Invalid Class String Error

Total Page:16

File Type:pdf, Size:1020Kb

Invalid Class String Error Tib4231 July, 2001 TECHNICAL INFORMATION BULLETIN Invalid Class String Error KODAK DC215, KODAK DC240, KODAK DC280, DC3400, and DC5000 Zoom Digital Cameras An Invalid Class String error may occur when you try to launch the camera software for the first time, or the Mounter or Camera Properties software may not operate properly.This error is caused when the program RegSvr32.exe is not located in the C:\Windows\System folder, preventing the DLL files from being registered. Use this document to help you properly locate the RegSvr32.exe program in your system, and if necessary, manually register the DLL files. The instructions in this document assume that you are familiar with copying and moving files in your computer, and installing software. Relocating RegSvr32.exe 1. Go to Start > Find > Files and Folders and search for regsvr32*.* Note the location of the program. 2. In WINDOWS Explorer or My Computer, copy RegSvr32.exe to the C:\Windows\System folder if it is not already there. When the file is in place, go on to Step 3. 3. Uninstall the KODAK software using the KODAK Uninstall application, or go to Start > Settings > Control Panel > Add / Remove Programs. 4. Close all background programs except Explorer and Systray by pressing Ctrl Alt Del, selecting each program one at a time, and clicking End Task after each. 5. Install the KODAK camera software. 6. Start the KODAK Camera Mounter and Camera Properties software for your camera. If the Invalid Class String error appears, manually register the DLL file using the procedure that follows for your camera. KODAK DC215 Zoom Digital Camera To manually register the DC215 dll files: 1. Go to Start > Run > and type: regsvr32 c:\program files\common files\kodak\dc215\dc215ctl.dll, and click OK. DllRegisterServer in C:\Program Files\Common Files\Kodak\DC215CTL.DLL succeeded appears. 2. Go to Start > Run > and type: regsvr32 c:\program files\kodak\dc215\mounter\dc215mnt.dll, and click OK. DllRegisterServer in C:\Program Files\Kodak\DC215\Mounter\DC215MNT.DLL succeeded appears. 3. Start the KODAK DC215 Camera Mounter, then the Camera Properties Software. If the Invalid Class String error occurs, repeat the DLL registration steps. KODAK DC240 and DC280 Zoom Digital Cameras To manually register the dc240ctl.dll file: 1. Go to Start > Run > and type: regsvr32 c:\program files\common files\kodak\dc240_dc280\dc240ctl.dll and click OK. DllRegisterServer in c:\program files\common files\kodak\dc240_280\dc240ctl.dll succeeded appears. 1 ©Eastman Kodak Company, 2001 Tib4231 July, 2001 2. Start the KODAK DC240 / DC280 Camera Mounter and Camera Properties Software. If the Invalid Class String error occurs, repeat the registration steps. KODAK DC3400 Zoom Digital Camera To manually register the DC3400 dll files: 1. Go to Start > Run > and type: regsvr32 c:\program files\common files\kodak\dc3400\dccamctl.dll, and click OK. “DllRegisterServer in C:\Program Files\Common Files\Kodak\DC3400\CTL.DLL succeeded” appears. 2. Go to Start > Run > and type: regsvr32 c:\program files\kodak\dc3400\mounter\dccammnt.dll, and click OK. “DllRegisterServer in C:\Program Files\Kodak\DC3400\Mounter\DCCAMCT.DLL succeeded” appears. 3. Start the KODAK DC3400 Camera Properties Software, then the DC3400 Mounter Software. If the Invalid Class String error occurs when launching either one of these applications, repeat the DLL registration steps. KODAK DC5000 Zoom Digital Camera To manually register the DC5000 dll files: 1. Go to Start > Run > and type: regsvr32 c:\program files\common files\kodak\dc5000\dccamctl.dll, and click OK. “DllRegisterServer in C:\Program Files\Common Files\Kodak\DC5000\DCCAMCTL.DLL succeeded” appears. 2. Go to Start > Run > and type: regsvr32 c:\program files\kodak\dc5000\mounter\dccammnt.dll, and click OK. DllRegisterServer in C:\Program Files\Kodak\DC5000\Mounter\DCCAMMNT.DLL succeeded” appears. 3. Start the KODAK DC5000 the Camera Properties Software, then the Camera Mounter Software. If the Invalid Class String error occurs when launching either one of these applications, repeat the DLL registration steps. Kodak is a trademark of Eastman Kodak Company 2 ©Eastman Kodak Company, 2001.
Recommended publications
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • How to Evade Application Whitelisting Using REGSVR32
    EXTERNAL/INTERNAL, RED TEAM, RED TEAM TOOLS CASEY SMITH, COM+ SCRIPLETS, DLL, FOLLOW US 10 SUBTEE, WEVADE, WHITELISTING MAY 2017 How to Evade Application Whitelisting Using REGSVR32 Jo Thyer // I was recently working on a Red Team for a customer that was very much up to date with their defenses. This customer had tight egress controls, perimeter proxying, strong instrumentation, and very tight application whitelisting controls. My teammate and I knew that we would have to work very hard to get command and control outbound from this environment, and that would be after obtaining physical access (yet another signicant challenge). Create PDF in your applications with the Pdfcrowd HTML to PDF API PDFCROWD The week before going on-site, we began to LOOKING FOR research all of the various methods for SOMETHING? potential application whitelisting bypass. We assumed the best case defensive scenario whereby the customer would have all binary execution blocked with the exception of specic applications permitted. In prior tests SUBSCRIBE TO THE with other customers and this same BHISBLOG customer, we had used “rundll32.exe” to execute DLL content. This method is really useful if you can host shellcode Don't get left in the dark! Enter within a DLL, and have a nice controlled entry point. In the Metasploit case, the your email address and every DLL entry point is named “Control_RunDLL”. While this might evade time a post goes live you'll get instant notication! We'll also whitelisting, we also knew this old trick had been played before and we likely add you to our webcast list, so could not count on it again.
    [Show full text]
  • Conversion Server User Guide
    www.AutoDWG.com Thank you for using AutoDWG Conversion Server Software AutoDWG Conversion Server With AutoDWG Conversion Server, companies can convert dwg to pdf, dwg to image automatically at high speed in a centrally-managed server. Users upload or drop dwg files into a watched folder, the drawing will be convert into pdf, dwf or image automatcially at once, Users can set up different folders in different output policy to specify output file type, and others setting. Features • Windows Service Program, no AutoCAD required in the server. • Supports dwg to pdf, dwg to jpg, dwg to bmp, dwg to gif, dwg to bmp, dwg to png conversion. • Supports AutoCAD drawing format from R2.5 to the latest version R2008. Email us [email protected] for more information and pricing. Download Free Trial Quick Start: • Install the software, register the DLL files and the acs.exe service o RUN: Regsvr32 “Full path\DWG2PDFX.dll” o RUN: Regsvr32 “Full path\DWG2imageX.dll” o RUN: Regsvr32 “Full path\mfc42.dll” o Set up the PS path, copy the whole folder of “PS” to C:\windows\system32\PS o RUN: acs.exe /service o Start the service from the [Windows control panel\Administrative tools\Services] • Launch AcsCtrl.exe to set up profiles of the watched folders and output file formats o Click menu button “File/New Profile” to create new watched folder o Right click on the existing listed input folder, click “add a profile” to create more out put file formats or copy files without convert • Click on the button “Start Server” to start the conversion service Æ Go to Trouble Shooting and learn more on the installation www.AutoDWG.com User’s manual The AutoDWG Conversion server is enterprise class software, and recommended to installed with a server, the requirements to the server listed as below: Hard ware requirements, CPU: PIII 1GHz or greater, a modern processor is recommended, since the conversion calculation will be kind of heavy loading to the CPU.
    [Show full text]
  • Cxspectra How to Fix Hasp Com Windows.Dll Is Missing / Not Found Error Messages
    CXSpectra How To Fix Hasp_com_windows.dll is Missing / Not Found Error Messages Overview of Hasp_com_windows.dll What Is Hasp_com_windows.dll? Hasp_com_windows.dll is a type of DLL file associated with HASP SRM Assembly for Microsoft .NET developed by Windows Software Developer for the Windows Operating System. The latest known version of Hasp_com_windows.dll is 3.5, which was produced for Windows. This DLL file carries a popularity rating of 1 stars and a security rating of "UNKNOWN". What Are DLL Files? DLL ("dynamic link library") files such as hasp_com_windows.dll are small programs, similar to EXE ("executable") files, which allow multiple software programs to share the same functionality (eg. printing). For example, let's say you are running Windows and editing a document in Microsoft Word. The DLL file that controls printing does not need to load unless it's function is needed - eg. you decide to print your document. When you select "Print", Microsoft Word calls the printer DLL file, and it is loaded into memory (RAM) at that time. If you want to print a document in another program, Adobe Acrobat for example, that same printer DLL file will be used as well. Why Do I Have DLL Errors? Because they are shared files, DLL files exist outside of the software application itself. Although this provides many benefits for software developers, this separation also provides an opportunity for problems to occur. Quite simply, if Windows cannot properly load your hasp_com_windows.dll file, you will encounter an error message. Please see "Causes of hasp_com_windows.dll Errors" below for more information.
    [Show full text]
  • Distributing Our Instrumentation Activex Controls You Only Need To
    Distributing our Instrumentation ActiveX Controls You only need to copy and register the OCX files for those components that you program uses on the destination computer to successfully distribute our ActiveX components. You can follow one of the following methods to distribute our components. Our ActiveX components have no dependencies on any other operating system files. WARNING!: under our license agreement, you are not allowed to distribute the LIC (license) files that are associated with our ActiveX components to your end user's computers. Also, there is generally no need to distribute the associated TLB files. Just distribute the OCX files. Manual Registration This method involves a manual installation of your compiled software and our ActiveX components. This is generally used in situations where you are only distributing your application to a few number of computers. 1. Copy the OCX files that your program requires (Example: copy the "iStripChartXComponent.ocx" and "isAnalogLibrary.ocx" files if your program uses our Strip Chart and Analog Gauge components) to the target computer's system directory. This is usually "C:\WINDOWS\SYSTEM" for Windows 95/98 and "C:\WINNT\SYSTEM32" for Windows NT/2000 systems. 2. Open up a command or DOS prompt and execute the following command in the system/system32 directory where you placed the OCX files. You can also use the START/RUN command... Windows 95/98 Component Command Line Analog (isAnalogLibrary.ocx) regsvr32 isAnalogLibrary.ocx Digital (isDigitalLibrary.ocx) regsvr32 isDigitalLibrary.ocx
    [Show full text]
  • The Response by the Security Community to Are All Retained
    The magazine you!re reading was put together during an extremely busy few months that saw us pile up frequent flier miles on the way to several conferences. You can read about some of them in the pages that follow, specifically RSA Conference 2009, Infosecurity Europe 2009 and Black Hat Europe 2009. This issue brings forward many hot topics from respected security professionals located all over the world. There!s an in-depth review of IronKey, and to round it all up, there are three interviews that you!ll surely find stimulating. This edition of (IN)SECURE should keep you busy during the summer, but keep in mind that we!re coming back in September! Articles are already piling in so get in touch if you have something to share. Mirko Zorz Editor in Chief Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Editor in Chief - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. Copyright HNS Consulting Ltd. 2009. www.insecuremag.com Qualys adds Web application scanning to QualysGuard Qualys added QualysGuard Web Application Scanning (WAS) 1.0 to the QualysGuard Security and Compliance Software-as-a- Service (SaaS) Suite, the company!s flagship solution for IT secu- rity risk and compliance management. Delivered through a SaaS model, QualysGuard WAS delivers automated crawling and test- ing for custom Web applications to identify most common vulner- abilities such as those in the OWASP Top 10 and WASC Threat Classification, including SQL injection and cross-site scripting.
    [Show full text]
  • Windows Embedded Standard 2009 Prepkit
    MCTSi Exam 70-577 Windows Embedded Standard 2009 Preparation Kit Certification Exam Preparation Automation Not for resale. ii Table of Contents Contents at a Glance 1 Creating and Customizing the Configuration 2 Managing the Development Environment 3 Integrating Embedded Enabling Features 4Creating Components 5 Generating and Deploying an Image 6 Adding Windows Functionality Chapter 3 Integrating Embedded Enabling Features This chapter discusses Microsoft® Windows Embedded Standard 2009 Embedded Enabling Features (EEFs), which are components that address scenarios specific to embedded devices, such as deploying run-time images on read-only media, managing and updating your device remotely, and mass deployment. Exam objectives in this chapter: ■ Implement Device Update Agent (DUA) ■ Implement a USB Boot solution ■ Implement Enhanced Write Filter (EWF) ■ Implement File Based Write Filter (FBWF) ■ Implement Message Box Default Reply Before You Begin To complete the lessons in this chapter you need the following: ■ Windows Embedded Studio for Windows Embedded Standard 2009 installed. ■ Completed Chapters 1 and 2. ■ The configuration you created in Chapter 1. 73 74 Chapter 3 Integrating Embedded Enabling Features Lesson 1: Implement DUA The DUA component enables you to remotely update the run-time image of your Windows Embedded Standard 2009 devices. It is a service that runs on your device and processes a script that performs update and maintenance operations. DUA is useful for updating Windows Embedded Standard 2009 images, and is a small component with few dependencies. With DUA, you can update applications or application data, deploy new binaries and device drivers, make registry changes, and automate cleanup and management tasks. After this lesson, you will be able to: ■ Add and configure DUA in your image configuration.
    [Show full text]
  • Troubleshooting Microsoft VSS Errors
    Macrium Reflect KB Troubleshooting Microsoft VSS errors Introduction Macrium Reflect uses a Microsoft service called Volume Shadow Copy Service (VSS) to create disk images and backup files when in use. VSS is a copy-on-write driver that intercepts disk writes before they actually happen. The contents of the disk are written to a shadow copy buffer before the write takes place. The disk image, therefore, represents an exact point-in-time and is not affected by disk write activity during image creation. When VSS fails you are unable to create a disk image or backup open files with Macrium Reflect. Macrium Reflect cannot cause VSS to fail. Any failure is caused by other software or system configuration problems and will affect every program that uses VSS. Failures must be located and fixed for disk images and file backups to complete successfully. VSS requires at least one New Technology File System (NTFS) to be present and online to operate. Otherwise, the error: E_PROVIDER_VETO s hows. 1. When VSS fails there is usually an indication in the image or backup log file which shows in the Macrium Reflect log: 2. Alternatively, the main VSS log can be seen as an option under the log view: 3. If required, and you are using the Macrium Reflect email component, you can send these logs via email. Right click the log entry. 4. select Send backup logs via email. 5. A common error is Failed to Create Volume Snapshot followed by a hex result code. The result code is an error code from VSS.
    [Show full text]
  • How to Re-Register Vss Dll Binaries (64 Bit)
    QBR Knowledge base HOW TO RE-REGISTER VSS DLL BINARIES (64 BIT) SCOPE If the command vssadmin list writers does not have any output the following batch file will help to re-register the VSS Service's associated DLL binaries. There may be other reasons in which QBR support may also ask to run this batch file besides the inability to list the VSS Writers of the OS. Please note this will only work on 64bit systems, if you have a 32 bit system there is a separate article on this KB for you. COPY THIS TEXT INTO NOTEPAD AND SAVE AS FIXVSS08.BAT Then run this batch file with administrative privileges. rem FILENAME: FIXVSS08.BAT rem net stop "System Event Notification Service" net stop "Background Intelligent Transfer Service" net stop "COM+ Event System" net stop "Microsoft Software Shadow Copy Provider" net stop "Volume Shadow Copy" cd /d %windir%\system32 net stop vss net stop swprv regsvr32 /s ATL.DLL regsvr32 /s comsvcs.DLL regsvr32 /s credui.DLL regsvr32 /s CRYPTNET.DLL QBR Knowledge base regsvr32 /s CRYPTUI.DLL regsvr32 /s dhcpqec.DLL regsvr32 /s dssenh.DLL regsvr32 /s eapqec.DLL regsvr32 /s esscli.DLL regsvr32 /s FastProx.DLL regsvr32 /s FirewallAPI.DLL regsvr32 /s kmsvc.DLL regsvr32 /s lsmproxy.DLL regsvr32 /s MSCTF.DLL regsvr32 /s msi.DLL regsvr32 /s msxml3.DLL regsvr32 /s ncprov.DLL regsvr32 /s ole32.DLL regsvr32 /s OLEACC.DLL regsvr32 /s OLEAUT32.DLL regsvr32 /s PROPSYS.DLL regsvr32 /s QAgent.DLL regsvr32 /s qagentrt.DLL regsvr32 /s QUtil.DLL regsvr32 /s raschap.DLL regsvr32 /s RASQEC.DLL regsvr32 /s rastls.DLL QBR Knowledge base regsvr32
    [Show full text]
  • Goengineer Content Word Template
    Common solutions for Regsvr32 errors Try one of the following methods when you receive a Regsvr32 error: Method 1: Re-run the Regsvr32 command from an elevated command prompt. To open an elevated command prompt, follow these steps: Right mouse click on the program CMD and Run as Administrator: 888.688.3234 | GOENGINEER.COM Windows 8.1 and Windows 8 Swipe in from the right edge of the screen, and then tap Search. Or, if you are using a mouse, point to the lower-right corner of the screen, and then click Search. Type Command Prompt in the Search box, right-click Command Prompt, and then click Run as administrator. If you are prompted for an administrator password or for a confirmation, type the password, or click Allow. Windows 7 and Windows Vista Click Start, type Command Prompt or CMD in the Search box, right-click Command Prompt, and then click Run as administrator. If you are prompted for an administrator password or for a confirmation, type the password, or click Allow. Windows XP Log on with an administrator account or an account that has administrator permissions, and then open a Command Prompt window. Once in the command prompt type in Regsvr32(space)then drag the needed DLL into the command window from Windows Explorer as shown below: DLL’s are located here: Type in the Command Prompt with REGSVR32<SPACE>: Have the DLL needed ready: 888.688.3234 | GOENGINEER.COM Now drag the DLL needed from the picture above and place it in the command prompt. Now hit Enter and the DLL is registered.
    [Show full text]
  • Local Security and Permissions
    Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | [email protected] | www.sevecek.com | LOCAL SECURITY AND PERMISSIONS Outline . Generic Terminology . NTFS Permissions . Registry Permissions . LDAP Permissions . File Sharing . Disk Quotas . Windows Management Instrumentation . Other Permission Settings . Windows Firewall . Service Accounts and Impersonation . Physical Security . BitLocker . Dynamic Access Control Advanced Windows Security GENERIC TERMINOLOGY Security Descriptor . Objects are protected with permissions files, folders, registry keys, LDAP objects, printers, windows, desktops, ... ACE – Access Control Entry one item in the permissions list Deny, Allow . ACL – Access Control List permission list . SACL – System Access Control List auditing ACL . Owner Object Owner . Members of Administrators group owner is Administrators group instead of the user . Can always change permissions even if explicitly denied . Take Ownership user right that allows taking ownership . CREATOR OWNER identity used as a placeholder to express the current owner of the file ACL Processing vs. ACE Order . ACEs are ordered Note: it is contrary to a common statement that Deny ACEs are always stronger the correct order must be maintained by applications when they modify ACL . ACEs are evaluated in the order present like with firewall rules Lab: Investigate Incorrect ACE Order . Log on to GPS-WKS as Kamil . Start REGEDIT . Right-click on SYSTEM/CurrentControlSet/Services/{anyGUID}/ Parametes/Tcpip and select Permissions . Note the text: The permissions on the object are incorrectly ordered, which may cause some entries to be ineffective . Click Cancel to see the incorrect order, click Advanced note that the Full Control permissions are lower than expected Auditing . Object Access auditing category general switch to turn auditing on/off .
    [Show full text]
  • Freefilesync Enables Additional Synchronization Scenarios Via a Command Line Interface
    Folder Comparison and Synchronization Usage: 1. Choose left and right directories. 2. Compare them. 3. Select synchronization settings. 4. Press Synchronize to begin synchronization. Main Dialog Overview 1. Start comparison 2. Change comparison settings 3. Include/exclude specific files 4. Change synchronization settings 5. Start synchronization 6. Tree overview panel 7. Add additional folder pairs 8. Select left and right folders 9. Synchronization preview 10. Save/load configuration 11. Select categories to show on grid 12. Synchronization statistics Command Line Usage FreeFileSync enables additional synchronization scenarios via a command line interface. To get a syntax overview, open the console, go to the directory where FreeFileSync is installed and type: FreeFileSync -h 1. Run a FreeFileSync batch job In order to start synchronization in batch mode, supply the path of a ffs_batch configuration file as the first argument for FreeFileSync.exe: FreeFileSync "D:\Backup Projects.ffs_batch" After synchronization one of the following status codes is returned: Return Codes 0 - Synchronization completed successfully 1 - Synchronization completed with warnings 2 - Synchronization completed with errors 3 - Synchronization was aborted You can evaluate these codes from a script (e.g. a cmd or bat file on Windows) and check if synchronization completed successfully: "C:\Program Files\FreeFileSync\FreeFileSync.exe" "D:\Backup Projects.ffs_batch" if errorlevel 1 ( ::if return code is 1 or greater, something went wrong, add special treatment here echo Errors occurred during synchronization... pause ) Instead of displaying "An error occurred!" you can also send an email notification (using a third party tool). Attention Make sure your script is not blocked by a popup dialog.
    [Show full text]