How Do I Remove, Delete, Unlink, Deactivate Associated iOS Device or Mac, Apple ID and iCloud Account

iPhone, iPad, iPod touch, Mac, PC or Android phone will automatically associate with your Apple ID and iTunes when you use certain iTunes features so that you can download and play music, movies, TV shows, etc. that you previously bought from iTunes Store. You will need to remove associated device if:

  • You reach limit of associations and want to add a new one. Maximum 10 devices (no more than five of them computers) associated with your Apple ID and iTunes at one time.
  • You can’t download past purchases from the iTunes Store.
  • You want to sell or give away an associated device.

To remove, delete, unlink or deactivate associated iOS device or Mac from Apple ID and iCloud account, follow these steps.

Remove Apple ID
Continue reading “How Do I Remove, Delete, Unlink, Deactivate Associated iOS Device or Mac, Apple ID and iCloud Account”

How Do I Clear / Clean / Delete System Log, Cache and Outdated Backup in Apple Mac OS X

System log files, application error crash reports, cache, iOS and iTune backup tend to build up from time to time which could possibly slow down Mac OS X (macOS). To remove system log files and application error crash reports from Mac OS, follow these steps.

log files in MacOS
Continue reading “How Do I Clear / Clean / Delete System Log, Cache and Outdated Backup in Apple Mac OS X”

How do I Remove Hidden Data, Personal Info and Metadata from Microsoft Office Documents

You may not be aware that Microsoft Office documents such as Word, Excel, PowerPoint and Visio files often contain hidden or personal information like comments, revision marks, headers, footers and watermarks. This could place you in an embarrassing or compromising position.

In order to protect any sensitive information from accidentally being made public, perform the following steps before sharing a document with other people.

Microsoft Office Inspect Document
Continue reading “How do I Remove Hidden Data, Personal Info and Metadata from Microsoft Office Documents”

How do I embed TTF fonts in Microsoft Word Documents in Windows?

Font type used in a Word document determine how that document appears when viewed or printed. If you use custom font type in Word document, embedding fonts will retain layout and formatting of document otherwise Microsoft Word will substitute the custom font with default font.

Microsoft Word allows you to embed TrueType font in Word document and need to be available for embedding. After embed a font, Word document file size will be increase approximately the size of the TrueType font (.ttf) file.

Microsoft Word embed fonts settings
Continue reading “How do I embed TTF fonts in Microsoft Word Documents in Windows?”

Internet of Things Essentials, Features and Practice

Internet of Things (IoT) extends internet connectivity to a diverse range of devices and everyday things. These devices utilize embedded technology to communicate, record and interact with the external environment using the Internet as a means of communication. A “thing” can be any object that can be assigned an IP address and can transfer data over a network. The connected embedded systems include small micro-controller-based computers that do not require a human interface, but rather function independently. Instead of interacting with a human, these systems use sensors or other advanced detection mechanisms to collect data and communicate that back to a data repository or act upon the data without user interaction.

IoT

Continue reading “Internet of Things Essentials, Features and Practice”

[Solved] Notification systemd-journald has crashed and Warning: Journal has been rotated since unit was started. Log output is incomplete or unavailable.

Problem: Debian server and Ubuntu desktop show notification that systemd-journald has crashed. After execute command systemctl status systemd-journald from the terminal, the output show message Warning: Journal has been rotated since unit was started. Log output is incomplete or unavailable. in service.

Ubuntu Debian error Journal has been rotated since unit was started
Continue reading “[Solved] Notification systemd-journald has crashed and Warning: Journal has been rotated since unit was started. Log output is incomplete or unavailable.”

[Solved] Microsoft Outlook 2016 Prompt Start in Safe Mode, Faulting module Event 2000

Problem: In Windows 10 environment, When try to open Microsoft Outlook 2016 (or another Office application on Windows Terminal Services), error message below prompting:

"Something is wrong with one of your data files and outlook needs to close."

repair Outlook 2016 inbox
"Outlook couldn't start last time. Safe mode could help you troubleshoot the problem, but some features might not be available in this mode."
"Do you want to start in safe mode?"

Open Outlook 2016 in Safe Mode

Event viewer show below error happen:
Event ID: 2000
Source: Outlook
Faulting module path: C:\Program Files (x86)\Microsoft Office\Root\Office16\mspst32.dll

Continue reading “[Solved] Microsoft Outlook 2016 Prompt Start in Safe Mode, Faulting module Event 2000”

How to Create and Configure Shared Mailbox in Microsoft Exchange Server 2010

Microsoft Exchange Server 2010 Shared mailbox is a mailbox that’s not primarily associated with a single user and is generally configured to allow access for a group of users to read, send email and share common calendar or shared contact list. Below are the steps for how to create shared mailbox using Exchange Management Shell (EMS) and Exchange Management Console (EMC) GUI in Microsoft Exchange Server 2010.

Exchange Server 2010
Continue reading “How to Create and Configure Shared Mailbox in Microsoft Exchange Server 2010”

Types and Impact of Social Engineering Attacks

Social Engineering refer to the art of manipulating people into performing actions or divulging confidential information. Cybercriminal uses different platforms like Facebook, LinkedIn or Email to spread malicious link. Social engineering attacks has proven to be very successful way for criminal to “get inside” your organization.
Continue reading “Types and Impact of Social Engineering Attacks”

Top 10 Skills Need to Survive in 2020

What are the top 10 skills you will need to thrive in 2020?

Complex Problem Solving

The skill to see relationships between industries and craft creative solutions to problems that are yet to appear is a must to keep up with Artificial Intelligence (AI) machines.

Critical Thinking

People who can turn data into insightful interpretations due to the complexity increase with interconnectedness within various fields like computer science, engineering and biology.

Creativity

The quality of randomness and the ability to build something out of ideas is a skill that will pay off now and in the future.
Continue reading “Top 10 Skills Need to Survive in 2020”