Facebook launches friend-tracking feature

Facebook launches friend-tracking feature
http://www.cnn.com//2014/04/17/tech/mobile/facebook-nearby-friends/index.html

Enable Remote Desktop Connection on Windows 7 Home Premium

Here’s the steps to get it working:

  1. Download W7-SP1-STM-RDP-v4.zip and extract it to a location on your PC.
  2. Navigate to the folder you just extracted and right click Install.cmd, then choose Run as administrator.
  3. You’ll get a window similar to the one below and you should now be good to go:

You can also enable multiple sessions per user, and the logging in of users with a blank password (although I wouldn’t recommend this). There are some switches that are available when running the program:

  • -? – Show this help
  • help – Same as -?
  • multi – Enable multiple sessions per user
  • blank – Enable remote log on for user accounts that are not password protected

So for example, if you wanted to enable multiple sessions per user:

  1. Go to start and find Command Prompt. Right click it and select Run as administrator.
  2. At the prompt type cd “c:\DIRECTORY\TO\EXTRACTED\FILES”
  3. The prompt should switch to c:\DIRECTORY\TO\EXTRACTED\FILES >
  4. Type: Install multi

Thanks to the guys over at Missing Remote for this hack.

CNN – Smartphone innovation is dying, but that’s OK

http://www.cnn.com/2014/04/18/tech/mobile/smartphone-innovation-kovach/index.html

iPhone 6 Preview

http://www.cnet.com/products/apple-iphone-6/

2014 Easter egg hunt

2014 Easter egg hunt: Google hoaxes and jokes
Here is a roundup of Google Easter egg tricks and hoaxes for 2014.

Microsoft fixes bug with Security Essentials and Windows XP.

Microsoft corrects Windows XP/Security Essentials bug

Microsoft fixes bug with Security Essentials and Windows XP.

Enable SSH and TELNET login on Cisco ASA 7.x inside Interface

Configuration with ASDM 6.x

Complete these steps:

  1. Choose Configuration > Device Management > Users/AAA > User Accounts in order to add a user with ASDM.ssh-inside-out-pix7x-8.gif
  2. Choose Configuration > Device Management > Users/AAA > AAA Access > Authentication in order to set up AAA authentication for SSH with ASDM.ssh-inside-out-pix7x-9.gif
  3. Choose Configuration > Device Setup > Device Name/Password in order to change the Telnet password with ASDM.ssh-inside-out-pix7x-10.gif
  4. Choose Configuration > Device Management > Certificate Management > Identity Certificates, click Add and use the default options presented in order to generate the same RSA keys with ASDM.ssh-inside-out-pix7x-11.gif
  5. Under Add a new Identity certificate click New in order to add a default key pair if one does not exists. Then, click Generate Now.ssh-inside-out-pix7x-12.gif
  6. Choose Configuration > Device Management > Management Access > Command Line (CLI) > Secure Shell (SSH) in order to use ASDM to specify hosts allowed to connect with SSH and to specify the version and timeout options.ssh-inside-out-pix7x-13.gif
  7. Click Save on top of the window in order to save the configuration.ssh-inside-out-pix7x-14.gif
  8. When prompted to save the configuration on flash, choose Apply in order to save the configuration.

Google IS scanning your Gmail and admits it!

http://www.digitalspy.com/tech/news/a564741/google-clarifies-email-scanning-policy.html

Google has updated its terms of service to offer more transparency regarding its email-scanning practices. The web giant confirmed that Gmail messages are automatically scanned when content passes between its servers. Google has staunchly defended this policy, insisting that email scanning is necessary to provide tailored content and protect users against malware.

How to clear a domain profile from a Windows 7 machine

To clear user local profile via registry:

  1. Press on Start > Run >Regedit
  2. Navigate to the following registry key :“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
  3. Under ProfileList navigate to binary key’s like this: S-1-5-21-3656904587-1668747452-4095529-500
  4. On the right side under ProfileImagePath you’ll see the profile path.
  5. Chose the one with the desired user and delete the long registry key like: “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList”

USA TODAY: #AskJeffTech: How to print from an iPad

#AskJeffTech: How to print from an iPad

LOS ANGELES — Cynthia from San Francisco has issues printing from her iPad. She’s not alone. Many of us have switched from laptops to tablets. They are great for entertainment, surfing the Internet and checking e-mail, but fall down when it comes to that most basic function — printing out coupons, movie tickets, Word docs, PDFs and more.

http://usat.ly/Pzx7K8

USA TODAY: Twitter redesigns user profiles

Twitter redesigns user profiles

Twitter users might spot a new look on their profiles if they’re viewing from a Web browser. The microblogging service says it’s rolling out redesigned profiles that look really close to profiles found on fellow social network Facebook.

http://usat.ly/1gHDOQ3

CNET: Polamatic 4.0 brings the Polaroid camera experience to iOS

CNET: Polamatic 4.0 brings the Polaroid camera experience to iOS. http://google.com/newsstand/s/CBIwqq-0qRo

What you need to know about Windows XP expiring

What is end of support?

After 12 years, support for Windows XP will end on April 8, 2014. There will be no more security updates or technical support for the Windows XP operating system. Customers moving to a modern operating system will benefit from dramatically enhanced security, broad device choice for a mobile workforce, higher user productivity, and a lower total cost of ownership through improved management capabilities.

Get more here….

http://wp.me/P2YEZ7-cd

Can the new Windows 8.1 bring back users? | ZDNet

http://www.zdnet.com/can-the-new-windows-8-1-bring-back-users-7000028084/

Microsoft wakes up and gives us the Start button back!

USA TODAY: Reboot with tech to clear clutter, simplify

Reboot with tech to clear clutter, simplify

In theory, today’s top consumer tech tools should make your life easier, not more complicated. Yet all too often, many of us are using the latest gadgets and apps for multitasking mayhem rather than sanity saving solutions. Here are some new ways to cut through the connected clutter and reboot your day: 1. Clutter control for your brain: No matter how many times I check my smartphone calendar, get notifications, or alerts, there are often small details of daily life that somehow slip through the connected cracks, and catch me off guard. Remembering to remember is one of the toughest parts of my busy day. For years now, I’ve used Post-it notes to keep me in check. I have a rainbow of them stuck everywhere — on my desk, purse, fridge — even my car dashboard. But rather trail a tornado of paper wherever I go, I’ve recently discovered the Post-It Note Camera Feature in Evernote.

http://usat.ly/1ilxS1C

Spring cleaning for your smartphone

http://www.cnet.com/videos/spring-cleaning-for-your-smartphone/ Spring cleaning for your smartphone

Steer Clear of the Latest Twitter Spamrun | Malwarebytes Unpacked

http://blog.malwarebytes.org/social-engineering/2014/03/steer-clear-of-the-latest-twitter-spamrun/

Huge Twitter scam to infect you.

USA TODAY: A first look at Microsoft Office for iPad

A first look at Microsoft Office for iPad

Long before CEO Satya Nadella’s announcement Thursday that the company he now runs was finally releasing Microsoft Office for the iPad, there have been other Office-like productivity suites and workarounds that for some mobile professionals have more than made up for Microsoft’s absence. Apple’s own work-oriented apps for the iPad, which are now free, include the fine Pages word processor, the Numbers spreadsheet, and the Keynote presentation app — its answer to Microsoft Word, Excel and PowerPoint. Other companies have stepped in too. With that as the backdrop, it’s premature to say whether Office for iPad from the Microsoft mother ship will somehow provide a superior experience to what’s already out there, certainly not after what can only be a cursory first look at the new Office for iPad. But a billion people use some version of Office today, and of those who also own an iPad, it’s reasonable to assume that no matter how good the alternatives are, they’ll feel more comfortable sticking with Microsoft.

http://usat.ly/1jTNiv5

Twitter rolling out changes moving towards photos

http://www.foxnews.com/tech/2014/03/27/twitter-now-lets-add-up-to-four-images-to-tweets-introduces-tagging/

Hidden Easter Eggs in Microsoft code

http://www.foxnews.com/tech/2014/03/27/hidden-jokes-exposed-in-microsoft-code/

Permissions that need to be set to allow automate users home directory creations

share1When you configure home directory for user (from “Active directory users and computers” – in Windows 2000/2003/2008/2012 domain or “User manager for domains” – in NT4 domain), you should add root share that will contain the user home directory – \\servername\users$\%username%. To allow automatic creation of this home folder, there need to configure correct NTFS and Share permissions on home folder root share.

Right click the folder > Properties > Sharing > Advanced Sharing. Name the share and add a “$” to the end to make it a hidden share.

Click Permissions on the share.

share2

To allow automate home directory creations, please make sure to apply this security settings on the root folder that should contain the user home directory.

Administrators: Full Control
System: Full Control
Authenticated Users: Full Control

Now click OK > OK to get back to the Folder Properties.

Now we need to configure the NTFS permissions, so we need to be on the “Security” tab of the folder we created earlier.

1. Turn off inheritance on the folder and copy the permissions. You do this by:

a. Click the Advanced button found on the Security tab.
b. Clear Allow inheritable permissions to propagate to this object check box in the Advanced Security Settings dialog box.
c. Click Copy when prompted by the Security dialog box.

2. Click OK to return to the Security tab. Ensure we have the following permissions set:

Administrators: Full Control
System: Full Control
Creator Owner: Full Control
Authenticated Users: Read & Execute, List Folder Contents, Read

3. Change permissions for Authenticated Users so they cannot access other users’ folders. You do this by:

a. Click Advanced on the Security tab.
b. Click Authenticated Users, and then click Edit.
c. On the Permissions Entry for HOME dialog box, drop down the Apply onto and select This folder only.
d. Click OK twice.

Windows XP ‘expires’ in one month

Windows XP ‘expires’ in one month, http://fxn.ws/1imjcnv

Hyper-V Replica Capacity Planner

The Capacity Planner for Hyper-V Replica which was released on 5/22, allows you to plan your Hyper-V Replica deployment based on the workload, storage, network and server characteristics. The guidance is based on results gathered through our internal testing across different workloads.

You can download the tool and it’s documentation from here – http://www.microsoft.com/en-us/download/details.aspx?id=39057

Instructions:

1) Download the tool (exe) and documentation

2) Read the documentation first and then try out the tool. You should familiarize yourself with some nuances listed in the documentation before using the tool.

So go ahead, use the tool in your virtual infrastructure and share your feedback and questions through this blog post or in the community forum. We would love to hear your comments!

How to activate Windows Server 2012

This is the easiest way:

Bring up the Start Menu

Right click and choose All Apps

1. Right click Command Line -> run as administrator

2. Type slui 3

3. You get the product key activation wizard pop up. Enter the key here and select activate. This will Activate the server license.

Add routes to OpenVPN on IPCOP

To add additional networks behind your IPCop firewall for OpenVPN clients you must PUSH routes to the client. To do this, in /var/ipcop/ovpn/server.conf add the following line:

push “route 10.1.0.0 255.255.0.0”

 

Enable lock screen widgets in Android 4.4 KitKat | How To – CNET

http://howto.cnet.com/8301-11310_39-57610954-285/enable-lock-screen-widgets-in-android-4.4-kitkat/

Make your smartphone an extension of your office phone!

Allworx Reach

Allworx Reach

Allworx Reach™ combines effortless communications with complete mobility. Whether your smartphone or tablet is Apple or Android, Reach brings the rich functionality of your Allworx phone to your smartphone. Both Wi-Fi and cellular data networks are utilized for Allworx Reach access, so anywhere there is a signal — from across the room or across the globe — you are connected.

Reach is a free download and is supported with Release 7.5 software and higher, but requires a device license on your server to be registered.

To enable it on your Allworx server, you will need a valid Reach device license purchased from NCOL.NET, an Authorized Allworx partner, and have it provisioned on your Allworx server by NCOL.NET.

How to save IPTABLES rules

The following lines allow SMTP and HTTP traffic through an IPTABLES firewall. But this information is not automatically saved and reloaded if the service restarts.

iptables -I INPUT -p tcp –dport 25 -m state –state NEW,ESTABLISHED -j ACCEPT
iptables -I INPUT -p tcp –dport 80 -m state –state NEW,ESTABLISHED -j ACCEPT
iptables-save

Whenever you make a change to your firewall, on a Fedora/CentOS type system, you will want to save the changes.

The output can be redirected to a file.

# iptables-save > /root/firewall-rules
The following command line restores all rules from /root/firewall-rules assuming that the file /root/firewall-rules exists.

# iptables-restore < /root/firewall-rules

By default, iptables-restore deletes all existing rules before restoring the saved rules. If the saved rules are to be appended to existing rules, use the -n or –noflush option.

Save Your Firewall and Load on Restart

You will need to edit the /etc/sysconfig/iptables-config as root to help iptables save and reload your firewall correctly. Be sure the following settings are changed to “yes”.

# Unload modules on restart and stop
# Value: yes|no, default: yes
# This option has to be ‘yes’ to get to a sane state for a firewall
# restart or stop. Only set to ‘no’ if there are problems unloading netfilter
# modules.
IPTABLES_MODULES_UNLOAD=”yes”

# Save current firewall rules on stop.
# Value: yes|no, default: no
# Saves all firewall rules to /etc/sysconfig/iptables if firewall gets stopped
# (e.g. on system shutdown).
IPTABLES_SAVE_ON_STOP=”yes”

# Save current firewall rules on restart.
# Value: yes|no, default: no
# Saves all firewall rules to /etc/sysconfig/iptables if firewall gets
# restarted.
IPTABLES_SAVE_ON_RESTART=”yes”

gGoogle’s Gmail goes down as Reliability guys get grilled

Google’s Gmail goes down as Reliability guys get grilled, http://fxn.ws/1e21zoJ

Setup A WordPress Multisite

http://www.paulund.co.uk/setup-wordpress-multisite

Best of Best WordPress Tutorials of 2013 on WPBeginner

http://www.wpbeginner.com/showcase/best-of-best-wordpress-tutorials-of-2013-on-wpbeginner/

Google Maps Generator for WordPress

Google Maps Generator http://coveloping.com/tools/google-maps-generator via @coveloping

Burglars use social media to target homes

Tip: Burglars use social media to target homes

BURGLARS USE SOCIAL MEDIA Q. I read that burglars use social media to target victims. How do they do it? A. Criminals only need a rough idea of where you live — and access to Google Street View — to start casing your home. Using check-in apps and posting vacation photos broadcasts to the world that you’re not at home right then. Be sure to check your privacy settings — and wait until you’re safely home to share vacation stories. NEW WAYS THIEVES STEAL YOUR IDENTITY Q. I keep hearing about new identity-theft scams. What are they? A. Identity thieves are using public hotspots to set up fake Wi-Fi networks. So, you might think you’re logging onto public Wi-Fi, but end up signing onto a hacker’s network instead. If you’re in a café or restaurant, ask and make sure you’re joining a legitimate network. Medical identity theft is another fast-growing threat. It happens when a thief uses your name and information to receive medical services.

http://usat.ly/KmHMWf

Snapchat’s Hack: What Users Should Do Now

Snapchat’s Hack: What Users Should Do Now, http://fxn.ws/1kchy8I

Love Snapchat? Here’s a reason to stop

Love Snapchat? Here’s a reason to stop, http://fxn.ws/1g6ILEy

10 games for your new smartphone or tablet

10 games for your new smartphone or tablet

Smartphones and tablets have made its owners more productive and in touch with the digital world, but they can be a lot of fun, too. Among the most popular app categories are games. According to Apple’s iTunes charts, 5 of the top 10 free apps and 7 of the top 10 paid apps are games. Get a new smartphone or tablet for Christmas? Here are 10 games to consider, in alphabetical order. Some of these are free, while others are for pay, but prices may vary since many developers are hosting holiday sales. 1. Angry Birds Star Wars (iOS, Android, Windows). Players fling a variety of supercharged birds from a galaxy far, far away. Birds weird Jedi powers and lightsabers as they try and knock down structured by a band of mean pigs.

http://usat.ly/K4qUn1

you got a new device! Here’s how to set it up

You got a new device! Here’s how to set it up

It happens every Christmas. As soon as the wrapping hits the floor, you’re getting hit up to set up everyones new gadgets. Don’t worry, this year we’ve got your back with a few quick tips so that you’ll be navigating the myriad of menus and manuals — done and on to the egg nog — in no time. DO THE DIRTY WORK AHEAD OF TIME If you’re giving someone tech as a gift set it up for them beforehand if you can. Though this isn’t always an option, it can be a nice surprise to give a gift that requires zero work to turn on. This is the perfect solution for folks who aren’t tech- savvy, as they can begin using the gift without frustration. Simple set-up

http://usat.ly/K4QckR

USA TODAY: The very best (new) apps of 2013

The very best (new) apps of 2013

Whether you’re a longtime smartphone or tablet owner or unwrapping your very first one over the holidays, there are many thousands of new applications (“apps”) for your device. In fact, therein lies the problem: with more than a million apps at Apple’s App Store (for iPhone, iPod touch and iPad) and Google Play store (for Android-powered mobile products), finding something new to download for your phone or tablet can be overwhelming. No problem, as we’ve curated some of the newer “must have” apps for your collection. Here is a look at the year’s best – divided into various categories for your convenience. Unless specified otherwise, all of these apps are available for iOS and Android devices. And hey, be sure to suggest your favorites too.

http://usat.ly/1c5OOnU

Four tips for creating stronger passwords

Four tips for creating stronger passwords

It’s complicated. But that’s a good thing.

http://usat.ly/1d0Z2IA

New USB plug to be smaller, reversible (at last)

New USB plug to be smaller, reversible (at last), http://fxn.ws/1izWN63

2 million Facebook, Google accounts compromised: How to protect yourself

2 million Facebook, Google accounts compromised: How to protect yourself, http://fxn.ws/1hzSCWv

How to port forward with a Cisco ASA via ASDM

Create NAT Rule

  • Click Configuration (top)
  • Click Firewall (bottom-left)
  • Click NAT Rules (middle-left)
  • Select Add->Static NAT Rule
  • Original
    • Interface: inside
    • Source: 10.80.5.47
  • Translated
    • Interface: Outside
    • Select Use Interface IP Address
  • Port Address Translation (PAT)
    • Check Enable Port Address Translation (PAT)
    • Protocol: TCP
    • Original Port: 3389
    • Translated Port: 3389
  • Click OK

asa_port1

Create Access Rule

  • Click Access Rules
  • Select Add->Add Access Rule
    • Interface: outside
    • Action: Permit
    • Source: any
    • Destination: 10.80.5.47 or the object you created
    • Service: tcp/3389
    • Enable Logging: unchecked

asa_port2

How to upgrade the software in a Cisco ASA

 

Install the new images using TFTP. Enter this command separately for the OS image and the ASDM image:

hostname# copy tftp://server[/path]/filename disk0:/[path/]filename

For example:

hostname# copy tftp://10.1.1.1/asa840-4-k8.bin disk0:/asa861-k8.bin

hostname# copy tftp://10.1.1.1/asdm-64099.bin disk0:/asdm-661.bin

To change the OS boot image to the new image name, enter the following commands in global configuration mode.

hostname(config)# clear configure boot

hostname(config)# boot system disk0:/[path/]new_filename

For example:

hostname(config)# clear configure boot

hostname(config)# boot system disk0:/asa861-k8.bin

To configure the ASDM image to the new image name, enter the following command:

hostname(config)# asdm image disk0:/[path/]new_filename

To save the configuration and reload, enter the following commands:

hostname(config)# write memory

hostname(config)# reload

Facebook Resolves Site Issues

Facebook Resolves Site Issues, http://fxn.ws/1hqLVHc

How to set Internet time on Windows Server 2008 R2

To configure an internal time server to synchronize with an external time source, follow these steps:

  1. Change the server type to NTP. To do this, follow these steps:
    1. Click Start, click Run, type regedit, and then click OK.
    2. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      \Services\W32Time\Parameters\Type
    3. In the pane on the right, right-click Type, and then click Modify.
    4. In Edit Value, type NTP in the Value data box, and then click OK.
  2. Set
    AnnounceFlags

    to 5. To do this, follow these steps:

    1. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      \Services\W32Time\Config\AnnounceFlags
    2. In the pane on the right, right-click AnnounceFlags, and then click Modify.
    3. In Edit DWORD Value, type 5 in the Value data box, and then click OK.
       
       

      2683283

      Notes

      • If an authoritative time server that is configured to use an AnnounceFlag value of 0x5 does not synchronize with an upstream time server, a client server may not correctly synchronize with the authoritative time server when the time synchronization between the authoritative time server and the upstream time server resumes. Therefore, if you have a poor network connection or other concerns that may cause time synchronization failure of the authoritative server to an upstream server, set the AnnounceFlag value to 0xA instead of to 0x5.
      • If an authoritative time server that is configured to use an AnnounceFlag value of 0x5 and to synchronize with an upstream time server at a fixed interval that is specified in SpecialPollInterval, a client server may not correctly synchronize with the authoritative time server after the authoritative time server restarts. Therefore, if you configure your authoritative time server to synchronize with an upstream NTP server at a fixed interval that is specified in SpecialPollInterval, set the AnnounceFlag value to 0xA instead of 0x5.
  3. Enable NTPServer. To do this, follow these steps:
    1. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      \Services\W32Time\TimeProviders\NtpServer
    2. In the pane on the right, right-click Enabled, and then click Modify.
    3. In Edit DWORD Value, type 1 in the Value data box, and then click OK.
  4. Specify the time sources. To do this, follow these steps:
    1. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      \Services\W32Time\Parameters
    2. In the pane on the right, right-click NtpServer, and then click Modify.
    3. In Edit Value, type Peers in the Value data box, and then click OK.
       
       

      2683283

      Note Peers is a placeholder for a space-delimited list of peers from which your computer obtains time stamps. Each DNS name that is listed must be unique. You must append ,0x1 to the end of each DNS name. If you do not append ,0x1 to the end of each DNS name, the changes that you make in step 5 will not take effect.

  5. Select the poll interval. To do this, follow these steps:
    1. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      \Services\W32Time\TimeProviders\NtpClient\SpecialPollInterval
    2. In the pane on the right, right-click SpecialPollInterval, and then click Modify.
    3. In Edit DWORD Value, type TimeInSeconds in the Value data box, and then click OK.
       
       

      2683283

      Note TimeInSeconds is a placeholder for the number of seconds that you want between each poll. A recommended value is 900 Decimal. This value configures the Time Server to poll every 15 minutes.

  6. Configure the time correction settings. To do this, follow these steps:
    1. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      \Services\W32Time\Config\MaxPosPhaseCorrection
    2. In the pane on the right, right-click MaxPosPhaseCorrection, and then click Modify.
    3. In Edit DWORD Value, click to select Decimal in the Base box.
    4. In Edit DWORD Value, type TimeInSeconds in the Value data box, and then click OK.
       
       

      2683283

      Note TimeInSeconds is a placeholder for a reasonable value, such as 1 hour (3600) or 30 minutes (1800). The value that you select will depend on the poll interval, network condition, and external time source.

    5. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet
      \Services\W32Time\Config\MaxNegPhaseCorrection
    6. In the pane on the right, right-click MaxNegPhaseCorrection, and then click Modify.
    7. In Edit DWORD Value, click to select Decimal in the Base box.
    8. In Edit DWORD Value, type TimeInSeconds in the Value data box, and then click OK.
       
       

      2683283

      Note TimeInSeconds is a placeholder for a reasonable value, such as 1 hour (3600) or 30 minutes (1800). The value that you select will depend on the poll interval, network condition, and external time source.

  7. Close Registry Editor.
  8. At the command prompt, type the following command to restart the Windows Time service, and then press Enter:
    net stop w32time && net start w32time

Using Classic ASP with Microsoft Access Databases on IIS

In IIS 7.0, IIS 7.5, and above, several security changes were made that may affect how classic ASP applications will function. For example, if you were to copy a classic ASP application that uses an Access database that is within the Web site’s content area to a server that uses IIS 7.0 or above, you may receive the following error message:

Microsoft JET Database Engine error ‘80004005’
Unspecified error.
/example.asp, line 100

This is a generic error triggered by the Access driver that may occur for a variety of reasons, but incorrect permissions is a common cause. More specifically, the ability to work with Microsoft Access databases is implemented through the Microsoft JET Database Engine, which creates various temporary and lock files when it connects to an Access database. The following sections will discuss some of the reasons why this may occur and how to resolve those situations.

Working with 64-bit Systems

Unfortunately there are no 64-bit ODBC drivers, so on 64-bit systems you will have to run your applications in 32-bit mode. To do so, use the following steps:

  1. On the taskbar, click Start, point to Administrative Tools, and then click Internet Information Services (IIS) Manager.
  2. In the Connections pane, click Application Pools.
  3. Highlight the application pool for your application, then click Advanced Settings… in the Actions pane.
  4. In the Advanced Settings dialog, specify True for Enable 32-Bit Applications.
  5. Click OK to close the Advanced Settings dialog.

Note: The 64-bit control panel applet for managing ODBC connections will not display 32-bit ODBC drivers. To work around this issue, you need to open the 32-bit ODBC applet. To do so, use the following steps:

  1. Click Start and then Run, or open a command prompt.
  2. Enter the following command:
    %windir%\syswow64\odbcad32.exe
  3. Press the enter key.

Classic ASP Not Installed by Default on IIS 7.0 and IIS 7.5

In IIS the classic version of ASP is not installed by default. Because of this, you might see HTTP 404 errors when you try to browse to an ASP page on your server, or you might see the source code for your ASP page displayed in your browser window. Both of these error conditions are created when configuration settings that are used to define the environment for classic ASP are not installed.

To support and configure ASP applications on your Web server, you must install the ASP module. To install the ASP module on IIS, use the following steps for your version of Windows.

Installing Classic ASP on Windows Vista or Windows 7 Client

  1. Click Start, and then click Control Panel.
  2. In Control Panel, click Programs and Features, and then click Turn Windows Features on or off.
  3. Expand Internet Information Services, then World Wide Web Services, then Application Development Features.
  4. Select ASP, and then click OK.

Installing Classic ASP on Windows Server 2008 or Windows Server 2008 R2

  1. Click Start, point to Administrative Tools, and then click Server Manager.
  2. In the Server Manager hierarchy pane, expand Roles, and then click Web Server (IIS).
  3. In the Web Server (IIS) pane, scroll to the Role Services section, and then click Add Role Services.
  4. On the Select Role Services page of the Add Role Services Wizard, select ASP.
  5. If the Add role services required by ASP dialog box appears, click Add Required Role Services. (This page appears only if you have not already installed the ISAPI Extensions role service on your server.)
  6. On the Select Role Services page, click Next.
  7. On the Confirm Installation Selections page, click Install.
  8. On the Results page, click Close.

How to change NCOL email settings on the Galaxy S4

From the home screen, tap Email.

Note: if the shortcut is no longer on the home screen, tap Apps and then tap Email.
Tap the Menu key.
Tap Settings.
Tap the account name.
Scroll to and tap More settings
Tap Incoming settings.
The incoming email settings are displayed.

To view the outgoing email settings, tap Done.
Scroll to and tap Outgoing settings.
The outgoing email settings are now displayed.

To exit the email settings, tap Done.

CentOS 6.2 VMware Tools Install the Easy Way

Initiate the VMware tools install on your CentOS 6.2 VM. Open a SSH session to your VM and copy/paste this:

yum -y install perl
mkdir /mnt/cdrom
mount /dev/cdrom /mnt/cdrom
cp /mnt/cdrom/VMwareTools-*.tar.gz /tmp
umount /mnt/cdrom
tar -zxf /tmp/VMwareTools-*.tar.gz -C /tmp
cd /
./tmp/vmware-tools-distrib/vmware-install.pl --default
rm -f /tmp/VMwareTools-*.tar.gz
rm -rf /tmp/vmware-tools-distrib

Comcast working on anti-piracy

http://news.cnet.com/8301-1023_3-57597157-93/comcast-reportedly-cooking-up-new-anti-piracy-scheme/