PCB inspection system

What is the conventional lighting used for PCB inspection system. I tried a linear led bar on 4 sides with a tilt, but am not satisfied with the result. Can you guys suggest me suitable lighting?


Tags: NI Hardware

Similar Questions

  • I get an error message saying that the "Microsoft Network Inspection System" has stopped working and it is closed. What does that mean?

    Microsoft network inspection system has stopped working and closes. What this means, and is there a solution?

    original title: NIS has stopped working

    Hi Travispersons,

    You can read the following article and see if it helps.

    Install the latest Microsoft Security Essentials definition updates

    Hope this information is useful.

  • Microsoft Network Inspection System no longer works

    I use Windows Vista Business

    Can someone explain to me wht that is and how to solve it. He gets up and tells me that microsoft is looking for an answer

    Goryon

    I would ignore for now... This is what I'm doing and MSE works on my XP and Vista computers.  I hope that this "glitch" will be fixed by the next
    "Patch Tuesday" if not before.

    http://answers.Microsoft.com/en-us/protect/Forum/protect_updating/Microsoft-network-inspection-system-has-stopped/6b0023ae-9b20-4080-9163-462b2d7ed108

    I received this notification 'window' for several days during the daily automatic update of MSE, but I stop receiving without any intervention on my part (although I did uninstall and reinstall MSE).

    You could follow the thread above or the MSE Forum for more information.

  • water level inspection system

    I want to put in place a water level control system, but I want to produce a material too...

    Anybodys, who got this kind of experiences, please share with me...

    I appreciate all your guidelines. Looking forward to your answer with impatience.

    Thank you very much.

    Very simple: use a toilet tank level control and add a potentiometer, ok, use the potentiometer (it is advisable to use a more protected ;-) and replace the button with a peace of aluminum with an old tennisball at the end use (10kOhm) potentiometer as a voltage divider (a leg (CW) forever, CCW to Vcc (5V) and tap to Analog in))

    If the water level is regularly down, take a look how to use devices of modern laundry: they use a pressure with a pipe of air filled sensor.

    A fit to be dropped in the water absolutely pressure sensor is lovely.

    However: The water and electricity don't mix well, so take care what you do. If humans can touch the water, all devices must meet strict isolation class. Normally a PC card entries are not them!

  • Message by saying,"Network Inspection System has stopped working and the program was closed. »

    I backed up my pc, I've defragmented, I tried to create a restore point that was earlier with no luck. I love my Inspiron, but I am concerned about the speed and the freeze ups. This problem has stopped my Internet pages. Grrrr, DR PC?

    Hello

    I suggest you to follow these steps and check if that helps:

    Method 1:
    Try to run the scan for viruses online on the computer and check if it helps:
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    Method 2:
    Try to perform the clean boot and check if it helps:
    http://support.Microsoft.com/kb/929135

    NOTE: When you are finished troubleshooting, make sure that restore you the computer mode normal startup such as suggested in step 7 of the above article.

    It will be useful.

  • Traffic generated by router IOS inspect IPv6

    I try to configure the IPv6 packets on a router 2911 deep inspection (IOS 15.1 (2) T5) but I'm not able to inspect the traffic generated by router. It is not an option "ipv6 inspect name xxxx udp router-traffic' as in IPv4. So I am unable to ping to the router to a remote host.

    I could solve the problem of ping by simply adding a "permit any any icmp echo response" on my ACL, but I still can't access TCP or UDP based services (DNS, HTTP,...).

    Anyone knows if it is possible to activate the traffic generated by IPv6 router, or is there another solution for this problem? If so, how can I do that?

    Partial configuration:

    ipv6 unicast-routing
    
    ipv6 inspect name SPI_DIALER1_OUT tcpipv6 inspect name SPI_DIALER1_OUT udpipv6 inspect name SPI_DIALER1_OUT icmpipv6 inspect name SPI_DIALER1_OUT ftp
    interface Dialer1 ipv6 inspect SPI_DIALER1_OUT out ipv6 traffic-filter acl6_dialer1_in in
    ipv6 access-list acl6_dialer1_in sequence 10 permit icmp any any nd-ns sequence 20 permit icmp any any nd-na sequence 30 permit icmp any any router-advertisement sequence 40 permit icmp any any echo-reply deny ipv6 any any log

    Former Cisco's IOS 'inspect' system has indeed been deprecated.  You should use zone based firewall now.

    Here is the guide for the care of the IPv6 zone based firewall.

    http://www.Cisco.com/c/en/us/TD/docs/iOS-XML/iOS/sec_data_zbf/configuration/XE-3s/sec-data-ZBF-XE-book/sec-ZBF-IPv6.html

    If you want to go at a faster speed for the area based ipv4 firewall, try to use my Config Wizard and copy the bits you need.

    http://www.IFM.NET.nz/cookbooks/890-ISR-Wizard.html

  • No internet access through VPN

    Hi, I have the router Cisco 881 (MPC8300) with c880data-universalk9 - mz.153 - 3.M4.bin when users establish a VPN connection to the corporate network, had access to all the resources but no internet access, please help me what else I need to configure to achieve my goal. I don't want to split the tunnel, internet via VPN, users must have. In my opinion, I have put an additional configuration for NAT, but my router not recognize u-Turn and NAT commands on the object on the network.

    My config:

    Building configuration...

    Current configuration: 13562 bytes
    !
    ! Last configuration change at 09:52:38 PCTime Saturday, May 16, 2015, by admin
    version 15.3
    no service button
    horodateurs service debug datetime msec
    Log service timestamps datetime msec
    no password encryption service
    !
    XXX host name
    !
    boot-start-marker
    start the flash system: c880data-universalk9 - mz.153 - 3.M4.bin
    boot-end-marker
    !
    !
    logging buffered 51200 warnings
    !
    AAA new-model
    !
    !
    AAA authentication login default local
    AAA authentication login ciscocp_vpn_xauth_ml_1 local
    AAA authentication login ciscocp_vpn_xauth_ml_2 local
    AAA authorization exec default local
    AAA authorization ciscocp_vpn_group_ml_1 LAN
    AAA authorization ciscocp_vpn_group_ml_2 LAN
    !
    !
    !
    !
    !
    AAA - the id of the joint session
    iomem 10 memory size
    clock timezone PCTime 1 0
    PCTime of summer time clock day March 30, 2003 02:00 October 26, 2003 03:00
    !
    Crypto pki trustpoint TP-self-signed-1751279470
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 1751279470
    revocation checking no
    rsakeypair TP-self-signed-1751279470
    !
    !
    TP-self-signed-1751279470 crypto pki certificate chain
    certificate self-signed 01
    XXXX
    !
    !
    Protocol-IP port-map user - 2 tcp 8443 port
    user-Protocol IP port-map - 1 tcp 3389 port
    !

    !
    !
    !
    IP domain name dmn.local
    8.8.8.8 IP name-server
    IP-server names 8.8.4.4
    IP cef
    No ipv6 cef
    !
    !
    license udi pid CISCO881-K9 sn FCZ174992C8
    !
    !
    username privilege 15 secret 5 xxxx xxxx
    username secret VPNUSER 5 xxxx
    !
    !
    !
    !
    !
    !
    type of class-card inspect sdm-nat-user-protocol--2-1 correspondence
    game group-access 105
    corresponds to the user-Protocol - 2
    type of class-card inspect entire game SDM_AH
    match the name of group-access SDM_AH
    type of class-card inspect entire game PAC-skinny-inspect
    Skinny Protocol game
    type of class-card inspect entire game SDM_IP
    match the name of group-access SDM_IP
    type of class-card inspect entire game PAC-h323nxg-inspect
    match Protocol h323-nxg
    type of class-card inspect entire game PAC-cls-icmp-access
    match icmp Protocol
    tcp protocol match
    udp Protocol game
    type of class-card inspect entire game PAC-h225ras-inspect
    match Protocol h225ras
    type of class-card inspect entire game SDM_ESP
    match the name of group-access SDM_ESP
    type of class-card inspect entire game PAC-h323annexe-inspect
    match Protocol h323-annex
    type of class-card inspect entire game PAC-cls-insp-traffic
    match Protocol pptp
    dns protocol game
    ftp protocol game
    https protocol game
    match icmp Protocol
    match the imap Protocol
    pop3 Protocol game
    netshow Protocol game
    Protocol shell game
    match Protocol realmedia
    match rtsp Protocol
    smtp Protocol game
    sql-net Protocol game
    streamworks Protocol game
    tftp Protocol game
    vdolive Protocol game
    tcp protocol match
    udp Protocol game
    type of class-card inspect the correspondence SDM_GRE
    match the name of group-access SDM_GRE
    type of class-card inspect entire game PAC-h323-inspect
    h323 Protocol game
    type of class-card inspect correspondence ccp-invalid-src
    game group-access 103
    type of class-card inspect entire game PAC-sip-inspect
    sip protocol game
    type of class-card inspect correspondence sdm-nat-https-1
    game group-access 104
    https protocol game
    type of class-card inspect all match mysql
    match the mysql Protocol
    type of class-card inspect correspondence ccp-Protocol-http
    http protocol game
    type of class-card inspect entire game CCP_PPTP
    corresponds to the SDM_GRE class-map
    inspect the class-map match PAC-insp-traffic type
    corresponds to the class-map PAC-cls-insp-traffic
    type of class-card inspect entire game SDM_EASY_VPN_SERVER_TRAFFIC
    match Protocol isakmp
    match Protocol ipsec-msft
    corresponds to the SDM_AH class-map
    corresponds to the SDM_ESP class-map
    type of class-card inspect correspondence ccp-icmp-access
    corresponds to the class-ccp-cls-icmp-access card
    type of class-card inspect the correspondence SDM_EASY_VPN_SERVER_PT
    corresponds to the SDM_EASY_VPN_SERVER_TRAFFIC class-map
    !
    type of policy-map inspect PCB - inspect
    class type inspect PCB-invalid-src
    Drop newspaper
    class type inspect mysql
    inspect
    class type inspect PCB-Protocol-http
    inspect
    class type inspect PCB-insp-traffic
    inspect
    class type inspect PCB-sip-inspect
    inspect
    class type inspect PCB-h323-inspect
    inspect
    class type inspect ccp-h323annexe-inspect
    inspect
    class type inspect ccp-h225ras-inspect
    inspect
    class type inspect ccp-h323nxg-inspect
    inspect
    class type inspect PCB-skinny-inspect
    inspect
    class class by default
    drop
    type of policy-card inspect sdm-license-ip
    class type inspect SDM_IP
    Pass
    class class by default
    Drop newspaper
    type of policy-card inspect sdm-pol-NATOutsideToInside-1
    class type inspect sdm-nat-https-1
    inspect
    class type inspect sdm-nat-user-protocol--2-1
    inspect
    class type inspect CCP_PPTP
    Pass
    class class by default
    Drop newspaper
    type of policy-card inspect PCB-enabled
    class type inspect SDM_EASY_VPN_SERVER_PT
    Pass
    class class by default
    drop
    type of policy-card inspect PCB-permits-icmpreply
    class type inspect PCB-icmp-access
    inspect
    class class by default
    Pass
    !
    safety zone-to-zone
    security of the area outside the area
    ezvpn-safe area of zone
    zone-pair security PAC-zp-self-out source destination outside zone auto
    type of service-strategy inspect PCB-permits-icmpreply
    zone-pair security PAC-zp-in-out source in the area of destination outside the area
    type of service-strategy inspect PCB - inspect
    source of PAC-zp-out-auto security area outside zone destination auto pair
    type of service-strategy inspect PCB-enabled
    sdm-zp-NATOutsideToInside-1 zone-pair security source outside the area of destination in the area
    type of service-strategy inspect sdm-pol-NATOutsideToInside-1
    in the destination box source sdm-zp-in-ezvpn1 ezvpn-pairs area security
    type of service-strategy inspect sdm-license-ip
    source of sdm-zp-out-ezpn1 of security area outside zone ezvpn-zone time pair of destination
    type of service-strategy inspect sdm-license-ip
    safety zone-pair sdm-zp-ezvpn-out1-source ezvpn-zone of destination outside the area
    type of service-strategy inspect sdm-license-ip
    safety zone-pair source sdm-zp-ezvpn-in1 ezvpn-area destination in the area
    type of service-strategy inspect sdm-license-ip
    !
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 2
    BA aes 256
    preshared authentication
    Group 2
    !
    Configuration group customer crypto isakmp Domena
    key XXXXXX
    DNS 192.168.1.2
    Dmn.local field
    pool SDM_POOL_1
    Save-password
    Max-users 90
    netmask 255.255.255.0
    banner ^ Cwelcome ^ C
    ISAKMP crypto ciscocp-ike-profile-1 profile
    match of group identity Domena
    client authentication list ciscocp_vpn_xauth_ml_2
    ISAKMP authorization list ciscocp_vpn_group_ml_2
    client configuration address respond
    virtual-model 1
    !
    !
    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac ESP_AES-256_SHA
    tunnel mode
    !
    Profile of crypto ipsec CiscoCP_Profile1
    game of transformation-ESP_AES-256_SHA
    set of isakmp - profile ciscocp-ike-profile-1
    !
    !
    !
    !
    !
    !
    !
    interface Loopback0
    IP 192.168.9.1 255.255.255.0
    !
    interface FastEthernet0
    no ip address
    !
    interface FastEthernet1
    no ip address
    !
    interface FastEthernet2
    no ip address
    !
    interface FastEthernet3
    no ip address
    !
    interface FastEthernet4
    Description $ETH - WAN$ $FW_OUTSIDE$
    IP x.x.x.x 255.255.255.248
    NAT outside IP
    IP virtual-reassembly in
    outside the area of security of Member's area
    automatic duplex
    automatic speed
    !
    type of interface virtual-Template1 tunnel
    IP unnumbered Loopback0
    ezvpn-safe area of Member's area
    ipv4 ipsec tunnel mode
    Tunnel CiscoCP_Profile1 ipsec protection profile
    !
    interface Vlan1
    Description $ETH_LAN$ $FW_INSIDE$
    IP 192.168.1.1 255.255.255.0
    IP access-group 100 to
    IP nat inside
    IP virtual-reassembly in
    Security members in the box area
    IP tcp adjust-mss 1452
    !
    local IP SDM_POOL_1 192.168.10.10 pool 192.168.10.100
    IP forward-Protocol ND
    IP http server
    23 class IP http access
    local IP http authentication
    IP http secure server
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    The dns server IP
    IP nat inside source list 3 interface FastEthernet4 overload
    IP nat inside source static tcp 192.168.1.3 interface FastEthernet4 443 443
    IP nat inside source static tcp 192.168.1.2 8443 interface FastEthernet4 8443
    IP route 0.0.0.0 0.0.0.0 X.x.x.x
    !
    SDM_AH extended IP access list
    Note the category CCP_ACL = 1
    allow a whole ahp
    SDM_ESP extended IP access list
    Note the category CCP_ACL = 1
    allow an esp
    SDM_GRE extended IP access list
    Note the category CCP_ACL = 1
    allow a gre
    SDM_IP extended IP access list
    Note the category CCP_ACL = 1
    allow an ip
    !
    not run cdp
    !
    Note access-list 3 INSIDE_IF = Vlan1
    Note CCP_ACL category in the list to access 3 = 2
    access-list 3 Let 192.168.1.0 0.0.0.255
    Note access-list 23 category CCP_ACL = 17
    access-list 23 permit 192.168.1.0 0.0.0.255
    access-list 23 allow 10.10.10.0 0.0.0.7
    Note access-list 100 Auto generated by SDM management access feature
    Note access-list 100 category CCP_ACL = 1
    access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq 22
    access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq www
    access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq 443
    access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq cmd
    access-list 100 tcp refuse any host 192.168.1.1 eq telnet
    access-list 100 tcp refuse any host 192.168.1.1 eq 22
    access-list 100 tcp refuse any host 192.168.1.1 eq www
    access-list 100 tcp refuse any host 192.168.1.1 eq 443
    access-list 100 tcp refuse any host 192.168.1.1 eq cmd
    access-list 100 deny udp any host 192.168.1.1 eq snmp
    access ip-list 100 permit a whole
    Note access-list 101 category CCP_ACL = 1
    access-list 101 permit ip 192.168.1.0 0.0.0.255 any
    Note access-list 102 CCP_ACL category = 1
    access-list 102 permit ip 192.168.1.0 0.0.0.255 any
    Note access-list 103 CCP_ACL category = 128
    access-list 103 allow the ip 255.255.255.255 host everything
    access-list 103 allow ip 127.0.0.0 0.255.255.255 everything
    access-list 103 allow ip 93.179.203.160 0.0.0.7 everything
    Note 104 CCP_ACL category = 0 access-list
    IP access-list 104 allow any host 192.168.1.3
    Note access-list 105 CCP_ACL category = 0
    IP access-list 105 allow any host 192.168.1.2

    -----------------------------------------------------------------------
    ^ C
    !
    Line con 0
    no activation of the modem
    line to 0
    line vty 0 4
    access-class 102 in
    transport input telnet ssh
    line vty 5 15
    access class 101 in
    transport input telnet ssh
    !
    !
    end

    I'd be grateful for help

    concerning

    Hello

    Enter the subnet pool VPN to access-list 3 for source NAT

    You may need to check the firewall also rules to allow the connection based on areas you

    HTH,

    Averroès

  • Calendar in dock not updated to the date of the day after El Capitan updated to v10.11.5

    El Capitan, updated in version 10.11.5 May 25, 2016, now the calendar in the dock is not updated to the current date, everyone had it?, how he was healed?

    See you soon

    Bill Edge

    What happens when you inspect system preferences > Date & time?

    • The correct time and Date displayed here?
    • Your time zone is correctly indicated?
  • Windows Update crashes to install malicious software update 20 of 23

    I was working on a computer, Windows XP Home Edition for a friend who was infected malware and had not been turned on since December.  I removed 135 malware and then decided to do the Windows updates.  Initially, he could get an IP address even when I put a static... I did some research and followed the instructions to recover from deformation of Winsock2.   Then I got on the Internet to make the updates of Windows.

    It hung for more than 3 hours on software update 20 malicious 23... I didn't write any extra info - sorry.  I said to cancel updates and went back to bed. 4 hours later he said always Cancel updated so I hard booted the computer.  I couldn't bring up the Task Manager, nothing would happen.

    Now when you click on a user, it hangs on loading personal settings or it go to the desktop, but you cannot open Internet Explorer or run programs.  You can click on start running, but if you type a command (cmd, regedit, msconfig) and click OK nothing happens.  If you try to restart in Mode safe mode using F8, and then select Safe Mode it will get as many load windowss\system32\drivers\agp440.sys, then he tells you the computer wasn't shutdown correctly and ask you to select the Mode.  I tried the Safe Mode, Safe Mode with network, Safe Mode command prompt, and I still can't mode without failure.   I also tried the last good known Configuration and that doesn't work anymore.

    Finally I put a Windows XP Home CD into the CD player and I got it to boot from the CD Rom it says its inspection system for quite a long time and then it asks you to insert the Windows XP Home Service Pack 1 disc (that's all I had) CD and press.  I hit enter and I'm in a loop.

    I can also do a start, stop, or restart, it just sits there.  I have to restart from the CPU.

    Any ideas where I'm going from here?

    I was working on a Windows XP Home computer for a friend who was malware infected had been turned on [no not updated] since December...

    See...

    Cleaning a compromised system
         http://TechNet.Microsoft.com/en-us/library/cc700813.aspx

    Personal data backup (which none should be considered 100% reliable at this point) then format the HARD disk and do a clean install of Windows. Please note that a repair installation (upgrade AKA on-site) will NOT fix it!

    HOW to do a clean install of Windows XP: see method 1 and http://michaelstevenstech.com/cleanxpinstall.html#steps in http://support.microsoft.com/kb/978307

    Once installed the clean, you will have the equivalent of a "new computer" in order to take care of everything on the next page before connecting the machine to the internet or one local network (i.e. other computers) otherwise and before using a flash drive or the SD card that is not brand new, or has not been freshly formatted:

    4 steps to help protect your new computer before going online
         http://www.Microsoft.com/security/pypc.aspx

    Other useful references include:

    HOW to get a computer that is running Windows XP Gold (no Service Pack) fully patched (after a clean install)
    http://groups.Google.com/group/Microsoft.public.windowsupdate/MSG/3f5afa8ed33e121c

    HOW TO get a computer that is running Windows XP SP1 (a) or SP2 fully patched (after a clean install)
    http://groups.Google.com/group/Microsoft.public.WindowsXP.General/MSG/a066ae41add7dd2b

    Tip: After getting the computer fully patched, download/install KB971029 manually:http://support.microsoft.com/kb/971029

    NB: No matter what Norton or McAfee free trial which is preinstalled on the computer when you bought will be reinstalled (but invalid) when Windows is reinstalled. You MUST uninstall the trial for free and download/run the removal tool before installing updates, Windows Service Packs, or updates IE and before installing your new anti-virus application (which will require WinXP SP3 must be installed).

    Norton Removal Tool
         FTP://ftp.Symantec.com/public/english_us_canada/removal_tools/Norton_Removal_Tool.exe

    McAfee Consumer product removal tool
         http://download.McAfee.com/Products/Licensed/cust_support_patches/MCPR.exe

    See also:

    Risks & benefits of P2P file sharing
    http://www.Microsoft.com/protect/data/downloadfileshare/filesharing.aspx
    http://blogs.technet.com/MMPC/archive/2008/10/06/the-cost-of-free-software.aspx

    Measures to help prevent spyware
    http://www.Microsoft.com/security/spyware/prevent.aspx

    Measures to help prevent computer worms
    http://www.Microsoft.com/security/worms/prevent.aspx

    Avoid fake security software!
    http://www.Microsoft.com/security/antivirus/rogue.aspx

    If you need help, please start a new thread in this forum:

    http://social.answers.Microsoft.com/forums/en-us/XPRepair/threads

    Good luck!

    ~ Robear Dyer (PA Bear) ~ MS MVP (that is to say, mail, security, Windows & Update Services) since 2002 ~ WARNING: MS MVPs represent or work for Microsoft

  • Some camera time (IEEE1394) is disconnected

    Hi all

    I work with two inspection systems. Sometime when I start it up, the camera systems to disconnect! And in Device Manager it shows Yellew peripheral (ex driver not found)

    Once I update the driver in MAX, Application restarts.

    Rgds...

    Prakash Mahar

    Hello Prakash,

    • This problem occurs when you boot your system after loading windows (restart or previously have been stop)?
    • Do you use optimization tools to Windows (which corrects registry etc?)
    • Keep your windows up to date?
  • XBox 360 can not find the PC on the network

    I have a home network with a PC (XP with Media Player 11 and Norton Internet Security), a laptop (running Vista) and XBox360; everything wireless. So far the XBox has recorded and consulted laptops and PCs and I have posted the images and plays music both through XBox. Now Xbox just says "PC not listed" and told me that there is a connection problem.

    The PC and laptop share OK on the network.

    I checked the Media Player is set to share media - and XBox is listed with laptop and checked for share with default settings - all types of media.

    XBox support guy cycled through all its annd options finally said that it must be a problem with the PC firewall.
    Uninstalled Norton Norton support guy and still the same problem then he convinced it is not a firewall issue...
    (A friend suggested a router problem, but one) has not changed since the last worker b) the laptop are always accessible from the XBox by the same router. (XBox Live is also OK through router)

    It is now "make my head!" Can anyone suggest anything please?

    Just so that people can know, I solved my problem after this steps: 1) install TVersity) 2 open Microsoft Security Essentials, on tab disable, real-time Protection, Network Inspection System settings 3) go to Xbox > system settings > network > Ethernet > test the PC connection.

    In so doing my Xbox could detect my phone.
  • Problem of deletion of an unknown fplder in Viata hp

    There is a folder on my system, I do not remember having seen it before.  It has a long file name [57a3778b52d94474f0f075b9ae548d7d] and contains the following files:

    $shtdwn$ .req
    gapaengine.dll
    mpsigstub.exe
    NISbase. VDM
    nisfull. VDM

    Even with administrator privileges, I am unable to delete this folder.  I wonder if the NIS refers to Norton Internet Security, except that the app is not installed on my system.

    Maybe if I log-in mode safe?  But don't know how to do this.

    Clues to the contents of this folder etc?

    Thnx and happy holidays.

    They are updated from Microsoft which should have been deleted after a successful installation. Try running Disk Cleanup. Start, all programs, accessories. System Tools.

    $shtdwn$ .req
    http://www.mitchellenright.com/2012/03/16/solved-Mrtstub-exe-is-not-malware-or-virus-and-you-may-delete-it-safely/

    What is gapaengine.dll and this file is safe?
    http://www.processdatabase.org/gapaengine-DLL.html
    Description of the file: dynamic engine GAPA
    Product name: Microsoft Network Inspection System
    Legal name: Microsoft (R) Corporation

    MpSigStub.exe file information
    The process called heel of updated Microsoft Malware Protection Signature belongs to the software Microsoft Malware Protection from Microsoft (www.microsoft.com).
    http://www.file.NET/process/mpsigstub.exe.html

    NISbase. VDM is part of Microsoft Malware Protection and put developed by Microsoft Corporation
    http://www.FreeFixer.com/library/file/81751/

  • SE error message: Windows/program has stopped working

    Hi... I thank u a lot for your answers
    I'm sorry to tell u I have not any use with your suggestions/answers
    I tried all the things u said but but problem is as usual. I waited these days here a lot to check all these problems
    I tried sfc/scannow , it has not detected errors, as I tried all the given u, but I had the same problems

    am problems getting its has stopped working
    ex:
    1. microsoft inspection system has stopped working and was closed
    2 drivers to windows setup has stopped working
    3 Explorer has stopped working
    like this ETC...

    Hello

    Method 1: I would say you can try the steps in the link and check if it solves the problem:

    http://support.Microsoft.com/kb/937093

    Method 2: You can also run the Microsoft safety scanner to ensure that the system is free of infection by the virus:

    http://www.Microsoft.com/security/scanner/en-us/default.aspx

  • Why does VSSVC.exe run every day?

    Out & about once every few days VSSVC.exe & TrustedInstaller.exe will start running. It usually takes only 30-50% of my CPU unless I'm doing something else at the same time. As a result, I find generally that, under 'System Restore', a new restore point has been created. I also found what is VSSVC.exe & that this probably meant that my computer had a 'system' update & so was do a restore point for that. I'm assuming that "System updates" are different from "Windows Updates" since I was those value only notify & never automatically download or install. In addition, I did have a "Windows Update" in a few days which also proves that it is something different. A few minutes ago VSSVC.exe started running again with TrustedInstaller.exe & took a few minutes to finish as usual. However, while they inspected "System Restore" I found that the last created restore point was about 3 days ago, even though these two process turned a few minutes ago. So now, I have a few questions I need to answer.

    1: What are the "system updates"?

    2: If in fact they are the same that "Windows Updates" that are normally downloaded & installed, why am I not notified of them in advance?

    3: can I plan "system updates"?

    4: can I plan when the System Restore Points that are created from VSSVC.exe?

    5: If all my current assumptions are bad, what in fact is happening really?

    On a final note, I should mention that I have indeed update my Microsoft Security Essentials every day. Although VSSVC.exe is not following this model is why this whole situation left me speechless. I perform analyses of viruses once a week who are always clean, apart from the question I mentioned that my computer runs great.

    As mentioned it is part of the snapshot service that is used by restoring the system as well as protection of system files and the "previous file" feature.

    Restore points are created automatically when changes to the system.

  • Establish a IPsec VPN connection, but remote site can't ping main office

    Hi, I set up connection from site to site IPsec VPN between cisco 892 (main site) router and linksys router wrv210 (remote site). My problem is that I can ping network router wrv210 lan of my main office where is cisco 892 router, but I cannot ping the main site of linksys wrv210 lan (my remote site).

    My configuration on the cisco 892 router:

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-1

    game group-access 103

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-3

    game group-access 106

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-2

    game group-access 105

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-5

    game group-access 108

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-4

    game group-access 107

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-7

    group-access 110 match

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-6

    game group-access 109

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-9

    game group-access 112

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-8

    game group-access 111

    type of class-card inspect entire game SDM_AH

    match the name of group-access SDM_AH

    type of class-card inspect entire game SDM_ESP

    match the name of group-access SDM_ESP

    type of class-card inspect entire game SDM_VPN_TRAFFIC

    match Protocol isakmp

    match Protocol ipsec-msft

    corresponds to the SDM_AH class-map

    corresponds to the SDM_ESP class-map

    type of class-card inspect the correspondence SDM_VPN_PT

    game group-access 102

    corresponds to the SDM_VPN_TRAFFIC class-map

    type of class-card inspect entire game PAC-cls-insp-traffic

    match Protocol cuseeme

    dns protocol game

    ftp protocol game

    h323 Protocol game

    https protocol game

    match icmp Protocol

    match the imap Protocol

    pop3 Protocol game

    netshow Protocol game

    Protocol shell game

    match Protocol realmedia

    match rtsp Protocol

    smtp Protocol game

    sql-net Protocol game

    streamworks Protocol game

    tftp Protocol game

    vdolive Protocol game

    tcp protocol match

    udp Protocol game

    inspect the class-map match PAC-insp-traffic type

    corresponds to the class-map PAC-cls-insp-traffic

    type of class-card inspect correspondence sdm-cls-VPNOutsideToInside-10

    game group-access 113

    type of class-card inspect all sdm-service-ccp-inspect-1 game

    http protocol game

    https protocol game

    type of class-card inspect entire game PAC-cls-icmp-access

    match icmp Protocol

    tcp protocol match

    udp Protocol game

    type of class-card inspect correspondence ccp-invalid-src

    game group-access 100

    type of class-card inspect correspondence ccp-icmp-access

    corresponds to the class-ccp-cls-icmp-access card

    type of class-card inspect correspondence ccp-Protocol-http

    match class-map sdm-service-ccp-inspect-1

    !

    !

    type of policy-card inspect PCB-permits-icmpreply

    class type inspect PCB-icmp-access

    inspect

    class class by default

    Pass

    type of policy-card inspect sdm-pol-VPNOutsideToInside-1

    class type inspect sdm-cls-VPNOutsideToInside-1

    inspect

    class type inspect sdm-cls-VPNOutsideToInside-2

    Pass

    class type inspect sdm-cls-VPNOutsideToInside-3

    Pass

    class type inspect sdm-cls-VPNOutsideToInside-4

    Pass

    class type inspect sdm-cls-VPNOutsideToInside-5

    Pass

    class type inspect sdm-cls-VPNOutsideToInside-6

    inspect

    class type inspect sdm-cls-VPNOutsideToInside-7

    Pass

    class type inspect sdm-cls-VPNOutsideToInside-8

    Pass

    class type inspect sdm-cls-VPNOutsideToInside-9

    inspect

    class type inspect sdm-cls-VPNOutsideToInside-10

    Pass

    class class by default

    drop

    type of policy-map inspect PCB - inspect

    class type inspect PCB-invalid-src

    Drop newspaper

    class type inspect PCB-Protocol-http

    inspect

    class type inspect PCB-insp-traffic

    inspect

    class class by default

    drop

    type of policy-card inspect PCB-enabled

    class type inspect SDM_VPN_PT

    Pass

    class class by default

    drop

    !

    security of the area outside the area

    safety zone-to-zone

    zone-pair security PAC-zp-self-out source destination outside zone auto

    type of service-strategy inspect PCB-permits-icmpreply

    zone-pair security PAC-zp-in-out source in the area of destination outside the area

    type of service-strategy inspect PCB - inspect

    source of PAC-zp-out-auto security area outside zone destination auto pair

    type of service-strategy inspect PCB-enabled

    sdm-zp-VPNOutsideToInside-1 zone-pair security source outside the area of destination in the area

    type of service-strategy inspect sdm-pol-VPNOutsideToInside-1

    !

    !

    crypto ISAKMP policy 1

    BA 3des

    md5 hash

    preshared authentication

    Group 2

    lifetime 28800

    ISAKMP crypto key address 83.xx.xx.50 xxxxxxxxxxx

    !

    !

    Crypto ipsec transform-set ESP-3DES esp-3des esp-md5-hmac

    !

    map SDM_CMAP_1 1 ipsec-isakmp crypto

    Description NY_NJ

    the value of 83.xx.xx.50 peer

    game of transformation-ESP-3DES

    match address 101

    !

    !

    !

    !

    !

    interface BRI0

    no ip address

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    penetration of the IP stream

    encapsulation hdlc

    Shutdown

    Multidrop ISDN endpoint

    !

    !

    interface FastEthernet0

    !

    !

    interface FastEthernet1

    !

    !

    interface FastEthernet2

    !

    !

    interface FastEthernet3

    !

    !

    interface FastEthernet4

    !

    !

    interface FastEthernet5

    !

    !

    FastEthernet6 interface

    !

    !

    interface FastEthernet7

    !

    !

    interface FastEthernet8

    no ip address

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    penetration of the IP stream

    automatic duplex

    automatic speed

    !

    !

    interface GigabitEthernet0

    Description $ES_WAN$ $FW_OUTSIDE$

    IP address 89.xx.xx.4 255.255.255.xx

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    penetration of the IP stream

    NAT outside IP

    IP virtual-reassembly

    outside the area of security of Member's area

    automatic duplex

    automatic speed

    map SDM_CMAP_1 crypto

    !

    !

    interface Vlan1

    Description $ETH - SW - LAUNCH INTF-INFO-FE 1 to $$$ $ES_LAN$ $FW_INSIDE$

    IP 192.168.0.253 255.255.255.0

    no ip redirection

    no ip unreachable

    no ip proxy-arp

    penetration of the IP stream

    IP nat inside

    IP virtual-reassembly

    Security members in the box area

    IP tcp adjust-mss 1452

    !

    !

    IP forward-Protocol ND

    IP http server

    local IP http authentication

    IP http secure server

    IP http timeout policy slowed down 60 life 86400 request 10000

    !

    !

    IP nat inside source overload map route SDM_RMAP_1 interface GigabitEthernet0

    IP route 0.0.0.0 0.0.0.0 89.xx.xx.1

    !

    SDM_AH extended IP access list

    Note the category CCP_ACL = 1

    allow a whole ahp

    SDM_ESP extended IP access list

    Note the category CCP_ACL = 1

    allow an esp

    !

    recording of debug trap

    Note access-list 1 INSIDE_IF = Vlan1

    Note category of access list 1 = 2 CCP_ACL

    access-list 1 permit 192.168.0.0 0.0.0.255

    Access-list 100 category CCP_ACL = 128 note

    access-list 100 permit ip 255.255.255.255 host everything

    access-list 100 permit ip 127.0.0.0 0.255.255.255 everything

    access-list 100 permit ip 89.xx.xx.0 0.0.0.7 everything

    Note access-list 101 category CCP_ACL = 4

    Note access-list 101 IPSec rule

    access-list 101 permit ip 192.168.0.0 0.0.0.255 192.168.7.0 0.0.0.255

    Note access-list 102 CCP_ACL category = 128

    access-list 102 permit ip host 83.xx.xx.50 all

    Note access-list 103 CCP_ACL category = 0

    Note access-list 103 IPSec rule

    access-list 103 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 104 CCP_ACL category = 2

    Note access-list 104 IPSec rule

    access-list 104 deny ip 192.168.0.0 0.0.0.255 192.168.7.0 0.0.0.255

    access-list 104. allow ip 192.168.0.0 0.0.0.255 any

    Note access-list 105 CCP_ACL category = 0

    Note access-list 105 IPSec rule

    access-list 105 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 106 CCP_ACL category = 0

    Note access-list 106 IPSec rule

    access-list 106 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 107 CCP_ACL category = 0

    Note access-list 107 IPSec rule

    access-list 107 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 108 CCP_ACL category = 0

    Note access-list 108 IPSec rule

    access-list 108 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 109 CCP_ACL category = 0

    Note access-list 109 IPSec rule

    access-list 109 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 110 CCP_ACL category = 0

    Note access-list 110 IPSec rule

    access-list 110 permit ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 111 CCP_ACL category = 0

    Note access-list 111 IPSec rule

    access-list 111 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 112 CCP_ACL category = 0

    Note access-list 112 IPSec rule

    access-list 112 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    Note access-list 113 CCP_ACL category = 0

    Note access-list 113 IPSec rule

    access-list 113 allow ip 192.168.7.0 0.0.0.255 192.168.0.0 0.0.0.255

    not run cdp

    !

    !

    !

    !

    allowed SDM_RMAP_1 1 route map

    corresponds to the IP 104

    --------------------------------------------------------

    I only give your router cisco 892 because there is nothnig much to change on linksys wrv210 router.

    Hope someone can help me. See you soon

    You can run a "ip inspect log drop-pkt" and see if get you any what FW-DROP session corresponding to the traffic you send Linksys to the main site. Zone based firewall could be blocking traffic initiated from outside to inside.

Maybe you are looking for