This was eating me up! This kept happening on my Dell P2419H. Every time I would display a video or website with dark content, the monitor would start to dim, noticeably. The fix was rather simple, looks like there is an option for dynamic contrast, turn that off, and you are good. Check out this image, hopefully your Dell monitor has this option.
This is such a silly thing to have to disable, but any time I was using voice to text, it would always put asterisks for swear words. This is on my Google Pixel 3 XL running Android 10 latest update of Feb 2020. The fix was to disable it in THREE spots, not just one, not just two, but all three. The three spots are: Gboard, Google voice typing, and in the text correction section.
Section #1 Google Voice Typing:
Settings > System > Languages & input > Virtual keyboard > Google voice typing and make sure that Hide offensive words is disabled.
Section #2: Gboard
Settings > System > Languages & input > Virtual keyboard > Board -> Voice Typing -> Offline speech recognition and make sure that Hide offensive words is disabled.
Section #3: Text Correction
Settings > System > Languages & input > Virtual keyboard > Board -> Text Correction and make sure that Block offensive words is disabled.
Section #4: UPDATED (Added April 21 2020)
If those three options do NOT resolve it, the 4th option you can use is to disable offline voice: Settings > System > Languages & input > Virtual keyboard > Gboard > Voice Typing > and disable “faster voice typing“.
I used to have an xcopy script that ran this, but now I have upgraded to using robocopy to mirror my files to a network share that I disconnect and put in cold storage when not actually backing up.
robocopy E:\ \\192.168.50.30\backup\ /E /XD “System Volume Information” “$RECYCLE.BIN” “found.00*” /MIR
Break down of the script: E: is the SOURCE of my files and \\192.168.50.30\backup\ is my DESTINATION to copy TO. If you not the XD trigger, that EXCLUDES certain files. I want to ignore certain system files that do not matter to my back ups. You can do this for nearly any directory. /MIR is what actually MIRRORS the files, so they will look exactly like what you have on your SOURCE directory structure.
The only downside is there is no versioning with this, what you see is what you get, so if you were struck with some randomsware, this won’t save you. You would want something like seafile, or some other back up service. If there’s any interest, I can make a post on how to create a seafile server to do your back ups and version control. It has the added benefit of having versioning, browser accessible, and phone applications.
I had issues converting an Eval server 2019 to a Standard Server 2019, and for whatever reason, it was painful to find the solution. Someone on reddit actually posted about it, so here is me documenting it for posterity!
# ISO Used: 17763.253.190108-0006.rs5_release_svc_refresh_SERVER_EVAL_x64FRE_en-us.iso
# Commands Executed:
DISM /online /Get-CurrentEdition DISM /online /Get-TargetEditions DISM /online /Set-Edition:ServerStandard /ProductKey:N69G4-B89J2-4G8F4-WWYCC-J464C /AcceptEULA slmgr.vbs /upk slmgr.vbs /ipk <MAK_KEY_HERE> slmgr.vbs /ato
# Initial Product Key is GVLK (unable to find official source at present)
|Windows Server 2019 Datacenter||WMDGN-G9PQG-XVVXX-R3X43-63DFG|
|Windows Server 2019 Standard||N69G4-B89J2-4G8F4-WWYCC-J464C|
|Windows Server 2019 Essentials||WVDHN-86M7X-466P6-VHXV7-YY726|
|Windows Server 2019 Azure Core||FDNH6-VW9RW-BXPJ7-4XTYG-239TB|
|Windows Server 2019 Datacenter Semi-Annual Channel (v.1809)||6NMRW-2C8FM-D24W7-TQWMY-CWH2D|
|Windows Server 2019 Standard Semi-Annual Channel (v.1809)||N2KJX-J94YW-TQVFB-DG9YT-724CC|
|Windows Server 2019 ARM64||GRFBW-QNDC4-6QBHG-CCK3B-2PR88|
I kept getting disk full issues when upgrading esx, this is such a silly error, and I really had no way around it outside of loading esx from a full iso and ilo in to boot. But I found a somewhat easier way to do it now via SSH and the upgrade update file.
- download the zip file from: https://my.vmware.com/group/vmware/patch#search
- upload it to a datastore
- Renamed it to update.zip – not required, but makes it easier
- esxcli software vib update -d /vmfs/volumes//update.zip
- If complete, go ahead and delete the file if you want to reclaim the space.
I was playing around with an older idrac 6 server Dell R210 ii and discovered this when I was trying to run a memtest remotely. It was a simple fix, although I wish the error was a little more obvious. The fix is to go to:
In the idrac 6 interface; go to system > console/media, then click configuration and enable virtual media, and click auto attach. Once you do that, click Apply.
I circled the options in the following image with handy dandy SNIP, ha ha.
I ran into this after updating a few 2960x’s with build dates of 2015. I attempted to down grade and had no luck with fixing. The research I did found 3 reasons the error popped up. Besides the error message popping up every 5 minutes or so, it killed all ip routing, making the switch useless. The exact error was:
%ILET-1-AUTHENTICATION_FAIL: This Switch may not have been manufactured by Cisco or with Cisco’s authorization. This product may contain software that was copied in violation of Cisco’s license terms. If your use of this product is the cause of a support issue, Cisco may deny operation of the product, support under your warranty or under a Cisco technical support program such as Smartnet. Please contact Cisco’s Technical Assistance Center for more information.
The two fixes are to shut down the switch, and leave it unplugged for 10 minutes. The third requires an RMA. I ran into the third one sadly. I even tried the latest iOS as of August 25 2019. You can read more about the error here: https://www.cisco.com/c/en/us/support/docs/switches/catalyst-2960-x-series-switches/118837-technote-catalyst-00.html
I was working on something with an IP conflict, and then locked myself out of routing via the VPN, so the quickest way to do a fix, was to change the IP of my idrac via command line. Apparently, you can do almost everything through command line.
First step is to get onto your idrac, replacing root and IP with your own information. Note, default username and password is root – calvin. If you have a newer idrac, I think starting around idrac8, there is a tab on the server that has the default idrac username and password:
- ssh firstname.lastname@example.org
- racadm getniccfg
You should now have a print out of your current configuration for your NIC. To change it, you just do the following:
- racadm config -g cfgLanNetworking -o cfgNicIpAddress 192.168.0.140
- racadm set iDRAC.IPv4.Address 192.168.0.140
Give it a few seconds, and it should kick you out, and now have the new IP address.
If you want a full subset of the documentation go here: http://ftp.dell.com/Manuals/all-products/esuprt_electronics/esuprt_software/esuprt_remote_ent_sys_mgmt/integrated-dell-remote-access-cntrllr-7-v1.30.30_User%27s%20Guide_en-us.pdf
Otherwise here is a snippet:
% Get all iDRAC settings in a file
racadm get -f config.txt
If you like you can change the contents of config.txt and apply it back to iDRAC
racadm set -f config.txt
% Set password for root user
racadm set iDRAC.Users.2.Password PASSWORD"
% List all ssh keys for root user
racadm sshpkauth -i 2 -v -k all
% Add ssh key to root user
racadm sshpkauth -i 2 -k 1 "CONTENTS OF PUBLIC KEY"
% Delete ssh key for root user
racadm sshpkauth -i 2 -d -k 1
% Get iDRAC IP config
racadm get iDRAC.NIC
% set iDRAC IP
Using config command:
racadm config -g cfgLanNetworking -o cfgNicEnable 1
racadm config -g cfgLanNetworking -o cfgNicIpAddress x.x.x.x
racadm config -g cfgLanNetworking -o cfgNicNetmask 255.255.255.0
racadm config -g cfgLanNetworking -o cfgNicGateway x.x.x.x
racadm config -g cfgLanNetworking -o cfgNicUseDHCP 0
racadm config -g cfgLanNetworking -o cfgDNSServersFromDHCP 0
racadm config -g cfgLanNetworking -o cfgDNSServer1 y.y.y.y
racadm config -g cfgLanNetworking -o cfgDNSServer2 y.y.y.y
• Using set command:
racadm set iDRAC.Nic.Enable 1
racadm set iDRAC.IPv4.Address x.x.x.x
racadm set iDRAC.IPv4.Netmask 255.255.255.0
racadm set iDRAC.IPv4.Gateway x.x.x.x
racadm set iDRAC.IPv4.DHCPEnable 0
racadm set iDRAC.IPv4.DNSFromDHCP 0
racadm set iDRAC.IPv4.DNS1 y.y.y.y
racadm set iDRAC.IPv4.DNS2 y.y.y.y
% Set iDRAC DNS Name
racadm set iDRAC.NIC.DNSRacName iDRACNAME
% Set iDRAC domain name
racadm set iDRAC.NIC.DNSDomainName DOMAIN.NAME
% Set iDRAC DNS Server
racadm config -g cfgLanNetworking -o cfgDNSServer1 x.x.x.x
racadm config -g cfgLanNetworking -o cfgDNSServer2 y.y.y.y
% Set Front LCD to hostname
racadm set System.LCD.Configuration 16
% Reset iDRAC to factory defaults
% Reset/Reboot iDRAC
racadm racreset OPTIONS
Options : soft, hard, cold
racadm serveraction powercycle
% Get Serial number (service tag)
% Get current system information
% Configure one-time-boot to PXE
racadm set BIOS.OneTimeBoot.OneTimeBootMode OneTimeBootSeq
racadm set BIOS.OneTimeBoot.OneTimeBootSeqDev NIC.Integrated.1-1-1
% Configure persistent Boot Device
racadm config -g cfgServerInfo -o cfgServerBootOnce 0
racadm config -g cfgServerInfo -i cfgServerFirstBootDevice HDD
% Check boot order list
racadm get BIOS.BiosBootSettings.bootseq
% Disable HyperThreading
racadm set BIOS.ProcSettings.LogicalProc Disabled
% Disable OS to iDRAC pass-thru for iDRAC service module (automatically create a pseudo NIC in OS)
racadm set iDRAC.OS-BMC.AdminState Disabled
% Change SNMP public community string
racadm set iDRAC.SNMP.AgentCommunity NEW STRING
% Disable ASR
racadm config -g cfgRacTuning -o cfgRacTuneAsrEnable 0
% Configure Serial redirection
racadm config -g cfgSerial -o cfgSerialConsoleEnable 1
racadm config -g cfgSerial -o cfgSerialBaudRate 115200
racadm config -g cfgSerial -o cfgSerialCom2RedirEnable 1
racadm config -g cfgSerial -o cfgSerialTelnetEnable 0
racadm config -g cfgSerial -o cfgSerialSshEnable 1
to access console via ssh console com2
% Disable Serial On Lan
racadm config -g cfgImpiSol -o cfgIpmiSolEnable 0
% Change Power Profile
racadm set BIOS.SysProfileSettings PerfPerWattOptimizedOs
% Set AC Power Recovery
racadm set BIOS.SysSecurity.AcPwdRcvry Last
racadm set BIOS.SysSecurity.AcPwdRcvryDelay Immediate
% Get RAID physical Disk information
racadm raid get pdisks
racadm raid get pdisks -o (all information)
racadm raid get pdisks -o -p state,size (specific information)
% Get RAID Virtual Disk Information
Racadm raid get vdisks
I was trying to create a password for a new user on a new install of webmin. I was trying out the latest everything, latest MySQL (MariaDB 10), PHP 7.3, Kernel 184.108.40.206 running on Centos 7. But for some reason, when adding a new SQL user, I kept getting: failed :
Password hash should be a 41-digit hexadecimal number
What I had to do was enter the hash of the password into the new user script. To get the hash, all you have to do it go to command line, enter:
mysql -u root -h localhost -p
Then enter your passwords, and enter your password you want to kick back the hash on:
Which will kick out:
Poof, now you can enter that as your password via your gui, or as an SQL command:
If you would like to read more about it, check here:
I’ve been using fast.com, powered by Netflix and it’s been working great. I was getting annoyed with ooklas somewhat intrusive ad tactics and was looking for something a little better. Fast.com works great and has a great little application door Android as well.