windows 10 1909 2004 20H2 access share network drive Error

– DNS Client it seems is used to cache DNS entries – so disabling it may lead to slow downs in page loading but not much more then that in “regular” configurations using only TCP/IP (no netbios or multiple networks involved here). To quote one source, this service is a “target of attacks which poisons the cache with fake DNS entries” sometimes.

after use Regedit to change the Dnscache’s start type to auto=2,

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Dnscache, and locate Start registry key
Change Startup type : =2

Automatic -2
Manual -3
Disabled -4
Automatic (Delayed Start) -2

จากนั้น Restart เครื่อง , the DNS CLIENT SERVICE status turns into STARTED, and the mapped drive works now.
กรณีขึ้น

Windows 10 Event ID 7001.
ERROR : The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.
can not map the drive using IP address of fileserver

ดูใน Error EVENT log for SOURCE: Service Control Manager, with EVENT ID 7001, with DNS Client service was disabled and stopped-remote access connection manager service failed.
Thus, i wondering how to – enable DNS Client Service. currently i is running under the account “Network Service”, local builtin administrator account can’t make change to this.

1.Enable the SMB 1.0 support by enabling the following Windows features from the Control Panel, then see if you could access the share:

Windows Feature

SMB 1.0/CIFS Client

2.Change the following services startup type from Manual to Automatic:
– Function Discovery Provider Host
– Function Discovery Resource Publication
– SSDP Discovery
– UPnP Device Host

3.

https://docs.microsoft.com/en-us/answers/questions/113515/mapped-drive-error-network-path-was-not-found-dns.html

html5 google drive play video autoplay

<p><video preload=”true” autoplay=”autoplay” loop=”loop” muted=”” width=”640″ height=”480″>

  <!– Safari –>

  <source src=”https://drive.google.com/uc?export=download&amp;id=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx” type=”video/mp4″ />

  <!– Chrome and FF –>

  <source src=”https://drive.google.com/uc?export=download&amp;id=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx” type=”video/webm” /></video></p>

xxx = 

Windows LAN Normal but Status show X Red Cross not Connect

regedit

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList

คลิ๊กขวา Permission

มองหา Network Service และ Local Service ดูถ้าไม่มีให้เพิ่ม สิทธิ์ Full Control

เลือก Advanced เลือก Replace all

จากนั้น Restart เครื่อง

Install Office to Installed Click to Run Office

Office 2016 Deployment Tool
https://www.microsoft.com/en-us/download/details.aspx?id=49117
download ติดตั้งลงใน folder ที่ต้องการ

ไปเวป
https://docs.microsoft.com/en-us/deployoffice/use-the-office-deployment-tool-to-install-volume-licensed-editions-of-visio-2016
คัดลอก script มาสร้างเป็นไฟล์ xml

ProductIDPIDKEY
Project Standard 2016ProjectStdXVolumeD8NRQ-JTYM3-7J2DX-646CT-6836M
Project Professional 2016ProjectProXVolumeWGT24-HCNMF-FQ7XH-6M8K7-DRTW9
Visio Standard 2016VisioStdXVolumeNY48V-PPYYH-3F4PX-XJRKJ-W4423
Visio Professional 2016VisioProXVolume69WXN-MBYV6-22PQG-3WGHK-RM6XC

และ Script ตัวอย่าง

<Configuration> <Add OfficeClientEdition=”64″ > <Product ID=”VisioProXVolume” PIDKEY=”69WXN-MBYV6-22PQG-3WGHK-RM6XC”> <Language ID=”en-us” /> </Product> </Add> </Configuration>

ตัวอย่างเช่น จะติด Project Pro 2016 ต้องแก้เป็น

<Configuration> <Add OfficeClientEdition=”64″ > <Product ID=”ProjectProXVolume” PIDKEY=”WGT24-HCNMF-FQ7XH-6M8K7-DRTW9″> <Language ID=”en-us” /> </Product> </Add> </Configuration>

แล้ว Save ชื่อ project.xml

จากนั้น cmd สิทธิ์ Admin ไป

พิมพ์ Setup.exe /download project.xml

โปรแกรมจะ download project มาให้

แล้วติดตั้ง Setup.exe /configure project.xml

10.0.19041.662

[10.0.19041.662]
LocalOnlyPatch.x64=1
LocalOnlyOffset.x64=88E81
LocalOnlyCode.x64=jmpshort
SingleUserPatch.x64=1
SingleUserOffset.x64=0CAE2
SingleUserCode.x64=Zero
DefPolicyPatch.x64=1
DefPolicyOffset.x64=189D5
DefPolicyCode.x64=CDefPolicy_Query_eax_rcx
SLInitHook.x64=1
SLInitOffset.x64=1D50C
SLInitFunc.x64=New_CSLQuery_Initialize

[10.0.19041.662-SLInit]
bInitialized.x64 =106028
bServerSku.x64 =10602C
lMaxUserSessions.x64 =106030
bAppServerAllowed.x64 =106038
bRemoteConnAllowed.x64=106040
bMultimonAllowed.x64 =106044
ulMaxDebugSessions.x64=106048
bFUSEnabled.x64 =10604C

SERVER 2012 R2 foundation

When you go to install an upgrade, the supported upgrade paths are checked in 2 registry Values located in “HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current Version”

Value 1: ProductName / Value 2: EditionID

If you can look up these values in an existing server, you find that Server 2012 R2 Standard ProductName=Windows Server 2012 R2 Standand / EditionID=ServerStandard

By changing the values that were in there for Foundation to these, I was able to immediately (no reboot needed) launch the Server 2012 R2 Standard setup and it proceeded to perform an in-place upgrade that worked flawlessly.

Hopefully this helps out someone else stuck in a similar circumstance. PS – You can use a similar procedure to upgrade Windows 7/10 Professional to Enterprise

ที่มา https://serverfault.com/questions/473565/in-place-upgrade-from-windows-server-2012-foundation-to-windows-server-2012-stan

User Certificate folder in Windows 7

ชื่อไฟล์ ดูได้จาก Thumbprint ไปหา ไฟล์ ได้ที่ folder

%APPDATA%\Microsoft\SystemCertificates\My\Certificates

ที่อยู่ของ Key
%USERPROFILE%\AppData\Roaming\Microsoft\Crypto\RSA\SID


%USERPROFILE%\AppData\Roaming\Microsoft\Credentials
%USERPROFILE%\AppData\Roaming\Microsoft\Protect\SID

Ref:https://superuser.com/questions/411909/where-is-the-certificate-folder-in-windows-7

Creative A350 Mini Din9 (MD-90SM) Pinout

Creative A350 Mini Din 9Creative A350 Mini Din 9 pin MD-90SM Pinout 
1. Signal Ground
2  Signal Ground  (Right Ground)
3. L in from 3.5 mm Jack
4  R in from 3.5 mm Jack
Right Speaker (R) Out
6 VCC+ to Switch On/OFF
7. Signal Ground
8  Right Speaker (R) Out
9 Switch to STAND BY PIN 


10.0.14393.3503

[10.0.14393.3503]
LocalOnlyPatch.x86=1
LocalOnlyOffset.x86=A6578
LocalOnlyCode.x86=jmpshort
LocalOnlyPatch.x64=1
LocalOnlyOffset.x64=8D8A1
LocalOnlyCode.x64=jmpshort
SingleUserPatch.x86=1
SingleUserOffset.x86=36CE5
SingleUserCode.x86=nop
SingleUserPatch.x64=1
SingleUserOffset.x64=1B6A4
SingleUserCode.x64=Zero
DefPolicyPatch.x86=1
DefPolicyOffset.x86=31209
DefPolicyCode.x86=CDefPolicy_Query_eax_ecx
DefPolicyPatch.x64=1
DefPolicyOffset.x64=F185
DefPolicyCode.x64=CDefPolicy_Query_eax_rcx
SLInitHook.x86=1
SLInitOffset.x86=45912
SLInitFunc.x86=New_CSLQuery_Initialize
SLInitHook.x64=1
SLInitOffset.x64=22C80
SLInitFunc.x64=New_CSLQuery_Initialize

[10.0.14393.3503-SLInit]
bInitialized.x86 =C2F94
bServerSku.x86 =C2F98
lMaxUserSessions.x86 =C2F9C
bAppServerAllowed.x86 =C2FA0
bRemoteConnAllowed.x86=C2FA4
bMultimonAllowed.x86 =C2FA8
ulMaxDebugSessions.x86=C2FAC
bFUSEnabled.x86 =C2FB0
bServerSku.x64 =E73D0
lMaxUserSessions.x64 =E73D4
bAppServerAllowed.x64 =E73D8
bInitialized.x64 =E8470
bRemoteConnAllowed.x64=E8474
bMultimonAllowed.x64 =E8478
ulMaxDebugSessions.x64=E847C
bFUSEnabled.x64 =E8480