Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Friday, July 28, 2023

Ghostscript + Mfilemon

Linux tips =  

https://github.com/vinifmor/bauh

https://github.com/AppOutlet/AppOutlet

An alternative to GNOME Gnome-software and KDE Discovery!



Windows tips =

GOOD ----->

  • Install Mfilemon
  • Install Ghostscript
  • Create a new printer. Choose manual configuration. Pick the driver from ghostscript\lib\ghostpdf.inf
  • Create a new port for the printer, select "Multi file port", name it GSPDF: or whatever
  • Configure the newly created port as follows:
    • Output path = C:\autopdf
    • Filename pattern = %Y_%m_%d\file%i.pdf
    • User command (change Ghostscript path as needed) = "C:\Program Files\gs\gs9.53.3\bin\gswin64c.exe" @"C:\Program Files\mfilemon\conf\gspdf.conf" -sOutputFile="%f" -
    • Use pipe to send data to user command = yes
    • Hide process = yes
  • Print a sample page. You should get a PDF in C:\autopdf\year_month_day\file0001.pdf
USER COMMNAD ON NEW VERSION OF GS =
"C:\Program Files\gs\gs10.01.2\bin\gswin64c.exe" @"C:\Program Files\mfilemon\conf\gspdf.conf" -sOutputFile="%f" -

https://github.com/lomo74/mfilemon

https://support.farmerswife.com/support/solutions/articles/17000092051-installing-ghostscript-pdf-printer

Prerequisites

gs921w64.exe or gs921w32.exe downloaded from https://www.ghostscript.com/download/gsdnld.html

mfilemon-setup.exe downloaded from https://sourceforge.net/projects/mfilemon/

Note: If you download a Ghostscript version later than 9.21 that's fine - but you need to know what version it is in order to be able to set up "mfilemon" properly.

++


https://sourceforge.net/projects/thinvnc/




Tiny11

https://github.com/ntdevlabs/tiny11builder



https://www.reviewgeek.com/102893/is-plex-legal


SSH TUNNEL = 

https://my.kualo.com/knowledgebase/?kbcat=0&article=890

https://sshtunnel.readthedocs.io/en/latest/

https://github.com/mattykay/pytunneling

https://github.com/tobor88/CSharp-SSH-Tunnels

Monday, November 7, 2022

Python nasušni

 https://sourceforge.net/projects/pyscripter/




Do you need encouragement while typing the best code ever?

Try this:



PDF literatura samo za Vas:

Learning DevOps ~560 strana
~Terraform, Azure DevOps, Kubernetes and Jenkins

Cloud Security Handbook ~456 strana
~AWS, Azure, GCP

{ kontaktiraj me odmah ! }

++






Regata OS is a Brazilian Linux distribution based on openSUSE, focusing on desktop and gaming needs. Its main characteristics include a Regata OS store for installing applications and games, out-of-the-box integration with Google Drive, support for a gaming mode via the Vulkan graphics API, an extensive library of games in the Regata OS Game Access portal, support for configuration of hybrid graphics in notebooks, and easy transfer of files between a computer and a smartphone. The distribution's user interface is KDE Plasma.



C# niche =


JavaScript niche =




Friday, November 5, 2021

Ventoy Linux goodies 2

Contact
Breaking News
I don't want update
WinPatrol
I don't want update 2 + backup
Screenter
An interesting stuff
Useful
Find me on Xonotic
Online code editor MSVSC
Sounds for Your Keyboard App

 


What is your typing speed ?

Fast programming without installation, just from web browser:


Windows goodies:

https://www.howtogeek.com/223864/how-to-uninstall-and-block-updates-and-drivers-on-windows-10/

https://www.howtogeek.com/765377/how-to-block-the-windows-11-update-from-installing-on-windows-10/

The Ventoy hall of fame:




1
2
3
4
...








PORTEUS GOODIES:

Once the USB drive is booted making it persistence is a 2 step process.

1. You create a savefile file.

Menu > System Tools > Porteus Savefile Manager
Enter the password for root. toor
Click on Click + to create a new savefile file.
Enter the Location of your USB drive. Usually something like sdb1.
Click OK.

Thus on your USB drive, sdb1, you will have a savefile file named: porteussave

2. You tell the Porteus boot menu where the savefile is.

Open the /mnt/sdb1/boot/syslinux/porteus.cfg file. sdb1 being the address of your USB drive.
Scroll down to the first APPEND line.
To the APPEND line add: changes=/mnt/sdb1/porteussave

When you reboot changes you make will be saved.

OK?

#VentoySerbia
#VentoySrbija
#LinuxSerbia
#LinuxSrbija 
#SolusLinuxSerbia
#SolusLinuxSrbija
#NuTyXSerbia
#NuTyXSrbija
#NixOSSrbija
#NixOSSerbia
#Pop!_OSSerbia
#Pop!_OSSrbija
#EndeavourOSSerbia
#EndeavourOSSrbija
#LinuxLiteSerbia
#LinuxLiteSrbija
#PorteusSrbija
#PorteusSerbia

 


Thursday, October 7, 2021

Kako napraviti koristan bekap svega

 https://www.howtogeek.com/213145/how-to%C2%A0convert-a-physical-windows-or-linux-pc-to-a-virtual-machine/


https://www.virtualbox.org/wiki/Migrate_Windows



More tips for a good party:

https://www.homemade-circuits.com/simple-hobby-circuits/

Kako zaraditi od čepova:

https://www.instructables.com/Recycled-Chopping-Board/?utm_source=newsletter&utm_medium=email

MORE TIPS:

C:\>

cmd

edit c:\driver.bat

shutdown -s

Alt+F+S
Alt+F+X

C:\>

at 15:40 /every:M,TW,Th,F,S,Su c:\driver.bat


Ова команда ће Вам осигурати да се искључи компјутер после радног времена Ваших заборавних радника !

EndeavourOS+Firefox+YouTube_ram_usage = 1,28 GB





GOOD TIPS:

1) Run > Services.msc
WindowsUpdate, Disable

+ 2)
Run > Regedit
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows
On The Left Panel...
New>Key
\WindowsUpdate
New>Key
\AU
On The Right Panel... > RightMouseKeyPress > New > REG_DWORD (32-bit) Value
NoAutoUpdate
1



----------------
OR
----------------

noautoupdate.reg:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AU]
"NoAutoUpdate"=dword:00000001



NE555 pin functions

Tuesday, October 5, 2021

Windows 10 update


With a backup at hand, now it's safe to customize a Windows 10 update without receiving any forced updates on your computer. Here's how to make the change in Registry: 1. Press the Windows key + R key to open the Run command. 2. Type regedit, and click OK to open the Registry. Browse the following path: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows 3. Right-click the Windows folder, select "New" and then click "Key". 4. Name the new key "WindowsUpdate" and press "Enter". 5. Right-click the newly created key, select "new", and click "Key". 6. Name the new key AU and press Enter. Inside the newly created key, right-click on the right side, select "New", and click on "DWORD (32-bit) Value". 7. Name the new key AUOptions and press Enter. Double-click the newly created key and change its value to 2. It's for "Notify for download and notify for install". Click "OK". 8. Close the Registry to complete the task. Using this value prevents Windows 10 from downloading updates automatically, and you'll get a notification when new updates are available. In this way, you can avoid any auto Windows 10 update effectively. That's how you could make an attempt to disable Windows 10/11 updates in every way. Each method has been proved to work as long as you wish to turn off all the automatic updates in Windows 10.

*




An incredible idea:

<?php

require('./fpdf.php');

$pdf=new FPDF();
$pdf->AddPage();
$pdf->SetFont('Arial','B',16);
$pdf->Cell(40,10,'Hello World!');
$pdf->Output('c:\test1.pdf');
shell_exec("'C:\Program Files\Adobe\Acrobat 6.0\Reader\acrord32.exe' /t c:\test1.pdf \\myserver\myprinter");
?>

CMD>

path "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\"


acrord32 /p /h d:\20200122082625.pdf


Antix, MX, PepprmintOS are the fastest ever, you can install everything from Ubuntu-Debian realm. PeppremintOS has preinstalled Flatpak and Synaptic package manager.
NuTyX and NixOS are an independent distros. NixOS is a brilliant distro.
NeptuneOS is Debian-based Plasma KDE. Nitrux is very good too, it has a Calamares installer.



Tuesday, November 17, 2020

WWII

 https://www.wwiionline.com/

https://www.etlegacy.com/


MORE TIPS:

https://swift.org/download/#releases

https://github.com/compnerd/swift-win32






Pasulj s jajima

1/2 kg belog pasulja,

4 kuvana jajeta,

200 g kačkavalja,

1 kašika seckanog peršuna,

3 struka od zelenog dela mladog luka,

2-3 čena belog luka,

1 kašičica mlevene paprike,

250 ml slatke pavlake,

2 kašike kisele pavlake,

3 jajeta,

so, biber.

PRIPREMA:

Pasulj skuvajte i izmiksajte. Ako nemate vremena, možete da koristite i pasulj iz konzerve.  Dodajte mlevenu papriku, iseckan crni luk, ispresovan beli luk, peršun, so i biber. Sve dobro promešajte i izručite u vatrostalnu posudu podmazanu puterom. Masu od pasulja ravnomerno rasporedite, preko nanesite polovinu izrendanog kačkavalja, zatim kolutove tvrdo kuvanih jaja i ostali deo kačkavalja. Umutite pavlaku sa jajima, malo posolite i prelijte preko kačkavalja. Stavite da se zapeče na 200 stepeni oko 30 minuta. Isključite rernu, pokrijte folijom i ostavite da odstoji još oko 15 minuta. Služite vruće uz salatu po želji.


Friday, July 24, 2020

Postanite profesionalni programer na Linuxu

1) Instalirajte Linux Lite

2) otvorite command promt i unesite:

sudo apt-get update
sudo apt-get lazarus-ide
sudo apt-get lazarus

Čestitamo, sada ste spremni za velika dela:




Lazarus-ide možete koristiti i za programiranje u Windows 10, ali nije u tome poenta, nego da više promovišemo open sors i Linux koji je zapostavljen u Srbiji.

https://rti.etf.bg.ac.rs/rti/ir1p1/materijal.html

https://bubblecup.org/

http://messylab.com/

Object oriented concepts and design patterns

https://medium.com/@ronnieschaniel/object-oriented-design-patterns-explained-using-practical-examples-84807445b092

https://hackernoon.com/10-oop-design-principles-every-programmer-should-know-f187436caf65

https://www.codingame.com/playgrounds/503/design-patterns/object-oriented-programming

https://www.cs.uct.ac.za/mit_notes/software/htmls/ch08s03.html

https://www.geeksforgeeks.org/design-patterns-set-1-introduction/

https://www.freecodecamp.org/news/the-basic-design-patterns-all-developers-need-to-know/

https://github.com/samsam-026/Design_Patterns

https://www.tutorialspoint.com/design_pattern/design_pattern_overview.htm


Bubble Cup finals programming environment


We are just couple of days away from the start of the finals. Compilers and IDEs available on the finals are:
  • C++
    • IDE: CodeBlocks 16.01, Visual Studio 2017
    • Compiler: MinGW 4.9.2, Visual Studio 2017
  • C#
    • IDE: Visual Studio 2017
    • Compiler: Visual Studio 2017
  • Pascal
    • IDE: Free Pascal, Lazarus 1.6.4
    • Compiler: Free Pascal Compiler 3.0.2

Thanks,
Bubble Cup Crew

Tuesday, March 3, 2020

Multi-platformsko programiranje za Windows, Linux i macOS

https://wiki.freepascal.org/Multiplatform_Programming_Guide


********************
Microsoft Windows 20
MORE TIPS:

http://cegui.org.uk/features

http://vclua.luaforge.net/#Downloads

https://forum.cockos.com/showthread.php?t=176662

http://tset.de/mini_utf8/index.html

https://www.beamng.com/threads/lua-tutorial-how-to-create-in-game-gui.3953/

https://blog.emsisoft.com/en/34083/how-to-protect-your-companys-backups-from-ransomware/

First thing: ransomware doesn't really "hide" per se. If you get hit with cryto, believe me, you'll know it because your employees will definitely tell you. If you don't have data services watching your files and alerting you to sudden unexpected changes, the employees will be your canary in the coal mine; throwing loud and apocalyptic sounding fits when they suddenly can't access their work.

The whole idea of ransomware is to separate your company from its own data and to hold that data hostage until the author gets paid. Databases, Office documents, email OST and PST files, multimedia files, etc. will more or less suddenly become unreachable because the infection will encrypt those files and, often, even change the file-types on them in order to make them doubly hard to access. Most infections will even be so kind as to leave a ransom note in each folder that it has touched, with instructions on how to pay up in order to get the decryption key.

The good news is that, at least in my experience (yeah, I've been through a crypto attack and not only lived to tell the tale, but got all my company's data back without paying the ransom, thanks to copious backups), crypto won't usually go after your backups unless the drives that those backups are on are mapped on patient zero. If you're backing up to tape, even better.

You see, 99 times out of 100, the infection will come as an email to one of your users. In typical ID-10-T user fashion, they'll click a link without bothering to verify it, or open and execute an attachment, even though they don't know who it's coming from. As soon as they execute such a nasty piece of work, it will, almost invariably, go to work immediately, like PAC-MAN, on your data. So, if your backups are separated from your users, themselves, they - the backups - will be safe from all but the most sophisticated of attacks. You have to remember what these guys are after: they want to get paid - as often and as quickly as possible. It would be against their best interests to create a time bomb variant that sits on your backups and hits you at some later date. Something like that would be more in line with targeted state cyber warfare or industrial espionage than your run of the mill ransomware attack.

As said before, keep your AV and whatever other security schemes you have in place updated and running, don't map drives on your users' machines that you're too afraid of losing if you can help it, and keep a weather eye out for odd behavior on your data drives. Then you should be ok. If you suddenly find that files and folders have become unreachable due to being changed en-mass, find patient-zero - should be easy because they'll be the first to alert you that they can't do their work - then nuke their machine, administer some "wall-to-wall counseling" to said ID-10-T user, and then go to your backups from before the incident started. It really is as simple as that.

https://www.infopackets.com/news/10422/8-ways-protect-your-backups-ransomware

https://www.acronis.com/en-eu/ransomware-protection/


https://redmondmag.com/articles/2019/10/22/how-to-ransomware-proof-your-backups.aspx

https://www.synology.com/en-global/solution/ransomware

https://www.itsmdaily.com/8-ways-to-protect-your-backups-from-ransomware/

https://www.pcmag.com/picks/the-best-ransomware-protection

Crucial practices against ransomware attacks on your PC 
Ransomware has become a growing threat to home users and small offices with less sophisticated defense systems. Put an end to malware infections, here are some tips and tricks to avoid becoming another victim of ransomware.

Update your operating system
Outdated computer systems are relatively more vulnerable to ransomware attacks. This is why it is essential to perform regular software and operating system updates to improve the security of your computer.

Install a reputable security suite
Install a good antivirus software or a reputable security suite to help you detect and fight off malicious threats, giving you an extra form of protection.

Avoid suspicious files
Stay on guard and think twice before opening email attachments or clicking files from unknown sources. Watch out for suspicious files with hidden file-extensions such as “.pdf.exe”

Disable remote access
Malware often targets computers using RDP (Remote Desktop Protocol). Keep RDP disabled if you do not require remote access.

Multi-version backup, your best weapon against ransomware 
Encryption-based ransomware is getting sophisticated and may not be detected by anti-malware software in time. Once infected, you will be locked out from your own data and there is still no guarantee you can retrieve your data even after paying the ransom! It is highly recommended to perform routine backups to restore infected files and minimize damage. Take advantage of multi-version backup — a robust backup solution allowing you to restore previous versions of the infected files.

Back up your computer data to NAS
Create a multi-version backup for point-in-time recovery to avoid paying a hefty ransom to unlock your data. Synology Drive Client is the perfect solution to backing up data stored on your computer to Synology NAS servers. You can retain up to 32 historical versions of a single file – kept safe from folder encryption. Learn more about Synology Drive Client

Back up NAS data to other destinations
Backing up locally just might not be enough should a more destructive ransomware attack shared folders on your NAS server through accessing file services on your PC. The best way to prevent this is to add another layer of protection by having uninfected backup versions stored in an offsite location. If you fall victim of ransomware, you can still access data stored at different locations.

Hyper Backup  
Hyper Backup lets you enjoy a full range of multi-version backup destinations from local shared folders, expansion units, and external hard drives, to network shared folders, rsync server, and public cloud services.

Hyper Backup also offers solid protection for local backup. You can isolate data from internet threats by configuring your PCs' access privilege to certain shared folders on Synology NAS to further prevent outside forces from accessing critical backup data stored in your NAS shared folder. Learn more about Hyper Backup

Snapshot Replication 
The cutting-edge Btrfs file system supports state-of-the-art snapshot technology on select NAS models. Snapshot Replication allows you to replicate data from a primary site to an offsite location up to every 5 minutes and 15 minutes for LUNs, ensuring all your critical data in shared folders or virtual machines in iSCSI LUNs can be recovered quickly in the event of disaster.




Tuesday, October 22, 2019

Admin CMD.exe

Press Windows+R to open the “Run” box. Type “cmd” into the box and then press Ctrl+Shift+Enter to run the command as an administrator. And with that, you have three very easy ways to run commands in the Command Prompt window as administrator.

Friday, November 16, 2018

Još koristite Windows XP Pro SP3, onda pročitajte ovaj tekst

Imate veliku korporativnu mrežu starih kompjutera sa Windows XP u 2018. godini:
*instalirajte dodatni najnoviji sigurnosni pach zaWindows XP SP3 verziju:

https://www.catalog.update.microsoft.com/search.aspx?q=4500331

https://www.avg.com/en-us/windows-xp-antivirus

https://www.avast.com/windows-xp-antivirus


AVG i Avast još uvek zvanično podržavaju Windows XP iako je 2018. godina. AVG tvrdi da pokriva sve sigurnosne rupe koje vremešni Windows XP ima, kao i da obezbedjuje najbolju i najoptimalniju zaštitu od virusa, spyware-a, malware-a i ostalih modernih pošasti.

MORE TIPS:

Imate jedan kompjuter na LAN-u viška, onda instalirajte:


SecurityOnion Linux i imate IDS za zaštitu svoje mreže.

Kodovi za mobilni:

Kod *#21#

Kada ukucate ovaj kod možete otkriti da li su vaši pozivi i poruke preusmereni. Status svake informacije će biti prikazan na ekranu. Ovu funkciju često koriste oni koji sumnjaju da ih partner vara, ili roditelji koji se staraju o bezbednosti svoje dece.

Kod *#62#

Ovaj kod upotrebljava se kada korisnik želi da sazna gde se preusmeravaju pozivi, poruke i podaci za koje vam se čini da do njih niko ne može da dopre.
Kod *#06#
Koristi se kada želite da saznate svoj IMEI broj. Ako znate ovaj broj, možete da pronađete svoj telefon kada ga neko ukrade. Kada je uključen, njegova lokacija se direktno prenosi na mrežu operatera, pa čak u slučaju da je ubačena druga kartica.

Kod 002#

Reč je o univerzalnom kodu koji služi za isključivanje bilo kakve vrste preusmeravanja na vašem telefonu. Dobra ideja da ovo uradite pre nego što otputujete u inostranstvo gde koristite usluge rominga. Pomoću ovog koda obezbedićete se od troškova za pozive koji bi bili preusmereni na vašu govornu poštu.



MREŽNA OPREMA KOJA TREBA SVAKOJ FIRMI KOJA DRŽI DO SEBE:

1) FIREWALL:

https://www.alibaba.com/product-detail/Cisco-5500-series-Firewall-ASA5525-K9_60794373485.html?spm=a2700.7735675.normalList.6.rdzjvG&s=p


Original and Brand New  Cisco Firewall ASA5525-K9:  ASA 5500 Edition Bundle ASA5525-K9 ASA 5525-X with SW, 8GE Data, 1GE Mgmt, AC, 3DES/AES


Product CodeASA5525-K9
Interfaces8 copper GE ports
1 copper GE management port,
1 expansion slot
Stateful inspection throughput (maximum)2 Gbps
3DES/AES VPN throughput300 Mbps
IPsec VPN peers750
Virtual interfaces (VLANs)200
Memory8 GB
Flash8 GB
Height (rack units)1 RU
Dimensions (D x H x W)4.45 x 20.04 x 36.2 cm
Package Weight13.1 Kg

2) SWITCH:

https://www.alibaba.com/product-detail/Cisco-Catalyst-2960-48-Port-Network_60769435692.html?spm=a2700.7735675.normalList.28.BrqMvb&s=p

WS-C2960-48TT-L Specification

Specifications
TypeFixed
TopologyEthernet (10/100BaseTX)
Ethernet (10/100/1000BaseT)
Maximum Port density48 10/100 ports
Uplinks2 10/100/1000 ports
Modular/Expansion Slotsn/a
ArchitectureLayer 2 Switching (basic connectivity), Layer 2 Switching (intelligent services), Voice Enabled
Form FactorFixed, Rack Mountable, Standalone/Clustering
Dimensions1.73 x 17.5 x 9.3 in.
DRAM64 MB


3) ROUTER:

https://www.alibaba.com/product-detail/Original-CISCO1921-SEC-K9-Ethernet-LAN_60768449210.html?spm=a2700.7735675.normalList.6.5G8m3i&s=p

Here is the Details of  Router CISCO1921/K9
Device TypeRouter
Enclosure TypeDesktop, rack-mountable - modular - 1U
Data Link ProtocolEthernet, Fast Ethernet, Gigabit Ethernet
Network / Transport ProtocolIPSec, L2TPv3
Routing ProtocolOSPF, IS-IS, BGP, EIGRP, DVMRP, PIM-SM, static IP routing, IGMPv3, GRE, PIM-SSM, static IPv4 routing, static IPv6 routing, policy-based routing (PBR), MPLS
Remote Management ProtocolSNMP, RMON
FeaturesFirewall protection, VPN support, MPLS support, VLAN support, Syslog support, IPv6 support, Class-Based Weighted Fair Queuing (CBWFQ), Weighted Random Early Detection (WRED), Quality of Service (QoS), Web Services Management Agent (WSMA), TR-069 Agent, NetFlow
Compliant StandardsIEEE 802.3ah, IEEE 802.1ah, IEEE 802.1ag

Interfaces2 x 10Base-T/100Base-TX/1000Base-T - RJ-45
Serial : 1 x console
Management : 1 x console - mini-USB Type B
Serial : 1 x auxiliary
USB 2.0 : 1 x 4 pin USB Type A
Expansion Slots2 (total) / 2 (free) x EHWIC

NASTAVAK....... CONTINUE-----------------