FAQs and Helpful tips about how to use computers.

Q?Adding Realtek R8168 Driver to an ESXi 6.0 ISO
A.

Adding Realtek R8168 Driver to an ESXi 6.0 ISO

As part of my home lab I installed ESXi 6.0 on one of my older i5 Desktops, the PC has a Realtek 8168 network card built into the motherboard.  I recently tried to upgrade it to ESXi 6.0 but it would not detect my network card and the installation would fail.  It looks like ESXi 6.0 does not include an inbox driver for this card. When I originally installed ESXi 5.0 on this PC there was an inbox driver that got installed automatically and I did not have to inject it into the iso.  Here are the steps how to inject the Realtek driver into the ISO image of ESXi 6.0.  This should work for the following NICs Realtek 8168/8111/8411/8118.

I originally tried to inject a vib taken out of ESXi 5.1U3 offline bundle but that would fail with the below error.  It looks like 5.1 vibs are not compatible with ESXi 6.0.

Operation failed:
Could not obtain module order from esximage db
The installation profile could not be validated due to the following errors:
VIB VMware_bootbank_net-r8168_8.013.00-3vmw.510.0.0.799733 is obsoleted by set([‘VMware_bootbank_misc-drivers_6.0.0-0.0.2494585’])

Add Realtek R8168 Driver into an ESXi 6.0 ISO
1.  Download the “net55-r8168-8.039.01-napi-offline_bundle.zip” file (ESXi 5.5 and 6.0 only)
My download mirror: net55-r8168-8.039.01-napi-offline_bundle.zip
2. Download ESXi-Customizer-v2.7.2.  Even though it is meant for ESXi 4.1/5.1/5.5 it works perfectly fine with ESXi 6.0 and created a usable iso.
My download mirror: ESXi-Customizer-v2.7.2.exe
ESXi 6.0 Customizer

 

 

 

 

 

 

 

3.  Use “unetbootin-windows-608.exe” to install the generated iso to a USB disk
http://unetbootin.sourceforge.net/

SOURCES:
Driver provided from this site: https://vibsdepot.v-front.de/wiki/index.php/Net55-r8168
ESXi Customizer provided from this site: http://www.v-front.de/p/esxi-customizer.html

Adding Realtek R8168 Driver to an ESXi 6.0 ISO

Q?Using ESXi Customizer on Windows 10
A.

I recently required the use of ESXi Customizer to integrate some NIC drivers into my ESXi 5.5 ISO.

Having never used it before, I was surprised to see that it was not compatible with Windows 10 but as the script is now unsupported, I understand why. I’m no programmer but it states that it is supported on Windows 8 and 8.1 so 10 should be similar enough to work so I got cracking to disable the compatibility checks and see if I could make use of it.

Once you’ve downloaded and extracted ESXi Customizer, you’ll have a bunch of files in a folder. The file we are looking for is called ESXI-Customizer.cmd and you need to open that in a text editor such as Notepad, you should be able to right-click it and choose ‘Edit’ to do this.

Then you need to find and remove the following lines:

if /I "%1"=="silent" goto :eof
if "!WinVer!"=="5.0" call :logCons --- INFO: Running on Windows 2000. What?!
if "!WinVer!"=="5.1" call :logCons --- INFO: Running on Windows XP.
if "!WinVer!"=="5.2" call :logCons --- INFO: Running on Windows Server 2003.
if "!WinVer!"=="6.0" call :logCons --- INFO: Running on Windows Vista or Server 2008.
if "!WinVer!"=="6.1" call :logCons --- INFO: Running on Windows 7 or Server 2008 R2.
if "!WinVer!"=="6.2" call :logCons --- INFO: Running on Windows 8 or Server 2012.
if "!WinVer!"=="6.3" call :logCons --- INFO: Running on Windows 8.1 or Server 2012 R2.
if "!WinVer!" GTR "6.3" call :logCons --- WARNING: Running on a Windows newer than 8.1 / 2012 R2. Don't know if this will work ...
if "!WinVer!" LSS "5.1" call :earlyFatal Unsupported Windows Version: !WinVer!. At least Windows XP is required & exit /b 1
if "!WinVer!" NEQ "6.1" call :logCons --- WARNING: Your Windows version is supported for customizing ESXi 5.x, but not ESXi 4.1.

And save the file. Now, you can run it and use the program as needed and it will open and run on Windows 10. I wouldn’t recommend using this for anything mission-critical as I can’t guarantee there aren’t any bugs with running it on an unsupported system but for me it worked fine and the resulting ISO worked perfectly.

Using ESXi Customizer on Windows 10

Q?OpenStack
A.

OpenStack is a free and open-source software platform for cloud computing, mostly deployed as infrastructure-as-a-service (IaaS), whereby virtual servers and other resources are made available to customers.[3] The software platform consists of interrelated components that control diverse, multi-vendor hardware pools of processing, storage, and networking resources throughout a data center. Users either manage it through a web-based dashboard, through command-line tools, or through RESTful web services.

OpenStack began in 2010 as a joint project of Rackspace Hosting and NASA. As of 2016, it is managed by the OpenStack Foundation, a non-profit corporate entity established in September 2012[4] to promote OpenStack software and its community.[5] More than 500 companies have joined the project.[6][7][8][9][10][11][12][13][14][15][16]

History[edit]

NASA’s Nebula platform

In July 2010, Rackspace Hosting and NASA jointly launched an open-source cloud-software initiative known as OpenStack.[17] The OpenStack project intended to help organizations offer cloud-computing services running on standard hardware. The community’s first official release, code-named Austin, appeared three months later on October 21, 2010,[18] with plans to release regular updates of the software every few months. The early code came from NASA’s Nebula platform as well as from Rackspace’s Cloud Files platform.

In 2011, developers of the Ubuntu Linux distribution adopted OpenStack[19] with an unsupported technology preview of the OpenStack “Bexar” release for Ubuntu 11.04 “Natty Narwhal“.[20] Ubuntu’s sponsor Canonical then introduced full support for OpenStack clouds, starting with OpenStack’s Cactus release.

OpenStack became available in Debian Sid from the Openstack “Cactus” release in 2011, and the first release of Debian including OpenStack was Debian 7.0 (code name “Wheezy”), including OpenStack 2012.1 (code name: “Essex”).[21][22]

In October 2011, SUSE announced the public preview of the industry’s first fully configured OpenStack powered appliance based on the “Diablo” OpenStack release.[23] In August 2012, SUSE announced its commercially supported enterprise OpenStack distribution based on the “Essex” release.[24]

Lew Tucker, VP & CTO, Cloud Computing of Cisco in 2012

In 2012, Red Hat announced a preview of their OpenStack distribution,[25] beginning with the “Essex” release. After another preview release, Red Hat introduced commercial support for OpenStack with the “Grizzly” release, in July 2013.[26]

In July 2013, NASA released an internal audit citing lack of technical progress and other factors as the agency’s primary reason for dropping out as an active developer of the project and instead focus on the use of public clouds.[27] This report is contradicted in part by remarks made by Ames Research Center CIO, Ray Obrien.[28]

In December 2013, Oracle announced it had joined OpenStack as a Sponsor and planned to bring OpenStack to Oracle Solaris, Oracle Linux, and many of its products.[29] It followed by announcing Oracle OpenStack distributions for Oracle Solaris[30][31] and for Oracle Linux using Icehouse on 24 September 2014.[32]

In May 2014, HP announced HP Helion and released a preview of HP Helion OpenStack Community, beginning with the IceHouse release. HP has operated HP Helion Public Cloud on OpenStack since 2012.[33]

At the 2014 Interop and Tech Field Day, software-defined networking was demonstrated by Avaya using Shortest path bridging and OpenStack as an automated campus, extending automation from the data center to the end device, removing manual provisioning from service delivery.[34][35]

As of March 2015, NASA still makes use of OpenStack private cloud[36] and has RFPs out for OpenStack public cloud support.[37]

OpenStack development[edit]

The OpenStack community collaborates around a six-month, time-based release cycle with frequent development milestones.[38] During the planning phase of each release, the community gathers for an OpenStack Design Summit to facilitate developer working sessions and to assemble plans.[39]

Recent OpenStack Summits have taken place in Austin on 25–29 April 2016,[40] and Barcelona on 25–28 October 2016.[41] Earlier OpenStack Summits have taken place also in Tokyo in October 2015,[42] Vancouver in May 2015,[43] and Paris in November 2014.[44] The summit in May 2014 in Atlanta drew 4,500 attendees — a 50% increase from the Hong Kong summit six months earlier.[45][46]

Components[edit]

OpenStack main services

OpenStack has a modular architecture with various code names for its components.[47]

Compute (Nova)[edit]

OpenStack Compute (Nova) is a cloud computing fabric controller, which is the main part of an IaaS system. It is designed to manage and automate pools of computer resources and can work with widely available virtualization technologies, as well as bare metal and high-performance computing (HPC) configurations. KVMVMware, and Xen are available choices for hypervisortechnology (virtual machine monitor), together with Hyper-V and Linux container technology such as LXC.[48][49]

It is written in Python and uses many external libraries such as Eventlet (for concurrent programming), Kombu (for AMQPcommunication), and SQLAlchemy (for database access).[50] Compute’s architecture is designed to scale horizontally on standard hardware with no proprietary hardware or software requirements and provide the ability to integrate with legacy systems and third-party technologies.

Due to its widespread integration into enterprise-level infrastructures, monitoring OpenStack performance in general, and Nova performance in particular, at scale has become an increasingly important issue. Monitoring end-to-end performance requires tracking metrics from Nova, Keystone, Neutron, Cinder, Swift and other services, in addition to monitoring RabbitMQ which is used by OpenStack services for message passing.[51][52]

Networking (Neutron)[edit]

OpenStack Networking (Neutron) is a system for managing networks and IP addresses. OpenStack Networking ensures the network is not a bottleneck or limiting factor in a cloud deployment,[citation needed] and gives users self-service ability, even over network configurations.

OpenStack Networking provides networking models for different applications or user groups. Standard models include flat networks or VLANs that separate servers and traffic. OpenStack Networking manages IP addresses, allowing for dedicated static IP addresses or DHCPFloating IP addresses let traffic be dynamically rerouted to any resources in the IT infrastructure, so users can redirect traffic during maintenance or in case of a failure.

Users can create their own networks, control traffic, and connect servers and devices to one or more networks. Administrators can use software-defined networking (SDN) technologies like OpenFlow to support high levels of multi-tenancy and massive scale. OpenStack networking provides an extension framework that can deploy and manage additional network services—such as intrusion detection systems (IDS), load balancing, firewalls, and virtual private networks (VPN).

Block storage (Cinder)[edit]

OpenStack Block Storage (Cinder) provides persistent block-level storage devices for use with OpenStack compute instances. The block storage system manages the creation, attaching and detaching of the block devices to servers. Block storage volumes are fully integrated into OpenStack Compute and the Dashboard allowing for cloud users to manage their own storage needs. In addition to local Linux server storage, it can use storage platforms including CephCloudByteCoraidEMC (ScaleIO, VMAX, VNX and XtremIO)GlusterFSHitachi Data SystemsIBM Storage (IBM DS8000, Storwize familySAN Volume ControllerXIV Storage System, and GPFS), Linux LIONetAppNexentaNimble Storage, Scality, SolidFireHP (StoreVirtual and 3PAR StoreServ families) and Pure Storage. Block storage is appropriate for performance sensitive scenarios such as database storage, expandable file systems, or providing a server with access to raw block level storage. Snapshot management provides powerful functionality for backing up data stored on block storage volumes. Snapshots can be restored or used to create a new block storage volume.

Identity (Keystone)[edit]

OpenStack Identity (Keystone) provides a central directory of users mapped to the OpenStack services they can access. It acts as a common authentication system across the cloud operating system and can integrate with existing backend directory services like LDAP. It supports multiple forms of authentication including standard username and password credentials, token-based systems and AWS-style (i.e. Amazon Web Services) logins. Additionally, the catalog provides a queryable list of all of the services deployed in an OpenStack cloud in a single registry. Users and third-party tools can programmatically determine which resources they can access.

Image (Glance)[edit]

OpenStack Image (Glance) provides discovery, registration, and delivery services for disk and server images. Stored images can be used as a template. It can also be used to store and catalog an unlimited number of backups. The Image Service can store disk and server images in a variety of back-ends, including Swift. The Image Service API provides a standard REST interface for querying information about disk images and lets clients stream the images to new servers.

Glance adds many enhancements to existing legacy infrastructures. For example, if integrated with VMware, Glance introduces advanced features to the vSphere family such as vMotion, high availability and dynamic resource scheduling (DRS). vMotion is the live migration of a running VM, from one physical server to another, without service interruption. Thus, it enables a dynamic and automated self-optimizing datacenter, allowing hardware maintenance for the underperforming servers without downtimes.[53][54]

Other OpenStack modules that need to interact with Images, for example Heat, must communicate with the images metadata through Glance. Also, Nova can present information about the images, and configure a variation on an image to produce an instance. However, Glance is the only module that can add, delete, share, or duplicate images.[55]

Object storage (Swift)[edit]

OpenStack Object Storage (Swift) is a scalable redundant storage system. Objects and files are written to multiple disk drives spread throughout servers in the data center, with the OpenStack software responsible for ensuring data replication and integrity across the cluster. Storage clusters scale horizontally simply by adding new servers. Should a server or hard drive fail, OpenStack replicates its content from other active nodes to new locations in the cluster. Because OpenStack uses software logic to ensure data replication and distribution across different devices, inexpensive commodity hard drives and servers can be used.

In August 2009, Rackspace started the development of the precursor to OpenStack Object Storage, as a complete replacement for the Cloud Files product. The initial development team consisted of nine developers.[56] SwiftStack, an object storage software company, is currently the leading developer for Swift with significant contributions from HP, Red Hat, NTT, NEC, IBM and more.[57]

Dashboard (Horizon)[edit]

OpenStack Dashboard (Horizon) provides administrators and users with a graphical interface to access, provision, and automate deployment of cloud-based resources. The design accommodates third party products and services, such as billing, monitoring, and additional management tools. The dashboard is also brand-able for service providers and other commercial vendors who want to make use of it. The dashboard is one of several ways users can interact with OpenStack resources. Developers can automate access or build tools to manage resources using the native OpenStack API or the EC2 compatibility API.

Orchestration (Heat)[edit]

Heat is a service to orchestrate multiple composite cloud applications using templates, through both an OpenStack-native REST API and a CloudFormation-compatible Query API.[58]

Workflow (Mistral)[edit]

Mistral is a service that manages workflows. User typically writes a workflow using workflow language based on YAML and uploads the workflow definition to Mistral via its REST API. Then user can start this workflow manually via the same API or configure a trigger to start the workflow on some event.[59]

Telemetry (Ceilometer)[edit]

OpenStack Telemetry (Ceilometer) provides a Single Point Of Contact for billing systems, providing all the counters they need to establish customer billing, across all current and future OpenStack components. The delivery of counters is traceable and auditable, the counters must be easily extensible to support new projects, and agents doing data collections should be independent of the overall system.

Database (Trove)[edit]

Trove is a database-as-a-service provisioning relational and a non-relational database engine.[60]

Elastic map reduce (Sahara)[edit]

Sahara is a component to easily and rapidly provision Hadoop clusters. Users will specify several parameters like the Hadoop version number, the cluster topology type, node flavor details (defining disk space, CPU and RAM settings), and others. After a user provides all of the parameters, Sahara deploys the cluster in a few minutes. Sahara also provides means to scale a preexisting Hadoop cluster by adding and removing worker nodes on demand.[61][62]

Bare metal (Ironic)[edit]

Ironic is an OpenStack project that provisions bare metal machines instead of virtual machines. It was initially forked from the Nova Baremetal driver and has evolved into a separate project. It is best thought of as a bare-metal hypervisor API and a set of plugins that interact with the bare-metal hypervisors. By default, it will use PXE and IPMI in concert to provision and turn on and off machines, but Ironic supports and can be extended with vendor-specific plugins to implement additional functionality.[63][64]

Messaging (Zaqar)[edit]

Zaqar is a multi-tenant cloud messaging service for Web developers. The service features a fully RESTful API, which developers can use to send messages between various components of their SaaS and mobile applications by using a variety of communication patterns. Underlying this API is an efficient messaging engine designed with scalability and security in mind. Other OpenStack components can integrate with Zaqar to surface events to end users and to communicate with guest agents that run in the “over-cloud” layer.

Shared file system (Manila)[edit]

OpenStack Shared File System (Manila) provides an open API to manage shares in a vendor agnostic framework. Standard primitives include ability to create, delete, and give/deny access to a share and can be used standalone or in a variety of different network environments. Commercial storage appliances from EMC, NetApp, HP, IBM, Oracle, Quobyte, and Hitachi Data Systems are supported as well as filesystem technologies such as Red Hat GlusterFS[65] or Ceph.

DNS (Designate)[edit]

Designate is a multi-tenant REST API for managing DNS. This component provides DNS as a Service and is compatible with many backend technologies, including PowerDNS and BIND. It doesn’t provide a DNS service as such as its purpose is to interface with existing DNS servers to manage DNS zones on a per tenant basis.[66]

Search (Searchlight)[edit]

Searchlight provides advanced and consistent search capabilities across various OpenStack cloud services. It accomplishes this by offloading user search queries from other OpenStack API servers by indexing their data into ElasticSearch.[67] Searchlight is being integrated into Horizon[68] and also provides a Command-line interface.[69]

Key manager (Barbican)[edit]

Barbican is a REST API designed for the secure storage, provisioning and management of secrets. It is aimed at being useful for all environments, including large ephemeral Clouds.[70]

Historical names[edit]

Several OpenStack projects changed names due to trademark issues.

  • Neutron was formerly known as Quantum.[71]
  • Sahara used to be called Savanna.[72]
  • Designate was previously known as Moniker.[73]
  • Trove was formerly known as RedDwarf.[74]
  • Zaqar was formerly known as Marconi.[75][76]

Compatibility with other cloud APIs[edit]

OpenStack does not strive for compatibility with other clouds APIs.[77] However, there is some amount of compatibility driven by various members of the OpenStack community for whom such things are important.

Governance[edit]

OpenStack is governed by a non-profit foundation and its board of directors, a technical committee, and a user committee. The board of directors is made up of eight members from each of the eight platinum sponsors, eight members from the 24 defined maximum allowed Gold sponsors, and eight members elected by the Foundation individual members.[80]

Users[edit]

OpenStack has a wide variety of users, from a number of different sectors.[81] Notable users include:

Deployment models[edit]

As the OpenStack project has matured, vendors have pioneered multiple ways for customers to deploy OpenStack:

  • OpenStack-based Public Cloud: A vendor provides a public cloud computing system based on the OpenStack project.
  • On-premises distribution: In this model, a customer downloads and installs an OpenStack distribution within their internal network. See Distributions.
  • Hosted OpenStack Private Cloud: A vendor hosts an OpenStack-based private cloud: including the underlying hardware and the OpenStack software.
  • OpenStack-as-a-Service: A vendor hosts OpenStack management software (without any hardware) as a service. Customers sign up for the service and pair it with their internal servers, storage and networks to get a fully operational private cloud.
  • Appliance based OpenStack: Nebula was a vendor that sold appliances that could be plugged into a network which spawned an OpenStack deployment.[citation needed]

Distributions[edit]

 

 

https://en.wikipedia.org/wiki/OpenStack

Q?What is Hypervisor
A.

What is Hypervisor and what types of hypervisors are there

If you know what a private cloud is and you know the infrastructure of it, you’ve probably heard about hypervisor.

It is the part of the private cloud that manages the virtual machines, i.e. it is the part (program) that enables multiple operating systems to share the same hardware. Each operating system could use all the hardware (processor, memory) if no other operating system is on. That is the maximum hardware available to one operating system in the cloud.

Nevertheless, the hypervisor is what controls and allocates what portion of hardware resources each operating system should get, in order every one o them to get what they need and not to disrupt each other.

Virtualization

Virtualization is changing the mindset from physical to logical.

What virtualization means is creating more logical IT resources, called virtual systems, within one physical system. That’s called system virtualization. It most commonly uses the hypervisor for managing the resources for every virtual system. The hypervisor is a software that can virtualize the hardware resources.

Virtualization, changing the mindset from physical to logical.

Image Source: www.ibm.com

There are two types of hypervisors:

  • Type 1 hypervisor: hypervisors run directly on the system hardware – A “bare metal” embedded hypervisor,
  • Type 2 hypervisor: hypervisors run on a host operating system that provides virtualization services, such as I/O device support and memory management.

figure2

how type 1 and type 2 hypervisors differ

Image Source: www.ibm.com

Type 1 hypervisors:

1. VMware ESX and ESXi

These hypervisors offer advanced features and scalability, but require licensing, so the costs are higher.

There are some lower-cost bundles that VMware offers and they can make hypervisor technology more affordable for small infrastructures.

VMware is the leader in the Type-1 hypervisors. Their vSphere/ESXi product is available in a free edition and 5 commercial editions.

2. Microsoft Hyper-V

The Microsoft hypervisor, Hyper-V doesn’t offer many of the advanced features that VMware’s products provide.
However,  with XenServer and vSphere, Hyper-V is one of the top 3 Type-1 hypervisors.

It was first released with Windows Server, but now Hyper-V has been greatly enhanced with Windows Server 2012 Hyper-V. Hyper-V is available in both a free edition (with no GUI and no virtualization rights) and 4 commercial editions – Foundations (OEM only), Essentials, Standard, and Datacenter. Hyper-V

3. Citrix XenServer

It began as an open source project.
The core hypervisor technology is free, but like VMware’s free ESXi, it has almost no advanced features.
Xen is a type-1 bare-metal hypervisor. Just as Red Hat Enterprise Virtualization uses KVM, Citrix uses Xen in the commercial XenServer.

Today, the Xen open source projects and community are at Xen.org. Today, XenServer is a commercial type-1 hypervisor solution from Citrix, offered in 4 editions. Confusingly, Citrix has also branded their other proprietary solutions like XenApp and XenDesktop with the Xen name.

4. Oracle VM

The Oracle hypervisor is based on the open source Xen.
However, if you need hypervisor support and product updates, it will cost you.
Oracle VM lacks many of the advanced features found in other bare-metal virtualization hypervisors.

Type 2 hypervisor

1. VMware Workstation/Fusion/Player

VMware Player is a free virtualization hypervisor.

It is intended to run only one virtual machine (VM) and does not allow creating VMs.
VMware Workstation is a more robust hypervisor with some advanced features, such as record-and-replay and VM snapshot support.

VMware Workstation has three major use cases:

  • for running multiple different operating systems or versions of one OS on one desktop,
  • for developers that need sandbox environments and snapshots, or
  • for labs and demonstration purposes.

2. VMware Server

VMware Server is a free, hosted virtualization hypervisor that’s very similar to the VMware Workstation.
VMware has halted development on Server since 2009

3. Microsoft Virtual PC

This is the latest Microsoft’s version of this hypervisor technology, Windows Virtual PC and runs only on Windows 7 and supports only Windows operating systems running on it.

4. Oracle VM VirtualBox

VirtualBox hypervisor technology provides reasonable performance and features if you want to virtualize on a budget. Despite being a free, hosted product with a very small footprint, VirtualBox shares many features with VMware vSphere and Microsoft Hyper-V.

5. Red Hat Enterprise Virtualization

Red Hat’s Kernel-based Virtual Machine (KVM) has qualities of both a hosted and a bare-metal virtualization hypervisor. It can turn the Linux kernel itself into a hypervisor so the VMs have direct access to the physical hardware.

KVM

This is a virtualization infrastructure for the Linux kernel. It supports native virtualization on processors with hardware virtualization extensions.

The open-source KVM (or Kernel-Based Virtual Machine) is a Linux-based type-1 hypervisor that can be added to most Linux operating systems including Ubuntu, Debian, SUSE, and Red Hat Enterprise Linux, but also Solaris, and Windows.

We use KVM in VapourApps Private Cloud:

  • Virtualization engine – OpenStack on KVM
  • Predefined virtual servers based on Debian
  • Orchestration and management web dashboard, a customized Horizon dashboard.

The owner of the tenant or the IT administrator, can manage his virtual servers, users, groups and monitor the status of the used application from a single dashboard.

 

What is Hypervisor and what types of hypervisors are there

Q?How to Reset Quick Access in Windows 10
A.

Get Quick Access messed up? Here’s a simple way to reset / restore Quick Access folders to default:

  1. Press the Windows key + X to open the WinX menu. Select Command Prompt (Admin).winx-menu
  2. Now copy the following command and paste it into the Command Prompt. Press Enter.
    del /F /Q
    %APPDATA%\Microsoft\Windows\Recent\AutomaticDestinations\*
    reset-quick-access-to-default
  3. Close Command Prompt and re-launch File Explorer. You’ll see that the Quick Access is restored to default and only the default folders are pinned.
Q?re-enable Recovery Media creation on Lenovo
A.

You did one Recovery Media before and damaged/lost it. Trying to get another make another one, getting below message: “You can have only one copy of the Microsoft Window Operating system. The Product Recovery Media Creator will exit now.”

Lenovo, in their infinite wisdom, have changed how they store the fact that the recovery image has already been created in newer versions of their recovery software. Amusingly they have not bothered to correct the “Microsoft Window” typo as well!

Process Monitor reveals that recovburncd.exe reads the file Q:\FactoryRecovery\RECOVERY.INI:DONE before bugging out. The colon indicates the use of an alternate File Stream. After a recovery image has been created, this stream contains the string 1\r\n. Deleting the stream does not work, but replacing the stream contents with the string 0\r\n works. This can be done from the command prompt:

echo 0 > Q:\FactoryRecovery\RECOVERY.INI:Done

Lenovo – You can have only one copy of the Microsoft Windows operating system.

Lenovo notebooks come with Factory Recovery Disks creation software. This allows you to create recovery disk in case you want to re install the notebook other than from the local hard disk. You can create the recovery discs on CD/DVD, memory disk or USB hard disk.

Attention: The USB hard disk will be formatted and you loose all the data!

It takes a long time to prepare the creation of the recovery media. Everything is copied into c:\swshare before then it gets copied to the external source you selected.

You can do this only one time! If you want to create the recovery disks more than once, you get a message:

You can have only one copy of the Microsoft Windows operating system. The Product Recovery Media Creator will exit now.

This is the workaround for this problem:

All you need it in the Lenovo_Recovery disk. In my case its drive letter Q:\ If i click on this drive in the explorer it show you nothing cause the content is hidden!

  1. Open the Explorer and then click Organize -> Folder and search options
  2. In window Folder Options click tab View
  3. Now enable Show hidden files, folders, and drives and then click OK The option of Hide operating system files should be made unchecked and then you’ll be able to see the files.
  4. Click on the Lenovo_Recovery drive, in my case drive Q:\
  5. Here is every thing needed to create the recovery disks!
  6. Edit the file FactoryRecovery\service_done.ini
  7. Change the string DONE=1 to DONE=0 and exit the editor saving the changes
  8. You can now recreate the Factory Recovery Disks

Have fun, always backup data before restoring any disks!

The quick answer is: change the value of the registry entry, HKCU\Software\Lenovo\Factory Recovery\done, to 0. For my case, the Q:\ drive was never altered to turn on the forbidding flag. It was totally done through this switch in your system’s registry.

For people with patience on reading how I found out, this is how. I also use Process Monitor to track what recovburncd.exe did after launching (up to the point where there was only the “Cancel” button for me to terminate it). So I tried to identify (within the activity list in Process Monitor) which activity prevented recovburncd.exe from enabling the “OK” button. Then, I saw the registry entry mentioned above had value 1, reminding me of the similar terminologies in the other two ways (Sam Morris’ method and the service_done.ini method) of fixing the “done” flag. It was a bingo!

re-enable Recovery Media creation on Lenovo
reset Lenovo – Factory Recovery Disks
how reset state of Lenovo recovery boot media to 0

http://superuser.com/questions/384658/why-can-i-only-create-one-factory-backup-from-my-lenovo-thinkpad

Q?Process Monitor v3.32
A.

By Mark Russinovich

Published: February 17, 2017

Download icon Download Process Monitor
(974 KB)

Rate:  

Introduction

Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. It combines the features of two legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of enhancements including rich and non-destructive filtering, comprehensive event properties such session IDs and user names, reliable process information, full thread stacks with integrated symbol support for each operation, simultaneous logging to a file, and much more. Its uniquely powerful features will make Process Monitor a core utility in your system troubleshooting and malware hunting toolkit.

Overview of Process Monitor Capabilities

Process Monitor includes powerful monitoring and filtering capabilities, including:

  • More data captured for operation input and output parameters
  • Non-destructive filters allow you to set filters without losing data
  • Capture of thread stacks for each operation make it possible in many cases to identify the root cause of an operation
  • Reliable capture of process details, including image path, command line, user and session ID
  • Configurable and moveable columns for any event property
  • Filters can be set for any data field, including fields not configured as columns
  • Advanced logging architecture scales to tens of millions of captured events and gigabytes of log data
  • Process tree tool shows relationship of all processes referenced in a trace
  • Native log format preserves all data for loading in a different Process Monitor instance
  • Process tooltip for easy viewing of process image information
  • Detail tooltip allows convenient access to formatted data that doesn’t fit in the column
  • Cancellable search
  • Boot time logging of all operations

The best way to become familiar with Process Monitor’s features is to read through the help file and then visit each of its menu items and options on a live system.

https://technet.microsoft.com/en-us/sysinternals/bb896645.aspx

Q?D.E.P. or Data Execution Prevention (DEP)
A.

A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition 2005, and Windows Server 2003

Summary

Data Execution Prevention (DEP) is a set of hardware and software technologies that perform additional checks on memory to help prevent malicious code from running on a system. In Microsoft Windows XP Service Pack 2 (SP2) and Microsoft Windows XP Tablet PC Edition 2005, DEP is enforced by hardware and by software.

The primary benefit of DEP is to help prevent code execution from data pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. Software-enforced DEP can help prevent malicious code from taking advantage of exception-handling mechanisms in Windows.

Hardware-enforced DEP

Hardware-enforced DEP marks all memory locations in a process as non-executable unless the location explicitly contains executable code. A class of attacks exists that tries to insert and run code from non-executable memory locations. DEP helps prevent these attacks by intercepting them and raising an exception.

Hardware-enforced DEP relies on processor hardware to mark memory with an attribute that indicates that code should not be executed from that memory. DEP functions on a per-virtual memory page basis, and DEP typically changes a bit in the page table entry (PTE) to mark the memory page.

Processor architecture determines how DEP is implemented in hardware and how DEP marks the virtual memory page. However, processors that support hardware-enforced DEP can raise an exception when code is executed from a page that is marked with the appropriate attribute set.

Advanced Micro Devices (AMD) and Intel have defined and shipped Windows-compatible architectures that are compatible with DEP.

Beginning with Windows XP SP2, the 32-bit version of Windows uses one of the following:

  • The no-execute page-protection (NX) processor feature as defined by AMD.
  • The Execute Disable Bit (XD) feature as defined by Intel.

To use these processor features, the processor must be running in Physical Address Extension (PAE) mode. However, Windows will automatically enable PAE mode to support DEP. Users do not have to separately enable PAE by using the /PAE boot switch.

Note Because 64-bit kernels are Address Windowing Extensions (AWE) aware, there is not a separate PAE kernel in 64-bit versions of Windows.
For more information about PAE and AWE in Windows Server 2003, click the following article number to view the article in the Microsoft Knowledge Base:

283037 Large memory support is available in Windows Server 2003 and in Windows 2000

Software-enforced DEP

An additional set of Data Execution Prevention security checks have been added to Windows XP SP2. These checks, known as software-enforced DEP, are designed to block malicious code that takes advantage of exception-handling mechanisms in Windows. Software-enforced DEP runs on any processor that can run Windows XP SP2. By default, software-enforced DEP helps protect only limited system binaries, regardless of the hardware-enforced DEP capabilities of the processor.

Benefits

The primary benefit of DEP is that it helps prevent code execution from data pages, such as the default heap pages, various stack pages, and memory pool pages. Typically, code is not executed from the default heap and the stack. Hardware-enforced DEP detects code that is running from these locations and raises an exception when execution occurs. If the exception is unhandled, the process will be stopped. Execution of code from protected memory in kernel mode causes a Stop error.

DEP can help block a class of security intrusions. Specifically, DEP can help block a malicious program in which a virus or other type of attack has injected a process with additional code and then tries to run the injected code. On a system with DEP, execution of the injected code causes an exception. Software-enforced DEP can help block programs that take advantage of exception-handling mechanisms in Windows.

System-wide configuration of DEP

DEP configuration for the system is controlled through switches in the Boot.ini file. If you are logged on as an administrator, you can now easily configure DEP settings by using the System dialog box in Control Panel.

Windows supports four system-wide configurations for both hardware-enforced and software-enforced DEP.

Configuration Description
OptIn This setting is the default configuration. On systems with processors that can implement hardware-enforced DEP, DEP is enabled by default for limited system binaries and programs that “opt-in.” With this option, only Windows system binaries are covered by DEP by default.
OptOut DEP is enabled by default for all processes. You can manually create a list of specific programs that do not have DEP applied by using the System dialog box in Control Panel. Information technology (IT) professionals can use the Application Compatibility Toolkit to “opt-out” one or more programs from DEP protection. System compatibility fixes, or shims, for DEP do take effect.
AlwaysOn This setting provides full DEP coverage for the whole system. All processes always run with DEP applied. The exceptions list to exempt specific programs from DEP protection is not available. System compatibility fixes for DEP do not take effect. Programs that have been opted-out by using the Application Compatibility Toolkit run with DEP applied.
AlwaysOff This setting does not provide any DEP coverage for any part of the system, regardless of hardware DEP support. The processor does not run in PAE mode unless the /PAE option is present in the Boot.ini file.

Hardware-enforced and software-enforced DEP are configured in the same manner. If the system-wide DEP policy is set to OptIn, the same Windows core binaries and programs will be protected by both hardware-enforced and software-enforced DEP. If the system cannot use hardware-enforced DEP, the Windows core binaries and programs will be protected only by software-enforced DEP.

Similarly, if the system-wide DEP policy is set to OptOut, programs that have been exempted from DEP protection will be exempted from both hardware-enforced and software-enforced DEP.

The Boot.ini file settings are as follows:

/noexecute=policy_level

Note policy_level is defined as AlwaysOn, AlwaysOff, OptIn, or OptOut.

Existing /noexecute settings in the Boot.ini file are not changed when Windows XP SP2 is installed. These settings are also not changed if a Windows operating system image is moved across computers with or without hardware-enforced DEP support.

During installation of Windows XP SP2 and Windows Server 2003 SP1 or later versions, the OptIn policy level is enabled by default unless a different policy level is specified in an unattended installation. If the /noexecute=policy_level setting is not present in the Boot.ini file for a version of Windows that supports DEP, the behavior is the same as if the /noexecute=OptIn setting was included.

If you are logged on as an administrator, you can manually configure DEP to switch between the OptIn and OptOut policies by using the Data Execution Prevention tab in
System Properties. The following procedure describes how to manually configure DEP on the computer:

  1. Click Start, click Run, type sysdm.cpl, and then click
    OK.
  2. On the Advanced tab, under
    Performance, click Settings.
  3. On the Data Execution Prevention tab, use one of the following procedures:
    • Click Turn on DEP for essential Windows programs and services only to select the OptIn policy.
    • Click Turn on DEP for all programs and services except those I select to select the OptOut policy, and then click
      Add to add the programs that you do not want to use the DEP feature.
  4. Click OK two times.

IT professionals can control system-wide DEP configuration by using a variety of methods. The Boot.ini file can be modified directly with scripting mechanisms or with the Bootcfg.exe tool that is included in Windows XP SP2.

To configure DEP to switch to the AlwaysOn policy by using the Boot.ini file, follow these steps:

  1. Click Start, right-click My Computer, and then click Properties.
  2. Click the Advanced tab, and then click Settings under the Startup and Recovery field.
  3. In the System startup field, click Edit. The Boot.ini file opens in Notepad.
  4. In Notepad, click Find on the Edit menu.
  5. In the Find what box, type /noexecute, and then click Find Next.
  6. In the Find dialog box, click Cancel.
  7. Replace policy_level with AlwaysOn.WARNING Make sure that you enter the text accurately. The Boot.ini file switch should now read:
    /noexecute=AlwaysOn
  8. In Notepad, click Save on the File menu.
  9. Click OK two times.
  10. Restart the computer.

For unattended installations of Windows XP SP2 or later versions, you can use the Unattend.txt file to pre-populate a specific DEP configuration. You can use the OSLoadOptionsVar entry in the [Data] section of the Unattend.txt file to specify a system-wide DEP configuration.

Per-program DEP configuration

For the purposes of program compatibility, you can selectively disable DEP for individual 32-bit programs when DEP is set to the OptOut policy level. To do this, use the Data Execution Prevention tab in
System Properties to selectively disable DEP for a program. For IT professionals, a new program compatibility fix that is named DisableNX is included with Windows XP SP2. The DisableNX compatibility fix disables Data Execution Prevention for the program that the fix is applied to.

The DisableNX compatibility fix can be applied to a program by using the Application Compatibility Toolkit. For more information about Windows application compatibility, see Windows Application Compatibility on the following Microsoft Web site:

For more information, click the following article number to view the article in the Microsoft Knowledge Base:

912923 How to determine that hardware DEP is available and configured on your computer

References

For more information, click the following article number to view the article in the Microsoft Knowledge Base:

899298 The “Understanding Data Execution Prevention” help topic incorrectly states the default setting for DEP in Windows Server 2003 Service Pack 1

Properties

Article ID: 875352 – Last Review: Feb 16, 2017 – Revision: 2

Microsoft Windows Server 2003 Service Pack 1, Microsoft Windows Server 2003, Web Edition, Microsoft Windows Server 2003, Standard Edition (32-bit x86), Microsoft Windows Server 2003, Datacenter Edition (32-bit x86), Microsoft Windows Server 2003, Enterprise Edition (32-bit x86), Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems

A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition 2005, and Windows Server 2003 data taken from below Microsoft link:

https://support.microsoft.com/en-us/help/875352/a-detailed-description-of-the-data-execution-prevention-dep-feature-in-windows-xp-service-pack-2,-windows-xp-tablet-pc-edition-2005,-and-windows-server-2003

Q?“Telephone activation is no longer supported for your product” error when activating Office
A.

Problem: “When you select the option to activate Office by telephone, you may see the following error: Telephone activation is no longer supported for your product.

Call below numbers from your location.

Ireland: mobile or toll 01 447 5390, toll-free 1800 930 031

UK: mobile or toll 203 147 4930, toll-free 0800 018 8354

Spain: mobile or toll (34) (91) 114 1464, toll-free (900) 150 889

Germany: mobile or toll (49) (69) 2222 5494, toll-free (0) (800) 2848-283

Latvia: mobile or toll (371) (67) 852 112, toll-free (802) 00920

Lithuania: mobile or toll (370) 520 511 20, toll-free (800) 22032

Russia: mobile or toll (7) (495) 745 5445, toll-free (8) (800) 200 8002

Follow automatic answering system`s instructions providing Installation Code.

Enter your Confirmation Code provided by Telephone activation 🙂

 

 

Q?How to Download Earlier Versions of Office
A.

How to download earlier versions of Microsoft Office?

Have you key ready, follow by below link, type in key in validation field and have it downloaded 🙂

https://www.microsoft.com/en-gb/software-download/office?culture=en-GB&ref=pkc

 

Q?How to enable or disable hibernation on Windows 10?
A.

1) Press combination of “Windows” + “S” key to start Search prompt field.

1) In “Search” field type “cmd”

2) In the list right mouse click on “Command Prompt” and choose “Run as administrator”

3) In new “black” window type “powercfg /hibernate off” to turn off hibernation

4) In new “black” window type “powercfg /hibernate on” to turn on hibernation

 

Q?APN setup for Lycamobile IE
A.

APN: data.lycamobile.ie

Proxy: Leave Blank

Prot: Leave Blank

UserName: lmie

Password: plus

Server: Leave Blank

MMSC: Leave Blank

MMS proxy: Leave Blank

MMS port: Leave Blank

MCC: Leave Blank

MNC: Leave Blank

APN Type: Leave Blank

 

Q?APN setup for Vodafone in Ireland
A.

APN: hs.vodafone.ie

Proxy: not set

Port: not set

username/password: not set

server: not set

MMSC: not set

MMS Proxy: not set

MMS port: not set

Mcc:272

MNC: 01

Authentication type: PAP

APN type: default

APN protocol: IPv4

APN Roaming Protocol: IPv4

Bearer: unspecified

MVNO Type: None

Q?Enable or disable the account with a command.
A.

To enable this account, type “net user guest /active:yes” (without quotes) and press Enter.

Q?How to add a program to startup for one user
A.

C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

1. Press Win+R

2. Type shell:startup

and press Enter:

Q?How to add a program to startup for all users
A.

In order to run app at startup in all users accounts place a shortcut in common startup folder. In Windows 10 its default location is:

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp

1. Win+R (RUN)

2. Type shell:Common Startup

and press Enter:add-app-to-startup021

3. Copy content

Q?How to manually wipe a drive and convert it to GPT?
A.

1.Turn off the PC, and put in the Windows installation DVD or USB key.

2.Boot the PC to the DVD or USB key in UEFI mode. For more info, see Boot to UEFI Mode or Legacy BIOS mode.

3.From inside Windows Setup, press Shift+F10 to open a command prompt window.

4.Open the diskpart tool:

type: diskpart

5.Identify the drive to reformat:

type: list disk

6.Select the drive, and reformat it:

type: select disk 0
– “0” is the target drive
type: clean
type: convert gpt
type: exit

7.Close the command prompt window. Alt+F4

8.Continue the Windows Setup installation.

Q?Where can I get Microsoft Windows 10 ISO images?
A.

Found it here. https://www.microsoft.com/en-us/software-download/windows10.

Q?I got new laptop battery. Do I need to do anything with it, or jut plug and drive?
A.

If You got new Li-Ion battery(type of the battery is VERY IMPORTANT) You will need to “train” it:

1. Please discharge the battery to 2% then fully charge at the first time.

2. It is forbidden to discharge to 0% on normal use, it will be easily damaged and shorten the usage life; It must be turned off or recharged(in 1-2 days) if as low as 2%.

3. It must be charged above 70% before long time storage(more than three months).

4. Battery needs recycling frequently. It is recommended to discharge and charge it once per two months at least. The battery will achieve best performance, please discharging it to 2%, and then charging it full.

5. When the battery cannot charge or charge less power, maybe the laptop adapter is mismatch or output power is lower. Please immediately replace the match and the function normal adapter to confirm is whether the problem caused by the adapter.

6. Never ever take out the battery from the laptop when charging or discharging.

Q?How can I protect my computer from viruses and malware? …
A.

The best protection from viruses and malware, not a good antivirus or firewall, but the right user behaviour using computer.

Below listed basic security “best practices” from Symantec Security.

  • Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.
  • Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
  • Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.
  • Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.
  • Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders.
  • Grant access only to user accounts with strong passwords to folders that must be shared.
  • Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.
  • If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
  • Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
  • Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.
  • Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.
  • Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
  • If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device’s visibility is set to “Hidden” so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to “Unauthorized”, requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.

You can check for unknown terms used in this document here Security Response glossary.

Q?How do I put my Mac in sleep mode? …
A.

⌘ + ⌥ + Power button

Q?What Mac keyboard shortcuts mean ?
A.

By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device.

To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command”⌘”+C (copy), hold down Command”⌘”, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys:

•Command ⌘
•Shift ⇧
•Option ⌥
•Control ⌃
•Caps Lock ⇪
•Fn

If you’re using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key.

To learn more shortcuts, check the menus of the app you’re using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another.

Q?How do I COPY and PASTE with the Mac?…
A.

Command “⌘”+ C (Copy) Copy the selected item to the Clipboard. This also works for files in the Finder.
Command “⌘”+ X (Cut) Cut: Remove the selected item and copy it to the Clipboard.
Command “⌘”+ V (Paste) Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder.

Q?How to delete characters to the right of the cursor on a Mac?… Ctrl+D
A.

Ctrl+D

Question: “How to delete characters to the right of the cursor position?”
“The one delete key moves left, is there a single keystroke way to delete right with this keyboard?”

Answer: You can use Ctrl⌃+D to delete a single character to the right of the cursor. This is because all Macs use Emacs-style keyboard shortcuts.

Ctrl⌃+A: Beginning of line (like Home)
Ctrl⌃+B: Backward one character (like hitting the left arrow)
Ctrl⌃+D: Forward delete (like the Forward Delete button on Macs)
Ctrl⌃+E: End of line (like End)
Ctrl⌃+F: Forward one character (like hitting the right arrow)
Ctrl⌃+H: Backward delete (like hitting the Delete button on Macs)
Ctrl⌃+K: Kill/remove text between cursor and the end of the line
Ctrl⌃+N: Next line (like down arrow)
Ctrl⌃+P: Previous line (like up arrow)
Ctrl⌃+U: Remove/delete current line
Ctrl⌃+V: Page down
Ctrl⌃+Y: Paste text which has been “killed” by Ctrl⌃+K