Category Archives: Software

“Your administrator has blocked this application because it potentially poses a security risk to your computer” 

“Your administrator has blocked this application because it potentially poses a security risk to your computer”

Issue:

During the installation of BIM 360 Glue Desktop, you see this error message:

Application Install – Security Warning
Your administrator has blocked this application because it potentially poses a security risk to your computer.

Security Warning when installing BIM 360 Glue desktop app

Causes:

The Windows ClickOnce trust prompt is disabled. ClickOnce, a component of the .NET Framework, must be enabled to run BIM 360 Glue.

Solution:

To resolve the issue, enable this registry key:

  • HKLM\SOFTWARE\MICROSOFT\.NETFramework\Security\TrustManager‌​\PromptingLevel\Inte‌​rnet

Note: This operation should be performed by an administrator with a technical understanding of the Windows Registry.

To enable the registry key:

  1. Open the registry editor:
  2. Find the following registry key:

    \HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\.NETFramework\Security\TrustManager\PromptingLevel\Internet

    If the key does not exist, create it.

  3. Set the value to Enabled.

Warning!
Problems caused by improperly editing the Windows registry could render your computer operating system unusable. Microsoft provides a wealth of critical information that you need to know about the registry in the Microsoft Knowledgebase. Use the Microsoft Registry Editor only at your own risk and only after backing up the registry as outlined for your operating system in the Microsoft article How to back up and restore the registry in Windows and in the related solution How to back up the system registry. Additional information about the registry is also contained in the Help topics in the Microsoft Registry Editor.

Source: “Your administrator has blocked this application because it potentially poses a security risk to your computer” when installing BIM 360 Glue | BIM 360 | Autodesk Knowledge Network

How to link a CLSID and APPID to a program – Microsoft Community

Generally, Windows manages quite well and this error is nothing too much to concern oneself with, however, for those running a Server or Network Service (for example a printer) this error if left unresolved can become troublesome and disruptive to day to day operations.

Within the error message Microsoft informs the user they can manually adjust some settings to resolve issue and this would be fine but for a few issues that your average punter would not know how to get around.

Thus I thought I’d take the opportunity to explore a method that generally resolves the error once and for all and has some very simple steps anyone can follow if they feel they need to repair the issue manually.

Step 1 — Locate the log and view the error message

  • The Windows Event Viewer is a GUI that allows us to view all events recorded by the Windows operating system. This GUI can be accessed by:
    • Right-clicking on Start
    • Left-clicking on Event Viewer

      Image

 

  • As you can see the Event Viewer window is separated into three panes. To access the System logs which record the event we are addressing here do the following:
    • In the left pane click on Windows Logs to expand view then select System
    • This will open the System logs inside the middle pane. If you’ve not done this before, or in a while, it will take a moment for the logs to populate the middle pane – this is normal.
    • Once the middle pane is populated you will see a list of events starting with the most recent ones at the top.

      You can scroll through this to locate Event ID 10016, or to speed things up you can specifically filter what is displayed in middle pane by doing the following:

      In the right pane click on Filter Current Log

      A window pops up with the center field filled in with <All Event IDs>. Simply click inside this field then type 10016 then click OK

      The result: Your middle pane now only displays a list of Event ID 10016 DistributedCOM errors with the most recent at the top of list.

      Sample Image of views just discussed

      Image

 

  • Judging by my long list my computer is near death. You’re all invited to the Service – please bring donations not flowers Image

    All right enough with the jokes – this long list really is nothing to panic about at all – its pretty normal in reality and most events are the same just at different times and dates. As I said earlier Windows generally sorts these out itself too, so the log itself is simply a time stamp of an event that took place that may now be stable. However, we can get to the root of the cause and help prevent it repeating by reading the actual log.

 

  • To read a log you simply double-left-click on the event who’s log you wish to view, in the middle pane. This opens a new window like so:

    Image

    This window by default opens displaying the General tab

    As you can see there is a lot of information some of which you’d need to scroll to read, however if you click the Copy button then open a text editor like Notepad you can paste all the details there for an easier read.

    Image

    The information above high lighted in the red box is what we want. The things to note here are the following:

    1. Source: The source of error was Microsoft Windows DistributedCOM

    2. User: The System was attempting to use the DistributedCOM when error occurred.

    3. Description: This tells you about the error and gives you some clues.

    The application-specific permission settings do not grant Local Activation permission for the COM Server application with
    CLSID {8D8F4F83-3594-4F07-8369-FC3C3CAE4919}
    and APPID {F72671A9-012C-4725-9D2F-2A4D32D65169}
    to the user NT AUTHORITY\SYSTEM SID (S-1-5-18) from address LocalHost (Using LRPC) running in the application container Unavailable SID (Unavailable). This security permission can be modified using the Component Services administrative tool.

 

  • From the above information we’ve establish the Windows System attempted to perform an action involving the Microsoft Windows DistributedCOM server, however permission settings were not granted from Local Activation. We are told the Security Identified (SID) is the user NT Authority\System SID (S-1-5-18) which essentially has the highest privileges allowed for your computer.

    We are given a Class ID (CLSID) and also an Application ID (APPID) with the alphanumeric key name which is recorded in your Windows Registry. With those two keys we can work out which application the System was making use of when the error occurred.

    Finally, Microsoft informs us we are able to modify the settings which ought to prevent this issue taking place again. More on that later as you’ll soon discover its not quite as simple as the statement makes out.

Step 2 — Working out what Microsoft DistributedCOM file we need to modify

  • As we have discovered the CLSID and APPID, and we know their information is stored in the Windows Registry we can very easily get the information we need from the Default value for each of these keys.

    Something many may not know though is where precisely in the Registry to look for these keys, and given how important it is not to mess with things you don’t know in case you create a bigger problem, I’ll explain where the keys will be and then how to view the information we need without the need to open the Registry Editor (regedit.exe).

 

  • The CLSID {8D8F4F83-3594-4F07-8369-FC3C3CAE4919} key will be located here:

    HKEY_CLASSES_ROOT\CLSID\{8D8F4F83-3594-4F07-8369-FC3C3CAE4919}

 

  • The APPID {F72671A9-012C-4725-9D2F-2A4D32D65169} we are interested in will be located here:

    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F72671A9-012C-4725-9D2F-2A4D32D65169}

    Both of these keys are located elsewhere in the Windows Registry, however these two locations can provide sufficient information for us to work out which Microsoft DistributedCOM file we need to modify.

    The information we need is contained in both of these keys Default value although occasionally one of the keys may not contain this information as we are about to discover in this example. That is not unusual, however it would be very peculiar to discover each key Defaulted to a completely different DistributedCOM file.

    To get the information we want without opening the Registry Editor, we will make use of an elevated command prompt console.

 

  • Right-click on Start
  • Left-click on Command Prompt (Admin)
  • When the User Account Control pops up click Yes
  • You will now see the Administrator: Command Prompt console.

    In this console type or copy & paste the following command:

    Code:
    reg query "HKEY_CLASSES_ROOT\CLSID\{8D8F4F83-3594-4F07-8369-FC3C3CAE4919}" /ve

    Press Enter key to execute

    Next type or copy & paste the following command:

    Code:
    reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F72671A9-012C-4725-9D2F-2A4D32D65169}" /ve

    Press Enter key to execute

    Sample Image of what you’ll see

    Image

    You can see the CLSID key’s Default value contains a Data value of CDP Activity Store

    The APPID key’s Default value has no Data value set

    We now know that the Microsoft DistributedCOM we need to modify is the CDP Activity Store component, and that according to Microsoft’s error message we are able to modify.

    I’ll explain shortly how to get to this, but to illustrate the suggestion from Microsoft is not quite as simple as that, let’s take a look at the location I’ll be needing to modify.

    Sample Image

    Image

    The area inside the red frame is what we need to modify and according to Microsoft we can. Do you notice the problem?

    The fields are grayed out meaning you cannot modify this at all.

    The reason for this is because this is a component owned by the System.

    The NT AUTHORITY\SYSTEM has the highest privileges on the Local Service Account and normally us mere Administrators, or Local Account users have limited permissions to access things and make changes.

    Yet Microsoft told us we can modify, and they were not kidding. To do this we first need to take ownership of both the CLSID and APPID keys in the Windows Registry that we just checked their Default Value Data value.

Step 3 — Taking ownership of the CLSID and APPID keys

  • Taking ownership of these registry keys can be done several ways. For those comfortable working with the Registry Editor application, this perhaps is a relatively simple way to achieve the goal.

    For those less familiar with the Registry Editor, a safer way to do this is to make use of a Microsoft Tool especially developed for situations like this called SetACL.exe

    Now it’s important to realize this tool does not come with your Windows installation per se, but it can be freely downloaded from the following location: https://helgeklein.com/downloads/SetACL/current/SetACL (executable version).zip

    As you can see by the URL the download comes as a compressed ZIP folder. Once downloaded, extract the folder by right-clicking and selecting Extract All. This will pop a window up as in sample image below.

    Sample Image

    Image 

    This will create a non-compressed folder of the same name. When you open this folder, you’ll see another folder of the same name.

    Open that folder and you will see two folders, 32 bit and 64 bit

    Simply open the folder that matches your System Type (i.e. whether you have a 64 bit OS or a 32 bit OS, then copy the SetACL file inside the folder and paste it into your C:\Windows\System32 folder.

    By doing this you can then use this tool anywhere within an elevated Command Prompt or with an elevated PowerShell console.

    The tool itself comes with many useful commands, but for the purposes of this article we’ll be using just two commands on each of the Registry keys identified in our Event ID 10016 Error Description.

    So, returning to the Administrator: Command Prompt window type or copy & paste the following:

    Code:
    SetACL.exe -on "HKEY_CLASSES_ROOT\CLSID\{8D8F4F83-3594-4F07-8369-FC3C3CAE4919}" -ot reg -actn setowner -ownr "n:Administrators"
    

    Press Enter key to Execute

    Code:
    SetACL.exe -on "HKEY_CLASSES_ROOT\CLSID\{8D8F4F83-3594-4F07-8369-FC3C3CAE4919}" -ot reg -actn ace -ace "n:Administrators;p:full"

    Press Enter key to execute

    Code:
    SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F72671A9-012C-4725-9D2F-2A4D32D65169}" -ot reg -actn setowner -ownr "n:Administrators"

    Press Enter key to execute

    Code:
    SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F72671A9-012C-4725-9D2F-2A4D32D65169}" -ot reg -actn ace -ace "n:Administrators;p:full"

    Press Enter key to execute

    Note: The Registry key and its path,
    for example: “HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F72671A9-012C-4725-9D2F-2A4D32D65169}”
    in the above commands should be replaced with the Registry key and path relevant to your error which you are wanting to take ownership of.

    Don’t forget to leave the speech marks in too!

    Sample Image

    Image

    You can see in above image all commands completed successfully

    Note: If you’d prefer to manually take ownership via the Registry Editor, but are not sure how, just ask in the Discussion section of this article and I’ll post instructions on how to do this.

Step 4 — Go modify the DistributedCOM component

  • If you recall earlier, the Description in our Event ID 10016 log told us we can modify the Security Permissions using the Component Services Administrative Tool.

    I posted an image of that tool opened earlier with the section we needed to use to modify things all grayed out; hence the need to take ownership of those two registry keys first.

    Now we can open this tool and make the necessary modifications.

 

  • To open the Component Services Administrative Tool by:
    • Right-clicking on Start
    • Left-clicking on Control Panel
    • Selecting to View by Large icons
    • Left-clicking on Administrative Tools
    • Left-clicking on Component Services

      This opens the following window

      Image

 

  • As you can see this is divided into three panes. Now remember we are trying to make a modification to a DistributedCOM or DCOM for short, so this is what we need to open. To do that:
    • In left pane you want to expand the Component Services until you see a list of subfolders, once of which is named DCOM Config
    • In the left pane simply left-click on DCOM Config folder
    • The middle pane will now populate with a long set of Component Services. To make it a little easier to view in the top toolbar click on View > Detail

      TIP: Now I don’t know about you but that was a lot of clicking to get to here. Here’s a tip for the future to speed things up a little:

      1. Right-click on Start and select Run
      2. In the run dialog type dcomcnfg then click OK
      3. Now just expand and click DCOM Config as before then View > Detail

      Which ever way you choose to open this the end result is:

      Image

 

  • By selecting View > Detail we can now see a list of components and their Application ID (AppID). This is useful as if you recall our Event log gave is the AppID {F72671A9-012C-4725-9D2F-2A4D32D65169} so we know this is what we want to find here.

    We also discovered via the Class ID that the CDP Activity Store was something to look out for.

    One of the common ones seen in errors like this is the Immersive Shell and if you scrolled down the list you’d soon see it there along with its AppID. However, as you’ll discover if we scroll this list looking for CDP Activity Store it is not present at all, although there is a CDP Reference Host listed.

    Could that be what we need? No, take a look at its AppID. It does not match the one we are seeking. So now what?

    Microsoft for some bizarre reason chose not to include the basic function Find with this tool so we cannot go Ctrl F and hope to search for our AppID, however, if you look at that list carefully you will see it is listed in Alphanumeric order which thank goodness will save a lot of time.

    As the component CDP ACtivity Store was not present we must now scroll to bottom of components and instead seek the AppID Registry key instead.

    And look there it is!

    Image

 

  • To modify the Security Permissions simply right-click and choose Properties

    This will open the Properties window for our AppID Registry key.

    In this window select the Security tab

    Sample Image

    Image

    As you can see its no longer grayed out. Thus we can now make the necessary modifications.

 

  • In the top panel ‘Launch and Activation Permissions’ simply:
    • Check the radio button next to Customize, then
    • Click this panels Edit button

      This will open the following:

      Image 

      If you take a look in the Group or user names field you will either see the member your error message mentioned or not.

      If you could see the member then left-click it and in the lower field you would check the Allow box next to Local Activation as that is what our error mentioned :

      The application-specific permission settings do not grant Local Activation permission …

      This same error message though also mentioned something else important:

      … to the user NT AUTHORITY\SYSTEM SID (S-1-5-18) …

      In my example this user is not listed at all and that is why the error is being triggered. So we need to add this user and grant it permissions.

 

  • To add the user click the Add button you can see in image above. This will open a new window like so:

    Image

    We need to type in the empty field our missing User which in this example is the user SYSTEM. After entering the user name we then click the Check Names button. This will underscore the user name. Now click OK

    Sample Image

    Image

 

  • Having done the above we are back to the previous window. In the top pane click on SYSTEM which you just added.
  • Now in the bottom pane place a check in the Allow box next to Local Activation

    Sample Image

    Image 

    When you’ve checked the box click OK which will close this window and return you to the Properties window.

    In the Properties window also click OK

    Now close the Component Services tool


Step 5 — Final Tidy Up

At this point if you wish you could restore permissions for the two registry keys back to their original status. In my case the CLASS ID was owned by the SYSTEM, and the AppID was owned by TrustedInstaller, so to change it back I’d enter the following commands in an elevated command prompt:

Code:
SetACL.exe -on "HKEY_CLASSES_ROOT\CLSID\{8D8F4F83-3594-4F07-8369-FC3C3CAE4919}" -ot reg -actn setowner -ownr "n:SYSTEM"
Code:
SetACL.exe -on "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{F72671A9-012C-4725-9D2F-2A4D32D65169}" -ot reg -actn setowner -ownr "n:NT SERVICE\TrustedInstaller"

After each command you press Enter key to execute

Sample Image

Image

Note: At this point if you are not intending on restarting computer, then you will need to restart the Service for these changes to take effect.

Simply press Windows key and S then type Services and press Enter key.

Scroll down and right-click the Service and select Restart

That’s it – all done!

Source: How to link a CLSID and APPID to a program – Microsoft Community

Linux Mint – Owncloud client login error

Everytime I rebooted or logged out and logged back in, it asked for my owncloud password, showing the message “Reading from keychain failed with error: ‘Could not open wallet: other; Failed to execute program org.kde.kwalletd: No such file or directory'” Of course, I am on a linux mint 19 fresh install, on cinnamon, without anything KDE related. Point is that This owncloud client need to communicate with gnome-keyring, which I had it installed. There was one missing package, called libgnome-keyring0 ( GNOME keyring services library) which after installing it, solved my problem (and owncloud’s password was automatically saved on “Passwords and Keys”, the gnome-keyring’s GUI. Double check if the package libgnome-keyring-common is also installed.

 

Quicken interchange format (QIF)

Q: What is the Quicken interchange format (QIF)?

A: The Quicken interchange format (QIF) is a specially formatted text (ASCII) file that lets you to move Quicken transactions:

  • From one Quicken account register into another Quicken account register, or
  • To/From another application that supports the QIF format.

Note: For Quicken to translate data from a text file into the Quicken register as transactions, the text file must be in the QIF format.

Required File Formatting:

  • Each transaction must end with a symbol, indicating the end of entry.
  • Each item in the transaction must display on a separate line.
  • When Quicken exports an account register or list, it adds a line to the top of the file that identifies the type of account or list. Listed below are the header lines Quicken adds to the exported files:
Header Type of data
!Type:Bank Bank account transactions
!Type:Cash Cash account transactions
!Type:CCard Credit card account transactions
!Type:Invst Investment account transactions
!Type:Oth A Asset account transactions
!Type:Oth L Liability account transactions
!Account Account list or which account follows
!Type:Cat Category list
!Type:Class Class list
!Type:Memorized Memorized transaction list

 

You can force Quicken to import all transfers, regardless of whether Ignore Transfers is selected when the file is imported. You must add a line to the file being imported into a Quicken account. Use a text editor or word processor to put the following line right after the header line at the top of the file:

!Option:AllXfr

Items for Non-Investment Accounts

Each item in a bank, cash, credit card, other liability, or other asset account must begin with a letter that indicates the field in the Quicken register. The non-split items can be in any sequence:

Field Indicator Explanation
D Date
T Amount
C Cleared status
N Num (check or reference number)
P Payee
M Memo
A Address (up to five lines; the sixth line is an optional message)
L Category (Category/Subcategory/Transfer/Class)
S Category in split (Category/Transfer/Class)
E Memo in split
$ Dollar amount of split
^ End of the entry

Note: Repeat the S, E, and $ lines as many times as needed for additional items in a split. If an item is omitted from the transaction in the QIF file, Quicken treats it as a blank item.

Items for Investment Accounts

Field Indicator Explanation
D Date
N Action
Y Security
I Price
Q Quantity (number of shares or split ratio)
T Transaction amount
C Cleared status
P Text in the first line for transfers and reminders
M Memo
O Commission
L Account for the transfer
$ Amount transferred
^ End of the entry

Items for Account Information

The account header !Account is used in two places-at the start of an account list and the start of a list of transactions to specify to which account they belong.

Field Indicator Explanation
N Name
T Type of account
D Description
L Credit limit (only for credit card accounts)
/ Statement balance date
$ Statement balance amount
^ End of entry

Items for a Category List

Field Indicator Explanation
N Category name:subcategory name
D Description
T Tax related if included, not tax related if omitted
I Income category
E Expense category (if category type is unspecified, quicken assumes expense type)
B Budget amount (only in a Budget Amounts QIF file)
R Tax schedule information
^ End of entry

Items for a Class List

Field Indicator Explanation
N Class name
D Description
^ End of entry

Items for a Memorized Transaction List

Immediately preceding the ^ character, each entry must end with one of the following file indicators to specify the transaction type.

  • KC
  • KD
  • KP
  • KI
  • KE

With that exception, memorized transaction entries have the same format as regular transaction entries (non-investment accounts). However, the Date or Num field is included. All items are optional, but if an amortization record is included, all seven amortization lines must also be included.

Field Indicator Explanation
KC Check transaction
KD Deposit transaction
KP Payment transaction
KI Investment transaction
KE Electronic payee transaction
T Amount
C Cleared status
P Payee
M Memo
A Address
L Category or Transfer/Class
S Category/class in split
E Memo in split
$ Dollar amount of split
1 Amortization: First payment date
2 Amortization: Total years for loan
3 Amortization: Number of payments already made
4 Amortization: Number of periods per year
5 Amortization: Interest rate
6 Amortization: Current loan balance
7 Amortization: Original loan amount
^ End of entry

 

Examples of QIF files

Normal Transactions Example

Transaction Item Comment (not in file)
!Type:Bank Header
D6/ 1/94 Date
T-1,000.00 Amount
N1005 Check number
PBank Of Mortgage Payee
L[linda] Category
S[linda] First category in split
$-253.64 First amount in split
SMort Int Second category in split
$-746.36 Second amount in split
^ End of the transaction
D6/ 2/94 Date
T75.00 Amount
PDeposit Payee
^ End of the transaction
D6/ 3/94 Date
T-10.00 Amount
PJoBob Biggs Payee
MJ.B. gets bucks Memo
LEntertain Category
A1010 Rodeo Dr. Address (line 1)
AWaco, Tx Address (line 2)
A80505 Address (line 3)
A Address (line 4)
A Address (line 5)
A Address (line 6)
^ End of the transaction

 

Investment Example

Transaction Item Comment (not in file)
!Type:Invst Header line
D8/25/93 Date
NShrsIn Action (optional)
Yibm4 Security
I11.260 Price
Q88.81 Quantity
CX Cleared Status
T1,000.00 Amount
MOpening Balance Memo
^ End of the transaction
D8/25/93 Date
NBuyX Action
Yibm4 Security
I11.030 Price
Q9.066 Quantity
T100.00 Amount
MEst. price as of 8/25/93 Memo
L[CHECKING] Account for transfer
$100.00 Amount transferred
^ End of the transaction

 

Memorized List Example

Transaction Item Comment (not in file)
!Type:Memorized Header line
T-50.00 Amount
PJoe Hayes Payee
MRent Memo
KC Check transaction
^ End of the transaction
T-25.00 Amount
T-25.00 Company Payee
LTelephone Category
KP Payment transaction
^ End of the transaction

What to Expect When Expecting Content Security Policy Reports

Content Security Policy (CSP) allows you to dictate a policy for content restrictions on a web site that is enforced by the browser. By setting a CSP header, can control the resources that are loaded when a visitor is viewing your website. The CSP spec allows you to build very specific policies for your site that can handle all of the different types of resources that a site might load. It is a valuable tool for protecting your site visitors.

In addition to blocking resources that violate the defined CSP, the CSP spec details a mechanism for sending reports of such violations. Monitoring these violations can help you ensure that your site is never serving content that violates your wishes whether those violations are the result of producer, developer, or hacker actions.

Source: What to Expect When Expecting Content Security Policy Reports