Thu

22

Mar

2012

iPhone iPad can not access internet via SonicPoint with Apple devices

Apple devices can’t access internet via SonicPoint

AUG 2011

If you have an iPhone or an iPad that cannot access the internet through a SonicPointNDR you came to the right place. I had a SonicPointN and everything worked fine for all of our devices.

 

I then upgraded to a SonicPointNDR and only the iPhone couldn’t access the internet. No matter what DNS settings or firewall rules I tried.

 

The trick is to disable Aggregation on the Radio settings. As soon as I did this and pushed the changes to my SonicPoints the iPhone was able to get online.

 

Here are the details from SonicWall on the known issue:

 

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=8091

 

Source: 

 

http://www.jesswatts.com/it/apple-devices-cant-access-internet-via-sonicpoint

 

Read More

Tue

20

Mar

2012

Strong Password Generator and Info

 You can generate strong passwords from either of the following sites:


  1. http://strongpasswordgenerator.com/
  2. http://www.pctools.com/guides/password/
  3. https://www.grc.com/passwords.htm

 

The Following dialog is from GRC.com visit link number 3 for more info.

 

What makes these perfect and safe?

Every one is completely random (maximum entropy) without any pattern, and the cryptographically-strong pseudo random number generator we use guarantees that no similar strings will ever be produced again.

 

Also, because this page will only allow itself to be displayed over a snoop-proof and proxy-proof high-security SSL connection, and it is marked as having expired back in 1999, this page which was custom generated just now for you will not be cached or visible to anyone else.

 

Therefore, these password strings are just for you. No one else can ever see them or get them. You may safely take these strings as they are, or use chunks from several to build your own if you prefer, or do whatever you want with them. Each set displayed are totally, uniquely yours — forever.

 

The "Application Notes" section below discusses various aspects of using these random passwords for locking down wireless WEP and WPA networks, for use as VPN shared secrets, as well as for other purposes.

 

The "Techie Details" section at the end describes exactly how these super-strong maximum-entropy passwords are generated (to satisfy the uber-geek inside you).

 

 

Tue

14

Feb

2012

AOL Stalker - Search Data

About AOL Stalker AOLStalker.com contains data from the AOL search data scandal - where AOL on purpose released a massive amount of private data for all the internet to see. On this website you, the normal user can search this data (just as all the hackers already can).

 

AOLStalker.com was created to make the public aware, not to pry on peoples privacy.

 

If you find anything in this data collection you want removed, please use the report function or contact us with the user id - we will remove it. Just enter a word in the box on the mainpage and let the good times roll. Want to know who's searching for you? Just enter your name and find out. Want to know what your neighbour is searching for?

 

Enter your street address or his name to find other related searches. The possibilities are endless, use your imagination.

 

Sometimes we also transport yachts for fun

 

http://www.aolstalker.com

Mon

13

Feb

2012

Which ports to unblock for VPN traffic to pass-through?

Little Background: Microsoft RRAS server and VPN client supports PPTP, L2TP/IPSec, SSTP and IKEv2  based VPN connection. PPTP control path is over TCP and data path over GRE. L2TP tunnel traffic is carried over IPSec transport mode and IPSec protocol internally has a control path through IKE and data path over ESP. SSTP control and data path is over TCP. IKEv2 control path is over IKE and data path over ESP.

So now coming back to original question. There are multiple scenarios:

1) If RRAS based VPN server is behind a firewall (i.e. a firewall is placed between Internet and RRAS server), then following ports need to be opened (bidirectional) on this firewall to allow VPN traffic to pass through: -

  • For PPTP:
    • IP Protocol=TCP, TCP Port number=1723   <- Used by PPTP control path
    • IP Protocol=GRE (value 47)   <- Used by PPTP data path
  • For L2TP:
    • IP Protocol Type=UDP, UDP Port Number=500    <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500   <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=ESP (value 50)   <- Used by IPSec data path
  • For SSTP:
    • IP Protocol=TCP, TCP Port number=443   <- Used by SSTP control and data path
  • For IKEv2:
    • IP Protocol Type=UDP, UDP Port Number=500    <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500   <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=ESP (value 50)   <- Used by IPSec data path

2) If RRAS server is directly connected to Internet, then you need to protect RRAS server from the Internet side (i.e. only allow access to the services on the public interface that isaccessible from the Internet side). This can be done using RRAS static filters or running Windows Firewall on the public interface (or the interface towards the Internet side). In this scenario following ports need to be opened (bidirectional) on RRAS box to allow VPN traffic to pass through

  • For PPTP:
    • IP Protocol=TCP, TCP Port number=1723  <- Used by PPTP control path
    • IP Protocol=GRE (value 47)  <- Used by PPTP data path
  • For L2TP:
    • IP Protocol Type=UDP, UDP Port Number=500   <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=1701  <- Used by L2TP control/data path
    • IP Protocol Type=50  <- Used by data path (ESP)
  • For SSTP:
    • IP Protocol=TCP, TCP Port number=443   <- Used by SSTP control and data path
  • For IKEv2:
    • IP Protocol Type=UDP, UDP Port Number=500   <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=1701  <- Used by L2TP control/data path
    • IP Protocol Type=50 <- Used by data path (ESP)

Note: Please DO NOT configure RRAS static filters if you are running on the same server RRAS based NAT router functionality. This is because RRAS static filters are stateless and NAT translation requires a stateful edge firewall like ISA firewall.

Do not forget: If you enable Windows firewall or RRAS static filters on the public interface and only enable VPN traffic to pass-through, then all the other traffic may be dropped. For example, if the same server is running as a mail server facing internet or a DNS server or a reverse web proxy server, then you need to enable the ports used by those services explicitly. For further details, refer to this article:http://blogs.technet.com/rrasblog/archive/2006/07/06/enabling-rras-drops-all-other-traffic-except-vpn-traffic.aspx

References:

http://technet2.microsoft.com/WindowsServer/en/Library/ac14405b-3802-4ae0-bcd5-5c33bb7db5311033.mspx?mfr=true

Ports affecting the VPN connectivity

RRAS Server in Windows server 2008: Which one to use - Windows firewall or RRAS filters  

Samir Jain
Lead Program Manager
RRAS, Windows Enterprise Networking

  

[This posting is provided "AS IS" with no warranties, and confers no rights.]

 

 

Mon

13

Feb

2012

What are : SHA-2 Certificates

SHA-2 SSL certificate hashing is a cryptographic algorithm developed by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA). SHA2 certificates are more secure than all previous algorithms, and are being required in certain applications in place of certificates signed with the SHA-1 hash function beginning January 1, 2011.

Many organizations may be required to upgrade to SHA-2 (also known as SHA2 or SHA-256) SSL certificates in conjunction with updated federal and PCI compliance standards.

 

Although SHA-1 certificates will still be considered secure for years to come, mathematical weaknesses have been identified that could potentially be exploited in breaking the SHA-1 crypto hash. These mathematical weaknesses were resolved in the SHA-2 encryption algorithm.

 

As an organization concerned with establishing online security, and as a service to our customers and the end-users who rely on the integrity of their systems and infrastructure, Affect Web supports those organizations that are taking all possible measures to help make SHA-256 certificates the encryption standard.

 

PCI compliance scanners may require their clients to use SHA-2 compatible SSL certificates. Certificates issued within the federal space will be required (in accordance with NIST standards) to be issued with SHA-2. If you need a SHA-2/SHA-256 certificate, you will be given the option to select whether to make your cert a SHA-2 cert during the order process for any of our standard product offerings.

 

Read More

Sat

11

Feb

2012

Online email header analyzer

 

This tool will make email headers human readable by parsing them according to RFC 822.

 

Email headers are present on every email you receive via the Internet and can provide valuable diagnostic information like hop delays, anti-spam results and more. If you need help getting copies of your email headers, just read this tutorial.

Access online email header analyzer here:

http://www.mxtoolbox.com/EmailHeaders.aspx

How to Get Email Headers – A Guide from MxToolBox

When reporting spam that slips past the filters, it is essential that we receive the full message headers from a message. Additionally, sometimes our Support department may request the full headers from an email message in order to troubleshoot mail delivery problems. Please follow these instructions to obtain and forward full message headers to support@mxtoolbox.com.

Every single Internet e-mail message is made up of two parts the header and the message body of the email. Every single email you send or receive on the Internet contains an Internet Header, a full and valid e-mail header provides a detailed log of the network path taken by the message between the mail sender and the mail receiver(s) (email servers).

Your email client program will usually hide the full header or display only lines, such as From, To, Date, and Subject, see below for more information on pulling headers for your email client:

Note: Please put a short but descriptive note in the subject or the body of the message so we can quickly assess your issue or problem.

Note: If you need assistance in understanding email headers, please feel free to use our Email Header Analyzer.

Outlook 2003
Outlook 2007
Outlook 2010
Outlook Express
Outlook 97
Outlook 98
Outlook 2000
Outlook 2002
Microsoft Exchange
Zimbra
Entourage
Mac OS X Mail
Outlook Express for Macintosh
Gmail (works for Google Apps as well)
Yahoo!
AOL
Hotmail
Eudora
Netscape, Mozilla or Thunderbird
Lotus Notes
Pine
XtraMail
Pegasus Mail
Claris Emailer
Mail Warrior
Juno
Novell Groupwise

For Screen Shots and more on this HowTo:

http://community.mxtoolbox.com/blog/2009/05/18/how-to-get-email-headers-a-guide-from-mxtoolbox/

Access online email header analyzer here:

http://www.mxtoolbox.com/EmailHeaders.aspx

Free Account for Cloud File Sharing: http://www.CloudBins.com

Cloud Hosting and Security: http://www.ParagonHost.com

Read More

Sat

11

Feb

2012

DSO vs. CGI vs. suPHP vs. FastCGI

DSO vs. CGI vs. suPHP vs. FastCGI

This is one of the most common topics that customers will ask about. As highly important as PHP handlers are, they often the least understood. Its not too hard to understand; you don’t have to know that exact science of how it all works, but it should be learned by all who want to take their website seriously. Picking the right PHP handler for your website will give you the optimal speeds you want and maybe allow you to save some money by using a cheaper hosting package. So I invite you to take a few minutes and learn something new.

What are PHP handlers
In order to run a PHP site, the server must interpret the PHP code and generate a page when visitors access the website. It interprets the code based on which PHP library you are using, such as PHP 4 or PHP 5. A PHP handler is what actually loads the libraries so that they can be used for interpretation. PHP handlers determine how PHP is loaded on the server.

There are multiple different handlers that can be used for loading PHP: CGI, DSO, suPHP, & FastCGI. Each handler delivers the libraries through different files and implementations. Each file and implementation affects Apache’s performance, because it determines how Apache serves PHP.

It is essential for your server’s performance that you select the handler that fits your situation. Selecting the right handler is just as important as the PHP version itself. One handler is not necessarily always better than another; it depends on your unique setup.

Note: You may assign different PHP handlers to different versions of PHP. For example, version 5 may be handled by CGI while PHP 4 is handled by DSO.
How to change the handler
Changing the handler on cPanel is very easy to do and takes only seconds. Log into WHM and navigate to: Main >> Service Configuration >> Configure PHP and SuExec

You simply select your PHP handler choice from the drop-down menu. Then hit “Save New Configuration”.

Note: If you do not see your desired choice in the drop-down menu, it may need to be compiled on the server first. Run an “Easy Apache” to compile it.
List of PHP handlers
DSO
Also known as mod_php. This is an older configuration but is generally considered the fastest handler. It runs PHP as an Apache module. This means that PHP scripts will run as the Apache user, which is the user: ‘nobody’.

DSO has two drawbacks. First, all files created by a PHP script will have the ownership of ‘nobody’. They will not be readable from the web. Websites that need to upload files through PHP will run into file permission issues. This is common with WordPress users that upload files through the WordPress interface or utilize the auto-update feature. These will fail with DSO.

The second drawback is a security issue. Created files will have the ‘nobody’ ownership. If a hacker finds an exploit in your PHP script, they could implement a file that has the same privileges as important system files that are also owned by ‘nobody’. This will give them the ability to modify these other system files. The preventative fix for this is to always keep your software up to date. Check with your PHP script’s developer to keep up on the new releases.

Generally, these problems do not severely affect most users. DSO’s low CPU usage typically amounts in higher speeds and load times over most other handlers. It is also the default setting on most servers.

CGI
CGI handler will run PHP as a CGI module as opposed to an Apache module. CGI still runs PHP processes as the Apache ‘nobody’ user. The CGI method is intended as a fallback handler for when DSO is not available. According to cPanel’s own documentation, this method is neither fast nor secure, regardless of whether or not suEXEC is enabled.



suPHP
suPHP also runs PHP as a CGI module instead of an Apache module. It differs from CGI in that PHP scripts that are called from the web will run under the user that owns them, as opposed to ‘nobody’. suPHP is typically the default handler and is recommended by cPanel for serving PHP because you will be able to see which user owns the account that is running the PHP script.

suPHP is beneficial in that if you are using a file upload tool on your site (such as an automatic updater or theme/plug-in installer for WordPress), the files will already have the right ownership & permissions. Uploading and other WordPress functions will not work without suPHP or FastCGI.

suPHP also offers a security advantage that any php script that is not owned by the particular user (such as another account or root) will not be executable. Also, files that have permissions set to world writeable will likewise be non-executable. This means that if one account is compromised, the malicious scripts will not be able to infect other accounts.

The drawback is that suPHP generally runs a much higher CPU load. In addition, you CANNOT use an Opcode Cache (such as Xcache or APC) with suPHP. It is strongly recommend that you install a caching plug-into supplement. If you find that your server is still continually struggling with CPU usage, you will want to consider switching to DSO or FastCGI.

FastCGI
FastCGI (aka: mod_fcgid) is a high performance alternative to CGI. It has the security/ownership benefits of suPHP in that PHP scripts will run as the actual cPanel user as opposed to ‘nobody’. The difference with FastCGI is that it can drastically save on CPU performance and give speeds close to that of DSO. It can also be used with an opcode cacher like eAccelerator or APC, which can help further speed the loading of pages.

The drawback is FastCGI has a high memory usage. This is because rather than creating the PHP process each time it is called, like suPHP, it keeps a persistent session open in the background. This is what lets it work with an opcode caching software.

If you like the security/ownership benefits of suPHP and you can afford a major increase in memory usage (meaning you already have a low average memory usage), you may wish to consider using FastCGI.

Click here is read the source of this Howto with compare chart:

http://boomshadow.net/tech/php-handlers/

Read More

Sat

11

Feb

2012

For those in need of VoIP Support | DrVoIP!

A bit about DrVoIP.com

PETER S. BUSWEL

l (a.k.a DrVoIP) – began his telecommunications career with AT&T Technologies in 1970. Over the last 35 years, Peter has been singularly responsible for the founding, funding, management and growth of several industry-defining companies, including National Communications Industries, AMBI Voice/Data Systems and Cobotyx Corporation. 

In the early 1980′s he served as Manager of Strategic Planning for the Communications Systems Group of Exxon Enterprises, the venture capital wing of Exxon Oil. He was insturmental in brining the InteCom PBX to market along with other Exxon back office product like Delphi Messaging. He has served in management capacities at IT&T as Director of Product Line Management and was the product manager for the CS-1024 ACD offered by IT&T at that time.

At Datapoint he served as Manager of Program Development for the Infoswitch family of Call Center products. He has also held key executive positions as CMO or COO in several public telecommunications companies including Intervoice/Brite; and the Farmstead Telephone Group (FTG). Peter served as CMO of tAA and helped put the fledgling Voice Mail company on the Inc. Magizines Fastest growing 100companies in both 95′ and 96′. In 1998 Peter became COO of Franklin Telecommunications, a VoIP Gateway manufacture, and rang the opening bell the morning of March 13, 1999 the day the company went public on the AMEX! 

Before forming LANtelligence in September of 2001, Peter was Executive V.P. & COO of COM 2001 a company that produced a family of internet based telecommunications products including Alexis, the first voice recognition based Un-PBX build on Microsoft Technology. 

Peter retains his position as and Industry luminary, Business Telecommunications Development Consultant, Speaker and Published Author. His guide to VoIP Planning is one of the most widely downloaded books on the net!

A graduate of Marymount College with a BS degree in Business & Information Technology Management, Peter is an active leader in the VoIP community and demonstrates his commitment by holding the following current industry certifications: He is a CISCO Professional holding current CCNA, CCDA, CCNP, CCDP and the CCVP certifications. He is also a ShoreTel Certified VoIP Engineer and has been certified by SONUS. 

He is generally know as “Dr VoIP” in local telecom community! As a Master Mason, Peter is a member of the Vista Lodge #687 of F&AM and is a 32° Mason in the Scottish Rite of Freemasonry, Valley of San Diego Orient of California. 

An avid private pilot an aircraft owner he is FAA certified with an Instrument rating in both Single and Multi-Engine aircraft. He is an AOPA and Bonanza Society member, a card carring member of the NRA, a future rock star (plays guitar, keyboard, CD’s) speaks several Latin languages and enjoys digital film making.

Contact: Peter@DrVoIP.com

http://www.DrVoIp.com

Technology Solutions and more @ http://www.VirtualGraffiti.com

Read More

Sat

11

Feb

2012

iCloud MobileMe: Using mac.com and me.com

New iCloud email address for all new users to iCloud would be @me.com 

In order to option MAC O/S Tiger you will need to select iMap 

Below are the iCloud / me.com server address provisioning info for setting up iMail

Summary

If you were a .Mac subscriber before the launch of MobileMe, you had a username@mac.com email address. Now that we have converted to MobileMe, you have also been granted a username@me.com address. These email addresses are aliases of one another, so they are one and the same and share the same inbox. You can choose to use either email address to send and receive mail on your computer, iPhone, or iPod touch and set up your MobileMe Contact and Calendar syncing.

Products Affected
MobileMe Mail, .Mac Mail, iPod touch, iPhone
Using me.com and/or mac.com addresses with Mail in Mac OS X 10.5

When you set up your MobileMe email in OS X 10.5 Mail, it will automatically list all of your MobileMe email addresses in the "From" drop-down box in messages you are composing. This allows you to choose to use your @mac.com address or your @me.com address anytime you compose a new message, including any aliases you may have set up. 

Note: Any aliases you created (and didn't delete) before the .Mac-to-MobileMe should have both @mac.com and @me.com versions. Aliases created after the transition can only be used with @me.com.

Set up MobileMe email in Mac OS X 10.5.

Using me.com and/or mac.com addresses with Mail in Mac OS X 10.4.11

Your MobileMe email address work the same in Mac OS X 10.4.11 as they do in 10.5. If you were an existing .Mac member and simply want to keep sending and receiving using your membername@mac.com address, you don't have to do anything. Note that all MobileMe features will appear as ".Mac" in Tiger, even if you are a new MobileMe member.

Note: Any aliases you created (and didn't delete) before the .Mac-to-MobileMe should have both @mac.com and @me.com versions. Aliases created after the transition can only be used with @me.com.

If you want to also use your new @me.com address, see the Mac OS X 10.4 section of this article.

Using me.com and/or mac.com addresses with a third-party email application

You can configure a third-party email application to use either your @mac.com or @me.com email address. However, depending on the email application you use, you may not be given the opportunity to choose to send from your other email address in the same way that Mail in Mac OS X allows. See this article.

Note: Any aliases you created (and didn't delete) before the .Mac-to-MobileMe should have both @mac.com and @me.com versions. Aliases created after the transition can only be used with @me.com.

Using your iPhone or iPod touch with a me.com or mac.com address

When using MobileMe Mail on your iPhone or iPod touch, it is recommended that you choose either your @mac.com address OR your @me.com address. Just choose the address you'd like to use and set it up on your iPhone or iPod touch. Note: Aliases are not currently supported on iPhone or iPod touch.

Set up MobileMe email on your iPhone or iPod touch (see source URL)

Source: http://support.apple.com/kb/HT2857

iCloud: Mail server information

Summary
iCloud Mail uses IMAP and SMTP standards supported by most modern email applications. While applications not manufactured by Apple are not supported by Apple, you can use the server information below to manually configure your email application for use with iCloud.

Products Affected
iCloud
For more information on how to use this information with your email application, consult your application's documentation.

IMAP (Incoming Mail Server) information:

Server name: imap.mail.me.com
SSL Required: Yes
Port: 993
Username: example@me.com (use your @me.com address from your iCloud account)
Password: Your iCloud password
SMTP (outgoing mail server) information:

Server name: smtp.mail.me.com
SSL Required: Yes
Port: 587
SMTP Authentication Required: Yes
Username: example@me.com (use your @me.com address from your iCloud account)
Password: Your iCloud password
Additional Information
SSL is required for both IMAP and SMTP connection with iCloud. POP is not supported by iCloud. 

Important: Information about products not manufactured by Apple is provided for information purposes only and does not constitute Apple’s recommendation or endorsement. Please contact the vendor for additional information.

Source: http://support.apple.com/kb/HT4864


HostCheetah.com 

Read More

Sat

11

Feb

2012

Dell Box Service Tag by Command Line

Dell Box Service Tag by Command Line

Pretty cool, especially if you don’t have physical access to a Dell machine (obviously you can run these commands on your own machine).

1. In Windows, RDP into a machine run the following at a command prompt: wmic bios get serialnumber
2. To get the make, model and service tag: wmic csproduct get vendor,name,identifyingnumber
3. To get the info remotely: wmic /user:vg\<adminUser> /node:<hostname> bios get serialnumber
4. In Linux, login via SSH and run: [remote-host]# dmidecode -s system-serial-number

Read More

Sat

11

Feb

2012

Apple Ships Huge Set of Patches for OS X

Apple has released a massive set of patches for a wide range of security vulnerabilities in a number of its products and components, including OSX Lion and QuickTime. The patches fix a slew of serious bugs, many of which can be used to execute remote code on vulnerable machines.

One of the more serious vulnerabilities Apple fixed is the flaw that researchers Juliano Rizzo and Thai Duong discovered in the TLS 1.0 and SSL 3.0 protocols last year. The vulnerability, for which they wrote a proof-of-concept exploit tool called BEAST, is fixed in the new version of Apache that Apple included in yesterday's patches. Exploiting the flaw enables an attacker to decrypt some SSL sessions.

"There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. Apache disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by providing a configuration parameter to control the countermeasure and enabling it by default," Apple said in its advisory.

Apple also pushed out an update that revokes trust in some of the certificates issued by Malaysian CA DigiCert that were found last year to contain weak cryptographic keys.

"Two certificate authorities in the list of trusted root certificates have independently issued intermediate certificates to DigiCert Malaysia. DigiCert Malaysia has issued certificates with weak keys that it is unable to revoke. An attacker with a privileged network position could intercept user credentials or other sensitive information intended for a site with a certificate issued by DigiCert Malaysia. This issue is addressed by configuring default system trust settings so that DigiCert Malaysia's certificates are not trusted," Apple's advisory said.

Among the other components that Apple patched on Wednesday are PHP, QuickTime and SquirrelMail.

Source : ThreatPost

Read More

Sat

11

Feb

2012

Chrome barks "Your profile cannot be used"

If you downgrade from Chrome or Chrome Beta , you may get:

When starting Chrome, the program generates a message 

'Your profile cannot be used because it is from newer version of Google Chrome.

Some features may be unavailable. please specify a different profile directory or use a newer version ofChrome.'

Here is the fix / at least one of them:

(Example) 

c:\Users\HP\AppData\Local\Google\Chrome\User Data\Default\Web Data 

I deleted the Web Data folder.

Closed Windows Explorere, Opened Chrome

*** If you have a MAC , this may apply


I ran into the same problem and just fixed it. What other users suggested here works - the trick is to find the right Library folder. Depending on how your Mac was setup, you may have more than one Library folders - one under your Macintosh HD and another under Users folder. I found my Google (profile) folder under Users folder. The following is the steps to fix the problem:
1. Click to open your Users folder, then open the folder for your current user, say "Tom", open "Tom" folder, then open the Library folder.
2. Open Application Supper folder;
3. Find Google folder (if you want to sure to get the right one, click to open it, there should be Chrome sub-folder in it);
4. Delete this Google folder and all folders inside it.
5. Restart Chrome;
6. You can enjoy Chrome again without that annoying message!
Note: If you sync your google settings before, you can re-sync and get your bookmarks back.

Read More

Thu

22

Mar

2012

iPhone iPad can not access internet via SonicPoint with Apple devices

Apple devices can’t access internet via SonicPoint

AUG 2011

If you have an iPhone or an iPad that cannot access the internet through a SonicPointNDR you came to the right place. I had a SonicPointN and everything worked fine for all of our devices.

 

I then upgraded to a SonicPointNDR and only the iPhone couldn’t access the internet. No matter what DNS settings or firewall rules I tried.

 

The trick is to disable Aggregation on the Radio settings. As soon as I did this and pushed the changes to my SonicPoints the iPhone was able to get online.

 

Here are the details from SonicWall on the known issue:

 

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=8091

 

Source: 

 

http://www.jesswatts.com/it/apple-devices-cant-access-internet-via-sonicpoint

 

Read More

Tue

20

Mar

2012

Strong Password Generator and Info

 You can generate strong passwords from either of the following sites:


  1. http://strongpasswordgenerator.com/
  2. http://www.pctools.com/guides/password/
  3. https://www.grc.com/passwords.htm

 

The Following dialog is from GRC.com visit link number 3 for more info.

 

What makes these perfect and safe?

Every one is completely random (maximum entropy) without any pattern, and the cryptographically-strong pseudo random number generator we use guarantees that no similar strings will ever be produced again.

 

Also, because this page will only allow itself to be displayed over a snoop-proof and proxy-proof high-security SSL connection, and it is marked as having expired back in 1999, this page which was custom generated just now for you will not be cached or visible to anyone else.

 

Therefore, these password strings are just for you. No one else can ever see them or get them. You may safely take these strings as they are, or use chunks from several to build your own if you prefer, or do whatever you want with them. Each set displayed are totally, uniquely yours — forever.

 

The "Application Notes" section below discusses various aspects of using these random passwords for locking down wireless WEP and WPA networks, for use as VPN shared secrets, as well as for other purposes.

 

The "Techie Details" section at the end describes exactly how these super-strong maximum-entropy passwords are generated (to satisfy the uber-geek inside you).

 

 

Tue

14

Feb

2012

AOL Stalker - Search Data

About AOL Stalker AOLStalker.com contains data from the AOL search data scandal - where AOL on purpose released a massive amount of private data for all the internet to see. On this website you, the normal user can search this data (just as all the hackers already can).

 

AOLStalker.com was created to make the public aware, not to pry on peoples privacy.

 

If you find anything in this data collection you want removed, please use the report function or contact us with the user id - we will remove it. Just enter a word in the box on the mainpage and let the good times roll. Want to know who's searching for you? Just enter your name and find out. Want to know what your neighbour is searching for?

 

Enter your street address or his name to find other related searches. The possibilities are endless, use your imagination.

 

Sometimes we also transport yachts for fun

 

http://www.aolstalker.com

Mon

13

Feb

2012

Which ports to unblock for VPN traffic to pass-through?

Little Background: Microsoft RRAS server and VPN client supports PPTP, L2TP/IPSec, SSTP and IKEv2  based VPN connection. PPTP control path is over TCP and data path over GRE. L2TP tunnel traffic is carried over IPSec transport mode and IPSec protocol internally has a control path through IKE and data path over ESP. SSTP control and data path is over TCP. IKEv2 control path is over IKE and data path over ESP.

So now coming back to original question. There are multiple scenarios:

1) If RRAS based VPN server is behind a firewall (i.e. a firewall is placed between Internet and RRAS server), then following ports need to be opened (bidirectional) on this firewall to allow VPN traffic to pass through: -

  • For PPTP:
    • IP Protocol=TCP, TCP Port number=1723   <- Used by PPTP control path
    • IP Protocol=GRE (value 47)   <- Used by PPTP data path
  • For L2TP:
    • IP Protocol Type=UDP, UDP Port Number=500    <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500   <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=ESP (value 50)   <- Used by IPSec data path
  • For SSTP:
    • IP Protocol=TCP, TCP Port number=443   <- Used by SSTP control and data path
  • For IKEv2:
    • IP Protocol Type=UDP, UDP Port Number=500    <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500   <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=ESP (value 50)   <- Used by IPSec data path

2) If RRAS server is directly connected to Internet, then you need to protect RRAS server from the Internet side (i.e. only allow access to the services on the public interface that isaccessible from the Internet side). This can be done using RRAS static filters or running Windows Firewall on the public interface (or the interface towards the Internet side). In this scenario following ports need to be opened (bidirectional) on RRAS box to allow VPN traffic to pass through

  • For PPTP:
    • IP Protocol=TCP, TCP Port number=1723  <- Used by PPTP control path
    • IP Protocol=GRE (value 47)  <- Used by PPTP data path
  • For L2TP:
    • IP Protocol Type=UDP, UDP Port Number=500   <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv1 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=1701  <- Used by L2TP control/data path
    • IP Protocol Type=50  <- Used by data path (ESP)
  • For SSTP:
    • IP Protocol=TCP, TCP Port number=443   <- Used by SSTP control and data path
  • For IKEv2:
    • IP Protocol Type=UDP, UDP Port Number=500   <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=4500 <- Used by IKEv2 (IPSec control path)
    • IP Protocol Type=UDP, UDP Port Number=1701  <- Used by L2TP control/data path
    • IP Protocol Type=50 <- Used by data path (ESP)

Note: Please DO NOT configure RRAS static filters if you are running on the same server RRAS based NAT router functionality. This is because RRAS static filters are stateless and NAT translation requires a stateful edge firewall like ISA firewall.

Do not forget: If you enable Windows firewall or RRAS static filters on the public interface and only enable VPN traffic to pass-through, then all the other traffic may be dropped. For example, if the same server is running as a mail server facing internet or a DNS server or a reverse web proxy server, then you need to enable the ports used by those services explicitly. For further details, refer to this article:http://blogs.technet.com/rrasblog/archive/2006/07/06/enabling-rras-drops-all-other-traffic-except-vpn-traffic.aspx

References:

http://technet2.microsoft.com/WindowsServer/en/Library/ac14405b-3802-4ae0-bcd5-5c33bb7db5311033.mspx?mfr=true

Ports affecting the VPN connectivity

RRAS Server in Windows server 2008: Which one to use - Windows firewall or RRAS filters  

Samir Jain
Lead Program Manager
RRAS, Windows Enterprise Networking

  

[This posting is provided "AS IS" with no warranties, and confers no rights.]

 

 

Mon

13

Feb

2012

What are : SHA-2 Certificates

SHA-2 SSL certificate hashing is a cryptographic algorithm developed by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA). SHA2 certificates are more secure than all previous algorithms, and are being required in certain applications in place of certificates signed with the SHA-1 hash function beginning January 1, 2011.

Many organizations may be required to upgrade to SHA-2 (also known as SHA2 or SHA-256) SSL certificates in conjunction with updated federal and PCI compliance standards.

 

Although SHA-1 certificates will still be considered secure for years to come, mathematical weaknesses have been identified that could potentially be exploited in breaking the SHA-1 crypto hash. These mathematical weaknesses were resolved in the SHA-2 encryption algorithm.

 

As an organization concerned with establishing online security, and as a service to our customers and the end-users who rely on the integrity of their systems and infrastructure, Affect Web supports those organizations that are taking all possible measures to help make SHA-256 certificates the encryption standard.

 

PCI compliance scanners may require their clients to use SHA-2 compatible SSL certificates. Certificates issued within the federal space will be required (in accordance with NIST standards) to be issued with SHA-2. If you need a SHA-2/SHA-256 certificate, you will be given the option to select whether to make your cert a SHA-2 cert during the order process for any of our standard product offerings.

 

Read More

Sat

11

Feb

2012

Online email header analyzer

 

This tool will make email headers human readable by parsing them according to RFC 822.

 

Email headers are present on every email you receive via the Internet and can provide valuable diagnostic information like hop delays, anti-spam results and more. If you need help getting copies of your email headers, just read this tutorial.

Access online email header analyzer here:

http://www.mxtoolbox.com/EmailHeaders.aspx

How to Get Email Headers – A Guide from MxToolBox

When reporting spam that slips past the filters, it is essential that we receive the full message headers from a message. Additionally, sometimes our Support department may request the full headers from an email message in order to troubleshoot mail delivery problems. Please follow these instructions to obtain and forward full message headers to support@mxtoolbox.com.

Every single Internet e-mail message is made up of two parts the header and the message body of the email. Every single email you send or receive on the Internet contains an Internet Header, a full and valid e-mail header provides a detailed log of the network path taken by the message between the mail sender and the mail receiver(s) (email servers).

Your email client program will usually hide the full header or display only lines, such as From, To, Date, and Subject, see below for more information on pulling headers for your email client:

Note: Please put a short but descriptive note in the subject or the body of the message so we can quickly assess your issue or problem.

Note: If you need assistance in understanding email headers, please feel free to use our Email Header Analyzer.

Outlook 2003
Outlook 2007
Outlook 2010
Outlook Express
Outlook 97
Outlook 98
Outlook 2000
Outlook 2002
Microsoft Exchange
Zimbra
Entourage
Mac OS X Mail
Outlook Express for Macintosh
Gmail (works for Google Apps as well)
Yahoo!
AOL
Hotmail
Eudora
Netscape, Mozilla or Thunderbird
Lotus Notes
Pine
XtraMail
Pegasus Mail
Claris Emailer
Mail Warrior
Juno
Novell Groupwise

For Screen Shots and more on this HowTo:

http://community.mxtoolbox.com/blog/2009/05/18/how-to-get-email-headers-a-guide-from-mxtoolbox/

Access online email header analyzer here:

http://www.mxtoolbox.com/EmailHeaders.aspx

Free Account for Cloud File Sharing: http://www.CloudBins.com

Cloud Hosting and Security: http://www.ParagonHost.com

Read More

Sat

11

Feb

2012

DSO vs. CGI vs. suPHP vs. FastCGI

DSO vs. CGI vs. suPHP vs. FastCGI

This is one of the most common topics that customers will ask about. As highly important as PHP handlers are, they often the least understood. Its not too hard to understand; you don’t have to know that exact science of how it all works, but it should be learned by all who want to take their website seriously. Picking the right PHP handler for your website will give you the optimal speeds you want and maybe allow you to save some money by using a cheaper hosting package. So I invite you to take a few minutes and learn something new.

What are PHP handlers
In order to run a PHP site, the server must interpret the PHP code and generate a page when visitors access the website. It interprets the code based on which PHP library you are using, such as PHP 4 or PHP 5. A PHP handler is what actually loads the libraries so that they can be used for interpretation. PHP handlers determine how PHP is loaded on the server.

There are multiple different handlers that can be used for loading PHP: CGI, DSO, suPHP, & FastCGI. Each handler delivers the libraries through different files and implementations. Each file and implementation affects Apache’s performance, because it determines how Apache serves PHP.

It is essential for your server’s performance that you select the handler that fits your situation. Selecting the right handler is just as important as the PHP version itself. One handler is not necessarily always better than another; it depends on your unique setup.

Note: You may assign different PHP handlers to different versions of PHP. For example, version 5 may be handled by CGI while PHP 4 is handled by DSO.
How to change the handler
Changing the handler on cPanel is very easy to do and takes only seconds. Log into WHM and navigate to: Main >> Service Configuration >> Configure PHP and SuExec

You simply select your PHP handler choice from the drop-down menu. Then hit “Save New Configuration”.

Note: If you do not see your desired choice in the drop-down menu, it may need to be compiled on the server first. Run an “Easy Apache” to compile it.
List of PHP handlers
DSO
Also known as mod_php. This is an older configuration but is generally considered the fastest handler. It runs PHP as an Apache module. This means that PHP scripts will run as the Apache user, which is the user: ‘nobody’.

DSO has two drawbacks. First, all files created by a PHP script will have the ownership of ‘nobody’. They will not be readable from the web. Websites that need to upload files through PHP will run into file permission issues. This is common with WordPress users that upload files through the WordPress interface or utilize the auto-update feature. These will fail with DSO.

The second drawback is a security issue. Created files will have the ‘nobody’ ownership. If a hacker finds an exploit in your PHP script, they could implement a file that has the same privileges as important system files that are also owned by ‘nobody’. This will give them the ability to modify these other system files. The preventative fix for this is to always keep your software up to date. Check with your PHP script’s developer to keep up on the new releases.

Generally, these problems do not severely affect most users. DSO’s low CPU usage typically amounts in higher speeds and load times over most other handlers. It is also the default setting on most servers.

CGI
CGI handler will run PHP as a CGI module as opposed to an Apache module. CGI still runs PHP processes as the Apache ‘nobody’ user. The CGI method is intended as a fallback handler for when DSO is not available. According to cPanel’s own documentation, this method is neither fast nor secure, regardless of whether or not suEXEC is enabled.



suPHP
suPHP also runs PHP as a CGI module instead of an Apache module. It differs from CGI in that PHP scripts that are called from the web will run under the user that owns them, as opposed to ‘nobody’. suPHP is typically the default handler and is recommended by cPanel for serving PHP because you will be able to see which user owns the account that is running the PHP script.

suPHP is beneficial in that if you are using a file upload tool on your site (such as an automatic updater or theme/plug-in installer for WordPress), the files will already have the right ownership & permissions. Uploading and other WordPress functions will not work without suPHP or FastCGI.

suPHP also offers a security advantage that any php script that is not owned by the particular user (such as another account or root) will not be executable. Also, files that have permissions set to world writeable will likewise be non-executable. This means that if one account is compromised, the malicious scripts will not be able to infect other accounts.

The drawback is that suPHP generally runs a much higher CPU load. In addition, you CANNOT use an Opcode Cache (such as Xcache or APC) with suPHP. It is strongly recommend that you install a caching plug-into supplement. If you find that your server is still continually struggling with CPU usage, you will want to consider switching to DSO or FastCGI.

FastCGI
FastCGI (aka: mod_fcgid) is a high performance alternative to CGI. It has the security/ownership benefits of suPHP in that PHP scripts will run as the actual cPanel user as opposed to ‘nobody’. The difference with FastCGI is that it can drastically save on CPU performance and give speeds close to that of DSO. It can also be used with an opcode cacher like eAccelerator or APC, which can help further speed the loading of pages.

The drawback is FastCGI has a high memory usage. This is because rather than creating the PHP process each time it is called, like suPHP, it keeps a persistent session open in the background. This is what lets it work with an opcode caching software.

If you like the security/ownership benefits of suPHP and you can afford a major increase in memory usage (meaning you already have a low average memory usage), you may wish to consider using FastCGI.

Click here is read the source of this Howto with compare chart:

http://boomshadow.net/tech/php-handlers/

Read More

Sat

11

Feb

2012

For those in need of VoIP Support | DrVoIP!

A bit about DrVoIP.com

PETER S. BUSWEL

l (a.k.a DrVoIP) – began his telecommunications career with AT&T Technologies in 1970. Over the last 35 years, Peter has been singularly responsible for the founding, funding, management and growth of several industry-defining companies, including National Communications Industries, AMBI Voice/Data Systems and Cobotyx Corporation. 

In the early 1980′s he served as Manager of Strategic Planning for the Communications Systems Group of Exxon Enterprises, the venture capital wing of Exxon Oil. He was insturmental in brining the InteCom PBX to market along with other Exxon back office product like Delphi Messaging. He has served in management capacities at IT&T as Director of Product Line Management and was the product manager for the CS-1024 ACD offered by IT&T at that time.

At Datapoint he served as Manager of Program Development for the Infoswitch family of Call Center products. He has also held key executive positions as CMO or COO in several public telecommunications companies including Intervoice/Brite; and the Farmstead Telephone Group (FTG). Peter served as CMO of tAA and helped put the fledgling Voice Mail company on the Inc. Magizines Fastest growing 100companies in both 95′ and 96′. In 1998 Peter became COO of Franklin Telecommunications, a VoIP Gateway manufacture, and rang the opening bell the morning of March 13, 1999 the day the company went public on the AMEX! 

Before forming LANtelligence in September of 2001, Peter was Executive V.P. & COO of COM 2001 a company that produced a family of internet based telecommunications products including Alexis, the first voice recognition based Un-PBX build on Microsoft Technology. 

Peter retains his position as and Industry luminary, Business Telecommunications Development Consultant, Speaker and Published Author. His guide to VoIP Planning is one of the most widely downloaded books on the net!

A graduate of Marymount College with a BS degree in Business & Information Technology Management, Peter is an active leader in the VoIP community and demonstrates his commitment by holding the following current industry certifications: He is a CISCO Professional holding current CCNA, CCDA, CCNP, CCDP and the CCVP certifications. He is also a ShoreTel Certified VoIP Engineer and has been certified by SONUS. 

He is generally know as “Dr VoIP” in local telecom community! As a Master Mason, Peter is a member of the Vista Lodge #687 of F&AM and is a 32° Mason in the Scottish Rite of Freemasonry, Valley of San Diego Orient of California. 

An avid private pilot an aircraft owner he is FAA certified with an Instrument rating in both Single and Multi-Engine aircraft. He is an AOPA and Bonanza Society member, a card carring member of the NRA, a future rock star (plays guitar, keyboard, CD’s) speaks several Latin languages and enjoys digital film making.

Contact: Peter@DrVoIP.com

http://www.DrVoIp.com

Technology Solutions and more @ http://www.VirtualGraffiti.com

Read More

Sat

11

Feb

2012

iCloud MobileMe: Using mac.com and me.com

New iCloud email address for all new users to iCloud would be @me.com 

In order to option MAC O/S Tiger you will need to select iMap 

Below are the iCloud / me.com server address provisioning info for setting up iMail

Summary

If you were a .Mac subscriber before the launch of MobileMe, you had a username@mac.com email address. Now that we have converted to MobileMe, you have also been granted a username@me.com address. These email addresses are aliases of one another, so they are one and the same and share the same inbox. You can choose to use either email address to send and receive mail on your computer, iPhone, or iPod touch and set up your MobileMe Contact and Calendar syncing.

Products Affected
MobileMe Mail, .Mac Mail, iPod touch, iPhone
Using me.com and/or mac.com addresses with Mail in Mac OS X 10.5

When you set up your MobileMe email in OS X 10.5 Mail, it will automatically list all of your MobileMe email addresses in the "From" drop-down box in messages you are composing. This allows you to choose to use your @mac.com address or your @me.com address anytime you compose a new message, including any aliases you may have set up. 

Note: Any aliases you created (and didn't delete) before the .Mac-to-MobileMe should have both @mac.com and @me.com versions. Aliases created after the transition can only be used with @me.com.

Set up MobileMe email in Mac OS X 10.5.

Using me.com and/or mac.com addresses with Mail in Mac OS X 10.4.11

Your MobileMe email address work the same in Mac OS X 10.4.11 as they do in 10.5. If you were an existing .Mac member and simply want to keep sending and receiving using your membername@mac.com address, you don't have to do anything. Note that all MobileMe features will appear as ".Mac" in Tiger, even if you are a new MobileMe member.

Note: Any aliases you created (and didn't delete) before the .Mac-to-MobileMe should have both @mac.com and @me.com versions. Aliases created after the transition can only be used with @me.com.

If you want to also use your new @me.com address, see the Mac OS X 10.4 section of this article.

Using me.com and/or mac.com addresses with a third-party email application

You can configure a third-party email application to use either your @mac.com or @me.com email address. However, depending on the email application you use, you may not be given the opportunity to choose to send from your other email address in the same way that Mail in Mac OS X allows. See this article.

Note: Any aliases you created (and didn't delete) before the .Mac-to-MobileMe should have both @mac.com and @me.com versions. Aliases created after the transition can only be used with @me.com.

Using your iPhone or iPod touch with a me.com or mac.com address

When using MobileMe Mail on your iPhone or iPod touch, it is recommended that you choose either your @mac.com address OR your @me.com address. Just choose the address you'd like to use and set it up on your iPhone or iPod touch. Note: Aliases are not currently supported on iPhone or iPod touch.

Set up MobileMe email on your iPhone or iPod touch (see source URL)

Source: http://support.apple.com/kb/HT2857

iCloud: Mail server information

Summary
iCloud Mail uses IMAP and SMTP standards supported by most modern email applications. While applications not manufactured by Apple are not supported by Apple, you can use the server information below to manually configure your email application for use with iCloud.

Products Affected
iCloud
For more information on how to use this information with your email application, consult your application's documentation.

IMAP (Incoming Mail Server) information:

Server name: imap.mail.me.com
SSL Required: Yes
Port: 993
Username: example@me.com (use your @me.com address from your iCloud account)
Password: Your iCloud password
SMTP (outgoing mail server) information:

Server name: smtp.mail.me.com
SSL Required: Yes
Port: 587
SMTP Authentication Required: Yes
Username: example@me.com (use your @me.com address from your iCloud account)
Password: Your iCloud password
Additional Information
SSL is required for both IMAP and SMTP connection with iCloud. POP is not supported by iCloud. 

Important: Information about products not manufactured by Apple is provided for information purposes only and does not constitute Apple’s recommendation or endorsement. Please contact the vendor for additional information.

Source: http://support.apple.com/kb/HT4864


HostCheetah.com 

Read More

Sat

11

Feb

2012

Dell Box Service Tag by Command Line

Dell Box Service Tag by Command Line

Pretty cool, especially if you don’t have physical access to a Dell machine (obviously you can run these commands on your own machine).

1. In Windows, RDP into a machine run the following at a command prompt: wmic bios get serialnumber
2. To get the make, model and service tag: wmic csproduct get vendor,name,identifyingnumber
3. To get the info remotely: wmic /user:vg\<adminUser> /node:<hostname> bios get serialnumber
4. In Linux, login via SSH and run: [remote-host]# dmidecode -s system-serial-number

Read More

Sat

11

Feb

2012

Apple Ships Huge Set of Patches for OS X

Apple has released a massive set of patches for a wide range of security vulnerabilities in a number of its products and components, including OSX Lion and QuickTime. The patches fix a slew of serious bugs, many of which can be used to execute remote code on vulnerable machines.

One of the more serious vulnerabilities Apple fixed is the flaw that researchers Juliano Rizzo and Thai Duong discovered in the TLS 1.0 and SSL 3.0 protocols last year. The vulnerability, for which they wrote a proof-of-concept exploit tool called BEAST, is fixed in the new version of Apache that Apple included in yesterday's patches. Exploiting the flaw enables an attacker to decrypt some SSL sessions.

"There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. Apache disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by providing a configuration parameter to control the countermeasure and enabling it by default," Apple said in its advisory.

Apple also pushed out an update that revokes trust in some of the certificates issued by Malaysian CA DigiCert that were found last year to contain weak cryptographic keys.

"Two certificate authorities in the list of trusted root certificates have independently issued intermediate certificates to DigiCert Malaysia. DigiCert Malaysia has issued certificates with weak keys that it is unable to revoke. An attacker with a privileged network position could intercept user credentials or other sensitive information intended for a site with a certificate issued by DigiCert Malaysia. This issue is addressed by configuring default system trust settings so that DigiCert Malaysia's certificates are not trusted," Apple's advisory said.

Among the other components that Apple patched on Wednesday are PHP, QuickTime and SquirrelMail.

Source : ThreatPost

Read More

Sat

11

Feb

2012

Chrome barks "Your profile cannot be used"

If you downgrade from Chrome or Chrome Beta , you may get:

When starting Chrome, the program generates a message 

'Your profile cannot be used because it is from newer version of Google Chrome.

Some features may be unavailable. please specify a different profile directory or use a newer version ofChrome.'

Here is the fix / at least one of them:

(Example) 

c:\Users\HP\AppData\Local\Google\Chrome\User Data\Default\Web Data 

I deleted the Web Data folder.

Closed Windows Explorere, Opened Chrome

*** If you have a MAC , this may apply


I ran into the same problem and just fixed it. What other users suggested here works - the trick is to find the right Library folder. Depending on how your Mac was setup, you may have more than one Library folders - one under your Macintosh HD and another under Users folder. I found my Google (profile) folder under Users folder. The following is the steps to fix the problem:
1. Click to open your Users folder, then open the folder for your current user, say "Tom", open "Tom" folder, then open the Library folder.
2. Open Application Supper folder;
3. Find Google folder (if you want to sure to get the right one, click to open it, there should be Chrome sub-folder in it);
4. Delete this Google folder and all folders inside it.
5. Restart Chrome;
6. You can enjoy Chrome again without that annoying message!
Note: If you sync your google settings before, you can re-sync and get your bookmarks back.

Read More
blog comments powered by Disqus