Tuesday, October 5, 2021
SSL vs TLS: Decoding the Difference Between SSL and TLS
Sunday, May 30, 2021
How do I upgrade Office?
https://support.microsoft.com/en-us/office/how-do-i-upgrade-office-ee68f6cf-422f-464a-82ec-385f65391350
This page includes how to remove Office license on Mac.
Thursday, December 24, 2020
TP-Link EAP225 Guest Network and Portal
If you want to do something extra fancy with your wifi network without spending too much money, then a $60 TP-Link EAP225 is just for you. However, at this price point, don't expect the fancy features to be too fancy.
This access point allows you to create a guest network easily, that one has its own pseudo-VLAN. This means while any devices associated with this guest network have the same subnet as the main network, these guest devices cannot ping or share files with those on the main network. This EAP225 does offer true VLAN, but it must be under the router or switch that supports VLANs.
There is a portal feature for the EAP225. You can associated a portal with a particular SSID, presumably the guest SSID. The portal page can redirect the clients to another location to be managed. You can put a password on the captive portal page. Once entered, the client would be connected to any SSID. You can make the guest SSID with no encryption, and point the portal to it. You can also make the portal not asking for a password. Just because you can connect to an SSID with a password, it does not automatically mean the data between your computer and the access point is encrypted. This is the difference between authentication and confidentiality. Authentication is what you are allowed to do whereas confidentiality means you can hide what you are doing. Without encryption, there is no confidentiality. Basically, the captive portal is a way to show a splash page with some disclaimer information you want those using the guest network to know. The EAP225 needs to reach out to an external RADIUS server for user and password authentication.
The EAP225 is an inexpensive way to get your feet wet with more advanced features of Wifi connectivity, but it needs a separate more powerful and feature-rich RADIUS server or router/swicth that supports VLAN to make it more appropriate for any Wifi corporate network.
Wednesday, June 17, 2020
Recover Data from Synology Backup Drive Linux Edition
When habitual Windows or Mac users are told to use Linux, you will either immediately see a grimace on their faces or a quizzical look because they have never heard of Linux. Linux is "the other" operating system in terms of popularity. It is used extensively on servers, managed by the uber nerds. In general, Linux is not easy to use, but in this tutorial, I will use the popular Ubuntu Desktop version 20.04 computer to do this backup recovery because it is a friendly operating system among the hundreds of Linux variants. If you are a technology enthusiast with some extra time, I highly recommend you get acquainted with Ubuntu Desktop. Unsurprisingly, the Synology NAS operating system is Linux-based. So if you know more about Linux, you will actually understand how the Synology NAS does what it does under the hood.
Instead of wiping out the existing Windows operating system to install Ubuntu just to do one task of accessing the ext4 external drive, you should install the free version of VMWare Player in Windows, then install Ubuntu Desktop on a VMWare virtual machine. There are plenty of instructions on the Internet such as Youtube that show you how to do this without much fuss. Once you have Ubuntu installed in a virtual machine, come back here and see how you can use the Linux version of Synology Hyper Backup Explorer to recover data from an ext4-formatted external drive.
You will see the files and folders inside this USB external drive. Open the HBK folder to see the SynologyHyperBackup.bkpi file. This is the file you need to open with the Hyper Backup Explorer program.
Using the Hyper Backup Explorer program
In general, installing programs in Linux can be a trying process. It's not as simple as opening the installer as with Windows and Mac OS. Fortunately, like its Windows counterpart, the Linux version of Hyper Backup Explorer is a portable program that does not require any installation. You just run it as downloaded.Inside Ubuntu, use Firefox to go to the Synology website and download the Explorer program for Linux under the heading of Desktop Utilities.
The program should be found in the Downloads folder in Ubuntu. Right click on it and choose Extract Here. Open the resultant folder and open the HyperBackupExplorer program. You will see the Welcome screen that looks like the Windows version of this program. Direct the program to the SynologyHyperBackup.bkpi file. The path is Computer/media/<username>/<USB drive>
That's it. You can now copy the backed up files onto the Ubuntu Desktop. From there, drag these recovered files out of the virtual machine onto the Windows side of the computer.
Sunday, June 14, 2020
Recover Data from Synology Backup Drive

When you open the ShareOneBackup.hbk folder, you will see the following files and folders layout. Of particular interest is the SynologyHyperBackup.bkpi file. This file is the gateway to all the files stored on this external drive including their various versions pertaining to the sourced ShareOne share on the internal drive. If there is another backup task, there will be another pair of this HBK file under the name of the backup task specified in Hyper Backup. Each HBK file has its own respective SynologyHyperBackup.bkpi gateway file.
So how to open this BKPI file? This is not a format that Windows can understand natively. You need to use a program from Synology called Hyper Backup Explorer. So you download it from the Synology website. The program does not install into Windows. It's a zip file that is extracted into a folder that contains the executable called HyperBackupExplorer.exe. When opened, you see the welcome screen below:
You click on Browse Local Backup and direct it to this SynologyHyperBackup.bkpi file. Once done, you will see something like this. There they are, your data, or at least the backup versions of the data. Click on the calendar icon at the lower left corner to bring up a calendar so you can choose the backup from a particular date. The last step is your simply clicking on the file or folder you want to recover and copy it to any place on the computer.
This way to recover data is practical if you only want to recover a few files and folders. If you want to recover the whole set of data, then the faster way is to rebuild the NAS with a working internal drive or getting a new NAS depending on what is the cause of the breakage. Plug this external drive to the NAS and use the NAS own DSM Hyper Backup to recover the date in bulk.
Sunday, April 19, 2020
How to Reset or Refresh Windows 10 without Losing Programs
The instruction on this page was last accessed on April 18, 2020. Its content was updated March 3rd, 2020. Given that these instructions are based on the latest versions of Windows, the timeliness of the information is important. The article mentions of Windows 10 builds 15002. This build goes back to year 2017, so it is safe to say that your copy of Windows is newer than this and therefore does not have Refresh Windows in Windows Defender. Therefore, you should look for this refresh feature as Reset this PC in Settings. Remember, the Reset feature will remove all your third party programs whereas the 3 methods below do not.
The 3 methods mentioned in the article are:
Method 1. Do a repair upgrade by running the Windows Setup.exe
Method 2. Create a custom refresh image with all programs for resetting
Method 3. A more convenient method to create custom recovery image
If you prefer to watch how these 3 methods are used, there are videos on Youtube that can visually show them.
Tuesday, January 15, 2019
Take Screenshot of Full Webpages in Chrome
On a PC, click on the 3 vertical dots at the upper right corner of Chrome. This is where you go to do customization of Chrome.
Move and hover the mouse cursor over More Tools.
A second box appears. Click on Developer Tools. You can get here with a 3-key keyboard shortcut of ( Control + Shift + I )
The screen will split into 2 columns. The left column is whatever webpage you are on at the moment. The right column shows you what is going on under the hood that tells Chrome to display the webpage on the left. This webpage is not a static picture but a live page. That means you can actually interact with the elements in it. However because of the screen split, the page appears small making any interaction difficult.
Look at the top horizontal menu in the left column. Click on the word Responsive, and you are presented with a list of devices. This allows you to see what this particular webpage looks like on a particular real world device. You can also customize the width of the screen by dragging the 2 parallel bars on the right side of the webpage. The layout of the webpage will change, adapting to the changing widths that you specify. Once you are satisfied with the layout for your desired screenshot, click on another 3 vertical dots on the upper right corner of the left webpage column. (These 3 dots are not the same 3 dots mentioned earlier).
Choose Capture full size screenshot.
Alternatively, click on the 3 dots on the right, next to the window-closing X.
Click “Run Command.”
In the command line, type “Screenshot,” then click “Capture full-size screenshot” from the list of commands available.
Choose Capture Full Size Screen Shot. Chrome will do the capture and save the resulting picture as a download. Note that the dynamic layout of the webpage is not available for all webpages. It all depends on how compliant are the computer codes used to display the webpage. Many webages are so poorly coded that Chrome does not know how to shuffle around the layout as the screensize is changed. Website creators use this feature in Chrome to test their creation to maximize accessibility on various screen sizes. If you don't want to do any customization of the screen size, I find the preset of iPad Pro is the best middle ground that produces the best screenshot for screen and print out.
Friday, January 11, 2019
HEIC Format
Currently, there is no popular image displaying program on Windows to open picture files including the new iPhone-centric HEIC format. However, it's a matter of time when this issue will be resolved either by one such program becoming available due to the sufficient popularity of this file format OR the HEIC never catches on and be deprecated by Apple.
In the meantime, you can tell the iPhone to take pictures in the old JPG or PNG format in the phone's Settings. At the same time, go here to read a bit about this issue including using a utility the article recommends to convert all the existing pictures from the HEIC format to either JPG or PNG.
https://lifehacker.com/how-to-easily-convert-your-iphones-heic-images-in-windo-1826327599
https://imazing.com/heic
Monday, December 24, 2018
How to download the Windows 10 version 1803 ISO file after version 1809 releases
https://pureinfotech.com/download-windows-10-1803-iso-file-after-1809-releases/
1. Open a new tab on Google Chrome
2. Go here: https://www.microsoft.com/en-us/software-download/windows10ISO
3. Right-click on the page and select Inspect.
4. On the right column, choose iPad Pro from the Emulation or user-agent dropdown list. This basically tricks the webserver into thinking that the computer accessing it is a different computer and browser other than Chrome, resulting in the webserver displays the target webpaged based on the emulation that you want.
5. The full-page mini webpage shown is a live webpage that can be acted upon like a regular webpage so click on it when and where applicable.
6. Refresh the page if the browser doesn’t reload automatically. Remember, it is a live webpage.
7. Using the drop-down menu, select the Windows 10 April 2018 Update option
8. The rest of the steps is self-explanatory.
Saturday, December 15, 2018
Dual Boot on Mac
As said, I have done a lot of dual boot systems on Windows machines, but never on a Mac computer, so I decided to give it the old dual boot configuration a try. Again, if your Mac computer must be shared with your kids, I highly recommend that you create a dual boot system for your Mac. Ordinarily, I recommend that they get their own computer, preferably a Chromebook and call it the day. It would take an amazingly clever kid to break a Chromebook -- software wise.
Creating a dual boot system on a Mac is actually very easy. First you need to install the first OS which presumably is already done. Then you would use Disk Utility to split the partition into two with each partition getting the desired free space size. Then you would boot the Mac OS installer from a USB and tell the installer to install the OS into the newly created and blank partition. By default, the Mac will boot into the new OS on the second partition. However, if you want to boot from the first OS, simply hold down the Option key during start up and you are presented with the two partitions. You would use your mouse to pick which partition you want to boot from. If you do not tell the computer which partition to boot from, the next boot up will be booted from the newer second partition. If you want to always boot from the first partition, then from within any OS, go to the System Preference Start Up Disk pane and choose the first partition as the default partition. If you want to move files between the two partitions, use the Shared user account on both the partitions as the depository.
If you want to encrypt the first partition because it has confidential data but not the second partition, then you can boot into the first partition and start the filevault procedure there. Encrypting the first partition also prevents accidental removal or replacement of critical system files on the first partition while the second partition is being used. When the first partition is encrypted, its drive icon is not visible under the OS of the second partition. Therefore, the users of the OS on the second partition cannot even make any changes to the files stored in the first partition by accident. However, you can mount the first partition in Disk Utility after having provided the unlock password of a particular user account on the first partition. Moreover, if the user on the second partition has administrative privileges, he can still do damage to the first partition such as erasing the entire first partition. One more reason to let the person (i.e. your kids or elderly parents) use the OS in the second partition as a limited user.
Let's say something goes wrong with the user accounts including the admin on the first partition. How can you use the system on the second partition to unlock and recover data from the first partition? You cannot unfortunately. However, if you know the long 24-character FileVault decryption key used to encrypt the first partition, you can boot a third system from a USB stick or put the computer in Target Disk mode and use either the password for a user account from the first partition or the FileVault encryption key. If you plan to use FileVault, it is imperative to keep a copy of this long key outside the computer and a copy of the most recent Mac OS installed on an external drive. No matter what the disaster recovery strategy is, nothing beats a real data backup plan. Data should be recovered from this data backup source and not from the primary sources because if the disaster is the harddrive has gone bad, there is nothing to recover from.
Saturday, February 10, 2018
Drive Cloning
When you have a harddrive that has Windows or Mac operating system on it plus all the associated programs that have been installed in it, you want to create a clone of this drive so that when something goes wrong with the system or the drive itself dies, you have the exact duplicate of its former self. This saves many hours of not having to reinstall the operating system and programs. This fact alone makes drive cloning or drive imaging a very attractive task to do to a computer before you start using it. Once you start using the computer, it's on its way to become corrupted with errors and computer viruses and all the things that can and will go wrong with the operating system and the physical deterioration of the physical drive itself. Therefore, it's not a matter of if but when you need to either reinstall the operating system or replace the drive. Knowing that it will happen anyway, you should be proactive with what you have to do when it happens.
My View on Windows 8
Even with Windows 8.1 Update 1, I will still not recommend it for the average longtime Windows user. Yes, the Start button is back, sort off, but navigating in the Modern UI formerly known as Metro mode is still confusing.
Secret communications with Comcast X1 TV Setvice
MOCA Support on the Latest Comcast Modem
https://www.xfinity.com/support/articles/comcast-supported-routers-gateways-adapters
It has two major improvements from the previous version. 5 GHz wifi support and MOCA. The MOCA technology uses the home existing coax wiring to propagate teh Internet signal. You need another compatible MOCA host at another part of the home to receive the MOCA signal from the modem. Actiontec makes some excellent MOCA devices.
Edimax CAP1200
As far as I know, this is the only AP that can be used as a basic RADIUS server. This is great for organizations that need this service but does not want to install a dedicated RADIUS server on a desktop. With that said, running a basic RADIUS server does not require hefty expensive hardware such as a Windows Server system or a complex Linux server on a desktop. You can get a $35 Raspberry Pi and with a little tweaking, you can get a RADIUS server running that has a small foot print and lower power consumption.
Engenius EAP600
Setup WDS on the EAP600
https://www.youtube.com/watch?v=RikqKW0qvQk
Overview of EAP600 features
https://www.youtube.com/watch?v=tfju3ce6jAw
As you can see in the video, with these EAP600s working together, your wireless device only sees one wireless name. The EAP600 supports band steering. It also create multiple SSIDs with each SSID be on its own VLAN. This not only keeps devices from one VLAN from accessing the others on another VLAN, but it also restrict bandwidth for a VLAN. For example, you can create a guest SSID on a separate VLAN and only give that VLAN a limited amount of bandwidth.
Wednesday, December 27, 2017
OSMC Media Center and NAS using Raspberry Pi
Friday, December 22, 2017
Free CAD Programs as Microsoft VISIO Alternatives
CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. You can use predefined blocks, primitive shapes, raster and vector images. The collection of blocks and it's attributes could be modified and extended. Working in CADE requires no particular drawing skills.
http://www.weresc.com/cade.php
-----------------------------------------------
Dia Diagram Editor
http://dia-installer.de
Simpler than CADE.
----------------------------------------------
GLIFFY
A web-based solution so you do not need to download and install the program on your computer.
https://www.gliffy.com/products/online/
Tuesday, December 19, 2017
How To Restore Files Using Hyper Backup Explorer in Synology
What the video does not say is you cannot simply attach the external drive into a new Synology box or the same box that has been reformatted and its OS reinstalled. You have to use a computer and this Hyper Backup Explorer program to extract the data from the backup datastore, put this extracted files onto the same external drive if there is still free space, then plug this external drive into the NAS, move the extracted data onto the internal drive in their respective shares, the format the external drive and reconfigure the NAS to use it as its own external drive for Hyperbackup package.
This is a huge time-consuming hassle if you have multi-terabytes of data. If is probably cheaper to have 2 Synology NASes running and use sync to sync the NASes.
Saturday, December 9, 2017
Installing Debian 9 in a VMWare virtual machine using Raspberry-Pi-Desktop
https://www.raspberrypi.org/downloads/raspberry-pi-desktop/
Raspbian is the Raspberry Pi Foundation’s official supported operating system, based on Debian with the latest version running Debian 9 code-named Stretch.
https://www.raspberrypi.org/downloads/raspbian/
After the guest OS has been installed, it is customary to update the OS with the latest files by running two commands.
sudo apt-get update
sudo apt-get upgrade
This only updates the OS itself but does not install any specific drivers for the virtual hardware that is VMWare Player or Workstation. These specific drivers plus other extra enhancement features are called VMWare Tools. For example, with VMWare Tools installed in the Raspbian OS guest, the guest can share a folder on the host side, basically creating a network between guest and host for the purpose of sharing files.
One of the things you can do after VMWare Tools has been installed is the ability to share a folder between the guest Raspbian OS and the host OS such as Windows. After you have specified where the shared folder is on the host, go to /mnt/hgfs folder on the Raspbian side and you will see this shared folder on the host.
A good video on how to install VMWare Tools is this:
https://www.youtube.com/watch?v=hJPqM9QYeR0
The help page that the author of the video uses is this:
https://communities.vmware.com/message/2682930#2682930
If this page is not found, below is a copy of the instructions
You can just install VMware Tools in a terminal window in Jessie, you can stay in graphical mode, no need to switch.
It sounds like that the vmware host guest share drivers are broken in the open vmtools variant of Jessie, this is also an issue in a few versions of ubuntu.
Guess they might share some code there.
The easiest solution is to install the vmware tools version that comes with VMware Fusion.
But before you do, completely remove the open vm tools variant from debian.
sudo apt-get purge open-vm-tools
sudo apt-get purge open-vm-tools-desktop
then select install VMware Tools from the virtual machine menu in Fusion. Note that this just presents a CDrom to the guest, so you will have to install
If you're not sure on how-to do that, then here's a script I've used in the past:
#!/bin/bash
sudo apt-get update
sudo apt-get upgrade
echo "Do go and mount your cdrom from the VMware menu"
echo "press any key to continue"
read -n 1 -s
mount /dev/cdrom
cd /media/cdrom0
cp VMwareTools-*.tar.gz /tmp
cd /tmp
tar xvzf VMwareTools-*.tar.gz
cd vmware-tools-distrib/
sudo apt-get install --no-install-recommends libglib2.0-0
sudo apt-get install --no-install-recommends build-essential
sudo apt-get install --no-install-recommends gcc-4.3 linux-headers-`uname -r`
sudo ./vmware-install.pl --default
sudo /etc/init.d/networking stop
sudo rmmod pcnet32
sudo rmmod vmxnet
sudo modprobe vmxnet
sudo /etc/init.d/networking start
Friday, September 22, 2017
Bitlocker
However, when the harddrive on your computer is encrypted, any unauthorized person who has physical access to your computer cannot access the data on it because the entire drive is encrypted. With that said, you can just encrypt your user's profile to get the same protection but this only affects your profile. If you per chance store sensitive data outside your user profile, then there is no protection for it when the unauthorized person has physical access to the computer.
On a Windows 10 machine, whole drive encryption can easily be done using the built-in BitLocker. Setting it up is very simple and straight forward. However, it does require that the Windows 10 is Professional or Enterprise version. If your Windows 10 is the Enterprise version, the computer is most likely maintained by your company's IT department. As such, it may already be encrypted with either Bitlocker or some other method. If not, talk to your IT department if you are concerned about data breaches.
The steps to use Bitlocker to encrypt the drive can be found on the Internet including myriad videos on YouTube. As with all things with computer security, back up your computer's data before trying anything. There is a chance that ironically, you lock yourself out of your own data so the backup is the insurance. In general, you need to back up valuable data regardless.
Saturday, September 16, 2017
Windows Setup: Installing using the MBR or GPT partition style
In general, when you install Windows 10, you should install it under UEFI mode to get additional features. Other than making the boot up faster, it also enables multi boot with other operating systems such as Linux. Each OS needs its own partition. With GPT disk, you can get more than 4 primary partitions. Moreover, given that ChromeOS is all the rage these days, an existing UEFI Windows is needed if you want to dual boot with Neverware's wonderful CloudReady ChromeOS that you can install on any old PC for free. Granted, if the PC is too old, its BIOS cannot run UEFI anyway. In short, if your old computer's BIOS support UEFI and can run Windows Vista or later, you can dual boot it with CloudReady ChromeOS.
Tuesday, July 25, 2017
Download Windows from Microsoft
Since this is the Microsoft website, the software is legit and more importantly don't have any hidden malware. You need a valid key for Windows 7 to download it though.
Tuesday, July 11, 2017
Batch Image Processing
http://www.highmotionsoftware.com/products/imbatch
You can also download it from http://www.lo4d.com/
Sunday, July 9, 2017
Tool to edit metadata of audio files
http://www.mp3tag.de/en/
It can bulk edit meta data on many audio files at the same time.
Free Video Editor Avid Media Composer First
https://www.youtube.com/watch?v=Pz6MHflf-bw
Avid is one of the major digital video editors out there that is being used to edit Hollywood mainstream movies. This is a scaled down version but its interface is the same as the paid version.
https://my.avid.com/mcfirst
Monday, June 5, 2017
Download ISOs from Microsoft website
This tool allows an easy and comfortable way to download genuine Windows 7, Windows 8.1 and Windows 10 disk images (ISO) directly from Microsoft's servers, as well as Office 2007, Office 2010, Office 2013, Office 2016, and Office 2011 for Mac.
Monday, May 29, 2017
Cryptomator
Cryptomator is one such solution.
https://cryptomator.org/
Friday, May 19, 2017
Download Youtube videos locally
http://www.pcmag.com/article2/0,2817,2476563,00.asp?
The site mentioned that allows you to download videos at 1080p or even 4K is youtubemonkey.com. You don't need to install any program locally. Moreover, there seems to be no limitation on how long the video is. I have successfully downloaded a nature video at 4K that runs an hour and 7 minutes.
If you want a more powerful downloader, try 4K Video Downloader
https://www.4kdownload.com/buy-ab/videodownloader?source=videodownloader&ui_source=default
Monday, April 24, 2017
3D Picture
You need at least a cardboard viewer to see the effect.
https://vr.google.com/cardboard/get-cardboard/
Saturday, February 25, 2017
Wi-Fi network roaming with 802.11k, 802.11r, and 802.11v on iOS
For those of you interested in iOS devices supports these latest "advanced" features, here is the document to read.
https://support.apple.com/en-us/HT202628
Below is a copy of their page, saved here in case it is removed.
iOS supports optimized client roaming on enterprise Wi-Fi networks. The 802.11 Working Group standards k, r, and v let clients roam more seamlessly from access point (AP) to AP within the same network.
802.11k
The 802.11k standard helps iOS to speed up its search for nearby APs that are available as roaming targets by creating an optimized list of channels. When the signal strength of the current AP weakens, your device will scan for target APs from this list.
802.11r
When your iOS device roams from one AP to another on the same network, 802.11r uses a feature called Fast Basic Service Set Transition (FT) to authenticate more quickly. FT works with both preshared key (PSK) and 802.1X authentication methods.
iOS 10 includes support for adaptive 802.11r on Cisco wireless networks. Adaptive 802.11r offers FT without the need to enable 802.11r on the configured Cisco wireless network.
802.11v
iOS supports the basic service set (BSS) transition-management functionality of 802.11v on certain devices. BSS transition management allows the network’s control layer to influence client roaming behavior by providing it the load information of nearby access points. iOS takes this information into account when deciding among the possible roam targets.
When you combine 802.11k and 802.11v’s ability to speed up the search for the best target AP with FT's faster AP association, apps can perform faster and you get a better Wi-Fi experience in iOS.
Learn more
Most Wi-Fi network hardware vendors support 802.11k, 802.11v, and 802.11r (FT). You need to enable and configure these features on your Wi-Fi router before your network can use them. Setup varies, so check your Wi-Fi router's manual for details.
The lists below show which iOS devices support 802.11k, 802.11r, and 802.11v. To use 802.11k and 802.11r, you need iOS 6 or later. To use 802.11v, you need iOS 7 or later. To use adaptive 802.11r, you need iOS 10 or later.
802.11k and r
iPhone 4s and later
iPad Pro
iPad Air and later
iPad mini and later
iPad (3rd generation) and later
iPod touch (5th generation) and later
Adaptive 802.11r
iPhone 6s and later
iPhone SE
iPad Pro and later
802.11v
iPhone 5c, iPhone 5s, and later
iPad Pro
iPad Air and later
iPad mini 2 and later
iPod touch (6th generation)
-------------
If you like to play around with these new WIFI standards to get faster roaming and efficient use of access points in a multi-access point setting, the cheapest way I can find in terms of access points supporting these 802.11k and r protocols is the Edimax CAP300 for $50 per access point. However, given that this AP can only do the 2.4GHz, I recommend that you get at least a pair of the CAP1200 to get both the 2.4GHz and 5GHz and AC speed.
More info on this:
https://www.smallnetbuilder.com/wireless/wireless-howto/33045-how-to-get-fast-reliable-wi-fi-roaming
http://www.edimax-de.eu/edimax/mw/cufiles/files/faq/SMB/022_How_to_Configure_802_11r_and_802_11k_Under_AP_Controller.pdf
Thursday, March 24, 2016
Check Outgoing Ports
http://portquiz.net:1000
This is what I get when I do this.
Outgoing port tester
This server listens on all TCP ports, allowing you to test any outbound TCP port.Your outgoing IP: [This is your local ISP-assigned IP]
Friday, March 18, 2016
Log into a Mac with TightVNC
http://www.tightvnc.com/download.php
This download has two parts: the server and the client (viewer). If your goal is not to control the machine the program is installed on, then make sure you only choose the "viewer only" option. From a security standpoint, there is no reason to have the server running when it is not needed.
Once the viewer is installed on the PC, just simply launch the program and enter the IP address of the destination Mac. If it does not work, it is because you need to turn on the “screen sharing” feature built into Mac OS X.
Click the Apple logo at the top left corner of the Mac’s screen and select System Preferences.
Click the Sharing icon to open the Sharing
Click the checkbox of Screen Sharing to enable screen sharing. (Remember to turn this off when the remote session is done).
Click the “Computer Settings....” button. Pay attention to what it says immediately on top of this button. It lists the current IP address of the Mac computer. This is the IP address that you would put in the TightVNC viewer on the PC.
Click the box VNC Viewers May Control Screen with a Password. Type a password into the box and click “OK.” This password is mandatory, used for the VNC session only so it does not need to be the same password you use for logging into the Mac computer.
Try again on the TightVNC viewer on the PC. It should work now.
If this is done over the Internet or the Mac is behind a firewall, you’ll need to set up port forwarding on the Mac's network router. Forward incoming traffic to port 5900. In situation like this, you should use the router’s external WAN IP address to connect instead of the IP address displayed in the Screen Sharing window seen previously on the Mac.
Incidentally, the VNC viewer on the Mac is the network share access program. On the Desktop (Finder), click on Go at the top of the screen. If you do not see this Go, just click on the Finder icon on the Dock. Choose Connect to Server. Type in vnc://IP address of the destination Mac in the text box. Connect.
Thursday, March 17, 2016
Register a Roku Account Without A Credit Card
Before you start up the device, go to the Roku website and register for a free Roku account. This is the account that you use to activate your Roku device using the Roku remote control and navigating through the Roku menu on the TV that the Roku box is attached to.
Here is the link where you would create an account without having to use your credit card. https://my.roku.com/signup/nocc
NOCC obviously means "no credit card"
Fill out the information like you would normally. Once you have reached the payment method, scroll down and click on Skip, I’ll add later.
If this "Skip" option is not visible, the only lest to do is strike up a chat connection with Roku at https://support.roku.com
Sunday, February 28, 2016
Using PIN instead of password to log into Windows 10
To create a PIN on Windows 10:
Click the Start menu.
Click on Settings
Click on Accounts
Click on Sign-in Options
Under PIN click “Add.”
Create a PIN.
This PIN is machine-specific. It only applies to the machine on which it is activated. This means on another Windows 10 machine, you need to go through the same routine and if you wish, you can create a different PIN that only for that machine even though the login Windows account on that machine has the same password has the previous machine. This way, you can actually allow someone to use one of these machines by only letting them know the PIN number without divulging your Windows account password. The rationale for this is when you change your Windows account password which may also be your Microsoft account that you use to log into various online services, this change will cause a cascade where you have to update the passwords to all these various services. This can get annoying. The PIN system therefore is a modular approach to computing access management.
What happens when you do change your Windows log in password. Does this change invalidate the PIN? No. The same PIN can be used to log into Windows on that specific machine. These two machine access credentials are independent of each other. One is machine specific and the other may be global if it is also a Microsoft account, one that is textually in the form of an email address.
Because the PIN is simpler to remember and we all tend to use the same PIN everywhere, it is unlikely that you will forget it. What if you have forgotten the PIN? Then let's hope that you have not also forgotten your Windows/Microsoft log in because the log in screen gives you the option to log in using this password. Once logged in, you can reset the PIN number.
Monday, September 28, 2015
Intel VT Virtualization
Needless to say, because the computer runs multiple copies of Windows at the same time, this computer needs to have a bit of beefy CPU, lots a memory, and last but not least the type of virtualization technologies that the CPU supports.
Assuming that the host physical PC has an Intel CPU. At the very least, this CPU has to support VT-x. There are a few other members of the VT family. They are VT-x, VT-i, VT-d, and VT-c. Below is a brief introduction of what these are and what they can do for you in terms of your using virtualization.
https://www.thomas-krenn.com/en/wiki/Overview_of_the_Intel_VT_Virtualization_Features
Saturday, June 6, 2015
Synology Disk Station Manager 5.2
https://miketabor.com/synology-dsm-5-2-exits-beta-goes-gold/
Thursday, March 12, 2015
VLC for iOS
While its Windows and Mac versions have been around for a long time, its iOS version is still relatively new. In fact, it seems to run afoul with Apple's App Store policy often resulting in its being yanked off from the store. If you have a network storage server at home, odds are it offers SMB as the primary download protocol because SMB is supported by Windows and Mac OSX. Unfortunately, VLC for iOS still does not support SMB as of March 2015 so that you can stream video files from the NAS to the iPhone and iPad. The good news is the VLC people promise that they will make VLC for iOS support SMB. Their initial work on this is 6 months ago based on the discussion on the VLC forum. Once VLC for iOS supports SMB, it will be a major software development for the iOS in general because Apple seems to want you consume media files via streaming from the Internet and not from your local file server. This is why Netflix and the likes have been available on the iOS for a long time.
http://www.videolan.org/vlc/download-ios.html
With that said, you can always download media files from the NAS into the iPhone or iPad via FTP. Then you would simply play them locally. As said, VLC for iOS can play a lot of file formats, negating the necessity to re-encode the video file to a iOS friendly format such as M4V.
Saturday, February 28, 2015
Creates a Custom Windows Recovery Partition

http://www.backup-utility.com/onekey-recovery.html
https://www.youtube.com/watch?v=gukKC7SsA8I
Friday, February 27, 2015
Microsoft Office on Your iPhones and iPads
Both iPad and iPhone users can now access and edit Word, Excel and PowerPoint documents on their iPhones as well as their iPads. You can now use this Outlook app to access your Outlook.com email address or any email accounts that offer IMAP support without using the mobile browser on your device.
If you are interested in the development of Microsoft Office on the Mac including on the iOS, you should visit this webpage once in a while.
http://www.macworld.co.uk/news/mac-software/microsoft-office-mac-2015-release-date-rumours-new-outlook-3456798/
Thursday, February 19, 2015
Internet Explorer version 9, 10, 11 Offline Installers
If you are a technician, you should download these installers now and save them on your computers before Microsoft takes them down. Windows 7 comes with IE 8 so there is no need to get the offline installer for IE 8. If you are not using Windows 7, you will find it hard to get any technician willing to fix the computer for you.
x86 means 32bit version. x64 means 64bit version.
http://download.microsoft.com/download/C/3/B/C3BF2EF4-E764-430C-BDCE-479F2142FC81/IE9-Windows7-x86-enu.exe
http://download.microsoft.com/download/C/1/6/C167B427-722E-4665-9A40-A37BC5222B0A/IE9-Windows7-x64-enu.exe
http://download.microsoft.com/download/8/A/C/8AC7C482-BC74-492E-B978-7ED04900CEDE/IE10-Windows6.1-x86-en-us.exe
http://download.microsoft.com/download/C/E/0/CE0AB8AE-E6B7-43F7-9290-F8EB0EA54FB5/IE10-Windows6.1-x64-en-us.exe
http://download.microsoft.com/download/9/2/F/92FC119C-3BCD-476C-B425-038A39625558/IE11-Windows6.1-x86-en-us.exe
http://download.microsoft.com/download/7/1/7/7179A150-F2D2-4502-9D70-4B59EA148EAA/IE11-Windows6.1-x64-en-us.exe
Monday, February 16, 2015
DS vs WDS vs Mesh
A collection of routers and access points that make up your local network is a distribution system. There are different types of distribution systems that can be setup according to your needs and what is possible. Each has advantages and disadvantages. If cost is not an issue and it's possible to run network wires through the coverage areas, the best setup is mesh wired distribution system. You will understand why this is after you have read what is below.
The most basic is the wired distribution system. As seen in the graphic, all of the access points are connected to the router with its own dedicated network cable. The incoming Internet signal to all of the APs is via this wired connection. This enables the APs to relay a very good signal. If possible, this is how your local network should be setup to ensure that your wifi devices get the best Internet signal. If you have a bunch of wireless routers that you want to act as APs, you need to turn off the routing function in them or else you will have one mess of a network. In general, there should only be one device that acts as a router in a network.
A variation of the wired distribution system is one where each of the APs has two network jacks. Therefore as seen in the picture, AP1 gets its Internet signal from the router and then relays this signal to AP2 with a network cable. AP2 then does the same with AP3. This daisy chain of network connection looks different than the previous wired distribution system physically, but functionally, each AP still provides great Internet signal.
Sometimes it is not possible to run a network cable between each AP. Therefore the relay signal has to be over the air. When this is done, we have a wireless distribution system as seen in the graphic below. The dotted lines represent the wireless communication between the APs. You also see that AP1 only communicates with AP2 and not AP3. AP3 only communicates with AP2 and as such indirectly communicates with AP1. Setting up a WDS is a bit more complicated because each AP has to be programmed to only accept the incoming signal from its upsteam AP. Therefore, AP2 can only accept the signal from AP1, and AP 3 can only accept the signal from AP2. This means if AP2 is offline, AP3 will not get any Internet signal, resulting in computers in the range of AP3 not getting any Internet access. Moreover, the Internet speed is cut in half as the signal is relayed. This means any computers getting their Internet from AP2 only get half of the speed compared to if they get it from AP1. This also means any computers getting the Internet from AP3 get 1/4 the original speed coming out of the router. This is why WDS should only be setup no more than 5 APs. If AP6 is needed, it should get its incoming signal via a network cable either from the router or from one of the APs much closer to the router in this chain.
Synology Media Services with Apple TV
Below is an article that explains in detail on how this is done.
http://community.spiceworks.com/how_to/87489-setting-up-synology-nas-media-services-with-apple-tv
One thing to be aware though. Because the Synology disk station manager (DMS), the operating system that runs the NAS hardware, supports Airplay, once the video has played, the NAS communicates directly with the AppleTV. In other words, the iOS DS Video app only acts as the initial connection between the NAS and the AppleTV. Once that is done, the DS Video app and the iDevice can be moved away from the connection or even turned off and the video file still plays.
I wish Apple would allow the AppleTV the ability to browse SMB shares such as those on the Synology NAS. This would make life a lot easier for people who own AppleTV and Synology NAS. Incidentally, Apple desktop operating systems version 10.8 or higher supports the network share protocol SMB and SMB2 by default. Its proprietary older protocol AFP is still supported+
, but you have to explicitly key that in when connecting to network shares. As such, why Apple cannot simply include this SMB support in AppleTV? One reason is Apple wants you to access media files that are on the Internet exclusively. SMB access is accessing these files locally within your home network. In other words, if the media files are stored in the cloud, you are only in possession of the files as long as you pay for their storage on a subscription. You would stream them to your devices as needed. No storage of any files locally on servers such as the Synology NAS which you purchase once and use as long as the hardware lasts. According to Apple, even with media files that you created such as home videos of your kid's birthday party should be stored in the cloud, preferably in your iCloud drive to which Apple gives you the initial 5GB of storage for free.
Friday, February 13, 2015
Simple Scanning Program
http://naps2.sourceforge.net/
It can scan from both TWAIN and WIA scanners. These are just protocols used by scanners to communicate with the computer. TWAIN is older of the two and can be fond in both Mac and Windows PCs. WIA stands for Windows Image Acquisition. As the name implies, it is a Windows-centric protocol and therefore only found in PCs. There are other scanning protocols used by the specific scanners that are found in the driver for the scanners. This is why many scanners come with software; without this software, the computer cannot make the scans. If you have a scanner whose driver is installed just fine on your computer, but for some unknown and annoying reason, your scanning program of choice, one that does not come from the scanner manufacturer for the specific scanner, cannot detect the scanner. In short, Windows says that the scanner is detected and displayed correctly in Device Manager but when you open the Paint or Paint.NET program to tell it to scan, the scan from a device option is gray out. Most likely, the scanner is of the TWAIN variety that Paint no longer understands because it prefers to use the WIA driver model found in Windows Vista, Seven, and Eight.
This is where the NAPS2 program can help. It understands both TWAIN and WIA scanners. I was trying to scan from a Canon DR-4010c without success. Windows 7 detects and recognizes the scanner just fine, but Paint and Paint.NET refuse to scan from it. The NAPS2 program does it with simplicity and perfection.
It is a very small program, but it can do most features that a typical person wants from the scans. It does not support previews where you can adjust the scanning area. This means if the paper in question is not the typical 8.5" and 11" size, the resulting scan will have this large white frame around the document. This not a deal breaker because you can always use the Paint program to crop it afterwards. I would use Paint.NET program to crop it and (through a export to PDF plugin), save the scanned file as a PDF.
If the paper document is 8.5" and 11" or large enough to be these dimensions, then you can use NAPS2 itself to scan and save the file as PDF directly. If the scanner supports duplex, NAPS2 can do that too and save multiple scans as a single multi-page PDF. It can also save the PDF file as a single page that displays both sides of the paper document side by side aka folio. This is done if you want the PDF to be printed out on paper that can fold vertically like a birthday card.
Monday, February 2, 2015
SVG Files
A vector image is determined by mathematical equations and not by pixels. Therefore, the image can be zoomed in at any magnification and is still smooth. There is no pixelation because there are no pixels to reveal under high magnifications.

Incidentally, the image on the left is a bitmap image. If you zoom in, you will see all of the static pixels or building blocks that make up the image.
If the browser supports svg, then it will display a picture of a circle. In fact, it will display a picture of a perfect circle. When you zoom into this svg circle image, the curve never shows pixelation.

In case you are curious what is the actual svg equations that would cause the web browser to render this image, just look at the HTML code that creates this post. Look for a tag that says SVG. You will see all kinds of weird texts and numbers. This is a much more complex version of the simple circle equation.
More info on vector vs bit map can be found here:
http://packetrider.blogspot.com/2014/11/a-free-browser-based-vector-creator.html