I follow Paul Thurrot’s various Windows information outlets at least weekly, if not more often than that (SuperSite, WinInfo, Windows Weekly, and so forth). This morning I came across an extremely interesting item from his reporting at the TechEd event currently underway in New Orleans. It’s from his Short Takes for the week of June 14 and runs with the title “Whither Windows 7 SP1?”
Despite earlier announcements this week at TechEd from various Microsoft noteworthies that the SP1 beta would be made available on or before the end of July, 2010, Thurrot reports that “…now this date, which was ‘GA+1,’ or one year after the general availability of Windows 7 and [Windows Server 2008]R2, is out of date.” He then goes on to say that “In fact, SP1 could be shipping a lot later than originally planned and won’t even make it in time for the end of 2010.”
That’s pretty interesting, and when taken with Microsoft’s recent “message of import” about Windows 7 SP1 — namely, that there’s no real reason to wait for SP1 to get the adoption process underway — makes the kind of crazy sense I’ve learned to grant some credence when it comes to decoding the often-ineffable work of the spinmeisters in Redmond. Not only does this help to make a virtue of a necessity, it also lets them protect their revenue projections for 2010, even if SP1 slips into the next calendar year.
Boy, will it be interesting to see how this one pans out, and whether or not beta in July translates into general availability and/or public release of the final SP1 before or after next New Year’s. Only time will tell!
Yesterday afternoon, I ran Windows Update some time after lunch to get the latest set of Patch Tuesday updates for my many and varied Windows machines. None of these boxes downloaded less than 6 updates, and some grabbed as many as 16, depending on what they were running and which applications they had installed. As Patch Tuesdays go, this one hit Windows 7 harder than most have so far, as the following snippet from the latest MS Security Bulletin will attest:
Of the seven items that touch on Windows OSes (MS10-032, MS10-033, MS10-034, MS10-035, MS10-037, MS10-040, and MS10-041) all have some impact on Windows 7, with three tagged “Critical” and four tagged “Important” as shown. As update cycles go, this one has more oomph than many have had recently, especially for Windows 7. That siad, much of what’s involved relates more to legacy code included in Windows 7 for backward compatibility and interoperability than to actual core components of Windows 7 itself.
You’ll also find updates to the Windows Malicious Software Removal Tool, the Windows Mail Junk E-mail Filter, service packs for .NET Framework 3.5 (SP1) and .NET Framework 2.0 (SP2), a new root certificates update, and a cumulative roll-up for IE 8 in this month’s offerings as well. These come along with compatibility list updates for IE 8, and some revised daylight savings time and time zone changes for various countries, too.
In short, there’s a lot going on for this month’s Patch Tuesday, some of which cries out for rapid analysis and deployment for Windows 7 installations.
On June 7 at TechEd in New Orleans, Microsoft went public with an announcement that a beta version of the Service Pack 1 for Windows 7 and Windows Server 2008 R2 will be available “…by the end of July” (read more about this in Gavriella Shuster’s June 7 blog). She also has this to say about SP1 and Windows 7 as well “…SP1 will not contain any new features that are specific to Windows 7 itself. For Windows 7, SP1 will simply be the combination of updates already available through Windows Update and additional hotfixes based on feedback by our customers and partners” (the italics are mine, but the words are hers, and boy would I love to know what those items might include).
Microsoft is banging the drum hard and loud to get people to adopt Windows 7 sooner rather than later, leaning in part on these words to convince prospective adopters that because SP1 really won’t include any substantial changes in capability, functionality or (presumably) stability, there’s no reason no to act now. Of course, enterprise adoption cycles being what they are (slow, complex, and as much politicially and financially as technically driven) I’m not really sure this will make much of a difference.
All that said, I’m still dying to lay hands on the beta, and hope to find more information about what will be included with SP1 as soon as I can. Count on me to keep you posted as I learn more.
When I got up on Monday morning, Memorial Day, my wife Dina let me know she couldn’t access the Internet. “No big deal” I thought to myself: “Either I’ll reset the cable modem or the router and all will be well.” Not only was that wrong, wrong, wrong, but unbeknownst to me, I was about to embark on a network troubleshooting adventure of epic proportions. In fact, this adventure is still underway, and will continue later this morning, when Daryl Giles of Austin Advance Technology shows up with his cable testing gear and some replacement parts ranging from in-wall Cat 6 UTP cable to new swap-ins for my punchdown block and network interface patch panel. Sigh.
I did the easy stuff right away — reset the cable modem and the router — and fully expected my problems to be resolved. Not so. “Great!” I figured: “Let’s see what’s up with the network clients.” A quick look at the network status on my primary desktop showed that the network interface was trying to use an APIPA (Automatic Private Internet Protocol Addressing) IPv4 address, which from long experience I know means that the client can’t access a DHCP server. That server runs on the router, so my first thought was that the router had gone south. Jump in the car, drive to Fry’s (thank goodness we have one within 15 miles of my house — where else can you buy an 802.11n/router/firewall box on Memorial Day?), pick up a replacement router, drive back home.
After bringing up a new router, I *still* couldn’t get a DHCP address from the router. My next thought was: “Drat! The cable modem has failed.” Nothing I could do to fix my problem until early the next morning when I could visit my nearby Time Warner service office (just over 3 miles from my house) and swap out my 4-year-old Scientific Atlanta WebSTAR for the now-Cisco-branded 2203C cable modem with phone jack that has replaced the older unit in the interim. After taking the box home, and spending some time on the phone with Time Warner tech support to get everything properly provisioned and working correctly, I was forcibly struck with the realization that some element within my in-home cabling was causing the problem.
Here’s how I finally figured this out: To follow the installation instructions for the router, I had to haul a notebook PC into the master bedroom closet where our wiring center is installed, then cable the PC directly up to the cable modem to launch the router install software (It requires an active connection to the Internet to work properly). I simply ran a 1.5m RJ-45 Cat6 cable from the router to the notebook to do this (you can’t use wireless until the wireless network is setup and configured, of course). This worked fine, after I used the netsh winsock reset command to clear out the detritus of the APIPA setting and restarted the notebook so those changes would take. I happily spent the next 20 minutes or so getting the wired and wireless sides of my home network reconfigured, fully convinced that my troubles were over. No joy!
On the other end of my in-wall wiring, none of the machines attached to the RJ-45 wall plates could access the router to obtain a DHCP address, so they were effectively knocked off the wireless network. I switched some key machines (an HP notebook that Dina is now using for her regular daily computing tasks, and my primary desktop which has an Airlink 101 USB Wireless N 150 network interface filling in for the usual GbE RealTek PCI interface I normally use for network access on that machine) over to wireless so I could get back to work, and called a network consulting company to bring in a cabling technician to check out my home wiring plant.
Right now, I am also using a 100 foot Cat5e cable to hook up my other notebook — my traveling machine, a Dell D620 that’s still running Vista Business because I haven’t gone through the uninstall/reinstall process to move Adobe Premiere from that machine to the newer HP notebook that Dina is using right now. I can’t establish a DHCP connection from scratch using that cable (GbE at 350MHz won’t work beyond 80 feet or so), but because I simply unhooked the 1.5m cable from the Dell while it was in my closet, then attached the hundred footer to its RJ45 port, it can use the DHCP address it already has assigned. Ironically, this machine is 802.11g only, and I don’t want to sacrifice bandwidth by running the router in dual-band mode, so it’s the only machine that currently has full-speed Internet access in the house.
I have to believe that because the punchdown block and network patch panel are the only network components in common among the 4 RJ-45 wallplates in the house, none of which will now resolve DHCP, that the problem has to lie somewhere inside or between those devices. When Daryl gets here later this morning, we’ll figure it out. It’s enough to make a guy like me think more seriously about plopping down the $1K or so it would cost to buy a Fluke Ethernet cable tester. I know it’s got to be an attenuation problem somewhere along the way, but until we can check all the cables and connections (including the patch panel and punchdown block) there’s just no way to figure out what has to be fixed or replaced to get things working again. What I can’t understand is why it just popped up out of nowhere, 4 years after I installed this network which had worked flawlessly until Monday morning, without positing a failure of some kind in one of those components. The cable guy thinks it’s a lightning-induced problem (we had a major thunderstorm on Sunday night) and the networking guy thinks it’s bad cabling. I want to find out for sure what it is, and fix it!
I’ll follow up — hopefully, tomorrow — to report on what we learn and how we fix my situation. Stay tuned!
If you read this blog, you know I not only think highly of the various Secunia software monitoring products available — I use Secunia Personal Software Inspector (PSI) for my personal machines, and recommend the Secunia Corporate Software Inspector (CSI) for workplace use — I also use and work with them at least weekly. That’s how often I auto-scan my HP server, and the four desktops and four notebook PCs I have at my disposal right now.
This morning, when I ran my weekly scan, Secunia informed me that the Java Runtime Environment 6.15… was now out of date, so I went off to download the latest version. Out of habit I used Revo Uninstaller to remove the JRE from my machines knowing that manual uninstall is required to get old versions of Java out of the way so that new ones can be installed in a pristine setting. Out of habit I reached for my favorite uninstaller, Revo Uninstaller. It worked fine on my 32-bit Windows 7 systems, but I hit a snag on my 64-bit systems (Revo Uninstaller does not provide access to the 64-bit JRE, though it is happy to work with the 32-bit version on either 64- or 32-bit systems).
I did a hurry-up manual uninstall (removed the Java direcotory in the Program Files directory, and a quick purge of Java related Registry settings). But when I downloaded and installed a new 6.20… JRE, though the 32-bit version installed without a hitch, the 64-bit version threw error 1327 “Unable to find a necessary DLL.” After trying a restore point and researching various possible fixes on the Internet (of which there are plenty, but alas none of which worked for me), I took advantage of my nightly backup to restore the Java directory I’d trashed as part of my hurry-up manual uninstall manuevers, then tried to install the new 64-bit JRE 6.20… This time, I was successful, to my great relief.
It reminds me that you have to make sure your tools are 64-bit savvy when working on 64-bit systems. As a little additional investigation showed me quickly and directly, had I simply chosen to use the Programs and Features item in Control Panel to extirpate the original 6.15… JRE, I would have been able to install the 6.20… version without difficulty. That’s why it’s always important to remember what you’re doing, and what tools you’re working with when adding or removing software from a Windows machine. Hopefully, you can learn from this (minor) foul-up on my part!
How often does life hand you an opportunity you’d jump on hard, with both feet, if given the opportunity to do so? For me—and I suspect for most of us–the answer to that question has to be “Not very often.” That’s why I found myself at first pleasantly surprised last week, then completely blown away, when asked to look at a forthcoming new software release. I’m talking about the Nitro PDF product family, especially their free Nitro PDF reader and their bargain-priced Nitro PDF Professional products, from Melbourne- and San Francisco-based Nitro PDF Software. I’ve been aware of the Nitro PDF products for years, because that company has offered the major alternative to Adobe Acrobat since 2005. I’d also been frustrated with security and stability issues related to Acrobat elements for some time now, and hoping to find a more compact, faster, and reliable alternative. So how cool is it to be invited to check out something that I’d wanted to dig into anyway, even if it was only for my own good? Answer: Pretty cool, indeed.
Thanks to an offer from the PR agency that handles Nitro PDF, I was invited to check out their latest software release, and to take both 32- and 64-bit versions of their software for a spin. At first, the biggest draw for me was the extremely low frequency of entries in the Mitre Common Vulnerabilities and Exposures (CVE) database for Nitro PDF products vis-à-vis entries for Acrobat: zero references to Nitro PDF, versus 59 direct references for Adobe Acrobat, as of 5/24/2010. Of course, I’ve probably also become too inured to Acrobat Reader’s size to really notice it any more: 203 MB of disk storage for my Reader 9.0 folder on a 32-bit Windows 7 system, versus 53 MB of disk storage for the full-blown Nitro Reader application on that same system (78 MB for Nitro PDF Pro vs. 400+ MB for Adobe Acrobat Pro). What I’ve never become inured to is Adobe Acrobat’s and Adobe Reader’s speed and responsiveness, so I can only observe that for every operation I tried out, the Nitro PDF product was noticeably faster and more responsive than its Adobe counterpart.
But wait: it gets better. The Adobe Reader counterpart program, Nitro PDF Reader, is free just like Adobe Reader. But it’s much faster, more compact, and less intrusive on your system. In fact, Nitro Reader uses no special purpose downloader to grab and install the program, and it involves no start-up monitoring or independent update checking tools, unlike those from Adobe. You can pick up and move licenses from one machine to another, without having to run a special “reclaim license” program on the original host machine as with Acrobat. The Nitro PDF license information menu includes a Deactivate button that you must click before uninstalling the program on one PC, before installing that software on a new host machine instead. If you need to edit or manipulate PDF documents, you pay a list price of $99 for the Nitro PDF Professional program (I was able to find a coupon that dropped my cost to $69 to license the program with a quick search on “Nitro PDF Pro coupons” in Bing and Google) instead of the $299 you must pay for a full-blown copy of Adobe Acrobat (the best discount price I could find for Adobe Acrobat Professional was around $179, and most etailers sell if for over $235).
Then there’s the functionality: frankly Nitro PDF Professional deserves the “Professional” moniker, while there are many ways in which Adobe Acrobat Professional fails to live up to the cognomen.
My favorite feature has to be the Nitro Reader Signature stamp: a handy-dandy way to associate one or more scanned-in signatures with a digital stamp that you can affix to any PDF document wherever you like (in a contract’s signature block, most likely) by positioning your mouse cursor and clicking an interface button. Then, too, Nitro Reader will let you drop text in wherever you like on a PDF document, whether or not the document was designed to accommodate input fields where you want that text to go (try that, Adobe!). No more printing files out so you can save your data input (one of Adobe Reader’s favorite gotchas is to allow you to enter text input into designated input fields, only to inform you that you can’t save that input—none of that from Nitro Reader, thank you very much), or hand-write input fields, signatures, and so forth.
It’s very seldom I get the chance to work with a software product that makes me want to get down on my knees and thank my lucky stars for being allowed to use its many, varied, and secure capabilities. Nitro PDF is not only one of the select few products that evokes this response from me, it’s right at the very head of that short list.
Visit www.nitroreader.com today, and grab yourself a copy of Nitro PDF Reader for free, or take the 30-day trial of Nitro PDF Pro for a spin at www.nitropdf.com. I predict that, if you like me need PDF editing and annotation capabilities, you’ll end up happy to spring for the $99 (or $69 if you get your discount coupon) it will cost you to buy Nitro PDF Pro, and glad of the resulting price-performance-capability ratio!
Information security experts like to talk about a metaphorical three-legged security model called the security tripod, or more simply, the tripod. In this model, one leg comes from perimeter security, which addresses the barrier and safeguards used to protect the boundary between internal and external networks, or between individual systems and the Internet. Another leg comes from software security, which addresses the needs to maintain confidentiality, integrity, and accountability for data and services that software and systems provide. The final, and too often overlooked leg hinges on physical security, or controlling physical access to systems and machines.
As I spoke to Rob Humphrey, the Director of Security Products at the Kensington Computer Products Group by phone last week, I was forcibly reminded of the vital importance of this third leg in maintaining security for systems and networks alike. It’s a truism that if a bad guy can take possession of, or gain access to, just about any kind of system, that he (or she) can usually compromise the other two kinds of security quickly and convincingly in most cases, provided that the person who takes possession of or gains access to a system knows what they’re doing.
Case in point: when my colleague James Michael Stewart and I used to teach Windows security courses for Interop in the late 1990s and early 2000s, we would ask a volunteer to let us borrow one of their notebook PCs in the class. In 9 cases out of 10, we could break into that system in under 5 minutes live in the classroom using readily available administrative hacking tools for Windows PCs. The notion that somebody who takes possession of a system can soon also take possession of its contents is one worth pondering, and reacting to, especially for companies or organizations that permit employees to work off-site, or take sensitive information with them off the premises as they travel for business or pleasure.
Simple thought it seems, the Kensington cable locks that the majority of notebook and laptop PCs support (around 99% of all notebooks, according to Mr. Humphrey, come with built-in Kensington Security Slots that accommodate such locks) can provide a powerful deterrent against theft and loss of systems and the information they contain. By making it more difficult and time-consuming to take possession of a notebook PC, Kensington decreases the likelihood that an unauthorized and possibly malefic third party will take it into his possession, and gain access to the information it contains.
Humphrey also shared some scary and wonderful statistics about the impact of theft and loss on companies and organizations. Right now, an average of 20,000 PCs are lost or stolen every week in the US. Estimates of the value of the information on those machines hovers near $75,000 per computer. This is not a huge number, but the product of the number of systems and the value of the information they contain comes up to a whopping $1.5B in losses in the US every week! That’s $78B per year in losses, for machines that get lost or stolen. This might seem highly unlikely, until you remember the tens of thousands of veteran’s identity data lost owing to the theft of a notebook belonging to a VA employee in 2006 (26.5 million records), or large scale losses of credit card information at various card processing operations in the past few years (over 40 million records in the aggregate).
The best combination of physical protections for a modern-day notebook looks something like this:
1. A physical lock-and-key-plus cable to keep the notebook where it’s left
2. Whole drive encryption that requires a password to access a hard disk, and any of the data it contains
3. Use of the boot/hardware password protection that the hardware-based trusted platform module (TPM) provides to suitably-equipped notebooks and laptop PCs. Without the right login/boot-up password, the computer simply won’t boot, and this low-level protective circuitry cannot be sidestepped or worked around
4. Built-in tracking software like LoJack that causes a system to report its IP address and other information whenever it’s started up, so that legitimate owners and service operators can track down and recover lost or stolen machines.
Today, Kensington has a relationship with Absolute Software that lets buyers of their security cables, purchase a bundle or obtain a discount on that company’s LoJack for Laptops. I suggested to Humphries that he look into similar synergies with makers of whole-drive encryption tools and TPM technologies. Seems like an appropriate collection of countermeasures to ensure that notebooks and the data they contain remain safe from unauthorized access or use.
It’s been well over a year now since I started grabbing various Windows 7 release candidates, and most of my machines got their initial RTM installs in August, 2009, when MSDN made the RTM available two full months before the official release of Windows 7 in late October. I’ve recently noticed with increasing irritation that my Windows 7 boot screen still includes references to various RC (Release Candidate) versions even on PCs that have long since had those entries removed from the hard disks present in those machines.
For Windows Vista, I turned to a freeware product called EasyBCD that made it much easier to rework the Boot Configuration Data (which is what BCD stands for in modern Windows OSes). But alas, that product is no longer available, and besides it’s not warranted to work with Windows 7. And if there’s anything you DON’T want to muck around with on a Windows Vista, 7, or Server 2008 machine it’s the boot configuration data. This led me on a search for a replacement tool, and what I came up with is called Dual Boot Pro a capable, usable, and cheap ($9.95) tool that works like a champ on PCs that include BCD based Windows OSes among their OS lineups.
Let’s take a guided tour of installing and using Dual Boot Pro, because it will show you everything you need to know as I demonstrate how to remove offending items from the boot menu and manage various boot settings as well.
Installing Dual Boot Pro
After you pay for then download the software from the vistabootpro.org Web pages, you will obtain a Windows installer (.msi) file that you must double-click to launch the installer process. Installation takes you through a total of two basic screens, and took under a minute on my test PC.
Running/Using Dual Boot Pro
The first time you run the program, you will be warned that it detects no backup of the BCD data for your system, and guided to create such a backup. On subsequent uses of the program, it’s up to you to remember that backing up BCD data before making any changes is a really, really good idea, and to use the Care Center tab to create (or restore) such backups as needed.
This throws you into the Care Center tab in the program where you can browse to a directory of your choosing in which to keep BCD backups. I keep mine in the Documents folder, and use the ANSI/ISO date at the end of the filename, as shown here:
Viewing Current BCD Info & Listings
Click on the Boot Information tab to view the current BCD information and name information (it’s what shows up on the Windows 7 boot screen as the OS is starting up). Notice that in the next screen cap, Windows 7 x64 RC still shows up (even though it’s no longer resident on this PC).
Removing the Old/Obsolete RC BCD Entry
To edit BCD data, click the Operating Systems tab in Dual Boot Pro. Then, you can select any individual entry and either alter its data (through the controls below the listing pane), or click the Red X (Delete) control to the right of the listing pane. That’s what I’ll do to get rid of the obsolete RC entry.
Edit BCD Entry Name Info
On this same screen you can also edit existing entries to provide a different, more descriptive name. I like to know what version and word-length attaches to the Windows Versions I have running on my machines, so I usually add that info to the name to help me remember (hint: you must always highlight an entry in the entries pane at top center before you can add or apply data related to that entry in the controls and buttons below).
Concluding Thoughts and Admonitions
There’s a lot to like about this useful little program. If you spend some time getting to know the software, you’ll come to appreciate its capabilities. Business licenses are available, and cost $24.99 per license (which may be used on up to five computers). Commercial and Corporate licenses start at $4.99 per seat and go down in price as the number of licenses go up ($3.95 for 101-500 licenses, $2.95 for 501 licenses and up).
Look around the technology news landscape these days, and you’ll see much of it in the clouds — or rather, making much of the importance, dominance, or < insert your own superlative here > for cloud computing of some kind. Even the mainstay of individual work in the enterprise, the productivity suite, is touted as a cloud-compatible toolset, as Google and others tout their cloud-based offerings in this arena. Don’t believe it: Microsoft Office still rules this niche in the workplace, and has maintained a staggering 94 percent market share in office productivity software (and seats) for the past three years.
That’s what makes the immanent release of a new Office suite, Microsoft Office 2010, big news. As of last week (May 15) Microsoft indicated that the latest version of MS Office will be available for retail purchase online and in stores on June 15. Various 32- and 64-bit RTM versions of Office 2010 have been available on MSDN for a while now, with the latest batch uploaded on May 10, 2010.
But with the official release date of Office 2010 still almost a month in the offing, interested IT professionals may want to hop over to the Microsoft Office 2010 pages, where they can still grab a 60-day trial copy of the beta version of the Professional Plus edition. Note that you must remove prior Office versions before you can install the RTM version on a test machine, and that MS recommends against installing this beta package “on a PC that will require an activated copy of Office after the 60-day trial period is over.” Nevertheless, it’s a great way to prep for the coming onslaught, and to get familiar with what is bound to become a fixture in many enterprise IT operations over the next year or two.
Sources that include TechARP and InfoWorld have been among the sites that continue to cover news on the forthcoming Service Pack 1 (SP1) for Windows 7, but it’s still not clear when it will be released for public consumption. That said, beta code for SP1 has been floating around since March, so it’s pretty likely that the final version will be released some time in 2010, perhaps even before the fourth quarter of this year.
But there’s one “very interesting” implication to SP1 release that may interest OEMs and customers alike. That is, so-called downgrade rights to Windows XP for Windows 7 end either 18 months after the introduction of Windows 7 (April 2011) or when SP1 goes public, whichever comes first. Only big-time enterprise customers are exempt from this — namely, those companies that subscribe to Microsoft Software Assurance or that purchase Windows through volume licensing agreements (those buyers retain rights to run versions of Windows all the way back to Windows 95!)
Now that SP1 is at least rumored if not actually poised for release up to 8 months prior to April, 2011, this is something that system vendors and enterprise users must consider carefully. Even though an official release date (or even month) stil remains to be determined and announced, organizations that remain committed to Windows XP may find themselves forced to re-think that relationship in the light of coming events and software releases.
Once SP1 does ship, the only way that organizations can keep using XP-specific applications is to use Windows XP Mode inside Windows 7. And that, in turn, requires adoption of Windows 7 Professional, Ultimate, or Enterprise because only these three editions support that capability (which also requires grabbing the necessary code and licensing information from the Microsoft Website). Put that in your pipe and smoke it, as you plan your next client platform refresh cycles!