try and find to fix to this problem.

What the problem turn’s out to be is that WUP (the program used to update Windows) is out of date and the way you usually update it is through Windows Updater. So it’s a nasty loop that you have to get out of. Luckily, you can update WUP via the Microsoft website. Follow the links below to download the updated WUP:

(32 bit) X86 – http://download.windowsupdate.com/windowsupdate/redist/standalone/7.4.7600.226/windowsupdateagent30-x86.exe
(64 bit) X64 – http://download.windowsupdate.com/windowsupdate/redist/standalone/7.4.7600.226/windowsupdateagent30-x64.exe

Once you’ve downloaded the file and installed it, restart your PC and try and update Windows XP again and it should work.

Hello there, today I will be talking about the Alfresco Buffer bug and how to fix it. The buffer bug happens on multiprocessor servers running Windows server 2008 R2 or Windows 7. This issue occurs because of a race condition in the Ancillary Function Driver for WinSock (Afd.sys) that causes sockets to be leaked. Over time the application won’t be able to create new sockets (causing a “no buffer zone available” exception to occur) and all the available sockets will be filled up. This will mean that you won’t be able to remote connect to your server until the server has been restarted. If you leave Alfresco server running over night and when you fail to access alfresco in the morning (and the only way to do so is to restart the Alfresco server) then you most likely suffering from the buffering bug. To confirm this, go to the alfresco log’s on your server (they should be located in the C:\Alfresco\tomcat\logs\ folder). When you are in there, look for this error : java.net.SocketException: No buffer space available (maximum connections reached?):. If you have this error then we can determine that you have the buffering bug. To fix this issue you need to download a hotfix from Microsoft. This hotfix applies to the following Operating Systems: Windows 7, Windows 7 SP1, Windows Server 2008 R2, Windows Server 2008R2 SP1. To download the hotfix, follow this link: http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=2577795&kbln=en-us Accept the terms and Agreement and you will have to fill out a form. In this form you select to hotfix you want (there is only 1 to select as the hotfix applies to all of the above OS’s) and fill in your email address. Once you have done this Microsoft will send you an email with a link to download the hotfix. Once you’ve downloaded the hotfix, do a back of your server (just in case) and install the hotfix. Once it’s installed, restart the server and start up the Tomcat and PostgreSQL server’s and see if it works by login into Alfresco. You will know if the hotfix is worked if you are able to access alfresco after a couple of hours. If this hasn’t worked then you need to contact Microsoft Support. I hope this article has helped you. Thanks for reading!

Hello everyone! Today I will be discussing how to add, and remove, contacts and calendars permissions for users of Office 365 by using PowerShell. This can be useful should you have trouble trying to add permissions over Outlook.
The first you need to connect to the Office 365 Exchange Powershell, open a Powershell session and enter these commands, providing your Office 365 admin account details when requested:

$cred = Get-Credential

$session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.outlook.com/powershell/ -Credential $cred -Authentication Basic –AllowRedirection

Import-PSSession $session

Now you can get on with the adding and removing user permissions.

Check current permissions
Before you start adding permissions, check if there are any existing permissions on the folder first. If a user already has permissions for another user’s contacts/calendar folder then you won’t be able to change them until the permissions are removed. To do this, type in the following code:

Get-MailboxFolderPermission -Identity [email protected]:\Calendar| Select User, AccessRights, Deny

Change [email protected] with which ever user you want to view. Also Calendar can be changed for Contacts if you want to view who has access to the contacts folder.

Add Permissions
Now that you know the permissions for the folder, you can start adding and removing. First we shall look at adding permissions. Before adding permissions for a user, decide which permission you would like to give them. Below are the options:

Owner
Create, read, modify, and delete all items and files, and create subfolders. As the folder owner, you can change the permission levels others have for the folder. (Does not apply to delegates.)
Publishing Editor
Create, read, modify, and delete all items and files, and create subfolders.
Editor
Create, read, modify, and delete all items and files.
Publishing Author
Create and read items and files, create subfolders, and modify and delete items and files you create.
Author
Create and read items and files, and modify and delete items and files you create.
Contributor
Create items and files only. The contents of the folder do not appear.
Reviewer
Read items and files only
Custom
Perform activities defined by the folder owner.
None
You have no permission’s. You can’t open the folder.

Once you’ve chosen the permissions you wish to give the user you can add the permissions using PowerShell. Use to following code to do this:

Add-MailboxFolderPermission -Identity [email protected]:\Calendar -AccessRights [Permission goes here] -User [email protected]

Replace the [email protected] with the mailbox you want to add permissions to and [email protected] to the mailbox you want to have access. Also change [Permission goes here] to whatever permission you wish to use from the list above.

Remove Permissions
Lastly, if you want to remove some permissions then you can use this line of code:

Remove-MailboxFolderPermission -Identity [email protected]:\Calendar -User [email protected]

I hope this has helped you. Thanks for reading!

There are many parts that cloud computing encompasses. One of those is Virtual desktops. A virtual desktop is one of many operating systems that are run off centralized servers that pool their resources together. A user would connect to the virtual desktop remotely from a device that has an internet connection. The VDI (Virtual Desktop Infrastructure) uses the server’s hardware to do all the processing and saving of data. Therefore, your own device is only used as a gateway to your virtual computer where all the work is done. How can they benefit me? A virtual desktop can benefit you in many different ways depending on your requirements. Below is a list of ways explaining how:

Cost:

One way they can benefit you is by saving you money on electricity. By using a virtual desktop you save your computer from having to do all the processing that it would usually do. Therefore, you will save money on electricity. Tied in with the last point is saving money on computer maintenance. With all the processing moved to the cloud, your computer will be running on minimal process. This would mean that your hardware will not get worn out as fast as a normal computer’s would. Also, being that a VDI is on a centralized server means that it can be easily accessed by a computer technician. This means they can diagnose and fix the problem faster than fixing conventional problems.

Flexibility

A great reason for using a virtual desktop is to extend the capabilities of what you can do on your PC. What I mean is that, unless you have a top of the range PC then you won’t be able to run everything and even then, depending on the operating system you are using, you won’t be able to run OS specified applications. For example, Say your computer is running Windows 7. It does the majority of things that you want to do. However, for work you need to use an application that you can only use on Apple Mac’s to get your work done. With a virtual desktop you could have VDI with Mac OS installed on it in a short period of time. Also, with a VDI, they can be changed on the fly. Things like memory, upgrades, applications etc. can all be added while VDI is in use. This means there is far less down time is needed for maintenance and to upgrade the VDI.

Connectivity

A great thing about Virtual Desktops is their ability to be used anywhere. By having your virtual desktop in the cloud, all you need to access it is a PC with an internet connection. This would be very handy for someone who works from home or moves around a lot for work. As long as they have a PC and an internet connection they would be able to access all their documents, emails, and applications etc. from the virtual desktop.

In this day of age lots of people have portable devices. Along with laptops there are also tablets and smart phones that users choose to bring into work and use. This is called Bring Your Own Device (BYOD). BYOD can make things more convenient for the user by giving them preference over what hardware and software they use. However, this gives the company issue for these reasons:

  1. Can introduce viruses onto the network: Devices that belong to the company will be heavily regulated by the IT department. The computers will have full anti-virus software installed on with strictly controlled firewalls and website blocking to prevent any viruses getting on the network. A user’s own device isn’t heavily regulated. They may have anti-virus on their device (they’d be silly not to) but this won’t necessarily stop them getting infected. If the device is being used for personal use only then it won’t be a problem for the IT department or the company. But when the user brings in the device to work, connects it to the network and start’s sending out emails to colleagues then you could see the office quickly becoming contaminated with viruses. This will be a nightmare for the company as it will take a while to clear the computers of viruses and get the office back online. This brings me to my second point.
  2. Compromising of company data: With the rise of cyber-crime, company data has become a valuable and tightly guarded asset. All this data will be kept on encrypted servers behind firewalls and locked doors. All these measures would make it very hard for a potential hacker to get to the data, but with BYOD this can all be compromised. If a user does some work on sensitive data from their own device then they could compromise by having little safe guards against hackers but also, should they take the data out of the company building, they could compromise the data by accidentally leaving their device in a place that could be stolen or the person accidentally loses it in a public place (that has happened before with Government officials leaving laptops and USB sticks on the train).
  3. Technical Issues: With company devices, everything is uniform. All the computers would have the same software, hardware and applications which make it easier for IT support to fix potential issues. With BYOD you’ll find lots of different devices with different specifications. This makes it a lot harder for IT support to fix issues due to being unfamiliar with technology and the quagmire of apps the user would have on their device. It also issues with hardware and software compatibility. For example: a user brings in their MacBook Pro to do work on and uses an Apple application to do work. He then sends this work to his colleagues (who are using Windows based devices) and they are unable too view his work because they haven’t got the software to view the file.
  4. There are ways round the problems cause by BYOD. One of these is the use of VMware Virtual Machines (VM’s).
    The use of VM’s could completely negate the risks of BYOD if it’s implemented properly. This is how it would work: The user would bring in their device to work. Once in they would setup the device, connect to a public network (this would give them internet access without putting the, potential infected, device on the same network as other, more secure devices on the company network). Once connected to the network they can open up startup their company VM and do their work on the VM.
    By doing their work on the VM over a public network then this would mean the device isn’t in contact with any other company device on a private network. That way, viruses won’t be able to spread to the company devices and infect them.
    Also, by using VM’s, company data can’t be physically taken off site. If the user takes their device off site then the company data won’t leave with them because it will be on their VM. That way, should they lose their device or it gets stolen, no untrusted third parties would be able to view the data as they would not have access to the VM.
    The use of VMware VM’s also cuts out the issue of troubleshooting and hardware & software compatibility issues. The VM’s can be created from templates meaning that all users would be using the same applications whilst working from their own devices. Should a problem occur with the VM then IT support can fix quickly (and easily) from their own computers.

Hello everyone, today I will talking about recovering deleted emails and item using PowerShell. Occasionally accidents happen and important emails or things like calendar events get deleted. If you are unlucky you won’t be able to recover the deleted items the easy way over Microsoft Exchange server and will have to use PowerShell. Below are the steps to take to do this:

  1. Make Sure you are a member of the Discover Management Role Group Before you can recover the deleted item, you need to be a member of the Discover Management Role Group (DMRG). This will allow you to search for messages across multiple mailboxes in your organization. If you are not a member of the DMRG then follow this link that will show you steps to assign yourself that role: Link
  2. Startup PowerShell and put in your credentials, where you’re getting the sessions from and importing The next thing to do is start up PowerShell. Type in the code below: $cred = Get-Credential This get the credentials for the exchange server.$session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://ps.outlook.com/powershell/ -Credential $cred -Authentication Basic –AllowRedirection This sets up a connections with the exchange server Import-PSSession $session This will import the sessions.
  3. Search for and recover the email Now that PowerShell is setup we can move onto recovering the deleted item. Note: items in square brackets [example] are to be replaced by your requirements.To retrieve a single item follow these steps: First you need to search for the email: search-Mailbox [user] -SearchDumpsterOnly -SearchQuery [search query] -TargetMailbox "Discovery Search Mailbox" -TargetFolder [search name] -LogLevel Full Once you’ve found the item you can recover it: Search-Mailbox "Discovery Search Mailbox" -SearchQuery [search query] -TargetMailbox [user] -TargetFolder inbox If you wish to recover all permantely deleted items from the purged items folder run this line of code: Search-Mailbox [email protected] -SearchDumpsterOnly -TargetMailbox "Discovery Search Mailbox" -TargetFolder RecoveredItems -LogLevel Full
  4. I hope this blog post has helped you. Thank you for reading!

Hello everyone. Today I will be talking you through how to fix the search function for Alfresco 4.0d. Out of the box, Alfresco’s search function runs on solr. However, solr doesn’t work properly on Alfresco 4.0d so when you try to search a document Alfresco will come back with no results. To fix this you will need to switch from solr to Lucene which will require a bit of script altering. To do this, follow these steps:

  1. Stop Alfresco
    Before we start editing alfresco’s we first need to turn it off. This will then allow you to edit the files required to setup Lucene. To do this go to your alfresco server and start up the alfresco manager tool. Once in go to the “Manage Application” tab and click the “Stop All” button. This will shutdown alfresco completely.
  2. Edit the file Alfresco-global.properties
    Once alfresco has been stop you’ll need to edit the alfresco-global.properties file. This will be located at: alfresco\tomcat\shared\classes\alfresco-global.properties. This file is responsible for all the base setting for alfresco, including the database. The segment of code that you are looking for is:

    ### Solr indexing ###
    index.subsystem.name=solr
    dir.keystore=/keystore
    solr.port.ssl=8444

    You will need the edit some of this to setup Lucene. You’ll need to replace solr with lucene in the line index.subsystem.name=solr, hash tag out the lines dir.keystore=$(dir.root)/keystroke and solr.port.ssl=8444. You will also need to add in index.recovery.mode=FULL. This will re-build the index so that lucene will work. This is what you’ll need to change it to:

    ### Solr/lucene indexing ###
    index.subsystem.name=lucene
    index.recovery.mode=FULL
    #dir.keystore=/keystore
    #solr.port.ssl=8443

    Once that is done, save the file and start up alfresco so that the index can be re-built.

  3. Stop Alfresco, edit alfresco-global and delete some folders and files
    Once the index has been re-built you’ll need to stop alfresco to do more editing. First things first, get alfresco-global.properties open and go to the section we edited in the last step. You’ll need to change the index.recovery.mode to the following:

    index.recovery.mode=AUTO

    Once that is done you need to delete the following folders and files:

    • Alfresco\ald_data\solr
    • Alfresco\tomcat\conf\Catalina\localhost\solr.xml
    • Alfresco\tomcat\webapps\solr

    Once those folders and file have been deleted you can start up Alfresco again with Lucene in place of solr. The search function should now work.
    Thank you for reading.

Hello everyone. Today I will be talking about how to fix word toolbar options not being saved. This fix can also be applied to toolbar options that are permanently grayed out as well. Word is a very easy tool to personalize. The options tab gives you the ability to change the toolbar to the way you want it. However, sometimes Word won’t save your option changes. This can be caused by the toolbar cache being corrupted.

To fix this issue you need to go onto the Registry Editor. Registry editor tool that gives you access to all the registry caches. To access it you need to go to start > Run and then type in “regedit”. This will bring up the registry edit tool. Using this you’ll need to Software > Microsoft > Office > 14.0 (this depends on what version of office you have. i.e., you could be using 8.0) > Word > Data.

Once you are in the data folder you need to look for a cache named “Toolbars”. Once located you can either delete the cache or (if you want to play it safe) rename to cache to “toolbar_old”. This way you can revert to the cache should you need too. If you really want to play safe then you can also backup the original cache.

Once that is done close down RegEdit and restart word. You should now be able to save your options. Test this by changing some options, restarting word and then check if the options remain. Then try restarting your PC and checking the options remain the same after that. If they do then it should be working.

Thanks for reading!

Hello everyone. Today I will be talking about how to turn off Add-Ins in Microsoft Office. Add-ins are software that is added into Microsoft Office applications to, usually, allow them to work in conjunction with other applications. An example of this would be a database application that contains customer details and has letter templates. When you click on the letter template the template will open up as a document in Word. This is due to the add-in that would have been automatically installed on Office when the application has been installed. This allows for better integration amongst numerous applications.

However, sometimes these add-ins from 3rd party software can cause issue’s with office. On occasion I have seen them have effects on Office applications that cause Office to either not work the way it should or not work at all. in these instances, you should disable the add-ins one at a time to determine if any of them are causing the issues. To do this you need to:

  1. In the affected Office application, go to File and then click on Options. This located on the left hand side between Help and Exit
  2. Once in the options control panel, click on the add-In’s tab. This is located on the lower left hand side of the control panel
  3. The Add-in’s Panel will display all the Add-ins that are active, inactive, document related and disabled. At the bottom is a drop down list of Add-ins to manage. Choose “COM Add-Ins” and then click “Go…”.
  4. You should now has a list of all the COM add-ins. If they have a tick next to them then they are active. If they don’t then they are inactive. To deactivate the ad-in just un-tick the box next to a particular add-ins and press ok. You can also remove or add add-ins in this panel.

If you can’t even do that (I have had an instance when an add-in had not allowed access to file tab to I couldn’t access the options) then you should start up the Office application in safe mode. To do this click on start and type in the search bar the name of the application followed by “/safe”. This will start up the application with all add-ins disabled and will allow to try try and (hopefully) find what is wrong with Office and fix it.

I hop ethis has helped you. Thanks for reading!

Hello, today I will taking you through the steps of how to setup a POP and IMAP email account on Outlook. When it comes to manually setting up an email account, you have 2 options (depending on where your exchange is). The first is to point outlook to a Microsoft exchange server or an equivalent. You would use this if you run your email off Office 365 or an exchange server provider. The other would be to point outlook to a SMTP and POP server. You would use this is you have your own email servers setup with POP and SMTP. Before you setup your POP email address you will need your email address, password and the Domain Name’s of the POP and SMTP servers.

  1. To add the email account go to Outlook and click File > Info >Add account. This will start up the account wizard immediately. Alternatively you can add an email address by going to start > control Panel > mail. Once you’re on Mail you can wither click on Email accounts which will take you to the account setting of default profile or, if you wish to add the email account into a different profile, click on “Show profiles” and then select to profile in which you wish to add the email account into. This will then take you in Account Setting panel as well. Once in the Accounts Settings panel click on the “New..” button in the top left hand corner to start the “Add New Account” wizard.
  2. Once you’re on the “Add new Account Wizard” click “Manually configure server settings or additional server types” and click next. Then choose “Internet Email” to and click next.
  3. Once in the “Internet Email Settings” panel you can start filling in the information. In the “server Information” section, choose whether the server is uses POP3 or IMAP and then enter the server Domain name. This would likely be along the lines on “mail.example.com”. Fill in your server login in details and click “Test Account Settings..” to make sure you have a connection to the server and that you can login into it.
  4. Once you’ve established a connection with the server click “More Settings”. In the General tab fill in the reply email section. This is usually the same as your email address. If you are using an internet service providers SMTP server go to the “Outgoing Server” and tick “My outgoing server (SMTP) requires authentication”. Click on the advanced tab to check the ports are set to 110 and 25. Once done click OK and then next. Your POP email address should now be setup.

Thank you for reading.