Hello there, today I will be talking about the Alfresco Buffer bug and how to fix it. The buffer bug happens on multiprocessor servers running Windows server 2008 R2 or Windows 7. This issue occurs because of a race condition in the Ancillary Function Driver for WinSock (Afd.sys) that causes sockets to be leaked. Over time the application won’t be able to create new sockets (causing a “no buffer zone available” exception to occur) and all the available sockets will be filled up. This will mean that you won’t be able to remote connect to your server until the server has been restarted. If you leave Alfresco server running over night and when you fail to access alfresco in the morning (and the only way to do so is to restart the Alfresco server) then you most likely suffering from the buffering bug. To confirm this, go to the alfresco log’s on your server (they should be located in the C:\Alfresco\tomcat\logs\ folder). When you are in there, look for this error : java.net.SocketException: No buffer space available (maximum connections reached?):. If you have this error then we can determine that you have the buffering bug. To fix this issue you need to download a hotfix from Microsoft. This hotfix applies to the following Operating Systems: Windows 7, Windows 7 SP1, Windows Server 2008 R2, Windows Server 2008R2 SP1. To download the hotfix, follow this link: http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=2577795&kbln=en-us Accept the terms and Agreement and you will have to fill out a form. In this form you select to hotfix you want (there is only 1 to select as the hotfix applies to all of the above OS’s) and fill in your email address. Once you have done this Microsoft will send you an email with a link to download the hotfix. Once you’ve downloaded the hotfix, do a back of your server (just in case) and install the hotfix. Once it’s installed, restart the server and start up the Tomcat and PostgreSQL server’s and see if it works by login into Alfresco. You will know if the hotfix is worked if you are able to access alfresco after a couple of hours. If this hasn’t worked then you need to contact Microsoft Support. I hope this article has helped you. Thanks for reading!

RPC over HTTP provides a connection to exchange servers, from outside the organization, without the need of a VPN connection. This is great thing if it works, but very hard to troubleshoot when it goes wrong and even harder troubleshooting somebody else’s server when you have no idea what  it is that has changed to break it. I’ll mention a great tool to point you in the right direction of troubleshooting as there is so much which could go wrong and blindly trying it all might even damage your server more. This tool was created by Microsoft and is found at https://www.testexchangeconnectivity.com This is one of the best things from Microsoft. It helps to narrow down the issue to the exact part which is not working correctly. I was getting this message: The connection to the Microsoft Exchange Server is unavailable. Outlook must be online or connected to complete this action. I have had this problem before, but it’s not quite the same problem, so before you spend hours searching or guessing what the problem is, consider running the connectivity test and then pick the solution. My problem of course was not only one, but multiple issues. Easy solutions to this problem:

  • Check all required exchange services are started (system attendant etc.)
  • Check event log for any errors related to this problem.
  • Re-install RPC over HTTP (add/remove windows components)

If any of these worked, then great, if not here is the harder part: Run the RPC over HTTP exchange analyzer, what the results showed for me was issue with the RPC ports. This is very useful tool to set your registry to the correct values http://www.petri.co.il/software/rpcnofrontend.zip remember to restart the server after making the change and backup your registry before, just in case. To check the port settings see following registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Rpc\Rpcproxy – required ports are 6001,6002 and 6004, strange range of ports up to 5000 was set in my case. Re-running the connectivity analyzer then showed an error with the GAL, which I suspected earlier, but being part of multiple issues this wasn’t resolved as I have reverted my changes back to original. I then remade the change to the GAL permissions, which should be list, read and open address list and the issue was solved!!! The easiest way of all to fix this problem is to migrate the customers email to our new Cloud Email offering and put the SBS 2003 server to rest and no longer have to worry about supporting Exchange.

Hello there. Today I will be discussing why small to medium sized businesses should invest in a fully integrated cloud infrastructure over a traditional IT model. Cloud technology has been around for a couple of years now and (with all things technical) businesses have been slow to adopt it. Most big businesses have taken the step to the cloud yet small to medium sized businesses are still choosing to take up the traditional IT option (physical desktops, on site storage etc.). So below I’ve made a list of reasons why small businesses should move to the cloud.

  1. Flexibility Flexibility is a very important aspect to small and medium sized businesses. Being flexible allows them to manoeuvre and adapt to the ever changing business and economic climate we live in. So, how come they don’t apply that to their IT? The traditional business model for IT is only as flexible if you are willing to pay a lot of money. For example: as an owner of a business, you need a server to do specific tasks. However, to make the most of that server you will need to think 5 years ahead to decide on its requirements. So, to make it flexible in the future, you have it run on up to date hardware, the latest software and a lot of disk space for expansion. By doing this, you now have a high end server that should be able to meet future requirements. However, to get that ability you are now down by a large sum of money. Also, given that technology advances at a fast rate, you’ll find that (after a couple of years) your server will struggle to meet the demand of the tasks you give it. You’ll then have to pay more money to either improve performance or upgrade to a new server. In comparison, using a cloud server will already give you that flexibility from the word go. A cloud server can be changed and adapted to your needs in a matter of minutes. If you need more disk space more can be added in a few clicks. Software can be added in a couple of clicks. This gives you a degree of flexibility that you wouldn’t be able to achieve with a traditional IT model. By taking the cloud route, you can adapt your IT to whatever your requirements are in a short amount of time and for a low cost. Flexibility can also be used in terms of maintaining your IT systems. A problem with a desktop will take longer to fix than a cloud desktop as a technician would have either have to try and fix the problem remotely or come on site to fix the problem. If the technician would have to come on site then the down time is a lot longer as you’d have to wait for the technician to arrive. By having your IT systems in the cloud the technician would be able to take control of your computer and have the issue fixed in a shorter period of time.
  2. Security Your data is the most important asset to your company. Should your data become compromised or destroyed then your company will struggle to recover it. With the traditional IT method, you’ll setup up your computer and servers to backup regularly, encrypt any data you store and have anti-virus installed. These measures should protect you against most threats such as viruses and unforeseen technical malfunctions. However, will it protect it from a major disaster? Should your company experience a major disaster (such s a flood or a fire) then you’re looking at major downtime in your business and lost or unrecoverable data. This, potentially, could be an event that your business won’t be able to recover from. By using utilising the cloud you can avoid these threats. Having all your data stored on the cloud takes away the risk of localized threats. For example: when using a cloud desktop you connect to the desktop over the internet. All the work that is done on that cloud desktop stays in the cloud. Should your PC break then all you have to do is go to another computer (that has an internet connection) and access your cloud desktop from there. All the work you were working on will be left the way it was when your PC broke. So should your whole office go down none of the work that you or your employees were working on will be lost. The same principle goes for data storage. With your servers in the cloud you will be able to easily access your data once you have a site setup.
  3. Cost There are two main subjects when to the cost of IT: the cost to run those IT systems (electrical usage) and the cost to maintain those systems. With the traditional IT model the cost is far higher. Even with the advancement of technology your standard desktop still uses a lot of electricity. The same goes to your on site servers, which you should keep running 24/7. The cost to run these IT systems will increase each year as electricity prices go up and your PC goes out of date (in terms of technology). Over those years your PC’s and server’s will also degrade. The standard life span of a desktop is 3 years and in those 3 years the cost of maintenance will go up as your desktop struggles to cope with the tasks it’s given. This changes when you move to the cloud. A number of places offer thin clients to access your cloud desktop to access your cloud desktop. These are, essentially, compact desktops that run on minimum hardware. The hardware itself is barely used as all the work is done on the cloud desktop itself. By using these you reduce electricity costs as far less electricity is being used. Maintenance costs also go down because a thin client has far less to go wrong with it. Since the hardware is barely being used the thin client degrades at a far slower rate, meaning it lasts far longer.

I hope you have found this blog article interesting. Thank you for reading.

Hello everyone, today I will be talking about how to fix the error code 0x8024400A. Now this blog post ties in with my last one (How to Factory Reset Your Laptop) because after I had factory reset my laptop I had to update Windows XP. However, when I tried to update my laptop I got this error code: 0x8024400A. What followed was a series of Google search’s to try and find to fix to this problem.

What the problem turn’s out to be is that WUP (the program used to update Windows) is out of date and the way you usually update it is through Windows Updater. So it’s a nasty loop that you have to get out of. Luckily, you can update WUP via the Microsoft website. Follow the links below to download the updated WUP:

(32 bit) X86 – http://download.windowsupdate.com/windowsupdate/redist/standalone/7.4.7600.226/windowsupdateagent30-x86.exe
(64 bit) X64 – http://download.windowsupdate.com/windowsupdate/redist/standalone/7.4.7600.226/windowsupdateagent30-x64.exe

Once you’ve downloaded the file and installed it, restart your PC and try and update Windows XP again and it should work.

Hello everyone, today i will be discussing Bit coins. Some of you may already know of Bit Coins but the large majority will never have heard of it. So I will be explaining to you what they are, how you obtain them and what you can use them for. What are Bitcoins? Bit Coins are an online currency (also know as e-cash) that was created in January 2009 by Satoshi Nakamoto. Satoshi is a cryptographer who came up with the Bit Coin Protocol. Bit coins are similar to that of local currency (such as that of town’s that have their own currency that you use in local shops) in the sense that the worth of the Bit Coin is decided by the online community. The worth of the Bit Coin will fluctuate depending on the amount and size of transactions though, unlike national currencies, the value of the bit coin can quickly recover. At the time of typing this, 1 Bitcoin (BTC) is equal to £8.239GBP or $13.32USD. Bit Coins come in 3 varieties: You have the Bitcoin (1), the Bitcent (0.01) and the Satoshi (0.00000001). All of these can be earned and traded over the internet like normal currency. These will be kept in your Bitcoin wallet on your computer. These wallets have their own, unique address (like a bank account number) that will be used to make transactions. The worth of the Bit Coin will fluctuate depending on the amount and size of transactions though, unlike national currencies, the value of the bit coin can quickly recover. How does it Work? Like all currencies, Bitcoin relies on the communities trust in the exchange for it to have value. By the community having trust in Bitcoin people will use, buy and sell Bitcoin. if no-one has trust in Bitcoin then no-one will use it. Unlike normal currencies, Bitcoin doesn’t have a centralized body that issues Bitcoins. Instead, Bitcoins are rewarded to “Miners” whom then sell their Bitcoins onto the community. The miners themselves are individual’s that are all connected to the Bitcoin network who either work by themselves or in groups (this will be discussed later). The number of bitcoins that can be “mined” is set at 21 million (at time of writing there are currently 11 million Bitcoins in circulation). Once 21 million Bitcoins have been mined no more will be created. This is outlined by the protocol that Satoshi came up with. By people abiding by the protocol and trusting in the currency is what gives Bitcoins their worth and makes the system work. In order to make counterfeiting impossible, all the transactions are stored on an online database called the block chain. The block chain is formed of blocks. Blocks are list of all the transactions that took place in the space of 10 minutes. Once that 10 minutes is up the block is added to the block chain and a new block is started. Once 6 blocks are put on top of each other the block chain the consensus solidifies so it becomes impractical to alter the transactions for your own gain. These blocks must meet constraints, dictated by the network, before they are added to the block chain. This mean that it is very hard for a person to cheat the system. How do you Obtain BitCoin’s? You can obtain BitCoins in 3 ways: exchanging for actual currency, trading and mining. Exchanging for actual money is used to get you started in the Bitcoin exchange. Once you have some bitcoins you can start trading with others in the community such in the same way city traders do. You can buy and sell Bitcoins and then exchange them for real currencies. If you own a business you can join the 1000 merchants signed up to Bitcoins and start trading your good’s for Bitcoins. The main method for obtaining Bitcoins is Mining. This is the process of finding a solution to a difficult Proof-Of-Work problem which confirms transactions and prevents double spending. This would be done by a node (a graphics card) on a dedicated server (it has to be dedicated as it requires a lot of electricity). These transactions are put into files called blocks every 10 minutes and then added to the block chain (an online public database that has contains a list of all the transactions). The block chain is only allowed to accept 1 block per 10 minutes. This block must meet stringent constraints dictated by the network. If the block hasn’t formed into the form it should then the block chain will reject it. The one block that gets accepted onto the Block chain will get it’s owner 50 Bitcoins as a reward for the work they’ve done. The downside to mining is the time, effort and resources it takes to get the reward. Mining uses a lot of electricity, data and takes place on Graphics Cards so it can be impractical cost money for the individual miner. For this reason, some miners pool their resources together and then split the reward they get depending on the work they’ve done. The only downside to this is you have to give up some of the reward you get but it can be beneficial in the long run. I hope this has given you a better understanding into the world of Bitcoins. Thank you for reading!

Sometimes with PC’s you will get a problem that only wiping the computer clean will fix. Traditionally you’d need your Windows (or whatever operating system you’re using) CD and do a CD boot along with a clean install. However, what if you don’t have the disk? Well with laptops they have the ability to reset to factory settings. So basically, what will happen is the laptop will wipe everything off of the hard drive that you are using and then will reinstall the operating system and applications it came with out of the box. To do a factory reset of your laptop, follow these steps: 1) Do a back up Before you do a factory reset remember to do a backup of all the document’s that you want to keep. Nothing will be spared from your clean wipe of the hard drive so back it up to and external hard drive. If you are doing a factory reset of your laptop due to a virus then be careful of the fact that the virus may be attached to your backed up documents and settings so make sure that you scan and destroy the virus before you restore your settings. 2) Find out which F key it is that you press during the computer boot to start the factory reset To do your factory reset you have to press a certain F key, when the laptop boot’s up, to start the factory reset. This varies from the different brand and model of laptop, an example being that for the Sony VAIO line of laptops you have to hold down alt+F10 during boot to start up the factory reset process. So before you start your factory reset, do some research on the make and model of the laptop to find out what you need to press. 3) Obtain the key for the Operating system that originally came with the Laptop All paid for operating systems require an activation code to activate your operating system. A number of times the operating system action code is on the laptop itself. This can be found off the bottom of the laptop. If it isn’t there then check the box or manual that came with it to see if it is there. 4) Start the Factory Reset Now that you know your activation code and the F key combination to start up the factory reset and that you’ve done a back up of your documents and setting then you are ready to do a factory reset. First things first, restart your laptop. When its booting up press the F key combination. This should bring up the system recovery console. Choose to do a full system wipe: this will wipe all the data from the hard drive you are using. Click next and it will start the process. Once it’s finished wiping the hard drive the laptop will then start to reinstall the operating system. Install the operating system and once you are finished with that then it will restart and ask to install the applications. Reinstall those as well. Once the OS and the applications are installed then you have successfully done a factory reset on your laptop! Now all that is left to do is update the operating system, install anti-virus software and then restore your backup. I hope this has helped you.

Hello, today I will taking you through the steps of how to setup a POP and IMAP email account on Outlook. When it comes to manually setting up an email account, you have 2 options (depending on where your exchange is). The first is to point outlook to a Microsoft exchange server or an equivalent. You would use this if you run your email off Office 365 or an exchange server provider. The other would be to point outlook to a SMTP and POP server. You would use this is you have your own email servers setup with POP and SMTP. Before you setup your POP email address you will need your email address, password and the Domain Name’s of the POP and SMTP servers.

  1. To add the email account go to Outlook and click File > Info >Add account. This will start up the account wizard immediately. Alternatively you can add an email address by going to start > control Panel > mail. Once you’re on Mail you can wither click on Email accounts which will take you to the account setting of default profile or, if you wish to add the email account into a different profile, click on “Show profiles” and then select to profile in which you wish to add the email account into. This will then take you in Account Setting panel as well. Once in the Accounts Settings panel click on the “New..” button in the top left hand corner to start the “Add New Account” wizard.
  2. Once you’re on the “Add new Account Wizard” click “Manually configure server settings or additional server types” and click next. Then choose “Internet Email” to and click next.
  3. Once in the “Internet Email Settings” panel you can start filling in the information. In the “server Information” section, choose whether the server is uses POP3 or IMAP and then enter the server Domain name. This would likely be along the lines on “mail.example.com”. Fill in your server login in details and click “Test Account Settings..” to make sure you have a connection to the server and that you can login into it.
  4. Once you’ve established a connection with the server click “More Settings”. In the General tab fill in the reply email section. This is usually the same as your email address. If you are using an internet service providers SMTP server go to the “Outgoing Server” and tick “My outgoing server (SMTP) requires authentication”. Click on the advanced tab to check the ports are set to 110 and 25. Once done click OK and then next. Your POP email address should now be setup.

Thank you for reading.

Printing is an age old technology that has revolutionized industry over the ages. From the old press printers that were used a couple of centurys ago, to the modern day laser printer: using such technology has allowed us to create and distribute books, newspapers, posters and photographs to the masses. However, the main limitation of printing is that it can only be done in 2D, which limits it to only printing images and text onto thin materials i.e. paper, card etc. This is where 3D printers come in. 3D printing is a relatively new technology that allows you to create 3D objects from the comfort of your desk chair. How It Works There are different techniques of creating an item using a 3D printer, but they all follow the same basic principle: using a liquid material, you build up layers into the created model. So what will happen is the 3D model that has been created on your computer will be broken down into different thickness layers. The printer, using the chosen material, will start from the bottom and will gradually build upon layer after layer until you get your model. This mean’s you can create a model, albeit a small one, of anything. Uses In Industry This technology is currently in use in the industry and is used in many areas. Architects, designers and engineers can use it to create scale models of products, from homes to toys, in very quick time. However the hope is to use 3D printers for mass production. The 3D printer could, theoretically, create components for products in quick time to be taken away for assembly. All you would need to do is create the schematics for the product on a computer, choose what material you wish to create it with and then click print. This can revolutionize any manufacturing, or even repairing, industry out there. For example, a customers car is broken due to a faulty part that needs replacing. Conventionally, you will have to either stock or order in the part that needs replacing. However, with a 3D printer you can easily create the part and have the car fixed in less time. Uses In The Home Even with its advances in technology, 3D printers are still rather expensive pieces of kit. However they are still available for people to buy and use at home. Currently they are used by hobbyists to create whatever they can think of but scientists are thinking of ways they can intergrate 3D printers in the home. Scientists are currently working on a 3D printer that can create food. What you do is put in the canisters of the ingredients to wish to use, like ink catridges in a printer, and then tell the printer what you want it to make. You can decide how hot the food is, how crispy it is and even the texture of the food. This could potentially change our health habits with what we eat. For example, today you buy a ready meal, put it in either the microwave or the oven and then eat it once its cooked, which involves minimal input to what the food contains nutrionally. However, with a 3D printer you can, potentially, decide on the the nutrient, salt and fat content the food has which could essentially affect our health for the better. What is so interesting about a 3D printer is the possibilities for creation. From a scientific point of view, everything is made of layers of particles. So in that sense, with the correct building materials in the printer you can create anything that can come to mind in less time than it would to create with your hands.

Hello everyone. Today I will be talking about how to turn off Add-Ins in Microsoft Office. Add-ins are software that is added into Microsoft Office applications to, usually, allow them to work in conjunction with other applications. An example of this would be a database application that contains customer details and has letter templates. When you click on the letter template the template will open up as a document in Word. This is due to the add-in that would have been automatically installed on Office when the application has been installed. This allows for better integration amongst numerous applications.

However, sometimes these add-ins from 3rd party software can cause issue’s with office. On occasion I have seen them have effects on Office applications that cause Office to either not work the way it should or not work at all. in these instances, you should disable the add-ins one at a time to determine if any of them are causing the issues. To do this you need to:

  1. In the affected Office application, go to File and then click on Options. This located on the left hand side between Help and Exit
  2. Once in the options control panel, click on the add-In’s tab. This is located on the lower left hand side of the control panel
  3. The Add-in’s Panel will display all the Add-ins that are active, inactive, document related and disabled. At the bottom is a drop down list of Add-ins to manage. Choose “COM Add-Ins” and then click “Go…”.
  4. You should now has a list of all the COM add-ins. If they have a tick next to them then they are active. If they don’t then they are inactive. To deactivate the ad-in just un-tick the box next to a particular add-ins and press ok. You can also remove or add add-ins in this panel.

If you can’t even do that (I have had an instance when an add-in had not allowed access to file tab to I couldn’t access the options) then you should start up the Office application in safe mode. To do this click on start and type in the search bar the name of the application followed by “/safe”. This will start up the application with all add-ins disabled and will allow to try try and (hopefully) find what is wrong with Office and fix it.

I hop ethis has helped you. Thanks for reading!

09 Feb 2015

Cloud Security

Cloud Security can be complex to understand. The best way to think about it is as you would about a safe. There are varying different products which range from something that will open if you drop it, up to a bank vault. There are many different types of cloud services. For example these range from consumer services such as Google Drive/Apps and Dropbox, to business solutions such as hosted desktops and infrastructure as a service. A large risk companies have at the moment is if staff starts to use the consumer services for businesses purposes as the company will then lose all control over the data held in these services and it will become a huge security risk. This is normally caused by companies failing to keep up with the new technologies available which allow members of staff to work in the most efficient way. In order to discuss Cloud security I will talk about the general areas which affect cloud services and some ways to mitigate the risk. The Wikipedia article on Cloud security (http://en.wikipedia.org/wiki/Cloud_computing_security) breaks down the risks of Cloud Security into the following sections which I will discuss. Identity management: The first issue that arises from cloud services is Identity management. This will normally entail how usernames and passwords are controlled. There are many options on how to implement this between your organization and a cloud service. A good cloud provider should work with you on implementing how this will work. However they should only ever implement something as secure, if not more secure than what is currently being used. A simple thing to look out for will be what their password requirements are. If they allow you to have password of password1 it is unlikely the rest of their system will be very secure. Physical and personnel security: The next issue of security is how secure their hardware is where your data will be stored. The best way to find this out is to ask for a visit to see the provider’s system where your data will be held. You should look for things like a secure fence around the building. Expect to have to go through security checkpoints provide ID and be escorted around the building at all times. Ask yourself the question how easy would it be for someone to break in and access the systems if they had malicious intent. On top of this the people who have access to the systems should be limited and documented so it is known who has access and when they have. It is also important to know where your data is being held to be compliant with things such as the data protection act. There are many companies which will store your data all over the world in order to reduce costs. Availability: Any cloud provider should be able to guarantee a certain level of availability to your systems in a secure way. The best way to ensure this is to make sure you have an approved SLA (Service Level Agreement) in your contract with the provider and ensure that if it is not met there are penalties for the provider. A service level agreement is a document used to define the level of uptime, how long support requests should take to be answered/completed and various other things which define the quality of service expected. Application security: Application security is very important in a cloud environment. A cloud provider should work with you on rolling out any software that is required to your environment. This should go through testing and be approved by the provider before being rolled out. A cloud provider should work with you on application deployment and should in some situations tell you no this application cannot be deployed. Of course they should then work with you on finding an alternative piece of software which is secure. Privacy: This involves how access to your private data is controlled. This can be credit card details or passwords. The best way I have found to test this is to say you have forgotten your password. If they are able to tell you what your password is then their system is not secure. A forgotten password should always be reset to a new one. This is because there should never be a way to find out what someone’s password is. Passwords should always be stored with one way encryption so should not be able to be found out. Another warning sign is if they ask you for your password when providing support. A good provider will never ask for your password, but reset it to something while they need access and get you to change it as soon as they are finished. Business continuity and data recovery: This is the process which a cloud provider should have in place in the event that a disaster happens. The process should be documented with times until the system is back up and running documented. It should be tested regularly, a minimum of once every 6 months or after any change to the infrastructure. Ask to see a provider’s disaster recovery plan and when it was last tested. Logs and audit trails: The final thing to check is to ensure there is adequate logging and audit trails of access are kept for as long as needed and secured properly. A cloud provider should work with you to define these. There are many different aspects of cloud security but hopefully this has given you some tips of what to look out for.