Subject: General Tech | December 9, 2014 - 09:40 PM | Scott Michaud
Tagged: windows, windows 10, patch, patch tuesday
These are the sorts of things that will happen in prerelease software. Gabriel Aul, leader of the Data and Fundamentals Team at Microsoft and blogger for the Windows Insider Program, announced on Twitter that today's Windows Update for Internet Explorer may not install if Office is also install. The workaround is, if the update fails, to uninstall Office, apply the update, and then reinstall Office. Unfortunately, I am not able to give my personal experience because I use LibreOffice (I did not want to purchase a commercial license of Office).
I was not expecting to use this fail-bandaid image again, so soon.
If it wasn't an important security update, another option would be to wait for the next build. I know that, when I first installed Windows 10, I had a similar problem with a Defender update that continually failed. The install failure was fixed when I upgraded to Build 9860. The next version of Windows 10 is probably not too far away... … but this is a security update.
Hopefully this is one less thing to break when it hits full release next year.
Subject: General Tech | December 6, 2014 - 04:30 AM | Scott Michaud
Tagged: windows 10, windows, patch, microsoft
A few days ago, I attempted to install my Windows updates, but one failed. After complaining about the update not being accepted, it would ask you to restart your computer, where it would proudly proclaim that you have an update pending... ad infinitum. It apparently did the same for many others, including Paul Thurrott (who voiced his concerns on Twitter).
Some day (of silence) later, and a workaround has been voiced. As far as I can tell, it was originally discovered by a member of the community, but an Engineering General Manager at Microsoft suggested that Paul Thurrott try it, even though the GM's official workaround was slightly different.
Long story short, here are the steps:
- Go to Add or Remove Programs.
- Go to View installed updates.
- Search for KB3019269 and uninstall it. Do not restart.
- Search for KB3018943 and uninstall it. Do not restart.
- Search for KB3016725 and uninstall it. Do not restart.
- Search for KB3016656 and uninstall it. Restart your computer.
- Run Windows Update and install whatever it tells you to.
- I needed to do Step 7 twice.
- Reboot a second time.
When I did this procedure, Windows Update complained about a failed update. Retrying it, without rebooting, was successful however. If you experienced this problem, be prepared for a potential false error – the fix might have still been successful.
This was actually the second update to fail in the exact same way, the first being a Windows Defender patch from the initial Technical Preview release. That time, the problem went away when Microsoft released a new build and I updated to it. The same probably would be true when Microsoft replaces Build 9879 with whatever they have upcoming, albeit that is at least a month away. As far as I can tell, not a whole lot has changed.
Again, this is pre-release software. I will not knock Microsoft for it, especially since the update procedure is one of the key points of focus for the entire Technical Preview. The occasional failure is to be somewhat expected.
Subject: General Tech | March 11, 2013 - 02:27 PM | Jeremy Hellstrom
Tagged: Kaspersky Labs, patch
It would seem that a single specially malformed IPv6 packet is enough to completely lock up a PC protected by several versions of Kaspersky Internet Security. There is currently a private patch available for machines suffering from this issue and there will be an official patch pushed out in the very near future. According to The Register this flaw was originally reported to Kaspersky in January but as they had not released a patch the original discoverer of the flaw has gone public, which was obviously what it took to get them to fix the issue. If you run into problematic PCs over the next few days you might want to check for Kaspersky Labs software before you really get into troubleshooting.
"After receiving feedback from the researcher, Kaspersky Lab quickly fixed the error. A private patch is currently available on demand and an autopatch will soon be released to fix the problem automatically on every computer protected by Kaspersky Internet Security 2013."
Here is some more Tech News from around the web:
- Engineers Build "Self-Healing" Chips Capable of Repairing Themselves @ Slashdot
- Here's the $4.99 utility that might just have saved Windows 8 @ The Register
- Intro to Embedded Linux Part 1: Defining Android vs. Embedded Linux @ Linux.com
- DIY Lighting Solutions @ Hack a Day
- ROFIS JR30 Rotating Head CREE R5 1xAA LED Flashlight Review @ ModSynergy
Subject: General Tech | March 5, 2013 - 06:26 AM | Tim Verry
Tagged: security, patch, mcrat trojan, Java, exploit
Java developer Oracle recently released a patch to its Java Platform Standard Edition client to address two exploits used by attackers to install the McRAT trojan onto users machines. Specifically, Oracle is issuing the patch for vulnerabilities CVE-2013-1493 and CVE-2013-0809.
The vulnerabilities were related to Java running in a web browser. When users visit a malicious web site with vulnerable versions of Java installed, attackers are able to remote execute the McRAT trojan. That trojan was subsequently used to download additional malware to further compromise the machines in question. According to Oracle, the vulnerability was first discovered on February 1st, 2013 but did not make it in time to be rolled into that month’s scheduled update. As a result, Oracle slated it for inclusion in the Java platform update on April 16, 2013, but reconsidered after seeing exploits using these vulnerabilities in the wild. While servers and standalone Java installations are not affected, consumers will need to apply the patch via Java SE’s automatic updater or by manually installing the patch from this page. Currently, all Java SE versions prior to this patch are affected, including JDK and JRE 7 Update 15, 6 Update 41, and 5.0 Update 40 (or earlier).
Oracle states that the patch is a critically important update, and users should update as soon as possible. If you have not already applied the update (or given up on Java and uninstalled it completely--heh), start up Java and check for updates to grab the patch.
Subject: General Tech | June 22, 2011 - 10:31 PM | Scott Michaud
Tagged: patch, dx11, crysis2
Crysis 2 has shed the resource hog reputation of its predecessor while simultaneously shedding its reputation as a game to show off your computer with. There was also a lot of ranting in the forums during it and its demo's releases about how good of PC game it was altogether. Coming on Monday, Crytek is setting to release their anticipated DirectX 11 patch along with a higher resolution texture pack for those with computers that scoff at Crysis 2 in its current state.
Can you run me now? Good.
(Image from Crytek, modified)
The change list for patch 1.9 includes a set of notable additions:
- DX11: Tessellation + Displacement Mapping
- DX11: High Quality HDR Motion Blur
- DX11: Realistic Shadows with Variable Penumbra
- DX11: Sprite Based Bokeh Depth of Field
- DX11: Parallax Occlusion Mapping
- DX11: Particle Motion Blur, Shadows, and Art Updates
- DX11: Water Rendering improvement using Tessellation and Displacement Mapping
- Realtime Local Reflections
- Added support for Higher Resolution Textures Package
- Improved advanced video settings menu
- Improved Tone Mapping
- (And the usual bug fixes and such)