Loading color scheme

Download VMware Fusion 5 Now!
Save $100 on Toshiba 43
If you need help, we have a list of frequently asked questions and answers. Click a question below to view the answer.

1.- Turn OFF Dynamic Notifications (System + Notifications and actions).
2.- Turn OFF Windows Tips (System + Notifications and actions).
3.- Turn OFF Dynamic Color Adaptation (Personalization + Colors).
4.- Go to This PC (right-click Properties) + (Advanced tab) + (Performance + Settings); and check Adjust for best performance   

 

(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.

 

- Create the following .htaccess file on root folder:                  
      RewriteEngine On
      RewriteCond %{SERVER_PORT} 80
      RewriteRule ^(.*)$ https://www.thedomain.com/$1 [R,L]                
 
- In case of wish to force for a particular folder:
     RewriteEngine On
     RewriteCond %{SERVER_PORT} 80
     RewriteCond %{REQUEST_URI} somefolder
     RewriteRule ^(.*)$ https://www.thedomain.com/somefolder/$1 [R,L]   
 
 
(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.

1.- Click Start, and then click Run.
2.- In the Open box, type regedit, and then click OK.
3.- Locate and then click the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
4.- In the details pane, double-click Start.
5.- In the Value data box, type 4, click Hexadecimal (if it is not already selected), and then click OK.
6.- Exit Registry Editor.
 
To enable the access again, follow same steps as above and change value to 3 from 4.

 


(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.

 
To begin, load the run box by pressing WINDOWS KEY + R, then type "control userpasswords2" and click OK.
 
This will load a list of all the user accounts within Windows. Select the account you wish to use as the automatic login by clicking on it, and then untick the "users must enter a username and password to use this computer" box. Then click apply.
 
Another window will then appear which prompts you to enter the password (twice) for the auto login account. Once you have done this, click OK.
 
Next time you start your PC you should now be logged in automatically.
 

(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.

1.- Start Registry Editor.
2.- Locate and then click the following registry subkey: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber
3.- On the Edit menu, click Modify, and then click Decimal.
4.- Type the new port number, and then click OK.
5.- Quit Registry Editor.
6.- Restart the PC

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
This cloud model promotes availability and is composed of five essential characteristics (On-demand self-service, Broad network access, Resource pooling, Rapid elasticity, Measured Service); three service models (Cloud Software as a Service (SaaS), Cloud Platform as a Service (PaaS), Cloud Infrastructure as a Service (IaaS)); and, four deployment models (Private cloud, Community cloud, Public cloud, Hybrid cloud). Key enabling technologies include: (1) fast wide-area networks, (2) powerful, inexpensive server computers, and (3) high-performance virtualization for commodity hardware.
 

(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.
 

 

Port

Server

Encryption

POP

995

outlook.office365.com

SSL

IMAP

993

outlook.office365.com

SSL

SMTP

587

smtp.office365.com

TLS

SMTP

25

YOUR_DOMAIN.mail.protection.outlook.com

No SSL no Authentication

 

(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.
 

UniFi Controller Setup

 

 

Configure the USG as a RADIUS server

  1. Navigate to Settings > Services > RADIUS.
  2. Enable the RADIUS server under the "Server" tab.
  • Secret: Pre-shared key provisioned to the authenticator devices and the RADIUS server. This provides authentication between the two types of devices ensuring RADIUS message integrity.

 

NOTE: Its best to use your own randomly generated RADIUS secret. "RADIUSAuth" is a placeholder. Spaces are not allowed in the key.

  • Authentication port: The port in which RADIUS authentication messages are to be sent and received by authenticator and RADIUS server devices.
  • Accounting Port: The port in which RADIUS accounting messages are to be sent and received by authenticator and RADIUS server devices.
  • Accounting Interim Interval: Time in milliseconds in which a RADIUS access request packet is sent with an Acct-Status-Type attribute with the value "interim-update". This update is sent to request the status of an active session. "Interim" records contain report the current session duration and can provide information on data usage. 

Create User Accounts

  1. Navigate to Settings > Services > RADIUS.
  2. Create user accounts under the "User" tab. 

Configure the L2TP Network

Navigate to Settings > Networks > Create New Network in the UniFi Controller.

3. Fill out necessary fields as shown in the image above:

    • Purpose: Remote User VPN
    • VPN Type: L2TP Server
    • Pre-Shared Key: Known as the pre-shared secret, will be entered along with the username and password (created in RADIUS users) on L2TP clients.
    • Gateway/Subnet: Will need to be non-conflicting with any other networks present on the controller.
    • Name server and WINS servers: Can be left auto / blank, unless further customizing the configuration is desired.
    • Site-to-Site VPN: If you're using the "Auto" VPN type to connect sites, the L2TP VPN subnet will be included in those automatic routes if this option is selected.

4. Choose the Default RADIUS Profile from the dropdown.

5. Click SAVE.

 

Windows Setup

 

If using a Windows machine to connect to L2TP, follow these steps to set it up:

Windows 10

1. Go to Settings

2. VPN > Add VPN connection

3. See the following screenshot and fill the information requested.

 

 

Windows Authentication Setup

  1. Go to Control Panel > Network & Sharing settings > Change Adapter Settings.
  2. Right click the L2TP adapter, then go to Properties > Security.
  3. Under Type of VPN, select  Layer 2 Tunneling Protocol with IPsec.
  4. Click Advanced Settings. Select preshared key for authentication and enter it.
  5. Make sure to have the option of Allow these protocols enabled and mark the checkbox for Check Microsoft CHAP Version 2 (MS-CHAP v2), as shown in the screenshot below.
 

 

 

OS X Setup

 

 

The OS X setup is more straightforward and no authentication modifications are needed.

1. Simply go to System Preferences > Network

2. Click the + button

2.1 Interface: VPN

2.2 VPN Type: L2TP over IPsec

3. In Authentication settings enter the preshared key.

 

 

 

Additional Notes & Considerations

 

  • L2TP doesn't have a route distribution method. If the setting on the client device to route "all" traffic through the tunnel is not enabled, it will be necessary to add the manual routes on the client, to point to the USG's local networks. Search in each specific client device's documentation on how to enable sending all traffic over the VPN connection.
  • Setting up L2TP will auto add firewall rules to WAN Local in Settings > Routing & Firewall, no manual rules are required on the user end.
  • In pre-4.3.41 USG firmware, L2TP remote access VPN will not work if there are already one or more site-to-site IPsec VPNs configured. Please update to the latest firmware.
  • In controller versions prior to 5.7.22, if UPnP is configured on the USG, an ACL will need to be created to deny UDP ports 500/4500. See this Community post for more. This community post is in the Early access section of our Community, see this article to learn How to Sign Up for Early Access.
 

(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.
 
Use the following link. Replace the :XYZ with the Port number to be tested: http://portquiz.net:XYZ
 
ex: 
 

(*) Important Note: It is only a simple reference using many sources. The shown information is property of the respective owners. We don't guarantee the truthfulness of this information.
 

Windows defines two main policies, Quick removal and Better performance, that control how the system interacts with external storage devices such as USB thumb drives or Thunderbolt-enabled external drives. Beginning in Windows 10 version 1809, the default policy is Quick removal.

In earlier versions of Windows the default policy was Better performance.

You can change the policy setting for each external device, and the policy that you set remains in effect if you disconnect the device and then connect it again to the same computer port.

You can use the storage device policy setting to change the manner in which Windows manages storage devices to better meet your needs. The policy settings have the following effects:

- Quick removal. This policy manages storage operations in a manner that keeps the device ready to remove at any time. You can remove the device without using the Safely Remove Hardware process. However, to do this, Windows cannot cache disk write operations. This may degrade system performance.

- Better performance. This policy manages storage operations in a manner that improves system performance. When this policy is in effect, Windows can cache write operations to the external device. However, you must use the Safely Remove Hardware process to remove the external drive. The Safely Remove Hardware process protects the integrity of data on the device by making sure that all cached operations finish.

To change the policy for an external storage device, follow these steps:
1.- Connect the device to the computer.
2.- Right-click Start, and then select File Explorer.
3.- In File Explorer, identify the letter or label that is associated with the device (for example, USB Drive (D:)).
4.- Right-click Start, and then select Disk Management.
5.- In the lower section of the Disk Management window, right-click the label of the device, and then click Properties.
6.- Select Policies, and then select the policy you want to use.
 
Note:
If you select Better performance, we recommend that you also select Enable write caching on the device.

Important:
If you use the Better performance policy, you must use the Safely Remove Hardware process to remove the device. If you remove or disconnect the device without following the safe removal instructions, you risk losing data.

Follow these steps to automatically repair issues (including corrupted registry keys) that block you from installing or removing programs:
- Select the Download button on this page.
- In the File Download dialog box, click Run or Open, and then follow the steps in in the Program Install and Uninstall Troubleshooter.

DOWNLOAD LINK

(full article link)