OMG! 顯示屏防窺膜自動融化了
看來用了15年的Notebook終於也不行了 幸虧還可以看得見 不幸中的大幸
#支持環保
#繼續用下去
看來用了15年的Notebook終於也不行了 幸虧還可以看得見 不幸中的大幸
#支持環保
#繼續用下去
AMD EPYC 7763 87,767
Intel Xeon Gold 6248R @ 3.00GHz 38,521
Intel Xeon E5-2690 v4 @ 2.60GHz 20,776
Intel Xeon X5650 @ 2.67GHz 5,779
Intel Xeon E5620 @ 2.40GHz 3,709
Intel Core i5-2400 @ 3.10GHz 3,821
AMD Opteron 285 956
Intel Pentium III 1.4Ghz 193
The quick fix is “Set-NetConnectionProfile –Name “Unidentified network” -NetworkCategory Private” but it won’t sustain as it will change back to Public profile after reboot.
So the easiest way to trick Windows is to assign Unidentified network property to Private!
The solution is quite easy with PowerShell
New-SelfSignedCertificate -CertStoreLocation Cert:\LocalMachine\My -DnsName “stargate.domainname.com” -FriendlyName “Stargate” -NotAfter (Get-Date).AddYears(20)
Using certmgr, make sure copy it from Personal Certificates to the Trusted Root Certification Authorities, or it won’t appear in IIS Server Certification.
Simply add the following lines to VM options
tools.syncTime 0
time.synchronize.continue 0
time.synchronize.restore 0
time.synchronize.resume.disk 0
time.synchronize.shrink 0
time.synchronize.tools.startup 0
time.synchronize.tools.enable 0
time.synchronize.resume.host 0
Seems the old Windows Server 2003 is having trouble with recent SEP v12.1 virus definition updates.
Solution is simple by restarting the SEP service.
smc -stop
smc -start
Then manually update the definition will solve all the question marks.
As expected, the installation process is almost identical to Windows Server 2012 and 2016. The key is to use BIOS version SLIC 2.5.
Except I’ve encountered a tricky problem that the valid license key won’t activate, it returns with “windows server 2019 error -xc004f069″.
It turns out the the source ISO is an evaluation copy, so all you have to do is to convert the Eval copy to Retail version by:
DISM /Online /Set-Edition:ServerStandard /ProductKey:xxxxx-xxxxx-xxxxx-xxxxx-xxxxx /AcceptEula
To determine upgrade path and other available edition:
DISM /online /Get-TargetEditions
For the evaluation/retail version of Windows Server 2016 Standard, you can also convert to the retail version of Windows Server 2016 Data Center using the same command and the appropriate product key.
DISM /Online /Set-Edition:ServerDatacenter /ProductKey:xxxxx-xxxxx-xxxxx-xxxxx-xxxxx /AcceptEula
Update: Apr 11, 2021
It turns out VM will lost its customized CPUID parameter after Veeam backup restoration, BIOS SLIC 2.5 parameter holds though.
So you have to add it back again, or the VM will keep crashing every now and then.
However, if the VM is deployed via template, then there is no problem at all.
System drive is filling up with all the unncessary hotfix files and cannot be removed? Finally the most important piece of system cleanup tools shows up in Windows Server 2008 R2
All you need to do is to copy the following two files into corresponding locations!
Cleanmgr.exe should go in %systemroot%\System32.
Cleanmgr.exe.mui should go in %systemroot%\System32\en-US.
You can now launch the Disk cleanup tool by running Cleanmgr.exe from the command prompt.
Today, I found one of the windows 7 got hacked and “Allow connections from computers running any version of remote desktop” option was grey out.
Solution is to reset the policy:
1. gpedit.msc
2. Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host, under Connections ENABLE Allow users to connect remotely by using Remote Desktop Services, then set it to Not Configured
All 3 remote desktop options are back to normal again.
It turns out my new iPad removed PPTP since iOS10 due to outdated and unsecured protocol of PPTP, and there is no 3rd party app for PPTP VPN clients for iOS12.
So the only solution without jailbreak is to upgrading my old VPN gateway (running on Windows Server 2003) from PPTP to L2TP IPSec.
Simply select “Allow custom IPSec policy for L2TP connection” and type in a Pre-shared Key in the RRAS property.
On the VPN client side, all you need to do is to select L2TP and type in the Pre-shared Key under Security tab.
Simple as that!