Fix Brightness Control Not Working for Ubuntu


Run the command below in terminal to know what video card.

ls /sys/class/backlight/


Open a terminal and create the following configuration file:

sudo touch /usr/share/X11/xorg.conf.d/20-intel.conf

Now we need to edit this file. You can use any editor be it a terminal one or graphical.

sudo gedit /usr/share/X11/xorg.conf.d/20-intel.conf

Add the following lines to this file:

Section "Device"
        Identifier  "card0"
        Driver      "intel"
        Option      "Backlight"  "intel_backlight"
        BusID       "PCI:0:2:0"
EndSection


Save it. Restart the system and

Reset your password on Ubuntu

When you’re ready to reset your password on Ubuntu, continue below.

Quickly press and hold the Shift key, which will bring up the GNU GRUB menu. (If you see the Ubuntu logo, you've missed the point where you can enter the GRUB menu.)

First power on your Ubuntu machine. At the boot menu, you’ll have few seconds to choose the Ubuntu OS to boot into. When prompted, choose *Advanced options for Ubuntu
advanced options for ubuntu
Next, select Ubuntu, with the latest kernel version (recovery mode) to boot into. The recovery mode is used to recover your system on Ubuntu and perform other tasks like resetting your password and updating your system if you can’t boot into it.
advanced options for ubuntu boot menu
Then select the root option to drop into the root shell prompt. In this shell, you have read-only access. In order to run administrative commands, you must remount the shell with read and write permission.
advanced ubuntu boot menu
Next, remount the shell with read and write option. To do that, run the commands below.

mount -rw -o remount /

After running the above commands, the shell should be remounted with read/write permission. Now you can run limited sets of commends, including password change commands as the root user.

To change or reset your forgotten password, run the commands below.

sudo passwd username

Replace username with your account name or user name for the machine. If you have to root account enabled, you should replace username with root to change the root password.

When you run the above commands, you’ll be prompted to create and confirm a password for the account name you mentioned. create it and you’re done.

When you’re done, type reboot to restart your machine.

Fix invisible mouse in ubuntu 14.04


Fixing this problem is rather too easy. Open a terminal by using shortcut keys Ctrl+Alt+T and run the following command


gsettings set org.gnome.settings-daemon.plugins.cursor active false

Install OS X Yosemite via Bootable USB Flash Drive


How to Create Bootable USB Flash Drive

First, create bootable USB flash drive. Here is how you do it, courtesy of Redmond Pie:


  • Plug in your USB drive into the computer and open Disk Utility (in Applications).
  • Select the USB drive from the left sidebar and click on Erase tab.
  • Choose Mac OS Extended (Journaled) in the format box and let the name be Untitled (default).
  • Now click on Erase button and wait until the format process completes.
  • Then choose Partition tab and select 1 Partition from Partition Layout dropdown menu. Click on Option and ensure GUID Partition Table is selected as the partition scheme, with its name set to Untitled.
  • After downloading the OS X 10.10 Yosemite instakker from the Mac App Store, just quit the installer and set the downloaded file's name to Install OS X Yosemite.app.
  • Launch the Terminal app (in Applications/Utilities) and type or paste the following command in, and then hit Enter:



sudo /Applications/Install OS X Yosemite.app/Contents/Resources/createinstallmedia --volume /Volumes/Untitled --applicationpath /Applications/Install OS X Yosemite.app --nointeraction

Note: The code above has missing double dashes in the quotes. Please replace a single "-" with "- -" when you enter the above command line in the terminal.

This will create the bootable USB flash drive. This takes between 10-20 minutes. Do not interrupt the Terminal or eject the flash drive during the process. Once the process completes, you will see the message "Copy Complete. Done."
The OS X Yosemite bootable USB flash drive will be ready for use and you can start the clean installation process.

How to Clean Install OS X Yosemite on Your Mac

Step 1: Ensure the bootable USB flash drive is plugged into your Mac and restart the computer. As soon as the start-up chime plays, press the Option key (Alt).

Step 2: Choose the USB drive on the start-up drive selection screen and hit Enter/Return on the keyboard.

Step 3: Wait until the Yosemite installer appears on screen. This could take a few seconds or minutes.

Step 4: Click on Disk Utility and then hit Continue.

Step 5: Click on Macintosh HD from the left hand-side pane and then hit Erase tab on the top-right portion of the window. Leave all the settings at their default values and then hit Erase button at the bottom right. This will wipe all files stored on your startup hard drive.

Step 6: When the erasing process is complete, return to the first screen where you selected Disk Utility. Now click on Install OS X and then hit Continue.

Step 7: Choose the Macintosh HD partition you erased in step 5 and then click Install.

If you have followed all the steps correctly, your computer should now boot right into the newly installed operating system, OS X Yosemite, and you could cherish its stunning new UI

install only from App store or from trusted developers -- MAC

Option 1:

 System Preferences > Security & Privacy > General > Allow applications downloaded from > Anywhere

Option 2:

1.  Hold down "control" button
2.  Click on the app that is triggering the message about the security preferences
3.  Select "open" to override and install/open the application

This allows you to avoid changing the security setting to "anywhere."
i think this 2 options may help

no option to add affinity group to virtual network azure

This option have intentionally been replaced by the Region/Location as you said.
Regional Virtual Networks are supposed to be more appropriate than affinity groups.


Obviously, if you still want to bring back the Affinity group, then try this:
Create a Virtual Network from the Management Portal Download the Virtual Network Configuration File
Edit the appropriate file section to get

VirtualNetworkSitename="VNetDemo" AffinityGroup="VNetDemoAG"


instead of

VirtualNetworkSitename="VNetUSWest" Location="West US"

Then, delete the previously created virtual network and import your file in the management portal to recreate the network with your defined settings

Boot-Repair Ubuntu

Getting Boot-Repair
1st option : get a disk including Boot-Repair
The easiest way to use Boot-Repair is to create a disk containing the tool (eg Boot-Repair-Disk, a disk starting Boot-Repair automatically), and boot on it.

Remark : it is recommended to install the ISO on a live-USB (eg via UnetBootin or LiliUSB or Universal USB Installer). Do not burn it on a DVD if your computer has Windows8 pre-installed, or if your boot is in EFI mode.

2nd option : install Boot-Repair in Ubuntu
- either from an Ubuntu live-session (boot your computer on a Ubuntu live-CD or live-USB then choose "Try Ubuntu") or from your installed Ubuntu session (if you can access it)

- connect to the Internet

- open a new Terminal, then type the following commands (press Enter after each line):


sudo add-apt-repository ppa:yannubuntu/boot-repair
sudo apt-get update
sudo apt-get install -y boot-repair && boot-repair
Using Boot-Repair
Recommended repair
launch Boot-Repair from either :
the Dash (the Ubuntu logo at the top-left of the screen)
or by typing 'boot-repair' in a terminal
Then click the "Recommended repair" button. When repair is finished, note the URL (paste.ubuntu.com/XXXXX) that appeared on a paper, then reboot and check if you recovered access to your OSs.

If the repair did not succeed, indicate the URL to people who help you by email or forum.

Windows Phone Hard Reset

To reset an unresponsive phone

If your phone is unresponsive and you can't reach Settings Settings icon, you may be able to reset your phone using the hardware buttons. On Nokia Lumia phones (and some others), do the following to reset your phone:
  1. Press and hold the Volume down Volume down button and PowerPower button buttons at the same time until you feel a vibration (about 10-15 seconds).
  2. When you feel the vibration, immediately press and hold the Volume down Volume down button button until you see a large exclamation mark.
  3. Once the exclamation mark appears, press the following four buttons in this order: Volume up Volume up buttonVolume down Volume down buttonPower Power buttonVolume down Volume down button. Your phone should now reset and restart itself. (It might take a while for the reset to finish.)

How to factory reset Moto G (2nd generation)

How to soft reset a Moto G

  • Turn your phone on and unlock the screen.
  • Access the Settings app.
  • Scroll down and tap on “Backup & reset”.
  • Tap on “Factory date reset”.
  • Select “Reset phone”.
  • Let the phone do its thing. It will restart once it’s done.

How to hard reset a Moto G

  • Turn off the phone.
  • While off, press and hold the Volume Down button for 2-3 seconds, then press the Power button and release.
  • The device will display different booting options.
  • Use the Volume Down button to scroll to “Recovery” and press Volume Up button to select.
  • The phone should display a Motorola logo, as well as the Android in Distress image.
  • Press and hold Volume Up for 10-15 seconds.
  • While still holding the Volume Up button, press and release the Power button.
  • From here, you can use the Volume buttons to navigate and the Power button to select.
  • Select “Wipe data / factory reset”.
  • Select “YES – delete all user data”.
  • Once the formatting is complete, press the Power button to confirm a reboot.

How to Insert Google Analytics Tracking Code into a Blogger Template - Guide


To insert Google Analytics Tracking Code into a Blogger Template is fairly easy to do.
First Add your BLOG to Google Analytics:
Steps: 
Log in to your Google Analytics account
In Google Analytics click on “Add Website Profile” under your current web-site.
Select “Add a Profile for a new domain” and then enter the URL (domain name) in text box next to where “http://” is listed (write it like “myblog.blogspot.com”) and hit “Continue”
Highlight the tracking code and copy it to your clipboard
There are two ways to integrate Google Analytics Tracking Code in Blogger
1st Method
You can track traffic to your Blogspot domain on Blogger with Google Analytics. Follow these steps to add the tracking code. 
Log in to your Blogger account.
Navigate to your blog's Settings > Other tab.
If you already have a Google Analytics account, simply enter your blog's Google Analytics Web Property ID (The property ID is a string like UA-000000-01)
Click Save to finish.
2nd Method
Adding Code Manually 
Log in to your Blogger account.
Look for Template
Click Template
Select the 'Edit HTML' tab
Scroll to the bottom of the code.

Find the
tag^ (closing head tag)
Copy and paste Analytics tracking code, just before the closing
tag^. 
Click 'Save Template.'

Windows 8.1 restore your PC to factory settings

Windows 8.1  features to restore your computer to factory settings. The procedure is as follows:
  • Open the Charms bar > Settings > Change PC settings > Update and Recovery.
  • Go to the Recovery section and choose one of the below options:
    • Refresh your PC without affecting your files.
    • Remove everything and re-install Windows (restore to factory settings).

Step By Step Guide To Setup Windows 7/Vista VPN Client to Remote Access

Create the L2TP Connection in User Machine
Go to Start > Control Panel > Network and Sharing Center and click Setup a new connection or network. Follow further steps as per screens shown below.
 
 
 
 

Configure Authentication Mechanism of the L2TP Connection

After Connection is established, click the Network symbol on the System Tray and right-click the connection created as above. Click Properties to open the Properties window.

Switch to Security tab and click Advanced Settings under Types of VPN.
 

In the L2TP tab, select Use preshared key for authentication and specify the key configured in Cyberoam.
    
Click OK to save settings.

Connect

Doubel the VPN connection and click "Connect" button.

Connect successful

Configure Port Forwarding using Virtual Host to access devices on Internal network Cyberoam firewall

Throughout the article we will use the network parameters shown in the network diagram given below. Outbound traffic from LAN and DMZ is allowed while inbound traffic is restricted. The Web Server is hosted in the DMZ.

Network components
External IP address (Public)
IP address (Internal)
Web server
1.1.1.1
192.168.1.2 (Mapped)

For virtual hosts:

External IP: IP address through which Internet user’s access internal server.
Mapped IP: IP address bound to the internal server.
 

Configuration
You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s).
Step 1: Create Virtual Host for Web server
Go to Firewall > Virtual Host > Virtual Host and click Add to add virtual host for Web Server with the parameters as specified in the table below.

Parameters
Value
Description
Basic Settings
Name
WebServer
IP Family
IPv4
Select the IP Family.
Available Options:
·        IPv4
·        IPv6
External IP
1.1.1.1

Specify the external/public IP address on which the Host will be accessed.
Mapped IP
192.168.1.2
Specify the Internal/privateIP Address of the Web Server.

Physical Zone
DMZ
Specify the zone in which the host resides
Port Forwarding
Enable Port Forwarding
Enabled
Click to enable the service of port forwarding.
Protocol
TCP
Select the protocol TCP or UDP that you want the forwarded packets to use.
External Port Type
Port
Select the type of external port from the available options:

Available Options:
• Port
• Port Range
• Port List
External Port
80
Specify public port number for which you want to configure port forwarding.
Mapped Port Type
Port
Mapped Port Type - Select the type of mapped port from the available options:

Available Options:
• Port
• Port Range
• Port List
Mapped Port
80
Specify mapped port number on the destination network to which the public port number is mapped.



Click OK and the Virtual Host for Web_Server will be added successfully.

On clicking OK, the Add Firewall Rules For Virtual Host screen appears which allows you to create firewall rules to allow access to Web_Server from other zones such as WAN zone.

Enable Add Firewall Rule(s) For Virtual Host and set rule parameters as desired.

 

Click Add Rule(s) to add the firewall rule.

Note:

-      In the given example, Virtual Host configuration for Web Server is shown. Virtual Host for other servers like Mail Server, FTP Server or
       Database Server can be   created similarly.

-      While adding the Firewall Rule for the Virtual Host, it is recommended to allow only the required services corresponding to the
       Server for security of the hosted server.
Step 3: Verify Firewall Rule(s)
To verify the Firewall Rules, go to Firewall > Rule > IPv4 Rule. Click to expand the DMZ – DMZ DMZ – WAN and WAN – DMZ firewall rules. As shown in the image, three firewall rules are created for the virtual host of Web Server as shown in the image below.
 
1. Auto: Allows traffic from WAN to Server
2. Reflexive: Ensures that traffic from Server to WAN is NATted.
3. Loopback: Allows access to server from the same zone, LAN or DMZ, in which Server is placed.

 

Configuring Ruckus ZoneDirector for Wireless Guest Access

I recently converted my standalone Ruckus Access Point to controller based mode. The specific model of controller I am using is the ZoneDirector 1100 running software version 9.5.1.0s I wanted to expand the capabilities of my wireless network and allow temporary Wireless Guest access. The process was quite intuitive and I found the ZoneDirector interface easy to navigate. This article will walk through the process I used for configuring a Wireless Guest network using the Ruckus ZoneDirector.

ZoneDirector Interface

The ZoneDirector interface is fairly simple. After connecting to the web interface need to login as administrator. Once login can see few tabs on top like Dashboard, Monitor, Configure, and Administrator.  After choosing Configure tab, a vertical menu appears on the left side of the page. Most of the configuration found within the WLANs, Users and Guest Access tabs.

Configuring Guest Access

The Guest Access option on the left side vertical menu provides access to the parameters that will control the behavior seen right after a guest connects to the wireless network. The first option I chose forces users of the guest network to authenticate. As shown below, I have also enabled a feature that allows the creation of “shared” credentials and checked the option to display a legal disclaimer.

Guest Access
All other parameters on this page were left to their default settings. I do want to mention the restricted subnet section allows for traffic filters to be configured. By default, communications to all private addresses is filtered.
Configuring the Guest WLAN
After configuring the appropriate Guest Access parameters, the next step involved creating a WLAN (which is bound to an SSID) to enable as a “Guest” network. The one I created is called PGUEST. This was done by clicking WLAN and Create New. Then I simply filled out the applicable information. Under Type, I changed the radio button to Guest Access. I left Wireless Client Isolation set to Full to provide protection between wireless clients.
Worth noting, I left Authentication set to open and Encryption Method set to None. This does not provide any encryption to your guest users. If you have regard for the privacy of your guest users, this should be rectified by choosing a current authentication and encryption method. While this will increase the difficulty of the connection process for the users, it will further secure the wireless environment.

Create User Account for Creating Access Tokens

At this point, the only thing left is to generate some guest password tokens and test the process. A prerequisite to this is creating a local user account that will be used to request access tokens for the Guests. The default administrative account doesn’t seem to have that ability. These local user accounts are not required for the guests. I created the an account by choosing Users from the horizontal menu, then clickingCreate New.

Creating Guest Passwords

Using the newly created user account, guest passwords can be generated by pointing a browser toward the following url.
https://192.168.0.2/guestpass  (where 192.168.0. is the ZoneDirector IP Address)
After authenticating with the local user account, a web form will be presented. I created a token for a fictitious user. If more than one guest network is configured, it is important confirm that the correct one is shown. After clicking Next, the interface presents the option to view and print the instructions  and password for the guest users.

Testing Guest Network

To test, I simply connected to the PGUEST SSID. The first access to a website was properly intercepted and redirected. The redirected page prompted for the Guest Password. After entering the provided password, I was presented with the terms of use. Accepting the terms allowed me to access the Internet but restricted access to all other internal IP addresses.

Windows 7 black screen with moving cursor

1) When you switch ON your computer, start tapping the "F8" key to get 

2) Select "Safe Mode with Networking" 

3) Click on Start --> Run --> Type regedt32 and press Enter. 

Registry Editor will be opened. Navigate to the following location 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon 

At the right side, find the strings shell & userinit and check the following 

shell value data should be 
Explorer.exe 

userinit value data should be 
C:\WINDOWS\system32\userinit.exe, 

If shell and userinit are having different data values then change it as mentioned 

above. 

Just double click shell and userinit and enter the data values as 

shell --> "Value data" should be 
Explorer.exe 

userinit --> "Value data" should be 
C:\WINDOWS\system32\userinit.exe, 

Note: there is "," at the end of userinit.exe 

Then download "Malwarebytes' Anti-Malware" 

Update it and perform "Full Scan" 

Remove software that affects Chrome

The Software Removal Tool is available for Windows users only.
If you notice Chrome behaving strangely (for example, showing you unusual startup pages, toolbars, or pop-up ads you can’t get rid of), it may be due to an unwanted program on your computer.
You may be able to fix the problem by downloading and running the Software Removal Tool. Think of this as a “factory reset” of Chrome. It restores Chrome's original settings and removes programs that affect its behavior.

Set up the Software Removal Tool

The Software Removal Tool scans your computer for programs known to cause problems with Chrome, and then offers to remove them for you.

Download

  1. Visit the Software Removal Tool homepage.
  2. Click the Download button.
  3. Review the Terms of Service and Privacy Policy. To agree, click Accept and Install.
The Software Removal Tool will download to your computer.

Scan your computer for unwanted programs

  1. Open the Software Removal Tool. It will immediately start searching your computer for suspicious programs.
  2. A message will tell you how many programs were found, if any.
  3. Click Remove suspicious programs. Wait until you see the message "Removal complete." Some open applications may be closed in the process.
  4. Click Continue to quit the tool. (If your computer needs to reboot, the button will say Restart.)
  5. Chrome will automatically reopen, asking you to reset your browser settings. Click Reset.

PowerPoint found a problem with content in xxxx.ppt__PowerPoint can attempt to repair the presentation

Problem with Office-2010 PowerPoint-2010
I am trying to download a powerpoint file from a web tool. After downloading when I try to open the file I get the blah blah "PowerPoint can attempt to repair the presentation." When I clicked repair it gave another error message that "There was an error access the file".
After a lot of looking around I HAVE FOUND THE SOLUTION. The "Protected View" settings in PowerPoint has to be changed to be able to consider the web downloaded presentations as safe and viewable. Here is how I did it:
1. Open PowerPoint 2010 -> Click on File -> Options
2. On the side tab click on "Trust Center" -> Now click on "Trust Center Settings" which is in the right window.
3. It opens a new window "Trust Center"
4. Click on "Protected View" on the left side panel.
5. Uncheck "Enable protected view for files originating from the internet". - Click OK and OK
This should get rid of "repair my ____" error and open the ppt file.