Entourage Repair to Fix "Not Enough Memory" in Microsoft Entourage

Are you unable to access your Entourage Inbox, Drafts folder, Deleted Items folder, and any of your subfolders of Inbox? You get memory errors while accessing items from your database. This behavior makes all your precious data inaccessible and leads to severe data loss. At this point of time, you need to opt for Entourage repair solutions to get your precious data back.

In a practical instance of this problem with your E-mail client, you may encounter the below error message while accessing data-

“Entourage cannot open the item due to an error. Not enough memory.”

This behavior renders all your precious data inaccessible. In order to recover Entourage database in such cases, you need to find out the cause of this issue and fix it using appropriate solutions.

Root of the problem-

Unfortunately, the above error is not caused by memory problems. This is actually a wrong description on generic error, which can be caused by number of other things, such as-

  • If you get this error while receiving emails, it can be due to a corrupt message.
  • The fonts are faulty or damaged.
  • Your Mac RAM (Read Only Memory) is either low or damaged.
  • Entourage database is either corrupt or unrecognizable.

Resolution-

  • Log into your account using web browser and remove the damaged items.
  • Install new fonts or remove the faulty fonts.
  • Replace or Upgrade your Macintosh RAM.
  • Restore your database from the most recent backup. You are recommended to repair Entourage database from backup only if it is updated.

If you cannot perform Entourage database recovery using any of the above methods, you need to opt for Entourage recovery software to get your data back. Entourage repair software are capable of retrieving inaccessible data in all data loss situations.

Importance of PDF Files

Portable Document Format is a computer application used for transmitting extensive information from one system to another. This electronic format enables the users in getting bulky content across multiple platforms easily and swiftly. The PDF file format is independent of the computer operating system, computer hardware and application software. This attribute makes the PDF file format portable and compatible on any system. It is can incorporate hyperlinks, bookmarks, text, graphics or multimedia content. Therefore, PDF is widely used by the computer users all over the globe.

Significance of PDF file format:

Portable Document Format is used for effective coordination between the physically distant people. In other words, you can store, transmit and exchange data with any other computer user using system with different configurations. The PDF format can be used for managing vast amount of information in electronic files rather than handling bulky papers. There are chances of papers being spoiled with the passage of time. You may need to store the papers in the shelves and maintain those shelves or the store room. Then using papers lead to the increase in its demand. In order to make papers, industries need wood which is obtained by the trees. The felling of trees leads to ruining of green environment. However, such is not in the case of using electronic documents. You can use the PDF format for storing extensive data such as graphics, images, charts, tables or hyperlinks and much more.

A person can add interactive features in the files in this format. You can incorporate multimedia content to these files. A person can protect the content of the PDF files from being hampered or damaged. It is easy to set the security features in the PDF files. One can protect the PDF files from unauthorized copying, editing, viewing or printing. This protects the misuse of content in the documents. You can also recover a file in this format when it gets corrupt. There are many tools and techniques available which help you in recovering the corrupt PDF files easily. One can create PDF files out of any other format and convert the PDF format into any other application. The conversion ability and other beneficial features of these files make the task of the user smooth and flexible. There are various conversion tools available in market to convert different file formats into PDF. For instance, you can use word to PDF converter software to make conversion fast and easy.

A viral marketing task by Kelvin Scotts, top marketing agencies in singapore that provides full suite social media marketing services.

PCI Slots – An Integral Part of Your New Industrial Computer

PCI Slots have become the industry standard for expansion technology and connectivity. Correctly configuring your new PCI-based Industrial PC is essential to keeping your industrial computing process moving smoothly. Let’s look at how and why this benefits your business.

1. Many PCI slots available – up to 18 in a system

When you need to host lots of expansion devices, you need lots of slots. Configure up to 18 PCI slots in your new industrial computer so you know you’ll have room to grow.

2. Long term 3-5yr availability

When configuring an industrial computer for your PCI needs, it’s important to choose one with long-term availability, especially if your are designing a system that will have to be reproduced at a later date. Only a reputable industrial computer supplier that offers long-life industrial motherboards, single board computers (SBC), passive backplanes, and Panel PCs can guarantee long term support.

3. Bus Mastering

Expansion devices are capable of taking control of the PCI bus to perform direct data transfers. It is important to understand the requirements of your PCI expansion, IO and Data Acquisition cards and their compatibility with an industrial computer PCI bus. A quality industrial computer supplier will work with you to understand your requirements and verify system compatibility, so your industrial computer system arrives working as expected.

4. Support for the future

An industrial computer manufacturer that understands the industrial market place will offer support for past, current and future technologies. While most data acquisition, control and interface expansion cards are available today in PCI interface; the future of PCIe and 64-bit PCI (3.3V 64-Bit, 5V 64-Bit, PCI-X) interface is already here. Further, most industrial computing applications still have ISA cards that they can’t do without. It is important to choose an industrial computer supplier that provides PCIe expansion (aka PCI Express, Peripheral Component Interconnect, PCI-E) as well as PCI and ISA. PCIe sockets can be configured for PCIe x1, PCIe x4 and PCIe x16 devices. PCIe allows for faster device communication as it eliminates the need for the bus to switch priorities between devices. Choosing a 64 bit PCI-capable board doubles the rate of data transfer for capable devices over 32-bit PCI. Make sure to correct the right PCI Slots for your needs!

5. Built for Industry

Your equipment works hard. That’s why we offer standard features such as multiple serial ports (RS-232/RS-422/RS-485, watchdog timer, onboard digital IO, dual gigabit Ethernet ports, many USB ports, onboard RAID, Hardware Monitoring (CPU/system temperature, CPU/system voltage, CPU/system Fan), SMBus (System Management Bus for advanced monitoring / control interface), IntelĀ® iAMT & iTPM support and robust-durable industrial chassis. Your industrial computing application is too important to trust to off the shelf desktop models.

A online marketing blog post by Kelvin Scotts, top marketing firms in singapore that provides full suite social media marketing singapore services.

How to Fix FIFA 14 Crashes?

This article contains workarounds to help fix FIFA 14 crashes on Windows 8/ 7/ Vista and XP. The tips and tweaks included in this article have already helped many users.

Check Hardware Requirements

There are some predefined hardware requirements in the ReadMe file. Your computer must have all of them installed in order to play the game.

  • Operating System: Windows 8/ 7/ Vista Service Pack 1
  • Intel Core 2 Duo Processor 1.8 GHz
  • 2 GB of Memory
  • 8 GB of Free Hard Disk Space
  • 3D Accelerated and Pixel Shader supported Video Card and DirectX Compatible Audio Card

Update Origin

Origin needs to be updated as follows:

  1. Launch Origin user interface.
  2. Right click the game entry, choose “Check for update”.

Provide Administrative Rights to Origin File

The origin file could be facing compatibility problems with the operating system. Windows provides a way to deal with compatibility problems.

  1. Open My Computer.
  2. Press F3 key to locate Search.
  3. Type “Origin.exe” in the Search box.
  4. Press ENTER.
  5. Right click the file from the Search Results, select Properties.
  6. Click Compatibility tab, check-up “Run this program in compatibility mode for” checkbox and choose an earlier Windows version.
  7. Click OK.

Change FifaSetup_Default.ini Settings

This file contains default configurations. In this file you’ll find two strings related to your computer’s screen resolution. Check if the screen resolution mentioned in the file matches with your current screen resolution. If it doesn’t, make appropriate modifications in the file.

  1. Open My Computer, press F3 and search for “fifasetup_default.ini” file.
  2. Right click the file in the search results and open it with Notepad.
  3. Click Edit | Find, search for “RESOLUTIONWIDTH” and “RESOLUTIONHEIGHT”:
  4. Replace existing values with appropriate width and height.
  5. Click File | Save and then exit.

Resolve Data Execution Prevention Conflicts

Sometimes DEP conflicts with your game. It prevents the smooth running of the executable file. Add the game file to the list of DEP Excluded Items as follows:

  1. Right click My Computer, select Properties.
  2. Click Advanced System Settings in the left hand side panel.
  3. A new dialog opens with Advanced tab opened.
  4. Click the Settings button under Performance frame.
  5. Click the Data Execution Prevention tab, the last one.
  6. Choose “Turn on DEP for all programs and services except those I select”, click Add and locate the following EXE files:
  7. C:Program Files (x86)Origin GamesFIFA 14Gamefifa14.exe
  8. C:Program Files (x86)Origin GamesFIFA 14Gamefifa14.exe
  9. Click OK twice.

Re-register Game Components

Game components such as DLL files and server settings need to be re-registered. This will fix FIFA 14 crashes.

1. Click Start, type “Command Prompt” in the Search Box.

2. It’ll appear in the Search Results.

3. Right click it, select Run as administrator.

4. Type following commands one by one. Press ENTER after each command ends.

regsvr32 atl.dll

cd C:WINDOWSeHome

ehSched /unregServer

ehSched /service

ehRecvr /unregServer

ehRecvr /service

ehRec.exe /unregServer

ehRec.exe /regserver

ehmsas.exe /unregServer

ehmsas.exe /regserver

5. Close the Command Prompt dialog.

Reset Folder Permissions

There is a possibility that the FIFA 14 folder may not have enough administrative permissions. When this is the case, you will provide read/ write permissions to the folder and all of its contents (sub folders, files).

  1. Open C:Program Files (x86).
  2. Right click FIFA14, select Properties.
  3. Click Sharing | Advanced Sharing | Permissions.
  4. Check-up “Full Control” and click OK.

Delete User Preferences

The user preferences are stored in a separate folder called as “FIFA 14” which is located in the My Documents folder. Due to corruption of these files, you are experiencing FIFA 14 crashes.

  1. Open My Documents.
  2. Delete the folder “FIFA 14” to the Recycle Bin.

Note: DO NOT delete it permanently.Just in case the crashes are still occurring, we can easily restore it.

The best way is to download FIFA 14 Crash-Fix. Install and run the downloaded program, conduct full scan and repair the problem automatically.

A social media marketing blog post by Kelvin Scotts, top marketing agency that provides full suite social media marketing services. More details, visit here.

How To Quickly Make A Bootable USB Stick With FreeBSD

Install FreeBSD, or use an existing FreeBSD installation, and follow these steps:

1) First, you need to prepare and format your USB stick:

fdisk -BI /dev/da0
bsdlabel -B -w da0s1
newfs -U -O1 /dev/da0s1a
boot0cfg -v -B da0
(“-U -O1” [“O” like in Olympus, not zero] is for UFS1 which provides much faster copying than UFS2; if you decide for UFS2, type “-U -O2” – but expect that the copying will be slower)

2) Then mount it: mount /dev/da0s1a /usb
3) Copy all directories (FreeBSD) to the stick
4) After copying, modify the /usb/boot/loader.conf (explained below)
5) In the /boot directory on your USB stick you must have MFS (Memory File System – mfsroot.gz), which you will make (instructions are below)
6) Modify your /etc/fstab in MFS and put the following line (only) there:
/dev/md0 / ufs rw 0 0
7) After you boot your computer with the stick, you will be in the MFS environment from which you will mount your USB stick with mount_nullfs (described below)

Modification of /boot/loader.conf on your USB stick

You must have the following lines in your /boot/loader.conf (some lines are optional):

mfsroot_load=”YES”
mfsroot_type=”mfs_root”
mfsroot_name=”/boot/mfsroot”
nullfs_load=”YES”
splash_bmp_load=”YES”
vesa_load=”YES”
geom_uzip_load=”YES”
geom_label_load=”YES”
bitmap_load=”YES”
bitmap_name=”/boot/splash.bmp”
snd_driver_load=”YES”
kern.maxfiles=”25000″
kern.maxusers=”64″
vfs.root.mountfrom=”/dev/md0″

# Additional filesystem drivers

udf_load=”YES”
linux_load=”YES”
fuse_load=”YES”
ntfs_load=”YES”
ext2fs_load=”YES”
reiserfs_load=”YES”

Making your own MFS

FreeBSD, after the kernel boots, can use the root file system in memory (mfsroot_load=”YES” command in /boot/loader.conf will do the trick). To build such a memory file system, type the command:
dd if = /dev/zero of = mfsroot bs = 1024k count = 42

The mfsroot file of about 40 MB in size will be created. You need to format it, mount it and copy the most important files into it from your FreeBSD system (/bin, /sbin, /etc, /root….):

mdconfig -a -f mfsroot md0
newfs /dev/md0
mount /dev/md0 /mnt

Once copied, you must unmount it and gzip it: gzip mfsroot

Optionally, you can chroot it to see if everything works, then copy the mfsroot.gz to /usb/boot onto your USB flash drive (or disk). If you think it may be a problem to pick the most important files for your MFS (from your FreeBSD installation), search for mfsbsd in Google and either use its toolset or the MFS image alone (contained in the downloadable ISO of mfsbsd).

After booting from the USB stick (you will jump into MFS), you must mount the physical USB stick:

/sbin/mount -o ro /dev/da0s1a /usb
/sbin/mount_nullfs /usb/boot /boot
/sbin/mount_nullfs /usb/usr /usr

The above commands will help you use the big /usr directory on your USB stick instead of the /usr dir in MFS. mount_nullfs /usb/boot /boot is optional, as in your MFS/boot directory only the following files are needed for the little MFS to boot (/boot/kernel directory in MFS): geom_label.ko, geom_uzip.ko, zlib.ko a their debug symbols (zlib.ko.symbols, etc.). By mounting the /usb/boot dir via mount_nullfs into the /boot directory in your MFS you will be able to load kernel modules.

How to Recover Deleted Emails and Restore Them Completely

It can happen to anyone. We accidentally delete an email that we really need. And it just happened to be important work file, attachment or picture. So now what? How can I recover that email? Is it at all possible? Surely, it can be permanently deleted?

Well, there is good news and bad news.

Let’s start with the good news.

Restoring Deleted Emails

If you delete an email, it hasn’t really gone anywhere. Even if you’ve emptied your recycle bin or the “Trash” folder in your Inbox – the email still isn’t deleted. It’s just that your computer system now has no way to figure out where it is. But it’s there, still on your hard drive. By using special email recovery tools you can recover deleted emails because these programs identify these ‘missing’ files and can bring them back to life.

Now the bad news.

Act Quickly and Increase Your Chances

The bad news is you have to act quickly. You only have a small time-frame in which to try to attempt to recover your lost email. Every minute that you waste and continue to use the drive for anything that isn’t related to recovering your emails, you severely decrease your chances of successful email recovery. Why?

Well, because your hard drive is constantly overwriting files to make space for new information you put into it. If your hard drive is full and there is not much space or memory available – it is highly probable that the email has already been overwritten and deleted – permanently.

Other Problems with Recovering Deleted Emails

Not all deleted or lost emails go to “Trash” folder. If you have suffered a computer crash or hardware failure or your operating system is corrupted in some way, then it is unlikely that emails you have deleted can be recovered.

Also, if you haven’t opened the email at all or it hasn’t been deleted the usual way due to file corruption, you probably will have less of a chance to recover and restore the email in its entirety.

Nothing to Lose

Recover deleted email programs search and locate the emails that you have deleted. You can search by entering a specific keyword for example. Then, you can choose to preview the email to see it’s contents and if it’s been recovered in its original state by the program. You can also select to scan for what ever email program you are using (and need to recover) – either web based emails such as Hotmail, Yahoo and Gmail or Outlook Express.

Best bit is this. Most of these email recovery programs are free to download. When they start scanning your hard drive looking for the deleted email and then manage to find it and when you are completely satisfied that that’s your missing email – then you can then proceed to purchase the software.

In essence, you have nothing to lose (if the email is not there – it’s not there) and everything to gain.

Well, at least you can get your deleted email back.

10 Reasons Why Regular Network Administration and Housekeeping is So Important

Data storage housekeeping is an essential part of the process for keeping systems running smoothly. Below are 10 reasons why regular network administration and housekeeping is so important:

1. Backup administration: it is important for all networks to be properly backed up, but the back up process can be in a compressed for off site and off server so that redundant data does not slow down the day to day operation of network systems.

2. Anti-virus updates: for obvious reasons, anti-virus software has to be updated but the continual updating gradually uses up an inordinate amount of space on hard drives. Removing anti virus software and reinstalling the updated version can free up space on hard drives.

3. Operating system updates: updates that are regularly loaded and then installed use up more space on hard drives than the latest updated version of an operating system. It is advisable for operating systems to be reviewed and renewed so that the debris from past updates can be safely removed to free-up space.

4. Old archive data: many organisations archive work in process that often has no relevance to the finished product especially years later. It is usually the fear that data may one day be required that ensures its continual storage, but if it is not to be destroyed then it should be compressed and stored in a separate offline storage facility that does not affect the day to day running of your network.

5. Data storage: the issue surrounding data storage is full of myths and legends but a reasonable level of data storage is advisable. However, it is easy for data storage to use up so much space that the cost of the storage far outweighs its possible value. Of course, items to do with HM Customs & Revenue need to be securely stored but old projects, long out of date can and should be quietly deleted.

6. Email boxes: many network systems offer a means of distributing mail to individual mail boxes. When individuals leave an organisation, the mail boxes are often forgotten and gradually fill up with mail and a great deal of junk all, of which, uses up precious space on servers.

7. Disused software: regular housekeeping should make note of programs that can slow down a system through background operation and yet are entirely not used or needed. The removal of those programs should be a priority.

8. Anti-virus programs: it has been mentioned above that anti virus programs leave a lot of update debris but it should also be noted that often anti virus programs that are believed to have been uninstalled to allow for a new program, in effect, often still retain a background presence on hard drives and should be removed.

9. Time saving: even with sophisticated computer systems, individuals misname and misfile documents. Once an item has been archived then it will be almost impossible to find if hidden within the wrong folder. Before items are archived, documents should be checked for relevance and filed correctly. It is very easy for an archive to have over one million documents and if an item is misfiled a lot of time is wasted trying to retrieve it.

10. KITS: keep it tidy, Sam and then when you are sick or away on holiday it is possible for another person to find all the information and material you’ve been working on, easily. Individuals, unless coerced, often have their own private files and means of storage for easy personal access. Often, these files are password protected and are therefore inaccessible when the individual is away or sacked from a position. Squirreling of files should be discouraged.

Solution to Error-Mount – Wrong File System Type

LINUX operating system is popular for its new-age advanced technology and features. LINUX facilitates working on the same computer along side Windows. The process of having two different operating systems on a single computer is known as dual boot, where you can have choice to choose either of the listed operating systems at the boot time. LINUX is the most widely used complete open source operating system and has the bare minimum compatibility issue with other popular operating systems. However, sometimes, accessing of LINUX volumes from Windows can’t be possible and error occurs while accessing the same from LINUX also. In such cases, you have to look for any LINUX data recovery utility to recover your valuable LINUX data back.

Let us elaborate the scenario, suppose that you are having Windows and LINUX on the same computer under a multi-booting mixed-OS system. You tried to mount the ext2 based LINUX volume but failed to do so with some error messages on the screen. Thereafter, you tried to boot your system with LINUX OS, but failed to do so with some boot errors and the data remains completely inaccessible. The error messages that flashed on the screen while trying with Windows can be read as follows:

“mount: wrong file system type, bad option, bad superblock, or too many mounted file systems”

Or

“can’t find ext2 File System on dev ide1 (22, 65)”

Possible cause:

The most likely reason behind the above problem is a possible LINUX volume or file system corruption. Usually due to virus attack, unsystematic shut down, unconventional mounting of the drive etc, such file system corruption occurs.

In order to resolve the above error, it is wise to format and reinstall the OS. It is the data in the LINUX drive that is more important than the resolution of the error. Hence, either you can restore the data from the backup or you have to opt for any LINUX data recovery software or ext2 recovery utility.

These LINUX data recovery utilities are developed to recover the lost, formatted or inaccessible data from any LINUX partitions, irrespective of the data loss situation. In addition to this, their lucid functionality and stepwise instructions place them among the user friendliest utilities.

Stellar Phoenix Linux Data Recovery is a recovery utility meant to recover any lost, deleted, inaccessible or formatted LINUX data from ext4, ext3, ext2, FAT16, FAT12 and FAT32 file system based volumes. The software incorporates features like creating of image, save scan etc and can recover your data irrespective of the hard drive type.

Disaster Recovery and Business Continuity

Disaster recovery planning and preventive measures ensure business continuity. The main question is “What if an attacker succeeds and renders an organization’s functions impossible?” Whether the break in business continuity is a short or long one, this is where an organization’s disaster recovery plans comes into play. The disaster recovery plans define the resources, actions, and data required to reinstate critical business processes that have been damaged or disabled because of a disaster. By focusing on disaster recovery plans and preventions, network managers can minimize the impact that catastrophic events may have in their environment. The recovery plan is the best way to insure that a business survives an IT emergency.

The various potential disasters that security administrators need to be concerned about can be classified as human induced incidents, natural, internal, armed conflict, and external. Human induced incidents can include loss of power, transportation accidents, and chemical contaminations. Natural incidents can include flood, earthquake, and tornado. Internal incidents include sabotage, theft, and employee violence. Armed conflict can include acts of terrorism, like the 911 attacks, civil unrest, and war. External incidents include hacking, unauthorized use, and industrial espionage.

Organizations identify potential threats and analyze what needs to be achieved in order to continue operating as though nothing had happened. After identifying these potential threats, security administrators can be in a better position to protect the mission-critical information systems.

Data backup is an essential part of any disaster recovery plan. Data backup allows personnel to restore files and application software that is vital to continue business. An effective data backup strategy should address how often backups are run, type of backup medium, when the backups are run, are backups automated or manual, backup verification, storage, who is responsible for the backups, and the fallback person responsible for backups. Addressing the need for off-site storage may also be an important guideline for organizations with extensive business-critical data (Boswell…, 2003 p. 433).

Organizations must include thorough planning and testing and include provisions for business continuity. Anticipating disasters is the first in the process. There is a lot to be learned and corrected from the testing phase and it needs to be taken very seriously. The testing exercise helps minimize losses during an actual attack. An effective disaster recovery plan should include the following documents: a list of covered disasters, a list of the disaster recovery team members, a business impact assessment, a business resumption and continuity plan, backup documentation, and restoration documentation.

It has been said that the most important step in managing potential disasters is to have in place a well-trained and ready to respond team including a member from senior management, members of the IT department, representatives from facilities management, and representatives from the user community affected by the crisis. In a real crisis, the disaster recovery team meets to evaluate and determine the sources of the disaster and identify the critical components that are affected. The team than assesses the business impact of the disaster, estimating how long the disaster may disrupt business continuity. In this process the cost of the disaster is also ascertained. Exhaustively documenting changes that are implemented during the rush to solve the problem is also crucial.

It is also important that organizations show their commitment to these plans that come from the IS department by adopting well-defined security policies and human resource policies that reflects their support to information security. A useful and well-written security policy should include sections on acceptable use, privacy, due care, separation of duties, “need-to-know” issues, password management, service-level agreements, and the destruction or disposal of information and storage media (Boswell…, 2003 p. 437). Human resources policy deals with personnel management. There should be thorough hiring practices including background, reference, and educational checks. To minimize a security risk, employees should have periodic reviews and rotate job functions and duties, which is beneficial in an emergency due to the more even distribution of information. Employee termination practices are also important in the protection and prevention of threats. Exit interviews should be conducted, individuals should be escorted off the property, and the terminated employee’s computer accounts and passwords should be deactivated and changed. A code of ethics should also be included in an organization’s human resources policy. This would help define and clarify the company’s stance on information security and provide a foundation built on ethics (Boswell…, 2003 p. 441).

An incident response policy can also play a critical role. This policy covers how to deal with a security incident after it has occurred. Following a sound incident response methodology lessens the likelihood that incompetent and inefficient actions will occur and contributes to the practice of due care. An incident response policy should follow the steps of preparation (being ready before an incident occurs), detection (recognizing the presents of malicious code or whether files have been altered), containment (preventing further loss or disruption of services), eradication (removing viruses or malicious code along with cleaning and reformatting hard drives that were affected), recovery (restoring the system), and follow up (develop set of lessons learned) (Boswell…, 2003 p. 442).

In conclusion, in is important to combine a disaster recovery plan with a well-defined and documented security policy, human resources policy, and incident response policy, which can minimize the effects of a catastrophic event and help assure business continuity. It is said, “Failure to prepare is preparing to fail.”

Works Cited

Boswell, S., Calvert, B., Campbell, P. (2003). Security + Guide to Network Security

Fundamentals. Boston, Massachusetts: Thomson Course Technology.

Password Recovery on the Cisco ASA Security Appliance

In this article, I’ll explain how to perform a password “reset” on your Cisco ASA security appliance. The more commonly used term for this procedure is “password recovery” which is left over from the days when you could actually view passwords in configuration files in plain text. Today, such passwords are encrypted and not actually recoverable. Instead, you will gain access to the appliance via the console port and reset the password(s) to known values.

This procedure requires physical access to the device. You will power-cycle your appliance by unplugging it at the power strip and plugging it back in. You will then interrupt the boot process and change the configuration register value to prevent the appliance from reading its stored configuration at boot. Since the device ignores its saved configuration on boot, you are able to access its configuration modes without passwords. Once you’re in configuration mode, you will load the saved configuration from flash memory, change the passwords to a known value, change the configuration register value to tell the device to load its saved configuration on boot, and reload the device.

Caution: As with all configuration procedures, these procedures should be tested in a laboratory environment prior to usage in a production environment to ensure suitability for your situation.

The following steps were designed using a Cisco ASA 5505 Security Appliance. They are not appropriate for a Cisco PIX Firewall appliance.

1. Power-cycle your security appliance by removing and re-inserting the power plug at the power strip.

2. When prompted, press Esc to interrupt the boot process and enter ROM Monitor mode. You should immediately see a rommon prompt (rommon #0>).

3. At the rommon prompt, enter the confreg command to view the current configuration register setting: rommon #0>confreg

4. The current configuration register should be the default of 0x01 (it will actually display as 0x00000001). The security appliance will ask if you want to make changes to the configuration register. Answer no when prompted.

5. You must change the configuration register to 0x41, which tells the appliance to ignore its saved (startup) configuration upon boot: rommon #1>confreg 0x41

6. Reset the appliance with the boot command: rommon #2>boot

7. Notice that the security appliance ignores its startup configuration during the boot process. When it finishes booting, you should see a generic User Mode prompt: ciscoasa>

8. Enter the enable command to enter Privileged Mode. When the appliance prompts you for a password, simply press (at this point, the password is blank): ciscoasa>enable Password: ciscoasa#

9. Copy the startup configuration file into the running configuration with the following command: ciscoasa#copy startup-config running-config Destination filename [running-config]?

10. The previously saved configuration is now the active configuration, but since the security appliance is already in Privileged Mode, privileged access is not disabled. Next, in configuration mode, enter the following command to change the Privileged Mode password to a known value (in this case, we’ll use the password system): asa#conf t asa(config)#enable password system

11. While still in Configuration Mode, reset the configuration register to the default of 0x01 to force the security appliance to read its startup configuration on boot: asa(config)#config-register 0x01

12. Use the following commands to view the configuration register setting: asa(config)#exit asa#show version

13. At bottom of the output of the show version command, you should see the following statement: Configuration register is 0x41 (will be 0x1 at next reload)

14. Save the current configuration with the copy run start command to make the above changes persistent: asa#copy run start Source filename [running-config]

15. Reload the security appliance: asa# reload System config has been modified. Save? [Y]es/[N]o:yes

Cryptochecksum: e87f1433 54896e6b 4e21d072 d71a9cbf

2149 bytes copied in 1.480 secs (2149 bytes/sec) Proceed with reload? [confirm]

When your security appliance reloads, you should be able to use your newly reset password to enter privileged mode.

Copyright (c) 2007 Don R. Crawley