Edventures in Normalcy

When logging into a fresh installation of SmarterMail 13 and below, I was given the following error:


There was an issue that caused this page to malfunction.

System.Reflection.TargetInvocationException: Exception has been thrown by the target of an invocation. —> System.InvalidOperationException: This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms.
at System.Security.Cryptography.MD5CryptoServiceProvider..ctor()
— End of inner exception stack trace —

Server stack trace:
at System.RuntimeMethodHandle.InvokeMethod(Object target, Object[] arguments, Signature sig, Boolean constructor)
at System.Reflection.RuntimeConstructorInfo.Invoke(BindingFlags invokeAttr, Binder binder, Object[] parameters, CultureInfo culture)
at System.Security.Cryptography.CryptoConfig.CreateFromName(String name, Object[] args)
at System.Security.Cryptography.MD5.Create(String algName)
at System.System_ExtensionMethods7BCA73B06BAB478aA3AC6AC60979BA25.GetMD5Hash(String val)
at MailService.Remoting.RemoteSecurity.GetNewKey()
at MailService.Remoting.Mail.InitializeSession()
at System.Runtime.Remoting.Messaging.StackBuilderSink._PrivateProcessMessage(IntPtr md, Object[] args, Object server, Object[]& outArgs)
at System.Runtime.Remoting.Messaging.StackBuilderSink.SyncProcessMessage(IMessage msg)

Exception rethrown at [0]:
at System.Runtime.Remoting.Proxies.RealProxy.HandleReturnMessage(IMessage reqMsg, IMessage retMsg)
at System.Runtime.Remoting.Proxies.RealProxy.PrivateInvoke(MessageData& msgData, Int32 type)
at SmarterMail.RemoteInterface.IMail.InitializeSession()
at SmarterTools.SmarterMail.Remoting.RemoteMail.InitializeSession()
at SMWeb.HelperClasses.Security.LoginHelper.DoLogin(String email, String password, Boolean impersonationLogin, String visitorIpAddress)
at SMWeb.Login.DoLoginInternal(String username, String password, Boolean rememberMe)
at SMWeb.Login.DoLogin()
at SMWeb.Login.btnLogin_Click(Object sender, EventArgs e)
at System.Web.UI.WebControls.LinkButton.OnClick(EventArgs e)
at System.Web.UI.WebControls.LinkButton.RaisePostBackEvent(String eventArgument)
at System.Web.UI.WebControls.LinkButton.System.Web.UI.IPostBackEventHandler.RaisePostBackEvent(String eventArgument)
at System.Web.UI.Page.RaisePostBackEvent(IPostBackEventHandler sourceControl, String eventArgument)
at System.Web.UI.Page.RaisePostBackEvent(NameValueCollection postData)
at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)

I found that a previous lockdown server in turn caused SmarterMail to fail to login whether using the Built in Web service or a site through IIS. The correction was listed here:


  • Change the configuration in the application-level Web.config file. Specify that ASP.NET use the Triple Data Encryption Standard (3DES) algorithm to process view state data
  • Disable FIPS compliant algorithms for encryption, and restart the SmarterMail Service.
  • Upgrade to SmarterMail 14


To “change the configuration in the application-level Web.config file. Specify that ASP.NET use the Triple Data Encryption Standard (3DES) algorithm to process view state data”: https://support.microsoft.com/en-us/kb/911722

  1. In a text editor such as Notepad, open the application-level Web.config file.
  2. In the Web.config file, locate the <system.web> section.
  3. Add the following <machineKey> section to in the <system.web> section:
  4. Save the Web.config file.
  5. Restart the Microsoft Internet Information Services (IIS) service. To do this, run the following command at a command prompt:


“#1 On Windows Server 2008 and in Windows Vista set the registry value for HKLM\System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy\Enabled to 0.
On Windows Server 2003 and in Windows XP set the registry value for HKLM\System\CurrentControlSet\Control\Lsa\FIPSAlgorithmPolicy to 0.
You will need to restart the machine for this setting to take effect.

#2 Launch Local Security Policy from Control Panel->Administrative Tools. Expand Security Settings->Local Policies->Security Options. Open the security policy “System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing” and select the Disabled option. Retstart the machine.”

I was on TV, specifically Adult Swim.

Posted by Rose Bush on June 11th, 2015

I put my X the Eliminator Costume on the Dear Adult Swim forum, and along with many others, had the costume shown on live TV.  I found this video below at http://www.bumpworthy.com.

Microsoft Rich Copy

Posted by Rose Bush on June 11th, 2015

So, there is this tool, and if you Google for it, Microsoft Rich Copy, you end up here:

Click the ‘download Microsoft Rich copy’ link, and you will be prompted to download HoffmanUtilitySpotlight2009_04.exe, its 5.8 MB. Run this, Agree to the License Agreement, give it a path. It will export the HoffmanUtilitySpotlight folder to that location. Inside that folder, you will have the actual installer. Per the readme.txt: “It is simple. Please just run setup.exe. It will ask you all
necessary information to get RichCopy installed.”


Hoffman Utility Spotlight (91)

A handful of HTML and ASCII Symbol Codes

Posted by Rose Bush on June 11th, 2015


↓ Down arrow &darr;
‾ Overline &oline;
← Left arrow &larr;
→ Right arrow &rarr;
↑ Up arrow &uarr;
℠ Service Mark &#8480;
℃ Celsius &#8451;
℅ care of &#8453;
℉ Farenheit &#8457;
№ numero symbol – number sign &#8470;
℗ Sound Recording Copyright &#8471
℞ Prescription Take pharmaceutical symbol &#8478
Ω Ohm &#8486
℧ Inverted Ohm &#8487
☀ sunshine – sun &#9728
☁ cloudy – cloud &#9729
☂ raining – rain &#9730
☃ snow – snowman &#9731
☄ comet &#9732
★ star solid &#9733
☆ star outline &#9734
☇ lightning &#9735
☈ thunderstorm &#9736
☉ sun &#9737
☊ ascending node &#9738
☋ descending node &#9739
☌ conjunction &#9740
☍ opposition &#9741
☎ phone number – phone service &#9742
☏ phone symbol outline &#9743
☐ check box – ballot box &#9744
☑ ballot box check mark &#9745
☒ ballot box with X &#9746
☓ Saltire – St. Andrew’s Cross &#9747
☚ left-pointing index finger &#9754
☛ right-pointing index finger &#9755
☜ left-pointing index finger &#9756
☝ upwards pointing index finger &#9757
☞ right pointing index finger &#9758
☟ downwards pointing index finger &#9759
☠ skull & crossbones &#9760
☡ caution sign &#9761
☢ radioactive sign &#9762
☣ biohazard sign &#9763
☤ Caduceus or “Kerykeion” &#9764
☥ Ankh &#9765
☦ Eastern Christian Cross &#9766
☧ Chi Rho Cross &#9767
☨ Patriarchal Cross &#9768
☩ Greek Cross &#9769
☪ Crescent Moon & Star &#9770
☫ Farsi symbol &#9771
☬ Adi Shakti &#9772
☭ hammer & sickle &#9773
☮ peace sign &#9774
☯ yin & yang &#9775
☰ trigram Heaven &#9776
☱ trigram Lake &#9777
☲ trigram Fire &#9778
☳ trigram Thunder &#9779
☴ trigram Wind &#9780
☵ trigram Water &#9781
☶ trigram Mountain &#9782
☷ trigram Heaven &#9783
☸ Dharma Wheel &#9784
☹ frowning face &#9785
☺ smiley face &#9786
☻ black smiley face &#9787
☽ waxing crescent moon &#9789
☾ waning crescent moon &#9790
☿ Mercury &#9791
♀ Venus – Female symbol &#9792
♁ Earth symbol &#9793
♂ Mars – Male symbol &#9794
♃ Jupiter &#9795
♄ Saturn &#9796
♅ Uranus &#9797
♆ Neptune &#9798
♇ Pluto &#9799
♈ Aries &#9800
♉ Taurus &#9801
♊ Gemini &#9802
♋ Cancer &#9803
♌ Leo &#9804
♍ Virgo &#9805
♎ Libra &#9806
♏ Scorpio &#9807
♐ Sagitarius &#9808
♑ Capricorn &#9809
♒ Aquarius &#9810
♓ Pisces &#9811
♔ White King &#9812
♕ White Queen &#9813
♖ White Rook &#9814
♗ White Bishop &#9815
♘ White Knight &#9816
♙ White Pawn &#9817
♚ Black King &#9818
♛ Black Queen &#9819
♜ Black Rook &#9820
♝ Black Bishop &#9821
♞ Black Knight &#9822
♟ Black Pawn &#9823
♠ black spade suit name: &spades &#9824
♡ red heart suit &#9825
♢ red diamond suit &#9826
♣ black club suit = shamrock name: &clubs &#9827
♤ red spade suit &#9828
♥ black heart suit = valentine name: &hearts &#9829
♦ black diamond suit name: &diams &#9830
♧ red club suit &#9831
♨ hot springs &#9832
♩ musical quarter note &#9833
♪ musical eighth note &#9834
♫ musical single bar note &#9835
♬ musical double bar note &#9836
♭ flat note &#9837
♮ natural note &#9838
♯ sharp note &#9839
✁ cut above &#9985
✂ cut here &#9986
✃ cut below &#9987
✄ scissors &#9988
✆ public pay phone &#9990
✇ film reel – tape spool &#9991
✈ airport jet airplane &#9992
✉ envelope mail email &#9993
✌ victory sign &#9996
✍ signature – sign here &#9997
✎ pencil diagonal down &#9998
✏ pencil &#9999
✐ pencil diagonal up &#1000
✓ check mark &#10003
✔ heavy check mark &#10004
✕ multiplication sign X &#100005
✖ heavy multiplication sign X &#10006
✗ ballot X &#10007
✘ heavy ballot X &#10008
✝ Latin Roman Cross &#10013
✞ Latin Cross 3D shadow &#10014
✟ Latin Cross outline &#10015
✠ Maltese Cross &#10016
✡ Star of David &#10017
❛ quotation mark single turned comma &#10075
❜ quotation mark single comma &#10076
❝ quotation mark double turned comma &#10077
❞ quotation mark double comma &#10078

HTML = ♥

or ♡

ApplicationPoolIdentity user in Users & IIS_IUSRS

Posted by Rose Bush on May 19th, 2015

ApplicationPoolIdentity is assigned membership of the Users group as well as the IIS_IUSRS group.” Source: http://stackoverflow.com/questions/5437723/iis-apppoolidentity-and-file-system-write-access-permissions

I often need to add Users in particular to give the permissions needed.

Apache SetEnvIf Logical AND with Two Variables

Posted by Rose Bush on May 15th, 2015

In trying to adjust the method of logging in Apache, it was found logical to have the configuration perform an AND on two variables to validate one format vs another. I had not found much detail on this, until making my way to: http://stephane.lesimple.fr/blog/2010-01-28/apache-logical-or-and-conditions-with-setenvif.html. From the page archived, I had the following:

In my example, it was not able to work as shown above, but not of by much.  We quoted the last 0 in the lines we had written, giving us the following example:

When tested, requests coming from the LB IP are listed as trusted, and only trusted requests are adjusted and trusted as having been forwarded.  Other requests, we can assume (based on topology) with x-forwarded-for header are identified as falsified.

Command Line Add woff Mime Type

Posted by Rose Bush on May 14th, 2015

Easily add in the woff mime-type with the below command:

To note, the above placed the configuration within the applicationHost.config and not in a web.config. As desired in my scenario as I had wanted the configuration to be server wide.

Testing http header IP forwarding

Posted by Rose Bush on May 5th, 2015

I need to determine what the application sees versus what is being sent, these scripts helped me see the discrepancy and validate the change once resolved:

The above does allow you to force a post, as the original case was behind a caching server.

Find the Default File Paths for a Given SQL Instance

Posted by Rose Bush on May 4th, 2015

Method 1 of 1?

Create the alias with cliconfg.exe

Posted by Rose Bush on May 4th, 2015

Option 2: Create the alias with cliconfg.exe
Log into the Application and/or front-end Web servers
Got to Start > cliconfg.exe (Note: it’s c-l-i-c-o-n-f-g-dot-e-x-e)

Then click on “Alias”:

If you already have an alias set up, it will show up there. Otherwise…
Click “Add”

Specify the port number and give it a name. That’s it!
Test your SQL Alias:
To test your SQL alias, create a Microsoft Data Link (udl) file on your desktop:

From your desktop, right click on the desktop and choose New > Text file
A new file named New Text Document.txt appears in the directory.
Rename this file to “TestDBConnection.udl”, removing all spaces. Be sure to change its file extension to .udl.
Open the file and, under Connection, type either the SQL server name or, if you are testing an SQL alias, the alias name.
Under 2, chose “Windows Authenticated security”
Click “refresh”
If the connection was successful, list of databases should appear in the dropdown menu under #3.
I have a separate blog post that covers the same steps for creating a udl file here. http://smallcitydesign.com/how-to-test-a-database-connection-from-an-application-server/

Copyright © Edventures in Normalcy. All rights reserved.