JP Tyres Porana Road Review

Our experience with JP tyres was terrible, they swapped our tyre without our consent.

So, initially we went to Auto Garage (car servicing shop next to it) for a WoF and they failed our WoF, primarily due to tyre was different between front-left with the front-right, then we went to JP tyres (the shop next to it) and purchased the same tyre with our front-right (Blacklion Cilerro 175/65-R14).

Blacklion Cilerro 175/65-R14

After we completed the purchase and JP-tyres fitted the new tyre to our Honda Fit, we put the car overnight in Auto Garage as our car needs some WoF repairs (such as replacing the wheel bearings, top strut mounts, dead tail bulb, etc. Which actually we don’t know since we are not oto-savvy.)

The strange thing is the next day we pick up our car after they finished the repairs and passed the WoF, our front-left vehicle has utterly different tyre like magic!

Jinyu Gallopro 175/65-R14

They replaced with Jinyu Gallopro 175/65-R14, and yes, which means our front-left and front-right tyre are again, not the same). We have all the evidence including the detailed invoice from JP-tyres. The Auto Garage mechanic said the guy from JP-tyres collected our car key from Auto Garage, brought the car to JP-tyres and swapped our tyre ‘without’ our consent.

We strongly NOT suggest you to go to the following venue for all kind of tyre maintenance and/or replacement:

JP Tyres
80 Porana Road
Glenfield, Auckland 0627

Please be advised that they’re also known as JP Tyres 2009 Ltd.

It’s inevitable that we are doubting that they’re both (JP-tyres and Auto Garage) are working in-conjunction for each other to gain their own personal benefits.

Auto Garage Porana Road Review

Our experience with Auto Garage was terrible, we went to Auto Garage for WoF and they failed our WoF, primarily due to tyre was different between front-left with the front-right.

Then we went to JP tyres (the shop next to it) as of Auto Garage’s recommendation and purchased the same tyre with our front-right (i.e. Blacklion Cilerro 175/65-R14).

Blacklion Cilerro 175/65-R14

After we completed the purchase and JP-tyres fitted the new tyre to our Honda Fit, we put the car overnight in Auto Garage as our car needs some WoF repairs (such as replacing the wheel bearings, top strut mounts, dead tail bulb, etc. Which actually we don’t know since we are not oto-savvy)

The cost was shockingly $1k. We’re okay with the price, but the strange thing is the next day we pick up our car after they finished the repairs and passed the WoF, our front-left vehicle has utterly different tyre like magic!

Jinyu Gallopro 175/65-R14

They replaced with Jinyu Gallopro 175/65-R14, and yes, which means our front-left and front-right tyre are again, not the same). We have all the evidence including the detailed invoice from JP-tyre. It’s inevitable that we are now doubting what are the other original parts they might have swapped with the other dodgy or cheaper parts.

We strongly NOT suggest you to go to the following venue for both car servicing and WoF:

Auto Garage
78 Porana Road
Hillcrest, Auckland 0627

MikroTik Bruteforce Login Prevention

To stop SSH, Telnet and FTP attacks on your router, follow the following advise:

This configuration allows only 10 FTP login incorrect answers per minute.

in /ip firewall filter
add chain=input protocol=tcp dst-port=21 src-address-list=ftp_blacklist action=drop \
comment="drop ftp brute forcers"

add chain=output action=accept protocol=tcp content="530 Login incorrect" dst-limit=1/1m,9,dst-address/1m

add chain=output action=add-dst-to-address-list protocol=tcp content="530 Login incorrect" \
address-list=ftp_blacklist address-list-timeout=3h

This will prevent an SSH brute forcer to be banned for 10 days after repetitive attempts. Change the timeouts as necessary.

in /ip firewall filter
add chain=input protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop \
comment="drop ssh brute forcers" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new \
src-address-list=ssh_stage3 action=add-src-to-address-list address-list=ssh_blacklist \
address-list-timeout=10d comment="" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new \
src-address-list=ssh_stage2 action=add-src-to-address-list address-list=ssh_stage3 \
address-list-timeout=1m comment="" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new src-address-list=ssh_stage1 \
action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=1m comment="" disabled=no

add chain=input protocol=tcp dst-port=22 connection-state=new action=add-src-to-address-list \
address-list=ssh_stage1 address-list-timeout=1m comment="" disabled=no

This will prevent a Telnet brute forcer to be banned for 10 days after repetitive attempts. Change the timeouts as necessary.

in /ip firewall filter
add chain=input protocol=tcp dst-port=23 src-address-list=telnet_blacklist action=drop \
comment="drop telnet brute forcers" disabled=no

add chain=input protocol=tcp dst-port=23 connection-state=new \
src-address-list=telnet_stage3 action=add-src-to-address-list address-list=telnet_blacklist \
address-list-timeout=10d comment="" disabled=no

add chain=input protocol=tcp dst-port=23 connection-state=new \
src-address-list=telnet_stage2 action=add-src-to-address-list address-list=telnet_stage3 \
address-list-timeout=1m comment="" disabled=no

add chain=input protocol=tcp dst-port=23 connection-state=new src-address-list=telnet_stage1 \
action=add-src-to-address-list address-list=telnet_stage2 address-list-timeout=1m comment="" disabled=no

add chain=input protocol=tcp dst-port=23 connection-state=new action=add-src-to-address-list \
address-list=telnet_stage1 address-list-timeout=1m comment="" disabled=no

If you want to block downstream access as well, you need to block the with the forward chain:

add chain=forward protocol=tcp dst-port=22 src-address-list=ssh_blacklist action=drop \
comment="drop ssh brute downstream" disabled=no

To view the contents of your Blacklist, go to “/ip firewall address-list” and type “print” to see the contents.

This is the recommended Bruteforce prevention, officially from the MikroTik Wiki. Despite their page was last edited on 7 August 2013, at 09:47 this method is still pretty much effective until present.

Couldn’t install Microsoft Office with Error Code: 30182-1011

Microsoft Office, Couldn't install, Error Code: 30182-1011

This error code is known when you try to install different Microsoft Office licenses into the same system (e.g. Non-profit license or OEM license and you’re installing Retail license or Office 365 Subscription-based license) – Basically you cannot mix varies types of license in one system.

In this case, we had:

  • Microsoft Office Home and Business 2016;
  • Microsoft Project Professional 2016;
  • And we’re trying to install Microsoft Office 365 Business (Subscription-based license).

Similar error code, same issue:

Microsoft Office, Couldn't install, Error Code: 30182-1011

We ended up with converting all of our office licenses to Office 365 (Subscription-based) license.

Tips: Use Microsoft’s easy fix tool to completely uninstall Office.

Microsoft Office 365: Other installation options
Microsoft Office 365: Other installation options for Microsoft Project
Microsoft Office 365: Other installation options for downloading Microsoft Project
This is the Office 2016 + Project Professional 2016 (All of them are Office 365 Subcription-based License as they appears in Programs and Features)

Office 365 & Microsoft Project Professional 2016 in Programs and Features

Andy & Thirza Wedding Short Movie Cinema — X mensiversary

It has been ten months since our marriage, and we are thrilled to share this video, dedicated to all of you.

Official YouTube Link: Andy & Thirza Wedding Short Movie Cinema — X mensiversary

Prevent Windows from Automatically doing Updates

Don’t like your Windows performs automatically download, install updates and restart by itself?

Click Start and type in: ‘gpedit.msc‘.

Go to: Local Computer Policy -» Computer Configuration -» Administrative Templates -» Windows Components -» Windows Update -» Configure Automatic Updates.

Set from ‘Not Configured’ to: ‘Enabled‘.

Configure automatic updating: ‘2 – Notify for download and notify for install‘.

Click ‘Apply‘ then ‘OK‘.

See screenshot below:

Windows Automatic Update Policy

Control Panel crashes with Windows Explorer on Windows 10

So when you open Control Panel the Windows Explorer crashes?

If you have IDT Audio Drivers, use your File Explorer to get to:

C:\Windows\System32

And then remove: IDTNCPL.cpl and IDTNCPL64.cpl

Those files are remnants from the previous Windows Driver update and are safe to be removed, it has potential to crash Control Panel with the Windows Explorer (i.e. the explorer.exe process)

Tested on Windows 10 Creators Update [Version 10.0.15063]

See/Recover Stored Wi-Fi Password in Windows

So you want to recover the Wi-Fi password you previously stored on your Windows? It is very simple, you will just need to execute two easy commands below.

Firstly, open up Command Prompt by clicking Start -» type: ‘cmd‘ then press Enter.

Type in:

C:\Users\Andy>netsh wlan show profiles

Profiles on interface Wi-Fi:

Group policy profiles (read only)
---------------------------------
<None>

User profiles
-------------
All User Profile : CWMGuest5G
All User Profile : Mercury
All User Profile : SPARK-JVYXR4
All User Profile : Brick
All User Profile : Ellerslie
All User Profile : Telecom-8080
All User Profile : JR-WIFI
All User Profile : JEAL-WIRELESS
All User Profile : ANDY-IPHONE
All User Profile : Millennium Conference
All User Profile : BETHEL
All User Profile : CSC-Guest


C:\Users\Andy>

And then to see the password, type in:

C:\Users\Andy>netsh wlan show profiles WIFI-SSID key=clear

Profile BETHEL on interface Wi-Fi:
=======================================================================

Applied: All User Profile

Profile information
-------------------
 Version : 1
 Type : Wireless LAN
 Name : BETHEL
 Control options :
 Connection mode : Connect automatically
 Network broadcast : Connect only if this network is broadcasting
 AutoSwitch : Do not switch to other networks
 MAC Randomization : Disabled

Connectivity settings
---------------------
 Number of SSIDs : 1
 SSID name : "BETHEL"
 Network type : Infrastructure
 Radio type : [ Any Radio Type ]
 Vendor extension : Not present

Security settings
-----------------
 Authentication : WPA2-Personal
 Cipher : CCMP
 Authentication : WPA2-Personal
 Cipher : Unknown
 Security key : Present
 Key Content : thiswillbethewifipassword

Cost settings
-------------
 Cost : Unrestricted
 Congested : No
 Approaching Data Limit : No
 Over Data Limit : No
 Roaming : No
 Cost Source : Default


C:\Users\Andy>

Simply replace WIFI-SSID with your SSID you want to reveal the key.

Tested and working properly on Windows 10 Creators Update (Version: 1703 (Build: 10.0.15063.296))

Hope this helps, cheers!

Enable Windows Photo Viewer in Windows 10

Those you who have upgraded from Windows 7 or Windows 8.1 to Windows 10 probably have Windows Photo Viewer program in Windows 10. But some users are reporting that Windows Photo Viewer has gone missing after clean installing Windows 10.

If you are missing the Windows Photo Viewer, we can bring back the classic Photo Viewer to Windows 10.

  1. Copy and paste the following registry key and save as PhotoViewer.reg:
    Windows Registry Editor Version 5.00
    
    ; Change Extension's File Type
    [HKEY_CURRENT_USER\Software\Classes\.jpg]
    @="PhotoViewer.FileAssoc.Tiff"
    
    
    ; Change Extension's File Type
    [HKEY_CURRENT_USER\Software\Classes\.jpeg]
    @="PhotoViewer.FileAssoc.Tiff"
    
    
    ; Change Extension's File Type
    [HKEY_CURRENT_USER\Software\Classes\.gif]
    @="PhotoViewer.FileAssoc.Tiff"
    
    
    ; Change Extension's File Type
    [HKEY_CURRENT_USER\Software\Classes\.png]
    @="PhotoViewer.FileAssoc.Tiff"
    
    
    ; Change Extension's File Type
    [HKEY_CURRENT_USER\Software\Classes\.bmp]
    @="PhotoViewer.FileAssoc.Tiff"
    
    
    ; Change Extension's File Type
    [HKEY_CURRENT_USER\Software\Classes\.tiff]
    @="PhotoViewer.FileAssoc.Tiff"
    
    
    ; Change Extension's File Type
    [HKEY_CURRENT_USER\Software\Classes\.ico]
    
    @="PhotoViewer.FileAssoc.Tiff"
  2. Double-click on the saved PhotoViewer.reg file.
  3. Click Yes button when you see the following confirmation dialogue to merge it. Alternatively, you can right-click on it, and then click Merge option.
  4. Click OK button again when you get the following dialogue box and that’s it! You have just enabled the classic Windows Photo Viewer in Windows 10.
  5. Optionally you can also make it default for images.

Mac Spotify: Cannot Start Application

So you want to run Spotify.app on macOS with multiple users environment but it says that you ‘Cannot Start Application’

Multiple users environment is where you have one Mac, and it has more than one user using it.

Spotify updated their app and prevent us running the app from another user (it will only run on the user who installed it)

Since their previous version doesn’t have this issue, I investigated the issue and found out that it was caused by permission issue.

The following are the resolution:

  1. Download and install Spotify as normal;
  2. Quit the Spotify Application once it’s finished installing;
  3. Open the application called Terminal (Command Prompt for Windows computers);
  4. Change to the correct directory by typing this and then hit enter:
    cd /Applications
  5. Then, copy and paste this command, followed by enter:
    sudo find Spotify.app -exec chmod 755 {} \;
  6. When prompted, enter your Mac user’s password and hit enter;
  7. Open the Spotify.app.

It is obviously if you open Terminal before installing Spotify.app you’ll get the ‘No such file or directory’ message.

Note: If all of this still doesn’t work, I found another temporary solution by simply dragging the Spotify.app from the Applications folder onto a USB and running Spotify from there. This is because by default Mac ignores ownership on USB volumes.

Cheers!