Blogs

Google apologizes for scaring Cloud users with ‘past due’ emails

Google has apologized for a wave of emails warning Google Cloud Platform, Firebase, or API customers that their accounts may be suspended for a past due balance. Users began receiving these emails on September 22nd, which warned that their account was “past due or does not have valid payment information”. Action required Dear Google customer,  You are receiving this email because you are a Google Cloud Platform, Firebase, or API customer.  Our records indicate that your billing account: [account_id] is past due or does not have valid payment information associated with it. This may happen if your credit card has expired or was cancelled, and we haven’t received valid payment information from you. Please update your billing account with valid payment information. Failure to make payments may result in suspension and/or termination of your billing account and the related Project(s) or Service(s). If you have already updated your payment information, please disregard this message. Other users reported similar emails even though they had valid payment information configured. Google apologizes for the emails Today, Google sent another email to Google Cloud Platform users apologizing for the previous past due notices. “You may have received a notification from us yesterday or earlier today indicating that your billing account is past due or your payment information is invalid and must be updated. That notification was provided in error due to a technical issue,” explained today’s email from Google. “The issue has been resolved, and no action is required on your part.” “We apologize for any inconvenience this may have caused.” According to an incident report on the Google Workspace Status Dashboard, the issue began on September 22nd at 5:10 PM EST and lasted through September 23rd at 4:30 AM. Google states an update to their payment configuration for the Google Cloud Platform caused these erroneous emails to go out. “Google Workspace customers received a warning message on the Admin console user interface and an email regarding an issue with processing their account payment. Impacted customers were redirected to update payment information. Attempts to update the primary payment method caused the admin console to become unresponsive,” explains Google in an incident report. “Initial investigation of this issue revealed the impact was triggered after an update to the payment configuration was released during the impact time frame.” Users who have received these emails should ensure that they have accurate payment information in the console and that there is no past due balance. All others can simply ignore the emails. NOTE:: This article is copyright by bleepingcomputer.com and we are using it for educational or Information purpose only.  
Read more

Revamp Website for Aman Tech Institute

  YISolutions, an Managed  IT Services & Cyber Security  Solution company based in Karachi, Pakistan, is pleased to announce our new working relationship with Aman Tech Institute. Aman Tech has selected YISolutions as their Website Revamp Services.    Services provided to Aman Tech; Analyze the “old” website Define and update the website’s target audience Personalize website based on their brand Rebranding or Repositioning Adding more functionality to a website More control over Content Adopt to modern Technology Start building the website revamp plan   Aman Tech revamp website  is here – AmanTech.edu.pk   Aman Institute for Vocational Training (AmanTech) is a section 42 organization incorporated in Pakistan under SECP. It’s an independent organization with a Board of Directors inducted in 2019 and one of the most qualified faculty in TVET sector. YISolutions is a key player in IT Consultancy, Cyber Security and Managed IT Services. YISolutions was established in 2002-2003 and our Pakistan Registered Office is located in Karachi at Clifton. And our Principle Registered office is located in the US at Herndon. For more information please email us at  support@yi.com.pk  
Read more

How to increase an IIS webservice time-out period in Windows 10?RSS

In an IIS (version 10.0) webserivce under Windows 10, you know, the default time-out period is 110 seconds. I was trying to extend the time-out duration to 200 seconds (3 minutes 20 seconds). I got a hyperlink https://stackoverflow.com/questions/2414441/how-to-increase-request-timeout-in-iis/51010915 for a solution to increase the IIS webservice time-out duration, on my Win10 Laptop, but all of the approached failed to make even a second extension! In summary, I have applied the following approaches: 1) Set the “executionTimeout” value to be 200 seconds in the web.config file and a specific .aspx page file in a webservice application. For example, <system.web> <httpRuntime executionTimeout="200" /> </system.web> 2) adjust the server webFarm configuration in the Win10 configuration file %WinDir%\System32\Inetsrv\Config\applicationHost.config For example, <webFarm name="${SERVER_NAME}" enabled="true"> <server address="${SERVER_ADDRESS}" enabled="true"> <applicationRequestRouting httpPort="${SERVER_PORT}" /> </server> <applicationRequestRouting> <protocol timeout="${TIME}" /> </applicationRequestRouting> </webFarm> 3) set the “connection time out” value in IIS “Advance Settings”. The detailed operations are shown below: Open your IIS Go to “Sites” option. Mouse right click. Then open property “Manage Web Site“. Then click on “Advance Settings“. Expand section “Connection Limits“, here you can set your “connection time out“ 4) Run the following Power Shell command: Set-WebConfigurationProperty -pspath 'MACHINE/WEBROOT/APPHOST/Default Web Site' -filter "system.web/httpRuntime" -name "executionTimeout" -value "00:03:20" 5) Execute the following AppCmd commands: appcmd.exe set config "Default Web Site" -section:system.web/httpRuntime /executionTimeout:"00:03:20"
Read more

How to Configure Email Routing in cPanel

Email hosting helps users to run their email servers with their domain name. Email hosting service in cPanel allows a client to send and manage email accounts through webmail and email clients via SMTP/POP/IMAP connection protocols. cPanel allows a client to create email addresses, configure mail clients, forward mails, change passwords, and also access the webmail directly. cPanel owns its mail server, which manages emails. Whereas, Email Routing allows clients to route incoming domain mail to a specific server. The changes made in the cPanel will be auto reflected in the domain’s DNS entries, and this helps to create a backup server for mail when the main server is down. The Email hosting service helps clients to give a professional look for their business by creating an email server with their domain name. This service helps to filter the inbox virtually for SPAM and virus protection. The Email hosting service always assures email delivery of valid, spam-free, non-bulk emails. The hosting services mainly use digital signature technology to eliminate known spam signatures. The main features included with Email management service in cPanel are: Email Accounts: The email accounts option in cPanel helps the client to create or delete an email address, manage email accounts. Email Forwarder: Email forwarder helps a client to forward all the emails from different accounts into a single account or to a different domain. Autoresponders: This feature helps a client to set or configure an email to send an automated reply to all emails received to their account. Email Routing: Email Routing helps a client to route all their emails to a specific server. This feature helps the client to create a backup server for their domain mail server. TrackDelivery: This feature gives a clear idea to the client about the spam score of their emails. They can also check the email delivery route to identify any delivery attempt issues. This interface helps a client to identify the errors while sending an email using the delivery report. Email Filters: This interface helps the user to block unwanted emails, based on the rules set by them. By using an email filter interface, the client can set multiple rules in a single filter. Address Importer: Using the cPanel address importer feature, a client can create multiple email addresses or forwarders in an account. This interface supports .xls or .csv type of data import. The address importer also helps the client to import the email forwarder list. Encryption: cPanel uses cryptographic algorithms to encrypt or decrypt messages. The encryption interface helps a client to create a GnuPG key, delete, or view the key. Also, it helps to import a key that is already present in their local system. Global Email Filters: The global email filters interface helps the client to configure how the server filters all the email that their domains email account receives. Usually, it is recommended to use multiple and simple filters instead of a single large filter. Email Disk Usage: This feature helps the client to view the disk usage and also allows them to view their mailbox items and remove old or large messages. Configure Email Routing in cPanel 1) Login to cPanel and navigate to the “Mail” section. 2) Click on the “Email Routing” icon to open the page. 3) While opening an Email Routing page, you will receive a warning. The warning advises you that if you set any incorrect options, then it may affect your email delivery. You need to contact the system administrator if you are unsure about the options to select. 4) After the warning, you will see a note that gives you a link to the Zone editor. If you intend to change the mail server records (MX Records), then you should be using the Zone editor to make those changes. 5) Select the desired domain from the menu. If only one domain exists on your cPanel account, the system selects it automatically. 6) After selecting the domain details from the drop-down, you will be able to configure Email Routing using any of the four options given below: Automatically Detect Configuration: The system automatically detects what configuration to be selected according to the priorities of your MX records- Local, Backup, or Remote mail Exchanger. Local Mail Exchanger: This option enables the server to receive an email even if any MX entry of higher priority is found. The system will deliver to both local and server mailbox. Backup Mail Exchanger: The server will act as a backup exchanger. If the primary mail exchanger with a proper MX entry is down, then the server will hold all the emails until the primary mail exchanger is back online. Remote Mail Exchanger: The server will not accept mail for this domain. The system sends all mail for this domain to the lowest numbered mail exchanger. 7) Once you have selected the desired version, click on the Change button to apply the changes.   So, this is how you can configure Email routing in cPanel. It is a useful feature but you need some experience with it to actually understand how it works. If you are stuck somewhere in the process, please let us know in the comment section given below. If you are using InterServer web hosting, please contact our support department for the quick help!
Read more

SSL Solutions for Muller & Phipps (M&P)

YISolutions, an Managed IT Services & Cyber Security Solution company based in Karachi, Pakistan, is proud to announce that Muller & Phipps Pakistan (Pvt.) Limited has selected YISolutions as their SSL Certificate Solution. This is the 1st Time, our SSL Certificates Solution selected by Muller & Phipps Pakistan (Pvt.) Limited    Services Provided; Implementation of Secure Sockets Layer Related Application security Related Network security Automatic Client Authentication Management of SSL  Ensure Compliance   M&P is an active part of various associations to extend our mission of innovation, care, ethics, and responsibility into the lives of the people we serve. Our tremendous growth in the past years has allowed us to forge powerful relationships with the member associations to deliver the high quality and standards that our customers require.   YISolutions is a key player in IT Consultancy, Cyber Security and Managed IT Services. YISolutions was established in 2002-2003 and our Pakistan Registered Office is located in Karachi at Clifton. And our Principle Registered office is located in the US at Herndon. For more information please email us at  support@yi.com.pk
Read more

Google Chrome to no longer show secure website indicators

Google Chrome will no longer show whether a site you are visiting is secure and only show when you visit an insecure website. For years, Google has been making a concerted effort to push websites into using HTTPS to provide a more secure browsing experience. To further push web developers into only using HTTPS on their sites, Google introduced the protocol as a ranking factor. Those not hosting a secure site got a potentially minor hit in their Google search results rankings. It has appeared to have worked as according to the ‘HTTPS encryption on the web’ of Google’s Transparency Report, over 90% of all browser connections in Google Chrome currently use an HTTPS connection. Currently, when you visit a secure site, Google Chrome will display a little locked icon indicating that your communication with the site is encrypted, as shown below. As most website communication is now secure, Google is testing a new feature that removes the lock icon for secure sites. This feature is available to test in Chrome 93 Beta, and Chrome 94 Canary builds by enabling the ‘Omnibox Updated connection security indicators‘ flag. With this feature enabled, Google Chrome will only display security indicators when the site is not secure. For businesses who wish to have continued HTTPS security indicators, Google has added an enterprise policy for Chrome 93 named ‘LockIconInAddressBarEnabled’ that can be used to enable the lock icon again on the address bar. How to disable Chrome’s security indicators For those who want to test out the disabling of Chrome security indicators feature, you can enable it in Chrome Beta or Chrome Canary using these instructions. Enter chrome://flags in the address bar and press enter. Search for ‘security indicators.’ When the ‘Omnibox Updated connection security indicators‘ flag is shown, click on ‘Default‘ and select ‘Enabled.’   Now relaunch the browser when prompted. Google will no longer show you if a site is secure and only show an indicator when you visit an insecure site.      
Read more

“The Transaction Log For Database Is Full” Easy Steps to Resolve

Table of Contents Now let’s understand why does this The transaction log for database is full error get occurred and how to deal with it. Increase the Transaction Log file size You May Also Like Microsoft is a widely used database in windows server, also its be default SQL server with a Plesk control panel which is used on windows base server in hosting industries. Every database has its own property and limitations set when it gets created, many times it happens that these resources get exhausted after a certain period of time. And one of the commonly reported issues about this is “The transaction log for database ‘xxx’ is full”. When you reach your limitation of transaction log size you get this issue Now let’s understand why does this The transaction log for database is full error get occurred and how to deal with it. What is a transaction log file, it’s simply the record of the activities performed on the database and a complete track recode of it, It also uses in database recovery so you know what’s the importance of it, a Transaction log file (.IDF) keeps on increasing by the period of time as the transactions keep growing and in most case, if the database has any unidentified transaction its cause the log fie filled rapidly. In this post, we will be going to show you step by step actions to overcome “The transaction log for database is full” issue. There is two way of solving this issue. Shrink the Transaction Log Increase the Transaction Log file size Shrinking the SQL server shrink log file Many of us know about the shrinking option now let’s see how we can shrink the transaction log file. We can easily perform this action by using the SQL server management studio for shrinking the transaction file. Step 1 : Login into the SQL server management studio with “SA” user Step 2: Expand the databases > and select the database name which is having transaction log size full issue Step 3: Right Click on database name and go to Task > Shrink > Files Step 4:  Here, in this step, you have to select “File Type” as “Log” and “File Name” of the transaction log file. And then, you will be seeing a check box in name of release unused space. Click on the check box and this enables us to reduce the transaction log files space but it doesn’t delete any files to reduce the space. Step 5: You can find another check box option called “reorganize files before unused space”. When you select this option it will allow you to enter the value for shrinking the logs. If you use this option then this is permanent so by default, your process will be cleared. by doing this you mean to reduce the rows and to relocate on unallocated pages. Step 6: Here, you can choose the percentage left out for database shrinkage. The percentage count can be changed between 0 and 99. But this step is enabled only when you select 2nd option which is “reorganize files before releasing unused space”. Step 7: The third option you can go with is an empty file by migrating the data to other files in the same file group. From the same group, it moves the files to a different location after then, the open space file can be deleted. Increase the Transaction Log file size Another way to deal with this issue is to increase the actual size of the Log file to do so please follow the below steps Step 1 : Login into the SQL server management studio with “SA” user Step 2: Expand the databases > and select the database name which is transaction log size issue Step 3: Right click on the database and click on “Properties” Step 4: Go to the “Files”  section from the left-hand menu list as shown below and update the LOG size on the right-Hand Side under the Size(MB) section as shown below. Both ways are suitable to tackle this issue and can be used to fix it.  Alternatives for responding to a full transaction log include: Backing up the log. Freeing disk space so that the log can automatically grow. Moving the log file to a disk drive with sufficient space. Increasing the size of a log file. Adding a log file on a different disk. Completing or killing a long-running transaction.
Read more

How to shrink the transaction log

One thing that I see a lot of administrators ask about is transaction log size and how to truncate it. Log records that are not managed correctly will eventually fill up the disk causing no more modifications to the database. Transaction log growth can occur for a few different reasons. Long running transactions, incorrect recovery model configuration and lack of log backups can grow the log. Log truncation frees up space in the log file so the transaction log can reuse it. Unless there is some kind of unexpected delay, log truncation will occur automatically after a checkpoint (if the database is in SIMPLE recovery model) or after a log backup (if the database is in FULL or BULK-LOGGED recovery model). MSSQLTips.com offers plenty of tips regarding transaction log truncation, but I’ll show you two ways to shrink the log. Shrink the log in SQL Server Management Studio To shrink the log in SSMS, right click the database, choose Tasks, Shrink, Files:   On the Shrink File window, change the File Type to Log. You can also choose to either release unused space, reorganize pages before releasing unused space, or empty file by migrating the data to other files in the same filegroup:   Shrink the log using TSQL If the database is in the SIMPLE recovery model you can use the following statement to shrink the log file: DBCC SHRINKFILE (AdventureWorks2012_log, 1) Replace AdventureWorks2012_log with the logical name of the log file you need shrunk and change 1 to the number of MB you want the log file shrunk to. If the database is in FULL recovery model you could set it to SIMPLE, run DBCC SHRINKFILE, and set back to FULL if you don’t care about losing the data in the log. ALTER DATABASE AdventureWorks2012 SET RECOVERY SIMPLE GO DBCC SHRINKFILE (AdventureWorks2012_log, 1) GO ALTER DATABASE AdventureWorks2012 SET RECOVERY FULL **You can find the logical name of the log file by using the following query: SELECT name FROM sys.master_files WHERE type_desc = 'LOG' Another option to shrink the log using the FULL recovery model is to backup the log for your database using the BACKUP LOG statement and then issue the SHRINKFILE command to shrink the transaction log: BACKUP LOG AdventureWorks2012 TO BackupDevice
Read more

The known Windows 11 issues and how you can fix them

​The first Windows 11 preview build was released yesterday, and with it came a variety of bugs that are sure to frustrate testers. Below we have listed the most noticeable issues and how you can fix them. New issues pop up in every new release of Windows, so it’s not surprising that we will find numerous bugs in the early preview builds of Windows 11. Thankfully, most of the bugs have been pretty easy to fix so far and should get you back up and running playing with Windows 11. Windows Insiders can’t install Windows 11 When Microsoft announced the upcoming preview builds of Windows 11, they promised that existing Windows Insiders in the ‘Dev’ channel could install the Windows 11 preview build even if they do not meet the minimum system requirements. Yesterday, when the Windows 11 preview build was released, Windows Insiders reported they could not install the operating system due to missing hardware requirements.  Even more concerning, users who had modern hardware that met all of the requirements were also unable to install the preview build. Yesterday afternoon, Microsoft released an update to the Settings app that fixes this issue. To apply the update, simply reboot your computer, and Windows 10 Insider builds will now be able to upgrade to Windows 11. File Explorer shows the old Windows 10 layout The Windows 11 File Explorer got a redesign with new colorful icons and a streamlined action bar at the top. Unfortunately, some users, like myself, find that the File Explorer reverts to what I call the ‘Classic’ skin from Windows 10. To fix this issue, click on the ‘View‘ menu option, select ‘Options,’ and when the options dialog opens, click on ‘View.’ You will now be shown a list of options you can select. Look for the ‘Launch folder windows in a separate process‘ option and uncheck it, as shown below. Now press ‘Apply,’ and File Explorer will restart. Once it has restarted, you should see the new Windows 11 File Explorer layout. Start Menu search does not work For those who quickly open the Start Menu and start typing to perform a search, you may have noticed a bug that causes the Start Menu not to recognize your typing, effectively breaking search in the Start Menu. Microsoft is aware of this bug and shared that open the Run: dialog and then close it to fix the bug preventing searches from the Start Menu. When we experience the bug, the easiest fix is to just quickly use the Win+R keyboard combination to open the run dialog and then hitting the escape key to close it. Your Start Menu search will now work again. Other known issues Unfortunately, there are some other noticeable issues that Microsoft is aware of but have not provided a fix as of yet. Unfortunately, Microsoft is aware of some other noticeable issues but has not provided a fix for them as of yet. Other noticeable issues include: Taskbar will not be shown across multiple monitors but will return in an upcoming build. The preview window may not display the entire window when hovering over Task View on the taskbar. A small set of Settings legacy pages as well as fit and finish bugs will be addressed in future releases. When using Quick Settings to modify Accessibility settings, the settings UI may not save the selected state. We’re working on fixing an issue that’s preventing unpinning apps from Start, making the command bar in File Explorer disappear, or hiding snap. To work around these, restart your PC. App icons in the Search panel may do not load, and instead, appear as gray squares. A complete list of known issues can be found in the Windows 11 Build 22000.51 release post. NOTE:: This article is copyright by bleepingcomputer.com and we are using it for educational or Information purpose only  
Read more

Microsoft Store is crashing worldwide on Windows 10 PCs

Windows 10 users are currently experiencing issues with the Microsoft Store, with the app unable to download and install apps and crashing after repeated attempts. When attempting to download apps from the Microsoft Store, users are seeing a loading or frozen page. Specifically, nothing happens when users click on the “Get” button to download apps or games. When attempting to access various Microsoft Store features, such as the downloads section, the program will sit at a screen with a spinning loading symbol. Eventually, the Microsoft Store will hang completely and can only be closed via Task Manager or by using ALT+F4 if the window is active. When crashing, an error message is recorded to Event Viewer, which states that Windows Store is unable to interact with the operating system. This outage started within the last four hours, according to reports. It is not known if this is planned maintenance activity, a problem due to Windows 10 cumulative update, or if Microsoft Azure networks is having issues. “Service has been restored to normal and we thank customers for their patience.” – a Microsoft spokesperson. NOTE:: This article is copyright bybleepingcomputer.com and we are using it for educational or Information purpose only  
Read more
Cart

No products in the cart.