HOW-TO: Resolve Java Install Problem

For no apparent reason Java got corrupted in my machine. One can fully expect this as when Java updates itself, it leaves a significant amount of "junk" from the old version. It will still work.. But for some unknown and unexplainable reason, it doesn't work now. So the quest to put its services back begins..

I uninstalled the Java software from the "Add/Remove Programs" menu of the control panel and it was "uninstalled" as expected. So I downloaded the latest and greatest version off its website.. And, while trying to re-install it, I realized that was not the case -- Java was still installed (as seen on the screenshot below).

Resolve Java Install Problem


And while clicking "Yes", I got prompted with another error:

This action is only valid for products that are currently installed.

The second error made more sense as I had intentionally uninstalled the software. But why does the installer think that Java is still installed? It is due to a registry entry that got left over from the previous Java installation (which the uninstall did not get rid of).

As "Administrator" or a user that is a member of the "Administrators" group, open the registry editor and browse over to this key and delete it:

HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment

or save the code below as a .reg file and merge to your registry..

;--- start of code ---
Windows Registry Editor Version 5.00

[-HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Runtime Environment]
;--- end of code ---

Then try to re-install Java. It should now be able to install without hitch.

The uninstaller should have taken care of this simple problem. And for a widely used software like Java a simple matter like this should not add to your headaches.

Share:

HOW-TO: Resolve Error 619 Dial-in Message

Wireless broadband technology using USB modems are entering the mainstream market. And with the widespread adoption of the local cellular carriers/providers and the accompanying marketing and competition, its reach is gaining ground not to mention prices dropping. The many advantages include pre-paid on-demand kits.

For many who have wired broadband kits, the USB modem broadband can serve as backup broadband in cases of trouble with the wired broadband. The mobility it offers is another big bonus; and, where wired broadband has no reach, the wireless broadband can as long as there is cellular network coverage.

Imagine this: Upon buying the modem, you test it out, install the packaged software and try to connect.. Just PERFECT! You are able to browse. Then you go home.. plug the USB modem back in.. and ERROR! You go back to the store and they can't figure it out as well. It may not be that easy as you thought it was..

However, one may run into a similar scenario above when trying to connect (or dial-in) to the wireless network -- its "Error 619: A connection to the remote computer could not be established, so the port used for this connection was closed." (below is a screenshot of the error message). And while trying to resolve it, googling the error returned thousands of results and it seems this error is very common.

Resolve Error 619 Dial-in Message


I tried to be more specific with the searching by indicating the Huawei E220 modem I have but it seems there are many of us who are in the same boat. So it seems the problem is more serious than I thought.

While most forums indicate that this is a problem with the APN setting of the mobile network, I encountered a simple solution while trying to resolve the problem -- I tried to move the modem on to other USB ports.. and Eureka! after plugging to the third port I was able to connect. It is not the APN as I was using the "Dynamic" setting (see below).

Resolve Error 619 Dial-in Message


So I tried replicating the problem.. When installing "Mobile Partner" (or the applicable software for your USB modem), note the USB port you plugged the modem into. When dialing in to the mobile network, ensure that the modem is plugged to the same USB port used when installing "Mobile Partner". Doing this I had not encountered the same "Error 619" even though I had the APN settings set to "Dynamic".

I hope this simple solution it helps you out in your dilemma.

Share:

HOW-TO: Setup BlackBerry Level 1 Messages

Having a BlackBerry (or BB) is both a boon and a bane. You won't have reasons of saying you haven't read mails as your emails are automagically forwarded to your mobile device. On the other hand, you are virtually connected as long as there is cell coverage or wifi.

Given that, let us make the most of the many advantages of the BB -- Level 1 messages. But first, what are Level 1 messages exactly? Level 1 messages are mails forwarded (or "filtered") as important messages. This functionality is quite useful! It can be used to separate or filter important emails from ordinary ones. Or if you work for a support team, you can use it to filter alert mails from your monitoring systems.

Download the BlackBerry Desktop Manager. Upon install and the subsequent reboot (unfortunately you cannot bypass this reboot), launch the BB desktop manager. Version 5 will have a similar screenshot as below.

Setup BlackBerry Level 1 Messages


Connect the BB via USB and authenticate if required. Once status is "Online", click on "Email Settings".

Get to the filters tab and click new. On the "From" field, input the source email address. For company mail you can use the wildcard (*) for *@yourcompany.com or import a list from your outlook contacts.

Toward the bottom of the window tick "Forward the email message with high importance notification". The filtered message then becomes a Level 1 message. You will be seeing screen similar to the one below.

Setup BlackBerry Level 1 Messages


Accept the changes and all that is necessary is to change the alert profile for Level 1 Messages, both in the holster and out.

The first time I tried this out, it wasn't all that perfect. But L1 Messages worked wonders for me after fine tuning -- I set an audible alert tone only upon receipt of an L1 message.

Hope this article helps you out as well.

Share:

INFO: Adobe Acrobat Reader Potential Exploit

News spreading around that there exist a zero-day exploit on the popular PDF application Acrobat Reader abound. This vulnerability is acknowledged by Adobe and their security bulletins and advisories site has it logged. And while a patch has been released by Abode to address the exploit, their download site seems to have lagged from that.

While users may have patched (or the unaware have already been patched by automatic updates), newly installed computers or those that do not have any PDF readers installed are still potentially vulnerable. This is because the binary available for download off Adobe's website is still the unpatched version.

Adobe Acrobat Reader Potential Exploit


As seen from the screenshot above, the version available for download is 9.1. While the latest updates that patch the zero-day exploit is 9.1.2.

If you do not install Adobe's Acrobat Reader you are in better shape than others. But to the common non-IT people, the default PDF application that installs is Acrobat. And installing the unpatched version poses a threat to the unwilling innocent victim.

So if you happen to have version 9.1 or the older 8.1.4 or 7.1.1 it is time to click that update button and save yourself from the threat.

Having the update/patch available is good. But making the available downloadable binary the patched version is the better scenario. It should not be that hard to do for a company like Adobe.

Share:

HOW-TO: Firefox Javascript Security Hole Stopgap Measure

Firefox 3.5 may be the greatest and latest release but it has its share of security holes. Hackers have posted the code and instructions on how to exploit the critical security hole in the popular browser, so until it is patched it literally leaves millions of users exposed to the threat.

The security hole is introduced with the addition of Tracemonkey, a javascript engine known to speed up javascript rendering in this version of Firefox.

There is no need for you to downgrade to Firefox 3.0. The same website referenced above illustrates the procedure on turning Tracemonkey feature off.
  • open a new tab;
  • type “about:config” and hit enter;
  • read the warning and heed its wisdom;
  • enter “jit” in the filter field;
  • change the value of “javascript.options.jit.content” to enable (true) or disable (false) TraceMonkey for JavaScript in Web content;
  • change the value of “javascript.options.jit.chrome” to enable (true) or disable (false) TraceMonkey for JavaScript in XUL/chrome.

While Mozilla is tackling the issue and trying to address the security hole with a patch/upgrade, it is advisable to plug the hole by disabling Tracemonkey. This thus downgrades the 3.5 to the 3.0 javascript rendering speeds. Believe me with millions (even billions) of websites out there, disabling the Tracemonkey engine is well worth the trade-off for now.

And with the millions of users who have downloaded Firefox 3.5 since its release, imagine the potential targets of malicious javascript code.

It is true, functionality should take precedence over security. But in this case it is prudent to prioritize security given the powerful functionality javascript has and what it can do, most especially when exploited. You can be the next unwilling victim!

With their track record, Mozilla should be able to come up with a fix soon.

Share:

Subscribe for Latest Update

Popular Posts

Post Labels

100gb (1) acceleration (1) acrobat (1) adblock (1) advanced (1) ahci (1) airdrop (2) aix (14) angry birds (1) article (21) aster (1) audiodg.exe (1) automatic (2) autorun.inf (1) bartpe (1) battery (2) bigboss (1) binance (1) biometrics (1) bitcoin (3) blackberry (1) book (1) boot-repair (2) calendar (1) ccleaner (3) chrome (5) cloud (1) cluster (1) compatibility (3) CPAN (1) crypto (3) cydia (1) data (3) ddos (1) disable (1) discount (1) DLNA (1) dmidecode (1) dns (7) dracut (1) driver (1) error (10) esxi5 (2) excel (1) facebook (1) faq (36) faucet (1) firefox (17) firewall (2) flash (5) free (3) fun (1) gadgets (4) games (1) garmin (5) gmail (3) google (4) google+ (2) gps (5) grub (2) guide (1) hardware (6) how (1) how-to (45) huawei (1) icloud (1) info (4) iphone (7) IPMP (2) IPV6 (1) iscsi (1) jailbreak (1) java (3) kodi (1) linux (28) locate (1) lshw (1) luci (1) mafia wars (1) malware (1) mapsource (1) memory (2) mikrotik (5) missing (1) mods (10) mouse (1) multipath (1) multitasking (1) NAT (1) netapp (1) nouveau (1) nvidia (1) osmc (1) outlook (2) p2v (2) patch (1) performance (19) perl (1) philippines (1) php (1) pimp-my-rig (9) pldthomedsl (1) plugin (1) popcorn hour (10) power shell (1) process (1) proxy (2) pyspark (1) python (13) qos (1) raspberry pi (7) readyboost (2) reboot (2) recall (1) recovery mode (1) registry (2) rename (1) repository (1) rescue mode (1) review (15) right-click (1) RSS (2) s3cmd (1) salary (1) sanity check (1) security (15) sendmail (1) sickgear (3) software (10) solaris (17) squid (3) SSD (3) SSH (9) swap (1) tip (4) tips (42) top list (3) torrent (5) transmission (1) treewalk (2) tunnel (1) tweak (4) tweaks (41) ubuntu (4) udemy (6) unknown device (1) updates (12) upgrade (1) usb (12) utf8 (1) utility (2) V2V (1) virtual machine (4) VirtualBox (1) vmware (14) vsphere (1) wannacry (1) wifi (4) windows (54) winpe (2) xymon (1) yum (1) zombie (1)

RANDOM POSTS