Archive for July, 2014

Release: cloud-client.info UMS Appliance for Microsoft Hyper-V and Oracle Virtual Box 2.8

Friday, July 25th, 2014

Hello Folks,

a new Version of the cloud-cient.info UMS Appliance for Microsoft Hyper-V and Oracle Virtual Box is available for download, Version 2.8 can be downloaded here for free: Download

cloud-client.info UMS Appliance 2.7

 

2.8

– Updated Ubuntu Subsystem
– Updated IGEL Universal Management Suite to 4.07.110

 

Cheers

Michael

Info: UMS Live is updated to Version 4.07.110

Thursday, July 24th, 2014

Hello Folks,

i just updated the UMS Live Server to 4.07.110 (our public UMS Demonstration platform).

UMS4 LIVE

UMS4 LIVE

 

Connection:
Start the UMS Console and use the following connection settings:

Universal Management Suite Server: ums.cloud-client.info
Port: 443
User Name: ums
Password: live

Required UMS console: IGEL Universal Suite 4.07.110
Access to the UMS internal Webserver on Port 9080 is blocked, Firmware Updates are not possible from this server!

Cheers

Michael

Release: IGEL Universal Management Suite 4.07.110

Wednesday, July 23rd, 2014

=====================
IGEL Universal Management Suite
=====================
Version 4.07.110
Release date: 11.07.2014
=====================
Notes:
=====================

If the windows installer does not start on Windows Server 2003 hosts,
contace IGEL support to get an UNSIGNED setup executable. This will solve
the issue.

The stand alone VNCViewer application has been removed in version 4.05.220.
Use UMS Console with appropriate user permissions to replace it.

The linux installer is tested with
– Ubuntu 12.04 (32bit)
– RedHat Enterprise Linux 6 (32bit)

For further compatibility information check the Universal Management Suite
Data Sheet at www.igel.com.
*****************************************************************************
UMS 4.07.110 (stable build based on version 4.07.100)
*****************************************************************************
=====================
Fixed bugs
=====================
– Fixed problem creating thin client directories (occurs in combination with
default directory rules only)
– Fixed firmware update assignment issue: assignments did not take effect
if they were assigned to thin client subdirectories
– Fixed file assignment issue: assignments did not take effect
if they were assigned to thin client subdirectories
– Fixed profile assignment issue: assigned object list showed all profiles,
even if there were only some assigned;
NOTE: this was an UI issue only, it did NOT affect the thin client settings
– Fixed null pointer exception if a firmware update is deleted
– Fixed firmware update deployment issue: firmware update registration
(from zip file) fails if UMS console runs on a windows system and the
UMS server runs on linux

Firmware release: IGEL Universal Desktop W7(+) 3.08.100

Wednesday, July 23rd, 2014

IGEL Universal Desktop W7
=========================
Version 3.08.100
14. July 2014
Supported devices:
UD3-W7, UD5-W7, UD9-W7, UD9-W7 Touch, UD10-W7, UD10-W7 Touch
UD3-730 W7, UD3-740 W7, UD5-730 W7, UD5-740 W7, UD9-730 W7, UD9-731 W7
=====================
Notes:
=====================

=====================
Drivers:
=====================
– Realtek RTL8169 Version: 7.43.321.2011
– VIA HD Audio VT1708B: 6.0.01.8700
– Prolific PL-2303 USBtoSerial: 2.0.2.8
– FTDI UsbToSerial: 2.02.04
– OmniKey Cardman 3×21: 1.2.15.0
– Intel HD Graphics: 9.17.10.2875
– Intel PCI Communication Controller: 8.0.0.1262
– Realtek 8168: 7.61.612.2012
– Intel AHCI : 11.2.0.1006
– Gemalto Minidriver for .NET Smart Card: (WES7: 8.3.1.3)
– VIA WLAN VT6656: 1.1.0.2
– Intel Centrino WLAN N-1000: 15.1.0.18
– VIA Chrome 9 VX855: 8.14.14.0141
– D-LINK DWA-131 Nano: 1085.7.0815.2009
– D-LINK DWA-131 REVB Nano: 1015.6.0210.2012
– VIA Chrome9 VX900: 8.14.14.0181
– VIA Chrome9 VX900 for TC236: 8.14.14.0231
– Ralink RT309x/2860: 3.02.01.0
– Ralink WLAN RT357x: 5.1.7.0
– Intel 945 Express: 8.15.10.1930
– eGalax xTouch: 5.11.0.9020
– RTL8168C: 7.018.0322.2010
– Realtek HD Audio: 2.63
=====================
Applications:
=====================
– .NET: 3.5 Sp1
– Microsoft RDP Client : 8
– Internet Explorer: 8
– Windows Media Player: 12
– Sun JAVA RE: 1.7 Update 17
– Ericom WebConnect: 5.6.1.1000
– Ericom PowerTerm: 9.2.0.0
– NXClient: 3.4.0.7
– Quest vWorkspace Client: 7.6
– Ekiga VOIP Client: 3.2.6
– SAP GUI JAVA for Windows: 7.10 R 7
– Tight VNC Server: 2.0.2
– Citrix Receiver: 3.4
– Thin Print: 8.6
– VMware Horizon View Client Version: 5.4.0 build-1219906
– Fabulatech USB for Remote Desktop: 3.1.3
– NCP Enterprise Client: 9.30
– Leostream Connect Client: 2.7.129.0
– Client for RedHat RHEV-D: 3.0-26
– USB Redirection for RedHat RHEV-D: 3.0-26
– Sumatra PDF Reader: 2.1.1
=====================
New features:
=====================
-[System]:
– Added configuration of system audio master volume
On IGEL setup page “Accessories->Sound Mixer->Sound Mixer Configuration”
(registry key: userinterface.sound.mute, default: false)
(registry key: userinterface.sound.use_igel_setup, default: false)
(registry key: userinterface.sound.volume, default: 50)
– Added Icelandic keyboard support
– Added support for D-LINK DWA-131 REVB Nano
– Updated system OpenSSL library to version 1.0.1g
– Added IGEL desktop backgrounds for 16:10 displays
– Added Internet Explorer security sites configuration.
Possibility of adding website url’s to Internet Explorer Security Zones
On IGEL setup page: “Sessions->Browser Sessions>Security->Sites”
(registry key: sessions->web->websettings->internetzone->enableprotectedmode, default: true)
(registry key: sessions->web->websettings->localintranetzone->enableprotectedmode, default: false)
(registry key: sessions->web->websettings->localintranetzone->localintranetsites% )
(registry key: sessions->web->websettings->trustedzone->enableprotectedmode, default: false)
(registry key: sessions->web->websettings->trustedzone->trustedsites% )
(registry key: sessions->web->websettings->restrictedzone->enableprotectedmode, default: true)
(registry key: sessions->web->websettings->restrictedzone->restrictedsites% )

=====================
Bug fixes:
=====================
-[System]:
– Fixed bug in IGEL firewall configuration “Do not allow Exceptions”
– Fixed some bugs and tooltips in IGEL setup

=====================
Known Issues:
=====================
-[System]:
– Xen Desktop Appliance Mode is not working.
-[FABULATECH]:
– Fabulatech USB for Remote Desktop is currently
not working with Citrix XenDesktop.
-[VMware]:
– USB Redirection: Devices connected to a USB 3.0 Port will not be redirected.
– USB redirection is currently not working if Quest vWorkspace USB
redirection service is enabled.

IGEL offers W7+ devices

Wednesday, July 23rd, 2014

Hello Folks,

IGEL brings up a a new  device/firmware type called Universal Desktop W7+, the Universal Desktop W7+ is similar to the regular W7 but it comes with an 8GB SSD and not like the regular W7 devices with a 4GB SSD.

Main benefit for the W7+ is the fact that you have much more space available to install applications or drivers to the device, for example to install the Lync 2013 VDI Plug-In from Microsoft.

Import: If you are running a mixed environment (W7 and W7+) you have to handle two seperate firmware’s. The Images are not compatible.

W7+ is available for the current UD3, UD5, UD9 and UD10.

Cheers

Michael

Tip: How to solve scrolling issues with XenDesktop 7.x and the Linux Citrix Receiver 13

Wednesday, July 9th, 2014

Hello Folks,

if you got in issue with scrolling in web sites that contain a lot of pictures like Google Pictures than you should try the setting to enable the registry key to enable the h264 deep level compression (System->Registry->ica.wfclient.h264enabled).

Plesase note: You must use Receiver 13 and this settings is currently not available for ARM based Client like the IZ1 or UD2 Multimedia.

Cheers

Michael

Info: Smartphones in Company environments (or Administrators can’t read).

Monday, July 7th, 2014

Hi Folks,

bring your own device (BYOD) is always a big thing for company’s but very often there is a big question: How can users access there device to sync pictures/contacts and other or to perform a firmware update in a company environment. Very often i got question like “How can i access my xxx phone in a VDI session” or “How can i access pictures..” and so on.

Of course you can install drivers and use USB redirection but depending on the network it will work more or less stable and is mostly not really user frindly. The most vendors also do not really take care about this question.. Why?

Now we come to the paperworks.. Do you know that VDI/Terminal Server use/access is forbidden and a license fault for a couple of vendors?

Let’s check it out, Scenario we have a couple of Apple devices and want to use them or make them available for the Users in a VDI / Company environment. Sounds simple right.. But what are we required to do? We need do deploy the Software/Drivers to the End User Device (Desktop PC/Thin Client) and/or to the Virtual Desktops (incl. Terminal Servers). Now check out the Apple License Agreement for IOS 7 and also ITunes.

From IOS7 License Agreement:

“…and you may not distribute or make the iOS Software available over a network where it could be used by multiple devices at the same time”

From ITunes License Agreement:

“You may not make the Apple Software available over a network where it could be used by multiple computers at the same time.”

What do it mean? Quite simple: Software deployment = Forbidden, Use on Terminal Server = Forbidden, Use on VDI = Forbidden

For Windows Phone 8.1 Microsoft denies the use of the Software for “commercial Software Hosting services” without any deeper explanation. For Android devices it depends on the vendor, but mostly here you will find similar parts in the EULA.

This is also one reason why we have discontinued the work on our integration packs for IOS/Android.

So how can you exchange files? Quite simple: Use cloud services like OneDrive, GoogleDrive or similar. Using a Smart Phone as “USB Memory” is mostly obsolete today and there are a bunch of cloud services available to perform the job.

So from my point of view in “company” or “commercial” environments mostly all smart phone vendors only allow the use thru cloud based services incl. Exchange based EMail and that’s it. If you have an other view please share it… 😉

Cheers

Michael

Release: IGEL Linux SoC for IZ1 and UD2 Multimedia Version 1.08.100

Friday, July 4th, 2014

IGEL Linux SoC
==============
Version 1.08.100
Jul 01 2014
Supported devices: IZ1-RFX, IZ1-HDX, UD2-LX MultiMedia
Versions
========
– Citrix Receiver 12.5.1.234536
– Citrix Receiver 13.0.3.274243
– IGEL Legacy RDP Client 1.0
– IGEL RDP Client 2.1
– VMware View client 2.0.0-1049726
– Leostream Java Connect 2.4.57.0
– Firefox 20.0
– Xorg X11 Server 1.10.4
– Xorg Xephyr 1.10.4
– PC/SC Lite 1.8.9
– MUSCLE CCID Driver 1.4.13
– REINER SCT cyberJack Driver 3.99.5final.SP03
– ACS CCID Driver 1.0.5
– Imprivata OneSign ProveID Embedded
================
Information:
================
IMPORTANT: If you install this firmware you cannot downgrade to versions
earlier than 1.07.100.

IMPORTANT: This releases integrates two Citrix Receiver versions 12 and 13.
You can only choose to run either of the versions.
The old 12 Citrix Receiver is still available for compatibility reasons and
activated by default. Version 13 of the Citrix Receiver can be activated at
the local setup of the device or through a UMS profile configuration.
Please check in this readme which restrictions apply and how to switch the
versions.
================
Known issues:
================
[ICA/Citrix Receiver 12 and 13]
– Currently Kerberos is not supported, so Kerberos passthrough will not work
with ICA sessions and Citrix XenApp/StoreFront.
Workaround: configure “Passthrough authentication”

[ICA/Citrix Receiver 13]
– Smartcard authentication is supported for ICA sessions created on the IGEL
device (supported with Citrix servers up to version 6.5). Kerberos
passthrough and Citrix XenApp/StoreFront login are not supported.
– Only the “User name and password” StoreFront authentication method is supported.
– During Citrix XenApp/StoreFront logoff the logoff for running desktop sessions
does not work.
– Com-port redirection is not supported.
– Webcam redirection is not supported with H.264 hardware and software encoding,
still legacy theora encoding is supported.

================
New features:
================
[ICA/Citrix Receiver 13]
– Added Citrix Receiver 13.0.3.274243
– Added support for StoreFront
– Added support for SHA-2 certificates

Hints (It is IMPORTANT to read this, if you plan to use Citrix Receiver 13
instead of 12 and/or want to connect to a Citrix server version 7.x):
– This firmware contains two Citrix Receivers, but only one of them can be
active at a time. Default is Citrix Receiver 12. The version can be
switched by the new parameter “Use Citrix Receiver version 13” in the
IGEL setup at “Sessions->Citrix->Citrix Receiver Selection” (registry:
ica.useversion13). For Citrix Receiver 13 configuration setting the new
parameter “Citrix server version” is mandatory (see below).
– The new parameter “Citrix server version” on IGEL setup page
“Sessions->Citrix->Citrix XenApp/StoreFront->Server” (registry key:
ica.pnlogin.serverversion) defines the capabilities of the Receiver
accroding to the used Citrix server versions (default is “XenApp 6.x or
older”):
IMPORTANT FOR SERVER URL CONFIGURATION in the IGEL registry (With local
IGEL Setup or UMS 4.07.100 the server url is automatically stored at the
correct keys, if you use the provided setup page at
“Sessions->Citrix->Citrix XenApp/StoreFront->Server”):
Depending on the Citrix server version you have configured, different
sets of server url configurations apply:
* XenApp/XenDesktop 7.x Store:
For access to a Citrix Storefront:
registry keys ica.pnlogin.browseraddress_store<NR>.*
(optional: ica.pnlogin.browseraddress_store<NR>.farm)
* XenApp/XenDesktop 7.x Legacy Mode
For access to the legacy mode of a Citrix Storefront:
registry keys ica.pnlogin.browseraddress_store_legacy<NR>.*
(optional: ica.pnlogin.browseraddress_store_legacy<NR>.farm)
* XenApp 6.x or older:
For access to a XenApp Server:
registry keys ica.pnlogin.browseraddress<NR>.*
(optional: ica.pnlogin.browseraddress<NR>.farm)

– For Citrix StoreFront access with Citrix Receiver 13 only https web interfaces
are supported. If the SSL certificate of your Citrix server is not signed
by a trusted certificate authority (like Verigsign, Thawte etc.), you have to
install the root certificate of your own certificate authority on each Thin
Client.
Please use http://edocs.igel.com/index.htm#10200413.htm to access the document
on how to install SSL certificate.
– With Citrix Receiver 13 it is not possible to connect to a Citrix server
with other methods than the web interface (this affects the parameter
“Use Citrix XenApp Services Site” registry key: ica.pnlogin.useserversettings).
Due to that it is not possible to select another password change method than
“Citrix XenApp Services Site”.
– ICA sessions created on the IGEL device only work with Citrix XenApp servers up
to version 6.5.
– The parameter “Deferred update mode” has no effect anymore.
– The window options on IGEL setup page
“Sessions->Citrix->Citrix XenApp/StoreFront->Options” are not supported anymore.

Hints for the configuration on server side (for Citrix servers version 7.x):
– After installation and basic configuration of Machine Catalogs and Delivery
Groups, you end up with a store that uses http only. But the Citrix Receiver
13 for Linux supports stores with https only (the Windows version of Citrix
Receiver has this limitation, too; but it is possible to change some
registry keys on the client side to enable http support; unfortunately
this is not possible with the Linux version of Citrix Receiver).
– To switch the store to https, change the base URL on page “Server Group”
in the Citrix StoreFront Management Console.
– Then adjust the “Transport Type” in the “Manage Delivery Controllers”
dialog of the “Store” page in Citrix StoreFront Management Console.
– Then add a https binding for the website in the IIS Management Console
(you have to choose an SSL certificate in the corresponding dialog).
– Password change is disabled by default on a Citrix server 7.x. To enable it,
open the Citrix StoreFront Management Console and go to page
“Authentication”. Click on the authentication method “User name and
password” and then on “Manage Password Options” on the right pane.
– The error messages of Citrix servers 7.x and Citrix Receiver 13 are terribly
misleading. When you are using Citrix servers 7.x and you experience
problems with the connection itself or login, please double check
that everything is ok on the server side. It is a good thing to check the
overview page for a target machine in Citrix Studio. To get there, choose
“View Machines” in the context menu of a Delivery Group.
Then check for each machine:
– that the “Registration State” of the machine is “Registered”
– that the “Maintenance Mode” of the machine is “Off”
– that the “Power State” of the machine is “On”
– that you are using the correct user if there is a user
mentioned in the column “User”.
Also, if something does not work (although it really should), try to reboot
the Citrix server. In our tests this helped sometimes when we experienced
strange problems.

– With Citrix Receiver 13 the following codec parameters are available:
JPEG codec registry keys:
* ica.wfclient.directdecode
* ica.wfclient.batchdecode (enabled by default)

The H264 deep compression codec is not available in this release.

Detailed description of the parameters is available at:
http://support.citrix.com/proddocs/topic/receiver-linux-13-0/receiver-linux-13-0.html

[ICA/Citrix Receiver 12]
– Updated Citrix Receiver to version 12.5.1.234536

[ICA]
– For ICA sessions with workarea window mode: In multi monitor setups
the workarea window can be restricted to a single monitor now.
Configure “Start Monitor” at setup page:
“Sessions->Citrix->ICA Sessions->session name->Window”.
If the “Start Monitor” is configured to “No Configuration”, the session window
is expanded over all monitors without covering the taskbar.
– Improved Citrix XenApp/StoreFront session configuration
– Added new filter for desktop placement of Citrix XenApp applications
at Setup page “Sessions->Citrix->Citrix XenApp/StoreFront->Appearance”.
– Improved “Overwrite local Start Menu and desktop setting with server
setting” by separting parameter for start menu and desktop.
– Added autostart of sessions. The list of autostarted applications can be
defined at: “Sessions->Citrix->Citrix XenApp/StoreFront->Logon”.
Hint:
The autostart mechanism does not care about automatically reconnected
applications. To avoid this, the number of allowed running sessions
can be limited at server side.
– Added additional settings for protocol encryption
– At registry key “ica.module.encryption” you can disable encryption for
all ICA sessions
– At setup page “Sessions->Citrix->ICA Sessions->session name->Options” set
“Encryption Level” to “None” to disable encryption for individual ICA sessions.
(registry key: session.ica<NR>.appsrv.encryptionlevelsession)

[RDP]
– Updated to IGEL RDP Client 2.1 based on FreeRDP Client 1.1:
– Added support for RDP 8 based RemoteFX Adaptive Graphics virtual channel:
– Calista Codec (RemoteFX7)
– Progressive Codec
– Clear Codec
– Planar Codec
– Added H264 Video optimized remoting virtual channel
– Added support for audio recording capability
– Improved RemoteApp support
– Added support for Remote Desktop Web Access accessible at setup page
“Sessions->RDP->Remote Desktop Web Access”
– For compatibility reasons it is still possible to enable IGEL Legacy RDP
Client 1.0 at setup page “Sessions->RDP->RDP Global->Options->RDP legacy mode”.
IMPORTANT: The following features are not available:
– RDP 8 based RemoteFX support
– Remote Desktop Web Access
– Changed default authentication mode to support NLA authentication aside local logon
for automatic access to Windows Server 2008, 2008 R2, 2012 and 2012 R2.
You can disable local logon and network authentication at IGEL setup page
“Sessions->RDP->RDP Global->Local Logon”
(registry: rdp.login.use_rdplogin and rdp.login.enable-network-authentication)
– The RDP session window resolution can now be configured with custom resolutions at
IGEL setup page “Sessions->RDP->RDP Sessions->session name->Window”
(registry key: sessions.winconnect<NR>.option.resolution)
– Added a “RDP connection bar” in a fullscreen RDP session, to minimize and quit the session.
The feature can be enabled at IGEL setup page “Sessions->RDP->RDP Global->Window->Enable toolbar”
(registry key: rdp.winconnect.enable-toolbar)

[Imprivata]
– Updated bootstrap loader to version 1.0.230504

[VNC]
– Added VNC secure mode, based on a SSL-encrypted VNC connection. The SSL
connection uses a special certificate located in the directory /wfs/ca-certs.
This feature requires the Universal Management Suite (UMS) to be involved,
to handle the shadowing permissions and double check whether the connection
is allowed or not. In addition the UMS is used to assure a secure credential
exchange between the TC and the UMS console.
IMPORTANT: The UMS must have the version 4.07.100 or higher!
The feature can be enabled in IGEL setup at “System->Shadow->Secure Mode”
(registry key: network.vncserver.secure_mode, default: off)
– Added hide disconnect button configuration in the Remote Shadowing Indicator at setup page
“System->Shadow->Allow User to disconnect Remote Shadowing”
(registry key: “network.vncserver.showdisconnectbtn”, default: on).

[UMS]
– Added information about network speed and duplex mode of Thin Client in the
system information pane along with other Thin Client specific properties.

[Network]
– Added support for 802.1X MD5 authentication
– Added parameter for DHCP user class option (see RFC 3004):
Setup page Network -> DHCP Client -> Standard Options -> “User Class”
Registry key: network.dhcp.user_class
The default value is empty and means that the option is not used.
Non-printable bytes can be specified as \ooo, where each o is an octal digit,
or \xhh, where each h is a hexadecimal digit.
‘\’ and ‘”‘ must be escaped by prepending ‘\’.
– Added parameters for DHCP client identifier options (see RFC 2132):
Registry keys:
* network.interfaces.ethernet.device0.dhcp_client_id
* network.interfaces.ethernet.device1.dhcp_client_id
* network.interfaces.wirelesslan.device0.dhcp_client_id
The default value is empty and means that the option is not used.
Non-printable bytes can be specified as \ooo, where each o is an octal digit,
or \xhh, where each h is a hexadecimal digit.
‘\’ and ‘”‘ must be escaped by prepending ‘\’. Example values:
\x00host.example.org (a FQDN with type byte 0 prepended),
\x01\x00\x11\x22\x33\x44\x55 (the MAC address 00:11:22:33:44:55 with type byte 1 prepended)

[base system]
– Updated Chinese, Dutch, French and German userinterface translations.
– Added an webcam test application. The application can be started from
“Application Launcher->System tab->Webcam Information”.
For scripting access use the command “webcam-info”:
* option “-l”:
retrieve a list containing all possible frame resolutions and frame rates.
– Added bulgarian keyboard layout support
– Added a new user setup session. Configurable at IGEL setup page
“Accessories->Setup Session”
– Improved Application Launcher: applications are sorted by name.
– Updated TC Setup to version 4.7.4
– Updated PC/SC Lite to version 1.8.9
– Updated open source ccid driver to version 1.4.13
– Updated timezone informations to ubuntu version tzdata_2014a-0ubuntu0.12.04
– Updated common CA certificates to ubuntu version ca-certificates_20140325:
The list of integrated certificates is available at:
http://myigel.biz/index.php?dir=IGEL_UNIVERSAL_DESKTOP_FIRMWARE/LX_SoC/

================
Fixed bugs:
================
[ICA/Citrix Receiver 13]
– Fixed LED indicator for (Caps Lock, Num Lock or Scroll Lock) when a published
application is configured to run a macro on one of the LED keys. Pressing the key
can cause multiple runs of the macro. Configureable at registry
“ica.wfclient.bypasssetled”.

[ICA]
– Fixed missing desktop/menu icons with Citrix XenApp/StoreFront.
– Fixed Citrix XenApp/StoreFront refresh command.
– Fixed matching of application names for Citrix XenApp/StoreFront autostart.
– Fixed screen lock dialog to show the logged in user name, if
Citrix XenApp password is synchronized with screen lock password.
– Citrix XenApp/StoreFront with multi monitor configuration:
Fixed fullscreen window placement if “Multi Monitor Fullscreen Mode” is set to
“Restrict fullscreen session onto one monitor” at setup page
“Sessions->Citrix->ICA Global->Window”.
Configure option “Citrix XenApp/StoreFront Start Monitor” (registry:
“ica.pnlogin.xineramamonitor”) at the same page.

[RDP Rdesktop]
– Fixed random server disconnection when audio is enabled.
– Fixed RDP login speed.
– Fixed execution of remote apps with short names.
– Fixed smart card support in RDP sessions.

[Desktop]
– Fixed autoresolution and monitor detection issues.
– Fixed VGA monitor timings.
– Fixed taskbar background with left and right taskbar position.

[base system]
– Fixed bootloader to prevent sudden system crashes,
optimized bootloader.
– Enabled Browser Sessions on IGEL IZ1-RFX.
– Fixed audio capture control in audio mixer.
– Fixed security vulnerability CVE-2014-0196

[Browser]
– Firefox crashed the system while playing videos.
Limited memory usage with these registry keys:
browserglobal.app.media_cache_size, default: 64000 (=64MB)
browserglobal.app.browser_cache_offline_capacity, default: 64000 (=64MB)

[Imprivata]
– Fixed Login dialog in multi monitor environments

1st That sucks! Award Winner: Microsoft for taken over and blocking the DNS Provider no-ip incl. there hostnames

Tuesday, July 1st, 2014

Hi Folks,

the first That sucks! Award Winner is Microsoft for taken over and blocking the free/paid DNS Provider no-ip incl. all related host (Act of DNS Piracy).

 

That sucks! Award

That sucks! Award No.1: Microsoft for legal(?) DNS Piracy

Today Microsoft has taken over the free/paid DNS Name Provider no-ip incl. all related hostnames and do not allow access to the related systems. This could be webcam’s to monitor old people or children, private Webservers, Storage Devices or Routers but also company infrastructures if using no-ip as DNS Name Provider for external access. At the current state this means, all private or business User can not work with these no-ip based systems if using a No-IP Hostname.

Reason for Microsoft is the distribution of Malware, read also here; but why do they not get in contact with the provider and are blocking all users? Demonstration of power or just stupid? Iam not sure, but this act is unbelievable and it fit’s more to a facism regime. Iam quite sure there is some illegal content hosted somewhere on Windows Azure Servers or thru OneDrive… Let’s block it and for all Users! How would Microsoft like this idea?

Congratulations!

Add-On: Regarding some sources more than 22.000 Domainnames are affected, great job.. Really.. Great job!

Add-On: ..other Sources mentioned now 4 Million affected hosts, for me this is now the biggest shame in IT History! Cybercrime unit at Microsoft.. 🙁 ..to prevent or perform crime?

Cheers

Michael

P.S.: Regarding the fact that some parts of our infrastructure are also affected i have cancelt my Surface 3 order as direct consequence for Microsoft and i hope other affected users will do the same or similar.