Search This Blog
Thursday, October 7, 2010
Access Denied in Windows 7 Registry
Windows 7 is fast and easy to use but many users said they had tried and went back to XP. They said Windows 7 was not stable. Some complained about program not able to run or run slower than XP after some usages. Reinstallation of these programs often failed. This article will describe a way to solve some of these problems.
Why?
One of the problems is the denial of access to change certain keys required by the programs in the Registry. After some period, the ownership or the permission of the Registry key will be changed for some reasons, probably caused by User Account Control (UAC). The programs will lose the privilege to access and change these keys under normal operation. The solution is to restore the ownership and permission of these keys.
How ?
a) Prepare to check which key was denied the access.
To monitor the Registry, download Process Monitor . Install and run.
3. To limit the number of events to be display, in the “Filter” menu, select “Filter”
4. In the Architecture dropdown box, select “Result” and type in “ACCESS DENIED” in the box as shown
5. Click ok. The monitor is now ready to capture any access denial events for study.
b) Run the faulty application or installation or any program again. this time, check if there are Registry keys being denied access. Note down this key and use “Regedit” to reclaim ownership or permission to change these keys.
What if there are plenty of Registry to Change?
When there is a lot of keys to reclaim ownership or permission, it may be necessary to reset the entire Registry to the defaulted ownership or permission.
How ?
Important Notes: It is advisable to backup by exporting the entire Registry or otherwise save in another disk or partition. The reset of ownership or permission by SubInACL can upset some programs.
1. Download SubInACL which is a program that will enable administrators to manage files, registry keys, and services.
2. Unzip and run SubInACL. It will create a new folder called “Windows Resource Kits/Tools” inside the Program Files (x86) folder.
3. Start up “NotePad”. Copy and paste the following
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=administrators=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=administrators=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=administrators=f
subinacl /subdirectories %SystemDrive% /grant=administrators=f
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=system=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=system=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=system=f
subinacl /subdirectories %SystemDrive% /grant=system=f
4. Save NotePad file as “Reset.cmd” in the “Windows Resource Kits/tools” folder.
5. In the box of the Windows Startup Button, enter “cmd” (without quotes) and rightclick “cmd.exe” when the file appears at the top of the window and select to run as Administor.
6. Type “cd C:\Program Files (x86)\Windows Resource Kits\Tools” at the prompt, follow by “reset.cmd”
7. The program will run for the next 3 minutes to change all the ownership and permission of the entire keys in the Registry to the default value
Tuesday, August 24, 2010
The Tokyo Tunnel - G-Cans
Introduction
The Tokyo flood tunnels – G-Cans project started construction in 1992 and completed in 2004, about 12 years later. It was just in time to be tested in tyhoon 22 in 2004 when 14 families were reported to be affected instead of 236 families before the completion of the project. The tunnel collects water from Tokyo downtown district and discharge it into the Edogawa river.
The Tunnel
The tunnel is 10m in diameter and about 6.3 kilometers (four miles) long. It is buried 50 metre under the ground in the Tokyo suburbs.
It has 5 concrete silos, each having a diameter of about 32 metres and is about 70 metres tall.
The tunnel is connected to a gigantic water tank measuring about 78m width, 177m long and 25m tall (or 350,000 m3). The tank is propped by 59 numbers of gigantic pillar, each weighing about 500 tons. As the pillars look like those in ancient temples, some named this water tank “the underground temple of Tokyo”.
Connected to this water tank are series of water pump that have a total output of 14,000 hp or 10 MW. They can discharge flood water up to 200 m3 per second or one Olympic pool water in 10 seconds.
The Cost
Estimated to be about US 2.0 billion
The Volume
The tunnel can hold approximately 640,000 m3 of flood water.
Monday, August 23, 2010
Web Query Hangs
Introduction
Users of Microsoft Excel and other web query software, like IMACROS, often query websites to get the web information for stocks or other purposes. These users will write scripts to automate the process. Sometimes, the process will hang causing lost of data. This article will describe methods to overcome this problem.
Why it Hangs?The process will hang either because the website is down or because the web traffic is high. A webpage usually takes 5 to 6 seconds to download may take up to 10 minutes or even hours.
How to Over come?
The following methods have been tried without much success.
a) Introduce timeout events in scripts or VBAThe script is waiting for a webpage to download and will not activate the timeout under such events.
b) Ping the website before proceeding to download
This will only help if the website is down but it will not help when there is a delay due to heavy traffic.
The better method is to modify the window registry’s internet setting with a timeout of appropriate delay. This is because most browsers use this delay in the internet setting.
http://support.microsoft.com/kb/181050
How to Modify the Registry?
The timeout is not native in the registry’s internet setting. It will have to be created under
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]. The keyword is "ReceiveTimeout”. Its value will depend on normal delay in webpage download.
The Window default is
Internet Explorer 4.0 and Internet Explorer 4.01 --- 5 minutesIn VBA, add the following code before downloading the data
Internet Explorer 5.x and Internet Explorer 6.x---- 60 minutes
Internet Explorer 7 and Internet Explorer 8 ------- 60 minutes
Set myWS = CreateObject("WScript.Shell")'write registry keymyWS.RegWriteThe value of “15000” means a delay of 15 seconds. Insert the same code just after the download script and change the value to suit normal surfing.
"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet " &
_"Settings\ReceiveTimeout", "15000", "REG_DWORD"
Saturday, August 21, 2010
Error Message for Dynamic Link Library mscvp90.dll
Introduction
When installing Ad-aware program, one will get the following error message for some PCs:
"procedure entry point?_xfunc@tr1@std@@YAXXZ cannot be located in the dynamic link library MSVCP90.dll "
Why?
This error is due to a wrong version of msvcp90.dll being installed by some programs for some reasons.
The dll is one of the C Run-Time Libraries for Visual C++ and programs such as Ad-aware use them.
According to some descriptions, there are 2 versions of such dll having the same name, msvcp90.dll, one for 64 bits and the other for 32 bits machine. XP operating system is a 32 bit machine.
What Next?If one is using a XP operating system and has encountered the problem.
Step 1: Download the correct version of Microsoft Visual C++ 2008 Redistributable Package (x86) from the following website for XP machines
http://www.microsoft.com/downloads/en/confirmation.aspx?familyId=9b2da534-3e03-4391-8a4d-074b9f2bc1bf&displayLang=en
Step 2 : Locate the directory C:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRTxxxxx. In the directory, one should find 3 Nos of 90.dll files. Rename these files with an extension of .tmp. If one has 2 directories of similar name, do the same.
Step 3: Run the downloaded installation program called “credist_x86.exe”. The installation program will automatically uninstall and reinstall the correct version of 90.dll programs.
Step 4: Locate the directory C:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRTxxxxx again. One will find the new 90.dll programs. Copy all the 3 programs to “c:\windows\system32”
Friday, August 20, 2010
Marina Barrage - Fighting With Nature
There was recent spate of flooding in Singapore. The famous Orchard Road was under 300 mm of water. Some blamed the Marina Barrage that was completed 3 years ago. This article will examine how the barrage works and if it can alleviate flooding in low-lying areas.
The Marina Barrage
The Marina Barrage (Chinese:滨海堤坝) is a 350 metres low level dam in Singapore built across the mouth of the bay, between Marina East and Marina South. It was officially opened on 1 November 2008.
The barrage serves 3 purposes:-
a) Provide Water Supply
b) Perform Flood Control
c) Lifestyle Attraction
The video about the barrage can be found here
How the Barrage Works?
During heavy rain, the series of 9 crest gates at the dam will be opened to release flood water into the open sea when the tide is low. The 7 Nos of 40 m3/s (about 2.5 MW @ 3.5 m head) pumps, capable of pumping an Olympics-size swimming pool per minute will work when the tide is high. This mechanism is supposed to alleviate flooding in the low-lying areas in the city such as Chinatown, Boat Quay, Jalan Besar and Geylang.
The video of the crest gate and the pumps can be found here and here.
The Marina Basin
The Marina Basin has a surface area of about 240 ha (240,000 m2). It is linked to a 100-km2 rain catchment area shown green in the attached model. During raining days, the drains and canals will channel the flood water into the Marina Basin.
The flood
A series of flood occurring after the Barrage was completed
Can the Marina Barrage Cope?
The Barrage and the basin will not eliminate flooding totally if there is a very heavy downpour and the tide is high. This is because the rain fall from the water catchment, if more than those on 17 July, may raise the water level Marina Basin by more than 4.0 metres (discounting the retained water on the surface of the catchment and the buffer in drains/canals/river) during a heavy downpour as shown in table 1.
What Can We Do?
a) Reduce the Water Catchment Area
If we were to reduce the catchment area by 40%, this will reduce the water level rise in the basin by about the same proportion to 4.5 metres per hour without pumps and 4.0 metres per hour with pumps in full operation. The alternative is to regulate the flood water flow from higher areas.
b) Allow More Buffer Capacity In Basin
With the present barrage, there is a limit on how much a buffer can be created in the basin because the gates are not totally water tight. There will be seawater leeching into the basin if there is large difference in the level of water in the basin and the open sea; also, the pumping electricity cost would be high if we keep the water level in the basin low.
Reducing the water catchment area appears to be a better of the 2 solutions for the present setup at the Marina Barrage.
Sunday, July 25, 2010
Where Long Term Funds Park Their Money
The Investment Company Institution (ICI) keeps in touch with the Fund Managers (The Funds), their shareholders, directors and investment advisers regularly. They aim to facilitate the effective functioning of Funds under the U.S. legislative and regulatory framework. They keep and release the Funds' investment in local as well as in foreign countries. This article will aim to introduce ICI as well as to analyse the data they have collected for the information of the readers.
The Data Collections
The data collected by ICI can be found here in this PDF file.
The data tabulated out how much the Funds have invested in Foreign and Domestic equities as well as in bonds and other investment vehicles.
Graphical Plot
The following is a graphical plot of the data kept by ICI for Foreign and domestic equities.
(Doubleclick to enlarge)
Divergence Between Equities and Funds
There is a divergence between DOW and the US domestic funds as shown in the following graph. This graph illustrates that the US domestic equity Funds decreases as DOW increases in value during the period between March 2009 and April 2010. The LTF withdrew even more funds from the domestic equity market during period between April 2010 to present date.
Thursday, July 1, 2010
Keeping Virus Away The Easy Way
Computer viruses often attack the Registry of the XP operating system, making computer going hire-wired; sometimes, it immobilizes the computer and make them hanged. Often, users just have to re-install a new copy of the XP operation system but one will have to re-install all the programs and all other stuffs in the computer. This article tells how one can restore the computer to its original condition when such viruses attacked.
What is Registry and How Viruses Can attack it?
Registry is a place where XP keeps all the information about the computer's hardware and software. It is being used by all the users including 3rd party hardware and software to find where data are stored in the harddisk. If a new program has just been installed or files added, it will update its record. Registy is the one place where it is most vulnerable to virus attacks. Once the viruses reside in the registry, they can be loaded into the computer memory. It will then take over the computer's operation. Sometimes, using normal methods just cannot get rid of these viruses.
What can we do to prevent virus attacks?
We can install virus protection software, firewalls, virus scanning software etc; however, this will never be able to keep all the viruses away. Some viruses have learning capabilities and may lock themselves such that it will prevent users or any virus software from detecting and deleting them.
However, we can do the following to prevent these viruses from attacking the computer:-
a) Regular maintenance. Scanning, detecting, preventing and deleting the existence of viruses using one or more of the following programs
1) Virus Shield, such as norton, trendmircro, Macfee shields etc
2) Spyware and Malware Scanner, such as Adaware
3) Hijackthis
Run these program once everyday or every other day. On detection of the viruses, scan the computer in full using Virus full scanning programs
b) Regularly saving a copy of the registry, booting files and other information so that one can restore them. There are a few alternatives
1. Registry Saving and Restoration
XP can save a copy of the registry automatically whenever there is a change in the registry such as after each installation of a new program. These registry files are installed in the "System Volume Information" folder.
When there is need to restore the registry or when virus attack the computer, one can restore the registry to the saved position. For instruction. follow this link.
Alternatively, one can save a copy of the registry manually by using the "export" function of the Registry Editor. To access the Registry Editor, click Start button and then in the dropdown box, enter "Regedit" (without quotes) and click ok.
2) Backup a copy of System State
This will save not only a copy of the Registry but also the booting files and the COM+ files. The complete system state for the restoration of the XP system. One would need a free disk space of about 600 MB.
2. Click Start, then in the All program/Accessories/System Tool folder, select the Backup program and finally, reaching the following screen.
Select "Let me choose what to backup" and click Next. Now, expand My Computer folder and then select to put a tick in the "System state" folder as shown and click Next
Choose a place to store the backup files using Browse button and then enter a name for this backup file. It is good to store the backup file in a thumbdrive or RW CD or another harddisk so that it can be read and the backup file restored in case of harddisk failures. Note that the backup file can be more than 500 MB
Click Next
Select Advance button and Normal in dropdown box of the subsequent screens, one would reach the following screen to select the verification of file after backup. Tick the box and then Next. The computer will do the rest of job.
Step 2: Restoring the backup files
1. After having installed a new XP operating system in the existing harddisk and provided one has not erase or change any program or file, one can restore the XP system to its orginal condition
2. Following Step 1-2, then choose restore files and settings instead, one should reach the following screen. Browse to the directory of the backup file and doubleclick it, a new screen should show the folder "System State". Tick the box to select and click Next. Click advance in the next screen. Change the default setting if necessary.
NOTE: The backup program, NTBACKUP, is not installed by default in Windows XP Home Edition. Install it using the instructions available at: Q302894.
Select the System State check box
NOTE: If you want to back up your system settings as well as your data files, you should back up all the data on your computer plus the System State data, which includes such things as the registry, the COM+ class registration database, files under Windows File Protection, and boot files.
In the Backup destination list, click the backup destination that you want to use.
If you clicked File in the previous step, type the full path and file name that you want in the Backup media or file name box. Note that you can also specify a network share as a destination for the backup file. Click Start Backup . The Backup Job Information dialog box appears. Under If the media already contains backups, use one of the following steps:
If you want to append this backup to previous backups, click Append this backup to the media.
If you want to overwrite previous backups with this backup, click Replace the data on the media with this backup .
Click Advanced. Select the Verify data after backup check box.
In the Backup Type box, click the type of backup that you want. When you click a backup type, a description of that backup type is displayed under "Description." Click OK , and then click Start Backup . A Backup Progress dialog box appears, and the backup starts. When the backup is complete, click Close.
Important Note:
Viruses sometimes reside in the Registry and also the booting files. It is important to make sure that when one save a copy of the Registry or booting files, one does not save also the viruses. To make sure
a) Clean the computer before saving;
b) Always save new copies in different names;
Enabling DVI Interface in LCD Monitor
- Enter Device Manager by clicking Start button, then select run, in the dropdown box, enter "devmgmt.msc" (without quotes) and click ok.
- In the Monitors folder, one should find some monitor drivers and a driver called "Plug and Play Monitor". Remove all the monitor drivers, left except the "Plug and Play Monitor". One can easily remove the drivers by right clicking and then either disable or uninstall the drivers.
- Switch off the monitor and computer. Remove the VGA cable and install or left the DVI cable attached to the monitor.
- Re-start the computer, one should boot up with signal
- Install the DVI software as provided by the manufacturer. Check the Display property to ensure that the DVI software is properly installed.
- doubleclicking the VGA driver and in the "Driver" tab,
- select "Update Driver" and then
- select "No, no this time", click next
- select "install from a list or specific location", click next
- select "Don't search, I will choose the driver to install" click next
- finally, select "Plug and Play monitor" and click next to install .
Window 7 reinstallation problem
Windows 7 is fast and easy to use but many users said they have tried and go back to XP and they said Windows 7 was not stable. Some complained that program could not run or run even slower than XP after some usage. Reinstallation of these programs often failed. This article will describe a way to solve some of these problems.
Why?
One of the problems is the denial of access to change certain keys required by the programs in the Registry. After some period, the ownership or the permission of the Registry key has been changed for some reasons and the programs lost the privilege to access and change these keys for normal operation. The solution is to restore the ownership and permission of these keys.
How ?
a)Prepare to check which key was denied the access.
1. Download Process Monitor
3. In the “Filter” menu, select “Filter”
4. In the Architecture dropdown box, select “Result” and type in “ACCESS DENIED” in the box as shown
5. Click ok. The monitor is ready to capture any access denial case for study.
b) Run the faulty application or installation or any program at fault and check if there are Registry keys being denied access to change and note down this key and use “Regedit” to reclaim ownership or permission to change these keys.
What about multiple Registry Corrections?
When there is a lot of keys to reclaim ownership or permission, it may be necessary to reset the entire Registry to the defaulted ownership or permission.
How?
1. Download SubInACL http://www.microsoft.com/downloads/details.aspx?FamilyId=E8BA3E56-D8FE-4A91-93CF-ED6985E3927B&displaylang=en which is a program that enables administrators to obtain security information about files, registry keys, and services, and transfer this information from user to user, from local or global group to group, and from domain to domain.
2. Unzip and install SubInACL that will create a folder called “Windows Resource Kits” in the program files (x86) folder.
3. Start up “NotePad”. Copy and paste the following
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=administrators=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=administrators=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=administrators=f
subinacl /subdirectories %SystemDrive% /grant=administrators=f
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=system=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=system=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=system=f
subinacl /subdirectories %SystemDrive% /grant=system=f
4. Save NotePad file as “Reset.cmd” in the “Windows Resource Kits/tools” folder.
5. In the box of the Windows Startup Button, enter “cmd” (without quotes) and rightclick “cmd.exe” when the file appears at the top and select to run as Administor.
6. Type in “cd C:\Program Files (x86)\Windows Resource Kits\Tools” at the prompt and then “reset.cmd”
7. The program will run for about 3 minutes to change all the ownership and permission of the entire keys in the Registry to the default value
Saturday, June 19, 2010
Will History Repeat Itself?
Introduction
Many used to say that history will repeat itself in the stock markets; what has happened will happen again. Therefore, Technical Analysis Technicians have come out with many shapes, patterns, trendlines and formations to predict the futures of a stock or currency market. This article will examine the DOW index from a technical prospective and check if it is possible for DOW to repeat itself.
What will be used?
Trendlines. There are many different types of trendline; some are called necklines, others are just simple trendlines. Necklines are usually found when there is a “head and shoulder” formation. Once a neckline or trendline is broken, there will be large movements in prices.
The Occasions
There are 2 occasions recently when DOW broke necklines or trendlines and sent stocks plunging. One was in January 2010 due to debt crisis in Dubai; the other was in May 2010 when debts in Greece shocked the markets.
In both occasions, the necklines were broken. The Dubai incident was soon forgotten. Will they forget the Greece incident?
The Technical Analysis
The Dubai and the Greece incidents are shown in the following chart marked wave 3-4 and wave 5-1 respectively.
a) The similarities1) A “dead cross” when the 20-day MA crossed under the 50-day MA.
2) A broken neckline.
3) At the point where index regained and touched the neckline (As shown in blue vertical line)
a. The stochastic was oversold and just about to cross under its own moving average
b. The Bollinger bands had just contracted
c. The 20-day MA had just flattened with the 50-day MA reducing its decline
b) The differences
1) The Greece’s 20-day MA moved further down from the 50-day MA
2) DOW and its 20-day MA in the Greece incident crossed below the 200-day MA
3) The Greece’s depth of fall from its neckline did not satisfy the conditions of the “head and shoulder”. The depth of fall must be equal or more than the height of “head” measured from the base of the neckline.
Will DOW Break the Neckline This Time?Similar pattern and lots of similarities occurred in Nov/Dec 2007 when the credit crisis caused a plunge in the markets. For example, DOW broke a trendline sending index plunging below the 200-day MA and regained to touch the trendline. This pattern is more similar to the Greece incident.
The analysis suggests that DOW is more likely to reflect from its neckline than to break the neckline.
When Will DOW Makes the Decision?
If one is long, it would be prudent to “buy insurance” by hedging or other similar methods. It is recommended to stay away from the markets until DOW’s 20-day MA crosses over the 50-day MA. Even then, it is good to check if the neckline has been broken.
Disclaimer:
Information here is for sharing and learning. It is not intended to give any advice on any stock or movement or trend of any index. If a price or movement of a stock/index is given, it is only intended for illustration. The reader shall verify the information given here before using them.
Simple and Easy Way To Backup Photos, Movies and Documents from handphones
2 December 2023 In the past, we used iTunes when we wanted to transfer or backup our photos, movies, and documents from iPhones or Androi...
-
1. How Air-conditioning works? 2. The Special Tools and Equipment? 3. The Professional Must Owned Equipment? 4. The Professionals Verse ...
-
9 April 2018 1) The Hard Wiring Connection 2) Blue Tooth Connection 3) More about SPDIF and HDMI (ARC) 4) Why HDMI (ARC) Not Working Xiao...
-
3 February 2018 https://tinyurl.com/y7gbj78v 1. The Soft Reset 2. The Hard Reset 3. Factory Reset for New Xiaomi TV Introduction There ...