All posts by admin

How to Remove Automatic Block from Downloaded Files

Problem:

After you download a file, you open its Properties and find that it is automatically marked with “This file came from another computer and might be blocked to help protect this computer.” warning and you have to unblock the file manually by selecting the “Unblock” check box.

Solution:

1. Open Group Policy Editor (gpedit.msc) as Administrator.

2. Go to User Configuration > Administrative Templates > Windows Components > Attachments Manager.

3. Enable Do not preserve zone information in file attachments option.

 

How to Pose a Software Engineering Research Question?

Motivation:

You begin to do software engineering research.
You want to have a research question.
You have several ideas but you wonder whether they are good enough for conducting a research.

Suggestions:

1. Your question should contain well-defined terms.
Are you talking about something that everyone mostly agree about its definition and core characteristics.
For example, are you talking about Microservices, Event Sourcing, Relational Database, NoSQL, Unit Tests, Go Language, Speech Recognition, Speech Synthesis?

2. Your question should have a purpose and specific audience.
Why should the audience be interested in your question?
For example, are they going to upgrade a an event sourcing system? Are they going to apply test automation in our project?
Do they have specific security issues with their system?
Have they gotten specific performance issues with their system?
Are they going to build a new identity management platform for their legacy system?
Do they need to accelerate the development of a portal for their legacy system?
Are they going to integrate voice search into their existing system?

3. Your question should have verifiable answer.
What are the possible answers to your question? How can we compare these answers.
What is your concrete answer?
How can we replicate your answer?
How can we test your answer against the existing “standards“.

 

 

 

When to Use the Definite Article (“The”)

Specific identity:

  • I’ll have the spinach salad and the mushroom burger.
  • I want to adopt the cat we saw yesterday.
  • I’ll get the kids ready to go outside.

Grouping:

  • The English and the Italians played in the World Cup.
  • The elderly (older people) have different needs than the young.

Some countries:

  • the Philippines
  • the Netherlands
  • the United Kingdom
  • the United States

Instruments:

  • Can you play the guitar?
  • The piano is my favorite instrument.

Superlative:

  • The first time we met, I knew you were the only one for me.
  • And I knew this would be the last time I’d fall in love.
  • The worst days of my life are behind me now.
  • I want to spend the best part of my life with you.

 

 

 

 

How to Block Your Child from Certain Websites

Motivation:

You have a child and do not want him to be able to install games from Microsoft Store or play online games on certain websites or run a specific program.

Solution:

I. Prevent your child from installing games Microsoft Store.
This method only applies to Windows 10 Enterprise and Windows 10 Education.

  1. Type gpedit in the search bar to find and start Group Policy Editor.
  2. In the console tree of the snap-in, click Computer Configuration, click Administrative Templates, click Windows Components, and then click Store.
  3. In the Setting pane, click Turn off the Store application, and then click Edit policy setting.
  4. On the Turn off the Store application setting page, click Enabled, and then click OK.

Note: Enabling Turn off the Store application policy turns off app updates from Microsoft Store.

Source: https://docs.microsoft.com/en-us/windows/configuration/stop-employees-from-using-microsoft-store

II. Block all websites except some websites using one of the software below.

  1. Surfblocker.

III. Block certain websites in your modem settings in order to prevent your child from playing online games on these websites.

If you are using FTP GPON Modem then you can

  1. Click on the Access tab on the top,
  2. Click on the Filter tab on the left,
  3. Select URL Filter as Filter Type Selection,
  4. Select 1 as URL Index,
  5. Enter URL (host) (e.g. bluestacks.com or roblox.com),
  6. Select Enabled as Individual active,
  7. Click on the Save button.
  8. Repeat the procedure for other hosts with other URL Indexes (i.e. 2, 3, 4, etc.).

    IV. Block all Windows users from running certain programs.

    1. Type gpedit.msc in search box, then press Enter.
    2. Expand User Configuration > Administrative Templates, then select System.
    3. Double click the policy Don’t run specified Windows applications.
    4. Set the policy to Enabled, then select Show.
    5. Add the programs you would like to prevent the user from running to the List of disallowed applications. Use the name of the application launching file such as chrome.exe.
    6. Restart your computer.

     

     

     

    Why Can’t You Install Windows 11 on Your Laptop?

    Issue:

    You have a laptop.
    You want to install Windows 11 on the laptop.
    However you got an unexpected error saying that you should visit https://aka.ms/WindowsSysReq for detail.
    You visited the page but you are unsure what actually happened.

    Solution:
    1. The first common reason is that you do not have TPM 2.0 hardware.

      Open Settings Update & Security > Windows Security > Device Security
      – If you do not see a Security processor section on this screen your PC may have a TPM that is disabled.
      – If you do see a Security processor section on this screen then click Security processor details, and verify that your TPM Specification sub-version is 2.0.
      If it is less than 2.0, your device does not meet the Windows 11 requirements.

      Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The term can also refer to a chip conforming to the standard.

      Trusted Platform Module provides
      – A hardware random number generator,
      – Facilities for the secure generation of cryptographic keys for limited uses.

      Usually you can enable or disable TPM in the BIOS of your laptop.
      If you have TPM 1.2, you can often update it to 2.0 by following the guide of your laptop providers. For example if you have a Dell laptop then you can check the guide here.

      If you get “The TPM is Owned.” issue when updating TPM 1.2 to 2.0 then you can check a guide here. (Press F12 after your laptop is reboot.)

    2. The second common reason is that your laptop processor has not been supported by Windows 11.

      Open Settings > System > (scroll down if needed) >  About.
      Search for processor name, e.g. i7-10610U.
      You should find your processor name here if it is supported. For example the Xeon E3-1505M processor has not been supported.

    3. You can also download PC Health Check app to verify these 2 issues or identify other potential issues.

    4. If you plan to install a fresh Windows 11 from an USB then you can ignore the processor support requirement.

     

     

    How to Reconfigure ASUS Modem Wi-Fi Router

    Issue:

    You have an ASUS modem Wi-Fi router.
    You already configured it in the past. Now you want to reconfigure it but you cannot access it via http://router.asus.com/.
    You already tried to restart the router several times but the problem still persists.

    Solution:
    1. Perform a hard reset of the router.
    2. Connect to the default 5G Wi-Fi network of the router.
    3. Go to http://router.asus.com/.
    4. Check and update the firmware.
    5. Reconfigure the router.

     

    How to Automatically Create a Subtitle for a Video

    Motivation:

    You have MP4 video file.
    You want to create a subtitle to understand the video content.

    Solution:
    1. Split MP4 file to 9-minutes files (please refer to https://huybien.com/how-to-trim-or-cut-mp4-files-without-re-encoding/ for details).
    2. Log in https://www.veed.io
    3. Click the “+” icon.
    4. Upload a 9-minutes MP4 file.
    5. Click the “Subtitles” tab.
    6. Click the “Auto Translate” button. Select the language for the subtitle.
    7. Click the “Start” button. Wait for the process to be complete.
    8. Click the “Export” button.
    9. Ensure that the “Burn Subtitle” option is selected.
    10. Click the “Export Video” button. Wait for the process on the left to be complete.
    11. Click the “Download MP4” link.

     

    How to Automate Cleaning Up a .NET Solution

    Motivation:

    You have a .NET solution with many projects.
    You need to deliver the solution to a client very frequently.
    You need to clean up all intermediate folders or files to reduce the package size and make the result look tidy.
    You want to automate this process to reduce cleaning up time.

    Solution:
    1. In Visual Studio, right click a project and select Properties.
    2. Click on Build Events.
    3. Enter the following commands to the Post-build event command line text box:
      rd /s /q $(ProjectDir)obj
      cd $(TargetDir)
      del *.config
      del *.pdb
      del *.xml

      rd /s /q $(ProjectDir)obj: Remove the obj folder in the project directory.
      cd $(TargetDir): Move to the output directory.
      del *.config: Delete all the config files in the output directory.
      del *.pdb: Delete all the pdb files in the output directory.
      del *.xml: Delete all the xml files in the output directory.

      You can modify these commands or add new commands for your specific purpose.

    4. Save the project.
    5. Repeat the process for all the projects in the solution.

    In order to delete all the obj folders recursively you can

      1. Create DeleteObjFolders.bat file inside the same folder that contains your solution file (i.e. *.sln)
      2. Paste content below to the DeleteObjFolders.bat file:
      @echo off
      @echo Deleting all OBJ folders...
      for /d /r . %%d in (obj) do @if exist "%%d" rd /s/q "%%d"
      @echo OBJ folders successfully deleted :) Press any key to close the window.
      pause > nul

      3. Execute the DeleteObjFolders.bat file.

     

    How to Allow a Remote Desktop User to Access CD/DVD

    Problem:

    You log in a computer remotely as an administrator.
    However you cannot read or write any removable storage devices such as CD/DVD or USB flash memory drives.

    Solution:
    1. Type gpedit.msc in the Search box, press Enter.
    2. Go to Local Computer Policy > Computer Configuration > Administrative Templates > System > Removable Storage Access.
    3. Double-click All Removable Storage: Allow direct access in remote sessions.
    4. Click Enabled.
    5. Click OK.

     

    How to Quickly Estimate Project Effort using Expert Judgement?

    Motivation:

    You need to quickly estimate effort for building an enterprise system.

    Solution:
    1. Ensure that you have a requirements analysis document.
      This can be

      • list of artifacts or
      • a list of features or
      • a list of use cases or
      • a list of user stories or
      • a list of user interfaces or
      • a list of workflows with their steps.
        Never conduct an estimation using expert judgement without any inputs.
    2. Break down each of item in the list into the following (but not limited to) tasks to create:
      • UI and navigation code,
      • database script or storage schema definition code,
      • API code,
      • business logic code,
      • data access code,
      • scheduler code,
      • unit tests code,
      • deployment script,
      • end-to-end test cases and test reports, and
      • user guide.
        You do not need to break down a feature into tasks if you can estimate an effort to complete it with high confidence.
    3. Estimate the effort in man-days for completing each task.
      When giving an estimate for each task, think about

      • possible inputs validation and error handling aspect,
      • possible navigation framework preparation,
      • possible alternative scenarios of the feature related to the task,
      • possible encryption and decryption aspect,
      • possible attacks prevention (e.g. adding CAPTCHA, trimming special characters),
      • possible frameworks, libraries or external tools preparation, and
      • communication, meeting and status report for each task.
        You should break down a task into sub-tasks if you are still not confident when giving an estimate for completing it.
    4. You do not need to perform the second and third step in a sequential order, just complete anything you can and repeat these 2 steps as many times as you like.
    5. If you cannot break down a feature into tasks or cannot give an estimated value for a task then you need to create a prototype or a proof of concept related to the feature.
    6. If you want to have a more accurate estimated value for a task then you should give 3 values for the task estimation: the best case value (optimistic value), the worse case value (pessimistic value) and the most likely value, then calculate the estimated value using the formula below.
      Estimated value = (Best case value + (4 X Most likely value) + Worse case value)/6
    7.  If you just need to give an effort guestimate for a project containing too many requirements then you can group similar items together, then guess an effort for completing one item in a group and multiply this value with the number of items in the group, then repeat this guess and calculation for all the remaining groups.