Rockwell Directory Configuration Wizard Unknown Error 0x80005000

Have the above error?  Copy and paste this in a command prompt as administrator.   This will work a majority of the time.   This configuration error re-registers the dlls that may have issues during or after an upgrade.

For /F %s in (‘dir /b *.dll’) do regsvr32 /s %s
cd\Program Files (x86)\Common Files\Rockwell
For /F %s in (‘dir /b *.dll’) do regsvr32 /s %s


Note:  You may have to replace the ‘ symbol with the apostrophe.  Also this often corrects other programs that display this error.



Posted in Computer Software, Hardware, Industry, Information Technology, network, Networking, Technology | Tagged , , , , | Leave a comment

what3words – Did you know the world has been divided into 3m x 3m squares?

The world is divided into a grid of 3m x 3m squares and each grid is assigned a unique 3 word address.

Because most of the world is not addressed, you can locate any place on the planet by three words.   Take a look at the technology and features behind what3words –



Posted in Information Technology, Technology | Tagged , , , , | Leave a comment

Error Writing to Database – Moodle after an upgrade

If you get an error on Moodle that states “Error Writing to Database” generally when logging on, that WAS working prior to upgrading, clear or purge the Moodle Cache.  Generally when you shutdown Apache or IIS to upgrade, the sessions or cached sessions may be corrupt.

By purging the cache, it will flush the cache and new sessions will be initiated. This is why it is important to announced maintenance at a predetermined time and to place Moodle in Maintenance Mode.

Where do you Purge all cache?  Go to Site Administration, Development and Purge All Caches.

Remember, if you get “Error Writing to Database other than logging in (randomly), try purging the cache first.

Posted in Technology | Leave a comment

Cannot connect to Microsoft SQL server after installing an IIS SSL Certificate

If you cannot connect to your Microsoft SQL Server after installing a web SSL Certificate, you may need to get the thumbprint of your certificate and copy it (without spaces) to your registry.

Go to Hkey_Local_Machine\software\Microsoft\Microsoft SQL Server\{Find your instance of SQL}\MSSQLServer\SuperSocketNetLib

There you will find a string that says Certificate – put the thumbprint of your certificate there without spaces – reboot your computer.

If the string does not exist, create a string that says certificate

RememberAlways have a backup of your server (configuration, database and other information) before working with the registry.


Posted in Technology, Windows Security, Windows Server | Tagged , , | Leave a comment

AlphiMAX PTP Estimator provides an excellent way to align your wireless antennas

When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry.  Replace any hubs on your network as soon as you can.

With a hub, collisions can be >20% and utilization can stand at >50%.   By replacing a hub alone, you can reduce collisions to 5% on switches in rooms and <1% in the server room.  Switches help to isolate traffic, relieve congestion, separate collision domains (reduce collisions), segment and restart distance/repeater rules.

Daisy Chaining Switches -what not to do

Real world scenarios may require you to temporarily daisy chain switches.  If you do, test the network and run additional backbones or replace core switches to accommodate more nodes as soon as you can. (remember, replace any hubs in your network)

Daisy chaining

One of many solutions is to run independent lines to the core switch


Basic tips on optimization of your network –

  • Use stackable managed switches
  • Purchase switches that support
    IEEE 802.1D , IEEE 802.1p , IEEE 802.1Q , IEEE 802.1s , IEEE 802.1w , IEEE 802.1x , IEEE 802.3 , IEEE 802.3ab , IEEE 802.3ad (LACP) ,
    IEEE 802.3ae , IEEE 802.3u , IEEE 802.3x , IEEE 802.3z
  • Use a battery backup on the switches

This is the very basics behind network switch infrastructure.  Managing switches and using the IEEE standards above along with optimizing your network and managing the network infrastructure is important.

Excellent articles on Networking Infrastructure

Posted in Technology | Leave a comment

Wireless Dropping? Change your Scan Valid Interval

Is your Wireless dropping?  Update your driver of course and then try changing your Scan Valid Interval.   By default, most wireless cards are set to 60.   This is the amount of time before your wireless ‘looks’ for other access points (for roaming).   Try changing the interval to 120.

Open the device manager, double click on the wireless adapter, under advanced, click on Scan Valid Interval – change this to 120.   If you have a card that has roaming under advanced, select the lowest option.

1 Device Manager


2 Scan

Note:  If you have a laptop and are moving around in an area, you may need to lower this number.

Also, you may want to lower the Beacon Interval in your router if your signal is low or if you have drops.  This sends beacons more frequently and can help with your signal.   This may slightly decrease your bandwidth (wireless) and use a little extra battery on mobile devices.

While the default is 100, did you know if you increase this time (assuming you have a great signal in your home or business) that you can increase wireless bandwidth (slightly) and even increase your battery life of devices?

Got Atheros? Follow this link to drivers.

Also, do a quick survey of your entire home.  As you can see, one side of our house has interference on channel 11.   Because the ‘user’ of the other wireless is using Channel 6 + 10 (40 mhz ) spread, Channel 6 and 11 are NOT optimal.  Therefore, channel 1 is the optimal channel (you can see two devices – my AP and printer)

Left – host computer  Right – TightVNC into another computer in my home.

Avoid Wireless Interference

Remember, router position and direction matters.  As you can see below, repositioning the router got rid of “Saw Tooth” (signal that goes up and down).

Less Saw Tooth

Posted in Home Networking, Networking, Technology, Wireless | Tagged , , | 2 Comments

AlphiMAX PTP Estimator provides an excellent way to align your wireless antennas

It is important to perform a wi-fi survey so that you can determine not only the perfect place to locate your access point or bridge but to gain an understanding of the channel co-existence challenge you may face.  With wireless access points in surrounding neighborhoods and businesses, you will need to  perform a survey by walking around and mapping out the BSAs (Basic Service Area) of wireless that surrounds you and your organization.

Below is an example of our school’s perimeter.  Matt, Chris and James, students in the Computer Information Technology, class performed a survey using a Microsoft GPS and Vistumbler.  This survey revealed access points and their channels of current wireless at our institution and  includes APs in surrounding businesses and neighborhoods.  These were mapped using Google Earth after exporting their KML file from Vistumbler.

This type of survey allows IT professionals to analyze data exported to ensure the correct channels can be used at their organization.

Miller Goodroe Felts

After exporting the wireless information, you can analyze each access point or wireless device by clicking on it.  Below is an example of the information exported into Google Earth.   Each device shows SSID, Network Type, Mac Address, Channel, Security, Encryption Type, Data Rates, Latitude, Longitude and Manufacturer information.   Analyst using this information can also determine the best placement of wireless devices along with channel information.

ESSID Expanded

Channel co-existence is when access points share channels that are very close to one another.

802.11 wireless on 2.4 Ghz has three non-overlapping channels.  These channels are 1, 6 and 11.  The closer channels are, the more likely interference will take place.  With the amount of wi-fi in use today, IT professionals have to chose between 2.4 Ghz and 5 Ghz and and try to select channels that are not in use if possible.   Professional access points and bridges can also adjust power as necessary.   A dense population can make this very challenging.

If you look at the students’ survey by zooming out to see how many access points can be seen, this is what you are looking at!  Now you can see why site surveys are important at your organization.


In addition to this survey, a secondary survey using a spectrum analyzer is very important to search for interference from other sources.  (See our review of the Airview Spectrum Analyzer)


Channel information (Chart from Wikipedia)


Here’s another look at a wireless survey showing vertical lines and signal strength.  (James M. KML survey)

Another view James Miller KML

Posted in Technology, Wireless | Leave a comment

Atheros Wireless Drivers

Need an update and stable version of your Atheros Wireless Drivers?

Often the wireless drivers found at,  , are more stable than the manufacturer.


Posted in Technology, Wireless | Tagged , , | 2 Comments

Should you disable 8dot3 for performance and security?

icrosoft did recommend to disable short names  in a security guide some times back.  There is evidence that file operations in directories (folders) that contain a large number of file can be slowed by short file name creations.  So does it improve performance? The short answer – Yes.

Now should you disable short names?  This answer is going to be on a case by case basis.  Some questions to ask yourself –

  • Do you have older programs that use 8dot3 (short names)?
  • Do you have a folder with a significant amount of files and coping or creating files is slow?

Below is a pic showing the improvement by disabling and stripping


Image:  Blog Technet Microsoft

Here’s what you need to do –

  • Always backup your system
  • Open a Command Prompt as Administrator
  • Type fsutil 8dot3name query c:
    (enter the drive letter at the end)
  • Type fsutil 8dot3name set c: 1
    (This will disable 8.3)
  • If you want to do this system wide, type –
     fsutil behavior set disable8dot3 1
  • To strip existing files with a 8.3 short name, this will scan your computer and the system registry and strip the files of their short names type the following-
    –   fsutil 8dot3name strip /s /v c:


One query 8dot3

disable 8dot3





Posted in Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows Server | Leave a comment

Slow SQL Connection or Network in Windows 10 – Update

Finally found a small problem with Windows 7, 8, 8.1 and 10.  After upgrading, we have discovered that Windows  was responding slow to our SQL Server 2008 and SQL Server / other versions.  What we discovered is below.

Slow response times in Windows to a SQL Server can be due to the LLMNR protocol.  This may be resolved by turning off the LLMNR protocol.

LLMNR is a protocol that allows both IPv6/4 computers to perform name resolution for the NetBIOS names of other computers without requiring a DNS server.

IPv4 hosts can use NetBIOS over TCP/IP (NetBT) to resolve computer names to IPv4 addresses for neighboring computers by broadcasting a NetBIOS Query.

All IPv4-based LLMNR hosts listen on the IPv4 multicast address instruct their Ethernet network adapters to listen for Ethernet frames with a destination multicast address.

Windows -based LLMNR computers do not send or respond to unicast queries.

To disable LLMNR:

Modify Group Policy – Go to Search – Type GPEdit.msc – Enter – Navigate to the following and make sure Enabled is checked –

Computer Configuration\Administrative Templates\Network\DNS Client
\Turn off Multicast Name Resolution = Enabled

How does Multicasting Work?  Here’s a good explanation

Update –


Windows Vista and Windows Server “Longhorn” support Link-Local Multicast Name Resolution (LLMNR), which allows IPv6 hosts on a single subnet without a DNS server to resolve each other’s names. This capability is useful for single-subnet home networks and ad hoc wireless networks. Rather than unicasting a DNS query to a DNS server, LLMNR nodes send their DNS queries to a multicast address on which all the LLMNR-capable nodes of the subnet are listening. The owner of the queried name sends a unicast response. IPv4 nodes can also use LLMNR to perform local subnet name resolution without having to rely on NetBIOS over TCP/IP broadcasts.

Dawn M. Babian, GSAE

Disabling LLMNR (Below)

Professional or Enterprise (Gpedit.msc)

Home Edition

Create a registry key as follows –

You also should go to your network adapter properties and disable all of the settings under the advanced properties such as TCP/Offload and other advanced settings.  Remember, not all adapters have advanced options – disable any settings that allow you to do so….

Disable your anti-virus and check the speed.  Is your anti-virus causing issues?

See our article –

Phrases you may hear in IT

GUI Maintenace Program for MSSQL or MYSQL

Want an excellent program to manage your MySQL server from Windows?  With MySQL, you can download MySQL Workbench.  MySQL Workbench offers great graphics on your MySQL incident and an interface that offers features such as queries and status of your server.

But what if you want to run maintenance programs such as Analyze, Backup, Check, Checksum, Optimize or to Repair your database quickly?  HeidiSQL offers dozens of features including an excellent maintenance option.  (Support for MySQL and MSSQL)



  • Support for MySQL
  • Support for MSSQL
  • Support for PostgresSQL

Features from HeidiSQL

More information on MYSQL Maintenace

Posted in Information Technology, Microsoft, Microsoft Windows, Microsoft Windows 10, network, Networking, Technology, troubleshooting, Windows, Windows 10 Quick Tips, Windows Server | Tagged , , , | Leave a comment

Seizing the Operation Master Roles in Windows Server – RID issues

How to repair AD in this state (object can’t be created -users/other)

  • command prompt (admin) – Type the following…
  • ntdsutil
  • roles
  • connections
  • connect to server
  • quit
  • seize schema master
  • seize naming master
  • seize RID master
  • seize PDC
  • seize infrastructure master


Posted in Technology, Windows, Windows Server | Tagged , , , | Leave a comment

Is your SSD or HDD dirty?

You can of course use the Windows GUI to check your SSD or HDD.  But did you know that you should check your drives by typing the following (you can copy and paste in a elevated command prompt and change switches as necessary)-

fsutil dirty query c:
fsutil dirty query c:
chkntfs c:
fsutil repair query c:
fsutil behavior set BugcheckOnCorrupt 1
fsutil repair set c: 0x01

What does it look like when it is ran at an elevated command prompt?


What it means


Posted in computer troubleshooting, Computers, Microsoft Windows 10, Technology, troubleshooting, Windows, Windows 10, Windows 10 Intel Drivers, windows 10 privacy, Windows 10 Quick Tips, Windows Server | Tagged , , , | Leave a comment

Here are “100 common Windows 10 problems and how to solve them” | TechRadar

What's On My PC

This is a good educational piece for anyone who is using Windows 10.


Having issues with Windows 10? Well, we’ve got some answers for you here…

Source: 100 common Windows 10 problems and how to solve them | TechRadar

View original post

Posted in Technology | Leave a comment

Error 1935 while installing Office

If you receive the error 1935, take the following steps-

  • Make sure you have C++ Redistributables  Link 
  • Uninstall Office (Make sure you have any documents backed up)
    • Run the Office Installation Cleaner (easy fix two found in Option Two at the following link)
  • Delete the following key in your registryRegistry fix
Posted in Microsoft, Microsoft Office, Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Windows Server | Tagged , , | Leave a comment

Aomei Partition Assistant Lite Edition

Need a free partition software to partition or re-partition a hard drive?  Here’s an excellent piece of software that saved us a ton of time on one of our servers and helped Mickey with a friend’s project.   Cost – Free

Aomei Partition Assistant Lite Edition

The following is a main function list:

Resize/Move partition
Create partition
Delete partition
Delete all partitions
Format partition
Set partition label
Change drive letter
Remove drive letter
Convert file system
Check partition
View disk/partition properties

For – Windows 2000 Professional SP4, Windows XP/Vista/Windows 7/8, Windows Small Business Server 2011/2008/2003, Windows Home Server and Windows Server 2000/2003/2008 (32-bit and 64-bit).

Easy to use but for advanced users.

Posted in Computers | Tagged , , , , , , , | Leave a comment

Microsoft Research TCP Analyzer – Check Out Your Network

Microsoft Research TCP Analyzer (Link) is a network analyzer that allows you to analyze network traces of Transmission Control Protocol (TCP) connections. Given a Microsoft Network Monitor trace, the analyzer provides various performance statistics and visualizations for the captured TCP connection. This app also gives a time plot and an explanation of the individual plots.

You must have Microsoft Network Monitor installed before installing TCP Analyzer and you must download the SDK for Experts.   You should also install Charting.   Download

Below is an Example of Microsoft Network Monitor capturing packets on a wireless network.  Notice the information about the wireless (-60 dBm) in the first picture.   In the second picture you can see information on a captured packet (firefox.exe and the destination IP address).

TCP Analyzer which as stated requires Microsoft’s Network Monitor to installed first.

To USE TCP Analyzer

  • Start Microsoft’s Network Monitor
  • Capture packets for ? (general over a period of time you decide at peak usage of your network or when transferring and using data across your network.
  • Stop the Capture
  • Open the Captured File
  • Go to Experts Menu (this appears after you stop, save and reopen a capture file
  • Open the TCP Analyzer

Want to see the TOP Users of your Network?

You can also find your Top Users (top 10) by using this expert (download)-

Charting Download (must have .NET 3.5)

*this software was tested on Windows 7 Professional but will work with Windows Vista or Windows XP.

Posted in Computers | Tagged , , , , , , , , , , | 1 Comment

Did you know that you can sort in Microsoft Excel by using colors?

What's On My PC

Did you know that you can sort in Microsoft Excel by using colors? For example, Excel can sort by cell color, font color, cell icon, and values. If you want to learn quickly how this works, follow the source link below at PCWorld.

Can Excel Sort by Color? How to Fill Color and use Sort & Filter’s Custom Sort | PCWorld

microsoft excel logo primary resized2

Source: Can Excel Sort by Color? How to Fill Color and use Sort & Filter’s Custom Sort | PCWorld

View original post

Posted in Technology | Leave a comment

How can I improve my internet performance with DNS information in my router?

There are dozens of tips on the web from MTU size to tweaking network card or wireless router alternate firmware.  What isn’t covered a lot is DNS queries.   DNS or Domain Name Services is used when you type the ‘friendly’ name (url) into your address bar of your browser.   The friendly name goes out onto the worldwide web to your ISPs DNS servers where it is changed to an IP address and routing then takes place.

How can you improve this?  Here’s some ideas.  When programming your router, you can statically define the DNS servers in your router and disable DNS Relay.  This will cause the dhcp leases to contain the hard coded ip addresses of the DNS servers you typed in instead of the router’s  ip address (leaving DNS relay on, your router will act as the go between).   With several combinations, which is best?

If your router has a SPI firewall, the impact of this is that the stateful-packet-inspection (SPI) table will have to track additional DNS(Port:53)  streams as each individual  device (tablet, computer, smartphone, smart TV) makes its unique request (websites typed into the address bar) directly to the DNS servers on the Internet.

You can program your router with several options.  Here are a few combinations.

DNS Relay on Your router DNS Servers entered into the
Pros Cons
Enabled Yes Computers receive fixed local DNS server number. Your router can immediately proxy dns queries and you can travel directly to your site.  Use your router’s IP as the first DNS address and a public DNS as the secondary.  Fastest DNS servers (secondary) could change (rare) and become out of date
Enabled No Computers receive fixed local DNS server. Router receives update-to-date DNS entries. Some small delay in  querying a website
Disabled Yes Computers receive fixed DNS servers. DNS queries are now part of your standard traffic and are inspected by the SPI engine. Can be slower.
Disabled No Computers receive your ISP’s update-to-date dns server entries if known. Request pass through to outside DNS servers and can be slower

If you need to check your DNS entries after you save your router’s settings, in Windows, go to a command prompt and type ipconfig /all. Running Linux? Type ifconfig to get your IP address or cat /etc/resolv.conf  to get your ip address and dns  information after you program and reboot your router.

Posted in Apple, Computer hardware, Computers, Home Networking, Internet, Linux, network, Networking, Windows | Tagged , , , | Leave a comment

Why Do You Subnet?

Why? The Golden Question

All over the internet you will find information on ‘How to Subnet’.   Suddenly you are thrown into a world of bits and binary and given charts of ‘How to Subnet’.   But why do you subnet?

Subnets are created to separate areas of your network for security and/or to hold down broadcasts.  Computers constantly ‘talk’ to each other.   If you have a network of 10 computers, the talking (opening files or programs) or broadcasting packets that are sent out during networking is not much traffic at all.   However if you have 10,000 computers talking and passing data, you will have thousands of computers passing data and your network will slow down from all of the information.   If you still don’t understand, invite 10 friends over for a get together.  It’ll get noisy but you can still hear every conversation.    Now, go to a rock concert with 10,000 screaming fans.   Get the picture.

Subnetting allows you to divide areas of your network out to prevent this.   So here comes the golden question.  How can you get them to ‘talk’ when you need to?   With the installation of a Layer 3 Switch or a router, these subnets can talk.

And for all of the folks who know a ton of details on the subject, this is just an example for people who are searching why to subnet.

Other Ways to Divide Your Network

Are there other ways to divide your network?  You can use VLANs.  Devices such as switches allow virtual lans to be set up.    By purchasing managed switches, you can separate different areas of your network thus separating areas for security and holding down traffic.

So now I know why – but how and don’t give me binary and all the fuzzy stuff!

The best explaination I have found is at this link.   A simple chart with examples!

Here’s my example –

Subnetting allows your network to become more efficient and allows you to separate your network by subnets.

Let’s say your network is on a 192.168.1.x numbering scheme.

How do you know what your network is?  Open a command prompt and type ipconfig.   See the gateway?  That is your starting number for your network.   The network allows 254 computers to be in the broadcast domain.

So if you do an ipconfig and see this-      – your ip address    – your current subnet           – your gateway (This is your router or firewall – the point leading to the internet)

Now let’s say you have 20 devices in your network.   How can you effectively hold down broadcast and prevent your router from building tables for each device?  How can you make it more effective and hold down traffic?   Actually without understanding binary, you can do this.   Remember this is basics and should help you understand.

You see under the current network, you can have 254 devices in your network.  Printers, routers, computers, tablets, netbooks, notebooks, etc.    The last set of numbers called an octet only goes from 1-254.   But lets narrow this down.

You can use a CIDR calculator online to determine how to tweak your network.   A good site is Subnet Calculator.   Go there and enter your router’s number in the ip field.   Now go down and enter a number close to the number of devices you have on your network.  In this example, enter 30.

Did you see where the subnet changed to    (Did you notice that 224 + 30 is 254?)

Ok, now open your adapter settings by clicking the network icon at the bottom right corner and selecting Open Network and Sharing Center.

Now click on the adapter settings.

Right click and select properties on your adapter that is active.

Now select Internet Protocol v4

Enter an ip address statically (manually put it in).  Put in your new subnet and your gateway.   You must also put in your DNS or a public DNS server.  You should keep a list of each devices number to avoid any problems.  All ip addresses must be different on each device.

The only valid numbers in this broadcast domain now is –,, continuing until you get to (remember you chose to have up to 30 devices on your network.)  If you enter any number above this, you will get an error.

Error screen showing an ip address above what you selected.

If you get the above error screen, you have entered an invalid number.

After you select a number between and, click OK and exit all screens by clicking OK.

If you do an ipconfig now, you will see this-

When you change subnets as the above example shows, you have to remember that you may lose connectivity to devices such as routers or network printers.   You will need to set devices such as servers and these devices on the same subnet so that whoever is assigned this subnet can communicate with them.

This by no means is a thorough subnetting lesson.   It can become much more complex by introducing multiple routers into your network, DHCP servers or other devices.   This is a simple how-to that shows you how broadcast domains can be more efficient.

Now one more thing.  Want to know how to subnet?  You can use the magic number method.

Posted in Computers | Tagged , , , , , , , , , | 5 Comments

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for vulnerabilities that may affect your device.


CNN’s Money on “Hacking anything connected to the internet



Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment