dSupportSuite – d7xTech.com (formerly Foolish IT) https://www.d7xtech.com Computer Repair Software - PC Tech Utilities - Malware Prevention Fri, 22 Jun 2018 16:09:34 -0400 en-US hourly 1 https://wordpress.org/?v=4.9.6 42914034 dSupportSuite “How-To” Video: Deploy dSS Client Software Updates to Your Customers https://www.d7xtech.com/2018/05/dsupportsuite-how-to-video-deploy-dss-client-software-updates-to-your-customers/ https://www.d7xtech.com/2018/05/dsupportsuite-how-to-video-deploy-dss-client-software-updates-to-your-customers/#respond Sun, 27 May 2018 00:15:52 +0000 http://www.foolishit.com/?p=14486 If you’ve seen news of the recent update for the dSupportSuite client software, you might want to roll out an update to your customers!  If you didn’t purchase dSupportSuite early on (pre-2014) then self-hosting an FTP server is required for usage, and if you did you may have migrated an older dCloud deployment to self-hosted FTP.

If you fall into either of the above categories (as most dSupportSuite owners should) then your customers will NOT receive the latest update until you update the client software from within your dSupportSuite Mgmt Console, and then deploy the updated client software to your self-hosted FTP server!

For this reason, we’ve prepared the video below to make this a no-brainer.

NOTE If you are still using our older dCloud hosted solution and have not migrated to self-hosting, then you should be paying for dCloud via recurring payments (or you have a lifetime dCloud purchase) and neither have been traded for a complementary d7II account.  If you fit this category, then the dSupportSuite client software will update itself without any required action on your behalf.  In fact, this process wouldn’t even be possible, as you can only take advantage of version controlled software deployments by using the self-hosted FTP option (otherwise you have no control over client software updates deployed to your customers.)   Please see the dSupportSuite manual for more information on self-hosting and migration options.

https://www.d7xtech.com/2018/05/dsupportsuite-how-to-video-deploy-dss-client-software-updates-to-your-customers/feed/ 0 14486
dSupportSuite client software update on May 22nd, 2018 https://www.d7xtech.com/2018/05/dsupportsuite-client-software-update-on-may-22nd-2018/ https://www.d7xtech.com/2018/05/dsupportsuite-client-software-update-on-may-22nd-2018/#respond Thu, 24 May 2018 17:48:02 +0000 http://www.foolishit.com/?p=14481 A emergency dSupportSuite client software update was released in order to resolve an issue with Windows 10 update to build 1803.  This particular Windows update caused dSS triggered maintenance tasks to fail immediately after starting.  No error message should be visible to the user, but a failure to run dSupportSuite.exe will be found in Windows event logs.

This dSupportSuite client software update resolves the issue with Windows build 1803 by updating the digital certificate used to sign the software exe files.  As a result, please be aware that this update involves no actual code changes (unfortunately) and therefore is not intended to resolve the cosmetic OS version display issue with Windows 10, which is incorrectly reported as Windows 8.x or Vista; that unrelated issue will be addressed in a code update when the client software is replaced with d7x code, which is our next priority for the dSupportSuite client software.


How to apply the update:

Self-Hosted users:  All dSupportSuite owners who are self-hosting with your own FTP server are REQUIRED to update the client software through your dSupportSuite Mgmt Console, and then use the “deploy” option to upload the updated files to your self-hosted FTP server.  Only then will your clients be updated to the latest version.  This also allows you create new installers for future installations with the latest software binaries.

dCloud users:  No action is required to distribute the update for original dSupportSuite owners who continue their subscriptions to our dCloud hosted servers (or those who have purchased lifetime usage of them) as the “deploy” option is only required for self-hosted servers, however you will still need to update the client software through your dSupportSuite Mgmt Console, and then recreate your client installers with the latest software binaries for future installations.

All users:  The dSupportSuite client software update will be distributed through automatic software updating mechanisms on your customer PCs.  The dSupportSuite client software performs self-update checks prior to running maintenance either manually or via scheduled tasks.  The self-update checks occur even when a separate update task is not enabled in your configuration.

Please contact us anytime if you have additional questions or concerns.

UPDATE:  We’ve added a video to make this a no-brainer!


https://www.d7xtech.com/2018/05/dsupportsuite-client-software-update-on-may-22nd-2018/feed/ 0 14481
CCleaner (Piriform) Malicious Code Breach! d7x/d7II/dSupportSuite Users Take Notice! https://www.d7xtech.com/2017/09/ccleaner-piriform-malicious-code-breach-d7xd7iidsupportsuite-users-take-notice/ https://www.d7xtech.com/2017/09/ccleaner-piriform-malicious-code-breach-d7xd7iidsupportsuite-users-take-notice/#comments Wed, 20 Sep 2017 14:51:01 +0000 http://www.foolishit.com/?p=12907 Sept 26th, 2017 Update:  Yesterday this appeared on Bleeping Computer:

Avast Publishes Full List of Companies Affected by CCleaner Second-Stage Malware

Bleeping also put out a nice article from the 22nd, containing a nice summary if you’re just catching up on the news (because of course more has emerged since our last update, and we shouldn’t just assume you read it elsewhere):  

Info on CCleaner Infections Lost Due To Malware Server Running Out of Disk Space

Sept 21st, 2017 Update:  These articles also came out yesterday, unfolding some plot twists to this story.  If you get your news here, you could do better!  

It seems a new backdoor was discovered and … you just need to read these:

CCleaner Command and Control Causes Concern

CCleaner Malware Infects Big Tech Companies With Second Backdoor

Original post is below, but be aware some details may no longer be accurate as the story unfolds.

This came out two days ago on the CCleaner blog:  Security Notification for CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 for 32-bit Windows users.

It seems that CCleaner has had malicious code bundled into their 32bit binaries (along with their “Cloud” version) and the tampering occurred prior to distribution.  The infected binaries were provided for download from their official site/update servers and distributed legitimately for about a month, silently infecting users to send data back to the ethers.  It also occurred completely under the nose of their new parent company Avast, the anti-virus software maker who acquired Piriform (the makers of CCleaner) as recently as July.  In fact, yesterday Avast released their own blog post about it, Update to the CCleaner 5.33.6162 Security Incident.

For the consumers who’ve used any of their products, you need to know this, but I’ve got ZERO advice for what you do with that information (other than maybe call a tech if you aren’t tech oriented, because you have software on your PC that is sending bits of your data elsewhere.)  On second thought, I’m told that Malwarebytes says their software removes/fixes it, and I see they have a blog post here:  [Updated] Infected CCleaner downloads from official servers (they have the free/trial/paid user-level “scanner” software which I’m sure all editions take care of the issue quite effectively.)

With prevention, the damage is done and over for the most part unless you’re still running the infected CCleaner, but that person isn’t reading this article…  By next update at least all of our CryptoPrevent users who haven’t noticed or heard should have detection sigs for the affected binaries, and Folder Watch can quarantine or the Program Filtering can pick it up on execution as well.  In fact from a few days ago when ClamAV was the only anti-virus engine to detect it (VirusTotal.com) today it lists 41/64 engines detecting it, and that’s just how it goes in this industry.  If you have the infection but you have any sort of security software, you won’t have the infection for long.

Finally the elephant in the room is trust.

I’m sure that the CCleaner developer could’ve been as shocked as anyone else to learn about the incident, but I just don’t know.  As for Avast, if checking CCleaner (and their other software) binaries with their own security staff, or even just a little software scan with their product, was not part of their decision to acquire Piriform/CCleaner, then I’d be very surprised (and maybe I should be…)

Regardless, if you use CCleaner or Piriform products, I don’t think that this is any reason to stop using them, or the parent company’s Avast’s products.  We should all now agree that malicious activity can breach even the most trustworthy, and we should also agree that when the incident is over it isn’t always a “trust” issue at all, maybe it’s more rare than we’d normally admit, but we just got burned.  So far that’s all anyone knows here, but the thing is it wasn’t just CCleaner users, but the people at Piriform got burned too, meaning whoever punches the clock there that isn’t involved in this (which is up to and including maybe everyone.)

I have no real advice here, and in fact I would like to explicitly offer no suggestion at all; but at this point in time, there are two points to understand:

1.  Piriform hasn’t entirely dealt with the issue until they know who did it, but that is a legitimate and long established “good” app and company, and you should have no doubt that Piriform (and their parent company Avast, the makers of that big anti-virus software product, I might reiterate) will be paying attention more closely from here on out.  That should be more comforting than it might sound to someone already burned.

2.  Realize that this can happen to any other legitimate and long established (“trusted”) software by the time you make the switch, if it didn’t happen already and it’s just undetected to date (as was the case here.)  

So the best I can offer for the time being is just a little food for your own thought, with the disclaimer that you take this information like anything else you read on the internets, with a grain of salt!  (That, and don’t forget you are likely infected, so get your PC looked at!)  


Now, speaking only to our IT Professional / Tech Shop customers, here’s what you need to know as a tech/IT pro who maybe uses CCleaner through a custom app profile with our software:

Malicious code has infected 32bit binaries of the 3rd party software CCleaner, which can be found as a default/included custom app profile in our more popular tech-oriented/non-consumer Foolish IT apps dating back to the original d7, so there’s a high probability that someone is using it in their tech work and repair scenarios…  64bit systems are unaffected, and there isn’t a “Cloud” version in our example profiles for 3rd party applications, so you should know if that’s an issue because you created and use the customized profile.

It’s worthy of note the malicious code was planted … ok I haven’t read it all (it would seem at least before digital code signing) which means it was an “inside job” and therefore changing your download links in the custom app profiles won’t matter, it wasn’t that kind of breach…

For more technicals on the CCleaner thing, the folks at Cisco’s Talos Intelligence Group have a nice technical analysis in CCleanup: A Vast Number of Machines at Risk and thanks to our own Brantley for the link, who pointed out the pic of ClamAV near the bottom with the very first detection, good job!  (ClamAV is an anti-virus engine which seems like the historical last to recognize or do much of anything, another fine example of how things shift quickly, frequently, and wildly in this industry.)


d7II and d7x (Alpha)

CCleaner (under the default custom app in d7II/d7x) should re-download itself every 7 days, so if the affected version exists in your d7II 3rd Party Tools directory, and for example you lived under a rock and didn’t know about the breach, then the infected version will be there for at most another 5 days before it is replaced by Piriform’s most recent version which we would all hope is still as clean as it should be right now.

In fact, you can disable the re-download option right now (d7II Config for the custom app, persistent settings tab, you want the check at the top I believe) and it won’t ever update unless it isn’t there, so in a bench / network / office / USB flash drive scenario you’re good to go with the download you have, still a very good program for what it does and more than likely legit/clean at the moment, and it won’t update anymore so you can use it without worrying about the profile updating it to a version you don’t trust yet.

Of course you’re reading this, and hopefully you clicked on the alert in the lower status bar, then please just go delete the entire “\3rd Party Tools\ccleaner” directory, and the “\3rd Party Tools\ccleaner.zip” file if they exist from ALL of your copies of d7II/d7x, and be done with it; the (hopefully) still clean versions will download automatically as usual, as you decide to use them.

If you made it this far and you are a d7II subscriber, please also check out the d7x Alpha info page to understand what is different and consider testing it, the download is found in the new d7x Manual.


d7 (original/free)

I do believe it is a default option for maintenance, and although I don’t recall the specific download rules in the final v10.something, I do not believe it updates much.  Anyone using this tool should seek to do the same as mentioned above and delete your CCleaner files, let them re-download and use that if you insist, for the time being.  Then look into d7II and the upcoming d7x first and step up.


dSupportSuite (and dMaintenance)

Owners of dSupportSuite may know the software includes example custom app profiles for CCleaner/Defraggler as 3rd party downloads, and those who’ve deployed dSS profiles to your clients using these apps are of course affected.

So with every maintenance cycle of dSupportSuite (weekly) by default when an internet connection exists it should attempt to download the latest 3rd party tools configured for use.  Good for the fix, not so much when it was a problem!  The same automated re-download on every maintenance also applies to the older dMaintenance stand-alone apps (both the original tech version and later home edition.)

Although the issue has been corrected (for the moment) on Piriform’s end, and we’re sure that they (and their parent company alike) will be keeping a close eye on future releases, you wouldn’t be wrong to push out a new profile that doesn’t include it, at least for a time.

Also, those machines have infected code possibly running on them right now, and as much as any fix (which will more than likely be present in their security product already on their system within the next few days, if it isn’t already neutralized) your clients need to be made aware of the breach itself.


The same goes for many tech shops and repair guys out there, I think your customers need to hear it IF they can possibly be affected.  Probably most tech shops at one point in time or another have had at least one employee use CCleaner on a customer’s system, quite a few probably within the last month, world-wide…  That’s conservative, but my guess more than likely is that CCleaner is just part of the way things are done in many tech shops, by most if not all techs who are allowed to do their own thing, if not being some semi-to-official company mandate (depending on how large the company is they shy away from 3rd party apps without $$ agreements, but under 20 employees it’s completely possible.)  It surely is in the toolbox of most door to door guys, wouldn’t you think?

This wide-spread usage is for a good reason, let’s not forget.  I think most agree it’s also good at doing what it advertises.  Dispute the app’s necessity all you want (and I would personally do it in some other article to some degree) but I don’t ever recall finding fault with the company’s character, and we still have it in the custom app profiles our tech customers use for a reason.  As stated earlier it is a legitimate and long established “good” app and company, so don’t’ forget Piriform’s reputation and read up on how they are handling it well right now.

I’m sure since it’s so widely respected and used, a quick visit to your favorite tech forums and you’ll find plenty of tips and example scripts on what others are already saying to their customers.

I know it’s an ugly conversation with any client, depending on how one might view the situation, but if you approach it with honesty, it can be a good opportunity to reconnect with clients maybe you haven’t seen in a while, and show them some concern and care.  It’s good to build any of your client relationships through all seasons, and the integrity pays in good ways.


https://www.d7xtech.com/2017/09/ccleaner-piriform-malicious-code-breach-d7xd7iidsupportsuite-users-take-notice/feed/ 1 12907
d7II and dSupportSuite Updates! (d7IIx Alpha and dSupportSuite Mgmt Console) https://www.d7xtech.com/2017/03/d7ii-and-dsupportsuite-updates-d7iix-alpha-and-dsupportsuite-mgmt-console/ Fri, 17 Mar 2017 21:20:06 +0000 http://www.foolishit.com/?p=12455 For d7II subscribers / IT Providers:

Today we’ve released a new update for d7IIx Alpha, but also today we’re making the Alpha builds public to all d7II subscribers (a currently active d7II subscription is required.)  This release contains no new features (in fact it IS d7II as far as existing functionality) yet it has been ported to the underlying d7x Platform code, in order to make current updates once again available.

This release is NOT for production environments, rather it is only a TEST BUILD, so please do NOT use this in your production environment!  d7II subscribers may however use the new build for testing purposes, and to contribute by submitting bug reports on features that previously functioned as expected in d7II.

See the d7x Alpha page for more information, or skip straight to the d7II Alpha – Known Issues / Submit a Bug Report page for the download and instructions!  Users of the d7IIx Alpha during previous testing closed to the public should see their d7IIx.exe update itself to the latest version upon launch, but it may also be downloaded manually if there are any issues.  


For dSupportSuite owners / IT Providers:

Yesterday an update was released to dSupportSuite Mgmt Console!  This update brings some minor bug fixes to the app used in creating/deploying your custom configurations, as well as preparing it to be moved to the new d7x Platform code for a future release, which will enable new functionality!

To receive the update, use the top left options menu in dSupportSuite Mgmt Console to find and select “Check for Updates” — the new version should download and start automatically after notifying you of the update; if the update fails to start for any reason, simply launch the Mgmt Console again.  Note you also may be prompted for the update automatically upon starting the Mgmt Console, depending on how recently it has been used.

Among this releases notable improvements are:

  • Introduced a new launcher, enabling you to choose the version of the Mgmt Console to use from within the app, as well as view the revision notes on the new version prior to usage.  While this new release was tested well, the launcher makes switching back to a previous version extremely easy, should a future update fail to function as expected.
  • Introduced a new convenience feature:  when closing the Mgmt Console you will be prompted to “Sync all modified content to server before exit (please be aware that currently this prompt is presented even when no changes have been made, but this will be addressed in a future update.)
  • Corrects an issue where using the “Sort by Dateand Sort by Name” functionality in the the “List” button drop down menu will crash the app under most circumstances.
  • Removes the /Migrate command line parameter to a separate executable (for migrating from legacy dCloud accounts to a self-hosted FTP server.)  Please be aware the documentation for self-hosted FTP migration has yet to be updated as of this post has now been updated in the dSupportSuite Online Manual.


EDIT:  I forgot to mention the new Emsisoft a2cmd profiles for dSupportSuite maintenance routines, which were also released last week (following new releases for the same in d7II custom apps) and are currently available for download at the bottom of the page in the dSupportSuite Online Manual.


There’s plenty more to talk about, but it’ll have to wait for next week!  

Have a great weekend!  

Foolish Tech Show 01/04/2017 has been posted to our YouTube channel! https://www.d7xtech.com/2017/01/foolish-tech-show-01042017-has-been-posted-to-our-youtube-channel/ Thu, 05 Jan 2017 14:40:05 +0000 http://www.foolishit.com/?p=11868 If you missed the show from yesterday (01/04/2017) or just want to review it again, we’ve got it edited and posted to our YouTube channel!

On this episode we go over a demo of all the amazing features and options you have to increase your recurring revenue opportunities with dSupportSuite.

We’ll be back on the air today (01/05/2017) at 4pm EST! Join us at http://www.foolishtechshow.com to join our live chat and talk with us directly!

Merry Christmas! d7 Premium is Now FREE! [EXPIRED] https://www.d7xtech.com/2015/12/merry-christmas-d7-premium-is-now-free/ Sat, 19 Dec 2015 13:54:46 +0000 http://www.foolishit.com/?p=9630  

Ho, Ho, Ho!

d7 Premium is now was FREE, get yours NOW before we come to our senses[Sorry, we did!  OFFER HAS EXPIRED]

www.d7xtech.com/getd7     < – – – – TELL YOUR FRIENDS!

Merry Christmas to EVERYONE!


Also, just in case you already have d7 Premium and didn’t know about our upgrade offer, we started promoting earlier this year that d7 Premium users who also have the old “dCloud” subscription, even the lifetime ones, can get complementary d7II (and soon d7x!) so long as your dCloud subscription remains active/current.  For currently paying subscribers, this basically means you’re getting the whole d7II package for the same price you are already paying for d7 Premium’s dCloud service.  For the folks who purchased the lifetime dCloud, you also get the d7II deal for the same price you are already paying for d7 Premium’s dCloud service, which was already paid in full in your case, so you’re good.


To be clear, the upgrade deal ONLY available for CURRENT (ACTIVELY PAYING or LIFETIME) SUBSCRIBERS, and carries NO additional cost to anyone.

The big caveat is that you must relinquish your old dCloud account, which isn’t just used for the original d7 Premium, but also could be used for dSupportSuite hosting.  If you’re in that boat we can help you migrate to your own self-hosted solution, or just don’t take the deal and continue using the old dCloud service as always, it’s entirely up to you!

Trouble downloading from us? https://www.d7xtech.com/2015/08/trouble-downloading-from-us/ Wed, 26 Aug 2015 17:53:03 +0000 http://www.foolishit.com/?p=8837 Please accept my apologies, but to fess up, I did it…

Recently I continued a project started earlier before summer, to move our download server to a more capable host, while splitting it into separate servers for different applications/updates so one failure wouldn’t affect all of our apps download/update capabilities, and also to pave the way for some new redundancy.

Well between yesterday and today, we’ve had the usual download and update issues due to slow DNS propagation to various parts of the world, and a host of other issues finally ending with I just simply neglected to ensure I created a certain login account on one of the servers — that last one affecting only d7II trying to check for updates wasn’t resolved until around 1pm ET just over an hour ago, however since that has nothing to do with DNS the fix is instant for everyone.

To our knowledge all of these issues should be resolved completely, although DNS changes typically warn 48 hours to propagate, our last DNS change was made little over 12 hours ago and we rarely see any issue beyond 2-3 hours, with most servers getting the new addresses within minutes.

If you are having any trouble downloading or updating our applications at this point, please be patient (DNS) and try again if it’s been a few hours even, and let us know if the problems persist at http://support.d7xtech.com so we can track it and assist ASAP.

Thanks, and again I apologize for the inconvenience!

d7 and dSupportSuite now integrate with RepairShopr! https://www.d7xtech.com/2013/12/d7-dsupportsuite-now-integrate-repairshopr/ https://www.d7xtech.com/2013/12/d7-dsupportsuite-now-integrate-repairshopr/#comments Fri, 06 Dec 2013 16:14:22 +0000 http://www.foolishit.com/?p=4154 What is RepairShopr?

RepairShopr is an all-in-one system integrating tickets, CRM, invoices, and marketing in a simple, easy-to-use platform designed specifically for computer repair shops. The streamlined workflow allows you to increase shop efficiency while powerful leads and marketing tools help you build customer relationships to grow your business.

d7 Integration

Currently RepairShopr can receive reports from d7’s email reports feature (including the system information report, activity logs, malware logs, etc.) and save / display all of the various reports under your customer / ticket number in RepairShopr’s console.  This requires the ticket number to be prompted for within d7, the word ‘d7’ to appear in the email subject (as it does by default), and reports should be emailed unzipped from d7 to your ticket reply email configured in RepairShopr.

dSupportSuite Integration

Currently RepairShopr has a powerful integration for receiving dSupportSuite’s daily Heartbeat emails.  The really neat thing about this feature is that you can have RepairShopr configured to receive all of your daily Heartbeats instead of having to receive them and filter through them yourself, then it can email you an alert only when necessary.  Not only will you receive the reports through RepairShopr’s console, but RepairShopr can be configured to alert you when the Heartbeat emails fail to be received for xx number of days.  Also if the Heartbeat email contains certain terminology/phrases (completely configurable) RepairShopr can alert you automatically in this event, ex. “virus detected, failing, disk error” etc. etc.   dSupportSuite must be configured to email the Heartbeats to your ticket reply email configured in RepairShopr.


I will be following up soon with a Youtube video on configuration of both products for these features, and what to expect from usage.

Also note that this is just the beginning of my collaboration with the folks at RepairShopr.  While nothing specific is currently planned for future integrations and collaboration, we are leaving discussions open as to what more can be done to add value to both of our product lines, while making your life easier as a tech.  If you are a user of both of our products and you have a neat idea for an integration between them, please let us know!

Click here for the Setup KB from RepairShopr


https://www.d7xtech.com/2013/12/d7-dsupportsuite-now-integrate-repairshopr/feed/ 1 4154
dCloud Self-Hosted Now Live! https://www.d7xtech.com/2013/07/dcloud-self-hosted-now-live/ https://www.d7xtech.com/2013/07/dcloud-self-hosted-now-live/#respond Mon, 08 Jul 2013 22:02:13 +0000 http://www.foolishit.com/?p=2643 A self-hosted option for operating your own cloud environment, dCloud Self-Hosted (dCSH) is now available for users of dSupportSuite!

Utilizing your own cloud reduces security risks and increases speed of cloud operations within dSupportSuite, as the information is on YOUR server and not mine (which shares bandwidth and processor power with other users of dSupportSuite and d7.)

The only requirement for dCloud Self-Hosted is an internet exposed FTP server capable of FTP Passive mode.  This can be a any OS, but Windows is preferred for future functionality which may require server side software that would only be compatible with Windows.  A server OS is not required, a workstation OS will work just fine.  You may use Windows Server’s IIS for the FTP component, or preferably FileZilla Server for Windows.

See the subsection FTP Server Setup for an idea of just how easy it gets.  For existing users of dSupportSuite and dCloud, you will need to also visit the Migrating from dCloud subsection.

dCloud Self-Hosted is included when you purchase a dCloud Lifetime Subscription either by itself or as part of a bundle.  If you have already purchased a dCloud Lifetime Subscription prior to the release of dCloud Self-Hosted, you may contact me for a product key that will allow you usage of dCloud Self-Hosted.

Sorry, d7 functionality for dCloud Self-Hosted is not yet available.

https://www.d7xtech.com/2013/07/dcloud-self-hosted-now-live/feed/ 0 2643
dSupportSuite Mgmt Console v1.3.7 update system bugged, reinstall required. https://www.d7xtech.com/2013/06/dsupportsuite-mgmt-console-v1-3-7-update-system-bugged-reinstall-required/ https://www.d7xtech.com/2013/06/dsupportsuite-mgmt-console-v1-3-7-update-system-bugged-reinstall-required/#comments Mon, 24 Jun 2013 11:21:40 +0000 http://www.foolishit.com/?p=2574 The update check routine is bugged in v1.3.7 of dSupportSuite Mgmt Console.

The issue is fixed but to update you will need to REINSTALL. Here’s the process:

  • Uninstall dSSMC via the start menu shortcut or control panel.
  • Download / Install dSSMC. http://www.d7xtech.com/?wpdmdl=41&
  • On the SETUP page of dSSMC, everything should be pre-populated as settings are preserved, you just need to click the Download Working Copy button to grab the latest dSupportSuite to work with.

Do NOT reinstall dSSMC via the prompts within the older dCloudConsole you may still have on the system. This WILL overwrite any dCloud data you have altered since you used dCloudConsole for dSS management.

I’ve learned my lesson, future editions of dSSMC will allow you to forcibly update itself.

Sorry for the inconvenience…..

https://www.d7xtech.com/2013/06/dsupportsuite-mgmt-console-v1-3-7-update-system-bugged-reinstall-required/feed/ 2 2574