Windows 8.1 restore your PC to factory settings

Windows 8.1  features to restore your computer to factory settings. The procedure is as follows:
  • Open the Charms bar > Settings > Change PC settings > Update and Recovery.
  • Go to the Recovery section and choose one of the below options:
    • Refresh your PC without affecting your files.
    • Remove everything and re-install Windows (restore to factory settings).

Step By Step Guide To Setup Windows 7/Vista VPN Client to Remote Access

Create the L2TP Connection in User Machine
Go to Start > Control Panel > Network and Sharing Center and click Setup a new connection or network. Follow further steps as per screens shown below.
 
 
 
 

Configure Authentication Mechanism of the L2TP Connection

After Connection is established, click the Network symbol on the System Tray and right-click the connection created as above. Click Properties to open the Properties window.

Switch to Security tab and click Advanced Settings under Types of VPN.
 

In the L2TP tab, select Use preshared key for authentication and specify the key configured in Cyberoam.
    
Click OK to save settings.

Connect

Doubel the VPN connection and click "Connect" button.

Connect successful

Configure Port Forwarding using Virtual Host to access devices on Internal network Cyberoam firewall

Throughout the article we will use the network parameters shown in the network diagram given below. Outbound traffic from LAN and DMZ is allowed while inbound traffic is restricted. The Web Server is hosted in the DMZ.

Network components
External IP address (Public)
IP address (Internal)
Web server
1.1.1.1
192.168.1.2 (Mapped)

For virtual hosts:

External IP: IP address through which Internet user’s access internal server.
Mapped IP: IP address bound to the internal server.
 

Configuration
You must be logged on to the Web Admin Console as an administrator with Read-Write permission for relevant feature(s).
Step 1: Create Virtual Host for Web server
Go to Firewall > Virtual Host > Virtual Host and click Add to add virtual host for Web Server with the parameters as specified in the table below.

Parameters
Value
Description
Basic Settings
Name
WebServer
IP Family
IPv4
Select the IP Family.
Available Options:
·        IPv4
·        IPv6
External IP
1.1.1.1

Specify the external/public IP address on which the Host will be accessed.
Mapped IP
192.168.1.2
Specify the Internal/privateIP Address of the Web Server.

Physical Zone
DMZ
Specify the zone in which the host resides
Port Forwarding
Enable Port Forwarding
Enabled
Click to enable the service of port forwarding.
Protocol
TCP
Select the protocol TCP or UDP that you want the forwarded packets to use.
External Port Type
Port
Select the type of external port from the available options:

Available Options:
• Port
• Port Range
• Port List
External Port
80
Specify public port number for which you want to configure port forwarding.
Mapped Port Type
Port
Mapped Port Type - Select the type of mapped port from the available options:

Available Options:
• Port
• Port Range
• Port List
Mapped Port
80
Specify mapped port number on the destination network to which the public port number is mapped.



Click OK and the Virtual Host for Web_Server will be added successfully.

On clicking OK, the Add Firewall Rules For Virtual Host screen appears which allows you to create firewall rules to allow access to Web_Server from other zones such as WAN zone.

Enable Add Firewall Rule(s) For Virtual Host and set rule parameters as desired.

 

Click Add Rule(s) to add the firewall rule.

Note:

-      In the given example, Virtual Host configuration for Web Server is shown. Virtual Host for other servers like Mail Server, FTP Server or
       Database Server can be   created similarly.

-      While adding the Firewall Rule for the Virtual Host, it is recommended to allow only the required services corresponding to the
       Server for security of the hosted server.
Step 3: Verify Firewall Rule(s)
To verify the Firewall Rules, go to Firewall > Rule > IPv4 Rule. Click to expand the DMZ – DMZ DMZ – WAN and WAN – DMZ firewall rules. As shown in the image, three firewall rules are created for the virtual host of Web Server as shown in the image below.
 
1. Auto: Allows traffic from WAN to Server
2. Reflexive: Ensures that traffic from Server to WAN is NATted.
3. Loopback: Allows access to server from the same zone, LAN or DMZ, in which Server is placed.

 

Configuring Ruckus ZoneDirector for Wireless Guest Access

I recently converted my standalone Ruckus Access Point to controller based mode. The specific model of controller I am using is the ZoneDirector 1100 running software version 9.5.1.0s I wanted to expand the capabilities of my wireless network and allow temporary Wireless Guest access. The process was quite intuitive and I found the ZoneDirector interface easy to navigate. This article will walk through the process I used for configuring a Wireless Guest network using the Ruckus ZoneDirector.

ZoneDirector Interface

The ZoneDirector interface is fairly simple. After connecting to the web interface need to login as administrator. Once login can see few tabs on top like Dashboard, Monitor, Configure, and Administrator.  After choosing Configure tab, a vertical menu appears on the left side of the page. Most of the configuration found within the WLANs, Users and Guest Access tabs.

Configuring Guest Access

The Guest Access option on the left side vertical menu provides access to the parameters that will control the behavior seen right after a guest connects to the wireless network. The first option I chose forces users of the guest network to authenticate. As shown below, I have also enabled a feature that allows the creation of “shared” credentials and checked the option to display a legal disclaimer.

Guest Access
All other parameters on this page were left to their default settings. I do want to mention the restricted subnet section allows for traffic filters to be configured. By default, communications to all private addresses is filtered.
Configuring the Guest WLAN
After configuring the appropriate Guest Access parameters, the next step involved creating a WLAN (which is bound to an SSID) to enable as a “Guest” network. The one I created is called PGUEST. This was done by clicking WLAN and Create New. Then I simply filled out the applicable information. Under Type, I changed the radio button to Guest Access. I left Wireless Client Isolation set to Full to provide protection between wireless clients.
Worth noting, I left Authentication set to open and Encryption Method set to None. This does not provide any encryption to your guest users. If you have regard for the privacy of your guest users, this should be rectified by choosing a current authentication and encryption method. While this will increase the difficulty of the connection process for the users, it will further secure the wireless environment.

Create User Account for Creating Access Tokens

At this point, the only thing left is to generate some guest password tokens and test the process. A prerequisite to this is creating a local user account that will be used to request access tokens for the Guests. The default administrative account doesn’t seem to have that ability. These local user accounts are not required for the guests. I created the an account by choosing Users from the horizontal menu, then clickingCreate New.

Creating Guest Passwords

Using the newly created user account, guest passwords can be generated by pointing a browser toward the following url.
https://192.168.0.2/guestpass  (where 192.168.0. is the ZoneDirector IP Address)
After authenticating with the local user account, a web form will be presented. I created a token for a fictitious user. If more than one guest network is configured, it is important confirm that the correct one is shown. After clicking Next, the interface presents the option to view and print the instructions  and password for the guest users.

Testing Guest Network

To test, I simply connected to the PGUEST SSID. The first access to a website was properly intercepted and redirected. The redirected page prompted for the Guest Password. After entering the provided password, I was presented with the terms of use. Accepting the terms allowed me to access the Internet but restricted access to all other internal IP addresses.

Windows 7 black screen with moving cursor

1) When you switch ON your computer, start tapping the "F8" key to get 

2) Select "Safe Mode with Networking" 

3) Click on Start --> Run --> Type regedt32 and press Enter. 

Registry Editor will be opened. Navigate to the following location 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon 

At the right side, find the strings shell & userinit and check the following 

shell value data should be 
Explorer.exe 

userinit value data should be 
C:\WINDOWS\system32\userinit.exe, 

If shell and userinit are having different data values then change it as mentioned 

above. 

Just double click shell and userinit and enter the data values as 

shell --> "Value data" should be 
Explorer.exe 

userinit --> "Value data" should be 
C:\WINDOWS\system32\userinit.exe, 

Note: there is "," at the end of userinit.exe 

Then download "Malwarebytes' Anti-Malware" 

Update it and perform "Full Scan" 

Remove software that affects Chrome

The Software Removal Tool is available for Windows users only.
If you notice Chrome behaving strangely (for example, showing you unusual startup pages, toolbars, or pop-up ads you can’t get rid of), it may be due to an unwanted program on your computer.
You may be able to fix the problem by downloading and running the Software Removal Tool. Think of this as a “factory reset” of Chrome. It restores Chrome's original settings and removes programs that affect its behavior.

Set up the Software Removal Tool

The Software Removal Tool scans your computer for programs known to cause problems with Chrome, and then offers to remove them for you.

Download

  1. Visit the Software Removal Tool homepage.
  2. Click the Download button.
  3. Review the Terms of Service and Privacy Policy. To agree, click Accept and Install.
The Software Removal Tool will download to your computer.

Scan your computer for unwanted programs

  1. Open the Software Removal Tool. It will immediately start searching your computer for suspicious programs.
  2. A message will tell you how many programs were found, if any.
  3. Click Remove suspicious programs. Wait until you see the message "Removal complete." Some open applications may be closed in the process.
  4. Click Continue to quit the tool. (If your computer needs to reboot, the button will say Restart.)
  5. Chrome will automatically reopen, asking you to reset your browser settings. Click Reset.

PowerPoint found a problem with content in xxxx.ppt__PowerPoint can attempt to repair the presentation

Problem with Office-2010 PowerPoint-2010
I am trying to download a powerpoint file from a web tool. After downloading when I try to open the file I get the blah blah "PowerPoint can attempt to repair the presentation." When I clicked repair it gave another error message that "There was an error access the file".
After a lot of looking around I HAVE FOUND THE SOLUTION. The "Protected View" settings in PowerPoint has to be changed to be able to consider the web downloaded presentations as safe and viewable. Here is how I did it:
1. Open PowerPoint 2010 -> Click on File -> Options
2. On the side tab click on "Trust Center" -> Now click on "Trust Center Settings" which is in the right window.
3. It opens a new window "Trust Center"
4. Click on "Protected View" on the left side panel.
5. Uncheck "Enable protected view for files originating from the internet". - Click OK and OK
This should get rid of "repair my ____" error and open the ppt file.

Not detecting Windows 7 during Install

Following are the commands I ran to make the install.

$ sudo apt-get install gdisk
$ sudo fixparts /dev/sda
and then press the key 'w'
Done!

How to remove existing wireless network profile on Mac

Step 1
Click the Apple menu then select System Preferences.
 
Step 2
When the System Preferences screen appears, please go to Internet &Wireless section and click Network.
 
Step 3
Under Network screen, please select Airport/WI-FI, and then click Advanced.
 
Step 4
Under the Airport tab, select the network which you want to remove and click on button “-”. Then click OK.
 
Step 5
Go back to Network page to select the network you want to reconnect by double clicking the network name.
 
Please type in the wireless password and click on OK.

How to remove the existing wireless network profile on Windows 8?

Removing wireless network profile may become necessary when you try to connect to a wireless network after you changed its password (without renaming it), so that it can identify the new one.

Solution 1
Step1 Click on the Wi-Fi icon at the right-hand corner in the task tray, and it will bring out all the available wireless signals;
Step 2 Right click on the existing wireless network name and select forget this network;
 Step 3 Reconnect to the wireless network.

Solution 2
 Step 1 You can also bring out all the wireless networks by a way of control panel;
Press ‘Windows key +X’, and click on Control Panel:
 
Step 2 Then click on Network and InternetàNetwork and Sharing CenteràChange Adapter Settings (on the left):


Step 3 Right click on Wi-Fi icon and locate on Connect/Disconnect, then you will see the existing wireless network:

Step 4 Remove the existing profile as mentioned in Solution 1.
Step 5 Reconnect to the wireless network.

Windows commands to show and delete wifi profiles



To show the list of profile connected 

netsh wlan show profiles


netsh wlan delete profile name="ProfileName"

Where ProfileName is the name of the profile you set while creating the connection

How to remove the existing wireless network profile in Windows 7

Step 1
Click Start->Control Panel, Select Network and Internet, and then click Network and Sharing Center
 
Step 2
In the task list, please choose Manage wireless networks.
 
Step 3
In the Network table, please select the existing profiles and click Remove.
 
Step 4
You may see a warning dialog box, just click OK.
 
Step 5
Then please go back to Network and Sharing Center and choose Change adapter settings -> right click Wireless Network Connection -> click Connect/Disconnect.
 
Step 6
Click the refresh button to view available wireless networks. Highlight the network which you want to connect, double click it or click Connect button.

How do I delete a wireless network from my list of available networks?

Windows 8
  • Access Settings and then choose the Wireless icon.
  • Right-click on the network and choose Forget this Network.
Windows 7
  • Go to Start > Control Panel > Network and Internet Network and Sharing Center
  • Choose Manage Wireless Networks from the options on the left.
  • Highlight the network from the list and choose Remove
Mac OS X (10.8)
  • Go to System Preferences Network
  • Select Wifi on the left
  • Choose the wireless network from the list & then click on the Disconnect button.
  • Click on the Advanced button
  • Select the wireless network from the list and then click on the (-) button to remove it from the list.
  • Click on the Ok button
  • Click the Apply button in the Networks