Getting Release Management to fail a release when using a custom PowerShell component

If you have a custom PowerShell script you wish to run you can create a tool in release Management (Inventory > Tools) for the script which deploys the .PS1, PSM files etc. and defines the command line to run it.

The problem we hit was that our script failed, but did not fail the build step as the PowerShell.EXE running the script exited without error. The script had thrown an exception which was in the output log file, but it was marked as a completed step.

The solution was to use a try/catch in the .PS1  script that as well as writing a message to Write-Error also set the exit code to something other than 0 (Zero). So you end up with something like the following in your .PS1 file

[string]$Param1 ,
[string]$Param2 )

    # some logic here

} catch
    Write-Error $_.Exception.Message
    exit 1 # to get an error flagged so it can be seen by RM

Once this change was made an exception in the PowerShell caused the release step to fail as required. The output from the script appeared as the Command Output.

Source: Rfennell

SharePoint Saturday San Diego 2014

Don’t miss the upcoming SharePoint Saturday – San Diego on November 15th!


This is a FREE one-day event hosted by the San Diego SharePoint User Group and will feature sessions for end-users, business users, IT professionals and developers. There will also be a track dedicated to Office 365! 

Who Should Attend

SharePoint administrators, end users, architects, developers, and other professionals that work with Microsoft SharePoint Technologies

Where will the event be held

imageUCSD Extension located at

6256 Greenwich Drive, San Diego, CA.




Who will be presenting

This event has confirmed many other nationally recognized SharePoint speakers and Microsoft SharePoint MVPs! Check out the Speakers page on If you are looking to enhance your knowledge of any aspect of SharePoint and/or network with other SharePoint professionals, we strongly encourage you to attend this community event.  image

Why you should attend

Beyond the knowledge and networking, this event will be a blast. There will be a large prize raffle and of course, a ‘SharePint’ social event in the evening. We hope to see you there! Please visit the SharePoint Saturday – San Diego site for more information or to review the recently published speaker schedule. For those of you on twitter, please tweet about this event using the #SPSSD hashtag.

Please register right away! See you there! Register Here!

Who are the Sponsors




Ivan Sanders

clip_image001 clip_image002 clip_image003 clip_image004 clip_image005 clip_image006

Windows 10 Tech preview.. Part 4.. UPDATE

This is going to be a very quick entry.

The machine which I had hosting Windows 10 is going to a new location very soon, and I spent this afternoon setting it up for the new user.

So I stripped out the drive, reformatted it, disconnected the two SATA drives in my production machine, installed the Windows 10 preview back onto the IDE drive, booted to it twice, re-connected the two SATA drives, and now the machine will not boot from the Windows 10 drive.

Here endeth my association with the preview until I can work out a way to install and boot from the IDE drive.

Sad smile Grrrrrrrrrrrrrrrrrrr


I tried again in the early hours of this morning, this time formatting the drive from the Preview installation and so far, it appears to be working..

DSC Resource Kit Wave 8 coming?

Looks like the next wave of the DSC resource kit is on its way – a set of resources for Exchange 2013 have been published – with a wave 8 tag.


I’ve been waiting for the Exchange resources – they’re going to make my life soooooo much easier

ALM Ranger’s release DevOps Guidance for PowerShell DSC – perfectly timed for DDDNorth

In a beautiful synchronicity the ALM Rangers DevOps guidance for PowerShell DSC has been release at at the same time as I am doing my DDDNorth session ‘What is Desired State Configuration and how does it help me?’

This Rangers project has been really interesting to work on, and provide much of the core of my session for DDDNorth.

Well worth a look if you want to create your own DSC resources.

Source: Rfennell

Removal instructions for CinPlusHQVid

What is CinPlusHQVid?

The Malwarebytes research team has determined that CinPlusHQVid is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.

Microsoft Security Advisory Notification Issued: October 17, 2014

Security Advisories Updated or Released Today

* Microsoft Security Advisory (2949927)
– Title: Vulnerability in SSL 3.0 Could Allow Information
– »···/2949927
– Revision Note: V2.0 (October 17, 2014): Removed Download Center
links for Microsoft security update 2949927. Microsoft recommends
that customers experiencing issues uninstall this update.
Microsoft is investigating behavior associated with this update,
and will update the advisory when more information becomes

Weekend reading

FRS to DFS-R Migration

Understand FRS to DFS-R Migration Stages
From MOC 6425C p12.70 – 12.73

Because SYSVOL is critical to the health and functionality of your domain, Windows does not provide a
mechanism with which to convert from FRS to DFS-R replication of SYSVOL instantly. In fact, migration to
DFS-R involves creating a parallel SYSVOL structure. When the parallel structure is successfully in place,
clients are redirected to the new structure as the domain’s system volume. When the operation has
proven successful, you can eliminate FRS.
Migration to DFS-R therefore consists of four stages or states:

0 (start). The default state of a domain controller. Only FRS is used to replicate SYSVOL.

1 (prepared). A copy of SYSVOL is created in a folder called SYSVOL_DFSR and is added to a replication set. DFS-R begins to replicate the contents of the SYSVOL_DFSR folders on all domain controllers. However, FRS continues to replicate the original SYSVOL folders and clients continue to use SYSVOL.

2 (redirected) SYSVOL share is redirected to SYSVOL_DFSR for client use.
SYSVOL is still replicated by FRS for failback.

3 (eliminated). Replication of the old SYSVOL folder by FRS is stopped. The original SYSVOL folder is not deleted. Therefore, if you want to remove it entirely, you must do so manually.

You move the DCs through these stages or states, by using the DFSMig command. You will use three options with dfsrmig.exe:

  • getglobalstate state
    The setglobalstate option configures the current global DFSR migration state, which applies to all domain controllers. The state is specified by the state parameter, which is 0–3. Each domain controller will be notified of the new DFSR migration state and will migrate to that state automatically.
  • getglobalstate
    The getglobalstate option reports the current global DFSR migration state.
  • getmigrationstate
    The getmigrationstate option reports the current migration state of each domain controller. Because it might take time for domain controllers to be notified of the new global DFSR migration state, and because it might take even more time for a domain controller to make the changes required by that state, domain controllers will not be synchronized with the global state instantly. The getmigrationstate option enables you to monitor the progress of domain controllers toward the current global DFSR migration state.

If there is a problem moving from one state to the next higher state, you can revert to previous states by using the setglobalstate option. However, after you have used the setglobalstate option to specify state 3 (eliminated), you cannot revert to the earlier states.

To migrate SYSVOL replication from FRS to DFS-R, perform the following steps:

1. Open the Active Directory Domains and Trusts snap-in.
2. Right-click the domain and choose Raise Domain Functional Level.
3. If the Current domain functional level box does not indicate Windows Server 2008, select Windows
Server 2008 or Windows Server 2008 R2 from the Select an available domain functional level list.
4. Click Raise. Click OK twice in response to the dialog boxes that appear.
5. Log on to a domain controller and open a command prompt.
6. Type dfsrmig /setglobalstate 1.
7. Type dfsrmig /getmigrationstate to query the progress of domain controllers toward the Prepared
global state. Repeat this step until the state has been attained by all domain controllers.
This can take 15 minutes to an hour or longer.
8. Type dfsrmig /setglobalstate 2.
9. Type dfsrmig /getmigrationstate to query the progress of domain controllers toward the
Redirected global state. Repeat this step until the state has been attained by all domain controllers.
This can take 15 minutes to an hour or longer.
10. Type dfsrmig /setglobalstate 3.
After you begin migration from state 2 (prepared) to state 3 (replicated), any changes made to the
SYSVOL folder will have to be replicated manually to the SYSVOL_DFSR folder.
11. Type dfsrmig /getmigrationstate to query the progress of domain controllers toward the
Eliminated global state. Repeat this step until the state has been attained by all domain controllers.
This can take 15 minutes to an hour or longer.
12. For more information about the dfsrmig.exe command, type dfsrmig.exe /?.


More info on migration steps:

SYSVOL Replication Migration Guide: FRS to DFS Replication

Migrate a Domain-based Namespace to Windows Server 2008 Mode – Applies To: Windows Server 2008 R2
“To migrate a domain-based namespace from Windows 2000 Server mode to Windows Server 2008 mode, you must export the namespace to a file, delete the namespace, recreate it in Windows Server 2008 mode, and then import the namespace settings. To do so, use the following procedure.”

Why Migrate?

1. “Access-based enumeration- Access-based enumeration allows users to see only files and folders on a file server to which they have permission to access. This feature is not enabled by default for namespaces (though it is enabled by default on newly-created shared folders in Windows Server 2008), and is only supported in a DFS namespace when the namespace is a standalone namespace hosted on a computer running Windows Server 2008, or a domain-based namespace by using the Windows Server 2008 mode.”

Above quoted from:
Distributed File System – Why migrate?

Enable Access-Based Enumeration on a Namespace
2. Cluster support - DFS Namespaces in Windows Server 2008 supports creating stand-alone namespaces on a failover cluster from within the DFS Management snap-in. To do so, specify a failover cluster on the Namespace Server page of the New Namespace Wizard.

3. Improved command-line tools – DFS Namespaces in Windows Server 2008 includes an updated version of the Dfsutil command and the new Dfsdiag command, which you can use to diagnose namespace issues.

Changes and improvements to Dfsutil:


4. Windows Server 2008 mode domain-based namespaces – Windows Server 2008 includes the ability to create a domain-based namespace in Windows Server 2008 mode. Doing so enables support for access-based enumeration and increased scalability. The domain-based namespace introduced in Windows® 2000 Server is now referred to as “domain-based namespace (Windows 2000 Server mode).”

To use the Windows Server 2008 mode, the domain and domain-based namespace must meet the following minimum requirements:
     – The forest uses the Windows Server 2003 or higher forest functional level.
     – The domain uses the Windows Server 2008 or higher domain functional level.
     – All namespace servers are running Windows Server 2008.

If your environment supports it, choose the Windows Server 2008 mode when you create new domain-based namespaces. This mode provides additional features and scalability, and also eliminates the possible need to migrate a namespace from the Windows 2000 Server mode.

For information about migrating a namespace to Windows Server 2008 mode, see
Migrate a Domain-based Namespace to Windows Server 2008 Mode.

5. Content Freshness – DFS Replication in Windows Server 2008 has a new feature called Content Freshness, which prevents a server that was offline for a long time from over-writing fresh data when it comes back online with stale (out-of-date) data.

6. Improvements for handling unexpected shutdowns – In Windows Server 2008, DFS Replication now allows for quicker recovery from unexpected shutdowns. Unexpected shutdowns can occur because of the following reasons:
     – Unexpected shutdown of DFS Replication: This could occur if the DFS Replication process crashes, is ended, or stops because there are insufficient resources.
     – Unexpected shutdown of the computer: This could occur if the computer crashes or loses power while DFS Replication is running.
     – Unexpected shutdown of the volume: This could occur if the volume hosting a DFS Replication content set loses power, is disconnected, or is forced to dismount.
Unexpected shutdowns of the computer and the volume can cause the NTFS file system to lose changes which have not been copied to disk. Therefore the DFS Replication database can become inconsistent with the on-disk file system state.

On Windows Server 2003 R2, an unexpected shutdown may force DFS Replication to perform a complete database rebuild, which can be very time consuming. DFS Replication in Windows Server 2008 usually does not need to rebuild the database following unexpected shutdowns, and thus recovers much more quickly.

7. DFS Replication performance improvements – DFS Replication in Windows Server 2008 includes the following performance improvements:
     – Faster replication both for small and large files.
     – Initial synchronization completes faster.
     – Better network bandwidth utilization on LANs and high latency networks such as WANs.

8. Propagation report – DFS Management in Windows Server 2008 includes a new type of diagnostic report called a propagation report. This report displays the replication progress for the test file created during a propagation test.

9. Replicate now – DFS Management now includes the ability to force replication to occur immediately, temporarily ignoring the replication schedule.
     To force replication immediately
       1. In the console tree, under the Replication node, select the appropriate replication group.
       2. Click the Connections tab.
       3. Right-click the member you want to use to replicate, and then click Replicate Now.

10. Support for Read-Only Domain Controllers – In Windows Server 2008, DFS Replication supports Read-Only Domain Controllers (RODCs).
For more information about RODCs, see

11. SYSVOL replication using DFS Replication – DFS Replication replaces the File Replication Service (FRS) as the replication engine for replicating the AD DS SYSVOL folder in domains that use the Windows Server 2008 domain functional level.



I hope this helps! I’m sure I may have missed something. Comments and suggestions are welcomed.

Ace Fekay
MVP, MCT, MCSE 2012, MCITP EA & MCTS Windows 2008/R2, Exchange 2013, 2010 EA & 2007, MCSE & MCSA 2003/2000, MCSA Messaging 2003
Microsoft Certified Trainer
Microsoft MVP – Directory Services

clip_image001 clip_image002 clip_image003 clip_image005

Complete List of Technical Blogs:

This posting is provided AS-IS with no warranties or guarantees and confers no rights.

Windows 10 preferences..

What would you like to see in Windows, what kind of options and/or preferences? Much depends on what kind of a Windows user you happen to be.

The list below is copied from the Ghacks newsletter, and is a good place to start when looking for what users would like to see

My takes are in BOLD Italic, and are fairly easy to spot

  1. Add tabs to Windows Explorer / File Explorer.- Useful for moving files around by dropping them onto the tabs..
  2. Make Windows Update the one stop for all drivers. – Argh no no no no no
  3. Bring back Aero Glass from Windows 8 Developer Preview. – When Aero appeared, those who could get it said that it was a waste of space, and those who couldn’t get it wanted it sooo badly.. 
  4. Redesign & replace all Aero-themed objects in Windows 10. – same as #3 above..
  5. Add Persian calendar to Windows. – Why not?
  6. Provide a better Notepad application. - Its called WordPad and been around since at least Windows 3.
  7. Make Windows free for everyone. – and while at it give free Jeeps out. I could live with that..
  8. A modern plugin experience for Internet Explorer. – Like Google Chrome? Can we leave it as it is, please..
  9. Bind programs to specific audio outputs. – Somebody will have to explain the usefulness of this to me. I can’t just see it off of the bat..
  10. Pin anything to the start screen. – Traditionally, this is called ‘Send to Desktop’, isn’t it?
  11. Live background images with animations or live streams. – Vista extras. Oh goody. If only the CPU felt the same way..
  12. Built-in support for multiple codecs such as mkv. – This is a ‘We’re not allowing Microsoft to include this format’ issue..
  13. Drag applications to another virtual desktop. – Super useful maybe..
  14. Create custom live tiles. – OK if all you want to do is watch live tiles
  15. Add Adobe format thumbnails support, create a universal preview tool. – Here am I trying to eliminate Adobe tentacles and rooting system from computers, and meanwhile there are others who want it?
  16. Merge PC Settings and Control Panel. – This looks to have been done to some degree in the new Start menu..
  17. Add Cortana to Windows. Fun in Halo, but maybe a nightmare in Windows especially if she has the same attitude to her ‘boss’.. Smile
  18. Ability to customize the login screen. – Another pointless change. Who stays on the login screen enough to care?
  19. OneDrive app should include shared folders. – I keep my distance from clouds of all types..
  20. Fix Thumbnail Cache automatic deletion problem. – This problem is unknown to me. That is not to say that it doesn’t exist..


I think that as long as computer users have:

  1. a system that they recognise
  2. that it works flawlessly for the most part
  3. isn’t upset by rogue updates
  4. is easy to recover in the event of a major failure
  5. has the traditional Windows games installed by default..

.. they will be quite happy.We are looking at something like Windows 7.

Calls to make sure that Windows 10 is backwards compatible with old hardware and software is the same kind of thinking which saw an end to IBM’s OS2, and it would kill off the X86 PC given time. This is definitely not a good idea even though from a financial standpoint, it would save the computer user some cash.

Starting up and using a PC should be like a car is to a driver. Everything is recognisable and more or less in the same place. Just as a car is a tool that gets the driver and passengers from A to B, a PC should do the same whether the destination is winning a game of Spider Solitaire or producing business class graphics and presentations capable of winning a six million dollar contract.


OK, so now you know what I think. How about you? Please leave a comment one way or the other.. Smile

Microsoft Ignite – One Conference to Rule Them All!

Yesterday morning the on The Official Microsoft Blog announced the name for their new enterprise technology conference – Microsoft Ignite. This conference, called MUTEE (Microsoft Unified Technology Event for Enterprises by some folks, promises to be everything to everyone. It replaces TechEd North America, as well as all the specialty conferences held by those product teams over the year – MEC, the Lync Conference, the SharePoint Conference, MMS, etc.

Plus Office 365, of course.

It’s finally here — One enterprise conference with infinite possibilities.

For the first time ever, Microsoft Ignite brings together our best and brightest for a single, remarkable enterprise tech conference. Meet the minds that make it happen. For the first time under one roof, Microsoft Ignite gives you unprecedented access to hundreds of Microsoft technology and business leaders. Join us in Chicago.

In October I was invited to join the Microsoft Roundtable to provide feedback on this new conference. Microsoft was there to listen, not be heard. They were particularly interested in hearing our feedback on MEC (the Microsoft Exchange Conference), which is very highly regarded by both attendees and within Microsoft. MEC brought everything together in a perfect balance – mid-level and deep-dive sessions on Exchange (and Office 365), a tremendous sense of community, and attendees and product group members who are very passionate about this product.

My feedback was primarily about community, the depth of the sessions, and the level of participation that small sessions provide. I really think this is where MEC shines and I hope that Microsoft is able to pull off the same sort of vibe at Ignite.

By combining all these conferences into a single event, Microsoft expects 20,000(!) attendees at Ignite in Chicago. The expectation is to have 300-400 attendees per session, which is far too large to be “intimate”. Microsoft is planning to have a lot of gathering areas for impromptu “chalk talks” and collaboration.

The conference center in Chicago is HUGE and should easily accommodate that many attendees. I hope that the sessions for each product are close to each other. It would be difficult to navigate long distances, both vertically and horizontally, if the sessions are spread out.

I have attended every TechEd since 2004 and I’ve always gotten great value out of these conferences. My take-aways and participation have changed over the years, but I still get a ton of information and collaboration from the community here. I look forward to the same thing going forward. I sit on The Krewe board of directors as Vice-President and know a lot about the value of community that conferences like this bring. The Krewe Facebook page continues to be a resource for TechEd and Krewe alumni, where members exchange questions, advice, and their views on our industry. I encourage you to check it out.

Overall, I’m hopeful that Microsoft Ignite will be able to pull off their ambitious goal of combining the dedicated technology conferences and TechEd into one mega conference, while maintaining the community and collaboration that smaller conferences like MEC and the SharePoint Conference were able to attain.

Microsoft Ignite – Come for the technology. Stay for the community.

#IWasMEC  —  #IamIgnite

Source: Expta

Removal instructions for Wajam

What is Wajam?

The Malwarebytes research team has determined that Wajam is adware. These adware applications display advertisements not originating from the sites you are browsing.

Removal instructions for Savepass 2.0

What is Savepass 2.0?

The Malwarebytes research team has determined that Savepass 2.0 is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.

Apple Watch SDK and More Great App Developer News!

All the best!
Kevin McNeish
Author: iOS App Development for Non-Programmers book series
Twitter: @kjmcneish

Removal instructions for Search Safer

What is Search Safer?

The Malwarebytes research team has determined that Search Safer is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.


In November, a presentation is planned for professional organizations in our area.  This represents a planning outline that will be further refined.  

 1. SECURITY = SEC-U-R-IT-Y was once shared by a class leader that “you are it“.  Careful and well planned human behavior is your BEST defense, even over technological safeguards.  Fort Knox has some of the world’s best security, but if the guards open the doors and let unauthorized folks in — what good is all of that fortification?  For the best safety for yourself, family, and corporately, one must “think security” and then integrate those concepts in all actions.

2. THINK DEFENSIVELY –   Avoidance is your #1 risk management tool.  For email or internet actions — safety should always be a primary concern.  It’s good to get secondary verification before acting on items.  When a site is encountered that will not allow you to exit — use CTRL+SHIFT+ESC to bring up task manager to close malicious web pages & exit safely.   Lock down your browser settings with restrictive security settings.  Patch immediately from trusted sources quickly to fortify your system.

3. THINK BEFORE YOU CLICK – Think of every action being potentially dangerous on Internet.  While most actions are safe, there is still the potential of danger.  It is better to pause and double check than to act to emotions or initial responses sometimes.   The good news is that it takes one or more clicks by the user to install most malware.  The bad news is that many folks click anyway, without realizing this gives permission to possibly plant malicious code in a stealth like manner on the system.

4. STAY INFORMED ON DANGEROUS RISKS – When a leading bank with restrictive security has millions of accounts compromised, it is a wake call for security to be a top safety theme in our well connected society.  Security is only as strong as weakest point.  Recently, telephone call scams pretending to be the IRS, Microsoft, and other entities have emerged.  However in most cases, they use postal mail to contact folks on serious matters.  These are scams intended to rob folks ultimately.   There are “no free lunches on the Internet” and the appeal of winning or being chosen, may temp users to click on unsafe items.  Please avoid temptations to click on even false news alerts.  A few years ago a bad European 100 year storm hit and there was a “Storm Worm” virus that impacted many users.   Today, there are false Ebola news alerts circulating and clicking those links may implant a virus.  Sensationalized news alerts can be used to trick user.  Stay informed on security news bulletins & visit beneficial blog sites to stay educated on the dangers.

5. STAY UP-TO-DATE ON SOFTWARE – Update Windows, Anti-Virus and all other products on your system as soon as this is offered. Stay on latest version of browser, flash, and other software. Reboot your PC often to give it a fresh start and ensure latest patched components load for your protection.

6. USE SECURE PASSWORDS – Use strong password techniques and don’t use the same one for each site, but vary them to reduce harm if the bad guys happen to discover one. Consider putting an asterisk (*) or exclamation point (!) at end of password that you like using. Use 2-pass security and other approaches in lieu of passwords when feasible.

7. WIRELESS NETWORK SAFETY – Use or setup these resources with security in mind, as unsecure connections can be easily intercepted. Be especially careful with your mobile smartphone as it can provide a wealth of personal and sensitive information, if lost or stolen.  Please consider wireless as HIGH RISK both at home or away.

8. PHYSICAL SECURITY – Carefully handle laptops or mobile phones while traveling by air or driving or at hotel. Hide, lock, and secure these resources. Encrypting the hard drive is beneficial for frequent travelers and anyone desiring high levels of security.

9. RECOVERY FROM SECURITY EVENT – When personal information has been compromised or malware infections occur, quickly change all passwords, alert banks, change account numbers, and take other actions to minimize damages associated with loss of information.  The key is to quickly change credentials for anything that has been disclosed and ensure your security in future processing is restored under new & improved controls.

10. SECURITY IS A CONTINOUS IMPROVEMENT PROCESS – the bad guys are improving their tactics & defensively we must proactively respond as developments occur. The defense mechanisms of five years ago won’t work for today’s threats. Security requires re-thinking and re-evaluation of safety techniques constantly.

Removal instructions for AppLow

What is AppLow?

The Malwarebytes research team has determined that AppLow is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.

Microsoft Security Advisory Notification Issued: October 15, 2014

Security Advisories Updated or Released Today

* Microsoft Security Advisory (3009008)
– Title: Vulnerability in SSL 3.0 Could Allow Information
– »···/3009008
– Revision Note: V1.1 (October 15, 2014): Advisory revised to
include a workaround for disabling the SSL 3.0 protocol in

Patches to keep an eye on:

KB30000061 is a kernel update:
KB3000061 fails to install on Server 2012:   Also impacting Windows 8. EDIT:  Cases opened: 114101711916740 and 114101711915623


Two issues with KB2984972 – this is a patch to update the RDP restricted admin mode

“Heads up, KB2984972 on Server 2008R2 RD server caused issues with our Wyse thinclients – it caused them all to span desktops across multiple monitors rather than presenting multiple monitors to the host OS. After uninstalling & rebooting clients are presented with multiple monitors again.”  <<<< will impact MultiPoint Server as well too <<<<<

Another thread on the issue here:

App v and KB2984972 impact:   << case opened on this issue SRX 114101611907865.


KB2949927 – the SHA-2 update: Also seeing issues with KB2949927 getting installed:  and
EDIT:  KB2949927 has been pulled from Microsoft update on 10/17/2014


Then KB2995388 8.1 cumulative update causing issues with VMware workstation:

Workstation 10 issue with recent Microsoft Windows 8.1 Update | VMware Workstation Zealot – VMware Blogs:
We noticed that a recent Windows 8.1 Update (KB2995388) may cause issues when running VMware Workstation on a Windows 8.1 host with this update installed. User will see an error message “not enough physical memory” when booting up a virtual machine

Removal instructions for Share This

What is Share This?

The Malwarebytes research team has determined that Share This is adware. These adware applications display advertisements not originating from the sites you are browsing.

Recent Comments