Welcome to Tec Guide

Welcome to TecGuide, the Guru.

Thursday, November 8, 2007

Error "The MNYUI.DLL file is linked to missing export MFC42DLL:6467"

If you get an error message "The MNYUI.DLL file is linked to missing export MFC42DLL:6467" after you have installed a software, it is caused due to Microsoft Money Agent loading in the background at the Startup. If you have Windows 98, you can disable this the following way:

1. Click the Start button.
2. Click on "Run".
3. Type in "msconfig" (without the quotation marks) and click OK.
4. Click on the startup tab.
5. Uncheck the line "Money Agent".
6. Click OK.
7. You will be asked to restart the computer; click "Yes".

The root cause of the issue is the corrupted files in the Microsoft Money software. Uninstalling and reinstalling Money software or Upgrading Money to a greater version will solve the issue.

To uninstall Money from your system, perform the following steps:

1. Click Start, Settings, Control Panel.
2. Double Click on Add/Remove Programs.
3. Under Install/Uninstall tab you will find Microsoft Money software.
4. Highlight it and click on Add/Remove.
5. Click OK to any warning message. Click OK.

You can reinstall Money software using the SelectiveRestore Option from the QuickRestore CD. To selectively restore an application or driver from your QuickRestore CD, follow these steps:

1. Place the QuickRestore CD into the CD-ROM drive.
2. Using Windows Explorer, navigate to the QuickRestore CD's directory.
3. Open the CPQS directory, and then open the QUICKSR directory.
4. Double-click the Qrestore file.
5. Wait until the QuickRestore menu is displayed, and then click Selective.
6. Select the application or driver from the menu that follows.

Securing a Wireless Network

Securing your Wireless Network :

If your wireless LAN is located in a single family home, then you are probably more at risk from intruders coming in via your Internet connection than from folks gaining access to your LAN over the air. But if your LAN has some means of wireless connectivity, you've added another way to access your LAN that doesn't require getting past your router's firewall and doesn't even require physical access!

What can I do?

Actually, there's a lot you can do to secure your wireless LAN. Most of these tips apply to 802.11b based LANs, since they're the most prevalent. But some tips are just good network security practice and can help no matter how you build your LAN:

1) Don't use TCP/IP for File and Printer sharing!

Access Points are usually installed on your LAN, behind any router or firewall you may be using. If someone successfully connects to your Access Point, they'll be on your LAN, just like any of your other clients. But since they'll be using TCP/IP to make the connection, you can easily deny access to MS File and Printer sharing by using a protocol other than TCP/IP for those services. That way, they may get access to your Internet connection, but they won't get access to your files! See this page for instructions on using NetBEUI for File and Printer Sharing.

2) Follow secure file-sharing practices

This means:

Share only what you need to share (think Folders, not entire hard drives)

Password protect anything that is shared with a strong password.

3) Enable WEP Encryption

802.11b's WEP encryption has had a lot of bad press lately about its weaknesses. But a weak lock is better than no lock at all, so enable WEP encryption and use a non-obvious encryption key. Look for and use products that support 128bit WEP. Prices have come down on 802.11b equipment so there's no need to buy something that doesn't support 128bit WEP. See this page if you need help getting WEP to work.

4) Use WEP for data and Authentication

Some products allow you to separately set the Authentication method to "Shared Key" or "Open System". Use the "Shared Key" method so that encryption is used to both authenticate your client and encrypt its data. See this page for more info.

5) Use non-obvious WEP keys and periodically change them

While the limitations that some wireless client utilities have don't help (hexadecimal only support, single keys, forgetting keys, etc.), don't make it easy for potential snoops to get onto your LAN by using simple keys like 123456, all ones, etc. Changing the keys periodically is more difficult, because it requires sending out information about the new keys to users and that can be a security problem in itself. But changing keys periodically can help keep your LAN secure, so consider getting a procedure into place to do it.

6) Secure your wireless router / Access Point (AP)

Your router or Access Point should require a password to access its Admin features. If it doesn't, get one that will!
Also, change your password from the default and use a strong one!

7) Disallow router/ AP administration via wireless

Unfortunately, this feature is usually only present in "Enterprise-grade" APs, and shuts off the ability to administer your Access Point from wireless clients. But if your router/AP has it, use it!

8) Use MAC address based Access and Association control

Previously available only on "Enterprise-grade" products, many routers and Access Points are being upgraded to have the ability to control the clients that can use them. MAC addresses are tied to physical network adapters, so using this method requires a little coordination and maybe a little inconvenience for LAN users. And MAC addresses can be "spoofed" or imitated/copied, so it's not a guarantee of security. But it adds another hurdle for potential intruders to jump. If you already have a product that doesn't include this feature, check your Manufacturer's Web site for a firmware upgrade.

9) Don't send the ESSID

ORiNOCO and Apple call the ability to stop their products from sending out the network ESSID the "closed network" feature. Other manufacturers are adding this ability, so check your Manufacturer's Web site for a firmware upgrade. Note that the feature doesn't have a consistent name, so check your product's documentation.

10) Don't accept "ANY" ESSID

ORiNOCO and Apple's "closed network" feature also won't accept connections from clients using the default "ANY" ESSID. Other manufacturers' products have the ability to not accept clients with an "ANY" ESSID, but you'll need to check your product's documentation, since there's not a consistent name for the feature.

11) Use VPN

Of course, if you really don't want to take chances with your data, then you should run a VPN tunnel over your wireless connection, too. You may take a throughput hit, but isn't your data's security worth it?

Fix hardware and configuration issues common to wireless LANs

Fix hardware and configuration issues common to wireless LANs

Both the money savings and the ease of use of wireless LANs are beneficial to small offices—until something goes wrong. Then it becomes all too apparent that, while wireless networks are growing, troubleshooting resources for wireless LANs are not.

When a wireless network fails, there are a few key areas to look to first. Let's look at some of the more common hardware problems that can cause a wireless network to fail. I’ll also cover the configuration issues that can plague a wireless LAN. With this information, you can troubleshoot your wireless network with confidence. (This article assumes that you’re troubleshooting an infrastructure network, and not an ad hoc network.)

Hardware troubleshooting:

When you have only one access point and only one wireless client that are having connection issues, then you’ve already determined the scope of the problem: Your one client is having trouble attaching to the network. But if you have a larger network, determining the scope of the problem becomes a little more involved.

If lots of users are having trouble connecting but there are still some users who are able to work, the problem is most likely that your network has multiple access points and that one of the access points is malfunctioning. Often, you can take an educated guess as to which access point is malfunctioning by looking at the physical locations of the users who are having the problem, and then figure out which access point serves that portion of the building.

If no one can connect to the wireless network, there are several things that could be going on. If your network uses a single wireless access point, it's possible that the access point could be malfunctioning or could contain a configuration error. The problem could also be related to radio interference or a break in the physical link between the wireless access point and the wired network.

Check connectivity to the access point:

First, you should perform a communications test to see if the access point is responding. Open a Command Prompt window on a PC on your wired network and ping your wireless access point’s IP address. The wireless access point should respond to the ping. If it doesn’t, there’s either a break in the communications link or the access point is completely malfunctioning.

To figure out which is the case, try pinging the access point’s IP address from a wireless client. If the wireless client is able to ping the access point successfully, the problem is almost certainly a broken communications link, such as a damaged cable.

If the wireless client is unable to ping the access point, the access point could be malfunctioning. Try unplugging the access point to reset it and then plug it in again. Wait for about five minutes and then try pinging the access point from both the wireless and the wired clients again.

If both pings still fail, it is likely that the access point is damaged or has an invalid configuration. At this point, I recommend focusing your efforts on getting the access point to communicate with the wired network. Plug the access point in to a known-good network jack using a known-working patch cable. You should also verify the access point’s TCP/IP configuration. After doing so, try pinging the device from a wired client again. If the ping still fails, the unit has probably been damaged and should be replaced.

Configuration issues:

I’ve found that wireless networking equipment is fairly reliable, and the vast majority of problems are related to the network’s configuration rather than a hardware malfunction. With this in mind, let's look at several common hardware configuration problems that lead to a disruption of wireless services.

Test the signal strength:

If you can ping the wireless access point from a wired client but not from a wireless client, the access point is probably just experiencing a temporary problem. If the access point continues to have problems, I recommend checking the signal strength. Unfortunately, there’s no standard method for doing this. Most wireless NIC manufacturers, however, include some mechanism with the NIC for measuring signal strength.

Try changing channels:

If you determine that you’re getting a weak signal but nothing has physically changed in your office, attempt to change channels on the access point and on one wireless client to see if a different channel improves the signal strength. I run a wireless network in my home office, and I’ve found that one of my cordless phones interferes with my wireless network when the phone is in use. 802.11b wireless networks function on the 2.4-GHz frequency, just like many higher-end cordless phones. Changing channels on all of your wireless clients can be a big undertaking, so I recommend testing the new channel with one client first. Remember that your problem could go away as soon as someone hangs up a phone or turns off a microwave oven.

Wireless Common Terms

Radio Frequency

Radio frequencies are high frequency alternating current (AC) signals that are
passed along a copper conductor and then radiated in to the air via an antenna. An
antenna converts/transforms a wired signal and vice versa. When the high frequency AC signal is radiated into the air, it forms radio waves. These Radio waves propagate away
from the source (the antenna) in a straight line in all directions at once.

Spread Spectrum

Spread Spectrum is a communication technique characterized by wide bandwidth and low peak power. Spread Spectrum communication uses various modulation techniques in wireless LANs and possesses many advantages over its precursor, narrow band communication. Spread Spectrum signals are noise-like, hard to detect, and even harder to intercept or demodulate without the proper equipment.

Narrow Band Transmission

A narrow band transmission is a technology that uses only enough of the frequency
spectrum to carry the data signal, and no more. It has always been the FCC's mission
to conserve frequency usage as much as possible, handling out only what is
absolutely necessary. Spread spectrum uses much wider frequency bands than is necessary to transmit the information. A signal is a spread spectrum signal when the bandwidth is much wider then what is required to send the information.
More power is required to send a transmission when using a smaller frequency range.
A compelling argument against narrowband transmission - other than the high peak power required to send it - is that narrow band signal can be jammed or experience
interference very easily. Jamming is the intentional over powering of a transmission
using unwanted signals transmitted on the same band.

Spread Spectrum Technology

Spread Spectrum technology allows us to take the same amount of information that we
previously would have sent using a narrow band carrier signal and spread it out over a
much larger frequency range. For example, we may use 1 MHz at 10 Watts with narrow band, but 20 MHz at 100mW with spread Spectrum. By using a wider frequency spectrum, we reduce the probability that the data will be corrupted or jammed.

SSID (Service Set Identifier)

The Service Set Identifier (SSID) is a unique, case sensitive, alphanumeric value from 2- 32 characters used by wireless LANs as a network name. This naming handle is used for
segmenting networks, as a rudimentary security measure, and in the process of joining
a network. A client station must be configured for the correct SSID in order to join a network.
HomeRF

HomeRF operates in the 2.4 GHz band and uses frequency-hopping technology.
The Home Radio Frequency Working Group developed a single specification (Shared
Wireless Access Protocol-SWAP) for a broad range of interoperable consumer devices. SWAP is an open industry specification that allows PCs, peripherals, cordless telephones and other consumer devices to share and communicate voice and data in and around the
home without the complication and expense of running new wires. The SWAP specification provides low cost voice and data communications in the 2.4GHz ISM band.

Bluetooth

Bluetooth is another frequency technology that operates in the 2.4 GHz ISM band. The
hope rate of Bluetooth devices is about 1600 hops per second, so it has considerably more overhead than 802.11- compliant frequency hopping systems. The high hop rate also gives the technology greater resistance to spurious narrow band noise. Bluetooth systems are not designed for high throughput, but rather for a simple use, low power, and short range. Bluetooth devices have a maximum range of 33 feet (10 meters).

IEEE 802.11

The 802.11 standard was the first standard describing the operation of wireless LANs.
This standard contained all of the available transmission technologies including Direct
Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS), and infrared. 802.11 compliant products operate strictly in the 2.4 GHz ISM band between 2.4000 and 2.4835 GHz.

IEEE 802.11a

The IEEE 802.11a standard describes wireless LAN device operation in the 5 GHz UNII bands. Operation in the UNII bands automatically makes 802.11a devices incompatible with all other devices complying with the other 802.11 series of standards. The reason for this incompatibility is simple: system using 5GHz frequencies will not communicate with systems using 2.4GHz frequencies.

IEEE 802.11a specifies data rates of only 6, 12 and 24 Mbps. A wireless LAN device must support at lease these data rates in the UNII bands in order to be 802.11a-compliant.

IEEE 802.11b

802.11b is a wireless Ethernet specification by IEEE.IEEE 802.11bis referred to as
"High-Rate" and Wi-Fi. 802.11b was originally designed to enable high performance radio to support roaming in large offices or business campus environments. 802.11b is quiet expensive compared to SWAP. It must be remembered that 802.11b supports voice over Internet protocol.

IEEE 802.11g

80211.g provides the maximum data transfer rate of 54Mbps and is backward compatible
with 802.11b devices. IEEE 802.11g specifies operation in the 2.4 GHz ISM band. IEEE 802.11g utilizes Orthogonal Frequency Division Multiplexing (OFDM) modulation technology. These devices can automatically switch to QPSK modulation to communicate with the slower 802.11b and 802.11- compatible devices.