Very useful, you can ask Gmail to prompt where to save attachments or set it:-
For some reason Radmin VPN becomes a Public network in Network and Sharing Centre and as such does not allow Remote Desktops to access inbound (or it seems hit and miss). Change the network to Private using the Registry:-
Find the profile and change Category from 0 to 1
Unfortunately it has not been updated for a while but it still gives a quick way to access your Gmail AND choose the browser, so this one might be better for you:
Looking to upgrade that old, knackered laptop you’ve been slaving over? Check out this Elitebook 840 G4 from HP, an absolute bargain Quad Core i7 4th Gen for around £500, depending on age and condition. It has a proper ENTER key (full height, unlike many HPs this season) and mouse BUTTONS, not that silly trackpad you get with Dell. Also, it’s lightning fast and will process anything you can throw at it is nanoseconds, booting up in under 10 seconds from OFF.
If that’s too much, why not try one of these LNYX tablet/laptops? Looks and runs very much like a Microsoft Surface but at a quarter of the price, around £280:-
If you have a PC on a network that doesn’t have a password, of which there are millions no doubt, and that PC tries to connect to another PC or Server on the network then you run into a little problem. No matter what you try it just won’t connect. What you end up doing is setting a password on the PC and then suddenly it will connect. Well, you can actually modify an registry entry (via a group policy) to enable this instead.
This saves heaps of time on a new Win10 build. When you’ve installed Windows don’t do ANY updates just download this and run it – it will take forever but will update to 1809.]
Lost your Windows 10 password?
Uses WINPASS and a small, bootable version of Linux to get you out of trouble when you forget the password on Windows 10. Can be used with a USB flash drive as well.
Trinity Rescue Kit or TRK is a free live Linux distribution that aims specifically at recovery and repair operations on Windows machines, but is equally usable for Linux recovery issues. Since version 3.4 it has an easy to use scrollable text menu that allows anyone who masters a keyboard and some English to perform maintenance and repair on a computer, ranging from password resetting over disk cleanup to virus scanning
-as a bootable CD which you can burn yourself from a downloadable isofile or a self burning Windows executable
-from a USB stick/disk (optionally also a fixed disk), installable from Windows or from the bootable TRK cd (which is easier and safer)
-easily reset windows passwords with the improved winpass tool
-simple and easy menu interface
-5 different virusscan products integrated in a single uniform commandline with online update capability
-full ntfs write support thanks to ntfs-3g
-winclean, a utility that cleans up all sorts of unnecessary temporary files on your computer.
-clone computers over the network via multicast.
-wide range of hardware support (kernel 2.6.35 )
-contributed backup utility called “pi”, to automate local machine backups
-easy script to find and mount all local filesystems
-self update capability to include and update all virusscanners + local changes you made to TRK.
-full proxyserver support.
-run a samba fileserver (windows like filesharing)
-run a ssh server
-recovery and undeletion of files with utilities and procedures
-recovery of lost partitions
-evacuation of dying disks
-full read/write and rpm support
-UTF-8 international character support (select keyboard language from the scrollable textmenu at startup)
-2 rootkit detection uitilities
-most software updated to recent versions
-literally thousands of changes and bugfixes since version 3.3
-elaborated documentation, including manpages for all commands (also TRK ‘s own)
Good program to move/archive old files from a drive that is nearly full to a 2nd drive/portable drive.
There are several simple and easy-to-perform solutions for you to work out “System Restore failed to extract the original copy of the directory from the restore point” issue.
1. If there is file conflict, create another system restore point and try again.
2. Disable security programs in your operating system. If you have antivirus software installed, you can perform System Restore in Safe Mode. Antivirus software will protect your system files by preventing System Restore from replacing them. Start your Windows in Safe Mode where Windows won’t load startup applications and third-party software to try again.
3. If you are running Windows 7 and its previous version, you can simply delete this certain file: %windir%\system32\tasks\microsoft\windows\SystemRestore\SR. Reboot your system and it will automatically perform System Restore.
Great option for travellers, students, journalists, site managers: the Linx 12X4 Tablet/PC with Windows 10 Home.
Ha! Found it! For some reason every time I receive an email from a certain user, they appear as Unknown Unknown, even though they are in my Contacts correctly. It turns out their Personal Info record on their Microsoft Outlook Exchange mail server has them down as Unknown Unknown.
There is a MASSIVE issue using Outlook to migrate emails from IMAP or POP3 to Gsuite — the Received Date doesn’t translate correctly on the other end meaning that they all appear to be received on the date you do the migrate (more than likely an MS issue rather than Google).
The way round it is to download and install Thunderbird mail client, set up BOTH old and new mailboxes as IMAP and then drag and drop email between them. This seems to preserve the date field so that your user can search and view his old email in the correct order with the correct dates.
Update for MSP: We have discussed this case with our research team and as per update from them we have to make the changes in registry in below mentioned location.
Navigate to above mentioned registry path and change the value from 1 to 0.
Kyocera A4 Mono Laser Printer with ADF colour scanner and copy facility, £250, nuff said.
Had three instances of this problem in the last week:
In Windows 10 and Windows 8, press the Windows Key + R to open a Run dialog box. Type regedit.exe and then press OK.
In Windows 7, click Start , type regedit in the Search programs and files box, and then press Enter.
Locate and then select the following registry subkey:
Create the following DWORD value and give it a value of 1.
It is incredibly easy to sign up for Amazon Prime during the checkout process, even for a seasoned IT professional like myself. How do they manage to catch you? They provide 3 links for you to click, 2 of which are affirmative but look different and one that is just a normal html link that is not so obvious.
Which one you gonna click, sucker?? More info here: https://sumo.com/stories/amazon-marketing
To prevent your site being hacked (and used as a cache repository for nefarious purposes) you need to make sure that the folder and file permissions are set correctly throughout. Folders are 755 and Files 644. So, something like this, performed at the root level, e.g. /public_html/:
Microsoft Excel cannot open or save any more documents because there is not enough available memory or disk space.