Tag Archives: Windows

How To Fix overrideMode=”Deny” Error (HTTP Error 500.19)

HTTP Error 500.19 - Internal Server Error\r\nThe requested page cannot be accessed because the related configuration data for the page is invalid.\r\nConfig Error\r\nThis configuration section cannot be used at this path. This happens when the section is locked at a parent level. Locking is either by default (overrideModeDefault="Deny"), or set explicitly by a location tag with overrideMode="Deny" or the legacy allowOverride="false".\r\n226:     <system.webServer>\r\n227:         <handlers>

\r\nIf you get the error above, you have to make a change in ApplicationHost.config file. To fix this error follow the steps as  below:\r\n

    \r\n
  • Open ApplicationHost.config file in notepad This file is located under C:\Windows\System32\inetsrv\config
  • \r\n

  • Search for <location path=”Default Web Site” overrideMode=”Deny”>
  • \r\n

  • Replace with: <location path=”Default Web Site” overrideMode=”Allow”>
  • \r\n

\r\nChange “Default Web Site”  with the name of your website.\r\n\r\nNOTE: On 64 bit Windows, if you are using 32 bit editor or File Manager, you will NOT be able to see any files in the config folder. Navigate using Windows Explorer or Notepad in native 64 bit mode.

How to Create Rewrite Rule in web.config

If you need a domain URL redirection from yourdomain.com to www.testdomain.com or vise versa, you can do something like this:\r\n\r\nPlace either of these (depending on what you’d like done. And edit to match your domain) inside the <system.webServer></system.webServer> tags in the web.config of the domain.\r\n

<rewrite><rules>\r\n<rule name=”Add WWW prefix” >\r\n<match url=”(.*)” ignoreCase=”true” />\r\n<conditions>\r\n<add input=”{HTTP_HOST}” pattern=”^testdomain\.com” />\r\n</conditions>\r\n<action type=”Redirect” url=”http://www.testdomain.com/{R:1}”\r\nredirectType=”Permanent” />\r\n</rule>

\r\n—————–\r\n

<rule name=”Remove WWW prefix” >\r\n<match url=”(.*)” ignoreCase=”true” />\r\n<conditions>\r\n<add input=”{HTTP_HOST}” pattern=”^www\.testdomain\.com” />\r\n</conditions>\r\n<action type=”Redirect” url=”http://yourdomain.com/{R:1}”\r\nredirectType=”Permanent” />\r\n</rule>\r\n</rules></rewrite>

\r\n

Note: This is applicable on websites hosted on IIS 7.0 or 7.5 (on Windows Server 2008).

Backup IIS7 ApplicationHost.config and Settings

\r\n
Internet Information Services 7 (IIS7) doesn’t use metabase-like file from IIS6. Instead the settings and configuration are stored in schema files and applicationHost.config files.\r\n\r\nSince the configuration files are different, the old IIS6 tools will not be able to backup IIS7 settings.\r\n\r\nThis is the new script that you can use to backup your IIS7 web servers.\r\n\r\n1. Using notepad or any text editor create a file backupiis7.cmd\r\n\r\n2. Insert the following code and save the file:\r\n
\r\n
Code:

\r\n

@echo off\r\ncls\r\n\r\npushd "%WinDir%\System32\inetsrv"\r\n\r\necho.| date | find /i "current">datetime1.tmp\r\necho.| time | find /i "current">datetime2.tmp\r\n\r\nfor /f "tokens=1,2,3,4,5,6" %%i in (datetime1.tmp) do (\r\n  echo %%n>datetime1.tmp\r\n)\r\nfor /f "tokens=1,2,3,4,5,6" %%i in (datetime2.tmp) do (\r\n  echo %%m>datetime2.tmp\r\n)\r\nfor /f "delims=/ tokens=1,2,3" %%i in (datetime1.tmp) do (\r\n  set TMPDATETIME=%%k%%i%%j\r\n)\r\nfor /f "delims=:. tokens=1,2,3,4" %%i in (datetime2.tmp) do (\r\n  set TMPDATETIME=D%TMPDATETIME%T%%i%%j%%k%%l\r\n)\r\n\r\nappcmd add backups %TMPDATETIME%\r\n\r\ndel datetime1.tmp\r\ndel datetime2.tmp\r\n\r\nset TMPDATETIME=\r\n\r\npopd\r\necho.

\r\n

\r\n3. The IIS7 configuration will be backed up at the following path:\r\n

\r\n
C:\Windows\System32\inetsrv\backup

\r\n

\r\nNOTE: you can also use Task Scheduler to automate backups.

\r\n

Microsoft Unveil Windows Phone 7 with Partners

Windows 7 Mobile Images
Windows 7 Mobile Lineup
\r\n\r\nMicrosoft today joined its partners in revealing nine new Windows Phone 7 handsets that will be available this holiday season from leading mobile operators inNorth America,  Europe and Asia Pacific. With more than 60 mobile operators in over 30 countries worldwide committed to bringing Windows Phones to market, the millions of people around the world looking for a phone that plays as hard as it works will have a variety of phones from leading device-makers to choose from.As for the two other major U.S. wireless carriers, Microsoft promises that Verizon and Sprint will have phones in 2011, and that “select models” would be sold at Microsoft Stores and on Amazon.  Microsoft is gearing up for another attempt to take on RIM’s BlackBerry, Apple’s iPhone, Google’s Android, and other smartphone contenders.\r\n\r\n The hardware \r\nAT&T’s phones include the HTC Surround, LG Quantum and Samsung Focus, all pictured up top. They all have 1GHz Qualcomm Snapdragon processors, capacitive touch screens and 5-megapixel cameras. They will each sell for $199.99 with a two-year contract.\r\n\r\nThe HTC Surround has pop-out speakers and uses Dolby’s mobile technology, for better sound when watching movies. It has a “kickstand,” so that it can be propped up on, say, an airplane tray table, without the use of severely bent paperclips, intricate origami or a $30 case.The LG Quantum has a slide-out real QWERTY keyboard, so it will be favored by BlackBerry converts and people who don’t like software keyboards. AT&T says it will also play music and video wirelessly via home networks to compatible devices, so you can, say, stream a song to a Sonos wireless music system with a tap of the screen. The Samsung Focus, scheduled to be the first Windows Phone 7 device to hit retail in the U.S., on Nov. 8, is the thinnest. At 9.9mm, it’s nearly (but not quite) as thin as the iPhone 4.\r\n\r\n T-Mobile’s core offering, due out mid-November, will be the HTC HD7, also with a 1GHz processor and a 5-megapixel camera. The HD7’s distinguishing feature is a 4.3-inch touchscreen, which is the same spacious size as the HTC Evo and Motorola Droid X. Like the Surround at AT&T, T-Mobile’s HD7 also has a kickstand. \r\n\r\n The sales pitch \r\nMicrosoft CEO Steve Ballmer as saying that Windows Phone 7 is “a different kind of mobile phone and experience — one that makes everyday tasks faster by getting more done in fewer steps and providing timely information in a ‘glance and go’ format.”\r\n\r\nClearly, the marketing strategy Microsoft is employing is to show how different Windows Phone 7 is, interaction-wise, from Apple’s iPhone and Google’s Android. The trouble is, Android is doing gangbuster business precisely because it resembles the iPhone (while selling on all four carriers and in many configurations). Microsoft’s zag-while-everyone-else-zigs strategy may be risky, but no more risky than being perceived as more of the same.\r\n\r\n Why you’d buy \r\nSo what does make Windows Phone 7 “different”?  For starters, there’s the “glance and go” interface of “Live Tiles,” customizable plates on the home screen that update regularly, so that users don’t have to open apps, or wait for pop-up alerts, to receive new information. (Android users could argue that “widgets” serve a similar purpose, though they tend to be app-specific). Another differentiator is the Xbox Live integration. Microsoft is definitely sticking it to its gaming console competition.\r\n\r\nAnother differentiator is the Xbox Live integration. Microsoft is definitely sticking it to its gaming console competition.\r\n\r\n

\r\n\r\n

Windows Mobile HTC HD7
Windows Mobile HTC HD7Windows Mobile 7 DellWindows Mobile 7 Dell

ASP.Net Vulnerability Patch released: Microsoft Security Bulletin MS10-070

Vulnerability in ASP.NET Could Allow Information Disclosure (2418042)

\r\n

\r\n\r\nMicrosoft released ASP.net Vulnerability path through Download centre, for details please click here.\r\n
\r\n\r\nThis security update resolves a publicly disclosed vulnerability in ASP.NET. The vulnerability could allow information disclosure. An attacker who successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server. This vulnerability can also be used for data tampering, which, if successfully exploited, could be used to decrypt and tamper with the data encrypted by the server. Microsoft .NET Framework versions prior to Microsoft .NET Framework 3.5 Service Pack 1 are not affected by the file content disclosure portion of this vulnerability.\r\n\r\nThis security update is rated Important for all supported editions of ASP.NET except Microsoft .NET Framework 1.0 Service Pack 3. For more information, see the subsection,Affected and Non-Affected Software, in this section.\r\n\r\nThe security update addresses the vulnerability by additionally signing all data that is encrypted by ASP.NET. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.\r\n\r\nThis security update also addresses the vulnerability first described in Microsoft Security Advisory 2416728.\r\n\r\nRecommendation. Microsoft recommends that customers apply the update at the earliest opportunity.\r\n\r\nSee also the section, Detection and Deployment Tools and Guidance, later in this bulletin.\r\n\r\nKnown Issues. Microsoft Knowledge Base Article 2418042 documents the currently known issues that customers may experience when installing this security update. The article also documents recommended solutions for these issues.\r\n\r\nThe patch is available through Microsoft download centre\r\n\r\n

\r\n