Showing results for Security Archives - Visual Studio Setup

Dec 11, 2008
0
0

Another Possible Workaround for Error 1330

Heath Stewart Heath Stewart

When installing Visual Studio 2008, you might run into an error dialog that reads, Error 1330.A file that is required cannot be installed because the cabinet file D:\cab1.cab has an invalid digital signature. This may indicate that the cabinet file is corrupt. The path and name of the cabinet may be different, but might often be D:\cab1.cab, ...

InstallationVisual StudioLogging
Dec 14, 2007
0
0

How to Workaround Error 1330 During Visual Studio 2008 Installation

Heath Stewart Heath Stewart

When installing Visual Studio 2008, you might run into an error dialog that reads, Error 1330.A file that is required cannot be installed because the cabinet file D:msdncab2.cab has an invalid digital signature. This may indicate that the cabinet file is corrupt.The path and name of the cabinet may be different, but might often be D:msdncab2.cab, ...

InstallationVisual StudioLogging
Jul 13, 2007
0
0

KB928365 for MS07-040 Leaves Some Managed Applications Sluggish

Heath Stewart Heath Stewart

After installing Security Update KB928365 for the Microsoft .NET Framework 2.0 to fix MS07-040, some users are noticing some managed applications - especially those developed using the Windows Presentation Framework (WPF) - are running sluggish.The apparent problem is that native images, which are assemblies already compiled to native code, do not ...

InstallationNewsSecurity
Jul 12, 2007
0
0

Immediate Custom Actions Always Impersonate

Heath Stewart Heath Stewart

Windows Installer is a client/server application. When you install a package using msiexec.exe - which is executed by default in response to shell verbs such as Install - or APIs like MsiInstallProduct the package is initially processed under the user's credentials. This means, of course, that in over-the-shoulder elevation when administrative ...

InstallationCustom ActionsUAC
Oct 20, 2006
0
0

Impersonating the Right Token in Vista

Heath Stewart Heath Stewart

In The NoImpersonate Bit Mistake, Robert Flaming of the Windows Installer team discusses how some custom actions may fail because they impersonate the non-privileged client token and won't be able to perform some actions. Such a scenario is described in Custom Actions under UAC on Vista. For administrative users on Vista, a client token would ...

InstallationUACSecurity
Apr 21, 2005
0
0

Potential Legal Risks with Unauthorized Wi-Fi Access

Heath Stewart Heath Stewart

Bruce Schneier pointed out an interesting article that got me thinking and even made me laugh a little. From the article: Suppose you turn on your laptop while sitting at the kitchen table at home and respond “OK” to a prompt about accessing a nearby wireless Internet access point owned and operated by a neighbor. What potential ...

Security
Mar 29, 2005
0
0

Thawte Notary

Heath Stewart Heath Stewart

I'm now a Thawte Web of Trust (WOT) notrary and am able to make assertions in person of your identity in order to get your own name on a free Thawte Freemail S/MIME certificate. This is a certificate that allows you to encrypt and sign email message using most email applications available.How does it work? You start by signing up for a free ...

Security
Mar 6, 2005
0
0

The Dangers of RunOnce and Run Registry Keys

Heath Stewart Heath Stewart

A recent project I worked on was to replace functionality for part of our patching process that runs commands after reboot, a task not too uncommon for installers - most notably because files were in use when the installers ran. Typically when files are in use installers such as Windows Installer and many proprietary installers will schedule a ...

InstallationDevelopmentSecurity
Feb 24, 2005
0
0

Security Improved…then Destroyed

Heath Stewart Heath Stewart

Michael Howard - our Sr. Security Program Manager here at Microsoft - blogs about how the improved security features in XP SP2 were effectively destroyed in an article in PC Magazine, "Making Windows XP Start Faster", by turning off the Automatic Updates and Internet Connection Firewall (ICF) services.Great improvements have - and are still - being...

Security

Feedback