Workaround to fix Windows Server 2019 bug: Disk Cleanup / SilentCleanup Deletes Temp Folders

Microsoft Japan Windows Technology Support published a problem that temporary folders referenced by environment variable %TEMP% or %TMP% are deleted by Disk Cleanup task (SilentCleanup mode) under certain circumstances. This problem is affecting Windows Server 2019.
Continue reading “Workaround to fix Windows Server 2019 bug: Disk Cleanup / SilentCleanup Deletes Temp Folders”

[Solved] How Do I Fix Error 0xc0000142 after Windows 10 Intel Microcode Update KB4100347

Some Windows 10 users who received Windows 10 Intel Microcode Update KB4100347 recently reported error 0xc0000142 with Windows 10 or applications such as Microsoft Office from time to time. Below are the steps to resolve error 0xc0000142.

The application was unable to start correctly (0xc0000142). Click Ok to close the application.
The application was unable to start correctly (0xc0000142). Click Ok to close the application.

Continue reading “[Solved] How Do I Fix Error 0xc0000142 after Windows 10 Intel Microcode Update KB4100347”

How to use Google Docs Suggested Edits Changes Mode, Accept or Reject Suggestions

Google Docs allow you to suggest edit changes to a document when you’re collaborating on a document with others, without replace the original text before accept or reject by document’s owner. Reviewer now suggests edits right within the doc instead of only in the comment box. If you look up at the top right of Google Docs window while viewing your document, you’ll see your current state in one of the three below:
Editing: Allow you to type, add and edit documents directly. You can then share your work with any of peers.
Suggesting: Allows editor to make suggestions for changes to the document without deleting the author’s original work. Basically tracks your changes edit.
Viewing: Reading or printing view of documents to make sure all mistakes have been changed and edited. Suggestions and comments are hidden and you can’t edit document in Viewing mode.

Google Docs Suggesting mode allows anyone who can edit the document to suggest edits to the document owner. The owner can accept or reject edits.
Google Docs Suggesting mode allows anyone who can edit the document to suggest edits to the document owner. The owner can accept or reject edits.

Continue reading “How to use Google Docs Suggested Edits Changes Mode, Accept or Reject Suggestions”

Types of Online Threats and Tips for How to Protect Yourself from It

The Internet has proven to be a powerful and useful tool for billions of people worldwide. However, in the same way that you shouldn’t leave your house unlocked, you shouldn’t venture online without taking some basic precautions as almost 50% of PC users have experienced some computer security issues in the past two years. When do you start? Learn more about online threats and way to protect yourself.

Types of Online Threats and Tips for How to Protect Yourself from It
Types of Online Threats and Tips for How to Protect Yourself from It

Continue reading “Types of Online Threats and Tips for How to Protect Yourself from It”

10 Signs WordPress Site may be Hacked

Invalid Login
– WordPress doesn’t recognize your account.
– You don’t receive the message to change password.
– Your combination is not working.

10 Signs WordPress Site may be Hacked
10 Signs WordPress Site may be Hacked

Malignant Content in WordPress site
– You see unfamiliar content on your site.
– The theme and plugin files are changed.
– The look of the website is drastically modified.

Suspicious Visits
– Google Analytics shows suspicious visitors from unknown places.
– You see new promotion links released in the wild.
– Scanning the website shows malicious code in the website.
Continue reading “10 Signs WordPress Site may be Hacked”

6 Key Factors when considering Cybersecurity Solution

Organizations worldwide are diligently seeking advanced cybersecurity solutions to combat all kind of cyberattacks and protect their data assets. It is imperative that organizations should seek out the right threat detection cybersecurity solution to implement. Here are 6 keys criteria to evaluate what cybersecurity solution will best protect your business.

6 Key Factors when considering Cybersecurity Solution
6 Key Factors when considering Cybersecurity Solution

Continue reading “6 Key Factors when considering Cybersecurity Solution”

8 Cyber Security Commandments that all workers should follow

8 Cyber Security commandments issued by CompTIA to outline not just cyber security tips but also reasons for each of them as revealed in survey of 1200 organizations. Keeping up with cybersecurity can feel like a full-time job. The technology we use every day is constantly evolving nd it seems as if the bad guys are always finding a way in. However, despite all the news of data breaches and cyber attacks we’ve seen, evidence suggests that end users aren’t adequately taking charge of their own IT security.

8 Cyber Security Commandments that all workers should follow
8 Cyber Security Commandments that all workers should follow

Continue reading “8 Cyber Security Commandments that all workers should follow”

Top 10 Technology Buzzwords for 2019: AI, IoT, Blockchain, Robotic and more

Top 10 Technology Buzzwords for 2019
Top 10 Technology Buzzwords for 2019

Artificial Intelligence

In computer science, Artificial intelligence (AI), sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. Computer science defines AI research as the study of “intelligent agents”: any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. More in detail, Kaplan and Haenlein define AI as “a system’s ability to correctly interpret external data, to learn from such data, and to use those learnings to achieve specific goals and tasks through flexible adaptation”. Colloquially, the term “artificial intelligence” is applied when a machine mimics “cognitive” functions that humans associate with other human minds, such as “learning” and “problem solving”.

Blockchain

A blockchain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a merkle tree root hash). By design, a blockchain is resistant to modification of the data. It is “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way”. For use as a distributed ledger, a blockchain is typically managed by a peer-to-peer network collectively adhering to a protocol for inter-node communication and validating new blocks. Once recorded, the data in any given block cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. Although blockchain records are not unalterable, blockchains may be considered secure by design and exemplify a distributed computing system with high Byzantine fault tolerance. Decentralized consensus has therefore been claimed with a blockchain. Continue reading “Top 10 Technology Buzzwords for 2019: AI, IoT, Blockchain, Robotic and more”

Internet of Things IoT Trends, Facts and Statistics

94% of companies believe the IoT will impact global markets over the next 3 years. (Source: Ericsson)

Combining IoT with big data and analytics could deliver incremental revenue of $14.4 trillion in the next decade. (Source: Morgan Stanley)

Key attributes of IoT Internet of Things
Key attributes of IoT Internet of Things

Continue reading “Internet of Things IoT Trends, Facts and Statistics”

101 Blockchain Cheat Sheet

What is blockchain?
The blockchain is a distributed ledger that offers transparency decentralization and data integrity.

  • Digital Ledger: A Blockchain is a digital ledger which keeps records of all transactions taking place on a peer to peer network.
  • Encrypted Information: All information transferred via blockchain is encrypted and every occurrence recorded, meaning once the block is created and added to the chain, it cannot be altered.
  • Peer to Peer: Lets you interact or send transactions with a peer, without an intermediary. Removes the middle man.
  • Data Sharing: The blockchain can be used for more than the transfer or currency. It can also be used to share contracts, records and any other type of data.
  • Decentralization: The blockchain is decentralized, so there isn’t a need for a central, certifying authority.
What is a Blockchain
What is a Blockchain

Continue reading “101 Blockchain Cheat Sheet”

Tips, Tools and Approaches to Improve Cybersecurity in Business

How can you make your business computers and devices as secure as possible? Cybersecurity remains at the front of many business leaders’ minds. As cyberattacks develop, so do awareness and defensive tools. To help you be more proactive in preventing cyber-issues, here are the list of best tips or applications to improve cybersecurity at your business.

Tips, Tools and Approaches to Improve Cybersecurity in Business
Tips, Tools and Approaches to Improve Cybersecurity in Business

Continue reading “Tips, Tools and Approaches to Improve Cybersecurity in Business”

How Internet of Things (IoT), artificial intelligence (AI) and blockchain Revolutionize Business

The Internet of Things (IoT), artificial intelligence (AI), and blockchain represent an unprecedented opportunity for the enterprise and the public sector. Every institution capable of exploiting these technologies will have a chance to radically streamline and enhance existing processes, create entirely new business models, and develop innovative products and services for a new generation of consumers. But this isn’t a vision of a utopian, tech-enabled future—the technology capabilities are available today to help you build the business of tomorrow.
Continue reading “How Internet of Things (IoT), artificial intelligence (AI) and blockchain Revolutionize Business”

How do I Clear All Windows Event Viewer Logs using cmd, PowerShell, c# or VBScript WMI?

Windows Event Viewer displays all the detailed information such as Errors, Warnings and even normal activities. Event Log at times doesn’t automatically remove all the information it stores, and that can be a problem for your computer’s performance as well. This article will show you how to quickly clear all Windows event logs in Event Viewer as needed in Windows 10 using command prompt, PowerShell script, c# command or VBScript / WMI.

Windows Event Viewer logs
Windows Event Viewer logs

Continue reading “How do I Clear All Windows Event Viewer Logs using cmd, PowerShell, c# or VBScript WMI?”