• Email Address: forum@outsourcepath.com
English
  • English
Topics related to windows

Windows Error 0x80071AC3 Volume is dirty error message CHKDSK

This article will guide you on steps to fix #Windows #Error #0x80071AC3, Volume is dirty error message – #CHKDSK which occurs as a result of data #corruption, corrupted system files, #malware #infection, as well as improper #installation of #application, and so on.

Sandbox failed to start with error 0xc030106 in Windows 10

This article will guide you on the different methods to resolve Windows error "Sandbox failed to start with error 0xc030106". Methods to fix Windows Sandbox #error 0xc0370106 includes; 1. Run #Windows Sandbox as Administrator. 2. Re-enable some of the supporting processes. 3. #Install pending Windows Updates. 4. #Disable and Enable Windows #Sandbox. 5. #Uninstall Recent Windows 10 Cumulative #Updates. 6. #System File Checker #Utility. 7. Run #DISM #command.

Tips to resolve Taskbar not visible in Remote Desktop on Windows 10

This article will guide you on how to fix the #taskbar is not visible in #Windows. How do I get my taskbar back on #Remote #Desktop? 1. Go to: 'Start' > 'Programs' > 'Communication' > 'Remote Desktop Connection'. 2. Click on the 'Options >>' button. 3. Click on the 'Display' tab. Check (or uncheck) "Display the connection bar when I use the full screen" (for Windows CE6 Operating System) or "Display the connection bar" (for Windows CE5 Operating System).

Windows Sandbox failed to start, Error 0x80070015, The device is not ready in Windows 10

This article will guide you on the right steps to go about fixing Windows Sandbox failed to start, Error 0x80070015, The device is not ready in Windows 10 error.

Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect

This article will guide you on the steps to fix Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect error by installing any pending updates in your Windows 10 computer, as well as make sure that all the services related to Windows Sandbox are enabled.

How to fix Windows when Sandbox item is greyed out

This article will guide you on the steps to take when Windows Sandbox item is greyed out in Windows 10. To enable Windows Sandbox in Windows 10, you are required to go to the search bar, type Turn Windows features on or off and click the search result to enter the Windows Features interface. Then, check the Windows Sandbox item.

Deleting files and folders using Command Prompt in Windows 10

This article will guide you on the steps to delete files and folders via the command prompt. Also you can use this method to clean out your computer for any junk or corrupted files as well as eliminate any unwanted files from your system.

Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect

This article will guide you on the different methods to fix Windows error "Windows Sandbox failed to start, Error 0x80070057, The parameter is incorrect" by installing any pending updates in your Windows 10 computer.

Windows 10 error 0x800703EE when copying files to external storage

This tutorial will help you to resolve Windows 10 error 0x800703EE when copying files to external storage which occurs due to corrupted or outdated USB drivers or it could be caused be a disabled Windows Backup and Volume Shadow copy service.

Windows Error "The task image is corrupt or has been tampered with (0x80041321)"

This article will guide you on the steps to fix Windows Error "The task image is corrupt or has been tampered with (0x80041321)" which is generally triggered by a wrongly set value in the registry, usually left behind by third-party back-up software.

Windows error Installation ended prematurely because of an error

This article will guide you on the steps to fix Windows error "Fatal error, Installation ended prematurely because of an error" which occurs when performing any software reinstallation or installation.

Boot Device Not Found Error in Windows 10

This article will guide you on the different methods to fix Windows “Boot Device Not Found” error which occurs when the UEFI or the BIOS was not able to locate the drive where it can boot.

Windows 10 Hello Errors 0x801c004d or 0x80070490

This article will guide you on the steps to resolve Windows 10 Hello Errors 0x801c004d or 0x80070490.

Windows Error 0x8004230F

This article will guide you on the steps to fix Windows Error 0x8004230F when creating System Restore point in Windows 10.

Steps to fix Windows error "There is insufficient disk space to complete operation"

This article will guide you on the different methods to fix Windows error “There is insufficient disk space to complete operation” which could be triggered as a result of lack of disk space or corrupted disk.

Steps to solve Remote Access Connection Manager Service not working, Error 0xc0000005 in Windows 10?

This article will guide you on the steps to fix Windows error 0xc0000005 the problem with the Remote Access Connection Manager Service.

Complete guide to fix Windows Upgrade Error 0x800F081E – 0x20003 in Windows 10

This article will guide you through the steps to quickly fix Windows error 0x800F081E – 0x20003 which occurs when some of the update requirements are missing or the files that are installed are already of a higher version compared to the ones that are still pending.

What to do if the Copy and Paste feature is not working in Windows 10

This guide will give you different tips and step by step process to fix Copy and Paste feature if it is not working in Windows 10.

How to fix "NVIDIA GameStream is not working" in Windows 10

This tutorial will guide you on the different tips to fix the issue with the NVIDIA GameStream service when the service fails to work in Windows Systems.

Tips to fix "Error 633: The modem or other connecting device is already in use" in Windows 10?

This article will guide you on the different methods to resolve VPN Error 633 in your Windows 10 computer which occurs while trying to connect to the internet.

Methods to change the Left & Right mouse buttons in Windows 10

This article will guide you on the steps to perform changing the Left & Right mouse buttons in Windows 10.

Windows Error 0xc0000142

This article will help you to fix Windows Error 0xc0000142 which occurs when an application fails to properly initialize.

Steps to fix Chrome error 103 connection aborted error

This article will guide you on the steps to fix Chrome error 103 connection aborted error which occurs as a result of issues in your Google Chrome browser or system issues.

Fix Error 103 in Google Chrome

This tutorial will help you with the complete steps to follow to fix Google Chrome error 103.

Hardening Windows Using Microsoft Security Baseline

This article covers Hardening Windows Using Microsoft Security Baseline.

Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting its Internet-facing web apps, while a hospital may focus on protecting confidential patient information.

The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.

A security baseline is a group of Microsoft-recommended configuration settings that explains their security impact. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and customers.


How can you use security baselines?

You can use security baselines to:

1. Ensure that user and device configuration settings are compliant with the baseline.

2. Set configuration settings. For example, you can use Group Policy, Microsoft Endpoint Configuration Manager, or Microsoft Intune to configure a device with the setting values specified in the baseline.

Install PHP 8 on Ubuntu 20.04 or 18.04 - Step by Step Process ?

This article covers steps to install PHP 8 on Ubuntu. PHP is arguably one of the most widely used server-side programming languages. It's the language of choice when developing dynamic and responsive websites. Basically, popular CM platforms such as WordPress, Drupal, and Magento are based on PHP.


To Install PHP as Apache Module

Run the commands:

$ sudo apt update
$ sudo apt install php8.0 libapache2-mod-php8.0

Once the packages are installed, restart Apache for the PHP module to get loaded:

$ sudo systemctl restart apache2


To Configure Apache with PHP-FPM

Php-FPM is a FastCGI process manager for PHP. 

1. Run the following command to install the necessary packages:

$ sudo apt update
$ sudo apt install php8.0-fpm libapache2-mod-fcgid

2. By default PHP-FPM is not enabled in Apache. 

To enable it, run:

$ sudo a2enmod proxy_fcgi setenvif
$ sudo a2enconf php8.0-fpm

3. To activate the changes, restart Apache:

$ systemctl restart apache2 


To install PHP 8.0 with Nginx

Nginx doesn't have built-in support for processing PHP files. We'll use PHP-FPM ("fastCGI process manager") to handle the PHP files.

Run the following commands to install PHP and PHP FPM packages:

$ sudo apt update
$ sudo apt install php8.0-fpm

Once the installation is completed, the FPM service will start automatically. 

To check the status of the service, run

$ systemctl status php8.0-fpm

Do not forget to restart the Nginx service so that the new configuration takes effect:

$ sudo systemctl restart nginx

Configure RDS User Profile Disks on Windows

This article covers method to configure and use User Profile Disks on a server with Remote Desktop Services role running on Windows Server 2012 / 2012 R2 / 2016.

In a single RDS collection, there can exist only one VHDX profile file for one user. If a user connects to the resources from two different collections, a separate profile disk should be created for each of them.

Also note that the UPD drive is bound to the RDS server Windows OS version. You can’t transfer (use) an UPD user profile from an RDS server from one version of Windows Server to another.


To Setup & Enable RDS User Profile Disks:

1. Create a shared network location for the disks.

2. Launch SERVER MANAGER.

3. Expand REMOTE DESKTOP SERVICES > COLLECTIONS.

4. Click on your Collection.

5. Click TASKS > EDIT PROPERTIES (top right corner).

6. Click USER PROFILE DISKS (bottom of the menu on the left).

7. Click ENABLE USER PROFILE DISKS.

8. Set the location to what you created in step 1

i.e. \\YourServerNameHere\UserProfileDisks$

9. Set the maximum size of those disks.

10. Scroll down and set what you want to have stored on those VHD's.


How to Resize User Profile Disks Using PowerShell ?

You can extend the virtual vhdx drive with the user's UPD profile using the PowerShell cmdlet Resize-VirtualDisk from the Hyper-V module:

Net use U: \\rdvh1\DemoLabOficeApps
Resize-VHD -Path u:\UVHD-<SID>.vhdx -SizeBytes 40GB
Net use U: /delete

If you want to run the Resize-VHD cmdlet from a desktop with Windows 10, you must install the feature Hyper-V -> Hyper-V Platform -> Hyper-V Services.

Send test SNMP trap in Nagios - How does this work ?

This article covers how to send a trap to Nagios server to test SNMP Trap functionality.

Basically, when troubleshooting an SNMP Trap issue, it can be very helpful to remove the actual device that could be causing problems and use the snmptrap command instead.

So in this guide, you will learn all the methods of sending a trap to your Nagios server to test SNMP Trap functionality.


SNMP Trap Definition

The following trap definition can be placed in /etc/snmp/snmptt.conf which will allow the test traps sent above to be passed through to Nagios:

EVENT netSnmpExampleHeartbeatRate .1.3.6.1.4.1.8072.2.3.0.1 "netSnmpExampleHeartbeatRate" Normal
FORMAT SNMP netSnmpExampleHeartbeatRate
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "" "netSnmpExampleHeartbeatRate"


The default SNMP Trap configuration is stored in the /etc/snmp/snmptrapd.conf file and contains just two lines:

disableAuthorization yes
traphandle default /usr/sbin/snmptthandler

Install PHP 8 on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install PHP 8 on any Linux distribution.


To install Apache with PHP 8 module:

$ sudo apt install apache2 libapache2-mod-php8.0 

After successful installation, restart Apache service to reload newly installed modules:

$ sudo systemctl restart apache2 


To check loaded PHP modules use the command:

$ php -m

Install WHM Cpanel on AlmaLinux 8 Server - Step by Step Process ?

This article covers the complete steps to install WHM Cpanel on AlmaLinux 8 Server.

To manage Linux servers for hosting purposes most of the services are using WHM's Cpanel.

Although there are many hosting manager software, because of its easy-to-use interface and features, it is one of the best control panels for Web hosting services. 


cPanel, Control Panel, is a control panel developed in 1997 that offers us high-quality web hosting with excellent features that, thanks to WHM (Web Host Manager), can be managed from a graphics console, with everyone doing their job.

iisnode encountered an error when processing the request - Fix it Now ?

This article covers methods to resolve "iisnode encountered an error when processing the request" error.

Basically, this iisnode error triggers when the application pool doesn't have enough permissions to write to the current folder. 

Therefore, you need to Allow, 'Full Control', for user 'IIS_IUSRS', from 'Advanced Security' upon right clicking your application root directory.


This error simply denotes that Your application pool doesn't seem to have enough permissions to write to the current folder.

1. You can either edit the permissions to give the IIS_IUSRS group write permissions to that folder

2. Go into the advanced settings menu and under Process Model -> Identity change the user account to a user that already has write permissions.

Clean Up and Compress WinSxS Folder on Windows Server / Windows 10 - Do it Now ?

This article covers methods to Clean Up and Compress WinSxS Folder on Windows Server/Windows 10. 

WinSxS folder in Windows is the reasons of its constant growth and ways to clean up it. 

The C:\Windows\WinSxS directory is the repository of Windows components. This directory contains DLLs, binary and XML files necessary for installation and operation of various Windows roles or features.

When installing the Windows updates (usually this happens every month), the new version of the updated component is installed on the system, while the old one is saved to the WinSxS folder (it is necessary to provide compatibility and make it possible to rollback to the previous versions of the components when you uninstall the Windows update).


To clean up the WinSxS folder on Windows 10 and Windows Server 2016/2019:

1. Optimize the component store and remove old versions of Windows component files left after installing Windows updates;

2. Features on Demand – allows you to remove unused Windows components from the disk;

3. Enable NTFS compression on the WinSxS folder – a way to reduce the size of the WinSxS directory using the built-in compression of the NTFS file system.


How to Check the Actual Size of WinSxS Folder on Windows 10?

The easiest way to get the current size of the WinSxS folder on Windows is to open the properties of the %windir%\WinSxS folder in File Explorer (or use a PowerShell script). 

You can find out the real size of the WinSxS folder on disk using the du tool from Sysinternals:

du -v c:\windows\winSXS

Mapped Network Drives Not Showing in Elevated Programs

This article covers methods to fix 'Mapped Network Drives Not Showing in Elevated Programs' issue for our customers.
When UAC is enabled, the system creates two logon sessions at user logon. Both logon sessions are linked to one another.
One session represents the user during an elevated session, and the other session where you run under least user rights.
When drive mappings are created, the system creates symbolic link objects (DosDevices) that associate the drive letters to the UNC paths.
These objects are specific for a logon session and are not shared between logon sessions.
When the UAC policy is configured to Prompt for credentials, a new logon session is created in addition to the existing two linked logon sessions.

To resolve this Windows issue:

1. In Local Group Policy Editor, locate the following Group Policy path:

Local Computer Policy\Windows Settings\Security Settings\Local Policies\Security Options

2. Configure the following policy to Prompt for consent: User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode


Note:
The EnableLinkedConnections registry entry forces the symbolic links to be written to both linked logon sessions that are created, when UAC is enabled.

Can't move the folder because there is a folder in the same location that can't be redirected

This article covers Steps to resolve Windows error, Can't move the folder because there is a folder in the same location that can't be redirected.


To resolve this error, try the following:

1. Open Registry Editor by pressing Windows logo+R then type "regedit". Press Enter.
2. Now head to this address:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

3. Locate a personal folder at the right panel that is displaying the error and double-click on it.
4. Replace the current value data with the corresponding Default Value in the below list:

Desktop - %USERPROFILE%\Desktop 
Favorites - %USERPROFILE%\Favorites 
Music - %USERPROFILE%\Music 
Pictures - %USERPROFILE%\Pictures 
Videos - %USERPROFILE%\Videos 
Documents - %USERPROFILE%\Documents 
Downloads - %USERPROFILE%\Downloads

Note the Corresponding registry key for the Downloads folder.
5. Click Ok to save the changes, close Registry Editor and restart the computer.


PiP is not recognized as an internal or external command - Fix it Now ?

This article covers different methods to resolve PiP is not recognized as an internal or external command.

Basically, the error, "PiP is not recognized as an internal or external command" happens when we try to install Python packages via a Command Prompt window.
PiP is a recursive acronym for "Pip Installs Packages".

It's essentially a package management system used to install and manage software packages written in Python. Most users make use of PiP to install and manage Python packages found in the Python Package Index.

To add PIP to the PATH environment variable using the Windows GUI:

1. Press Windows key + R to open up a Run dialog box. Then, type "sysdm.cpl" and press Enter to open up the System Properties screen.
2. Inside the System Properties screen, go to the Advanced tab, then click on Environment Variables.
3. In the Environment Variables screen, go to System variables and click on Path to select it. Then with the Path selected, click the Edit… button.
4. In the Edit environment variable screen, click on New and add the path where the PiP installation is located. For Python 3.4, the default location is C:\Python34\Scripts.
5. Once the path is added, open a fresh CMD window and try to install a python package that comes with PiP.

You should no longer see the "pip is not recognized as an internal or external command" error.

DISM Error 0x800f0906 "The source file could not be downloaded"

This article covers methods to fix DISM Error 0x800f0906. Basically, the failure of the DISM command-line utility will lead us to the DISM Error 0x800f0906.
The DISM (Deployment Image Servicing and Management) command-line utility is an incredibly nifty little tool that can be used to service and repair a Windows installation.
The DISM.exe command failing can be a pretty significant issue, especially if this happens when you desperately need the utility to work its magic.
When the DISM command-line tool fails with error code 0x800f0906, the accompanying error message either states that the source files could not be downloaded or that the files required to repair the store could not be found.

To resolve DISM Error 0x800f0906:

Uninstall the KB3022345 Update
1. Press the Windows key on your keyboard to open the Start menu, and either click Control Panel, or type in Control Panel and open the result, depending on which version of Windows you’re using.
2. Switch to Icons view, in the top right corner of Control Panel, and open Programs and Features from the list.
3. On the left side, click on the View installed updates
4. You will see a search box in the top right corner, type KB3022345 to find the update with less effort.
5. When you've found it, right-click it, and choose
6. Once everything is done, reboot your device.

The source file names are larger than is supported by the file system

This article covers methods to resolve Windows error "The source file names are larger than is supported by the file system". Most Windows users encounter this issue when trying to copy or delete a file on the computer and they may receive an error message saying Source Path Too Long with the explanation of the source file name(s) are larger than is supported by the file system.


This Windows error error happens mainly because one or more files that are kept in a series of subfolders that have long names, but Windows only allows 258 characters at most in the folder path subfolder.
This will prevent you from moving the files or folders that are saved in this folder.

To fix this windows error, try the following:

Delete the File/Folder by Bypassing the Recycle Bin
You know that when you delete files from your computer, these files will be first moved to the Recycle Bin and they will stay there until you delete them permanently.
i. Click on the file or folder that is bothered by the Source Path Too Long error.
ii. Press the SHIFT and Delete buttons at the same time to permanently delete the file or folder.

Disk full due to large System Volume Information Folder on Windows

This article covers how to access System Volume Information Folder and clear up the disk space.
Basically, the disk full warning in windows can also happen due to the large System Volume Information Folder.

What is System Volume Information Folder in Windows?

1. WindowsImageBackup —system restore points on desktop Windows versions or System State backups made using Windows Server Backup (wbadmin) in server OSs;
2. The contents of Indexing Service database used for fast file search (including Outlook search);
3. Distributed Link Tracking Service database;
4. Disk snapshots made by Volume Shadow Copy, which can be used to recover older versions of files. For each snapshot, a separate file is created with a long ID as a name;shadow copy files on system volume information folder
5. NTFS disk quota settings;
6. Base and chunks of the Data Deduplication service;
7. DFS Replication database (dfsr.db);
8. WPSettings.dat file – created by the storage service (StorSvc);
9. The USB drives will also store an IndexerVolumeGuid file that defines the unique disk label used by the Windows Search service;
10. AppxProgramDataStaging, AppxStaging – Windows UWP app backups (it can be used for recovery after removal).

Make Sure the File is an NTFS Volume and isn't in a Compressed Folder or Volume

This article covers methods to resolve Windows error "Make Sure the File is an NTFS Volume and isn't in a Compressed Folder or Volume" for our customers.
The first thing you should do to isolate the error is to change the path of the downloaded ISO file.
Sometimes, the error is triggered by the address of the ISO file for some reason in which case moving the file to another drive solves the problem.
Therefore, try changing the volume in which the ISO file is stored to fix your error.

Causes of this Windows error:

This error is not something new, however, there was a certain thing that made it trigger the most.

Following are the factors that usually cause it —


1. Windows 10 security update.

For most of the users, the error came into being after the release of KB4019472 Windows 10 update which happened to be a security update. This update made the error emerge for most of the users.


2. Location of ISO file.

In some cases, the error can be due to the location or path of the downloaded ISO file. In such a scenario, you will have to change the location.

Windows error "The volume does not contain a recognized file system" - Fix it Now ?

This article covers methods to fix 'The volume does not contain a recognized file system' the Windows error for our customers.

What Caused The Volume Does Not Contain the Recognized File System Error ?

Here are some of the reasons that can cause the error occurs on devices:
1. System re-installation
2. Presence of virus or malware
3. Unsafe system shut down.
4. Failure of file system conversion
5. Deletion of essential system files by mistake
6. Presence of bad sectors
7. Users misapplication
8. Virus/Trojan infection
9. Insufficient power supply

To fix this Windows error:

1. Proceed to Start and click on My Computer or This PC.
2. Select that drive that is not accessible and then choose Properties by right-clicking it.
3. From the Properties window, select the Tool tab and click on the Check button from the Error checking.
4. Select the Scan Drive option.
Once the scanning process is complete, please go back to This PC or My Computer to check whether the drive is fixed or not.

Windows Server error, You don't currently have permission to access this folder - Fix it now ?

This article covers methods to fix the 'You Don't Currently Have Permission to Access This Folder' issue for our customers.
If you happen to meet "You don't currently have permission to access this folder" issue when you are opening a folder, do not worry. You can fix the problem with the  effective tips here.

To remove the folder access error:

1. Gain Access by Allowing Everyone
i. Right-click on the folder that you're unable to access and select "Properties".
ii. Click on "Security" tab and under Group or user names click on "Edit".
iii. Click on "Add" and type everyone. Click on "Check names" and then click "OK".
iv. Select "Everyone". Under "Allow", select "Full control" and click on "Apply" and click "Ok".

2. Change the Ownership of the File/Folder
You can also try to change the ownership of the file or folder to troubleshoot "You Don't Currently Have Permission to Access This Folder" issue on Windows 10/8/7.
i. Right-click on the folder to navigate to "Properties".
ii. Go to the "group or username" section on the "Security" tab.
iii. Click on "Advanced", and then "Change".
iv. Type your account name. Click on "Check names" > "OK".
v. Check "Replace owner on sub containers and objects" > "OK".

VNC error 'Timed out waiting for the response from the host computer' - Fix it Now ?

This article covers methods to fix VNC 'Timed out waiting for the response from the host computer' error for our customers.


1. You can try adding a firewall rule:

$ sudo /sbin/iptables -I INPUT 1 -p TCP --dport 5901:5910 -j ACCEPT

2. Or directly modify the file /etc/sysconfig/iptables file and add a line:

-A INPUT -p tcp -m state --state NEW -m tcp --dport 5901:5910 -j ACCEPT

3. Restart the iptables service:

$ service iptables restart

4. If there is no iptables.service file, use yum to install it:

$ yum install iptables-services

5. Then Run the command,

$ sudo /sbin/iptables -I INPUT 1 -p TCP --dport 5901:5910 -j ACCEPT

The firewall does not need to be restarted, nor does it execute flush privileges, and then connect with the VNC client and find that the connection is up.

NRPE: No Output Returned From Plugin - How to fix this Nagios error ?

This article covers how to resolve Nagios error, NRPE: No Output Returned From Plugin. This error happens as a result of Permissions or Missing plugin.

To fix this Nagios error:

1. The most common solution is to check the permissions on the check_nrpe binary on the Nagios XI server:

ls -la /usr/local/nagios/libexec/check_nrpe

The expected permissions should resemble:

-rwxrwxr-x. 1 nagios nagios  75444 Nov 21 01:38 check_nrpe

2. If not, change ownership to user/group "nagios" and fix up the permissions:

$ chown nagios:nagios /usr/local/nagios/libexec/check_nrpe
$ chmod u+rwx /usr/local/nagios/libexec/check_nrpe
$ chmod u+rx /usr/local/nagios/libexec/check_nrpe

Cloud SQL Proxy error – An attempt was made to access a socket

This article covers methods to resolve Cloud SQL Proxy error. 

The Cloud SQL Proxy error looks like this:

An attempt was made to access a socket in a way forbidden by its access permissions


Therefore you cannot bind to it while it's running:

The SQL Server engages the 3306 port locally. 

1. Stop the SQL Server to bind the CloudSQL Proxy to it.

2. Incase of Windows 10: Go to Task Manager -> Services -> MySQL57

3. Right click and stop that task. 

4. Once you have done that try running the same command again. 

It'll work and show as output:

Listening on 127.0.0.1:3306 for <instance-name>


Requirements for using the Cloud SQL Auth proxy.

To use the Cloud SQL Auth proxy, you must meet the following requirements:

1. The Cloud SQL Admin API must be enabled.

2. You must provide the Cloud SQL Auth proxy with Google Cloud authentication credentials.

3. You must provide the Cloud SQL Auth proxy with a valid database user account and password.

4. The instance must either have a public IPv4 address, or be configured to use private IP.

The public IP address does not need to be accessible to any external address (it does not need to be added as an authorized network address).

Plesk error Access to the path is denied - Fix it Now

This article covers Plesk Access to the path is denied error. For instance, while trying to access http://example.com/testfolder/test.aspx, it produces the error:

Access to the path %plesk_vhosts%example.com\httpdocs\testfolder is denied

This signifies that the Required system user and/or permissions are not configured properly for the directory %plesk_vhosts%example.com\httpdocs\testfolder in Plesk.


To fix this Plesk error:

1. Connect to the server via RDP.

2. When default permissions on the domain folder are lost, the following actions can be performed to restore them:

i. For Plesk 12.5, Onyx and Obsidian:

"%plesk_cli%\repair.exe" --repair-webspace-security -webspace-name example.com

If it is necessary to repair permissions for all domains, the following command should be used:

"%plesk_cli%\repair.exe" --repair-all-webspaces-security

Also, Plesk Reconfigurator could be used: in the Windows Start menu, select All Programs > Plesk > Plesk Reconfigurator and select Repair Plesk installation > Plesk Virtual Hosts Security > Check .

ii. For Plesk before 12.5:

Go to the Domains page, mark the required domains, and click on the Check permissions button.

Then uncheck the Check-only mode checkbox and click OK .

Plesk error PHP has encountered an Access Violation - Fix it now

This article covers how to fix PHP has encountered an Access Violation which occurs in the Windows server with the Plesk control panel. 

Do a copy libmysql.dll from C:\Program Files (x86)\SWsoft\Plesk\Additional\PleskPHP5 to C:\WINDOWS\system32

Wait for few minutes and it should fix the issue.


To fix PHP has encountered an Access Violation at XXXXX in Plesk:

1. Connect to the server via SSH.

2. Create a backup of the psa database:

plesk db dump psa > /root/psa_backup.sql

3. Download the attached script:

$ wget https://plesk.zendesk.com/hc/article_attachments/115001860533/script_kb213376309

4. Make the script executable:

$ chmod +x script_kb213376309

5. Launch the script for the affected subscription:

Note: change the "example.com" website in the command below to the correct one.

$ ./script_kb213376309 example.com

6. If an error like below appears:

ERROR 1062 (23000) at line 5: Duplicate entry '123-789' for key 'PRIMARY' exit status 1

find the duplicate record in the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry.

plesk db "select * from IpAddressesCollections where ipCollectionId=123;"

7. Remove the duplicate record from the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry

Change the "456" ipAddressId in the command below to the correct one based on the output from the previous step.

$ plesk db "delete from IpAddressesCollections where ipCollectionId=123 and ipAddressId=456;"

Nagios error Service check timed out after n Seconds

This article covers how to resolve 'Service check timed out after n Seconds' error for our customers.

You can increase the timeout on the check, though you will have to alter the check in XI and the plugin timeout in the ncpa.cfg file on the remote host.


If it is related to Nagios XI check_xi_ncpa Timeout:

This timeout is how long the check_xi_ncpa command on the Nagios XI server will wait for a response from the NCPA agent. 

By default the timeout is not set, thereby defaulting to the plugin timeout or the global timeout.

1. In the Nagios XI web interface navigate to Configure > Core Config Manager > Commands. 

2. This brings up the Commands page, use the Search field to search for ncpa and click Search.

3. Click the check_xi_ncpa command.

4. You can change the timeout in Nagios XI with the switch -T in the check_xi_ncpa command.

5. In the Command Line, add -T <time value in seconds> after $HOSTADDRESS$. Ex. -T 120

6. Save your changes and then click the Apply Configuration button.

WDS deployment in Virtual machines – Few test cases

This article covers some methods to test Windows deployment in virtual machines. Windows Deployment Services (WDS) enables you to deploy Windows operating systems over the network, which means that you do not have to install each operating system directly from a CD or DVD.


To install Windows Deployment Services:

Windows Deployment Services ships as an innate role of Windows Server. I will be demonstrating on WS2016. All currently-supported versions provide it and you follow nearly the same process on each of them.

1. Start in Server Manager. Use the Add roles and features link on the main page (Dashboard) or on the Manage drop-down.

2. Click Next on the introductory page.

3. Choose Role-based or feature-based installation.

4. On the assumption that you're running locally, you'll only have a single server to choose from. If you've added others, choose accordingly.

5. Check Windows Deployment Services.

6. Immediately upon selecting Windows Deployment Services, you’ll be asked if you’d like to include the management tools. Unless you will always manage from another server, leave the box checked and click Add Features.

7. Click Next on the Select server roles page and then click Next on the Select server features page (unless you wish to pick other things; no others are needed for this walkthrough).

8. You'll receive another informational screen explaining that WDS requires further configuration for successful operation. Read through for your own edification. You can use the mentioned command line tools if you like, but that won't be necessary.

9. You will be asked to select the components to install. Leave both Deployment Server and Transport Server checked.

10. Click Install on the final screen and wait for the installation to finish.


To create WDS Boot Images:

When a system starts up and PXE directs it to the WDS server, it first receives a boot image. The boot image should match the operating system it will deploy.

You can obtain one easily.

1. Find the DVD or ISO for the operating system that you want to install. Look in its Sources folder for a file named boot.wim. 

2. On your WDS server, right-click the Boot Images node and click Add Boot Image.

3. On the first page of the wizard, browse to the image file. You can load it right off the DVD as it will be copied to the local storage that you picked when you configured WDS.

4. You’re given an opportunity to change the boot image’s name and description. I would take that opportunity, because the default Microsoft Windows Setup (x##) won’t tell you much when you have multiples.

5. You will then be presented with a confirmation screen. Clicking Next starts the file copy to the local source directory. After that completes, just click Finish.

Disable NetBIOS and LLMNR Protocols in Windows Using GPO - How to do it

This article covers how to disable NetBIOS and LLMNR Protocols for our customers. The broadcast protocols NetBIOS over TCP/IP and LLMNR are used in most modern networks only for compatibility with legacy Windows versions. Both protocols are susceptible to spoofing and MITM attacks. 

In the Metasploit there are ready-made modules that allow you to easily exploit vulnerabilities in the broadcasting NetBIOS and LLMNR protocols to intercept user credentials in the local network (including NTLMv2 hashes). 

To improve your network security, you need to disable these protocols on the domain network. 


In the domain environment, LLMNR broadcasts can be disabled on computers and servers using Group Policy. 

To do it:

1. Open the gpmc.msc, create a new GPO or edit an existing one that is applied to all workstations and servers;

2. Go to Computer Configuration -> Administrative Templates -> Network -> DNS Client;

3. Enable Turn off smart multi-homed name resolution policy by changing its value to Enabled;

4. Wait while the GPO settings on clients are updated, or manually update them using the command: gpupdate /force.


To manually disable NetBIOS on Windows as follows:

1. Open network connection properties

2. Select TCP/IPv4 and open its properties

3. Click Advanced, then go to WINS tab and select Disable NetBIOS over TCP

4. Save the changes.

SQL Server Error 9002 - Fix it now

This article covers methods to resolve SQL Server Error 9002 for our customers. SQL Server Error 9002 happens when the SQL Transaction Log file becomes full or indicated the database is running out of space. A transaction log file increases until the log file utilizes all the available space in disk. A quick fix is to create more space for log file.


To Fix SQL Server Error 9002:


1. Backup Transaction Log File

Incase, SQL database that you are using is full or out of space, you should free the space. For this purpose, it is needed to create a backup of transaction log file immediately. Once the backup is created, the transaction log is truncated. If you do not take back up of log files, you can also use full or Bulk-Logged Recovery model to simple recovery model.


2. Free Disk Space

Generally, the transaction Log file is saved on the disk drive. So, you can free the disk space which contains Log file by deleting or moving other files on order to create some new space in the drive. The free space on disk will allow users to perform other task and resolve SQL Error Log 9002 The Transaction Log for Database is Full.


3. Move Log File to a Different Disk

If you are not able to free the space on a disk drive, then another option is to transfer the log file into a different disk. Make sure another disk in which you are going to transfer your log file, has enough space.

i. Execute sp_detach_db command to detach the database.

ii. Transfer the transaction log files to another disk.

iii. Now, attach the SQL database by running sp_attach_db command.


4. Enlarge Log File

If the sufficient space is available on the disk then you should increase the size of your log file. Because, the maximum size for a log file is considered as 2 TB per .ldf file.


To enlarge log file, there is an Autogrow option but if it is disabled, then you need to manually increase the log file size.

i. To increase log file size, you need to use the MODIFY FILE clause in ALTER DATABASE statement. Then define the particular SIZE and MAXSIZE.

ii. You can also add the log file to the specific SQL database. For this, use ADD FILE clause in ALTER DATABASE statement.

Then, add an additional .ldf file which allows to increase the log file.

Manage Scheduled Tasks with PowerShell - How to do it

This article covers how to use the PowerShell features to create scheduled tasks. The Get-ScheduledTask cmdlet gets the task definition object of a scheduled task that is registered on a computer. You can use PowerShell to create and manage scheduled tasks. Managing scheduled tasks with PowerShell is made possible with the use of the ScheduledTasks module that’s built-in to Windows.
With the PowerShell Scheduled Tasks module, setting up scheduled tasks using PowerShell commands is made possible. This module provides the opportunity and means to create and deploy scheduled tasks programmatically on the local and remote computers.

Important scheduled task component:
1. Action – the action that is executed by the scheduled task. An action is typically to run a program or a script. A scheduled task can have more than one actions.
2. Trigger – controls when the scheduled task runs. Triggers can be time-based, like, setting a schedule for daily or hourly recurrence. Triggers can also be activity-based, which runs a task based on detected activities like computer startup, a user logs in, or logged events.
3. Principal – controls the security context used to run the scheduled task. Among other things, a principal includes the user account and the required privilege used by the scheduled task.
4. Settings – is a set of options and conditions that controls how the scheduled task behavior. As an example, you can customize a task to get removed after a consecutive number of days that the task is unused.

To add a Trigger for a scheduled task using PowerShell:
The cmdlet to use for creating a trigger is the New-ScheduledTaskTrigger cmdlet.
The command below creates a trigger to run daily at 3 PM.

Copy and run the code in PowerShell:

# Create a new trigger (Daily at 3 AM)
$taskTrigger = New-ScheduledTaskTrigger -Daily -At 3PM
$tasktrigger

This will Create a Trigger (Daily at 3 AM)

Enable Windows Lock Screen after Inactivity via GPO - How to do it

This article covers how to Enable Windows Lock Screen on domain computers or servers using Group Policy. Locking the computer screen when the user is inactive (idle) is an important information security element.
The user may forget to lock his desktop (with the keyboard shortcut Win + L) when he needs to leave the workplace for a short time.
If any other employee or client who is nearby can access his data. The auto-lock screen policy will fix this flaw.
After some time of inactivity (idle), the user's desktop will be automatically locked, and the user will need to re-enter their domain password to return to the session.

To enable lock screen with group policy:
1. Create a new GPO then edit it and go to:
Computer Config>Policies>Windows Settings>Security Settings>Local Policies>Security Options.
2. Find Interactive logon: Machine inactivity limit .
3. Set that to whatever time you want and it will lock the PC after it hits that timer.

To change my lock screen wallpaper using group policy:
1. Run GPEDIT. MSC.
2. Go this path "Computer Configuration\Policies\Administrative Templates\Control Panel\Personalization".
3. Enable the GP "Force a specific default lock screen image".
4. Specify the path to the image file.
5. Click OK.

To Find Windows 10's Spotlight Lock Screen Pictures:
1. Click View in File Explorer.
2. Click Options.
3. Click the View tab.
4. Select "Show hidden files, folders and drives" and click Apply.
5. Go to This PC > Local Disk (C:) > Users > [YOUR USERNAME] > AppData > Local > Packages > Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy > LocalState > Assets.

Cannot download Docker images behind a proxy - Fix it Now

This article covers the error, Cannot download Docker images behind a proxy. 

You can fix this docker issue by doing the following:

1. In the file /etc/default/docker, add the line:

export http_proxy='http://<host>:<port>'

2. Restart Docker:

$ sudo service docker restart


Also, you can Follow the steps given below to fix this docker error:

1. Create a systemd drop-in directory for the docker service:

$ mkdir /etc/systemd/system/docker.service.d

2. Create a file called /etc/systemd/system/docker.service.d/http-proxy.conf and add the HTTP_PROXY env variable:

[Service]
Environment="HTTP_PROXY=http://proxy.example.com:80/"

3. If you have internal Docker registries that you need to contact without proxying you can specify them via the NO_PROXY environment variable:

Environment="HTTP_PROXY=http://proxy.example.com:80/"
Environment="NO_PROXY=localhost,127.0.0.0/8,docker-registry.somecorporation.com"

4. Flush changes:

$ sudo systemctl daemon-reload

5. Verify that the configuration has been loaded:

$ sudo systemctl show --property Environment docker
Environment=HTTP_PROXY=http://proxy.example.com:80/

6. Restart Docker:

$ sudo systemctl restart docker

Updating Windows VM Templates on VMWare with PowerShell - How to do it

This article covers how to update Windows VM Templates on VMWare. 

The update process of a VM template on VMWare consists of the following stages:

1. A template from the Content Library is converted to a virtual machine.;

2. After starting it, an administrator logs on, installs approved Windows updates using WSUS, updates the required software;

3. After the updates have been installed, the VM is restarted, then turned of and converted back to the template.

Virtualization Restrictions in RedHat Linux with KVM

This article covers Virtualization Restrictions in RedHat Linux which are additional support and product restrictions of the virtualization packages.


The following notes apply to all versions of Red Hat Virtualization:

1. Supported limits reflect the current state of system testing by Red Hat and its partners. Systems exceeding these supported limits may be included in the Hardware Catalog after joint testing between Red Hat and its partners. If they exceed the supported limits posted here, entries in the Hardware Catalog are fully supported. In addition to supported limits reflecting hardware capability, there may be additional limits under the Red Hat Enterprise Linux subscription terms. Supported limits are subject to change based on ongoing testing activities.


2. These limits do not apply to Red Hat Enterprise Linux (RHEL) with KVM virtualization, which offers virtualization for low-density environments.


3. Guest operating systems have different minimum memory requirements. Virtual machine memory can be allocated as small as required.

Recover orphan innodb database from ibd file - How to perform this task

This article covers how to recover the orphan InnoDB database from the ibd file. 


Orphan InnoDB database incident mostly happened when:

1 – user accidentally remove ibdata1 file. (mostly in /var/lib/mysql/ibdata1).

2 – ibdata file courrupted.


To Recover Orphaned InnoDB Tables:

1. Restart the MySQL service to recreate ibdata1, then take a backup of your database folder.

2. Login to MySQL.

3. Create a dummy database with the same name. Then, create a dummy table with the same name as the corrupted one (don’t mind the table structure for now).

4. Stop the MySQL service, copy the .frm file from the backup you took to replace the .frm file.

5. Start MySQL and have a look at the structure of your table - it should now be in place! However, don’t get too happy yet.

6. Issue a SHOW CREATE TABLE statement and copy its contents, then create the table with them.

7. Stop MySQL, copy the .ibd file from the backup directory to /var/lib/database_name and replace the existing .ibd file from the dummy table.

8. Now it’s time for Percona’s tools to shine - download and install the Percona Data Recovery Tool for InnoDB , then run the following (here -o represents the full location of your ibdata1 file, -f represents the full location of your .ibd file, -d represents the database name and -t represents your table name):

ibdconnect -o /var/lib/mysql/ibdata1 -f /var/lib/mysql/database_name/table_name.ibd -d database_name -t table_name

9. Now, run a checksum check against InnoDB - make sure you get no error messages (you might need to run this tool several times):

innochecksum /var/lib/mysql/ibdata1

10. Finally, you should be good to go - simply start MySQL.

Listen on Privileged Ports with Nagios Log Servers - How to set it up

This article covers how to configure Nagios Log Servers to listen on privileged ports. Now Nagios Log Server Administrators who would like configure Nagios Log Server to listen on ports below 1024 which are privileged in Linux. This can be useful if you have legacy devices that can only send on specific ports (e.g. syslog on port 514).

Ports below 1024 are privileged on Linux and only allow the root user to listen on them. 

This can be implemented via two solutions:

1. Run Logstash as root

2. Use setcap


To use Use setcap for Listening On Privileged Ports:

Here, you can use the logstash running as the nagios user but this method may be less secure in some environments as it will allow any Java process to listen on privileged ports.

i. The logstash init configuration file requires three lines to be added to the end of it, open the file with the following command:

On Debian | Ubuntu:

$ vi /etc/default/logstash

or

$ sudo /etc/default/logstash

2. Then, Add the following three lines to the end of the file:

echo $(dirname $(find /usr/lib -name libjli.so)) | awk '{print $1}'> /etc/ld.so.conf.d/java.conf

eval "$(which ldconfig)"

setcap 'cap_net_bind_service=+ep' $(readlink -f $(which java))

3. Save the file and close vi.

4. Restart Logstash Service

The logstash service needs to be restarted for these changes to apply:

$ sudo systemctl restart lagstash.service

Cannot Copy and Paste via RDP - How to fix this Windows issue

This article covers how to Allow/Prevent Copy and Paste via RDP Clipboard on Windows. Copy and paste is an essential function that should ideally work every day without fail. You can resolve this Windows issue by restarting the rdpclip.exe program in the remote computer.

Also, you can log off the remote user and then log back on on Windows.

Once the rdpclip.exe is relaunched, you should be able to copy paste using clipboard from the local computer to the remote computer. 


In order to fix the copy and paste issue in Windows, you need to end the rdpclicp.exe process and then restart it:

To do this;

1. Press Ctrl + Shift + ESC to start Task Manager.

2. Go to the "Details" tab.

3. Right-click the "rdpclip.exe" process.

4. Select "End task".

5. Go to Windows/system32 folder.

6. Look for "rdpclip.exe" and run it.

Enable Built-in Administrator Account on Windows 10 - How to implement this

This article covers an easy way to activate the administrator account is from the command prompt with elevated privileges. Windows 10 includes a built-in Administrator account that, by default, is hidden and disabled for security reasons. Sometimes, you need to perform a bit of Windows management or troubleshooting or make changes to your account that requires administrator access.

Windows 10 administrator default password will not be required, alternatively you can enter password for local account and sign in.


To know if I have the built-in Administrator account in Windows 10:

1. Right-click the name (or icon, depending on the version Windows 10) of the current account, located at the top left part of the Start Menu, then click on Change account settings. 

2. The Settings window will pop up and under the name of the account if you see the word "Administrator" then it is an Administrator account.


To reset the built-in Administrator account in Windows 10:

1. Boot from Windows 10 bootable CD/DVD or USB.

2. When the install now screen shows up click on Repair your computer > Advanced Options >Troubleshoot > Command Prompt.

3. Once you can boot into the command prompt, type "net user administrator /active:yes".


To enable hidden administrator:

1. Go to Security Settings > Local Policies > Security Options. 

2. The policy Accounts: Administrator account status determines whether the local Administrator account is enabled or not. 

3. Check the "Security Setting" to see if it is disabled or enabled. 

4. Double-click on the policy and select "Enabled" to enable the account.

This App Has Been Blocked for Your Protection on Windows - Fix it now

This article covers methods to fix the 'This App Has Been Blocked for Your Protection on Windows' error. Windows Defender SmartScreen acts as a sort of guard dog while you use Windows 10.

It will block you from opening some apps if they come from an unknown place or are created by an unknown publisher. 

Some apps really are harmful and really will get you in a mess. Only go around the Windows 10 app block if you know for sure that the file is safe.


To unblock an app that is blocked by the administrator:

1. Locate the file, right-click it, and select "Properties" from the contextual menu. 

2. Now, find the "Security" section in the General tab and check the checkbox next to "Unblock" - this should mark the file as safe and let you install it. 

3. Click "Apply" to save the changes and try to launch the installation file again.


To Unblock Programs In Windows Defender Firewall:

1. Select the “Start” button, then type “Firewall“.

2. Select the “Windows Defender Firewall” option.

3. Choose the "Allow an app or feature through Windows Defender Firewall" option in the left pane.


To install a program that is blocked by administrator:

1. Disable Windows SmartScreen.

2. Execute the file via Command Prompt.

3. Install the app using the hidden administrator account.

4. Temporarily disable your antivirus program.

Automatically Log in to Windows without Password - How to get this done

This article covers methods to automatically log in to Windows without password.

Here, you can disable password login on Windows 10 and boot the computer directly to the user’s desktop. In order to temporarily disable automatic logon in Windows and manually specify the user credentials under which you need to sign in, you must hold down the Shift key while Windows is booting.


CMD is the official and tricky way to bypass Windows 10 admin password. In this process, you will need a Windows Installation disk and If you don't have the same, then you can create a bootable USB drive consisting of Windows 10. Also, you need to disable UEFI secure boot option from the BIOS settings.


To Disable Windows 10 Login Password via the User Account Settings:

1. Press Win+R;

2. In the Run dialog box, enter netplwiz or control userpasswords2 command;

3. In the next window with the list of local user accounts, uncheck the option “User must enter a username and password to use this computer” and save changes (OK);


To Automatically log in to your Windows 10 PC:

1. Open the Run command box (Start > All apps > Windows System > Run or press Windows key + R).

2. A User Accounts window will open.

3. A new window labeled Automatically sign in will pop up.

4. Your computer will now bypass the log-in page when you turn on your PC, but it will not bypass the login page when you unlock your PC.

Steps to Run Program without Admin Privileges and to Bypass UAC Prompt

This article covers how to run a program without admin privileges. The trick to bypass UAC is to create a scheduled task (with highest privileges) for each program that you want to run, and then invoke the scheduled task item manually using schtasks.exe .

UAC helps keep your computer secure. If you reflexively disable UAC when setting up a computer, you should give it another try – UAC and the Windows software ecosystem have come a long way from when UAC was introduced with Windows Vista.


To  Eliminate UAC Prompts for Specific Applications:

1. In Task Scheduler, right-click "Task Scheduler Library" and select "New Folder" Name it whatever you would like.

2. Select the new folder and click "Create Task" (not "Create Basic Task")

3. Name the task something descriptive. ...

4. Under the Actions tab, select "Start a program" in the Action dropdown if it isn't already.


To bypass UAC administrator password:

1. Right-click Start button at left lower corner of PC, select Control Panel.

2. Click User Accounts and family Safety.

3. Click User Accounts.

4. Click Change your account type.

5. Enter Admin password and click Yes to continue.

6. Select Administrator as your new account type, and click Change Account Type.

Remote session disconnected because there are no remote desktop license servers

This article covers how to resolve the error 'remote session disconnected because there are no remote desktop license servers'.


If the problems tend to be associated with the following user messages:

i. The remote session was disconnected because there are no Remote Desktop client access licenses available for this computer.

ii. The remote session was disconnected because there are no Remote Desktop License Servers available to provide a license.


Then, configure the RD Licensing service by following the steps below:

1. Open Server Manager and navigate to Remote Desktop Services.

2. On Deployment Overview, select Tasks, and then select Edit Deployment Properties.

3. Select RD Licensing, then select the appropriate licensing mode for your deployment (Per Device or Per User).

4. Enter the fully qualified domain name (FQDN) of your RD License server, and then select Add.

5. If you have more than one RD License server, repeat step 4 for each server.


If the RD License Diagnoser lists other problems, such as "The RDP protocol component X.224 detected an error in the protocol stream and has disconnected the client," there may be a problem that affects the license certificates. Such problems tend to be associated with user messages, such as the following:

Because of a security error, the client could not connect to the Terminal server. After making sure that you are signed in to the network, try connecting to the server again.

In this case, refresh the X509 Certificate registry keys by following the steps given below:

To resolve this problem, back up and then remove the X509 Certificate registry keys, restart the computer, and then reactivate the RD Licensing server.

1. Open the Registry Editory and navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM.

2. On the Registry menu, select Export Registry File.

3. Enter exported- Certificate into the File name box, then select Save.

4. Right-click each of the following values, select Delete, and then select Yes to verify the deletion:

i. Certificate

ii. X509 Certificate

iii. X509 Certificate ID

iv. X509 Certificate2

5. Exit the Registry Editor and restart the RDSH server.


To fix Remote session was disconnected because there are no Remote Desktop client access licenses:

1. You need to delete the following registry key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSLicensing.

2. If it doesn't work and you get the following error message: "The remote computer disconnected the session because of an error in the licensing protocol";

3. Then all you need to do is Right-Click on the Remote Desktop Connection icon and select "Run as Administrator".

Unlock a file locked by any process or system - Do it now

This article covers how to unlock a file locked by any process or system. 

If everything goes correctly, you will fix this Windows problem without killing the process and – more importantly – without having to reboot the system.


To unlock a locked file in Windows 10?

1. Type the name of the locked file in the field, and click the Search button. 

2. Select the file from the search result. 

3. Behind the search window, in "Process Explorer," right-click the locked file, and select Close Handle to unlock it.


To Open a Locked File When Another Program Is Using It:

1. Close The Program That Is Using The Locked File.

2. Kill The Program Process Using Task Manager.

3. Turn Off The Preview Pane In File Explorer.

4. Toggle The Folder Process In File Explorer.

5. Launch & Close The Locked File.

6. Restart Your Windows Computer.

7. Use Command Prompt To Delete The File.

Linux vs Windows file systems - Which do you prefer

This article covers difference between Linux and Windows file system. Basically, both Windows and Linux use file systems to store data in an organized manner. 


Advantages of using Linux:

1. Linux facilitates with powerful support for networking. 

2. The client-server systems can be easily set to a Linux system. 

3. It provides various command-line tools such as ssh, ip, mail, telnet, and more for connectivity with the other systems and servers. 

4. Tasks such as network backup are much faster than others.


Disadvantages of Linux OS:

1. No single way of packaging software.

2. No standard desktop environment.

3. Poor support for games.

4. Desktop software is still rare.


Why Linux is not popular as Windows?

The main reason why Linux is not popular on the desktop is that it doesn't have “the one” OS for the desktop as does Microsoft with its Windows and Apple with its macOS. 

If Linux had only one operating system, then the scenario would be totally different today. Linux kernel has some 27.8 million lines of code.


Linux a good operating system and widely considered one of the most reliable, stable, and secure operating systems too. In fact, many software developers choose Linux as their preferred OS for their projects. 

It is important, however, to point out that the term "Linux" only really applies to the core kernel of the OS.


Most Stable Linux Distros:

1. Debian. Suitable for: Beginners.

2. Fedora. Suitable for: Software Developers, Students.

3. Linux Mint. Suitable for: Professionals, Developers, Students.

4. Manjaro. Suitable for: Beginners.

5. openSUSE. Suitable for: Beginners and advanced users.

6. Tails. Suitable for: Security and privacy.

7. Ubuntu.

8. Zorin OS.


Reasons Why Linux Is Better Than Windows:

1. Total cost of ownership. The most obvious advantage is that Linux is free whereas Windows is not.

2. Beginner friendly and easy to use. Windows OS is one of the simplest desktop OS available today.

3. Reliability. Linux is more reliable when compared to Windows.

4. Hardware.

5. Software.

6. Security.

7. Freedom.

8. Annoying crashes and reboots.


Can Linux and Windows share files?

The easiest and most reliable way to share files between a Linux and Windows computer on the same local area network is to use the Samba file sharing protocol. 

All modern versions of Windows come with Samba installed, and Samba is installed by default on most distributions of Linux.


Can Linux read NTFS drives?

Linux can read NTFS drives using the old NTFS filesystem that comes with the kernel, assuming that the person that compiled the kernel didn't choose to disable it. 

To add write access, it's more reliable to use the FUSE ntfs-3g driver, which is included in most distributions.


For typical everyday Linux use, there's absolutely nothing tricky or technical you need to learn. Running a Linux server, of course, is another matter just as running a Windows server is. 

But for typical use on the desktop, if you've already learned one operating system, Linux should not be difficult.


Is Linux a good career choice?

A Linux Administrator job can definitely be something you can start your career with. 

It is basically the first step to start working in the Linux industry. 

Literally every company nowadays works on Linux. So yes, you are good to go.

Server Hardening - What it means

This article covers techniques to prevent attacks on the server. Basically, if we manage our servers without proper precautionary actions it is easy to spoil the reputation of the server.

Hardening your server is the process of increasing security on your server through a variety of means to result in a much more secure operating environment. Server hardening is one of the most important tasks to be handled on your servers. 

The default configuration of most operating systems is not designed with security as the primary focus. 

Default server setups focus more on usability, functionality and communication.


Server Hardening Security Measures Includes:

1. Hide login password from cgi scripts.

This setting allows you to hide the REMOTE_PASSWORD variable from scripts that the cpsrvd daemon's CGI handler executes.

2. Referrer safety check.

Only permit cPanel, Webmail and WHM to execute functions when the browser-provided referrer (port and domain or IP address) exactly matches the destination URL.

3. Initial default/catch-all forwarder destination

Select Fail to automatically discard un-routable email that your servers new accounts receive. This will help protect your server from mail attacks.

4. Verify signatures of third-party cPaddons.

Enable this option to verify GPG signatures of all third-party CPaddons.

5. Prevent "nobody" from sending mail.

Enable to block email that the nobody user sent to the remote address. Nobody is the username for Apache.

6. Enable SPF on domains for newly created accounts.

7. Proxy subdomain override.

Disable this option to prevent automatically-generated proxy domains when a user creates a subdomain.

8. Proxy subdomain creation.

Disable this option to prevent the addition of cPanel, Webmail, Web Disk and WHM proxy subdomain DNS entries to new accounts.

9. Cookie IP validation.

Disable this option to allow logins regardless of the user's IP address.

An error occurred while reconnecting - Fix this Windows error now

This article covers methods to resolve fix 'An error occurred while reconnecting' Windows error. 


Causes for 'The Local Device Name is already in Use' Error on Windows:

1. Drive mapping has gone wrong – The process of network drive mapping can sometimes produce problems like this one when it comes to drive letters.

2. Some drive letters are unassigned – Some drives may have incorrect or even missing drive letters which causes this error to appear.

3. File and Printer Sharing is disabled – If this option is disabled in any firewall you might be using, networking becomes difficult and full of errors.

4. No space on the server – Users have reported that they had to free up at least a couple of gigabytes on the root drive of the network’s server to get rid of the problem.


To fix 'The Local Device Name is already in Use' Error on Windows:

Remap the Drive Using Command Prompt

Remapping the network drive is the official solution recommended by Microsoft for users facing this problem. However, it has worked for many users and it has become one of the most used methods for this problem. 

Check out the steps to implement this;

1. Search for “Command Prompt” either right in the Start menu or by tapping the search button right next to it. Right-click on the first result which will appear at the top and select the “Run as administrator” option.

2. Users who are using an older version of Windows can use the Windows Logo Key + R key combination in order to bring up the Run dialog box. Type in “cmd” in the box and use the Ctrl + Shift + Enter key combination in order to run Command Prompt as an administrator.

3. Copy and paste the command shown below and make sure you click the Enter key on your keyboard.

net use * /delete

4. After you see that the operation is completed successfully, run the following command:

net use Z: \\server\share /user:username password

5. Make sure you replace the username and password placeholders with the correct username and password. Check to see if the problem is resolved!

Your system requires smb2 or higher Windows error - Fix it now

This article covers how to fix the Windows error 'Your system requires smb2 or higher'. SMB1 protocol is vulnerable and your system will give you a warning message saying that it requires SMB2. 

Most Windows 10 users reported Your system requires SMB2 or higher error message on their PC. 

SMB stands for Server Message Block, and it's a protocol for sharing files. The protocol has two versions, the SMB1, and the SMB2, and while both can be used, the latter is the more secure one.


To enable SMB2 on Windows 10:

Check if your system can install SMB2

1. Start PowerShell as administrator. Press the Windows Key+ X and select PowerShell (Admin).

2.Type Get-SmbServerConfiguration | Select EnableSMB2Protocol in the command prompt of the Window PowerShell and press Enter.

3. If your system can run SMB2 protocol, type windows features in the Search box and select Turn Windows features on or off.

4. Once the Windows Features window opens, check SMB1/CIFS File Sharing Support option and hit OK.

5. Restart your PC and check if the problem with SMB2 is resolved.


To enable SMB2 on Windows 10 using Powershell:

1. Start PowerShell as administrator. We already showed you how to do that in our previous solution.

2. Enter Set-SmbServerConfiguration –EnableSMB2Protocol $true and press Enter.

3. Press Y to confirm.

Map Network Drives or Shared Folders with Group Policy - How to do it

This article covers how to map network drives or shared folders with Group Policy.

Mapping network drives using Group Policy preferences is flexible, provides easy control over who receives the drive mappings, and has easy-to-use user interfaces, all of which are in stark contrast with the complexities associated with scripts.


To Set up drive mappings with Group Policy preferences:

1. Group Policy preferences are a set of extensions that increase the functionality of Group Policy Objects (GPOs). 

2. Administrators can use them to deploy and manage applications on client computers with configurations targeted to specific users. 

3. The Drive Maps policy in Group Policy preferences allows an administrator to manage drive letter mappings to network shares.


To Deploy item-level targeting with Group Policy preferences:

Item-level targeting (ILT) is a feature of Group Policy preferences that allows preference settings to be applied to individual users and/or computers dynamically. ILT allows an administrator to specify a list of conditions that must be met in order for a preference setting to be applied or removed to a user or computer object.

You can configure drive mapping, only users in the Product Managers group would receive the mapping. 

1. Under the Common tab of the mapped drive properties, check the Item-level targeting option, and then click Targeting….

2. In the Targeting Editor window, click New Item and select Security Group.

3. Click the … button, and type in the name of the security group.

4. Click OK to close the Targeting Editor once you're finished adding items to the list. 

Create CentOS Fedora RHEL VM Template on KVM - How to do it

This article covers how to create CentOS/Fedora/RHEL VM Templates on KVM. VM Templates are more useful when deploying high numbers of similar VMs that require consistency across deployments. If something goes wrong in an instance created from the Template, you can clone a fresh VM from the template with minimal effort.


To install KVM in your Linux system:

The KVM service (libvirtd) should be running and enabled to start at boot.

$ sudo systemctl start libvirtd

$ sudo systemctl enable libvirtd

Enable vhost-net kernel module on Ubuntu/Debian.

$ sudo modprobe vhost_net

# echo vhost_net | sudo tee -a /etc/modules


How to Prepare CentOS / Fedora / RHEL VM template ?

1. Update system

After you finish VM installation, login to the instance and update all system packages to the latest versions.

$ sudo yum -y update

2. Install standard basic packages missing:

$ sudo yum install -y epel-release vim bash-completion wget curl telnet net-tools unzip lvm2 

3. Install acpid and cloud-init packages.

$ sudo yum -y install acpid cloud-init cloud-utils-growpart

$ sudo sudo systemctl enable --now acpid

4. Disable the zeroconf route

$ echo "NOZEROCONF=yes" | sudo tee -a /etc/sysconfig/network

5. Configure GRUB_CMDLINE_LINUX – For Openstack usage.

If you plan on exporting template to Openstack Glance image service, edit the /etc/default/grub file and configure the GRUB_CMDLINE_LINUX option. Your line should look like below – remove rhgb quiet and add console=tty0 console=ttyS0,115200n8.

GRUB_CMDLINE_LINUX="crashkernel=auto rd.lvm.lv=cl/root rd.lvm.lv=cl/swap console=tty0 console=ttyS0,115200n8"

Generate grub configuration.

$ sudo grub2-mkconfig -o /boot/grub2/grub.cfg

6. Install other packages you need on your baseline template.

7. When done, power off the virtual machine.


How to Clean VM template ?

You need virt-sysprep tool for cleaning the instance.

$ sudo virt-sysprep -d centos7

Windows Update Error 0x80240440 - Fix it now

This article covers how to fix Windows Update Error 0x80240440. 


To fix Windows Update error 0x80240440:

1. Click Start and start typing on your keyboard for "services.msc"

2. In your search results "services.msc" should show up. Open it with a click.

3. A new windows will open containing all Windows services on your system.

Search for "Windows Update"

5. Right-click the "Windows Update" and then click Stop.


Also, you can clean the Windows Update temporary cache folder:

1. Hold your windows-key pressed and hit "R" key simultanous.

2. A small new windows will appear.

3. Type %windir%\SoftwareDistribution\DataStore in this new window and click OK.

4. This will open Windows Explorer on the correct location.

5. Delete all contents of this folder. (Hint: Use Ctrl + A to select all files and folders).


Eventually, you can start the Windows Update Service again:

1. Switch back to the windows Services.

2. Locate Windows Update.

3. Right-click on it and choose Start.

Windows update error 0x800f0805 - Fix it now

This article covers methods to resolve windows update error 0x800f0805. 

Windows update error #0x800f0805 indicates that the Windows edition was not detected. Check that the specified image is a valid Windows operating system image. All you need to do is restart your computer and try to activate it again, and it should work.


Causes of #error 0x800f0805 in Windows Update:

1. Bugs in update delivery to your system – This means that there is no fault in your system, instead, the Microsoft servers are experiencing issues.

2. Corrupted Windows files


Methods to fix the #Windows error 0x800f0805:

1. Using Windows Troubleshooter 

This built-in feature can automatically identify and apply fixes to issues on your device.

2. Manually downloading and installing the update

We can use the official Microsoft Update Catalog to download and install system updates manually.

3. Using System File Checker (SFC)

4. Using DISM

We recommend using a DISM scan after using SFC.

5. Resetting Windows Update components

This method will reset the Windows Update.

6. Reset your PC

If none of the above methods worked, you can freshly reinstall your OS without losing any files or settings by using 'Reset this PC' feature.

Windows update error 0xC190012E - Fix it now

This article covers methods to resolve Windows update error 0xC190012E.

This error generally happens when the user either tries to update their Windows operating system to Windows 10 v 1903 or when upgrading Windows 10 from insider preview for security reasons.


What triggers Windows Update Error 0xC190012E?

If the Windows Update is continuously failing to search for the Updates or are unable to install them due to error 0xc190012e then here is the problem that causing this error.

1. Missing Registry

2. No Internet accesses

3. An issue in Windows update service

4. Corrupt system files

5. Misconfiguration

6. Virus or Malware attack

Broken trust relationship between workstation and domain - Fix it now

This article covers tips to fix the 'broken trust relationship between workstation and domain' problem.

The underlying problem when this error is seen is that the machine you are trying to access can no longer communicate securely with the Active Directory domain to which it is joined.


Method to fix The trust relationship between this workstation and the primary domain failed Windows issue:

To resolve this issue, remove the computer from the domain, and then connect the computer to the domain.

1. Use a local administrator account to log on to the computer.

2. Select Start, press and hold (or right-click) Computer > Properties.

3. Select Change settings next to the computer name.

4. On the Computer Name tab, select Change.

5. Under the Member of heading, select Workgroup, type a workgroup name, and then select OK.

6. When you are prompted to restart the computer, select OK.

7. On the Computer Name tab, select Change again.

8. Under the Member of heading, select Domain, and then type the domain name.

9. Select OK, and then type the credentials of the user who has permissions in the domain.

10. When you are prompted to restart the computer, select OK.

11. Restart the computer.

MongoDB service is not starting up - Fix it now

This article covers how to resolve the the problem of starting MongoDB server when running the command mongod which may arise due to file permission or ownership issues.


The reason was the dbpath variable in /etc/mongodb.conf. 

To fix, you only had to change the owner of the /data/db directory recursively.

Also For ubunto , what made it happen and was real simple is to install mongodb package:

$sudo apt-get install  mongodb


Also, You can use the below-mentioned command for mongodb service is not starting up:-

$sudo rm /var/lib/mongodb/mongod.lock 

$mongod --repair 

$sudo service mongodb start


Mongodb service is not starting up:

This can also happen if your file permissions get changed somehow. 

Removing the lock file didn't help, and we were getting errors in the log file like:

2016-01-20T09:14:58.210-0800 [initandlisten] warning couldn't write to / rename file /var/lib/mongodb/journal/prealloc.0: couldn't open file    /var/lib/mongodb/journal/prealloc.0 for writing errno:13 Permission denied

2016-01-20T09:14:58.288-0800 [initandlisten] couldn't open /var/lib/mongodb/local.ns errno:13 Permission denied

2016-01-20T09:14:58.288-0800 [initandlisten] error couldn't open file /var/lib/mongodb/local.ns terminating


So, went to check permissions:

ls -l /var/lib/mongodb

total 245780

drwxr-xr-x 2 mongodb mongodb     4096 Jan 20 09:14 journal

drwxr-xr-x 2 root    root        4096 Jan 20 09:11 local

-rw------- 1 root    root    67108864 Jan 20 09:11 local.0

-rw------- 1 root    root    16777216 Jan 20 09:11 local.ns

-rwxr-xr-x 1 mongodb nogroup        0 Jan 20 09:14 mongod.lock

Install ClickHouse on Ubuntu 20.04 - Step by step process to perform it

This article covers how to install ClickHouse on Ubuntu. Basically, ClickHouse is an open-source analytics database developed for big data use cases. 

Install of ClickHouse on Ubuntu involves a series of steps that includes adjusting the configuration file to enable listening over other IP address and remote access. 


Column-oriented databases store records in blocks grouped by columns instead of rows. 

By not loading data for columns absent in the query, column-oriented databases spend less time reading data while completing queries. 

As a result, these databases can compute and return results much faster than traditional row-based systems for certain workloads, such as OLAP.


Online Analytics Processing (OLAP) systems allow for organizing large amounts of data and performing complex queries. 

They are capable of managing petabytes of data and returning query results quickly. 

In this way, OLAP is useful for work in areas like data science and business analytics.


Aggregation queries are queries that operate on a set of values and return single output values. 

In analytics databases, these queries are run frequently and are well optimized by the database. 


Some aggregate functions supported by ClickHouse are:

1. count: returns the count of rows matching the conditions specified.

2. sum: returns the sum of selected column values.

3. avg: returns the average of selected column values.


Some ClickHouse-specific aggregate functions include:

1. uniq: returns an approximate number of distinct rows matched.

2. topK: returns an array of the most frequent values of a specific column using an approximation algorithm.


You can set up a ClickHouse database instance on your server and create a database and table, add data, perform queries, and delete the database.

You can start, stop, and check the ClickHouse service with a few commands.

To start the clickhouse-server, use:

$ sudo systemctl start clickhouse-server

The output does not return a confirmation.

To check the ClickHouse service status, enter:

$ sudo systemctl status clickhouse-server

To stop the ClickHouse server, run this command:

$ sudo systemctl stop clickhouse-server

To enable ClickHouse on boot:

$ sudo systemctl enable clickhouse-server

To start working with ClickHouse databases, launch the ClickHouse client. 

When you start a session, the procedure is similar to other SQL management systems.

To start the client, use the command:

$ clickhouse-client

Troubleshoot DNS issues - Step by Step tips to resolve it

This article covers how to troubleshoot DNS issues. One of the handiest tools for troubleshooting DNS failures is the NSLOOKUP command, which you can access from a Windows Command Prompt window. Simply type NSLOOKUP followed by the name of the host for which you want to test the name resolution.

Basically, DNS errors are caused by problems on the user end, whether that's with a network or internet connection, misconfigured DNS settings, or an outdated browser. They can also be attributed to a temporary server outage that renders the DNS unavailable.


DNS: online name resolution:

The domain name system (DNS) is a directory service used for transforming alphanumeric domain names into numeric IP addresses. 

A decentralized process, name resolution generally takes place on DNS servers’ networks distributed throughout the world. 

Every internet address you enter into your web browser’s search bar is then forwarded by your router to a DNS server. This server then dissolves the domain name into a numeric sequence and returns a corresponding IP address. 

Should the DNS server fail to produce an answer, then it won’t be possible to access the desired website; the result is the error message ‘DNS server not responding’.


To  clear your DNS cache:

1. On your keyboard, press Win+X to open the WinX Menu.

2. Right-click Command Prompt and select Run as Administrator.

3. Run the following command: ipconfig /flushdns.


To Troubleshoot DNS issues:

The root of such irritating messages can often be traced back to the server outage. In such cases, the DNS server is temporarily unavailable. Most of the time, these problems can be corrected by changing browsers, switching a few of your firewall settings, or restarting your router.

1. In order to rule out that the connection problem isn’t being caused by your web browser, carry out a test by attempting to logon on to the desired web page with alternative applications.

2. In case you aren’t able to achieve your desired results simply by changing browsers, then the next step is to rule out Windows Firewall as the possible culprit.

3. Connection problems can often be solved by restarting the server. Most devices include a power button specifically for this purpose. Should this fail to yield any results, then it looks like a hard reboot may be in store; this is done simply by pulling out the power plug. 

4. If you have ruled out common causes of error such as the router software crashes or conflicts with Windows Firewall, then changing your DNS server could be the solution.



How to Check DNS server?

You can find out whether changing DNS server has solved the problem by carrying out a simple test. 

Enter the URL of a well-known site in your browser (e.g. www.google.com). 

If the site can be accessed it means the DNS server is functioning properly.

If the site can't be accessed, you can enter the following IP address into your browser: 172.217.16.195. 

This is one of Google’s IP addresses. If Google doesn't appear after entering the address, it probably means there's a general internet problem rather than a problem with the DNS server.

Code 9c57 Windows Update Error - Fix it now

This article covers fix the Code 9c57 Windows Update Error. Error Code 9c57 generally corresponds to a failed installation of Internet Explorer 11. In addition to that, the KB 2882822 update requires validation of genuine Windows installed on the system, so you may visit the link referred in the third question and check if your Windows requires activation.


What is 'Error code 9c57' in Windows Update?

Windows Update error 9c57 is an error that may occur when you are trying to install “Windows IE9 in Windows 7 for x64 Based System” update.


How can you fix ‘Error code 9c57’ in Windows Update?

Some of the common fixes include:

1. Manually installing Internet Explorer

2. Deleting SoftwareDistribution and running DISM command and sfc/ scannow command


Causes of Windows Update Error 9C57 - Error 9C57:

During software design, programmers code anticipating the occurrence of errors.

However, there are no perfect designs, as errors can be expected even with the best program design. Glitches can happen during runtime if a certain error is not experienced and addressed during design and testing.


To fix Windows Update Error 9C57 - Error 9C57:

1. When you get a runtime error, keep in mind that it is happening due to programs that are conflicting with each other. 

The first thing you can do to resolve the problem is to stop these conflicting programs.

2. Update / Reinstall Conflicting Programs

3. Virus infection causing runtime error on your computer must immediately be prevented, quarantined or deleted. Make sure you update your virus program and run a thorough scan of the computer or, run Windows update so you can get the latest virus definition and fix.

4. You might be getting the error because of an update, like the MS Visual C++ package which might not be installed properly or completely. What you can do then is to uninstall the current package and install a fresh copy.

5. You might also be experiencing runtime error because of a very low free space on your computer.

6. If the error is related to a bad graphics driver, then you may do the following:

Open your Device Manager, locate the graphics driver

Right click the video card driver then click uninstall, then restart your computer

Create Keytab File for Kerberos Authentication in Active Directory

This article covers how to create keytab files for Kerberos. Active Directory uses Kerberos version 5 as authentication protocol in order to provide authentication between server and client. Kerberos protocol is built to protect authentication between server and client in an open network where other systems also connected.


The Kerberos Keytab file contains mappings between Kerberos Principal names and DES-encrypted keys that are derived from the password used to log into the Kerberos Key Distribution Center (KDC).


The Kerberos Keytab file contains mappings between Kerberos Principal names and DES-encrypted keys that are derived from the password used to log into the Kerberos Key Distribution Center (KDC).


The keytab is generated by running kadmin and issuing the ktadd command. If you generate the keytab file on another host, you need to get a copy of the keytab file onto the destination host ( trillium , in the above example) without sending it unencrypted over the network.


To Create a Kerberos principal and keytab files for each encryption type you use:

1. Log on as theKerberos administrator (Admin) and create a principal in the KDC.

You can use cluster-wide or host-based credentials.

The following is an example when cluster-wide credentials are used. It shows MIT Kerberos with admin/cluster1@EXAMPLE.COM as the Kerberos administrator principal:

bash-3.00$ kadmin -p admin@EXAMPLE.COM

kadmin: add_principal vemkd/cluster1@EXAMPLE.COM

Enter password for principal "vemkd/cluster1@EXAMPLE.COM": password

Re-enter password for principal "vemkd/cluster1@EXAMPLE.COM": passwordCopy code

If you do not create a VEMKD principal, the default value of vemkd/clustername@Kerberos_realm is used.

2. Obtain the key of the principal by running the subcommand getprinc principal_name.

3. Create the keytab files, using the ktutil command:

Create a keytab file for each encryption type you use by using the add_entry command.

For example, run ktutil: add_entry -password -p principal_name -k number -e encryption_type for each encryption type.

Virtuozzo VS Hyper-V - Which is better

This article covers some comparison between Virtuozzo VS Hyper-V. 

Hyper-V and Virtuozzo are both popular VPS platforms used by a large number of web hosting providers for the provisioning of Windows VPS hosting services, with Virtuozzo being favoured for Windows Server 2003 VPS hosting and Hyper-V being the most reliable solution for Windows Server 2008 VPS hosting services.


Advantages of using Virtuozzo over Hyper-V include:

1. Direct Linux support – Virtuozzo can be installed on their Windows or Linux VPS hosting nodes, and although Hyper-V can be used for the hosting of virtual machines running Linux it is only available for use on Windows Server 2008.

2. Web based control panel (Parallels Power Panel) – the Parallels Power Panel will allow users to manage their Linux or Windows VPS hosting server from a web based interface meaning that if they aren't in a situation where they can access their VPS server via Remote Desktop then they can use the Power Panel to restart their VPS server if necessary or to kill any services or processes which may be overloading their VPS server’s resources.

3. Separate application – the fact that Virtuozzo is a separate application which can be installed on top of the operating system can have its advantages in some cases, for example if a web hosting providers wishes to discontinue using a server for VPS server hosting then all they have to do is uninstall the application from their server, although in most cases it is advised to do an OS reload anyway to ensure that you have a blank canvas to start with.


Advantages of using Hyper-V over Virtuozzo:

1. Cost – with Virtuozzo VPS hosting web hosting providers have to pay for the cost of the Virtuozzo application and the cost of the operating system license, but because Hyper-V is part of the Windows Server 2008 operating system they will only need to pay for the operating system license – this can help to reduce the costs of Hyper-V VPS hosting services and as the cost of the operating system falls, prices will fall further and will eventually meet Virtuozzo Windows Server 2003 hosting services when it comes to price which will mean that people will gradually move over to using Windows Server 2008 VPS hosting.

2. Reliability – as Hyper-V is part of the Window Server 2008 operating system, web hosting providers are able to guarantee reliable Windows Server 2008 VPS server hosting services.

3. Native support for Windows Server 2008 – although Virtuozzo may have support for Windows Server 2008, it hasn’t been able to offer the most reliable of Windows Server 2008 VPS hosting services.

The Windows Installer Service could not be accessed error - Fix it now

This article covers methods to resolve the Windows #Installer Service could not be accessed #error which occurs while we try to install a program in Windows or when you are running Windows in safe mode.

Windows Installer popups may be caused by Windows configuration issues, by Windows Update prompting you to install updates or by malware.


To fix #Windows installer error:

1. Click Start. , type services.

2. Right-click Windows Installer, and then click Properties.

3. If the Startup type box is set to Disabled, change it to Manual.

4. Click OK to close the Properties window.

5. Right-click the Windows Installer service, and then click Start.

6. Try to install or to uninstall again.


To fix error 1719 windows installer service could not be accessed:

1. Start the Windows Installer Service.

2. Stop and then Restart Windows Installer Service.

3. Reset the settings of Windows Installer Service in the registry.


To to Disable Windows Installer:

1. Log into Windows. Click the "Start" button.

2. Double-Click "Group Policy" in the left pane.

3. Expand the tree in the left side of the pane, "Local Computer Policy\Computer Configuration\Administrative Templates\Windows Components\Window Installer".

4. Double click "Disable Windows Installer.


To enable Windows Installer in Safe Mode:

1. Press Windows + R, type cmd, and press Ctrl + Shift + Enter to run CMD as administrator. 

2. Type the command net start msiserver in Command Prompt window, and press Enter to enable Windows Installer in Safe Mode in Windows 10.

Best Server Monitoring Software Products - Advantages and Disadvantages

This article covers the Best Server Monitoring Software. Basically, Server management software takes the burden of managing servers and other critical applications.

Reporting and monitoring is critical in business, especially when it comes to IT infrastructure such as network connectivity and server monitoring.

Being able to look back at historical trends and faults is especially useful when troubleshooting an issue on a critical server or service, so if you don’t already have a solution in place, then it might be time to seriously consider it.


Server Monitoring Software is able to check everything about your system, such as:

1. CPU usage

2. RAM utilization

3. Hard Disk Space

4. System Temperatures

5. Server Alerts (Hardware status warnings)

6. RAID Array health checks

7. Virtual Machine Alerts

8. You can also monitor user logins, suspicious activity on your server, and the status of your services and daemons


Best server monitoring software and tools includes:

1. SolarWinds Server & Application Monitor - Tracks the statuses of key server components and also watches the performance of applications running on each server. The tool runs on Windows Server but can also monitor Linux servers across a network.

2. Atera - A remote monitoring and management system that includes server monitoring features. Ideal for managed service providers.

3. Site24x7 Server Monitoring - A cloud-based monitoring system that can track the statuses of Windows and Linux servers as part of a company’s infrastructure.

4. ManageEngine Applications Manager - A server and applications monitoring system that includes extra capabilities such as VM monitoring. Runs on Windows Server and Linux.

5. Paessler PRTG - A package of monitors that includes a range of server status trackers. Installs on Windows Server.

6. Nagios XI - A comprehensive infrastructure monitoring system that includes live server monitoring services. Installs on Linux.

7. Opsview - A system monitoring tool that includes sever monitoring and is billed as an alternative to Nagios XI. Runs on Linux.

8. Zenoss - A system monitoring tool that includes a server monitoring module and is also available in a free version. Installs on Linux.

9. OP5 - Monitor Server monitoring as part of a system-wide monitor tool that accepts Nagios plug-ins. Install on Linux.

10. AppOptics - A cloud-based server and applications monitoring system that will track the performance of Windows and Linux servers.

11. Monitis - A cloud-based monitoring system that specializes in tracking the performance of Web servers and Web applications.

12. ManageEngine Free Windows Admin Tools - A collection of 15 free tools that cover different aspects of server monitoring including disk space, software inventory, and user lists.


What is server maintenance?

Server maintenance is process of keeping a server software updated and running so that a computer network can operate smoothly and avoid downtime or loss of data. Regular maintenance will keep the server running as expected and will help avoid a total or partial network failure.

Enable and Configure MPIO on Windows Server 2016 2012 R2

This article covers how to enable Multi-Path Input-Output or MPIO on a Windows server either from a graphical interface using the Server Manager console or from the PowerShell command line. 

Multipathing is the technique of creating more than one physical path between the server and its storage devices. It results in better fault tolerance and performance enhancement. Oracle VM Servers are installed with multipathing enabled because it is a requirement for SAN disks to be discovered by Oracle VM Manager.


To Install MPIO in Windows Server 2008 R2:

Note You must restart the server after you follow these steps.

1. Open Server Manager. To do this, click Start, click Administrative Tools, and then click Server Manager.

2. In Server Manager, click Features, and then click Add Features.

3. Select the Multipath I/O feature for installation, and then click Next.

4. Finish the installation by confirming the selections, and then restart the server.


To Configure MPIO for StorSimple volumes:

MPIO must be configured to identify StorSimple volumes. 

To configure MPIO to recognize StorSimple volumes, follow these steps:

1. Open the MPIO configuration. To do this, click Start, click Administrative Tools, and then click MPIO.

2. In the MPIO window, click Add on the MPIO Devices tab.

3. Type SSIMPLE Model in the Add MPIO Support window under Device Hardware ID.

4. Restart the server when you are prompted.


To Mount a StorSimple volume in Windows Server 2008 R2:

After MPIO is configured on the server, volumes that are created on the StorSimple appliance can be mounted and can take advantage of MPIO for redundancy. 

To mount a volume, follow these steps:

1. Open the iSCSI Initiator Properties dialog box on the server. To do this, click Start, click Administrative Tools, and then click iSCSI Initiator.

2. In the iSCSI Initiator Properties dialog box, click the Discovery tab, and then click Discover Portal.

3. Type the IP address of the "DATA" port on the StorSimple appliance.

Note If you use a private network for iSCSI connections, type the IP address of the DATA port that is connected to the private network.

4. Click the Targets tab in the iSCSI Initiator Properties dialog box. This displays the StorSimple appliance iSCSI qualified name (IQN) in the Discovered Targets section.

5. Click Connect to establish the iSCSI session with the StorSimple appliance. In the Connect To Target dialog box, click to select the Enable multi-path check box.

6. Open Server Manager. To do this, click Start, click Administrative Tools, and then click Server Manager.

7. In Server Manager, click Storage, and then click Disk Management. Volumes that are created on the StorSimple appliance and that are visible to this server appear under Disk Management as new disks.

8. Initialize the disk and create a new volume. During the format process, select a block size of 64 kilobytes (KB).

9. Under Disk Management, right-click the disk, and then click Properties.

10. In the SSIMPLE Model #### Multi-Path Disk Device Properties dialog box, click the MPIO tab, click Details in the DSM Name section, and then verify that the parameters are set to the default parameters.

Adding users to the local admin group in PowerShell

This article covers how to add users to local admin group either via Group Policy Objective or directly via command line. 


To add a user to the local group in PowerShell:

You can add AD groups or users to the local admin group using the below Powershell command.

Add-LocalGroupMember -Group "Administrators" -Member "domain\user or group," "additional users or groups."


To add a user to the local admin group:

1. Right-click the newly created Group, select Properties, navigate to the Members tab, click Add… and enter designated users to the group, e.g. domain\administrator, domain\domain admins, domain\syskitmonitorservice. 

2. Add other users that also need administrative privileges, if necessary. 

3. Click OK to proceed.


To get local admin group members in PowerShell:

To get the local Administrators group members using PowerShell, you need to use the GetLocalGroupMember command. 

This command is available in PowerShell version 5.1 onwards and the module for it is Microsoft. PowerShell. LocalAccounts.


To Create a User Account in Windows 10 with PowerShell:

1. Open PowerShell as Administrator.

2. To create a new user account without a password, type New-LocalUser -Name "user_name" -Description "Description of your new account." -NoPassword .

3. To create a user account that has a password, firstly execute the following line: $Password = Read-Host -AsSecureString .

mkvirtualenv command not found on Ubuntu - How to fix this error

This article covers solution to the #error 'mkvirtualenv: command not found' which happens while running mkvirtualenv #command.

You'll need to install virtualenvwrapper package into the same global site-packages area where virtualenv is installed. 

Administrative privileges are required for this installation. 

Ensure you're logged in as root user or standard user with sudo privileges.


Start by Updating the System package list:

$ sudo apt update

Then install #Python build tools.

# Python 2

$ sudo apt-get install python-pip python-dev build-essential

# Python 3

$ sudo apt-get install python3-pip python3-dev build-essential

Then install virtualenv and virtualenvwrapper packages.


With APT package manager:

$sudo apt install virtualenv virtualenvwrapper

With Pip:

# Python 2

$ sudo pip install virtualenv virtualenvwrapper

# Python 3

$ sudo pip3 install virtualenv virtualenvwrapper

NFS vs CIFS - The main Differences

This article covers NFS vs CIFS performance. 

NFS, or Network File System, was designed in 1984 by Sun Microsystems. This distributed file system protocol allows a user on a client computer to access files over a network in the same way they would access a local storage file. Because it is an open standard, anyone can implement the protocol.

All versions of NFS can use Transmission Control Protocol (TCP) running over an IP network, with NFSv4 requiring it. NFSv2 and NFSv3 can use the User Datagram Protocol (UDP) running over an IP network to provide a stateless network connection between the client and server.


Common Internet File System (CIFS) is a network filesystem protocol used for providing shared access to files and printers between machines on the network. A CIFS client application can read, write, edit and even remove files on the remote server.

Microsoft operating systems use CIFS for remote file operations (typically mapping network drives), browsing (via the Network Neighborhood icon), authentication (NT and Windows 2000), and remote printer services.


The NFS service has the following benefits:

1. Enables multiple computers to use the same files, so everyone on the network can access the same data.

2. Reduces storage costs by having computers share applications instead of needing local disk space for each user application.

Use Nmap to Scan Open Ports - How to

This article covers how to use Nmap to Scan Open Ports. Nmap is the world's leading port security network scanner. The Nmap hosted security tool can help you determine how well your firewall and security configuration is working.

How would you tell Nmap to scan all ports?
By default, Nmap scans the 1,000 most popular ports of each protocol it is asked to scan.
Alternatively, you can specify the -F (fast) option to scan only the 100 most common ports in each protocol or --top-ports to specify an arbitrary number of ports to scan.

The OS and Service scanning options are helpful for scanning a particular port or service to get more information.
If a service is running on a non-default port, it might be by design – or it might suggest there is a security breach.
Ports often have a default usage. Most ports under 1000 are dedicated and assigned to a specific service.

What file does Nmap use to determine which ports to scan?
Nmap needs an nmap-services file with frequency information in order to know which ports are the most common.

Malicious ("black hat") hackers (or crackers) commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.

Perform Monitoring with PRTG

This article covers how to use #monitoring with PRTG. With PRTG. Today, nearly every business relies on a computer and network infrastructure for internet, internal management, telephone, and email.
Here comes the role of PRTG to ensure that business data flows seamlessly between employees, offices, and customers.


Monitoring availability, bandwidth, and usage of your network is easy when you have PRTG. As a versatile solution, PRTG adapts to your needs and supports you with monitoring your application servers and services as whole and not only separate single aspects of these.
To set up your network monitoring, download the PRTG installer from the Paessler website and follow the steps in the installation wizard, or set up a PRTG Hosted Monitor instance on https://www.paessler.com/prtg-hosted-monitor and install a remote probe in your LAN.
PRTG Network Monitor is Paessler's powerful network monitoring solution.

In #PRTG, you can view Toplists for all xFlow sensors. xFlows are monitoring data pushed from network devices to PRTG.
You can use them to monitor where and how much data is traveling to and from.
This way, they determine which machine, protocol, or user is consuming bandwidth.

Remote probes allow you to monitor different sub-networks that are separated from your PRTG on premises core server by a firewall and to keep an eye on remote locations. You can install one or more remote probes.

The best network monitoring tools:
1. SolarWinds Network Performance Monitor (FREE TRIAL).
2. Datadog Network Performance Monitoring (FREE TRIAL).
3. ManageEngine OpManager (FREE TRIAL).
4. Progress WhatsUp Gold (FREE TRIAL).
5. Site24x7 Network Monitoring (FREE TRIAL).
6. Paessler PRTG Network Monitor (FREE TRIAL).
7. Nagios Core.
8. Zabbix.

Plesk Panel Database issues

This article covers the different #Plesk database errors. The main reason for database issues in Plesk is the misconfiguration of the PSA database.
Plesk employs the native functionality of database management tools for checking and repairing databases.
For example, for #MySQL databases it uses the mysqlcheck utility.

To check and repair a #database:
1. Go to Websites & Domains > Databases > Check and Repair in a database tools pane.
2. If problems are found, click the link See Details and Resolve.
3. The list of tables and corresponding problems will open.
For MySQL databases, you can choose the tables that you would like to repair.
For Microsoft SQL databases, you can repair an entire database only.
Click Repair Selected (for MySQL) or Repair (for Microsoft SQL).

Migrate database from MySQL to PostgreSQL using pgLoader

This article covers how to migrate a database using pgLoader with a single #command.
PostgreSQL, also known as “Postgres,” is an open-source relational database management system (RDBMS).
It has seen a drastic growth in popularity in recent years, with many developers and companies migrating their data to Postgres from other database solutions.
The prospect of migrating a database can be intimidating, especially when migrating from one database management system to another.

Facts about pgLoader:
1. pgLoader is an open-source #database migration tool that aims to simplify the process of migrating to #PostgreSQL.
2. It supports #migrations from several file types and RBDMSs — including #MySQL and SQLite — to PostgreSQL.
3. #pgLoader is a flexible tool that can perform a database migration in a single command.
4. With a few configuration tweaks, it can migrate an entire database from one physical machine to another using a secure SSL/TLS connection.

AWS error code 0x204

This article will guide you on methods to fix AWS #error code 0x204 which happens in the process of trying to login to a remote machine on VPC.

Amazon Virtual Private #Cloud (Amazon #VPC) is a service that lets you launch AWS resources in a logically isolated virtual network that you define. You can use both IPv4 and IPv6 for most resources in your virtual private cloud, helping to ensure secure and easy access to resources and applications.


To enable RDP access on AWS instance:

i. Open the Amazon EC2 console , set it to the stack's region, and choose Security Groups from the navigation pane. 

ii. Choose AWS-OpsWorks-RDP-Server, choose the Inbound tab, and choose Edit. 

iii. Choose Add Rule and specify the following settings: Type – RDP.


To connect from the #Amazon EC2 console:

1. Open the Amazon #EC2 console.

2. In the left navigation pane, choose Instances and select the instance to which to connect.

3. Choose Connect.

4. On the Connect To Your Instance page, choose EC2 Instance Connect (browser-based SSH connection), Connect.

KVM hypervisor How it Works

This article will guide you on how the KVM #hypervisor works. Basically, KVM is a type-2 hypervisor (installed on top of another OS, in this case some flavor of #Linux). 

It runs, however, like a type-1 hypervisor and can provide the power and functionality of even the most complex and powerful type-1 hypervisors, depending on the tools that are used with the KVM package itself.

KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V).

Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images.

1. The main difference between Type 1 vs. Type 2 hypervisors is that Type 1 runs on bare metal and Type 2 runs on top of an operating system. 

2. Each hypervisor type also has its own pros and cons and specific use cases.

3. Xen is better than #KVM in terms of virtual storage support, high availability, enhanced security, virtual network support, power management, fault tolerance, real-time support, and virtual CPU scalability.

4. A Type 1 hypervisor takes the place of the host operating system. 

5. Type 1 hypervisors are highly efficient because they have direct access to physical hardware. 

6. This also increases their security, because there is nothing in between them and the CPU that an attacker could compromise.

NTFS partition failed to mount

This article will guide you on methods to resolve NTFS partition failed to mount error. 

Causes of NTFS partition failed to mount error:

1. File system errors

After using #NTFS drive in #Windows you have detached it without removing it safely. Therefore NTFS journal has not been emptied from temporary streams.

To fix the problem:

i. Open Disk Utility under #Mac OS X. 

ii. You will find it in Applications – Utilities.

iii. Choose NTFS partition on the left and find First Aid tab on the right. 

iv. Under this tab you will find Verify Disk option. 

v. Run Verify and then Repair.

Troubleshoot Azure Cache for Redis timeouts

This article will guide you on how to troubleshoot Azure #Cache for Redis #timeouts. Azure Cache for Redis regularly updates its server software as part of the managed service functionality that it provides. 

Azure Cache for #Redis is a fully managed, in-memory cache that enables high-performance and scalable architectures. Use it to create cloud or hybrid deployments that handle millions of requests per second at sub-millisecond latency—all with the configuration, security, and availability benefits of a managed service.

This patching activity takes place largely behind the scene. During the failovers when Redis server nodes are being patched, Redis clients connected to these nodes may experience temporary timeouts as connections are switched between these nodes.


To help mitigate #Azure memory issues:

1. Upgrade the cache to a larger size so that you aren't running against memory limitations on the system.

2. Set expiration times on the keys so that older values are evicted proactively.

3. Monitor the used_memory_rss cache metric. When this value approaches the size of their cache, you're likely to start seeing performance issues. Distribute the data across multiple shards if you're using a premium cache, or upgrade to a larger cache size.


To fix #CPU bound on the server or on the client:

i. Check if you're getting bound by CPU on your client. High CPU could cause the request to not be processed within the synctimeout interval and cause a request to time out. 

ii. Moving to a larger client size or distributing the load can help to control this problem.

iii. Check if you're getting CPU bound on the server by monitoring the CPU cache performance metric. Requests coming in while Redis is CPU bound can cause those requests to time out. To address this condition, you can distribute the load across multiple shards in a premium cache, or upgrade to a larger size or pricing tier.

Perfmon counters for Disk Usage

This article will guide you on use performance counters (#Perfmon) to identify SQL server disk bottlenecks. 

The performance impact is negligible in updating. Microsoft's intent is that you always write to the performance counters. It's the monitoring of (or capturing of) those performance counters that will cause a degradation of performance. So, only when you use something like perfmon to capture the data.

Reliability #Monitor shows you your system stability history at a glance and lets you see details on a day-by-day basis about events that impact reliability. Reliability Monitor provides a quick view of how stability the system has been.

1. The Performance Monitor is primarily for viewing real time #statistics. 

2. By default only one counter is selected; the %Processor Time counter. However you can add additional counters by clicking on the green plus sign. 

3. This will allow you to monitor any counters you wish in real time.

4. Difference Between Performance Monitor and #Resource Monitor is that a performance monitor is a program that assesses and reports information about various computer resources and devices. 

5. While Resource Monitor is a tool by which you can monitor the usage of your CPU.

FFmpeg on CentOS

This article will guide you on how to install FFMPEG on #CentOS and fix its related #errors. FFmpeg is a powerful tool that can do almost anything with #multimedia files.

FFmpeg is a standard package on many #linux systems. 

You can check if it is installed with a #command like dpkg -s ffmpeg . 

If it is not installed, you should be able to install with your system's package manager. i.e. sudo apt-get install ffmpeg or search 'ffmpeg' in the Software Center on Ubuntu.

To run #FFmpeg in #Linux:

1. Start by updating the packages list: sudo apt update.

2. Next, install FFmpeg by typing the following command: sudo apt install ffmpeg.

3. To validate that the package is installed properly use the ffmpeg -version command which prints the FFmpeg version: ffmpeg -version. 

Setup OpenVPN on Windows Server

This article will guide you on how to setup OpenVPN on windows.

OpenVPN is a virtual private #network (#VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. 

To Configure OpenVPN client as service on Windows:

1. Editing your OpenVPN client configuration.

2. Storing your PrivateVPN.com credentials in a file.

3. Import edited .ovpn file and user.auth file to OpenVPN #config folder.

4. Configuring OpenVPN service to start automatically on boot.

To connect to OpenVPN from Windows Server:

i. Navigate to your #OpenVPN Access Server client web interface.

ii. Login with your credentials.

iii. Select 'OpenVPN Connect for #Windows'.

iv. Wait until the download completes, and then open it (specifics vary depending on your browser).

Install SQL Server 2019 on Linux

This article will guide you the process to install #MSSQL Server 2019 on #CentOS 7 and Ubuntu 16.04.

SQL Server 2019 #Developer is a full-featured free edition, licensed for use as a development and test database in a non-production environment.

SQL Server 2019 allows us to integrate data from structured and unstructured data sources. 

We can now process diverse big data and relational data sources using Transact-SQL from SQL Server using PolyBase. 

We can see below PolyBase support external databases.

SQL Server Express can be used in production (beware of the limitations, like the 10GB cap), but according to this link Express is available for Linux. SQL Server Express is available to use in Production.

Starting with SQL Server 2017, SQL Server runs on Linux. It's the same SQL Server database engine, with many similar features and services regardless of your operating system. It's the same SQL Server database engine, with many similar features and services regardless of your operating system.

To run a SQL script in #Linux terminal:

1. Open Terminal and type mysql -u to Open the MySQL command line.

2. Type the path of your #mysql bin directory and press Enter.

3. Paste your #SQL file inside the bin folder of mysql server.

4. Create a #database in MySQL.

5. Use that particular database where you want to import the SQL file.

MySQL is not running

This article will guide you on methods to resolve MySQL #error 'MySQL is not running'. Basically, this MySQL error occurs due to many reasons that include stopping MySQL improperly, tables crashing and so on. 

Both MySQL and #Microsoft SQL Server (MSSQL) are widely used enterprise database systems. MySQL is an open-source relational #database management system (RDBMS), while MSSQL Server is a Microsoft-developed RDBMS. 

Enterprises can choose between multiple #MSSQL Server editions to suit their individual needs and budgets.

Why #MySQL is not opening?

1. You can also check the MySQL service is running in background or not. 

2. To do that open Task manager ( Press CTRL + SHIFT + ESC simultaneously ) and look for mysqld service in background process section. 

3. If it isn't listed there then the service is stopped or disabled.

Install WordPress with Docker Compose

This article will guide you on how to install WordPress with docker compose.

Docker Hub is an official repository where individuals and organizations can upload Docker images for public consumption.

The reason for using Docker is used to define and start running multi-container Docker applications. You need to define docker-compose. yml for the services that make up your app services. You should run docker-compose up and Compose starts and runs your entire app.

Steps to #Install WordPress with Docker on #Ubuntu 20.04 :

1. Create a Cloud Server. First, log in to yourCloud Server.

2. Install Required #Dependencies.

3. Install Docker.

4. Create a MariaDB #Container.

5. Create a #WordPress Container.

6. Configure #Nginx as a Reverse Proxy.

7. Access WordPress Interface.


To Update WordPress

The docker-compose.yml specifies the latest version of the WordPress image, so it's easy to update your WordPress version:

docker-compose down

docker-compose pull && docker-compose up -d

Install Firejail in Linux

This article will guide you on steps to #install #Firejail in Linux. Basically, Firejail reduces the risk of security breaches by restricting the untrusted applications and separating them from other parts of the system. 

#Sandboxing involves providing a safe environment for a program or #software so that you can play around with it without hurting your system. It actually keeps your program isolated from the rest of the system, by using any one of the different methods available in the #Linux #kernel.

To Install the Firejail Software:

1. Open up a terminal window.

2. Issue the command sudo apt-get install firejail.

3. Type your sudo password and hit Enter.

4. If prompted, type y to allow the installation to continue.

5. Allow the installation to complete.

Install XRDP Server

This article will guide you on steps to install XRDP #Server on #Ubuntu. To provide remote access via RDP, a Windows native protocol, XRDP behind the scenes uses #VNC, a remote access protocol more common in Linux.

After #xrdp is installed you can start the server with the following command:

Service xrdp start.

Service xrdp-sesman start (Thanks to Greg for pointing that out) — UPDATE!!

If want it to auto start after reboot you need to run this command also: update-rc.d xrdp enable (It will not start xrdp-sesman automatic).


To use XRDP Linux:

1. With #Ubuntu 18.04 first install xrdp: sudo apt-get -y install xrdp.

2. Next, one may adjust the configuration file: sudo nano /etc/xrdp/xrdp.ini.

3. Set encryption level to high: encrypt_level=high.

4. Next, allow just RDP through the local firewall: sudo ufw allow 3389/tcp.

Logging in Apache More about it

The Apache access logs stores information about events that occurred on your #Apache web #server. Apache web servers also provide administrators with another type of log file called error logs. 

The Apache error log has a logging level that filters the messages sent to the log. Apache #logs nothing for a single page request in warn level.

This log file is used to provide more information regarding a particular error that has occurred on the web server.

By default, you can find the Apache #access log file at the following path:

i. /var/log/apache/access. log.

ii. /var/log/apache2/access. log.

iii. /etc/httpd/logs/access_log.

To enable the Apache #HTTP access logs:

1. Open the Apache HTTP configuration at /Applications/MAMP/conf/apache/httpd.conf.

2. Find this line.

3. Change the line.

4. Restart Apache using the MAMP widgit.

5. Now, view your new logfiles!

Create a virtual machine using lightsail in AWS

This article will guide you on how to create a virtual #machine using Lightsail in #AWS.

#Lightsail is an easy-to-use virtual private server (#VPS) that offers you everything needed to build an application or website, plus a cost-effective, monthly plan.

To create a virtual machine in #cloud:

1. Using the left-hand navigation bar, click Compute Engine and then select #VM instances from the item list. 

2. If this is your first #VM on the platform. 

3. If you have a VM template you can import it to GCP, but in this case we will create a VM from scratch.

Install SSL Certificate in IIS 7

This article will guide you on steps to #install SSL Certificate in IIS 7 #windows 2008 server. 

IIS (Internet Information Services) is used to host ASP.NET web applications and static #websites. It can also be used as an #FTP server, host WCF services, and be extended to host #web #applications built on other platforms such as #PHP. There are built-in authentication options such as Basic, ASP.NET, and Windows auth.

To install a certificate in Windows Server:

i. In the left pane of the console, double-click #Certificates (Local Computer). 

ii. Right-click Personal, point to All Tasks, and then select Import. 

iii. On the Welcome to the Certificate Import Wizard page, select Next. 

iv. On the File to Import page, select Browse, locate your certificate file, and then select Next.

To enable SSL in IIS:

1. On the #IIS server, start the IIS Manager (on the Windows taskbar, select Start > Administrative Tools > Internet Information Services (IIS) Manager).

2. Enabling SSL in IIS

3. In Type, select https.

4. In SSL certificate, select an appropriate certificate from available choices.

5. Click OK.

Digitally Signed Files with PowerShell

This article will guide you on how to implement reporting on digitally signed files with PowerShell. 

Get-Command gets the commands from PowerShell modules and commands that were imported from other sessions. 

To get only commands that have been imported into the current session, use the ListImported parameter. 

Without parameters, Get-Command gets all of the cmdlets, functions, and aliases installed on the computer.

Automate Windows Server 2019 Administration with Ansible

This article will guide you on steps to automate Windows Server 2019 #Administration with Ansible. 

Ansible can be used to manage and execute core functions in Windows #environments, from security updates to remote management using #WinRM. Although Ansible must be run on #Linux, Windows administrators can use Ansible to manage and automate their systems without needing to know how to use a Linux #terminal.

To Connect Ansible on Windows from #Ubuntu:

1. Create Ansible Windows User. Create a new user for the Ansible windows connection setup.

2. Setup Libraries and WinRM.

3. Update the Ansible Inventory file.

4. Update the Ansible Group Variables.

5. Configure #Windows Servers to Manage.

6. Test Connectivity to the Windows Server.

Powershell to enable script execution

This article will guide you on how to fix #Windows script error via PowerShell. Basically, we used #PowerShell to enable script #execution by running some #commands.

PowerShell is a cross-platform task automation and configuration management framework, consisting of a command-line shell and scripting language. Unlike most shells, which accept and return text, PowerShell is built on top of the . #NET Common Language Runtime (CLR), and accepts and returns . NET objects.

To enable script execution in PowerShell:

i. Open Start.

ii. Search for PowerShell, right-click the top-result and click the Run as administrator option.

iii. Type the following command to allow scripts to run and press Enter: Set-ExecutionPolicy RemoteSigned.

iv. Type A and press Enter (if applicable).

Disable Password Expiration with PowerShell

This article will guide you on the method to disable password expiration in the #Windows server with PowerShell.

#PowerShell is the shell #framework developed by Microsoft for administration tasks such as configuration management and automation of repetitive jobs. 

The term 'PowerShell' refers to both – the shell used to execute commands and the scripting language that goes along with the framework.

Why did #Microsoft make me change my password?

This is a security feature of all Microsoft accounts which cannot be turned off. 

If the option for 72 days password expiration is enabled in your account then it will automatically ask you to reset password.

To turn off the password feature on Windows 10:

1. Click the Start menu and type "netplwiz." The top result should be a program of the same name — click it to open.

2. In the User Accounts screen that launches, untick the box that says "Users must enter a name and password to use this computer."

3. Hit "Apply."

4. When prompted, re-enter your password to confirm the changes.

mchk plesk How to use it

This article will guide you on mchk utility in #Plesk and how to use it to fix errors. It helps to repair malfunctioning Plesk services.

By using Plesk Reconfigurator, you can check and #repair Plesk installation that is malfunctioning due to misconfiguration of one or more of its components.

The following problems can be identified and corrected by using the Repair Plesk Installation option:

1. problems with mail delivery caused by user-made changes in DNS server addresses.

2. misconfigurations of system user accounts or groups used by Plesk to access system objects.

3. malfunction of Plesk's services.

4. misconfigurations in user access permissions for files and folders on server disks and hosting folders.

5. miscalculations of disk space usage by individual domains and subdomains.

Winsock Error 10061 Steps to fix it

This article will guide you on different methods to resolve #Winsock error 10061. A socket error is when there is a problem with the user's #computer or the other computer or server while making this connection.

Winsock is actually short " #Windows sockets," which are files that allow Windows programs to connect to the Internet and other computers. Technically, Winsock is an "Application Programming Interface (#API)," that developers use to make their #programs network-enabled.

To fix Winsock #error in Windows 10:

1. Type netsh winsock reset and press Enter.

2. Type netsh int ip reset and press Enter.

3. Type #ipconfig /release and press Enter.

4. Type ipconfig /renew and press Enter.

Windows error 577

This article will guide you on different methods to fix Windows error 577. This error appears due to the issues with #Security Center that is an in-built Windows tool, which is set to scan the system on a regular basis and inform its user about a pending update, missing software, turned off antivirus, and similar issues.

To repair Windows startup:

1. Hold the Shift key down at the #Windows sign-in screen and press the Power button at the same time.

2. Continue holding the Shift key, then click Restart.

3. Once the PC restarts, it'll present a screen with a few options.

4. From here, click Advanced options.

5. In the Advanced options menu, choose Startup #Repair.

psql to restore a text dump How to do it

This article will guide you on steps to perform  text dump restoration. Basically, psql restores a text dump in the same file format.

You can backup a single table, a #schema, or a complete database. Select the name of the backup source in the #pgAdmin tree control, right click to open the context menu, and select Backup… to open the #Backup dialog. 

The name of the object selected will appear in the dialog title bar.

In #PostgreSQL, you can restore a database in two ways:

i. Using psql to restore plain #SQL script file generated by pg_dump and pg_dumpall tools.

ii. Using pg_restore to restore tar file and directory format created by the pg_dump tool.


To Restore Postgres Database:

1. Restore a postgres database. $ psql -U erp -d erp_devel -f mydb.sql.

2. Backup a local postgres database and restore to remote server using single command: $ pg_dump dbname | psql -h hostname dbname.

3. Restore all the postgres databases.

4. Restore a single postgres table.

How to set rDNS in Windows Name Servers

This article will guide you on how to set #rDNS records in Windows Name servers. rDNS means mapping the address to a #hostname.

Nslookup is an MS-DOS utility that enables a user to look up the IP address of a domain or host on a network. The #nslookup command can also perform a reverse lookup using an IP address to find the domain or host associated with that IP address.

PTR record ( a pointer record ) is the certain type of DNS record that resolves an IP address to a host name. Getting reverse #DNS going is done by finding the PTR records in use by a DNS server. These PTR records will be managed by the company that is in control of the IP address which was assigned to you.

1. A pointer (PTR) record is a type of Domain Name System (DNS) record that resolves an IP address to a domain or host name, unlike an A record which points a domain name to an IP address. 

2. PTR records are used for the reverse DNS lookup. Using the IP address, you can get the associated domain or host name.

3. An A record should exist for every PTR record. 

4. The usage of a reverse DNS setup for a mail server is a good solution. 

5. While in the domain DNS zone the hostname is pointed to an IP address, using the reverse zone allows to point an IP address to a hostname.

Server sent passive reply with unroutable address

This article will guide you on ways to resolve #Server sent passive reply with unroutable address which occurs due to bad server settings or when an FTP client is behind #NAT. 

#FileZilla has updated their FTP #client, and FTP over TLS is now used by default. This results in clients being unable to connect to their server from the outside network.

Make sure that you properly set up for FTP over TLS/SSL, explicit and passive ports are allowed on the #firewall and set on Serv-U:

i. Go to the Serv-U settings at: Global Limits & Settings > Settings - Network Settings.

ii. Ensure the Auto-configure firewall through UPnP checkbox is not checked.

iii. Ensure the Packet time-out is set to 300 seconds.

iv. Set #PASV Port Range is 50,000-50,009, and port forward these ports to your router.

This configures the file transfer traffic to be routed through the router and directly to Serv-U through “Port Forwarding”.


If, after this, you are still unable to connect, try disabling the "Block FTP_Bounce and FXP" option - this has been known to cause issues for some clients. To do this, follow the steps below:

1. Navigate to Global > Limits and Settings  > #FTP Settings.

2. Select Global Properties. (If this is not available, first select Use Custom Settings to gain access to it).

3. On the Advanced Options tab, make sure "Block FTP_Bounce and FXP" is unchecked (which it is by default).

Troubleshooting DHCP client issues

This article will guide you on troubleshooting different DHCP #client issues. Whenever a DHCP server gets a request from a client it responds with a DHCP offer containing IP address being offered, #network mask offered, the amount of time that the client can use and keep it, the ip address of the DHCP server making this offer.

To #Troubleshoot DHCP:

1. Check for IP Address Conflicts. #DHCP clients connect to the network using a leased IP address.

2. Check Physical Connectivity.

3. Test connections with other Client using a Static #IP Address.

4. Confirm Switch #Port #Configuration.

5. Verify the source of Clients IP Address.

SQL server error 1326 Steps to fix it

This article will guide you on methods to resolve SQL server error 1326 which occurs due to the IIS Service not having any rights to use the named pipe.

If the SQL server resides on a separate server from IIS, then the IUSR_machinename account needs to be validated on the Windows NT server that SQL resides on.

#SQL #SERVER – Fix : Error : 1326 Cannot connect to #Database Server Error: 40 – Could not open a connection to SQL Server.

Now if SQL Server can be connected perfectly from #local system, but cannot be connected from a remote system, in that case firewall on the server where SQL Server is installed can be issued.

Follow instructions below to fix the issue:

1. Go to control panel >> #Firewall Settings >> Add SQL Server’s Port to Exception List.

2. Now try to connect to SQL Server again. It will allow you to connect to the server successfully.

Install NET framework 4.8 on windows server 2016

This article will guide you on how to #install .NET framework 4.8 on windows server 2016. 

Can't install .NET Framework 3.5 #Windows 10 0x800f0954?

NET Framework 3.5 or Any Optional #Feature. If the error 0x800f0954 occurs installing optional Windows features, it may be because the system is unable to access the Windows Update server. This is especially true in case of domain-joined computers which is configured to downloads updates from a WSUS server.

By using the Windows server 2016, we can install . NET Framework 3.5 which can be easily installed through Server Manager. 

i) Open the 'Server Manager' and navigate to the 'Manage' and then select 'Add Roles and Features'. 

ii) Click next to 'Features' section and select the option '.

To install Microsoft . #NET Framework 3.5. 1 on Windows Server 2012 R2:

1. Open Server Manager and select Features.

2. Select Add roles and features to launch the Add Roles and Features wizard.

3. In the Add Roles and Features wizard, click.

4. In the Confirm Installation Selections dialog box, click Install.

When you try to install the Microsoft . NET Framework 4.7 on a #computer that runs Windows 7 Service Pack 1 (SP1), Windows Server 2008 R2 SP1, or Windows Server 2012, the setup is blocked and cannot continue. 

This issue occurs when the computer does not have the update for D3DComplier (D3DCompiler_47. dll) installed.

Imagick php install

This article will guide you on how to install #Imagick #PHP #extension. Imagick is the most popular PHP extension which helps to create edit convert, and/or manipulates images. ImageMagick is a free and open source, feature-rich, text-based and cross-platform image manipulation tool used to create, edit, compose, or convert bitmap images. It runs on #Linux, #Windows, #Mac Os X, iOS, Android OS, and many other operating systems.

To use Imagick with PHP in your server, you can easily achieve it with the following #command:

sudo apt-get install php-imagick.

php -m | grep imagick.

sudo service apache2 restart.

How to install OBS on Linux Windows and MacOS

This article will guide you on steps to #install #OBS on #Windows. Also, we saw some common errors that we came across while installing OBS.

Open Broadcaster Software (OBS) is a free and open-source cross-platform streaming and recording program built with Qt and maintained by the OBS Project. There are versions of OBS Studio available for Microsoft Windows, macOS, and Linux distributions. OBS is funded on Open Collective.

As a standard Windows application, OBS should run fine on Windows 10 without any issues in the core program. However, OBS makes heavy use of advanced hardware features, particularly on your GPU such as texture sharing and hardware encoding. Windows 10 will come with new #drivers for your hardware, including your #GPU.

To set up OBS for #streaming:

1. Run the auto-configuration wizard. When you load OBS Studio for the first time you should see the Auto-Configuration Wizard.

2. Set up your audio devices. By default, OBS Studio is set to capture your system default desktop audio device and microphone.

3. Add your sources for video.

4. Test your stream and record settings.

Windows Live Mail Error 0x800ccc0e

This article will guide you on steps to fix #Outlook #Error #0x800ccc0e. Usually, this error occurs due to bad #email settings or because of minor problems with the email server or internet connection. Also, the customer may experience this error while receiving the mail on the email #client.

Try to run Windows Live Mail as Administrator in compatibility mode. Try to re-configure the Windows Live Mail account. Remove the existing WLM account and create a new one. Try reinstalling Windows Essentials 2012 on your Windows 10.

To get rid of Windows Live Mail error:

1. Open your Windows Live mail program.

2. Select the Home tab at the top right of your Windows Live Mail.

3. Click the Outbox to the left. Find any emails that are not sending out.

4. Once you send the email again, you can delete the email in the Outbox. 

The error will go away after the sent email is deleted.

Microsoft SQL server error 18470 How to fix it

This article will guide you on the different factors that causes SQL server error: 18470 and also how to fix this #error.

In SQL Server Configuration Manager, in the left pane, click SQL Server Services. In the results pane, right-click SQL Server (#MSSQLServer) or a named instance, and then click Start, Stop, Pause, Resume, or Restart.

User gets the #Microsoft SQL Server Error: 18470. This may happen if the SA (System Administrator) user account is disabled in #SQL Server. It can be verified by trying to log in to SQL Server Management Studio (#SSMS) using the SA account. In the Login Properties screen, select Status on the left side.

To Microsoft SQL Server Error 18456:

1. Log In with Remote Desktop.

2. Run Microsoft SQL Server Management.

3. Checking the Server Authentication Mode.

4. Restart the SQL Service.

5. Checking SQL User Permissions.

6. Mapping the User to the #Database.

Reset Windows Administrator Password from Hyper-V

This article will guide you on steps to reset the forgotten #Windows Administrator password from Hyper-V using an #ISO file.

Microsoft's Hyper-V virtualization can greatly reduce cost of operations. By purchasing a few very powerful #servers you can virtualize all or most of your entire infrastructure while reducing the cost of #hardware and maintenance.

To Reset Lost Admin Password for Hyper-V Virtual #Machine:

1. Select the administrator account, then click the Reset Password button to reset the password to blank. 

2. Click the Restart button to reboot the virtual machine, you are able to log in to the administrator account with a blank password.

Install Drush on Drupal 8

This article will guide you on steps to #install #Drush in #Drupal 8. Drush is a command-line utility to manage Drupal #CMS. For this installation of the Drush scripting interface, we will be working primarily on the command line. This is because Drush is a command line interface, and all of the commands you will use will need to be issued from there.

Drush is the command line shell and Unix scripting interface for Drupal.

To Install a global Drush via #Composer:

1. Install Composer globally.

2. Install the cgr tool following the instructions in that project.

3. Add composer's bin directory to the system path by placing export PATH="$HOME/.

4. Install latest stable Drush: cgr drush/drush .

5. Verify that Drush works: drush status.

How Chmod 777 works

This article will guide you on how to give #Chmod 777 to folders and files in #Linux. We also discussed the risks and more information about file permissions. 

If you are managing a Linux system, it is crucial to know how the Linux #permissions work.

You should never set 777 (rwxrwxrwx) permissions #files and #directories permissions. 777 means that anyone can do anything with those files.

To Give Root Privileges to a User in Linux:

1. Adding to Root Group using usermod. Let see how we can grant normal user root access by adding to root group.

2. Adding to #Root Group using Useradd Command.

3. Editing /etc/passwd file.

4. Setting as Sudo User.

Install and Configure OpenSSH on windows

This article will guide you on steps to install and configure #OpenSSH on #windows. Also, we saw some common errors relating to OpenSSH.

OpenSSH is the premier connectivity tool for remote login with the #SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks.

i. To install OpenSSH, start Settings then go to Apps > Apps and Features > Manage Optional Features. 

ii. Scan this list to see if OpenSSH client is already installed. 

iii. If not, then at the top of the page select "Add a feature", then: To install the OpenSSH client, locate "OpenSSH Client", then click "Install".

To Enable the OpenSSH Server in Windows 10:

1. Open the #Settings app and go to #Apps -> Apps & features.

2. On the right, click Manage optional features.

3. On the next page, click the button Add a feature.

4. In the list of features, select OpenSSH Server and click on the Install button.

5. Restart Windows 10.

Windows Activation Error Code 0xc004f074

This article will guide you on methods to fix #Windows activation error code #0xc004f074 and its causes.

When attempting to activate the Windows operating system, users sometimes receive the 0xC004f074 error code. This is a Windows Activation error that occurs when Windows is unable to reach your company's activation service or system administrator.

Changing your Windows #Product Key does not affect your personal files, installed applications and settings. Enter the new product key and click Next and follow the on screen instructions to #activate over the Internet.

To fix error 0xc004f074 in Windows 10:

1. Use the slmgr. vbs command.

2. Use the Slui 3 command. While on your start screen you need to press and hold the button Windows and the button R.

3. Run SFC scan.

4. Run the Update and Activation #Troubleshooters.

5. Contact #Microsoft Support.

The application failed to start correctly 0xc00007b in Windows

This article will guide you on steps to fix #application failed to start correctly #0xc00007b in Windows which occurs due to different reasons.

Application Error #0xc0000005 (Access Violation) error is usually caused by your computer not being able to correctly process the files and settings required to run a particular program or installation.

To can apply the methods below and see if they can help you get rid of this error.

1) Reboot your computer.

2) Run your application as #administrator.

3) Reinstall your application.

4) Reinstall Microsoft .NET #framework (for Windows 7 or below)

5) Reinstall Microsoft Visual C++ Redistributable Packages.

6) Update your #Windows.

Transfer Files with Rsync on Windows using SSH connection

This article will guide you on steps to perform Rsync from Windows to Linux over SSH.

#Rsync can use #SSH as a secure transport agent. Make sure rsync is installed by opening a #terminal session and typing rsync --version on each machine.

Most #Linux distributions can now read the FAT32 or NTFS disk formats natively, so you could copy your files to an external hard drive formatted in Windows with either of those file systems, which will then allow you to read the data back easily in Linux.

1. cwRsync is an implementation of rsync for Windows. 

2. rsync uses a #file #transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. 

3. #cwRsync can be used for remote file #backup and #synchronization from/to Windows systems.

Security certificate does not specify subject alternative names

This article will guide you on steps to fix #Security certificate does not specify subject alternative names. 

Basically, the #error, Security certificate does not specify subject alternative names trigger if the certificate does not have the correct SubjectAlternativeName extension.

Subject Alternative Names or SANs allow you to secure multiple domains from one SAN SSL certificate. SANs are additional domain names added to an SSL certificate.

To add a Subject Alternative Name to a certificate:

1. If you want to add #SAN, most CAs allow you to reissue a certificate with new details, though this will usually revoke your old certificate. 

2. You don't need the old CSR to reissue a certificate, you can instead create a new CSR with the updated details using a new or existing private key.

The Subject Alternative Name (#SAN) is an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate. The use of the SAN extension is standard practice for #SSL #certificates, and it's on its way to replacing the use of the common name.

Windows PSExec error code 20

This article will guide you on methods to resolve #PsExec #errors. Also you will learn common mistakes made when executing PsExec #commands.

PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console #applications, without having to manually install #client #software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like #IpConfig that otherwise do not have the ability to show information about remote #systems.

Windows update error 0x800B0109

This article will guide you on steps to fix the #windows #update error 0x800B0109.

Windows error code #0x80070422 refers to an inability of Windows 7 to startup the Windows Update service so your computer can connect to the update servers at Microsoft.

Steps For Fixing #Error Code #0x800b0109:

1. Open Administrative Tools from Control Panel. Open Control Panel, type administrative tools in the search box, and then click Administrative Tools.

2. Double-click Services.  If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Right-click the Background Intelligent Transfer Service (BITS) service, and then click Properties.

4. On the General tab, next to Startup type, make sure that Automatic (Delayed Start) is selected.

5. Next to Service status, check to see if the service is started. If it’s not, click Start.

6. Click OK to close the #Properties dialog box.

7. Right-click the Windows Event Log service, and then click Properties.

8. On the General tab, next to Startup type, make sure that Automatic is selected.

9. Next to Service status, check to see if the service is started. If it’s not, click Start.

Install imagemagick on CentOS

This article will guide you on steps to #install #ImageMagick and fix its errors. Basically, ImageMagick is used to manipulate the digital images.

ImageMagick helps to create, edit, compose, or convert #bitmap images. It can read and write images in a variety of formats (over 200) including #PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and #SVG.

To install ImageMagick from the source:

1. First #download the latest version of the program sources - ImageMagick.

2. Unzip the package to a folder of choice.

3. In the folder where you have unzipped ImageMagick run the configuration script.

4. If no errors were found, you can start the install process.

Windows update error 0x80240023

This article will guide you on steps to fix #Windows #update #error #0x80240023 which usually triggers while updating the Windows #system.
When you encounter an error #message, reboot your #machine and try to run the updates again. If you haven't run Windows #Update for some time, then you might have to repeat this process several times before all updates have been installed.
To fix errors on Windows 10:
1. Make sure that your #device has enough space.
2. Run Windows Update a few times.
3. Check third-party #drivers and download any updates.
4. Unplug extra #hardware.
5. Check Device #Manager for errors.
6. Remove third-party security #software.
7. Repair hard-drive errors.
8. Do a clean restart into Windows.

Perfmon Counters for CPU usage

This article will guide you on how to use #Perfmon Counters for CPU #Usage and #Optimization.
Monitoring #CPU #Performance #Counters:
1. System, #Counter: Processor Queue Length. This Performance Monitor counter displays the number of threads waiting to be executed in the queue, which all the processors on your system share.
2. Processor, Counter: % Processor Time.
3. Processor, Counter: Interrupts/sec and Performance Object; Processor, Counter: % DPC Time.

Install WebsitePanel on Windows

This article will guide you on steps to #install #WebsitePanel on #Windows. Also, we saw how to fix some common errors of WebsitePanel.
WebsitePanel began as #DotNetPanel, which its creators made only for the Windows web technology platform as a Windows #hosting panel. The initial DotNetPanel developers contributed a great deal to WebsitePanel. And now #Microsoft has added to their legacy by investing in WebsitePanel’s future.
WebsitePanel is a Multi-Tenant, Enterprise Hosting Automation Tool with support for Private #Cloud Servers. It enables you to centralize the management of your hosting infrastructure and share resources across multiple customer accounts.
1. Save time and money spent on system management.
2. Simplify deployment processes.
3. Administer everything from a single interface.

Manage Docker Volumes using Docker Compose

This article will guide you on steps to use #Docker #Compose for manging Docker #Volumes.
When you execute a docker-compose command, the volumes #directive in docker-compose. yml file mounts source directories or volumes from your computer at target paths inside the container. If a matching target path exists already as part of the container image, it will be overwritten by the mounted path.
A #Dockerfile is a text document that contains all the commands a user could call on the command line to assemble an image. Using docker build users can create an automated build that executes several command-line instructions in succession. This page describes the commands you can use in a Dockerfile .
List of Docker #Commands:
i. docker run – Runs a command in a new #container.
ii. docker start – Starts one or more stopped containers.
iii. docker stop – Stops one or more running containers.
iv. docker build – Builds an image form a Docker file.
v. docker pull – Pulls an #image or a repository from a registry.

Rsync from Linux to Windows share

This article will guide you on how to use #Rsync to transfer #files from #Linux to #Windows share.

cwRsync is an implementation of rsync for Windows. rsync uses a file transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. #cwRsync can be used for remote file backup and synchronization from/to Windows systems.

Syntax of rsync #command:

1. -v, –verbose Verbose output.

2. -q, –quiet suppress message output.

3. -a, –archive archive files and directory while synchronizing ( -a equal to following options -rlptgoD).

4. -r, –recursive sync files and directories recursively.

5. -b, –backup take the backup during synchronization.

Could not load file or assembly Microsoft ReportViewer WebForms

This article will guide you on ways to resolve Could not load #file or #assembly 'Microsoft.ReportViewer.WebForms' #error occurs when #ReportViewer files are missing from the #bin folder.
You need to reference both Microsoft.ReportViewer.WebForms and Microsoft.ReportViewer.Common and set the CopyLocal property to true. This will result in the dll's being copied to our bin #directory (both are necessary).

Backup Active Directory Domain Controller

This article will guide you on how to #backup #active #directory domain controller.
A System State backup generally includes a copy of any installed device #drivers and related files, most of the Windows directory, the #Windows #Registry, the Active Directory configuration (where applicable) and system files under Windows File Protection.
In production it is best practice to have at least 2 domain controllers per domain. If you factor in each child domain and the other domains that could easily scale up fast if you have two in each one.
To Configure Windows Backup Users on a Domain Controller:
1. Expand Active Directory "Users > Computers > Users".
2. Right-click the appropriate user who will be performing backups and click Properties.
3. On the Member Of tab, click Add to add the Backup Operators group to the User.
4. Click OK.

Add Glance Cloud images to OpenStack

This article will guide you on steps to add #Glance #Cloud images to #OpenStack with different #Linux distributions which enables users to discover, register, and retrieve virtual machine images. 

After images are created they should be registered in Openstack Glance - #image operation service.

Upload Image Into Glance:

1. Replace <NAME> with the name that users will refer to the disk image by. 

2. Replace <IMAGE_FILE> with the local path to the image file to upload.

Deploy Node js Application to DigitalOcean Server

This article will guide you on how to  deploy node.js application to #DigitalOcean Server.  

To Deploying #Node . js application to DigitalOcean — Setting up the #server:

1. Getting familiar with Digital Ocean and creating your first #droplet.

2. Setting up #SSH and connecting to your server from your local #machine.

3. Setting up a simple Express.js web-server in local machine.

4. Using #Git to deploy your code to server.

Plesk DNN install Service Unavailable error

This article will guide you on how to install DNN for our customers. In order to fix the Service Unavailable Error we should check whether the Dedicated application pool option is enabled in Plesk before DNN install.

A 503 Service Unavailable Error is an HTTP response status code indicating that a server is temporarily unable to handle the request. This may be due to the server being overloaded or down for maintenance.

Windows block remote network access for local user accounts

This article will guide you on ways to #restrict remote network access for a local user account.

To restrict local #accounts in #Windows 10,

Open the Settings app, then select Accounts. Select Family & other users. Scroll down to the Other Users section, then choose Add someone else to this PC. If the new user already has a #Microsoft account, enter the associated #email address, then click Next.

To restrict a Windows user:

1. Select Settings.

2. Tap Accounts.

3. Select Family & other users.

4. Tap "Add someone else to this #PC."

5. Select "I don't have this person's sign-in information."

6. Select "Add a user without a Microsoft account."

Virtual Log Files in SQL Server

This article will guide you on how to find the total number of #VLFs. The DMF sys.dm_db_log_info specifically looks at virtual log files or VLFs for which it needs a database ID for input.

To find it, check the number of virtual log files (VLFs) in each #database and alerts when there's 1,000 or more.

Find the Source of Account Lockouts in Active Directory


This article will guide you on steps to find the source of Account Lockouts in the Active Directory #domain.

The most common underlying cause for #AD account lockouts, beyond users forgetting their password, is a running application or background service on a device that is authenticating with stale credentials. 

To Track Source of Account Lockouts in #Active #Directory:

1. Search for the #DC (Domain Controller) having the PDC Emulator Role. 

2. Look for the Event ID 4740. 

3. Put Appropriate Filters in Place. 

4. Find Out the Locked Out Account Event Whose Information is Require. 

5. Open the #Event Report, to Find the Source of the Locked Out account.

SQL server Error 1053

This article will guide you on different methods of fixing error #1053 SQL server which occurs when attempting to pause or stop the SQL Server service in the #Windows Services Console. 

The most common cause of this error is when one of the files needed by sql server was not on a shared resource, and Sql Server, once failed to the other node, couldn't access it.

The #SQL #Server Agent error log may include a path or a file name that is not correct.

In this case, verify that the path and file name for SQLAgent.out is valid:

1. In SQL Server Enterprise Manager, expand the Management folder.

2. Right-click SQL Server Agent, and then click Properties.

3. Under Error Log, make sure that the path that is specified next to File Name is valid.

4. Make sure that the file name is SQLAGENT.out.

Directadmin Unable to write users httpd conf configuration

This article will guide you on how to fix the #error, Unable to write user's httpd.conf in Directadmin which occurs when we try to add a #domain in #DirectAdmin. 

The httpd. conf file is the main configuration file for the Apache web server. It's highly recommended to run Apache in standalone type for better performance and speed. ServerRoot "/etc/httpd" The option ServerRoot specifies the directory in which the configuration files of the Apache server lives.

Before you edit httpd.conf, you should first copy the original file to something like httpd.conf-old, for example. 

By creating a #backup, you can recover potential mistakes made while editing the new configuration file.

Windows update encountered an unknown error 80072efe

This article will guide you on the different methods to get rid of #Windows #update encountered an unknown #error #80072efe.

You may get the error because there are corrupted files on your #computer. You can run System File Checker, which can scan and repair the corrupted issues, Close the Command Prompt window and restart your #computer. Then open Windows Update and see if the error is fixed.

To fix Windows Update encountered an unknown error:

1. Right click on the #taskbar and select Properties.

2. Click the Customize.

3. On the Notification Area Icons window, make sure Always show all icons and notifications on the taskbar is checked and click OK.

4. At this point, try running Windows Update again and the updates should begin to install properly.

Windows update error 0xFFFFFFFF

This article will guide you on different methods to fix #Windows #error #0xFFFFFFFF. Windows 10 update comes with #BSOD, crashes and various sound and #printer problems. The solution here is to uninstall the patch and pause updates until it's been fixed.

To fix Windows Error Code 0xFFFFFFFF:

1. Fix System Errors. To remove all error from your system that issuing freezing, slower performance problem etc.

2. Remove #Malwares. It can remove #malwares, #virus, #Trojan from #PC which causes all kind of critical issue.

3. Improve Startup. 

4. Clean PC.

You can also fix WIndows Error #0x800705b4:

i. Run Windows #Updates Troubleshooter. 

ii. Run #SFC scan. 

iii. Delete Software Distribution Folder.

iv. Disable updates for other #Microsoft #products. 

v. Uninstall the Problematic Updates. 

vi. Download and Install Windows Updates Manually.

Windows update encountered an unknown error 80072ee2

This article will guide you on different methods to resolve #Windows update encountered an unknown error 80072ee2 which occurs while Windows tries to search for Updates via Windows #Update. 

#Error #80072ee2 is a windows update error which is caused when the files on your system are corrupt or the updates are stuck. Before you continue with the fix below, make sure that your internet is working on the PC affected by this error since it will need to connect to the windows update servers to push updates back.

To fix Windows Update encountered an unknown error Code #80243004 – Windows Update encountered an unknown error:

1. Right click on the taskbar and select Properties.

2. Click the Customize.

3. On the Notification Area Icons window, make sure Always show all icons and notifications on the taskbar is checked and click OK.

4. At this point, try running Windows Update again and the updates should begin to install properly.

Install InfluxDB on CentOS 7

This article will guide you on steps to Install #InfluxDB on #CentOS 7. You can Turn any InfluxData #instance into a production-ready cluster that can run anywhere. Easily create and share a comprehensive monitoring solution.

InfluxDB is similar to a #SQL #database, but different in many ways. Relational databases can handle time series data, but are not optimized for common time series workloads. InfluxDB is designed to #store large volumes of time series data and quickly perform real-time analysis on that data.

The local InfluxDB configuration file is located here: Linux: /etc/influxdb/influxdb. conf. macOS: /usr/local/etc/influxdb.

To Install InfluxDB:

Option 1 : Download the InfluxDB archive via the browser.

Option 2 : Adding the #repositories to your package manager.

i – Start your InfluxDB service.

ii – Configure your InfluxDB instance.

iii – Test your InfluxDB instance.

iv – #Download InfluxDB 2.0 archive from the website.

Windows System error 5 has occurred Access is denied

This article will guide you on different methods to fix #Windows #System #error 5 has occurred Access is denied which is generally caused by #NTFS permissions, but it can also be caused by other issues like a corrupt user profile, encryption on the file or if the file is in use.

A system error refers to an instruction which cannot be recognized by an operating #system or goes against the procedural rules. A system error code refers to the exact error number with which you can track down the details.

To fix Access is denied message on Windows 10:

1. Take ownership of the directory. 

2. Add your account to the #Administrators group. 

3. Enable the hidden Administrator account. 

4. Check your #permissions. 

5. Use Command Prompt to reset permissions. 

6. Set your account as administrator. 

7. Use Reset Permissions #tool.

Plesk Multi Server How to install it

This article will guide you on how to install #Plesk #Multi #Server which will enable us to work with a single Plesk user interface to run hosting services on multiple #servers. A multi-server environment can support more #connections and services, helps to keep the system running, and can also cost significantly less each month than continually adding resources to a single server.

Plesk Multi Server is most useful for the following types of business:

1. Web design and development studios that also host the clients web sites;

2. Small and medium-sized shared hosting providers;

3. Larger hosting providers for #reselling to customers, who are small and medium-sized shared #hosting #providers.

How to Install OpenNMS on CentOS 8

This article will guide via a step-by-step procedure to #install OpenNMS in #CentOS. 

OpenNMS is a free, Open Source network monitoring system that can be used to #monitor tens of thousands of unlimited devices with a single #instance.

It will discover and monitor the services or nodes automatically in your #network, or you can assign a particular service to monitor by OpenNMS.

To configure #OpenNMS:

1. Install OpenNMS Horizon. Add yum repository and import GPG key. 

2. Initialize and set up #PostgreSQL. Initialization of the PostgreSQL database will start.

3. Initialize and start OpenNMS Horizon. 

4. First Login and change default password.

How to Install Python on Windows

This article will guide you on steps to install #Python and #PIP on #Windows. If you would like to download and install Python on your #computer you can do for free at python.org.

To install Python on Windows:

1. Select Version of Python to #Install. 

2. Download Python Executable #Installer. 

3. Run Executable Installer. 

4. Verify Python Was Installed On Windows. 

5. Verify Pip Was Installed. 

6. Add Python #Path to #Environment Variables which is Optional.

ElasticSearch LDAP Authentication on the Active Directory

This article will guide you on how to authenticate #ElasticSearch users using the Active Directory from #Microsoft #Windows and the #LDAP protocol.

#Active #Directory (#AD) supports both Kerberos and LDAP – Microsoft AD is by far the most common directory services system in use today.

To Set up Active Directory Authentication using LDAP:

1. Enter the LDAP "Server" and "Port" attributes on the Server Overview tab of the LDAP Users page. 

2. Enter the proper base for the Active Directory in the "Base DN" attribute. 

3. Set the Search Scope. 

4. Enter the Username Attribute. 

5. Enter the Search Filter. 

6. Verify that the #settings are correct by clicking the Verify button.

How To Install MariaDB on Ubuntu Focal Fossa

This article will guide you on steps to install #MariaDB from the #Ubuntu #repositories and from the official MariaDB repositories. You can install MariaDB in two different ways.

To install MariaDB on Ubuntu, follow these steps:

1. Update #packages index. sudo apt update.

2. Once the packages list is updated, install MariaDB by issuing the following command: sudo apt install mariadb-server.

3. The MariaDB service will start automatically.

The default data directory for the MariaDB database server is /var/lib/mysql. The configuration file of MariaDB database server is /etc/mysql/mariadb. conf. d/50-server.

Different methods to fix DHCP Server Errors

This article will guide you on the different methods to resolve DHCP server error. A #DHCP error means the server on your network that provides an Internet Protocol (#IP) adress for devices is not able to assign your #device an IP adress.

Two things can cause a DHCP #error. 

i. One is the configuration on the computer or device that allows a DHCP server to assign it an IP. 

ii. The other is the configuration of the DHCP server. DHCP errors occur when the DHCP server or #router on a network cannot automatically adjust the device's IP address to join the #network.

Steps to install Yarn on Windows

This article will guide you on steps to install #Yarn in Windows via #MSI Installation, Chocolatey Installation, and Scoop Installation. msi file that when run will walk you through installing Yarn on Windows. If you use the installer you will first need to install Node. js.

Yarn global install locations:

1. On #Windows %LOCALAPPDATA%\Yarn\config\global for example: C:\Users\username\AppData\Local\Yarn\config\global.

2. On #OSX and non-root Linux  ~/.config/yarn/global.

3. On #Linux if logged in as root /usr/local/share/.config/yarn/global.

yarn install is used to install all dependencies for a project. This is most commonly used when you have just checked out code for a project, or when another developer on the #project has added a new dependency that you need to pick up.

How to Check Server Load on a Windows Server

This article will guide you on how to check server load in windows. Windows #Task Manager allows users to analyze the server load issues on the #Windows servers.

Load expresses how many processes are waiting in the queue to access the computer processor. This is calculated for a certain period of time, and the smaller the number the better. 

Signs of #Server #Overload includes:

The following signs indicate that your web server has possibly become overloaded: 

Displaying error codes. Your server returns an #HTTP #error code, such as 500, 502, 503, 504, 408, and so on. 

Delaying serving requests.

Data Loss through Partial loss of keys in Azure Cache for Redis

This article will guide you on the different methods to fix data loss in #Azure #Cache for #Redis which can happen due to a number of reasons like Redis instance failure, incorrect #database selection, and so on. 

Redis server saves all its data to HDD from time to time, thus providing some level of persistence. It saves data in one of the following cases: automatically from time to time. when you manually call BGSAVE command.

Redis does not use #tables, and stores data in #memory, and is not limited by the hard #disk I / O speed when reading and writing #data, so the speed is extremely fast.

Restore Active Directory from backup

This article will guide you on how to restore active directory from backup. Back up Active Directory on a regular basis

You should back up your Active Directory regularly with an interval that doesn't exceed 60 days. #AD services presume that the age of the Active #Directory backup cannot be more than the lifetime of AD tombstone objects, which by default is 60 days.