Innovate, disrupt, code the future. 💻🔐🚀

outlook-2003-error-setting-up-profile-after-uninstalling-office-2007

Outlook 2003 error setting up profile after uninstalling office 2007

This is a problem that I run into quite alot as most new PCs come with the Office 2007 trial pre-installed. When you try to setup Outlook 2003 for the first time you get the following error

“There was an error locating one of the items needed to complete this operation. It might have been deleted”

In order to fix this error you have to rename ‘mapisvc.inf’ one in

2008-02-06

new-forums

New Forums

We have added a new forums section to techinvasion.net. We hope these forums will�become a big part of the site and allow all the users to participate, ask questions, and get answers. The link to the forums is along the left hand side of the page in the categories section. You can also go directly to the forums by going to /forum.

We are also looking for writers to post relevant articles such as the ones that have been posted by our 3 writers�so far. If you are interested in writing for techinvasion.net please send an email to admin@techinvasion.net.��

2008-01-31

fixing-the-sku01acab-and-other-office-cab-file-issues

Fixing the SKU01A.CAB and other office cab file issues

Anyone who has used office 2003 has noticed that when switching domains or logging in as a new user Microsoft Office ask you to insert the cd to cache files needed to start. In some cases it asks for files from older office versions that have been upgraded, sometimes you don’t even have the original cd. To solve this problem you can make a simple change to the registry that tells office not to expect cached files off the installation cd.

2008-01-30

cisco-ios-firewall-security

�The Cisco IOS has many powerful security features that enable network engineers to protect their internal network. The Cisco IOS is capable of intrusion detection, deep packet inspection, and stateful firewall features. Setting up IPS allows the admin to push intrusion detection to the network edge. The Cisco IPS feature set can scan for spyware, viruses, worms, Trojans, and network intrusions by receiving updated signature files from Cisco. If a packet or series of packets matches a particular signature the router can, send an alert, drop the packet, or reset the connection of the offending user. In this way the network engineer can better protect the network by acting on suspicious packets before they can pose a risk to the network infrastructure, another advantage of pushing IPS duties to the network edge is it allows offending packets to be dropped before they take up finite network resources. �In large networks as much as 10 percent of network resources could be consumed by packets that ultimately will be dropped for security reasons deeper in the network.

2008-01-29

cisco-config-wic-1adsl-2

Cisco WIC-1ADSL config for 1800 series router and ios 12.4

This config is for the Cisco 1800 series router running IOS 12.4. IOS 12.4 has some command and syntax changes in reguards to interfaces and configuration commands for PPPOE. This config was submitted by my good friend Pedro Rivera.

version 12.4

service timestamps debug datetime msec

service timestamps log datetime msec

no service password-encryption

!

hostname Router

!

boot-start-marker

boot-end-marker

!

!

no aaa new-model

!

resource policy

!

mmi polling-interval 60

no mmi auto-configure

no mmi pvc

mmi snmp-timeout 180

ip subnet-zero

ip cef

!

!

!

!

ip name-server 205.152.144.23

!

!

interface FastEthernet0/0

 description Internal Lan

 ip address 10.10.10.254 255.255.255.0

 ip nat inside

 ip virtual-reassembly

 ip tcp adjust-mss 1452

 duplex auto

 speed auto

!

interface FastEthernet0/1

 no ip address

 shutdown

 duplex auto

 speed auto

!

interface ATM0/0/0

 no ip address

 no atm ilmi-keepalive

 dsl operating-mode auto

!

interface ATM0/0/0.1 point-to-point

 pvc 8/35

  pppoe-client dial-pool-number 1

 !

!

interface Dialer0

 ip address negotiated

 ip mtu 1452

 ip nat outside

 ip virtual-reassembly

 encapsulation ppp

 dialer pool 1

 dialer-group 1

 ppp authentication chap callin

 ppp chap hostname xxxxxxxxxxxxx@xxxxxxxxxxxxxx.net

 ppp chap password 0 xxxxxxxxxxxxxxx

!

ip classless

ip route 0.0.0.0 0.0.0.0 Dialer0

!

ip http server

no ip http secure-server

ip nat inside source list 1 interface Dialer0 overload

!

access-list 1 remark INSIDE_IF=FastEthernet0/0

access-list 1 remark SDM_ACL Category=2

access-list 1 permit 10.10.10.0 0.0.0.255

dialer-list 1 protocol ip permit

!

!

control-plane

!

!

line con 0

line aux 0

line vty 0 4

 login
111
2008-01-28

cisco-config-wic-1adsl

Configuring WIC-1ADSL on Cisco 2600 with PPPOA and PPPOE

Configuring a Cisco router to use the WIC-1ADSL card is one of the most commonly asked question by people in the Cisco forums. There are some interesting and compelling reasons to use a WIC card instead of connecting PPPOE through the ADSL modem in bridged mode. One of the most compelling reasons is the ability to use advanced QOS features such as interleaving and fragmentation. Because the DSL WIC card shows up as an ATM WAN interface, the router is able to perform those advanced Quality of Service features. The overhead of encapsulating a packet in PPPOE and sending it to the modem over some length of cable is also a reason to use a WIC card instead of the modem.

2008-01-28

vista-complete-pc-backup-to-network-share

Vista Complete-PC backup to network share

The real magic of the new Vista backup tool is the second option Complete-PC backup. This feature takes advantage of the HAL independence of Vista and allows you to backup your entire system at one time using the magic of volume shadow copies to backup open files. The backup is also stored in a virtual machine file which means that you can boot, run, and extract files from your backup using Microsoft Virtual PC. This is a really neat feature! If the previous feature isn�t enough for you Microsoft will let you restore your pc by booting to the Windows Vista install DVD and selecting the restore option.

2007-11-12

hacked-iphone-goodness

Hacked Iphone goodness

As promised here is some iPhone screenshots!!!.New Desktop themeTerminal installed on iphone��iPhone running top

2007-10-30

iphone-fun

Iphone Fun

I have spent the last couple weeks breaking the Iphone in every way possible. I Now have it running as a mail server. One of the great things about the iphone is that it is running mac os x leopard, which is just version 9 of the darwin kernel. That means that once you get out of the ch-rooted environment on the phone, you can install the BSD subsystem. The BSD subsystem basically just adds back all the unix tools we have come to know and love. After that it is just a matter of compiling an embedded version of apache or your web server of choice. Next you can use NFS shares to mount more available storage. I will post some pictures here of some interesting screen shots. The arm cpu in the phone is actually quite fast. This of course is all just for iphun ( pun intended) however it is nice to have shell access on the phone. I do a lot of networking for a living and it is nice to have ssh and telnet on my phone. This makes it much easier to program routers and do many other things

2007-10-29

mit-student-arrested-for-fake-bomb

MIT student arrested for fake bomb

An MIT student was arrested in Logan intl Airport for wearing a sweatshirt with a prototyping board on it and a 9 volt battery which lit up some led�s that said MIT course VI which is the numerical designation for computer and electrical engineering majors. The shirt which she has and has been wearing for a long time, was something that a class of students made as a project. The police surrounded her in the airport with automatic weapons and arrested her, then commented that she was lucky to be alive. As you can see from the link to the article below anyone who has half a brain can see that it is a piece of techno art. However I just wanted to post this to solicit your opinions about the fear of electronics in this country and the sad state of affairs. This is even worse considering that MIT is known for its research in embedded computers in clothing and the airport is right around the corner from MIT! Also she walked up to the airline desk and asked when a flight was coming in because she was picking up a friend. She did not even try to get through the security checkpoint.

2007-09-22