When setting up a Cisco wireless network using the Cisco Mobility Express virtual wireless LAN controller (WLC), we ran into problems getting the WLC to accept join requests from new access points. The WLC commands we used for troubleshooting were: show ap join stats summary all – This showed us all the new access points […]
Every now and then, we run into weird and unprecedented WordPress problems and the below scenario presents one that we encountered in October 2020. All of a sudden, many of our clients were unable to log on to their WordPress sites. This also affected our WordPress admin accounts. WordPress just said: ”Invalid username or password”. […]
some webcams cause blue screens in Windows 10 due to faulty drivers
After installing iCloud for Windows, you will be offered an option to add your iCloud email account to Microsoft Outlook. Sometimes, the process stops with an unknown error of 0x80040102. In our experience, this normally happens if your Outlook profile contains a single IMAP-based email account (like Gmail). To solve the issue, add a blank […]
If you are setting up a WPA2 enterprise Wifi network using Windows Network Policy Server and RADIUS, make sure that the NPS server is using a trusted certificate where the name of the NPS server is explicitly mentioned in the certificate. If you are attempting to use a wildcard certificate on your NPS server, Windows […]
With Windows Server 2008 and 2008r2 nearing their end-of-life dates, upgrading older servers to a modern operating system is a pretty common task. If installing a new virtual 2019 server from scratch and migrating its data + services across from the old 2008 server isn’t an option, there’s an in-place upgrade path from Windows Server […]
BitLocker can’t be enabled, because the hard disks are using the MBR partitioning scheme.
The partioning scheme can’t be changed from MBR to GPT because Microsoft’s tool mbr2gpt says the disk layout is invalid.
The disk layout is difficult to fix, because the boot partition and the Windows partition sit on separate disks
One of our clients notified us that they were facing CAPTCHA challenges/images on a more and more frequent basis during regular web surfing. An ever-increasing share of their outgoing emails was also being rejected as spam. A quick look-up at http://cbl.abuseat.org showed that their public IP had been blacklisted for partaking in a bot net […]
Summary: Using RegEx in MySQL to clean up an infected database Requirements: MySQL 8.0+ or Maria DB. phpMyAdmin or MySQL console access. There are many guides out there explaining how to clean up the actual WordPress PHP / HTML files after a site has been hacked. However, I have not found any good instructions on […]
General Data Protection Regulation (GDPR) EU’s General Data Protection Regulation (GDPR) specifies requirements for how personal data is collected, stored, processed, and deleted. All companies that interact with individuals or corporate entities within the EU are affected by GDPR. To help lead you down the right path, we provide tools and guidance to facilitate ease […]