Fix Windows 10 install stuck at “Getting Ready”

If you ever see a Windows 10 install getting stuck at “Getting Ready”–the issue could be caused by various factors.  Below are some tips to help you fix this issue along with other tips for other kinds of installation related errors.

1. UEFI booted installation — disable secure boot and enable “Legacy Booting”. When you insert the USB or DVD installation, make sure to select “legacy boot option in boot devices list of your laptop or desktop”.  If you see HP, Dell or other logos when you are booting up Windows 10 instead of the Win10 logo, that is a sign something is off (this only applies to clean install, if you are upgrading–you may still see the logo of your computer manufacturer.)  The UEFI bootloader–booting up your USB installer is the culprit of the installation getting stuck in that “Getting ready”.   If you ever shut it down when it is stuck in that “getting ready”, you will see that installation has failed error and to restart installation again.  Once you ensure that legacy booting is enabled in BIOS, you need to hit ESC or F9,F12 or whatever key shows you the boot devices list so that you can select the regular legacy boot and not the UEFI boot option for your thumb drive.

2.  If your Windows 10 install gets stuck on “Getting Updates”–it may actually be using a slow internet and not stuck at all.  Make sure you are using a fast internet or you could always just install without the “Get updates” option during the upgrade installation.

3.  If you get other installation errors, make sure to disconnect all peripherals aside from mouse and keyboard.

4.  Instead of using the Windows Update service inside Windows got upgrade from Windows 7, 8 or 8.1 to 10.  You could just download the Media Creation Tool found here https://www.microsoft.com/en-gb/software-download/windows10ISO

5.  If the Media creation tool is not working for you, it usually means your USB flash drive may not have enough space on it.  You can try running the media creation tool in admin mode by right clicking and clicking on “Run as Administrator”.   Make sure your thumb drive is not locked.  Try a different flash drive if it still keeps failing at writing to the USB after it has downloaded the Win10 ISO.  Make sure to choose the right version for your system architecture, most new systems will be 64 bit.

6.  If after you install Windows 10 and it gets stuck on “Working on it”– Go to control panel and then Windows Update.   Click on check “check for updates”.  Let it take however long it wants for the update, and it should show you the upgrade option.

Microsoft and Yahoo Joined “Right to Be Forgotten”

Yahoo and Microsoft’s Bing search engines joined Google and started to respond to the “right to be forgotten” requests for removals in Europe. Microsoft admitted that they published the request form on Bing back in July, but the first removals were made only now. This was confirmed by the reputation management company Reputation VIP’s Forget.me website that helps Internet users submit requests.

Since the 23rd of July, there have been about 700 demands for search result removal on Bing submitted through Forget.me, which amounted to 2 362 URLs. Thus far, almost 80 requests have received an answer from Bing, according to Microsoft. The tech giants are responding to the May decision of the Court of Justice of the EU, which required search engines to remove all inadequate or irrelevant information about individuals if those want it.

Taking into account that Google occupies 90% of the search market in the EU, it became the first company to publish a form to submit such requests. So far, Google received over 174,000 requests for more than 600,000 URLs. The company removed over 40% of them from its search results. Now Bing and Yahoo joined the team and started processing the requests as well.

Microsoft admitted they have begun processing requests following the court ruling and in compliance with the guidance from EU data protection authorities. Like Google, the company is still refining that process, pursuing a goal to find a balance between individual privacy interests and the public’s interest in free expression. Yahoo made the same comment on how it has to deal with the “right to be forgotten” demands. The search engine also has to carefully evaluate each request, taking into considerations the public’s right to information.

Thus far, such removals of search results are taking place within the European Union on the local domains of search engines. Nevertheless, the European data regulators want to demand Google and its peers to apply these search results removals outside Europe as well.

The original ruling is supposed to ignite heated debate in the region. Last month, the culture secretary of the United Kingdom, Sajid Javid, claimed that “unelected judges” had simply created “censorship by the back door”, suggesting that terrorists could make use of the ruling.

 

How to Detect SQL Injection Attacks

SQL Injection (SQLi) attacks have been around for over a decade. You might wonder why they are still so prevalent. The main reason is that they still work on quite a few web application targets. In fact, according to Veracode’s 2014 State of Security Software Report , SQL injection vulnerabilities still plague 32% of all web applications. One of the big reasons is the attractiveness of the target – the database typically contains the interesting and valuable data for the web application.
A SQLi attack involves inserting a malformed SQL query into an application via client-side input. The attack perverts the intentions of web programmers who write queries and provide input methods that can be exploited. There is a reason they’re on the OWASP Top 10. Termed “injection flaws”, they can strike not only SQL, but operating systems and LDAP can fall prey to SQLi. They involve sending untrusted data to the interpreter as a part of the query. The attack tricks the interpreter into executing commands or accessing data. Attackers use this exploit to modify entries in your database, execute commands on the database (delete databases, change permission and so on) and read and exfiltrate data from your databases.
Examples of SQLi attacks can be found on the OWASP wiki.  The underlying flaws enabling SQLi attacks are introduced when developers create dynamic database queries that include user input.
Remediating SQLi attacks involves fixing coding defects that allow user-supplied input that can contain malicious SQL from modifying the logic of the query.  The OWASP wiki details some suggested defenses that application developers use to avoid introducing SQLi-enabling flaws.
The first step in dealing with SQLi exploits is detecting and investigating them.  When under attack, the following questions are critical:
  • When was I attacked?
  • Where was I attacked?
  • How widespread was the attack?
  • Were any files or tables overwritten?
  • Who is attacking me, and are others being attacked as well?
Using AlienVault USM to Detect SQL Injection Attacks
can help you detect these attacks and answer the questions above with several integrated security technologies including host-based IDS, network IDS and real-time threat intelligence.Network IDS spotting SQLi

The built-in to AlienVault USM gives you the ability to monitor all connection requests coming to your web server, plus it includes built-in correlation directives to spot activity indicative of a SQLi. Since the threat landscape is always changing, the Network IDS signatures are updated weekly based on threat research conducted by the AlienVault Lab research team, so you can stay current on new attacks.
Host IDS detecting SQLi by watching file activity
USM also includes a so you can monitor activity locally on a server. In this case, the HIDS agent would be installed on the web server itself, parsing the logs on your Apache or IIS server. Again, the built-in correlation rules in AlienVault USM make it possible to detect activity consistent with SQLi attacks and alert you immediately.  The AlienVault HIDS also monitors changes to files so you have visibility into which files and tables in your database were affected by the attack.
Here’s an example of the USM console displaying SQLi and the associated threat details:
HIDS Dashboard
AV 1
List of Recent SQLi Events
AV 1
Details about the Threat
AV 1
Real-time Threat Intelligence from the AlienVault Open Threat Exchange
In addition, AlienVault USM uses real-time threat intelligence from the AlienVault ) to spot connections with known bad actors. These are known malicious hosts or attackers whose IPs have shown up in OTX because they attacked other OTX contributors, have been identified by other threat sharing services we use, or have been identified via independent research conducted by our AlienVault Labs team.
OTX data provides context to the IDS information and can increase your confidence that a threat detected is malicious, since the activity you are observing is from a known malicious host. In addition, USM combines and correlates input from HIDS, NIDS and OTX via its built-in Security Information and Event Management (SIEM) capabilities, giving you the full picture of threats in your environment.
AlienVAult USM provides a single console with the information you need to do fast and effective incident response. Learn more:

Managing Your Database with Applications

There are many applications that can be installed on your computer for managing your databases. Here are some suggested applications you may use for that purpose. These applications are supplied by third parties.  Some are free and some require you to purchase a license.

The database management program (application) that you chose depends on what type of database you are connected to.  All our web hosting plans offer MySQL, and MS SQL is available on our Windows hosting.

For MySQL, if you do not want to use a third-party application, you can use phpMyAdmin in cPanel or Plesk to manage your database, which can be accessed with a web browser.

 

Step 1: Download the Application

MySQL (cPanel or Plesk)

Download one of these applications:

The applications above are designed for managing databases.  Some web development software, like Dreamweaver, can also connect to MySQL remotely.  Many other applications are available and can be found by using a search engine.

MS SQL (Plesk / Windows Hosting)

Many other applications are available and can be found by using a search engine.

 

Step 2: Whitelisting Your IP

To connect remotely, you will need to whitelist your IP address.  You can get your IP address from: http://whatismyip.com

cPanel

  1. Login to cPanel and click the Remote MySQL icon, under Databases.
  2. Type in the connecting IP address, and click the Add Host button.
  3. All done, try connecting remotely.

Recommended Reading: How to connect to the MySQL database

Plesk – Windows Shared

Once you have it installed, your IP address will need to be whitelisted so that you can access MS SQL or MySQL remotely. Follow the directions in the article How to whitelist your IP for Windows Shared to accomplish that.

Plesk – Windows Dedicated

Once you have it installed, your IP address will need to be whitelisted so that you can access MS SQL or MySQL remotely. Follow the directions in the article How to Whitelist Your IP – Windows Dedicated to accomplish that.

 

Step 3: Connecting

How you connect will depend on which program you pick.  The website where you downloaded the applications should have instructions on how to connect and use their application.

How to Whitelist Your IP – Windows Shared

How to white list your IP for Remote Database Access

You will need to whitelist your IP on the server if you want to remotely manage your databases with software such as Microsoft Server Management Studio Express.

  1. Login to Plesk.
  2. Click Websites & Domains tab at the top.
  3. Click SQL Whitelist Beta? icon (last icon seen).
  4. Click Add IP, select service and type IP; Click OK.
    -or-
    Click Add my IP then select service.

Note: You must input an IP address. Plesk does not allow for wildcard whitelisting. If you have a dynamic IP address that changes periodically, you will need to re-whitelist your IP every time your IP changes.

How can I find out my computers IP address?

Simple, just go to http://whatismyip.com

I enabled remote access, now what?

You will need a third party application to access MySQL remotely. Some are free and some cost money. For a list of applications, you may want to visit our page on:

How many IP addresses may I add to the SQL Whitelist Beta?

Six (6) IP addresses.

Can I add 6 IP addresses for each service?

No, you will be able to add just 6 total ip addresses for any of the two available services.

Epson Adjustment Program (Software Resetter for Epson Printer)

Love is like sunshine. It brings a golden glow to its beholder’s face. And a warm feeling all over their body. It awakens souls and opens eyes. And when its over, it leaves billions of small memories called stars. To remind the world, that it still exists.

[to my love – rahmat]

————————–

*******************

Epson Adjustment Program (Software Resetter for Epson Printer)

These softwares works only for TX720WD & TX700WD Epson printers.

[wpdm_file id=32]

 

Folder Option

Learn about folder option under Microsoft OS, more tips and tricks coming up. keep visiting us and be our fan in facebook, hit the like button on the right bottom corner.

 

[wpdm_file id=31 title=”true” template=”bluebox drop-shadow curved curved-hz-2″ ]

TeamViewer 6.0.10462

Access any remote computer via Internet just like sitting in front of it, even through firewalls. Features:

  • Support, administration and screen-sharing in one package
  • Remote administration of unattended servers
  • File transfer
  • Key exchange and AES (256 Bit) session encoding
  • Remote support without installation
  • Remote presentation of products, solutions and services
  • Works behind firewalls

[wpdm_file id=30 title=”true” ]

Raw Copy 1.2

This program copys a disk as a raw image from one drive directly to another. This utility is designed for people who have faulty drive and want to transfer the data directly to another drive without doing a file by file copy. This saves the need for operating system re-installs and allows drives with an unknown file system to be copied (including from console game machines, data recorders, mac etc). The program has a built in data recovery function which will attempt to recover data from bad sectors to ensure all the available data is restored from the drive.

[wpdm_file id=29 title=”true” ]

USB Disk Storage Format Tool 1.0

USB Disk Format Utility is a Windows based software used to format flash drives to FAT, FAT32 and NTFS partition types. Additionally, the drive can be made bootable by using system files from Dos or Windows 98 startup-disks. The format options provided are similar to what available in Windows. This utility does not support formatting of internal drives, CF, MMC, etc. All drives connected through the USB port of the computer is recognised and can be formatted using this software.

[wpdm_file id=28 title=”true” ]