Friday, September 30, 2022

PoE on Ubiquiti Edgerouter X

This router is a gem of a network device. It has a lot of the advance networking feature including PoE for a meager price of $60. It's so popular that it is often out of stock on the manufacturer's website:

https://store.ui.com/collections/operator-isp-infrastructure/products/edgerouter-x

https://www.ui.com/download/edgemax/edgerouter-x/er-x

If you want more ports on the router, the next best thing is the EdgeRouter 10X

https://store.ui.com/collections/operator-edgemax-routers/products/edgerouter-10x

https://www.ui.com/download/edgemax/edgerouter-10x/er-10x

Here is the entire family of the EdgeRouters:

https://store.ui.com/collections/operator-edgemax-routers

Used in conjunction with a UniFi6 Lite access point, you will have a basic rock solid wifi system that almost rivals one found in big business. If you want even more features from the access point, have the UniFi6 Lite be managed by a controller by replacing the EdgeRouter with a Dream Router

https://store.ui.com/collections/unifi-network-wireless/products/u6-lite-us 

https://www.ui.com/download/unifi/unifi-6-lite-ap/u6-lite

https://store.ui.com/collections/unifi-network-unifi-os-consoles/products/dream-router

This post focuses on the Power over Ethernet aspect of the EdgeRouter.


The EdgeRouter X comes with a two-prong AC power brick that can output 12V at 0.5A. While this can power the router, there is not enough juice to let you use the eth4 as the source to power a PoE device such as the access point. However, if you use a 24V 0.5A power source -- either a PoE injector on eth0 or a power adapter via the DC barrel jack -- you can enable PoE output on eth4. Be aware that this is 24V passive PoE. As such, it will only work with end devices designed for this particular type of PoE. If passive PoE is enabled and a non-PoE device is connected, this power can potentially damage these devices since this is passive PoE. Unlike 802.3af/at/bt, it does not have an active process to auto-detect/negotiate power delivery before power is sent. This eth4 cannot be made to be 802.3af/at. For that you have to get a different PoE device that has support this technology. Interestingly, the UniFi6 Lite access point can take both 24V passive PoE and 802.3af/at PoE.

You can get this 24V power adapter here:

https://www.amazon.com/gp/product/B0194B7ZS0

However, unless you have absolute control over the physical layout of the network, it's best to not use passive PoE at all in favor of 802.3af/at/bt for safety.

https://community.ui.com/questions/I-bought-the-EdgeRouter-X-can-the-power-supply-deliver-24v-PoE-or-need-different-adapter/f7692781-a984-4659-8d1c-e89af19bc8fc

Tuesday, September 6, 2022

Forgot Mac Admin Password?

 


https://www.switchingtomac.com/macos/forgot-mac-admin-password-heres-how-to-get-back-in

Tuesday, August 16, 2022

Google Workspace Editions

Google offers a cloud-based service where under a custom domain, you can get various services such as email and website. One of these is Google Drive. However, not all editions of Workspace offer shared drives. These are basically virtual drives where users of the organization can share files in a more centralized manner. They can always share a folder within their respective My Drive, but this manner of sharing is ad-hoc and can be messy if there are many people in the organization who need to share data with each other. Common shared drives that are owned by the organization and not by a particular account so they are more appropriate for this purpose.

https://workspace.google.com

If you want to get your feet wet with this Google service, most likely you will start with the Business Starter plan. Although it says the Business Starter plan cost $6/user account/month, by telling Google that this is for personal use and not to run a business, Google can let you have the Business Starter service for free.  (https://admin.google.com/ac/billing/legacytransition). However, to be able to get team drives, you must get one of these supported editions:

Business Standard $12/user/month
Business Plus $18/user/month

Essentials
https://apps.google.com/supportwidget/articlehome?hl=en&article_url=https%3A%2F%2Fsupport.google.com%2Fa%2Fanswer%2F7681288%3Fhl%3Den&product_context=7681288&product_name=UnuFlow&trigger_context=a
Essentials editions are designed to provide seamless integration with your existing email solution. Use these tables to see exactly which features are included with the following editions: 
Essentials Starter—Collaboration and video conferencing at no cost for teams of up to 25 users.
Essentials—Collaboration and video conferencing, additional security features, pooled storage, and policy controls. Essentials edition is no longer available for new customers.
Enterprise Essentials—Collaboration and video conferencing with more participants and advanced features, more pooled storage, and enterprise-grade security and management.
More info
https://support.google.com/a/users/answer/7681288?fl=1

Enterprise
Education Fundamentals
Education Standard Teaching and Learning Upgrade
Education Plus
Nonprofits
G Suite Business (will be deprecated soon)


More info on the Business Starter plan

There is an oddball edition called Google Workspace Individual that is $9.99 a month. It's strange that it costs more than the Business Starter plan that costs $6/month/account.

Google Drive for Desktop

Visit the Google Workspace Learning Center

Tuesday, August 2, 2022

Recommended Brother and HP Printers for ChromeOS Computers

These computers come in a variety of names, but they all fall into 3 categories based on their hardware configurations.

  • Chromebox
  • Chromebase
  • Chromebook
Chromeboxes are desktops. As such, they need externally attached monitors, keyboards, and mice.

Chromebases are desktops that have the monitor built-in. They need external keyboards and mice.

Chromebooks are laptops. You can still use an external monitor if you need a bigger screen and external keyboard and mouse if you want to close the lid of the laptop during use.

Regardless of what forms these computers come in, they all run the ChromeOS system, created and maintained by Google. Therefore, printer compatibility is the responsibility of Google and the makers of the ChromeOS computers to include the driver software to make use of these printers.

For Brother printers, here is the compatibility list. Warning, while this list is populated with more models, some of the printers do not support Google Native Printing. That means these printers may work with ChromeOS if you are lucky. This applies to not just Brother printers but printers from other brands. If you want maximum compatibility with ChromeOS, you need to get a printer that supports Google ChromeOS Native Printing.

https://support.brother.com/g/b/oscontents.aspx?c=us&lang=en&ossid=2#Prod_7

Here is a list of printers that do support Google Native Printing.

https://help.brother-usa.com/app/answers/detail/a_id/171523/track/AvPOYAqBDv8S~YdgGhIe~yL34E8q8i75Mv_q~zj~PP9j

The least expensive Brother laser on this new list at this writing is the HL-L2325DW as seen on the Brother website. This printer can do duplex printing. It is on sale at Brother website for $109. This is unusually cheaper for its capabilities so when you go to its product page, the price may go up. 

https://www.brother-usa.com/products/hll2325dw 

Youtube has a video on how to set up this HLL2325DW.

https://www.youtube.com/watch?v=wBpFwwxXaHc

If you just want a basic inexpensive monochrome laser printer for the home or home office that supports ChromeOS, particularly one that supports Google Native Printing, this HL-L2325DW is the best one. Incidentally, it makes no sense to buy a color inkjet printer if most of your printing is black and white. Using a laser printer will save you money in the long run because a toner can produce more pages. The HL-L2325DW has a USB connector to hook it up to a ChromeOS computer. It has wireless network connectivity, but if you can hook it up with the USB, do so. 

Brother also has the HL-L2350DW which is $50 more. It prints 32ppm as opposed to the HL-L2325DW printing at 26ppm. I am not sure that justifies the extra cost. The HL-L2350DW also supports Google Native Printing. The HL-L2350DW is recommended by the WireCutter website.

https://www.brother-usa.com/products/hll2350dw

https://www.nytimes.com/wirecutter/reviews/best-laser-printer/#best-budget-laser-printer-brother-hl-l2350dw

As far as I know, all Brother printers have a USB connection, but if you want one that can do duplex and has both wired and wireless network connectivity, then the best one is the HL-L2379DW. It was just released by Brother so you can expect a longer support from the company in terms of firmware updates and toner replacements. It might be hard to find until Brother rams up production. It looks like this HL-L2379DW model replaces the HL-L2370DW. The HL-L2370DW has a wired network port and supports Google Native Printing, a claim explicitly listed on the BestBuy website selling it. So if you can't wait for the HL-L2379DW to be available, you should get the HL-L2370DW.

https://www.bestbuy.com/site/brother-hl-l2370dw-wireless-black-and-white-laser-printer-gray/6130042.p?skuId=6130042

You can find a list of Brother printers sellers here:

https://www.brother-usa.com/dealer-locator?ProductSku=HLL2379DW

Below is a playlist of HL-L2379DW on Youtube. 

https://www.youtube.com/watch?v=O6PSWzC8um4&list=PLSBF478LqZsDRwg52OOUi6Xf4gD5z1z4-

Most printers in the HL family have the dimension of 14" x 14" x 7".  It's not the most compact monochrome laser out there, but it's not too big either. Some of the HL printers have scanner built-in which makes its size bigger. One of these is the HL-L2390DW which has a dimension of 16.1" x 15.7" x 10.7". The HL-L2395DW variant has wired network.

By the way, if you want scanning on a ChromeOS computer, this function is poorly supported by ChromeOS. In fact, the Brother website explicitly says that scanning is not supported in ChromeOS. If you scan often, but use a ChromeOS computer as your main computer, it's best to get a printer/scanner combo computer that can do scan to email. These printers can scan and directly send the resultant scan file to any email addresses, bypassing a computer altogether. Alternatively, you can get a cheap Mac or Windows PC computer to use for scanning. It's overkill, but at least it's more reliable than trying to scan from a ChromeOS computer.

If you want scan to email function, the HL-L2395DW has this feature and a larger color screen to accommodate this. While this article focuses on the HL family of printers that are compatible with ChromeOS, Brother also offers printers meant for high printing volumes found at offices. These printers have scanners that can do both glass and feeders. Feeders are for scanning multiple sheets at the same time. These are the MFC or DCP lines of printers. 

DCP - Digital Copier Printer

MFC - Multi-Function Center

HL - Home Laser for low-volume printing.

L stands for Laser.

C- color

D - duplex

N- wired network (not consistently used)

W - wireless

For scanning, newer ChromeOS versions have a native camera app, implying that scanning is possible when the computer is connected to a dedicated scanner or a MF printer. I have not tested out this feature, but will update this post as soon as I can verify this exciting capability.  

HP has its own compatibility list for Linux and ChromeOS

https://developers.hp.com/hp-linux-imaging-and-printing/supported_devices/index

HP also has a plug-in for the Chrome browser

https://chrome.google.com/webstore/detail/hp-print-for-chrome/bnlhehcgpmfpfceghjccbpmbnfpaedgj

More info: https://support.hp.com/in-en/document/ish_2506940-1986942-16




Saturday, June 18, 2022

Useful Websites

Free Stock Video Footage

https://coverr.co

Data Visualization and Storytelling

https://flourish.studio

Tools for better thinking

https://untools.co

Create Engaging Video Content with Automation

https://lumen5.com

Wednesday, June 1, 2022

GL-iNet Products Comparison

Opal, Slate, Beryl, Brume. Wonder what they do differently?

https://www.gl-inet.com/products/compare

This company makes inexpensive networking devices that are not economical on features.

Saturday, May 21, 2022

PowerPoint Slide Timing

A common export of PowerPoint decks that contain voice narration is to make the slideshow into a video. This way, the viewers do not need the PowerPoint program or a (free) app to view the slideshow. The resultant video format is well-supported that any computer can play them. This is how many tutorials are made for Youtube.

You would make the narration directly with PowerPoint with these sound clips embedded onto the slides. The duration of each narration would likely be different. Therefore, you have to tell PowerPoint how long it displays each slide to allow the entire audio clip to play before PowerPoint transitions to the next slide. If you don't set the individual timing of each slide, PowerPoint gives each slide 5 seconds regardless whether the audio has finished playing.

To set custom durations for slides, click on the Transition tab in PowerPoint. 

On the overview column on the left, select any slides that you don't want this default 5 seconds.

Put the cursor over the embedded audio clip. When the playback bar appears, hover the cursor over the end of the clip to get a pop up showing the length the audio clip.


Go to the top to put in the elapsed time before PowerPoint automatically shows the next slide. In this example's case, this slide is set at 53 seconds because the audio clip is 52 seconds.

Repeat this for all the remaining slides. As said, if a custom timing is not set, the slide will be displayed for 5 seconds. 

When the last slide's timing is done, you can export the deck as a movie. It doesn't matter whether you choose MP4 or MOV. 

Thursday, December 23, 2021

More Stringent Way to Remove Stuck Print Jobs and Printers in Windows

Sometimes uninstalling the software for a particular printer the easy way is not enough. Sometimes you have to dig deep in the bowels of Windows to track the relevant files and manually remove them. This method almost aways involves the use of the command line. 

Type CMD in the search box at the lower left corner of the screen, right click Command Prompt result to Run as Admin, copy and paste in the following command and press Enter: printui /s /t2 (Note that there is a space before each forward slash).

The Print Server Properties window should pop up.

Remove the printer’s drivers for any problematic or any other printers you don't use anymore.

=========

Another way to clean out printers is the clear the print spool. This method will clean out any stuck print jobs that cannotbe remove the easy way.

Open an elevated command prompt.

Enter the commands below into the elevated command prompt one at a time, and press Enter after each command.

net stop spooler

DEL /F /S /Q %systemroot%\System32\spool\PRINTERS\*

net start spooler

Web Services for Devices

Have you noticed that adding printers on a Windows machine has gotten to be so much easier because of plug-and-play and self-installation? You can connect the printer using a USB cable to one of the computer's USB port, wait a minute or two, and voila, the printer is ready to go. The same applies to adding a printer that is reachable over the network. You would simply click on the Add Printer button and Windows will detect the printer and add it automatically, even without connecting to the Internet to get the driver for that printer. When digging deeper into the magic under the hood, you will most likely see that Windows uses a Microsoft technology called WSD, one that has been adopted by many printer makers, to connect itself to these printers. This works well in most cases, but because Windows uses the generic driver for the device under WSD that should offer basic things like monochrome or color, double sided printing, and the number of pages to print, certain features on the printer may not be available to the computer users, namely things that are unique to the printer or only found in high-end printers. Among these are Secure Print, Store in Mailbox, Department ID Authentication, Booklet Folding, Saddle Stitching, and Hole Punch. Likewise, the scanner on multi-function printers, which are very popular these days, sometimes does not work but the printing portion of the device works just fine. The solution to this problem is simply to add the printer the old fashion way by assigning the printer a static network IP address and telling Windows the IP address of this printer. Once that connection is made, install the driver. Given the automatic nature of WSD, before trying out this manual process, you should go to the printer's management console to turn off WSD for that device. This is usually found under the Network Settings of the printer. With this feature off on the device, the device is not broadcasting itself to be captured by WSD on a Windows machine, forcing you to add the networked printer with its IP address. 

Because of the potential restrictions on advanced features caused by WSD, many high-end printers have WSD disabled by default. Xerox makes high end printers so to turn WSD on, you have to do this:

https://www.support.xerox.com/en-us/article/en/2113363.html

If you want the technical details of WSD, here it is:

https://docs.microsoft.com/en-us/windows/win32/wsdapi/wsd-portal


Thursday, December 9, 2021

Microsoft Support and Recovery Assistant

 

Microsoft Support and Recovery Assistant is a Microsoft-made utility to fix a variety of problems associates with Office, OneDrive, and others, particularly Outlook because Outlook is the most complicated program in the Office Suite. 

https://support.microsoft.com/en-gb/office/about-the-microsoft-support-and-recovery-assistant-e90bb691-c2a7-4697-a94f-88836856c72f

If you know what the paperclip icon is, you will probably need to use this tool.

Tuesday, October 5, 2021

SSL vs TLS: Decoding the Difference Between SSL and TLS

Here is a concise article on the differences between SSL and TLS. When configuring an email client like Outlook to access email accounts that offer encryption to protect the data goes between the email client program and the email server, some form of encryption is used to ensure the confidentiality of the data, and that the information has not been tampered with in transit. SSL and TLS are the current industry standards for this protection. The take-home lessons by this article is SSL is older, but it is still useful. TLS, despite the new name, is a just an evolutionary update of SSL, coming about because of politics and not due to some major technological leap. With that, I hope the Internet governing body would dump the TLS name to call it SSL version 4 with all subsequent updates having higher numbers. This would remove the confusion when choosing which protocol to use as with configuring programs like Outlook. 

https://sectigostore.com/blog/ssl-vs-tls-decoding-the-difference-between-ssl-and-tls/#:~:text=SSL%20is%20a%20cryptographic%20protocol,and%20client%20via%20implicit%20connections.

Sunday, May 30, 2021

How do I upgrade Office?

 https://support.microsoft.com/en-us/office/how-do-i-upgrade-office-ee68f6cf-422f-464a-82ec-385f65391350

This page includes how to remove Office license on Mac.

Thursday, December 24, 2020

TP-Link EAP225 Guest Network and Portal


If you want to do something extra fancy with your wifi network without spending too much money, then a $60 TP-Link EAP225 is just for you. However, at this price point, don't expect the fancy features to be too fancy.

This access point allows you to create a guest network easily, that one has its own pseudo-VLAN. This means while any devices associated with this guest network have the same subnet as the main network, these guest devices cannot ping or share files with those on the main network. This EAP225 does offer true VLAN, but it must be under the router or switch that supports VLANs. 

There is a portal feature for the EAP225. You can associated a portal with a particular SSID, presumably the guest SSID. The portal page can redirect the clients to another location to be managed. You can put a password on the captive portal page. Once entered, the client would be connected to any SSID. You can make the guest SSID with no encryption, and point the portal to it. You can also make the portal not asking for a password. Just because you can connect to an SSID with a password, it does not automatically mean the data between your computer and the access point is encrypted. This is the difference between authentication and confidentiality. Authentication is what you are allowed to do whereas confidentiality means you can hide what you are doing. Without encryption, there is no confidentiality. Basically, the captive portal is a way to show a splash page with some disclaimer information you want those using the guest network to know. The EAP225 needs to reach out to an external RADIUS server for user and password authentication. 

The EAP225 is an inexpensive way to get your feet wet with more advanced features of Wifi connectivity, but it needs a separate more powerful and feature-rich RADIUS server or router/swicth that supports VLAN to make it more appropriate for any Wifi corporate network.   

Wednesday, June 17, 2020

Recover Data from Synology Backup Drive Linux Edition

My previous post is on how to recover data that has been backed up by the Hyper Backup program on an external drive attached to a Synology NAS. It is a straight-forward process done in Windows because the file system on that external hardrive is NTFS. However, if the external harddrive is formatted with the popular Linux ext4 file system, you are out of luck because Windows natively cannot read from any storage device formatted with ext4. While you can install some translation program in Windows to enable this, success varies because Windows is forced to do something it is not meant to do at an architectural level. The best solution is simply to use a computer running some flavor of Linux.

When habitual Windows or Mac users are told to use Linux, you will either immediately see a grimace on their faces or a quizzical look because they have never heard of Linux. Linux is "the other" operating system in terms of popularity. It is used extensively on servers, managed by the uber nerds. In general, Linux is not easy to use, but in this tutorial, I will use the popular Ubuntu Desktop version 20.04 computer to do this backup recovery because it is a friendly operating system among the hundreds of Linux variants. If you are a technology enthusiast with some extra time, I highly recommend you get acquainted with Ubuntu Desktop. Unsurprisingly, the Synology NAS operating system is Linux-based. So if you know more about Linux, you will actually understand how the Synology NAS does what it does under the hood.

Instead of wiping out the existing Windows operating system to install Ubuntu just to do one task of accessing the ext4 external drive, you should install the free version of VMWare Player in Windows, then install Ubuntu Desktop on a VMWare virtual machine. There are plenty of instructions on the Internet such as Youtube that show you how to do this without much fuss. Once you have Ubuntu installed in a virtual machine, come back here and see how you can use the Linux version of Synology Hyper Backup Explorer to recover data from an ext4-formatted external drive.

With Ubuntu running, insert the external drive to the physical Windows computer's USB port. VMware Player should ask if you want to mount this external drive to the Windows host or to the Ubuntu virtual machine. Choose the latter.

Click on the USB drive.

You will see the files and folders inside this USB external drive. Open the HBK folder to see the SynologyHyperBackup.bkpi file. This is the file you need to open with the Hyper Backup Explorer program.

Using the Hyper Backup Explorer program

In general, installing programs in Linux can be a trying process. It's not as simple as opening the installer as with Windows and Mac OS. Fortunately, like its Windows counterpart, the Linux version of Hyper Backup Explorer is a portable program that does not require any installation. You just run it as downloaded.

Inside Ubuntu, use Firefox to go to the Synology website and download the Explorer program for Linux under the heading of Desktop Utilities.

The program should be found in the Downloads folder in Ubuntu. Right click on it and choose Extract Here. Open the resultant folder and open the HyperBackupExplorer program. You will see the Welcome screen that looks like the Windows version of this program. Direct the program to the SynologyHyperBackup.bkpi file. The path is Computer/media/<username>/<USB drive>



That's it. You can now copy the backed up files onto the Ubuntu Desktop. From there, drag these recovered files out of the virtual machine onto the Windows side of the computer.









Sunday, June 14, 2020

Recover Data from Synology Backup Drive

So you have been using your Synology NAS device all this time without problems. You have even set up Hyper Backup to back up the data from the lone internal drive or the RAID set to an external drive, saving different versions of the files. Everything has been running fine. However as we all know, and the reason why you have set up Hyper Backup, one day the NAS will fail. Today is that dreaded day. Today, you can no longer access the data stored on the internal drive of the NAS. You are not sure what the problem is. It could be a bad drive or it could be the NAS itself. You feel anxious about data loss. All those pictures of your recent trip to Disneyland might be gone. How about those precious pictures of your kids when they were little saplings? Your attention now focuses to the external drive that should have a backup of this data. You shutdown the NAS by whatever means you can, either properly through the NAS's web interface DSM or literally pulling the power cord from the NAS. Gingerly you pull the USB cable that attaches the external drive to the NAS from the NAS. You plug this external drive into your Windows PC. The computer detects the drive. Whew! But the crisis is not over because you still need to access the data on the external drive. In Windows Explorer, you don't see the various files that are on the NAS. No old pictures of your kids or the trip to Disneyland. All you see is this:

When the Hyper Backup task was created on this particular NAS, a folder called ShareOneBackup was created on the external drive. As the name implies, this ShareOneBackup is where all the various versions of files in a share on the internal drive are copied onto.

When you open the ShareOneBackup.hbk folder, you will see the following files and folders layout. Of particular interest is the SynologyHyperBackup.bkpi file. This file is the gateway to all the files stored on this external drive including their various versions pertaining to the sourced ShareOne share on the internal drive. If there is another backup task, there will be another pair of this HBK file under the name of the backup task specified in Hyper Backup. Each HBK file has its own respective SynologyHyperBackup.bkpi gateway file.

So how to open this BKPI file? This is not a format that Windows can understand natively. You need to use a program from Synology called Hyper Backup Explorer. So you download it from the Synology website. The program does not install into Windows. It's a zip file that is extracted into a folder that contains the executable called HyperBackupExplorer.exe. When opened, you see the welcome screen below:



You click on Browse Local Backup and direct it to this SynologyHyperBackup.bkpi file. Once done, you will see something like this. There they are, your data, or at least the backup versions of the data. Click on the calendar icon at the lower left corner to bring up a calendar so you can choose the backup from a particular date. The last step is your simply clicking on the file or folder you want to recover and copy it to any place on the computer.


This way to recover data is practical if you only want to recover a few files and folders. If you want to recover the whole set of data, then the faster way is to rebuild the NAS with a working internal drive or getting a new NAS depending on what is the cause of the breakage. Plug this external drive to the NAS and use the NAS own DSM Hyper Backup to recover the date in bulk.

Sunday, April 19, 2020

How to Reset or Refresh Windows 10 without Losing Programs

Last Updated April 8, 2020

The instruction on this page was last accessed on April 18, 2020. Its content was updated March 3rd, 2020. Given that these instructions are based on the latest versions of Windows, the timeliness of the information is important. The article mentions of Windows 10 builds 15002. This build goes back to year 2017, so it is safe to say that your copy of Windows is newer than this and therefore does not have Refresh Windows in Windows Defender. Therefore, you should look for this refresh feature as Reset this PC in Settings. Remember, the Reset feature will remove all your third party programs whereas the 3 methods below do not.

The 3 methods mentioned in the article are:

Method 1. Do a repair upgrade by running the Windows Setup.exe
Method 2. Create a custom refresh image with all programs for resetting
Method 3. A more convenient method to create custom recovery image

If you prefer to watch how these 3 methods are used, there are videos on Youtube that can visually show them.

Tuesday, January 15, 2019

Take Screenshot of Full Webpages in Chrome

Chrome has a mode called Developer Tools that allows you to basically peek under hood to see how Chrome works to a certain extend. An average person would never need to do wander to this area. However, these are times when you need to do things like capturing an entire webpage. There are add-ons for Chrome that let you do this, but if you don't want to use them, you can do this in Chrome's built-in Developer Tools. The process is pretty straight forward.

On a PC, click on the 3 vertical dots at the upper right corner of Chrome. This is where you go to do customization of Chrome.

Move and hover the mouse cursor over More Tools.

A second box appears. Click on Developer Tools. You can get here with a 3-key keyboard shortcut of ( Control + Shift + I )

The screen will split into 2 columns. The left column is whatever webpage you are on at the moment. The right column shows you what is going on under the hood that tells Chrome to display the webpage on the left. This webpage is not a static picture but a live page. That means you can actually interact with the elements in it. However because of the screen split, the page appears small making any interaction difficult.

Look at the top horizontal menu in the left column. Click on the word Responsive, and you are presented with a list of devices. This allows you to see what this particular webpage looks like on a particular real world device. You can also customize the width of the screen by dragging the 2 parallel bars on the right side of the webpage. The layout of the webpage will change, adapting to the changing widths that you specify. Once you are satisfied with the layout for your desired screenshot, click on another 3 vertical dots on the upper right corner of the left webpage column. (These 3 dots are not the same 3 dots mentioned earlier).

Choose Capture full size screenshot.

Alternatively, click on the 3 dots on the right, next to the window-closing X.

Click “Run Command.”

In the command line, type “Screenshot,” then click “Capture full-size screenshot” from the list of commands available.

Choose Capture Full Size Screen Shot. Chrome will do the capture and save the resulting picture as a download. Note that the dynamic layout of the webpage is not available for all webpages. It all depends on how compliant are the computer codes used to display the webpage. Many webages are so poorly coded that Chrome does not know how to shuffle around the layout as the screensize is changed. Website creators use this feature in Chrome to test their creation to maximize accessibility on various screen sizes. If you don't want to do any customization of the screen size, I find the preset of iPad Pro is the best middle ground that produces the best screenshot for screen and print out.





Friday, January 11, 2019

HEIC Format



Currently, there is no popular image displaying program on Windows to open picture files including the new iPhone-centric HEIC format. However, it's a matter of time when this issue will be resolved either by one such program becoming available due to the sufficient popularity of this file format OR the HEIC never catches on and be deprecated by Apple.

In the meantime, you can tell the iPhone to take pictures in the old JPG or PNG format in the phone's Settings. At the same time, go here to read a bit about this issue including using a utility the article recommends to convert all the existing pictures from the HEIC format to either JPG or PNG.

https://lifehacker.com/how-to-easily-convert-your-iphones-heic-images-in-windo-1826327599
https://imazing.com/heic

I recommend that you convert the HEIC pictures to PNG format and not JPG because the PNG is "lossless" which means its compression algorithm does not throw away any useful visual information in the picture. This is needed when the pictures are printed out, especially with dedicated photo printers, the files have the needed meta data to reproduce accurate colors.

Monday, December 24, 2018

How to download the Windows 10 version 1803 ISO file after version 1809 releases

Updated on March 13, 2019

https://pureinfotech.com/download-windows-10-1803-iso-file-after-1809-releases/

1. Open a new tab on Google Chrome
2. Go here: https://www.microsoft.com/en-us/software-download/windows10ISO
3. Right-click on the page and select Inspect.
4. On the right column, choose iPad Pro from the Emulation or user-agent dropdown list. This basically tricks the webserver into thinking that the computer accessing it is a different computer and browser other than Chrome, resulting in the webserver displays the target webpaged based on the emulation that you want.
5. The full-page mini webpage shown is a live webpage that can be acted upon like a regular webpage so click on it when and where applicable.
6. Refresh the page if the browser doesn’t reload automatically. Remember, it is a live webpage.
7. Using the drop-down menu, select the Windows 10 April 2018 Update option
8. The rest of the steps is self-explanatory.

Saturday, December 15, 2018

Dual Boot on Mac

Having a computer with a dual boot is commonly found on Windows PCs and perhaps Linux boxes. Dual boot simply means there are 2 operating systems installed on the same physical computer. Both OSes are on the same harddrive or each OS is on its own drive. During my days of supporting Windows 98, 2000, and XP when computer viruses were a common occurrence that could cause the OS unusable, having a clean second OS can be a life saver because I can boot into that OS and use it to fix the compromised OS. With Windows 10 and its strong security, the need for such an exotic configuration is no longer needed. However, I still recommend a dual boot system if you share your only computer with your kids. Kids have a natural knack for messing up the computer because of their inquisitive nature. They would download and install anything they see on the Internet.

As said, I have done a lot of dual boot systems on Windows machines, but never on a Mac computer, so I decided to give it the old dual boot configuration a try. Again, if your Mac computer must be shared with your kids, I highly recommend that you create a dual boot system for your Mac. Ordinarily, I recommend that they get their own computer, preferably a Chromebook and call it the day. It would take an amazingly clever kid to break a Chromebook -- software wise.

Creating a dual boot system on a Mac is actually very easy. First you need to install the first OS which presumably is already done. Then you would use Disk Utility to split the partition into two with each partition getting the desired free space size. Then you would boot the Mac OS installer from a USB and tell the installer to install the OS into the newly created and blank partition. By default, the Mac will boot into the new OS on the second partition. However, if you want to boot from the first OS, simply hold down the Option key during start up and you are presented with the two partitions. You would use your mouse to pick which partition you want to boot from. If you do not tell the computer which partition to boot from, the next boot up will be booted from the newer second partition. If you want to always boot from the first partition, then from within any OS, go to the System Preference Start Up Disk pane and choose the first partition as the default partition. If you want to move files between the two partitions, use the Shared user account on both the partitions as the depository.

If you want to encrypt the first partition because it has confidential data but not the second partition, then you can boot into the first partition and start the filevault procedure there. Encrypting the first partition also prevents accidental removal or replacement of critical system files on the first partition while the second partition is being used. When the first partition is encrypted, its drive icon is not visible under the OS of the second partition. Therefore, the users of the OS on the second partition cannot even make any changes to the files stored in the first partition by accident. However, you can mount the first partition in Disk Utility after having provided the unlock password of a particular user account on the first partition. Moreover, if the user on the second partition has administrative privileges, he can still do damage to the first partition such as erasing the entire first partition. One more reason to let the person (i.e. your kids or elderly parents) use the OS in the second partition as a limited user.

Let's say something goes wrong with the user accounts including the admin on the first partition. How can you use the system on the second partition to unlock and recover data from the first partition? You cannot unfortunately. However, if you know the long 24-character FileVault decryption key used to encrypt the first partition, you can boot a third system from a USB stick or put the computer in Target Disk mode and use either the password for a user account from the first partition or the FileVault encryption key. If you plan to use FileVault, it is imperative to keep a copy of this long key outside the computer and a copy of the most recent Mac OS installed on an external drive. No matter what the disaster recovery strategy is, nothing beats a real data backup plan. Data should be recovered from this data backup source and not from the primary sources because if the disaster is the harddrive has gone bad, there is nothing to recover from.

Saturday, February 10, 2018

Drive Cloning

Drive cloning and its related cousin drive imaging are two of the staples of a computer technician's tool set. In fact, if someone who claims to be a computer technician and has no idea how to clone or image drives, then you might want to have someone else fixing your computer.

When you have a harddrive that has Windows or Mac operating system on it plus all the associated programs that have been installed in it, you want to create a clone of this drive so that when something goes wrong with the system or the drive itself dies, you have the exact duplicate of its former self. This saves many hours of not having to reinstall the operating system and programs. This fact alone makes drive cloning or drive imaging a very attractive task to do to a computer before you start using it. Once you start using the computer, it's on its way to become corrupted with errors and computer viruses and all the things that can and will go wrong with the operating system and the physical deterioration of the physical drive itself. Therefore, it's not a matter of if but when you need to either reinstall the operating system or replace the drive. Knowing that it will happen anyway, you should be proactive with what you have to do when it happens.

My View on Windows 8

Now that Windows 8 has been out since October 2012 and has gone through 2 major updates in the forms of 8.1 and 8.1 Update 1, it's time that I put in a few words on my opinion of it. Before, reading on, please watch this 24-minute rant video so you can get some ideas that I will be saying next. Granted, this video was created when Windows 8 was Windows 8.0. Since then, Microsoft has released two major updates that have addressed some of the complaints mentioned in the videos. So this mini reviews covers the most annoyances that still exist.

Let me start with the most obvious: the Start button. At least Microsoft brought back a half-baked Start button with Windows 8.1. Its initial complete absence drove many people nuts. After almost 20 years of telling people to hit the Start button to do virtually everything in Windows, Microsoft thought no one would cry blood murder when it suddenly took it away? When power users like myself get lost without the Start button, what did Microsoft think the Ludites would feel?

The Start button in Windows 8.1 is still not its full old self. For starter, left clicking on it does not launch the expected start menu of old. Instead you get hit on the face with a jarring experience of looking at the hated tiles. The tiles are the mainstay of the formerly known as Metro interface which is designed for touch screen interface. This is Microsoft's biggest mistake with Windows 8. It tries to merge the two interfaces in one system. The Metro interface is virtually useless without touch interface. Microsoft was hoping that by now, many people would have touch-capable computers. This is not the case. The majority of Windows 8 users do not have such a computer. Even if they do, they still prefer to use the mouse as their primary way to navigate. 

My proposal to Microsoft is to decouple the Metro interface from the desktop interface. At the very least, give people the option to completely disable Metro completely. Having the tiles suddenly show up when the user click on something is a jarring experience. It's like an unwelcome magic trick when the magician pulls off the veil to reveal something unexpected. Unlike a magic trick, computer users do not like a sudden change in interface. How did this pass the focus group testing during Windows 8 testing? Most likely, it didn't. Most likely, the sudden change in interface got negative reactions from testers but Microsoft decided to over-ride that in its zeal to move all Windows users to the touch interface. Evidence of this zeal remains with Windows 8.1 when clicking on the Start button would whisk you away from the desktop mode and drop you onto the tile interface.  

On the related note, the Charms bar is clearly the Metro version of the classic Taskbar. The problem is the Charms bar shows up when you don't want it to show up. This is like left clicking on the Start button. When you move the cursor to the right side of the screen to move or close a window, the Charms bar will suddenly pop out on the right edge. While this is not as jarring as the suddenly switch to Metro mode because the desktop is still visible, this uninvited Charms bar is an annoyance. Fortunately, this behavior can be disabled in Windows 8.1. However, if you use the trackpad, the Charms bar still shows up if Windows  misinterpret your finger movement as a swipe as opposed to a no swip with a mouse. Therefore until Microsoft allows you to completely disable the Charms bar, I recommend that you use a mouse instead of the trackpad.


Even with Windows 8.1 Update 1, I will still not recommend it for the average longtime Windows user. Yes, the Start button is back, sort off, but navigating in the Modern UI formerly known as Metro mode is still confusing.

Secret communications with Comcast X1 TV Setvice

I recently discovered with a confirmation by Comcast tech support that when a customer subscribes to the X1 service on top of the regular TV service, the set top box, commonly known as the cable box or the descrambler box, communicates with the Comcast-issued Internet modem via a secret and invisible wireless signal so that the content of the X1 service can be displayed on the TV. This means if you move or turn off the power to the Internet modem, this X1 service will not work. The regular TV channels should still be there but the interactive guide about the shows will no longer be there.

I don't understand why can't the set top box do the X1 service natively on its own. It gets the TV feed on the same wire that has the Internet signal so why can't it use this same wire for the X1 services? If it can communicate with the Internet modem via this secret wireless signal, it can surely communicate with the X1 server directly. Why bother to hop to the Internet modem to relay the X1 information? When the handheld remote control navigates the X1 menus, does it communicate with the set top box or the Internet modem?

Just because the Comcast tech support person said so, I still think she was mistaken about the necessity of the set top box communicating with the Internet modem via a secret hidden wireless signal. This makes no sense from an engineering perspective. Comcast is not a small company. It surely get this done.


MOCA Support on the Latest Comcast Modem

The latest version of of the modem that comes with your Comcast Internet service is called Wireless Gateway.

https://www.xfinity.com/support/articles/comcast-supported-routers-gateways-adapters

It has two major improvements from the previous version. 5 GHz wifi support and MOCA. The MOCA technology uses the home existing coax wiring to propagate teh Internet signal. You need another compatible MOCA host at another part of the home to receive the MOCA signal from the modem. Actiontec makes some excellent MOCA devices.


Edimax CAP1200

To be considered as a business class access point, it has to offer at least one feature that is not found in all consumer class APs. Price point is no longer a designated attribute because certain consumer APs actually cost more than some business class APs. It is exciting that home users can now afford to install business class APs in their homes to benefit from advance networking features that had been exclusive to the business environment.

The playing field for the best business class access point just got another player courtesy of Edimax. Being the best means the AP has to offer some if not all of the popular features without being too expensive. The sweet spot is the sub $150 price point. That said, the Edimax CAP1200 is a top contender. 

The following features supported by the CAP1200 that are of interest. 

1. Wireless AC
2. Support simultaneous 2.4GHz and 5GHz
3. PoE support for both 802.9at (incoming) and 802.9af (outgoing)
4. Smoke detector like casing
5. Build-in RADIUS server 

As far as I know, this is the only AP that can be used as a basic RADIUS server. This is great for organizations that need this service but does not want to install a dedicated RADIUS server on a desktop. With that said, running a basic RADIUS server does not require hefty expensive hardware such as a Windows Server system or a complex Linux server on a desktop. You can get a $35 Raspberry Pi and with a little tweaking, you can get a RADIUS server running that has a small foot print and lower power consumption.


Engenius EAP600

Access points (AP) are networking devices that create a new or relay an existing WiFi network signal so to extend the range of that signal. What they can do depending on a large part, their price. You can find more about access points here.

The EAP600 access point is the flagship access point for Engenius, a provider of consumer and business class networking  devices. At $150 per device, it is attractive not only for small to medium size businesses but the home users who want wifi coverage that is more robust than what can be provided by consumer level gears. 

The EAP600 can be used by itself as the only AP in the network or in conjunction with other EAP600s in a distributed network. In such a distribution network, these EAP600s can facilitate WiFi coverage for dozens of wireless devices in a large physical area such as an office space or multi-rooms home. 

Setup WDS on the EAP600
https://www.youtube.com/watch?v=RikqKW0qvQk

Overview of EAP600 features
https://www.youtube.com/watch?v=tfju3ce6jAw

As you can see in the video, with these EAP600s working together, your wireless device only sees one wireless name. The EAP600 supports band steering. It also create multiple SSIDs with each SSID be on its own VLAN. This not only keeps devices from one VLAN from accessing the others on another VLAN, but it also restrict bandwidth for a VLAN. For example, you can create a guest SSID on a separate VLAN and only give that VLAN a limited amount of bandwidth.

Wednesday, December 27, 2017

OSMC Media Center and NAS using Raspberry Pi

OSMC Media Center and NAS in a single Raspberry Pi

http://www.mediamilan.com/tutos/osmc-media-center-and-nas-raspberry-pi/

Friday, December 22, 2017

Free CAD Programs as Microsoft VISIO Alternatives

CADE

CADE is a compact but powerful 2D vector editor for Windows. It includes basic Visio functionality and could be used to create diagrams, network diagrams, flowcharts, schemas, maps and so much more. You can use predefined blocks, primitive shapes, raster and vector images. The collection of blocks and it's attributes could be modified and extended. Working in CADE requires no particular drawing skills.

http://www.weresc.com/cade.php

-----------------------------------------------

Dia Diagram Editor

http://dia-installer.de

Simpler than CADE.

----------------------------------------------

GLIFFY

A web-based solution so you do not need to download and install the program on your computer.

https://www.gliffy.com/products/online/

Tuesday, December 19, 2017

How To Restore Files Using Hyper Backup Explorer in Synology

https://www.youtube.com/watch?v=jbOglD86GbQ

What the video does not say is you cannot simply attach the external drive into a new Synology box or the same box that has been reformatted and its OS reinstalled. You have to use a computer and this Hyper Backup Explorer program to extract the data from the backup datastore, put this extracted files onto the same external drive if there is still free space, then plug this external drive into the NAS, move the extracted data onto the internal drive in their respective shares, the format the external drive and reconfigure the NAS to use it as its own external drive for Hyperbackup package.

This is a huge time-consuming hassle if you have multi-terabytes of data. If is probably cheaper to have 2 Synology NASes running and use sync to sync the NASes.

Saturday, December 9, 2017

Installing Debian 9 in a VMWare virtual machine using Raspberry-Pi-Desktop

Installing the guest OS itself is pretty straight forward. Just boot from the ISO of the raspberry-pi-desktop installer.

https://www.raspberrypi.org/downloads/raspberry-pi-desktop/

Raspbian is the Raspberry Pi Foundation’s official supported operating system, based on Debian with the latest version running Debian 9 code-named Stretch.

https://www.raspberrypi.org/downloads/raspbian/

After the guest OS has been installed, it is customary to update the OS with the latest files by running two commands.

sudo apt-get update

sudo apt-get upgrade

This only updates the OS itself but does not install any specific drivers for the virtual hardware that is VMWare Player or Workstation. These specific drivers plus other extra enhancement features are called VMWare Tools. For example, with VMWare Tools installed in the Raspbian OS guest, the guest can share a folder on the host side, basically creating a network between guest and host for the purpose of sharing files.

http://partnerweb.vmware.com/GOSIG/Debian_9.html

Open VM Tools is the open source implementation of VMware Tools. As stated in the support page, VMware recommends using the Open VM Tools included with Debian 9 instead of using its own VMware Tools for Linux which I suspect is designed for the generic Linux kernel as oppose to the specific distribution.

The support page says to add the following line to the /etc/apt/sources.list file.
deb http://ftp.debian.org/debian/ stretch main contrib

However, given that the Debian 9 used for Raspian OS (i.e raspberry-pi-desktop) is customized for the Raspberry Pi devices, this deb http://ftp.debian.org/debian/ stretch main contrib line has already been added to the /etc/apt/sources.list file.

Therefore, within Raspbian, you would only need to run the following command:

$ sudo apt-get update 
$ sudo apt-get install open-vm-tools

Raspbian will go to the online depository to grab the Debian 9 Open VM Tools and install it automatically!

One of the things you can do after VMWare Tools has been installed is the ability to share a folder between the guest Raspbian OS and the host OS such as Windows. After you have specified where the shared folder is on the host, go to /mnt/hgfs folder on the Raspbian side and you will see this shared folder on the host.

A good video on how to install VMWare Tools is this:

https://www.youtube.com/watch?v=hJPqM9QYeR0

The help page that the author of the video uses is this:

https://communities.vmware.com/message/2682930#2682930

If this page is not found, below is a copy of the instructions

You can just install VMware Tools in a terminal window in Jessie, you can stay in graphical mode, no need to switch.

It sounds like that the vmware host guest share drivers are broken in the open vmtools variant of Jessie, this is also an issue in a few versions of ubuntu.
Guess they might share some code there.

The easiest solution is to install the vmware tools version that comes with VMware Fusion.
But before you do, completely remove the open vm tools variant from debian.

sudo apt-get purge open-vm-tools
sudo apt-get purge open-vm-tools-desktop

then select install VMware Tools from the virtual machine menu in Fusion. Note that this just presents a CDrom to the guest, so you will have to install

If you're not sure on how-to do that, then here's a script I've used in the past:


#!/bin/bash 
 
sudo apt-get update 
sudo apt-get upgrade 
echo "Do go and mount your cdrom from the VMware menu" 
echo "press any key to continue" 
read -n 1 -s 
mount /dev/cdrom 
cd /media/cdrom0 
cp VMwareTools-*.tar.gz /tmp 
cd /tmp 
tar xvzf VMwareTools-*.tar.gz 
cd vmware-tools-distrib/ 
sudo apt-get install --no-install-recommends libglib2.0-0 
sudo apt-get install --no-install-recommends build-essential 
sudo apt-get install --no-install-recommends gcc-4.3 linux-headers-`uname -r` 
sudo ./vmware-install.pl --default 
 
sudo /etc/init.d/networking stop 
sudo rmmod pcnet32 
sudo rmmod vmxnet 
sudo modprobe vmxnet 
sudo /etc/init.d/networking start 















Friday, September 22, 2017

Bitlocker

On a computer, protecting your user account's data with a login password only protects against unauthorized login but not against anyone who has physical access to the computer. This person can simply insert a bootable device into the computer's USB port, boot from it, and have full access to the data on the computer. This means if your leave your computer unattended for a few minutes, there might be enough time for this person to steal your data without your even knowing because he does not need to walk away with your computer.

However, when the harddrive on your computer is encrypted, any unauthorized person who has physical access to your computer cannot access the data on it because the entire drive is encrypted. With that said, you can just encrypt your user's profile to get the same protection but this only affects your profile. If you per chance store sensitive data outside your user profile, then there is no protection for it when the unauthorized person has physical access to the computer.

On a Windows 10 machine, whole drive encryption can easily be done using the built-in BitLocker. Setting it up is very simple and straight forward. However, it does require that the Windows 10 is Professional or Enterprise version. If your Windows 10 is the Enterprise version, the computer is most likely maintained by your company's IT department. As such, it may already be encrypted with either Bitlocker or some other method. If not, talk to your IT department if you are concerned about data breaches.

The steps to use Bitlocker to encrypt the drive can be found on the Internet including myriad videos on YouTube. As with all things with computer security, back up your computer's data before trying anything. There is a chance that ironically, you lock yourself out of your own data so the backup is the insurance. In general, you need to back up valuable data regardless.

Saturday, September 16, 2017

Windows Setup: Installing using the MBR or GPT partition style

https://docs.microsoft.com/en-us/windows-hardware/manufacture/desktop/windows-setup-installing-using-the-mbr-or-gpt-partition-style

In general, when you install Windows 10, you should install it under UEFI mode to get additional features. Other than making the boot up faster, it also enables multi boot with other operating systems such as Linux. Each OS needs its own partition. With GPT disk, you can get more than 4 primary partitions. Moreover, given that ChromeOS is all the rage these days, an existing UEFI Windows is needed if you want to dual boot with Neverware's wonderful CloudReady ChromeOS that you can install on any old PC for free. Granted, if the PC is too old, its BIOS cannot run UEFI anyway. In short, if your old computer's BIOS support UEFI and can run Windows Vista or later, you can dual boot it with CloudReady ChromeOS.


Tuesday, July 25, 2017

Download Windows from Microsoft

https://www.microsoft.com/en-us/software-download/

Since this is the Microsoft website, the software is legit and more importantly don't have any hidden malware. You need a valid key for Windows 7 to download it though.

Tuesday, July 11, 2017

Batch Image Processing

ImBatch

http://www.highmotionsoftware.com/products/imbatch

You can also download it from http://www.lo4d.com/

Sunday, July 9, 2017

Tool to edit metadata of audio files

MP3TAG

http://www.mp3tag.de/en/

It can bulk edit meta data on many audio files at the same time.

Free Video Editor Avid Media Composer First



https://www.youtube.com/watch?v=Pz6MHflf-bw


Avid is one of the major digital video editors out there that is being used to edit Hollywood mainstream movies. This is a scaled down version but its interface is the same as the paid version.


https://my.avid.com/mcfirst


Monday, June 5, 2017

Download ISOs from Microsoft website

https://www.heidoc.net/joomla/technology-science/microsoft/67-microsoft-windows-iso-download-tool

This tool allows an easy and comfortable way to download genuine Windows 7, Windows 8.1 and Windows 10 disk images (ISO) directly from Microsoft's servers, as well as Office 2007, Office 2010, Office 2013, Office 2016, and Office 2011 for Mac.

Monday, May 29, 2017

Cryptomator

While storing your files in the cloud such as Dropbox, Google Drive, and OneDrive is a great way to make those files available anywhere and any time on any computers, there is one inherited danger of data breach due to a hack because the data is stored on someone else's computer that is accessible over the Internet. Granted, if you have a strong password and use 2-factor authentication, the odds are low that this hack will happen. Nonetheless, if you feel more comfortable if there is a hack, the data stored on these servers is not accessible by the attackers, the you should encrypt the data using your own encryption. This way, even a rogue employee at these cloud storage services cannot see your files.

Cryptomator is one such solution.

https://cryptomator.org/

Friday, May 19, 2017

Download Youtube videos locally



http://www.pcmag.com/article2/0,2817,2476563,00.asp?

The site mentioned that allows you to download videos at 1080p or even 4K is youtubemonkey.com. You don't need to install any program locally. Moreover, there seems to be no limitation on how long the video is. I have successfully downloaded a nature video at 4K that runs an hour and 7 minutes.

If you want a more powerful downloader, try 4K Video Downloader

https://www.4kdownload.com

The free version has some limitations.
https://www.4kdownload.com/buy-ab/videodownloader?source=videodownloader&ui_source=default

Be sure to try out their other programs. Also, visit their blog for some great help on related programs.

https://www.4kdownload.com/blog/

Monday, April 24, 2017

3D Picture

This image was taken with a Lucid VR camera that can be purchased for $400. It takes both still pictures at 4K resolutions and videos at 2K. This sample picture is unfortunately not at 4K so while the 3D effect is there, there is not too much detail.

You need at least a cardboard viewer to see the effect.
https://vr.google.com/cardboard/get-cardboard/

Saturday, February 25, 2017

Wi-Fi network roaming with 802.11k, 802.11r, and 802.11v on iOS



For those of you interested in iOS devices supports these latest "advanced" features, here is the document to read.

https://support.apple.com/en-us/HT202628

Below is a copy of their page, saved here in case it is removed.

iOS supports optimized client roaming on enterprise Wi-Fi networks. The 802.11 Working Group standards k, r, and v let clients roam more seamlessly from access point (AP) to AP within the same network.

802.11k

The 802.11k standard helps iOS to speed up its search for nearby APs that are available as roaming targets by creating an optimized list of channels. When the signal strength of the current AP weakens, your device will scan for target APs from this list.

802.11r

When your iOS device roams from one AP to another on the same network, 802.11r uses a feature called Fast Basic Service Set Transition (FT) to authenticate more quickly. FT works with both preshared key (PSK) and 802.1X authentication methods.

iOS 10 includes support for adaptive 802.11r on Cisco wireless networks. Adaptive 802.11r offers FT without the need to enable 802.11r on the configured Cisco wireless network.

802.11v

iOS supports the basic service set (BSS) transition-management functionality of 802.11v on certain devices. BSS transition management allows the network’s control layer to influence client roaming behavior by providing it the load information of nearby access points. iOS takes this information into account when deciding among the possible roam targets.

When you combine 802.11k and 802.11v’s ability to speed up the search for the best target AP with FT's faster AP association, apps can perform faster and you get a better Wi-Fi experience in iOS.

Learn more

Most Wi-Fi network hardware vendors support 802.11k, 802.11v, and 802.11r (FT). You need to enable and configure these features on your Wi-Fi router before your network can use them. Setup varies, so check your Wi-Fi router's manual for details.


The lists below show which iOS devices support 802.11k, 802.11r, and 802.11v. To use 802.11k and 802.11r, you need iOS 6 or later. To use 802.11v, you need iOS 7 or later. To use adaptive 802.11r, you need iOS 10 or later.

802.11k and r
iPhone 4s and later
iPad Pro
iPad Air and later
iPad mini and later
iPad (3rd generation) and later
iPod touch (5th generation) and later

Adaptive 802.11r
iPhone 6s and later
iPhone SE
iPad Pro and later

802.11v
iPhone 5c, iPhone 5s, and later
iPad Pro
iPad Air and later
iPad mini 2 and later
iPod touch (6th generation)


-------------

If you like to play around with these new WIFI standards to get faster roaming and efficient use of access points in a multi-access point setting, the cheapest way I can find in terms of access points supporting these 802.11k and r protocols is the Edimax CAP300 for $50 per access point. However, given that this AP can only do the 2.4GHz, I recommend that you get at least a pair of the CAP1200 to get both the 2.4GHz and 5GHz and AC speed.

More info on this:

https://www.smallnetbuilder.com/wireless/wireless-howto/33045-how-to-get-fast-reliable-wi-fi-roaming

http://www.edimax-de.eu/edimax/mw/cufiles/files/faq/SMB/022_How_to_Configure_802_11r_and_802_11k_Under_AP_Controller.pdf


Thursday, March 24, 2016

Check Outgoing Ports

Most of the time, your Internet Service Provider or Internet router blocks certain ports for various reasons. Blocking can apply to either incoming or outgoing traffic. It can be for both. To find out what outgoing ports are blocked, here is a simple way to do it. You would simply go to this website and specify the port that you want to connect to the webserver hosting this site. For example, you want to know if port 1000 is blocked by your ISP because there is an application that uses this port to go out to the Internet from your local network. After you have verified that your own local routers do not block this port, you would go to this site by typing in this in the URL of the web browser:

http://portquiz.net:1000

This is what I get when I do this.


Outgoing port tester

This server listens on all TCP ports, allowing you to test any outbound TCP port.
You have reached this page on port 1000.
Your network allows you to use this port. (Assuming that your network is not doing advanced traffic filtering.)
Network service: unknown
Your outgoing IP: [This is your local ISP-assigned IP]

Friday, March 18, 2016

Log into a Mac with TightVNC

Mac OSX comes with a VNC server service built-in. It however is not enabled by default for security reasons. To connect to this server to control the Mac computer, you need the client or viewer installed on the machine you are physically at. If this computer is also a Mac, the viewer is already installed. If this is a Windows PC, you need to get a viewer such as TightVNC.

http://www.tightvnc.com/download.php

This download has two parts: the server and the client (viewer). If your goal is not to control the machine the program is installed on, then make sure you only choose the "viewer only" option. From a security standpoint, there is no reason to have the server running when it is not needed.

Once the viewer is installed on the PC, just simply launch the program and enter the IP address of the destination Mac. If it does not work, it is because you need to turn on the “screen sharing” feature built into Mac OS X.

Click the Apple logo at the top left corner of the Mac’s screen and select System Preferences.

Click the Sharing icon to open the Sharing

Click the checkbox of Screen Sharing to enable screen sharing. (Remember to turn this off when the remote session is done).

Click the “Computer Settings....” button. Pay attention to what it says immediately on top of this button. It lists the current IP address of the Mac computer. This is the IP address that you would put in the TightVNC viewer on the PC.

Click the box VNC Viewers May Control Screen with a Password. Type a password into the box and click “OK.” This password is mandatory, used for the VNC session only so it does not need to be the same password you use for logging into the Mac computer.

Try again on the TightVNC viewer on the PC. It should work now.

If this is done over the Internet or the Mac is behind a firewall, you’ll need to set up port forwarding on the Mac's network router. Forward incoming traffic to port 5900.  In situation like this, you should use the router’s external WAN IP address to connect instead of the IP address displayed in the Screen Sharing window seen previously on the Mac.

Incidentally, the VNC viewer on the Mac is the network share access program. On the Desktop (Finder), click on Go at the top of the screen. If you do not see this Go, just click on the Finder icon on the Dock. Choose Connect to Server. Type in vnc://IP address of the destination Mac in the text box. Connect.

Thursday, March 17, 2016

Register a Roku Account Without A Credit Card

It is silly at best to have to give Roku a credit card number before you can register an account with it. I mean not everyone will pay for the premium channels. They have already purchased the box already. The rationale for putting a credit on file with Roku is when you do want to get a paid channel or access paid content, there is no need to whip out your credit card and charge it.

Before you start up the device, go to the Roku website and register for a free Roku account. This is the account that you use to activate your Roku device using the Roku remote control and navigating through the Roku menu on the TV that the Roku box is attached to.

Here is the link where you would create an account without having to use your credit card. https://my.roku.com/signup/nocc

NOCC obviously means "no credit card"

Fill out the information like you would normally. Once you have reached the payment method, scroll down and click on Skip, I’ll add later.

If this "Skip" option is not visible, the only lest to do is strike up a chat connection with Roku at https://support.roku.com


Sunday, February 28, 2016

Using PIN instead of password to log into Windows 10

It is recommended or in cases required that you use a strong password to log into anything. This includes your Windows machines. However, having a strong and hard-to-guess passwords is a double-edged sword  because you are more likely to forget a complex password if you do not use it often. Imagine you have a Windows 10 machine that you only use sparingly, and one day when you need to use it, you cannot log in because its password is not the one you think it is. However, this kind of a situation can be mitigated by assigning a PIN number instead of a complex password.

To create a PIN on Windows 10:

Click the Start menu.
Click on Settings
Click on Accounts
Click on Sign-in Options
Under PIN click “Add.”
Create a PIN.

This PIN is machine-specific. It only applies to the machine on which it is activated. This means on another Windows 10 machine, you need to go through the same routine and if you wish, you can create a different PIN that only for that machine even though the login Windows account on that machine has the same password has the previous machine. This way, you can actually allow someone to use one of these machines by only letting them know the PIN number without divulging your Windows account password. The rationale for this is when you change your Windows account password which may also be your Microsoft account that you use to log into various online services, this change will cause a cascade where you have to update the passwords to all these various services. This can get annoying. The PIN system therefore is a modular approach to computing access management.

What happens when you do change your Windows log in password. Does this change invalidate the PIN? No. The same PIN can be used to log into Windows on that specific machine. These two machine access credentials are independent of each other. One is machine specific and the other may be global if it is also a Microsoft account, one that is textually in the form of an email address.

Because the PIN is simpler to remember and we all tend to use the same PIN everywhere, it is unlikely that you will forget it. What if you have forgotten the PIN? Then let's hope that you have not also forgotten your Windows/Microsoft log in because the log in screen gives you the option to log in using this password. Once logged in, you can reset the PIN number.

 

Monday, September 28, 2015

Intel VT Virtualization

If you have never heard of virtualization, then I highly recommend that you get yourself familiarize with it, at least conceptually. Basically with virtualization, you can run different copies of the same version of Windows or different versions of Windows on the same physical machines. These "guest" Windows are isolated from each other to some extend. This enables a lot of possibilities. Actually, you can run guest operating systems that are not Windows. You can run Linux and other exotic systems on the same physical machine. Think about this, you only have to buy one physical machine to run half a dozen copies of Windows simultaneously. It's like having multiple physical computers in your room.

Needless to say, because the computer runs multiple copies of Windows at the same time, this computer needs to have a bit of beefy CPU, lots a memory, and last but not least the type of virtualization technologies that the CPU supports.

Assuming that the host physical PC has an Intel CPU. At the very least, this CPU has to support VT-x. There are a few other members of the VT family. They are VT-x, VT-i, VT-d, and VT-c. Below is a brief introduction of what these are and what they can do for you in terms of your using virtualization.

https://www.thomas-krenn.com/en/wiki/Overview_of_the_Intel_VT_Virtualization_Features  

Saturday, June 6, 2015

Synology Disk Station Manager 5.2

Synology, my favorite NAS provider, has released its latest version of the DSM 5.2 out of beta. As expected, this release comes with new features and updated old ones. Below is a list of these things.

https://miketabor.com/synology-dsm-5-2-exits-beta-goes-gold/


Thursday, March 12, 2015

VLC for iOS

The VLC video player is a very popular free program that seems to be able to play any video files you throw at it. Considering what it can do, it's a meager 22MB download for the Windows version. iTunes is much bigger but cannot play many file formats which is basically what people really want from a video playing program.

While its Windows and Mac versions have been around for a long time, its iOS version is still relatively new. In fact, it seems to run afoul with Apple's App Store policy often resulting in its being yanked off from the store. If you have a network storage server at home, odds are it offers SMB as the primary download protocol because SMB is supported by Windows and Mac OSX. Unfortunately, VLC for iOS still does not support SMB as of March 2015 so that you can stream video files from the NAS to the iPhone and iPad. The good news is the VLC people promise that they will make VLC for iOS support SMB. Their initial work on this is 6 months ago based on the discussion on the VLC forum. Once VLC for iOS supports SMB, it will be a major software development for the iOS in general because Apple seems to want you consume media files via streaming from the Internet and not from your local file server. This is why Netflix and the likes have been available on the iOS for a long time.

http://www.videolan.org/vlc/download-ios.html

With that said, you can always download media files from the NAS into the iPhone or iPad via FTP. Then you would simply play them locally. As said, VLC for iOS can play a lot of file formats, negating the necessity to re-encode the video file to a iOS friendly format such as M4V.

Saturday, February 28, 2015

Creates a Custom Windows Recovery Partition



Many Windows PCs come with a recovery partition built in, but it contains the image file of Windows exactly the way it comes with. This includes all the usual bloatware like programs that you will never use or inferior programs that will expire in 30 days. This is very annoying because the whole point of a recovery partition is to bring back Windows to its perfect state, exactly the way you like it. This is achievable if you create your own recovery partition. A free program called AOMEI OneKey Recovery makes this possible.

You will run this backup program and create the recovery image that is stored on a separate partition on the same drive as the C partition or on an external harddrive before you start using the computer, before it starts to accumulate the bad stuff as time goes by. Basically, the program will clone your C drive in its current state.

http://www.backup-utility.com/onekey-recovery.html

https://www.youtube.com/watch?v=gukKC7SsA8I