Thanks to everyone (and my apologies for not being multi-lingual!) I think someone should formally close this as I was mistaken in posting it here in the first place. However, if any reader is of this post is interested in kernel security, feel free to contact me directly. This error, which I've tried to update and install (64-bit) is being caused by a rootkit embedded in my BIOS/eeprom with ms fingerprints all over it. My repositories are configured by an embedded malware kernel rootkit. It has prevented me from establishing a successful inet/ethernet connection for over two years (it infected nine separate motherboards) and while now able to connect thanks to live Linux distros, still will not allow non-root-compromised HD install in the case of 32-bit versions or preventing any 64-bit install by preseeding the bootstrap/boot config by use of an embedded kernel written with Busybox. I believe based on collected evidence, this is an experimental framework devised by the folks behind the AFTA agreement, and will be used on people who use illegal copies of software (in my case, one illegal copy of xp installed at a business.) If you ever wonder what happens to people who are reported to the ms anonymous piracy center and aren't worth filing a legal case for, we're used as experimental fodder for their latest ant-piracy techniques. And this is in full conjunction with IANA, RIPE, IEEE, and many others who are participating in this method of evading US Federal Statutes by contracting the work to offshore divisions or organizations who don't have a Constitution or Bill of Rights. My DNS server and connection settings are included in the embedded kernel and use an Australian DNS address despite the fact that I live in the suburbs of Philadelphia. Kinda out of the way for a DNS lookup, dontcha think? Actually, you should all be worried, since it means George Orwell was just off by 25 years. mc