Featured

How to Install Linux and Python on iPhone or iPad

You want to access Linux and do the code with Python on the go. You do have a computer around and the only device that you have is iPhone or iPad. I will show you how to install Linux and Python below. Let’s get started! Solution – Step by Step…

Featured

How to Transfer the Files quickly from one device to another – Windows, Apple, Android and Linux

Background We took photos or screenshots on the iPhone and want to transfer the files to a desktop running on Windows. Usually, we utilise the Apple iCloud that we have, but then it needs time to push the files into the cloud and download them. Then, we found that you…

Featured

How to Install Windows 11 on macOS Big Sur using Boot Camp

Background We have this legacy Apple MacBook Pro (Retina, 15-inch, Late 2013 model), an Intel processor 2.3 GHz Quad-Core Intel Core i7. Previously, this device was in production running Boot Camp for Windows 8.1, and this machine was never attempted to upgrade to Windows 10 or 11. Solution Requirement Apple…

Featured

How to Download the Bill files in Telstra MBRS using Microsoft Edge

Background As Telstra MBRS portal is a legacy system and has no update for handling a modern browser and Internet Explorer has been decommissioning for a while now, it is a challenge to download the bill file using non-IE browsers. The issue is that when you click the download, a…

Featured

How to Find the Vulnerability in Small Office Home Office (SOHO) Network

Background As work-from-home increased since the Covid, securing the small office home office (SOHO) network is quite challenging. Solution Firstly, we get the public IP of the network that we would like to test via IPChicken. Easy Test The quick and free solution is to use the tools from PennTest…

Featured

How to Solve Microsoft Support Diagnostic Tool Vulnerability

Background We have been following one of YouTube’s IT security channels, and they mentioned Zero Day in relation to Microsoft Office (Follina). After researching this, we found that the vulnerability is actually related to Microsoft Support Diagnostic Tool. The detail of the attack is mentioned on this – https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e Temporary…

Featured

How to Install and Configure OpenVPN on Ubuntu

Background Over time, we use multiple VPN products such as ExpressVPN and IPVanish and they are excellent products. But then we found that it’s underutilised so we decided to find alternative but cost-effective. We found OpenVPN which is open-source. Since we have multiple virtual machines in the clouds, we decided…

I'm not a tech guy. I'm looking at the technology with the eyes of my customers, normal people's eyes.
- Jack Ma - Chinese Businessman

Featured
Featured

Useful Commands to Manage via Remote Monitoring Management

Background We are getting used to the Remote and Monitoring Management (RMM) portal and looking at the information for the device is quite simple. However, some specific information is not available and the only way to get is by remoting to the machine. Sometimes the user at the other end…

Featured

How to Harden Router Security for Home/Office in 2022

Background As configured more routers on-site either in the office or home-office environment, we started to compile on how to harden the router for protection from hackers or attackers. Router hardening is an IT security term that essentially means locking it down for maximum security. Solution Many router brands are…

Featured

How to Harden the Ubuntu Server in 2022

As we spun out more virtual machines on the cloud for web and application hosting and started managing this environment ourselves, we began compiling our own guide on how to harden an Ubuntu server for better protection from hackers. Here is the setup: Enabling Automatic Updates Most servers get hacked…

Featured

How to do a Shortcut Accessing Office 365 Redeem Product Key

Background We’ve been using Office 365 since 2009 and we never missed the redeem Office 365 product key from our Microsoft Partner program (Microsoft Action Pack Subscription, Silver Membership or Golf Membership). Unfortunately, we missed by a day to redeem this and all procedure that we follow is out of…

Featured

What do you need to know about HP Laptop Extended Warranty (Post Warranty)

Background As dealing with a standard corporate 3 years onsite warranty on all laptops/desktops, the client has a corporate policy change that needs to implement. We need to extend to have 5 years on-site warranty in total. The challenge is that with HP you can not just purchase any time…

Featured

How to make a PDF searchable

Background When the original PDF document is converted using any third-party application like DocuSign for the filing system, the PDF content is not searchable anymore. The Adobe Acrobat Reader is not able to search any text. To make it searchable, you need to have an Adobe Acrobat Professional. Steps Open…

Featured

How to create a Cryptocurrency Token based on Solana Coin

Background I have always wanted to create a crypto coin/token. I am curious how people create this. After exploring, turn out the easy one is to create a token instead of a coin. What is the difference between these two? The main difference is that creating a coin is like…

Featured

How to Change the Resolution in Kali Linux using Hyper-V

The Environment Kali Linux Virtual Machine (VM) running on Windows 11 Hyper-V Challenge Not be able to figure out in the Hyper-V or in the Kali itself to change the current resolution. The default is very small. Solution Log in to Kali virtual machine. Run the command line: sudo vi…

Featured

Linux Commands – Quick Cheat Sheet

Having a quick cheat sheet is quite handy. ManualUserDirectory/FilePermissionNetworkServicesInstalling and Updating Tools Manual See the manual for command: man User To find the current user: whoami To change the password: passwd To switch users: su To add a user: adduser /etc/passwd, /etc/shadow To run as a sudo admin: sudo [command]…

Featured

How to Install the Kali Linux on Windows 11 via Hyper-V

Environment These are the current environment: Custom PC machine with AMD Chip and Gigabyte motherboard.Microsoft Windows 11. Kali Linux Open up a browser and go to https://kali.org Kali Linux Website On the top navigation, click the Get Kali option. Select the Bare Metal option below. Ensure to the iso download…

Featured

Windows 11 Journey in 2022: From Preparation and Upgrade to Operational

As Windows 11 came out around October 2021 and as an IT professional, we are very reluctant to implement this into production as yet, usually, we wait till 1 year or so. However, we love the new thing and love to try them out. So we decided to test on…

Featured

Troubleshoot the index keeps rebuilding and Understanding the Indexing Option, Indexing Status, and Searching Windows on Windows 10

We found this issue where the indexing keeps rebuilding every now and then. This caused the Outlook search to stop working as well as the Unread/Read tab. Usually, the Event Viewer is a good start for pointing out the index/search issue. This time, however, we could not pinpoint the exact…

Featured

How to create a favicon for the website quickly

As managing many Dewacorpian websites, creating a favicon is quite tedious especially if you go to a design phase via photoshop and then convert to a .ico logo. Solution – How to create a favicon In my case, our logos are simple and just straight writing and has no special…

Featured

How to Force-Close an App on Apple TV

This blog explains how force-close an app on your Apple TV that’s giving you an issue by force-closing the app, which can solve the problem. Solution – How to Force-Close Apple TV You need to force-quit an app if it is not responding. To perform this action: On the Apple TV…

Featured

Get the Answers about Cardano (ADA) – The Next Big Thing in Blockchain Technology

As I’m starting to follow this cryptocurrency in particular Cardano (ADA), I found a lot of questions that I did not know. So, I did some research as well as participated on Reddit to get some answers. Questions and Answers Here are some questions and will…

Featured

How to mine Cardano ADA Crypto on Windows 10

Just to be clear, you are not mining the Cardano (ADA) coin directly. You use another cryptocurrency to mine via the Unminable.com website and then payout with Cardano (ADA) coin. I assume that you know the basic information about the Cardano (ADA) coin itself. If you don’t,…

Featured

Unboxing and Setup Monitor Arm Desk Mount. Dewapost Garage.

We’ve researched this for a while – a monitor arm desk mount that can pu the second monitor on top one. Finally, we found it, unboxed and setup. We used it on our production environment. Love this gadget? Love to use this at home, home office or work with easy…

Featured

How to Stop Microsoft Internet Explorer redirecting to Microsoft Edge

Windows 10 now comes with two browsers, the old Internet Explorer and the Edge browser, which is a newer generation chromium-based browser. The Internet Explorer is supported until 2023. Obviously, Edge is Microsoft’s favourite and will update periodically for security improvements. Internet Explorer sometimes struggles to correctly load dynamic web…

How to Install the Webmin on Ubuntu 20.04

Background We spin a few Virtual Machines on Microsoft Azure for the internal network, and the image has no Webmin installed by default – not like in this previous post – A Complete Setup Guide for Contabo VPS Ubuntu 20.04 with preinstalled Webmin + LAMP. Webmin is a web-based tool…

How to Do Memory Test using MemTest86 Utility

Background We have this Dell laptop that has many issues, mainly the way the user treats this laptop and the home environment. The device has been a tremendous “surgery” from replacing the motherboard for few times and replacing the RAM bracket. But the underline issue is jamming or freezing, and…

How to Build Enterprise .Net Core Web API 6

Initial Setup Applications Microsoft Visual Studio 2022GitHubPostmanDatalust SeqMicrosoft SQL Server 2019 Express EditionMicrosoft SQL Server Management Studio (SSMS) with Azure Data Studio Services CORS Under the Program.cs add the additional services for Cors: builder.Services.AddCors(options => { options.AddPolicy(“AllowAll”, b => b.AllowAnyHeader() .AllowAnyOrigin() .AllowAnyMethod()); }); Serilog Under Manage NuGet packages, installed: Serilog.AspNetCore…

How to Fully Charge a New Car Battery when it’s Flat?

Background My car’s battery ran flat due to accidentally turning on the inside lights and forgetting to turn them off. I called the NRMA road assistance and was lucky they came within 10 minutes. They knew that I just had a new battery installed, and they checked, and 0% left.…

What are the Verification steps for Accessing Citrix ShareFile

Background We gave access to a particular folder within the client extranet in Citrix ShareFile to multiple organisations. The process is straightforward; a small proportion of users cannot access this. Solution Here’s the step-by-step: Account Verification First, you receive confirmation from the Citrix ShareFile administrator that they give you access.…

How Secure is the Email Connection from End to End

Background There was a perception the email was somehow not secure end to end, and the hacker could sniff around the email package. Solution Most of the email servers, the hosted one especially, implemented the Transport Layer Security (TLS), a cryptographic protocol designed to provide communications security over a computer…