Skip to main content


Go Search
HedCo Intranet Site
گزیده اخبار
وبلاگ ها
پروژه وحدت
انجمن گردشگری و میراث فرهنگی
منشور اخلاقی کارکنان هدکو

Other Blogs
There are no items in this list.
HedCo Intranet Site > ICT > TBlog
Troubleshoot Blog
Backup Sticky Notes
1. Open RUN in Windows 2. Type %LocalAppData%\Packages\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\LocalState & RUN Copy plum.sqlite File
Icon Adobe Acrobot DC on taskbar is wrong
Remove, unpin or delete Adobe Acrobat icon from the Start Menu, the desktop and (if you have it there) from the taskbar. Go to C: > ProgramData > Microsoft > Windows > Start Menu > Programs and you'll find the "sinner" "Adobe Acrobat XI Pro" with the wrong icon. The that looks like a shortcut. Delete it!.. Close the window. Go to C: > Program Files (x86) > Adobe > Acrobat 11.0 > Acrobat... and find Acrobat.exe Right click on Acrobat.exe > Send to > Desktop Right click again on Acrobat.exe > Pin to Start Menu... and close the window Right click on Acrobat.exe - shortcut (that you just created on your desktop) > Copy Go back to: C: > ProgramData > Microsoft > Windows > Start Menu > Programs... and Paste the shortcut here (you need administrator privileges for that) Rename this shortcut from "Acrobat.exe - shortcut" to "Adobe Acrobat XI Pro" Close the window Now if you open any PDF document, the right icon will appear on the taskbar.
باز کردن همزمان چند فایل پی دی اف بصورت مجزا از یکدیگر
برای این منظور مراحل را طبق عکس های ذیل دنبال کنید
Receive Error CredSSP Encryption Oracle Remediation in RDP Connections
A remote code execution vulnerability exists in the Credential Security Support Provider protocol (CredSSP). An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system. CredSSP is an authentication provider which processes authentication requests for other applications; any application which depends on CredSSP for authentication may be vulnerable to this type of attack. 1. SCENARIO2. RDP SESSION An update released by Microsoft (KB 4093492)on May 8, 2018, for Windows 10 Operation System was targeted to change the default settings CredSSP from Vulnerable to Mitigated. A full list of the update and patches for all platform can be obtained from here. However, post patching this caused an issue where the patched clients were blocked from communicating with unpatched servers over RDP protocols. This has been reported to cause an error thrown by Windows RDP as below: 3. WORKAROUND Use the group policy settings changes described below to rollback the changes to ‘Vulnerable’ state to allow RDP access. 1. Open Group Policy Editor, by executing gpedit.msc 2. Policy path: Computer Configuration -> Administrative Templates -> System -> Credentials Delegation Run gpedit.msc and expand Administrative TemplatesExpand SystemExpand Credential DelegationEdit Encryption Oracle RemediationSelect Enabled and change Production Level to Vulnerable3. Run the command gpupdate /force to apply group policy settings. 4. Your remote desktop connection will be working fine now. Ref:
حل مشکل سوال کردن یوزر و پسورد در افیس

برای حل مشکل در مسیر زیر وارد شده


سپس گزینه useOnlineContent را از یک به صفر تغییر دهید

مشکل حجم درایو c فولدر مخفی installer
نصب نرم افزار patch cleaner
آدرس فولدر installer را به نرم افزار بدهید
مشکل collapse content در naviswork
NuGet fails: “The underlying connection was closed: An unexpected error occurred on a send”
Try pasting the following into a .reg file and run it. Then try running your NuGet command (no reboot required). Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319] "SchUseStrongCrypto"=dword:00000001 [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\.NETFramework\v4.0.30319] "SchUseStrongCrypto"=dword:00000001 Ran into this issue because TLS1.2 was not enabled. Using http does not help in fix the situation because NuGet redirects to https now that TLS1.2 is enforced.
Download PDF Books
Copy Book Name Open Paste In the Search box & Download
1 - 10 Next

 ‭(Hidden)‬ Admin Links