Category Archives: Uncategorized

Uncategorized

QR Code Wifi

Wifi:

WIFI:T:WPA;S:ssid;P:password;;

Parameter Example Description
TWPA Authentication type; can be WEP or WPA, or leave empty for no password.
S MyNetworkName Network SSID. Required.
P ThisIsMyPassword Password, ignored if T is left blank.
H true Optional. True if the network SSID is hidden.

Uncategorized

Find Exchange version with PowerShell

Let’s find out the Exchange version with PowerShell. We are going to use the Get-ExchangeServer cmdlet. Run Exchange Management Shell as administrator.

  C:\>Get-ExchangeServer | Format-List Name, Edition, AdminDisplayVersion
   C:\>Get-ExchangeServer | Format-Table Name, Edition, AdminDisplayVersion

In the next step, we will find the Exchange Product name.

Now that we know the Exchange version build number, we can find the product name. Go to the Microsoft Docs page

Uncategorized

Mysql InnoDB Backup

The key to safe database management is making regular backups. Depending on your data volume, number of MySQL servers, and database workload, you can use these backup techniques, alone or in combination: hot backup with MySQL Enterprise Backup; cold backup by copying files while the MySQL server is shut down; logical backup with mysqldump for smaller data volumes or to record the structure of schema objects. Hot and cold backups are physical backups that copy actual data files, which can be used directly by the mysqld server for faster restore.

Using MySQL Enterprise Backup is the recommended method for backing up InnoDB data.

Note

InnoDB does not support databases that are restored using third-party backup tools.

Hot Backups

The mysqlbackup command, part of the MySQL Enterprise Backup component, lets you back up a running MySQL instance, including InnoDB tables, with minimal disruption to operations while producing a consistent snapshot of the database. When mysqlbackup is copying InnoDB tables, reads and writes to InnoDB can continue. MySQL Enterprise Backup can also create compressed backup files, and back up subsets of tables and databases. In conjunction with the MySQL binary log, users can perform point-in-time recovery. MySQL Enterprise Backup is part of the MySQL Enterprise subscription. For more details, see MySQL Enterprise Backup Overview.

Cold Backups

If you can shut down the MySQL server, you can make a physical backup that consists of all files used by InnoDB to manage its tables. Use the following procedure:

  1. Perform a slow shutdown of the MySQL server and make sure that it stops without errors.
  2. Copy all InnoDB data files (ibdata files and .ibd files) into a safe place.
  3. Copy all the .frm files for InnoDB tables to a safe place.
  4. Copy all InnoDB log files (ib_logfile files) to a safe place.
  5. Copy your my.cnf configuration file or files to a safe place.

Logical Backups Using mysqldump

In addition to physical backups, it is recommended that you regularly create logical backups by dumping your tables using mysqldump. A binary file might be corrupted without you noticing it. Dumped tables are stored into text files that are human-readable, so spotting table corruption becomes easier. Also, because the format is simpler, the chance for serious data corruption is smaller. mysqldump also has a --single-transaction option for making a consistent snapshot without locking out other clients. See Section 1.3.1, “Establishing a Backup Policy”.

Replication works with InnoDB tables, so you can use MySQL replication capabilities to keep a copy of your database at database sites requiring high availability. See InnoDB and MySQL Replication.

 

https://dev.mysql.com/doc/mysql-backup-excerpt/5.5/en/innodb-backup.html

Uncategorized

Secret Codes for Android Phones

The main functionality of having secret codes hidden within a mobile device was originally intended for the employees of the respective devices to trouble shoot and perform procedures. Yet now, living in a digital world, everyone has access to this information.

read more »

Uncategorized

How to Change Backup Location on MailEnable Backup utility

HKEY_LOCAL_MACHINE\SOFTWARE\Mail Enable\Mail Enable\Backup Directory = “D:\\MailEnable”

NOTE: MailEnable will automatically add “Backup\Sets” to the path from that registry key.

Don’t forget that if you’re running a 64-bit version of Windows you’ll need to run regedit out of the Windows\SysWOW64 directory. read more »

Uncategorized

Outlook.com

With the arrival and availability of its latest e-mail service, the Outlook.com, Microsoft takes a giant step forward in renewing the service Hotmail disponibilizava, and seeks to bring back all users over the years were opting for other services that were appearing and showed themselves better.This email service based on the Internet has all the features you would expect from a similar platform, but also brought some of the features that were already in Hotmail, albeit reinvented and adapted to this new platform.

One of the most interesting that we have at Outlook.com is the ability to create email addresses associated with your personal account. Watch as they can.

A modern interface: faster and cleaner
The simple, fluid and interactive design of Outlook makes it easy to use whether you’re on a desktop, phone or tablet.

Learn more

Get an Outlook email address for your new inbox
You can get a new email address from Outlook. You don’t have to worry about your contacts and previous emails, you’ll keep them. And, you’ll continue receiving messages sent to your Hotmail address.

Get new ID

Bring your inbox to life — Connect Facebook and Twitter
Connect and see your friends’ Facebook updates and Tweets directly in your inbox. Your contacts’ information is automatically in sync so you don’t miss a thing.

Connect now

Uncategorized

Windows 8: HAL_INITIALIZATION FAILED.

“HAL INITIALIZATION FAILED”, means the hardware is not compatible with Windows 8 Operating System.

Windows 8 developer installation is supported on only below platforms.

 

 

Uncategorized

GeoIP Database

Test integrations and create custom products using MaxMind’s open source data and APIs.

GeoLite Data

http://www.maxmind.com

http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz

Uncategorized

Microsoft Forefront Threat Management Gateway 2010

logo-ff-tmg10bForefront Threat Management Gateway 2010, the next generation release of ISA Server 2006, enables business by allowing your employees to safely and productively use the Internet without worrying about malware and other threats. Learn more about Forefront Threat Management Gateway.

Microsoft Forefront Threat Management Gateway 2010 (TMG) allows employees to safely and productively use the Internet for business without worrying about malware and other threats. It provides multiple layers of continuously updated protections – including URL filtering, antimalware inspection, intrusion prevention, application- and network-layer firewall, and HTTP/HTTPS inspection – that are integrated into a unified, easy to manage gateway, reducing the cost and complexity of Web security.

System Requirements

Review this Microsoft Forefront Threat Management Gateway 2010 information to make sure you have the required hardware and software to run the product.

Forefront Threat Management Gateway 2010 Standard Edition
Provided below are the minimum and recommended system configuration requirements to use Forefront Threat Management Gateway 2010 Standard Edition.

System Component Minimum Requirements Recommended Requirements
Operating System Windows Server 2008 SP2 or Windows Server 2008 R2 Windows Server 2008 SP2 or Windows Server 2008 R2
Processor Type 64-bit 64-bit
Processor Cores 2 4
Memory 2 GB 4 GB
Disk Space 2.5 GB of available hard disk space. This is exclusive of hard disk space that you want to use for caching or for temporarily storing files during malware inspection 2.5 GB of available hard disk space. This is exclusive of hard disk space that you want to use for caching or for temporarily storing files during malware inspection
Disks One local hard disk partition that is formatted with the NTFS file system Two local hard disk partition that is formatted with the NTFS file system. One disk for system and TMG logging, and one for caching and malware inspection
Network One network adapter that is compatible with the computer’s operating system, for communication with the Internal network.

An additional network adapter for each network connected to the Forefront TMG server.

One network adapter that is compatible with the computer’s operating system, for communication with the Internal network.

An additional network adapter for each network connected to the Forefront TMG server.

www.microsoft.com/forefront/edgesecurity/isaserver/en/us/

Uncategorized

Facebook .NET SDK

An updated (actually 3.0) release of the Facebook .NET SDK was also released. Are you a .NET developer writing Facebook applications or desiring to integrate the social network into your applications? Check out the Facebook .NET SDK which provides:

  • Silverlight-compatible assembly for handling all the logic to communicate with Facebook platform and has specific support for XAML data binding.
  • Web API for Facebook IFrame/FBML applications
  • Using ASP.NET MVC? There’s an assembly to support that model as well

The Facebook .NET SDK encapsulates the interaction with the developer platform for Facebook and should help .NET developers in web or client get started in a familiar way with Facebook. I’m excited to see what folks might do with Silverlight and Facebook!

Download the Facebook .NET SDK here and get links to getting started with the Facebook API.