You don’t need to even reboot for this 🙂 Once you disabled the recovery partition, you can just launch diskpart and complete the changes. you’ll be able to
Categoria: Uncategorized
QR Code Wifi
Wifi: WIFI:T:WPA;S:ssid;P:password;; Parameter Example Description T WPA Authentication type; can be WEP or WPA, or leave empty for no password. S MyNetworkName Network SSID. Required. P ThisIsMyPassword Password, ignored if T is left blank. H true Optional. True if the network SSID is hidden.
Find Exchange version with PowerShell
Let’s find out the Exchange version with PowerShell. We are going to use the Get-ExchangeServer cmdlet. Run Exchange Management Shell as administrator. In the next step, we will find the Exchange Product name. Now that we know the Exchange version build number, we can find the product name. Go to the Microsoft Docs page
Mysql InnoDB Backup
The key to safe database management is making regular backups. Depending on your data volume, number of MySQL servers, and database workload, you can use these backup techniques, alone or in combination: hot backup with MySQL Enterprise Backup; cold backup by copying files while the MySQL server is shut down; logical backup with mysqldump for smaller data volumes or to record the structure of schema objects. Hot and cold backups are physical backups that copy actual data files, which can be used directly by the mysqld server for faster restore. Using MySQL Enterprise Backup is the recommended method for backing …
Secret Codes for Android Phones
The main functionality of having secret codes hidden within a mobile device was originally intended for the employees of the respective devices to trouble shoot and perform procedures. Yet now, living in a digital world, everyone has access to this information.
How to Change Backup Location on MailEnable Backup utility
HKEY_LOCAL_MACHINE\SOFTWARE\Mail Enable\Mail Enable\Backup Directory = “D:\\MailEnable” NOTE: MailEnable will automatically add “Backup\Sets” to the path from that registry key. Don’t forget that if you’re running a 64-bit version of Windows you’ll need to run regedit out of the Windows\SysWOW64 directory.
Outlook.com
With the arrival and availability of its latest e-mail service, the Outlook.com, Microsoft takes a giant step forward in renewing the service Hotmail disponibilizava, and seeks to bring back all users over the years were opting for other services that were appearing and showed themselves better.This email service based on the Internet has all the features you would expect from a similar platform, but also brought some of the features that were already in Hotmail, albeit reinvented and adapted to this new platform. One of the most interesting that we have at Outlook.com is the ability to create email addresses …
Windows 8: HAL_INITIALIZATION FAILED.
“HAL INITIALIZATION FAILED”, means the hardware is not compatible with Windows 8 Operating System. Windows 8 developer installation is supported on only below platforms. Hyper-V in Windows 8 Developer Preview Hyper-V in Windows Server 2008 R2 VMware Workstation 8.0 for Windows VirtualBox 4.1.2 for Windows
GeoIP Database
Test integrations and create custom products using MaxMind’s open source data and APIs. GeoLite Data GeoLite Country and City databases GeoLite Autonomous System Number database APIs for use with GeoLite and GeoIP databases GeoLite Developer’s Package (Royalty-free) http://www.maxmind.com http://geolite.maxmind.com/download/geoip/database/GeoLiteCity.dat.gz
Microsoft Forefront Threat Management Gateway 2010
Forefront Threat Management Gateway 2010, the next generation release of ISA Server 2006, enables business by allowing your employees to safely and productively use the Internet without worrying about malware and other threats. Learn more about Forefront Threat Management Gateway. Microsoft Forefront Threat Management Gateway 2010 (TMG) allows employees to safely and productively use the Internet for business without worrying about malware and other threats. It provides multiple layers of continuously updated protections – including URL filtering, antimalware inspection, intrusion prevention, application- and network-layer firewall, and HTTP/HTTPS inspection – that are integrated into a unified, easy to manage gateway, reducing …