Tag Archives: developers

Install Python from Source on Linux

\r\n\r\n\r\nThis article is helpful for you to install Python from source on Linux system. Follow the steps as describes below:\r\n\r\nlocalhost:~$ su −\r\n\r\n\r\nPassword: [enter your root password]\r\n\r\n\r\nlocalhost:~# wget http://www.python.org/ftp/python/2.3/Python−2.3.tgz\r\n\r\n\r\n Resolving www.python.org… done.\r\n\r\n\r\n Connecting to www.python.org[194.109.137.226]:80… connected.\r\n\r\n\r\n HTTP request sent, awaiting response… 200 OK\r\n\r\n\r\n Length: 8,436,880 [application/x−tar]\r\n\r\n\r\n …\r\n\r\n\r\nlocalhost:~# tar xfz Python−2.3.tgz\r\n\r\n\r\nlocalhost:~# cd Python−2.3\r\n\r\n\r\nlocalhost:~#/Python−2.3# ./configure\r\n\r\n\r\n checking MACHDEP… linux2\r\n\r\n\r\n checking EXTRAPLATDIR…\r\n\r\n\r\n checking for −−without−gcc… no\r\n\r\n\r\n …\r\n\r\n\r\nlocalhost:~#/Python−2.3# make\r\n\r\n

gcc −pthread −c −fno−strict−aliasing −DNDEBUG −g −O3 −Wall −Wstrict−prototypes\r\n

\r\n

−I. −I./Include −DPy_BUILD_CORE −o Modules/python.o Modules/python.c\r\n

\r\n

gcc −pthread −c −fno−strict−aliasing −DNDEBUG −g −O3 −Wall −Wstrict−prototypes\r\n

\r\n

−I. −I./Include −DPy_BUILD_CORE −o Parser/acceler.o Parser/acceler.c\r\n

\r\n

gcc −pthread −c −fno−strict−aliasing −DNDEBUG −g −O3 −Wall −Wstrict−prototypes\r\n

\r\n

−I. −I./Include −DPy_BUILD_CORE −o Parser/grammar1.o Parser/grammar1.c\r\n

\r\n…\r\n\r\n\r\nlocalhost:~/Python−2.3# make install /usr/bin/install −c python /usr/local/bin/python2.3\r\n\r\n\r\n…\r\n\r\n\r\nlocalhost:~/Python−2.3# exit\r\n\r\n\r\n# logout\r\n\r\n\r\nlocalhost:~$ which python\r\n\r\n\r\n /usr/local/bin/python\r\n\r\n\r\nlocalhost:~$ python\r\n\r\n

Python 2.3.1 (#2, Sep 24 2003, 11:39:14)\r\n

\r\n

[GCC 3.3.2 20030908 (Debian prerelease)] on linux2\r\n

\r\n

Type “help”, “copyright”, “credits” or “license” for more information\r\n

\r\n

 

\r\n

>>> [press Ctrl+D to get back to the command prompt]\r\n

\r\n \r\n\r\nlocalhost:~$\r\n\r\n\r\n \r\n\r\n \r\n\r\nNote: All images, logos and trademarks shown on this site are property of their respective organizations

What is new in Firefox 4 Beta?

FireFox 4\r\n\r\n \r\n\r\n\r\n\r\n \r\n\r\nWhat is new?\r\n

\r\n

\r\n

\r\n

\r\n

    \r\n

  • Firefox 4 Beta 2 is available in 24 languages.
  • \r\n

  • Tabs are now on top by default on Windows and OSX – Linux will be changing when the theme has been modified to support the change.
  • \r\n

  • You can turn any tab into an “App Tab” by right-clicking on it and selecting “Make into App Tab” from the context menu.
  • \r\n

  • Web developers can animate content using CSS Transitions.
  • \r\n

  • Responsiveness and scrolling improvements from the new retained layers layout system.
  • \r\n

  • JavaScript speed improvements due to engine optimizations.
  • \r\n

  • Changes to how XPCOM components are registered in order to help startup time and process separation.
  • \r\n

  • See the complete changelist from the previous beta.
  • \r\n

\r\nAs well as these features from previous Firefox 4 Betas:\r\n

    \r\n

  • You can search for and switch to already open tabs in the Smart Location Bar
  • \r\n

  • New Addons Manager and extension management API (UI will be changed before final release)
  • \r\n

  • Significant API improvements are available for JS-ctypes, a foreign function interface for extensions.
  • \r\n

  • The stop and reload buttons have been merged into a single button on Windows, Mac and Linux.
  • \r\n

  • The Bookmarks Toolbar has been replaced with a Bookmarks Button by default (you can switch it back if you’d like).
  • \r\n

  • Crash protection for Windows, Linux, and Mac when there is a crash in the Adobe Flash, Apple Quicktime or Microsoft Silverlight plugins.
  • \r\n

  • CSS Transitions are partially supported.
  • \r\n

  • Full WebGL support is included but disabled by default at this time.
  • \r\n

  • Core Animation rendering model for plugins on Mac OS X. Plugins which also support this rendering model can now draw faster and more efficiently.
  • \r\n

  • Native support for the HD HTML5 WebM video format.
  • \r\n

  • An experimental Direct2D rendering backend is available on Windows, turned off by default.
  • \r\n

  • Web developers can use Websockets for a low complexity, low latency, bidirectional communications API.
  • \r\n

  • Web developers can update the URL field without reloading the page using HTML History APIs.
  • \r\n

  • More responsive page rendering using lazy frame construction.
  • \r\n

  • Link history lookup is done asynchronously to provide better responsiveness during pageload.
  • \r\n

  • CSS :visited selectors have been changed to block websites from being able to check a user’s browsing history.
  • \r\n

  • New HTML5 parser.
  • \r\n

  • Support for more HTML5 form controls.
  • \r\n

\r\nDevelopers can find out about all the changes and new features at the Mozilla Developer Center.\r\n\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

System Requirements

\r\n

\r\n

\r\n

\r\n\r\nBefore installing, make sure your computer meets the system requirements:\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

Windows\r\n\r\nOperating System\r\n

    \r\n

  • Windows 2000
  • \r\n

  • Windows XP
  • \r\n

  • Windows Server 2003
  • \r\n

  • Windows Vista
  • \r\n

  • Windows 7
  • \r\n

\r\nMinimum Hardware\r\n

    \r\n

  • Pentium 233 MHz (Recommended: Pentium 500  MHz or greater)
  • \r\n

  • 64 MB RAM (Recommended: 128 MB RAM or greater)
  • \r\n

  • 52 MB hard drive space
  • \r\n

\r\n \r\n\r\nMac\r\n\r\nOperating System\r\n

    \r\n

  • Mac OS X 10.4 and later
  • \r\n

\r\nMinimum Hardware\r\n

    \r\n

  • Macintosh computer with an Intel x86 or PowerPC G3, G4, or G5 processor
  • \r\n

  • 128 MB RAM (Recommended: 256 MB RAM or greater)
  • \r\n

  • 200 MB hard drive space
  • \r\n

\r\n \r\n\r\nLinux\r\n\r\nOperating System\r\n\r\nPlease note that Linux distributors may provide packages for your distribution which have different requirements. Firefox will not run at all without the following libraries or packages:\r\n

    \r\n

  • GTK+ 2.10 or higher
  • \r\n

  • GLib 2.12 or higher
  • \r\n

  • Pango 1.14 or higher
  • \r\n

  • X.Org 1.0 or higher
  • \r\n

\r\nFor optimal functionality, following libraries or packages recommended:\r\n

    \r\n

  • NetworkManager 0.7 or higher
  • \r\n

  • DBus 1.0 or higher
  • \r\n

  • HAL 0.5.8 or higher
  • \r\n

  • GNOME 2.16 or higher
  • \r\n

\r\nMinimum Hardware\r\n

    \r\n

  • Pentium 233 MHz (Recommended: Pentium 500 MHz or greater)
  • \r\n

  • 64 MB RAM (Recommended: 128 MB RAM or greater)
  • \r\n

  • 52 MB hard drive space
  • \r\n

\r\n\r\n

\r\nDownloading\r\n\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

\r\n\r\nMozilla will provide Firefox 4 Beta for Windows, Linux, and Mac OS X in a variety of languages, though this first version is only available in English. Eventually you will be able to get the latest version of the Firefox 4 Beta in many languages. For builds for other systems and languages not provided by Mozilla, see the Contributed Builds section at the end of this document.\r\n\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

Installing

\r\n

\r\n

\r\n

\r\n\r\nInstalling Firefox 4 Beta will not overwrite your existing installation of Firefox. You won’t lose any of your bookmarks or browsing history, but some of your extensions and other add-ons might not work until updates for them are made available.\r\n\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

Uninstalling

\r\n

\r\n

\r\n

\r\n\r\nYou can remove Firefox 4 Beta with the Add/Removes Programs utility on Windows, by moving the Firefox application to the Trash on OS X, or by deleting the containing folder on Linux.\r\n\r\nBy default, removing Firefox 4 Beta won’t remove your bookmarks, web browsing history, extensions or other add-ons. This data is stored in your profile folder, which can be found by going to the Help menu and selecting Troubleshooting Information…. The button next to the Profile Directory line in Application Basics will open your profile directory in your system’s file explorer.\r\n\r\nPlease note that if you keep your profile, any version of Firefox that you install after removing Firefox 4 Beta will continue to use the bookmarks, web browsing history, add-ons, and other data from this profile folder.\r\n\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

Add-ons and Themes

\r\n

\r\n

\r\n

\r\n\r\nAdd-ons installed with previous versions of Firefox may not yet have been updated by their authors to work with this Firefox 4 Beta. If you wish to help test Add-ons, please install the Add-on Compatibility Reporter – your favorite Add-on author will appreciate it!\r\n\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

Known Issues

\r\n

\r\n

\r\n

\r\n\r\nThis list covers some of the known problems with Firefox 4 Beta which will be resolved in future versions:\r\n\r\n

All Systems
\r\n

    \r\n

  • For some users, scrolling in the main GMail window will be slower than usual (see bug 579260)
  • \r\n

  • Some plugin content, like the media controls on older YouTube videos, will be initially drawn incorrectly. Scrolling or hovering over the affected areas restores them (see bug 579262)
  • \r\n

  • The popular video sites Hulu.com and Netflix.com are not displaying content to beta users due to bad “user-agent” detection in their code (see bug 580843 and bug 522957)
  • \r\n

  • The Bookmark Toolbar is turned off by default even on existing profiles (see bug 574514)
  • \r\n

  • If you try to start Firefox using a locked profile, it will crash (see bug 573369)
  • \r\n

\r\n

Microsoft Windows
\r\n

    \r\n

  • This beta will not start on Windows 2000 (see bug 577486)
  • \r\n

  • A rendering problem with Google Finance can lead to instability (see bug 579558)
  • \r\n

  • Some graphics drivers may not work properly with full screen Ogg Theora HTML video acceleration (see bug 564391)
  • \r\n

  • When using a Persona, the maximize, minimize and close window buttons will not appear, though they will still work (see bug 574833)
  • \r\n

  • When using the Windows “Classic” theme the toolbars and tab strip may appear gray for several seconds as Firefox starts up (see bug 574638)
  • \r\n

\r\n

\r\n

\r\n

\r\n

\r\n

\r\n

Troubleshooting

\r\n

\r\n

\r\n

\r\n

    \r\n

  • Poorly designed or incompatible extensions can cause problems with your browser, including make it crash, slow down page display, etc. If you encounter strange problems relating to parts of the browser no longer working, the browser not starting, windows with strange or distorted appearance, degraded performance, etc, you may be suffering from Extension or Theme trouble. Restart the browser in Safe Mode. On Windows, start using the “Safe Mode” shortcut created in your Start menu or by running firefox.exe -safe-mode. On Linux, start with ./firefox -safe-mode and on Mac OS X, run: cd /Applications/Firefox.app/Contents/MacOS/\r\n./firefox-bin -safe-mode \r\n\r\nWhen started in Safe Mode all extensions are disabled and the Default theme is used. Disable the Extension/Theme that is causing trouble and then start normally.
  • \r\n

  • If you uninstall an extension that is installed with your user profile (i.e. you installed it from a Web page) and then wish to install it for all user profiles using the -install-global-extension command line flag, you must restart the browser once to cleanse the profile extensions datasource of traces of that extension before installing with the switch. If you do not do this you may end up with a jammed entry in the Extensions list and will be unable to install the extension globally.
  • \r\n

  • If you encounter strange problems relating to bookmarks, downloads, window placement, toolbars, history, or other settings, it is recommended that you try creating a new profile and attempting to reproduce the problem before filing bugs. Create a new profile by running Firefox with the -P command line argument, choose the “Manage Profiles” button and then choose “Create Profile…”. Migrate your settings files (Bookmarks, Saved Passwords, etc) over one by one, checking each time to see if the problems resurface. If you do find a particular profile data file is causing a problem, file a bug and attach the file.
  • \r\n

\r\n

\r\n

\r\n

\r\n

SQL Injection: How To Prevent Security Flaws In PHP / MySQL

\r\n

\r\n

\r\n

\r\n

\r\n

What is SQL Injection\r\nMost new web developers have heard of SQL injection attacks, but not very many know that it is fairly easy to prevent an attacker from gaining access to your data by filtering out the vulnerabilities using MySQL extensions found in PHP. An SQL injection attack occurs when a hacker or cracker (a malicious hacker) attempts to dump the data in a database table in a database-driven web site. In an unprotected and vulnerable site, this is pretty easy to do.\r\n\r\nSQL injection is a common vulnerability that is the result of lax input validation. Unlike cross-site scripting vulnerabilities that are ultimately directed at your site’s visitors, SQL injection is an attack on the site itself, in particular its database.\r\nThe goal of SQL injection is to insert arbitrary data, most often a database query, into a string that’s eventually executed by the database. The insidious query may attempt any number of actions, from retrieving alternate data, to modifying or removing information from the database.\r\n\r\nHow does SQL injection attack works\r\nIn order for an SQL injection attack to work, the site must use an unprotected SQL query that utilizes data submitted by a user to lookup something in a database table. The data could be from a search box, a login form or any type of query used to look up data using data input by user. It also means that querystring data used to query a database can create vulnerabilities.\r\nFor example:\r\n\r\nAn very simple unprotected query might look like this:\r\n\r\n

\r\n

\r\n

\r\n

SELECT * FROM items WHERE itemID = '$itemID'

\r\n

\r\n

Normally, you would expect a user to submit a username and password, which would be used to query the database table to see if the username and password exists. But what if someone used the following instead of a password?

\r\n

‘ OR ‘1′ = ‘1

\r\n

\r\n

\r\n

That would make the query used to look for the password look like this:

\r\n

\r\n

\r\n

SELECT * FROM items WHERE itemID = '' OR '1' = '1'

\r\n

\r\n

\r\n

\r\n

This would always return a True response and could literally display the entire table as the result for the query. This is a pretty scary thought if you are trying to keep your data secure. The problem with SQL injection is that a hacker does not have to know anything about your database or table structure.\r\n\r\nWhat if an error or some other issue caused your table structure to be exposed? Hackers are very good at forcing errors to occur that expose information that allows them to penetrate a site deeper. What if the following was entered in the password field?\r\n\r\n

\r\n

‘; drop table users;

\r\n

\r\n

How to prevent your database from SQL Injection attacks\r\nThere is a method for filtering the data that is used on the right side of the WHERE clause to look up a row in a database. The trick is to escape any characters that may be in the user input portion of the query that could lead to a successful attack.\r\n\r\nUse the following function to add backslashes to suspect characters and filter any data that is input by a user.\r\n\r\n

\r\n

function cleanQuery($string)\r\n{\r\n if(get_magic_quotes_gpc()) // prevents duplicate backslashes\r\n {\r\n  $string = stripslashes($string);\r\n }\r\n  if (phpversion() >= '4.3.0')\r\n  {\r\n   $string = mysql_real_escape_string($string);\r\n  }\r\nelse\r\n{\r\n $string = mysql_escape_string($string);\r\n}\r\nreturn $string;\r\n}\r\n\r\n// if you are using form data, use the function like this:\r\nif (isset($_POST['itemID'])) $itemID = cleanQuery($_POST['itemID']);\r\n\r\n// you can also filter the data as part of your query:\r\nSELECT * FROM items WHERE itemID = '". cleanQuery($itemID)."' "

\r\n

The first part looks to see if magic quotes is turned on. if so, it may have already added backslash escapes though a POST or GET method used to pass the data. If backslashes were added, they need to be removed prior to running it through the rest of the function.\r\n\r\nThe next part checks the PHP version. The built-in function that we want to use is called mysql_real_escape_string. This MySQL function only exists in PHP version 4.3.0 or newer. If you are using an older version of PHP, another MySQL function is used called mysql_escape_string.\r\n\r\nmysql_escape_string is not as effective as the newer mysql_real_escape_string. The newer version escapes the string according to the current character set. The character set is ignored by mysql_escape_string, which can leave some vulnerabilities ope for sophisticated hackers. If you find that you are using an older version of PHP and you are trying to protect sensitive data, you really should upgrade to a current version of either PHP 4 or PHP 5.\r\n\r\nSo what does mysql_real_escape_string do?\r\n\r\nThis PHP library function prepends backslashes to the following characters: \n, \r, \, \x00, \x1a, ‘ and “. The important part is that the single and double quotes are escaped, because these are the characters most likely to open up vulnerabilities.\r\n\r\nFor those who do not know what an escape is, it is a character that is pre-pended to another character. When a character is escaped, it is ignored by the database. In other words, it makes that character ineffective in a query. In the case of PHP, an escaped character is treated differently by the PHP parser. The standard escape character used by PHP and MySQL is the backslash.\r\n\r\nIn the case of the SQL query example used above, after running it through the routine, it now looks like this, which breaks the query :\r\n\r\n

\r\n

\r\n

SELECT * FROM items WHERE itemID = '\' OR \'1\' = \'1'

\r\n

\r\nThis method should stop the bulk of the SQL injection attacks, but crackers and hackers are very creative and are always finding new methods to break into systems. There are additional steps that can be taken to filter out certain words, such as drop, grant, union, etc., but using this method will strip these words from searches performed by you users. However, if you want to add another level of security and do not have an issue with certain words being deleted from queries, you can add the following just before if (phpversion() >= ‘4.3.0′).\r\n

$badWords = array("/delete/i", "/update/i","/union/i","/insert/i","/drop/i","/http/i","/--/i");\r\n$string = preg_replace($badWords, "", $string);

\r\nThis additional step should prevent a malicious attacker from damaging a database if they found a way to slip through. Just remember that is you take this additional step and you have a site where someone might search for a “plumbing union” or a “drop cloth”, those queries would not work as intended. If you are wondering what the trailing ‘i’ is following each word in the array, it is required to make the preg_replace replacements case insensitive. This wasn’t needed with eregi_replace, but that function has been deprecated in PHP 5.3.\r\n\r\nAnother important step that needs to be taken with any database is controlling user privileges. When setting up a MySQL user, you should never assign any more privileges than they actually need to accomplish the tasks that you allow on your site. Privileges are easily assigned and managed thought phpMyAdmin, which is found in the the control panel (cPanel, Plesk, etc.) for most hosting companies.\r\n\r\nUseful Links\r\n

http://en.wikipedia.org/wiki/SQL_injection\r\nhttp://www.learnphponline.com/securi…tion-mysql-php\r\nhttp://dev.mysql.com/tech-resources/…curity-ch3.pdf\r\nhttp://www.tizag.com/mysqlTutorial/m…-injection.php

Solving ReportViewer Rendering Issue on IIS7

Solving ReportViewer Rendering Issue on IIS7\r\n\r\n\r\n\r\nApplies to:\r\n

    \r\n

  • Internet Information Services 7.0 (IIS7)
  • \r\n

  • Microsoft Report Viewer Redistributable 2005
  • \r\n

\r\nSymptoms:\r\n

    \r\n

  • Unable to render ReportViewer on ASP.NET Web pages while running on IIS7.
  • \r\n

  • You have no problem viewing your reports when running on debug mode with your Visual Studio 2005.
  • \r\n

  • You are able to view your reports on Report Manager but not able to view them on IIS7.
  • \r\n

  • You encounter JavaScript error when loading your report page with ReportViewer. Image buttons such as calendar appear as red ‘X’.
  • \r\n

\r\nCause:\r\n

    \r\n

  • When the ReportViewer control is added to Web Form (.aspx), the\r\nReserved.ReportViewerWebControl.axd httpHandler is added to System.Web section of the Web.Config file. In IIS7, it should be added under System.Webserver section.
  • \r\n

  • IIS7 Handler Mappings does not contain Reserved.ReportViewerWebControl.axd httpHandler, and therefore unable to render the ReportViewer elements needed by the JavaSript.
  • \r\n

\r\nResolution:\r\n

    \r\n

  • Open Internet Information Services (IIS) Manager and select your Web application.
  • \r\n

  • Under IIS area, double-click on Handler Mappings icon.
  • \r\n

  • At the Action pane on your right, click on Add Managed Handler.
  • \r\n

  • At the Add Managed Handler dialog, enter the following:\r\nRequest path: Reserved.ReportViewerWebControl.axd\r\nType: Microsoft.Reporting.WebForms.HttpHandler\r\nName: Reserved-ReportViewerWebControl-axd
  • \r\n

  • Click OK.
  • \r\n

\r\nReserved-ReportViewerWebControl-axd handler is now added to your Handler Mappings list. Notice that the following line has also been added to your Web.config file under the system.webserver’s handler section:\r\n

<add name="Reserved-ReportViewerWebControl-axd" path="Reserved.ReportViewerWebControl.axd" verb="*" type="Microsoft.Reporting.WebForms.HttpHandler" resourceType="Unspecified" />

\r\nRun your report again.

How To Enable AJAX .NET Framework 3.5 on IIS7 Server

IIS versions before 7.0 did not require <handlers> for AJAX to work.\r\nIf you are installing AJAX on new IIS7 servers, you will have to make sure you have the following code in your web.config:\r\n

<!--  \r\n The system.webServer section is required for running ASP.NET AJAX under Internet \r\n Information Services 7.0.  It is not necessary for previous version of IIS. \r\n --> \r\n <system.webServer> \r\n <validation validateIntegratedModeConfiguration="false"/> \r\n <modules> \r\n <remove name="ScriptModule"/> \r\n <add name="ScriptModule" preCondition="managedHandler" type="System.Web.Handlers.ScriptModule, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/> \r\n </modules> \r\n <handlers> \r\n <remove name="WebServiceHandlerFactory-Integrated"/> \r\n <remove name="ScriptHandlerFactory"/> \r\n <remove name="ScriptHandlerFactoryAppServices"/> \r\n <remove name="ScriptResource"/> \r\n <add name="ScriptHandlerFactory" verb="*" path="*.asmx" preCondition="integratedMode" type="System.Web.Script.Services.ScriptHandlerFactory, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/> \r\n <add name="ScriptHandlerFactoryAppServices" verb="*" path="*_AppService.axd" preCondition="integratedMode" type="System.Web.Script.Services.ScriptHandlerFactory, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/> \r\n <add name="ScriptResource" verb="GET,HEAD" path="ScriptResource.axd" preCondition="integratedMode" type="System.Web.Handlers.ScriptResourceHandler, System.Web.Extensions, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/> \r\n </handlers> \r\n </system.webServer>

How To Fix ‘Microsoft.Jet.OLEDB.4.0’ error

\r\n

Problem:

\r\n

\r\n

Server Error in ‘/’ Application.

\r\n

——————————————————————–

\r\n

The ‘Microsoft.Jet.OLEDB.4.0’ provider is not registered on the local machine.

\r\n

Description: An unhandled exception occurred during the execution of the current web request.

\r\n

Please review the stack trace for more information about the error and where it originated in the code.

\r\n

Exception Details: System.InvalidOperationException: The ‘Microsoft.Jet.OLEDB.4.0’

\r\n

provider is not registered on the local machine.

\r\nSolution:\r\n\r\nYou will get this error on Windows Server 2008 R2 or Windows 7 64 bit. To fix it, switch your Application Pool from Native 64 bit to 32 Bit more under Advanced Settings.\r\n\r\nSuggestion:\r\n\r\nIt is also suggested that you upgrade your application to new ACE OLEDB provider, you can download from here.

Backup IIS7 ApplicationHost.config and Settings

\r\n

Internet Information Services 7 (IIS7) doesn’t use metabase-like file from IIS6. Instead the settings and configuration are stored in schema files and applicationHost.config files.\r\n\r\nSince the configuration files are different, the old IIS6 tools will not be able to backup IIS7 settings.\r\n\r\nThis is the new script that you can use to backup your IIS7 web servers.\r\n\r\n1. Using notepad or any text editor create a file backupiis7.cmd\r\n\r\n2. Insert the following code and save the file:\r\n

\r\n

Code:

\r\n

@echo off\r\ncls\r\n\r\npushd "%WinDir%\System32\inetsrv"\r\n\r\necho.| date | find /i "current">datetime1.tmp\r\necho.| time | find /i "current">datetime2.tmp\r\n\r\nfor /f "tokens=1,2,3,4,5,6" %%i in (datetime1.tmp) do (\r\n  echo %%n>datetime1.tmp\r\n)\r\nfor /f "tokens=1,2,3,4,5,6" %%i in (datetime2.tmp) do (\r\n  echo %%m>datetime2.tmp\r\n)\r\nfor /f "delims=/ tokens=1,2,3" %%i in (datetime1.tmp) do (\r\n  set TMPDATETIME=%%k%%i%%j\r\n)\r\nfor /f "delims=:. tokens=1,2,3,4" %%i in (datetime2.tmp) do (\r\n  set TMPDATETIME=D%TMPDATETIME%T%%i%%j%%k%%l\r\n)\r\n\r\nappcmd add backups %TMPDATETIME%\r\n\r\ndel datetime1.tmp\r\ndel datetime2.tmp\r\n\r\nset TMPDATETIME=\r\n\r\npopd\r\necho.

\r\n

\r\n3. The IIS7 configuration will be backed up at the following path:\r\n

\r\n

C:\Windows\System32\inetsrv\backup

\r\n

\r\nNOTE: you can also use Task Scheduler to automate backups.

\r\n