Category Archives: Psy

How to use facebook’s search to find anyone or anything

How to use facebook’s search to find anyone or anything

Are you aware of all the things you can do using Facebook’s search engine? It can do plenty of things than you can imagine. By using a combination of various search phrases, you can search all news, posts, and photos. You can use Facebook search for finding information regarding games, shopping, and even music. It is very much different from regular web search engines like Google. Here, in this article, we will find out how to use Facebook search to find anything.

Facebook’s internal search engine is considered as one of the most underrated and under-utilized tools we use daily. After Google, Facebook’s search engine is the next powerful search tool. Most of our search activity in FB is restricted to typing the names of pages and friends in the search box and rarely we use it for other purposes. This is not our mistake. After the launch of Graph Search in 2014, apart from becoming popular, the search engine of Facebook has become riskier. Now, there are too many options and query syntax.

How to use Facebook search and what to find?

If you see Facebook’s search prompt, it says, “Search Facebook.” That is right, this option allows you to search any post you have seen prior on Facebook, all friends, items shared publicly, etc. But for doing so, you need to phrase your search queries using a natural language. Basically, it is not like Google’s search engine. As you enter a friend’s name or a phrase, Facebook starts showing you different prompts and suggestions that are generated automatically. These are personalized suggestions, which means that they will be different for different Facebook users.

How to use facebook’s search to find anyone or anything

What are the things to find through a Facebook search?

Use search option for finding groups, friends, and pages. The Facebook experience revolves around friends and there are different ways to search your friends. Apart from searching directly, you can sort the search results based on education, city, mutual friends, and work.

Tips to search for interests, photos, like easily

The new search option in Facebook makes the whole process of finding things your friends like simple. For instance, you can start by typing “Friends who like…………” and Facebook will show plenty of suggestions. In order to narrow the search results, you must click on a filter like Photos, People, Pages, etc.

How to use facebook’s search to find anyone or anything

You can also use phrases like “photos of….” to find photos of your friends. With this search option, you can also find those photos and posts that you had liked previously. For finding the posts or photos that you had liked before, you need to search for posts/ photos liked by me. You can also make use of this search syntax to find the posts/ photos liked by your family and friends. Just replace the phrase, “me” with “my friends” or you can also use the name of a specific friend.

Facebook search also helps you to find videos

You can also search for any videos on Facebook. You need to use phrases like the trailer, music videos, videos, etc. to find what you are looking for.

Find music and games on Facebook

Facebook is home to different music and games. You can use the Facebook search engine to find games like Words with Friends, Candy Crush, etc. You can also use this option to find your favorite music bands and artists. Also, with search option, you can receive updates on their latest videos and music album releases.

How to use facebook’s search to find anyone or anything

When you think of Facebook, search probably isn’t the first thing to come to mind. And to be fair, for a long time Facebook’s search function was pretty terrible.

That’s not the case anymore, though. A number of changes in recent years have made Facebook’s search function really easy to use, and quite powerful, all at the same time. Here are a few things you can find quickly with this function, along with some tips to keep in mind.

Search for People

The most obvious use for Facebook’s search functionality is searching for people, so let’s start with that. Just type the name of the person you’re looking for, and you’ll see a list of results:

How to use facebook’s search to find anyone or anything

Of course, it’s rare to find the exact person you’re looking for on the first try, which is why Facebook lets you use other criteria. For example, you can type someone’s name and city, and Facebook will figure out what you mean.

How to use facebook’s search to find anyone or anything

You can specify basically any attribute and Facebook will drill down, assuming whoever you’re looking for publicly features that information. For example, you could type someone’s name and:

  • The place they live, or used to live.
  • Someone’s career title, e.g. “Farmer” or “Journalist”.
  • The place they work, or used to work.
  • Any schools they attended in the past, or are currently attending.
  • Any organization the person is affiliated with, including churches or nonprofits.

Include these bits of information and Facebook will try to find people who match all the criteria listed. It does a surprisingly good job of parsing that information.

In some cases, you don’t even need a name. For example, if you work at Jack’s Coffee Shop, you could search for “Jack’s Coffee Shop employees” and scroll through a list of people who’ve publically stated they work there. Or if you have someone’s email address, you could try searching for that to find their Facebook profile.

You can even search for groups of people based on criteria like this. For example “friends in los angeles” will show you all your Facebook friends that live in Los Angeles—perfect for planning all your outings on your next visit.

Search for Specific Posts

Have you ever found yourself trying to find back a specific Facebook post, or conversation, from a few months or even years ago? Facebook’s search can help with that. Just type a few keywords from the conversation into search, then click one of the “Posted By” buttons in the left column.

How to use facebook’s search to find anyone or anything

In this example I found an important post I wrote a few months ago, but you could use this feature to find all sorts of things. Maybe there’s a picture of your granddaughter, or a specific recipe, that you remember scrolling past but can’t find back. This can help you find those things. You can even click the “Choose a Source” button if you know who precisely posted the thing you’re looking for.

How to use facebook’s search to find anyone or anything

If this isn’t enough, you also have to option to specify a range of dates, or the physical location the post was made from.

Search for Pages

There are other things you might be searching for on Facebook—pages, for example. If you want to search for the official page for an organization, just type it’s name. The top result will usually be official.

How to use facebook’s search to find anyone or anything

See that blue checkmark beside the page’s name? That means it’s an official page. If you want to find some unofficial pages to like as well, click the “Pages” tab above the search results.

How to use facebook’s search to find anyone or anything

This lets you search every page on Facebook, and is a great way to find new public pages worth watching.

Search for The Latest Headlines

Facebook probably isn’t a great place to get your news, but the “Latest” tab will show you a bunch of recent posts related to whatever your search query might be.

How to use facebook’s search to find anyone or anything

If you want to know what’s happening related to a certain subject, this is a quick way to see conversations about it from all over Facebook.

Clear Your Search History

You might notice, as you start searching, that your entire search history is saved by Facebook for future reference. This can be practical: if you search the same thing a lot, Facebook can give you faster recommendations. But it can also feel somewhat creepy. If you want to clear this out, click the “Edit” button to the right of the search bar.

How to use facebook’s search to find anyone or anything

This will take you to the search history page, where you’ll find a “Clear History” link.

How to use facebook’s search to find anyone or anything

Click this and Facebook will delete all of your search history, potentially hiding all sorts of things you shouldn’t have searched for in the first place.

Use Facebook's people search and other tricks to find someone online

  • Emporia State University
  • Tweet
  • Share
  • Email
  • Tweet
  • Share
  • Email
  • Facebook
  • Pinterest
  • Twitter
  • Snapchat
  • Instagram
  • YouTube
  • Online Dating

Searching Facebook is a great way to find someone online. With it being the largest social networking site in existence, your odds of finding the person you're looking for is fairly high.

Facebook lets its users add lots of information about themselves to their profile, and the inherent function of the site is to bring people closer together through information sharing. You can leverage this to help you find someone on Facebook, whether it's a friend you used to know, an old coworker, neighbors, family, etc.

Facebook isn’t the only way to find someone on the internet. Dedicated people search engines are also helpful, even more so if you don’t know the person’s name, you have no friends in common, they’ve blocked you, or if you and/or them don’t use Facebook.

Do a Facebook Search by the Person's Name

The main search bar at the top of the website is one method for finding people on Facebook by their name. You can type the person's name and then filter the results to narrow them down.

Here are some tips to remember when using Facebook's people search tool:

  • When you're searching for just people on Facebook, select People to avoid finding business pages, events, and other content.
  • Use the filters off to the left to make the results more relevant. For example, find old classmates on Facebook using their name and the Education filter (choose your school), or pick a business you've worked for from Work to find coworkers with that name.
  • You don't have to have been associated with the person to locate them on Facebook. Select City, for example, for profiles with that information in them.

Search Facebook by the School They Went To

Don't know the person's name? You can still do a Facebook search for someone even if you're not sure what their name is. Knowing what school they went to or currently attend, for example, makes it a lot easier to find them online.

Search Facebook for the school, and then choose People to filter the results by people on Facebook who have that school listed on their profile. Since lots of users add to their profile the school(s) they currently or used to go to, finding someone on Facebook suddenly gets a lot easier.

Piggyback on Your Friends' Friends

Using one of your Facebook friends to find someone else is one of the best ways to find someone if you suspect that the person has anything to do with one of your existing friends.

For example, if the person used to work with you and/or another friend, or you used to all go to the same school or live in the same town, a mutual friend search is your best bet in finding them.

There are a few ways to do this:

  • Visit a friend’s profile and select the Friends tab to see all of their friends. You can view and search through the full list or read through their recently added friends and friends from groups, such as their workplace, hometown, or high school.
  • Another way to search for a friend’s friend is to browse the People You May Know page, which is a list of people you might know based on your Facebook friends.
  • Follow Step 1 above, but use the Friends of Friends filter.

Search for People in Public Groups

Groups are another way to find people online with Facebook. If you know that the person is interested in a particular topic, you can browse groups they might be in.

To do this, search for a group from the search bar at the top of Facebook, and then select Groups from the menu. Once you're on the group's page, open the Members section to find the search bar.

Be sure to select Public Groups if you want to be able to see its members (closed groups require you to be a member to see the other people that have joined).

Do a Facebook Search by Phone Number

Trying to figure out who owns a phone number that called you? Facebook can also be used for a reverse number search; just type the number into the search bar to see what shows up.

It's unlikely that you'll find public posts that contain the person's phone number, but you might have luck digging up an old post made by one of your Facebook friends. This is an easy way to find an old friend's phone number.

Use Facebook to Search for Related Information

Something else you can do is use Facebook to find someone's presence elsewhere on the internet. You'd do this if you already have their Facebook information, but you're wanting their other social media account details, too, like to see if they also have a Twitter, Pinterest, online dating profiles, etc.

Every Facebook profile has a unique username at the very end of its URL. Search Google or another search engine for that username to see if other accounts show up.

Another idea is to do a reverse image search on a photo from the person’s profile. It can be their profile image or any other picture of them from their account. If they’ve posted that same exact image elsewhere, you might be able to dig up their other online accounts. Websites like Google Images and TinEye are great for this.

Whether you refuse to create a Facebook account or have an account that you can’t access at the moment, it might be difficult to find information hosted on this social media platform.

This article covers the ways you can use Facebook’s built-in search options without signing in. Is there a way to find a Facebook profile without an account? What if you want to search for events or locations? Read on to find out.

Facebook Directory

If you’re not signed in, you’ll have to prove that you’re not a robot before you can continue. After this quick security check, you can browse Facebook under three different categories.

To encourage people to sign in, Facebook made this process a little inconvenient. Every time you click on a category or a search result, you’ll have to wait for the security check. This also happens whenever you make use of the search bar.

Now let’s look at the three categories you can browse:

People

How to use facebook’s search to find anyone or anything

Here, you can see a list of Facebook users, sorted alphabetically.

Use the search bar on the right to enter the name of the person you’re looking for. The search results will depend on individual users’ privacy settings.

On Facebook, users can’t opt out of searches entirely. However, they can remove their name from the Directory. They can also restrict how much of their information you can access.

Pages

How to use facebook’s search to find anyone or anything

This category covers verified celeb profiles, as well as restaurants and other businesses. If you’re looking for a club or an NGO, this is a good place to start. You can also go through the brands that have profiles on Facebook.

Places Tab

How to use facebook’s search to find anyone or anything

This is where you can hunt for events and hotels, as well as businesses. When you’re logged in, Places shows you which of your friends are nearby. But even without an account, searching this tab could lead you to the information you need.

What About People Search?

Facebook Directory acts like a phone book of sorts, but Facebook’s official search page is here: http://www.facebook.com/people-search.php

How to use facebook’s search to find anyone or anything

With People Search, you can use identifying details to track a person down. For example, you can narrow down your search using their location, workplace, or school. However, you have to log in to use People Search. If this is the browsing method you want to go with, you can make a fake Facebook account.

You Can Always Try Google

If Facebook’s Directory didn’t yield results, why not just Google it?

Here is what you need to do:

  1. Open Google
    How to use facebook’s search to find anyone or anything
  2. Enter ‘site:facebook.com’ into the Search Bar
  3. Add the Name of the Person, Group, or Event You Are Looking for
    How to use facebook’s search to find anyone or anything

You can use the same steps in Bing, DuckDuckGo, and other search engines.

How to use facebook’s search to find anyone or anything

Social Search Engines

Here’s another option that could help.

Social search engines aggregate data from social media. You can use them to do general research on Facebook’s user base. For example, this is the best way to discover what Facebook users think about a particular subject.

You can use social search engines to browse Facebook comments by topic. When you have a keyword in mind, you can find out which demographics discuss it the most on Facebook. You’ll also know whether the discussions are positive or negative. Researching market trends on social media would be impossible without tools like this.

They can also help you find specific people and events. So which social search engines are a good pick for you?

How to use facebook’s search to find anyone or anything

Pipl helps you find people whose name is too common to locate in the Facebook Directory. It’s a great option if you have a person’s location as well as their name. Using Pipl, you can also search for people based on their phone number or email address.

This site is free to use, and it has an extremely simple interface. Pipl browses various social media sites in addition to Facebook. If you’re seeking a specific person, this site is your best bet.

Talkwalker Social Search

How to use facebook’s search to find anyone or anything

Talkwalker is a thorough and versatile social search engine. The free version lets you browse mentions during the last seven days. It can be a huge help if you are looking for information about a concert, a conference, or any other event. You can also upgrade to the paid version, which lets you see data from over a year.

Social Searcher

How to use facebook’s search to find anyone or anything

Here’s another great free option. You can use Social Searcher to find people or keywords on Facebook. The site also lets you filter and sort search results.

A Final Word

In the second quarter of 2018, Facebook reached around 2.23 billion users. Although the Cambridge Analytica scandal inspired some users to delete, Facebook’s user base is still growing. Even if you prefer to stay away from Facebook, you can’t deny its reach.

Sometimes you have to search this site for information you can’t get anywhere else. For example, you may need a social search engine to track down old friends. You can also search Facebook when you’re researching organizations, brands, and small businesses. In fact, some small businesses base their entire online presence on this website.

How To Use “Facebook’s Search Engine” To Find Anything | Tips And Tricks

This Post Is Copied from http://www.meetbaba.com Visit This link for more interesting Stuff News, Games, Download, Movies, Videos Humor etc etc any thing you can imagine off.

How To Use “Facebook’s Search Engine” To Find Anything | Tips And Tricks

Source: Foss Bytes

How To Use “Facebook’s Search Engine” To Find Anything | Tips And Tricks

Short Bytes: Do you know about all the things you can do using Facebook’s search engine? It’s way powerful that you think. Using a combination of different search phrases, you can search all the posts, news, places, and photos. You can even use it to shop, play games, or listen music. But, it’s a lot different […]

Source: Foss Bytes

How To Use “Facebook’s Search Engine” To Find Anything | Tips And Tricks

Short Bytes: Do you know about all the things you can do using Facebook’s search engine? It’s way powerful that you think. Using a combination of different search phrases, you can search all the posts, news, places, and photos. You can even use it to shop, play games, or listen music. But, it’s a lot different […]

download
Facebook search, Facebook Search Engine, Facebook Search tips, Facebook Search tricks, How To, How to use Facebook search, List
#Download
#Facebooksearch, #FacebookSearchEngine, #FacebookSearchtips, #FacebookSearchtricks, #HowTo, #HowtouseFacebooksearch, #List
Adarsh Verma
MeetBaBa An Open Blog for Open Minded Readers

Source: Foss Bytes

How To Use “Facebook’s Search Engine” To Find Anything | Tips And Tricks

Short Bytes: Do you know about all the things you can do using Facebook’s search engine? It’s way powerful that you think. Using a combination of different search phrases, you can search …

Finding people online is easy if you have the right tools. You can track down someone's phone number, figure out their address, see their relatives, dig up their email address, read arrest records, and more when you use a people search engine.

Why Use People Search Engines

Maybe you need to find a long-lost school friend or locate a relative that you haven't heard from in years. Another reason to use a people search tool is to simply verify information that you have on someone, like your neighbor, a new friend, or a potential employee.

People search engines like the ones listed below are super helpful tools that are built with a hyper-focus to find only people-related information.

Most of these resources are free to use, at least for the initial search. Depending on what you’re trying to find about the person, you might be told that you have to pay for the information. However, there are free people search websites you can use—they just might not provide as much information as the people searchers listed below.

If you find yourself on one of these people finder websites and you want to remove your information from the internet, there’s usually a form you can fill out on the website to request they delist your personal details.

TruePeopleSearch

Lots of free results.

Three ways to search for people.

Last name not required.

Sponsored links blend in with real information.

TruePeopleSearch.com lets you find people by name, phone number, or address. It's one of the best people search engines because the free results are much more detailed than what you'll find on some of these other sites.

Some examples of the free information you can see here include the person's current address, wireless and/or landline phone numbers, age, previous towns where he or she used to live, relatives, email addresses, associated names, and possible associates.

If there are lots of records, TruePeopleSearch will show an age filter that you can use to narrow down the results.

If you want to pay for more results, there's a link on every person's page that will take you to another site to buy the full report.

TruthFinder

Only requires the name (not location).

Shows very basic information for free.

Lets you pay to find loads of information.

Requires payment to see results.

Takes about 15 minutes to finish the whole search.

TruthFinder does an awesome job at finding people, and the search is more thorough than most people search engines.

The TruthFinder people finder website starts off by searching for all of the following on the person: traffic offenses, misdemeanors, court records, judgements, felonies, bankruptcies, relatives, phone numbers, online profiles, assets, arrest records, weapons permits, mugshots, sexual offenses, and address information.

TruthFinder then searches for the person's job information, email addresses, education history, death records, government watch list records, social media images, dating profiles, videos, registered domains, online interests, blog posts, and more.

However, the only information you can see for free is the person's full name. You'll need to pay to see other possible names they might go by, as well as their age, the location they currently live or have lived in the past, a list of possible relatives, the last four digits of at least one of their registered phone numbers, and the email provider (e.g. Gmail.com or Yahoo.com) of at least one of their email addresses.

Results are available instantly after you pay. You can order one month of unlimited reports or pay for two months of reports at once to save some money.

This article describes several ways to find someone’s email address without using an email address search tool.

Search for the Email Address on Social Media

Everyone needs an email address to make an account on social media sites like Facebook, Twitter, Instagram, and LinkedIn, so you might be able to scour the person’s account for an email address.

Visit each of those social media platforms—plus any others that you know or suspect the person uses—and search for them by name, age, school, company, hometown, or other information that you know about them.

Even if the profile page isn't public, sometimes people allow their email addresses to remain visible so that someone who isn't a friend or follower can make contact.

If you’re not sure what social media sites people use, if any, perform a name and location search on a people search engine. Some people search engines have free trials that you can sign up for and cancel before the trial period ends.

Use a Web Search Engine to Find Their Email Address

You might have luck finding a person’s email address through a web search. A web search engine can check millions of websites in seconds, so it’s one of the best ways to search for a piece of information as specific as an email address.

Use a large and extensive search engine like Google to garner the best results. Using any of the multitudes of advanced Google Search commands, you can try to narrow down the results.

For example, putting a person's name in quotes (for example, "Marietta Johansson") refines the results to show only instances where both the first and last name are present. However, if the individual you're looking for has a common name, like John Smith, you're going to need additional information.

If you know more about the person, such as their hometown and birth year, you could add those parameters to the search (for example, "Marietta Johansson Brooklyn 1992").

If that search returns too many results, you can add one or more domains that correspond with popular internet email services (for example, “Marietta Johansson Brooklyn 1992 gmail.com”).

In some cases, you might have more luck searching for mailto, but doing so may cut down on the results, which might not help.

This method will most likely return several email addresses. To confirm that the address you find is the one you want, open the page the email address is found on and look for any context that would point to the person in question.

How to use facebook’s search to find anyone or anything

From this list, you’re able to choose to filter the results by Friends of Friends, City, Education and Work. To help refine your search, pick a combination of filters.

How to use facebook’s search to find anyone or anything

2. A friend of a friend

If you believe you and the person you are searching for have a friend in common, click on that Friend’s tab to view a list of their friends.

In addition, you can search the People You May Know page, which can be found on the Find Friends page. There is also a setting to turn on suggestions for People You May Know in your News Feed and notifications.

Log into Facebook and click on Settings from the drop-down arrow beside the question mark icon at the top of the page. Open the Notifications page from the left panel and open the drop-down menu for People You May Know. From here, you can decide whether you want these notifications and whether you receive push notifications, emails or SMS messages.

If you don’t want to use this option, when you log into Facebook, look at the top panel and tap on the button next to Create that looks like two people. This will show you your friend requests and will also share a list of People You May Know, based on the number of friends you have in common.

3. A web address may be the key

Another search technique is to use a person’s name at the end of social media sites.

How to use facebook’s search to find anyone or anything

People often use the same username across social media, which is the case for our very own Kim Komando. Add “kimkomando” to other social media addresses, and you’ll see Kim has an account on each platform with the same username:

4. Reverse that

One final option for Facebook is to perform a reverse phone number lookup simply by typing their phone number into the search bar.

While it’s not common for someone to share their phone number within a Facebook post, this method may prove helpful because people often connect their phone number for verification purposes. One security feature Facebook provides is to send a text message to users when their account is accessed from unfamiliar locations or devices.

If you happen to have a person’s number, but can’t find them on social media, this is a great option.

5. Give Google a go

What if you know very little about the person you’re looking for? While it may seem your search has ended before it had a chance to begin, remember Google is a powerful tool that can make your search easier. Type in details like their name or username along with keywords related to location, marital status or occupation to refine the results.

Did your name and keyword search result in an enormous amount of information, or did it fail to return any findings? You can give Google another try by doing an image search.

Start at images.google.com and enter the person’s name. Like your original Google search, you can help narrow down the results by including additional information such as where the person lives or works.

Scroll through the images. Once you find their picture, click on it to visit its linked social media page.

6. Try PeekYou

How to use facebook’s search to find anyone or anything

If you’re still having trouble locating someone, it’s time to try dedicated people search sites. These search engines are helpful in cases where you don’t know the person’s name, or if (s)he doesn’t use social media.

Although most sites charge for detailed information, PeekYou is a free people search site that collects and combines publicly available content from social media sites, homepages, blogs and news sources. With this information, the site determines a person’s online identity.

While these techniques should help you locate a person online, there are no guarantees. Keep refining your searches with as much applicable information as possible and hopefully you’ll find the person you’re looking for.

QUICK ANSWER

To do a Facebook image search, you can find the original uploader of an image by finding the Facebook profile ID in the image file name. You can also save the image and use Google Image search or other third-party apps and services.

JUMP TO KEY SECTIONS

The filename method

How to use facebook’s search to find anyone or anything

The first method of searching for a Facebook image only works if the file name hasn’t changed since it was first downloaded, or if the image is already hosted on Facebook. This is obvious if you look at the filename or URL. You can do so by right-clicking the image and selecting Open image in new tab. If Facebook hosts the picture, it will contain the letters fb and a long string of numbers, as seen above.

That string of numbers is the key to performing a Facebook image search. It’s pretty much the uploader’s Facebook ID number. There will be three strings of numbers separated by underscores, but the one you want is in the middle — the profile ID of the image.

Enter the URL https://www.facebook.com/profile.php?fbid= followed by the profile ID copied from the image. Hit enter, and it will take you directly to the profile, provided it’s public or accessible to you. Be aware that your mileage may vary with this method since most accounts don’t have the privacy level set to public. Still, if it works, your task is done in seconds.

If you can use the filename method, virtually any image will work. Filenames are unique to each uploader. Regardless of what’s in the picture, you will be able to track it down. That said, if several people have uploaded the image, only the specific uploader for that file will be listed. There may be older copies of the image uploaded by other users.

To do a genuine Facebook reverse image search with just the image, you may find it challenging to find a perfect match. Generally, clear and unique photos are best for reverse image searches, and the higher the resolution, the better. It should go without saying, but Facebook image searches are not the same as facial recognition software, so don’t expect any miracles. Also, don’t be a creep.

Using Google Image search

How to use facebook’s search to find anyone or anything

The second method is to use Google’s complex image search algorithm. If you’ve ever used Google’s reverse image search, this should all sound familiar.

There are two ways to do this. The first works if the image is already online. Just right-click on it and select Search Google for image.

How to use facebook’s search to find anyone or anything

Searching will open a new tab with matching image results from around the web. You can narrow it down to just results from Facebook by adding site:facebook.com to the end of the search box.

When the image is on your computer instead of online, you can perform the same function by going to images.google.com, clicking the camera icon, then Upload an image and Choose file.

How to use facebook’s search to find anyone or anything

Once the results come up, add site:facebook.com to the end of the search to find any matching Facebook profiles. If you are on mobile, you may need to switch to the desktop version.

We’ve listed Google here, but most modern search engines can reverse image search. Bing is a great alternative, and the Russian search engine Yandex can also work wonders when Google’s image search lets you down.

Using third-party services

How to use facebook’s search to find anyone or anything

If you’re looking to scour the web even further to search for an image on social media sites, there are a few services that can help. One of the most popular is TinEye, specializing in reverse image searches. It will let you know where the image exists on various sites across the web, including Amazon, Flickr, Twitter, and of course, Facebook.

How to use facebook’s search to find anyone or anything

A few other free options for Facebook reverse image searches include SauceNAO, which recognizes languages that don’t use the Roman alphabet. This feature makes it great for finding sources outside of the English-speaking world, particularly from East Asian countries like China, Korea, and Japan.

How to use facebook’s search to find anyone or anything

As for paid options, RevIMG is an excellent platform for reverse image searches. It uses a unique algorithm to identify products, buildings, art, text, and more. However, it isn’t cheap, at €49 a month for the most affordable package.

How to use facebook’s search to find anyone or anything

Facebook doesn’t have an easy-to-use advanced search engine, so one guy built his own. “Search Is Back” lets you use familiar drop-down menus to find people by city, relationship status, school, first name, and more. Plus you can search for photos, events, posts, and other stuff.

What’s special here is that you don’t need to know Facebook’s complicated Graph Search terms like “Friends of Friends named Sarah who went to Stanford and work at Google”. Search Is Back turns your simple menu selections into the proper URL and sends you to the search results page on Facebook’s official site with no extra login required.

Unfortunately, the product usually only works for people in the US who have received the Graph Search rollout. One thing that helps is adjusting your Facebook language setting to US English if you don’t use that already.

How to use facebook’s search to find anyone or anything

Some examples of what you could use Search Is Back to search for include:

  • What people from your home town are single and live in your current city
  • Who your friends of friends are at a company with a job you’re applying for
  • Which friends live in a city you’re visiting
  • All the photos tagged with two particular people (not that you’d stalk your ex)
  • Events happening tonight that your friends are invited to, so you can find something to do
  • Posts from friends about London, so you can get recommendations for a vacation
  • Friends in your city that Like a certain musician, so you can find people to go to the concert with

Search Is Back was built by Michael Morgenstern, a filmmaker from San Francisco who was fed up with how hard it was to search Facebook.

Facebook declined my request for comment regarding Search Is Back. However, a close reading of its Platform Policies shows Facebook doesn’t technically prohibit how the site works.

The social network made a big deal of its Graph Search feature for finding specific things back in 2013, but using sentences instead of traditional keywords confused people. In fact, Facebook VP of Search Tom Stocky told me in October that “the interaction model for search with these natural language phrases was not right for a mass audience.”

How to use facebook’s search to find anyone or anything

So then Facebook launched full-text post search, but that made Graph Searching even tougher since Facebook would confuse sentences for keywords. Facebook does have some advanced search features, but they’re split up and buried in weird places like the Find Friends tool and the sidebar options of old-school pre-Graph searches.

How to use facebook’s search to find anyone or anything

Search Is Back developer Michael Morgenstern

Morgenstern tells me “it sucked” how Facebook screwed up search. So he “did a lot of poking around” to find out what Facebook URLs did what, and since Search Is Back doesn’t use Facebook’s API, it might be harder to shut down.

Like a true hacker, Morgenstern just wanted to play around with what was possible on the web that won’t work with mobile apps. He says “We’re moving towards an app ecosystem where it’s not possible to build things like Search Is Back because all these apps are walled gardens. So in the dying days of open HTML web, it’s imperative to build these tools and customize what people give us.”

Facebook might find a way to shut down Search Is Back, but until then, it’s a free and privacy-safe way to find anything on Facebook with a simple set of boxes.

What's happening now in online privacy, from pop culture to law to personal stories.

October 22, 2012

How to use facebook’s search to find anyone or anythingIf you’ve ever given your phone number to Facebook, anyone can find your profile by running a Facebook search on that number. And we mean anyone with a Facebook account—not just your friends. Recently, a security researcher demonstrated that he could exploit Facebook by connecting hundreds of thousands of phone numbers with their owners’ names.

Even though Facebook lets anyone find you through a reverse phone number lookup by default, you can prevent it from happening by following these simple steps:

Step 1: Log into your Facebook account.

Step 2: Go to Privacy Settings.

Step 3: On the Privacy Settings page, you’ll see a section for “How You Connect.” Click “edit settings” next to it.

Step 4: A box titled “How You Connect” will open. On the drop-down menu next to “Who can look you up using the email address or phone number you provided,” select “friends.” (This is as private as you can go; Facebook won’t let you limit it to “no one”).

How to use facebook’s search to find anyone or anything

Step 5: Click the “Done” button to save your changes.

You’re done! Now you’ve limited Facebook’s reverse phone lookup so that only your friends can find you through your number. Unless it’s absolutely necessary, it’s a good idea to avoid giving your phone number to any social network, despite them repeatedly asking for it for “security purposes.”

How to use facebook’s search to find anyone or anything

I’m increasingly being asked by folks on Facebook if it’s possible to tell who has been viewing their Facebook profile. A number have been attracted to webpages and Facebook applications that claim to be able to give you a secret insight into who is spying on your profile.

Well, if you’re one of those people who are curious about who might be watching you online, take care.

Right now we’re seeing a significant number of Facebook users posting messages such as:

OMG OMG OMG. I can't believe this actually works! Now you really can see who views your profile. WOAH

See who views your Facebook profile in real-time.

How to use facebook’s search to find anyone or anything

If you make the mistake of clicking on the link to one of these pages offering to tell you who is viewing your Facebook profile, you will find that the people behind the “services” want you to do a few things first.

How to use facebook’s search to find anyone or anything

For instance, they’ll ask you to “Like” their pages (which means you are spreading the link to friends in your social network), and they will ask you to advertise their site by posting an “OMG” message (with a link) to at least five different places on Facebook.

After all that hard work you would hope that they would give you access to the powerful Profile Spy app wouldn’t you? But I’m afraid your luck is out.

They’ll next ask you to hand over your personal information by taking numerous surveys – before ultimately trying to trick you into handing over your cellphone number which they’ll sign up to an expensive premium rate service.

How to use facebook’s search to find anyone or anything

Remember, this scam doesn’t work as the result of clickjacking, or a vulnerability on Facebook. The scammers are achieving their ends because of human gullibility – pure and simple. If people considered what they were doing and thought twice about the possible consequences then we would see nothing like as many of these attacks occurring, and our news feeds on Facebook would see less spam.

Do your bit for the public good and share this page on Facebook to warn your online friends about scams like this. Press the button at the side to share this article if you’re a Facebook user.

Interestingly, the pages that this particular scam points you to aren’t on Facebook, but still display a fake Facebook header at the top. You will notice if you visit them that although the top menu options are there, they cannot be clicked on – which clearly makes the pages look even more suspect.

Ultimately you have to have your wits about you to avoid scams like this. If you or your friends keep falling for these sort of confidence tricks, or want to learn more about security threats, don’t forget you can join the Sophos page on Facebook.

You could also do a lot worse than check out our best practices for better privacy and security on Facebook guide.

Follow @NakedSecurity on Twitter for the latest computer security news.

Follow @NakedSecurity on Instagram for exclusive pics, gifs, vids and LOLs!

How to use facebook’s search to find anyone or anything

This article will enlighten you on how to see someone’s hidden friends on Facebook. Plenty of people using Facebook now hide their friend’s lists as they are no longer naïve and would not want to be exposed to the risk of a cloned account.

Facebook has a range of features that its management always looks to improve as time goes on and this is what makes Facebook one of the most used applications in the social media world. But, this hiding of account is one of the modifications of the Facebook features but there are also some tricks to be able to see hidden friends list on Facebook.

Some of the popular features of the social media platform are adding friends, sharing posts, uploading photos and videos, like comment and tagging friends and family in your post, instant game, watch online videos and lots more. In the aim to improve the application from time to time, Facebook management modifies certain things on the application.

How to See Someone’s Hidden Friends On Facebook

Sometimes you might want to access someone’s friend list on Facebook because you are looking for someone and cannot find them but they are friends with your friends. To see someone’s hidden friend list on Facebook you will need to perform a graph search of Facebook. If you and your target profile have something in common, the graph search will help you find the hidden friend list of your target profile.

Facebook is viewed as the most popular social media network due to the fact that it has the largest user pool of about 2 billion users. So it’s possible that you might need to view someone’s hidden friend’s list one day. In that case, given below are the three options one can use to view a person’s hidden friend list on Facebook;

How to View Someone’s Hidden Friend List on Facebook Using Social Revealer

You have to understand that a friend list on Facebook that has been hidden can still be accessed and viewed. However, you are required to own a Facebook account because before you can access the social media platform you need access to a Facebook account.

Once provision has been made for that, you can now proceed on your quest on how to see someone’s hidden friends on Facebook. You will need a Personal Computer with Google Chrome installed on it, then follow the steps below;

  1. Visit the Google Chrome web store and install ‘Social Revealer’
  2. After installation, open your Facebook account by logging in at facebook.com
  3. Proceed to the profile of the person’s friends list you want to see.
  4. Now open the ‘’Social Revealer” extension and click on “See Friends”
  5. A new tab showing the Facebook user’s Facebook friend list will be opened.

So these steps mentioned above will help you easily see someone’s hidden friends list as well as mutual friends. It should also be noted that there is another Google Chrome extension such as “Facebook Friend Mapper” that can be used to complete the task of seeing someone’s hidden friends on Facebook. Basically, when someone hides their friend’s list from you or the public in general, this is a way around to get to see those hidden friend list.

How to View Someone’s Facebook Friends Without the Social Revealer & Facebook Friend Mapper

You can also see someone’s hidden Facebook friends without a social revealer. simply follow the steps below:

  • Log in to Facebook and then open the profile page of the friend of the Facebook user you want to see.
  • Open any person created post or image, find “fbid =” copy the number after it but end before the “&” character.
  • Open a new tab and paste https://www. Facebook. com/search/100034868239441/friends. change the number between “SEARCH/……/ friends in the previous one you have copied.
  • Press the enter key to search and the person list of hidden friends on Facebook will show.

With these steps, you can view the hidden friends’ list of Facebook users and search for who you are looking for on your user’s friends list. You should also be aware that there is another google extension called “Facebook friend mapper” that can also be used to see someone’s friends list if hidden from you.

The ability to track and locate an individual is no longer as difficult as it appears in the movies. Wiretaps and bugs can be replaced with something as simple as a smartphone – to a certain extent. We live in such a digital age that it has become easier to pinpoint someone’s location using nothing more than a chat app.

Do you need to relay information that can’t be shared over the phone? Just hop on Facebook Messenger to pinpoint their location so you can make the trip in person.

How to use facebook’s search to find anyone or anything

So long as you and the “target” both use Facebook Messenger, location tracking is possible. This means that any parent who thinks their child may be sneaking off to a party instead of a study group, can use Facebook Messenger to “check in” and determine their whereabouts.

Now just imagine that you’re on the other end of this scenario. Someone could be tracking your location right now and you wouldn’t know it. Creepy, huh?

The Facebook Messenger app actually poses more of a risk than you might imagine. This is especially true for those who have hundreds of friends, not all of which are people you may have ever actually met. We probably put way too much of ourselves on social media, providing more information than we think. Understanding how you can track others may enlighten you on how easy it can be for someone to do the same to you.

Tracking Location Using Facebook Messenger

You don’t even need to be tech-savvy in order to track someone using Messenger. It doesn’t take an elite-level hacker to get on Facebook and see someone has shared their location.

How to use facebook’s search to find anyone or anything

Location Sharing

This particular feature is a more consensual approach to tracking. Facebook Messenger makes it easier for people who want to meet up by allowing friends to share their location.

  • You or someone on your friends list can open up a chat dialog through Facebook Messenger, by tapping on the four dots found at the bottom left portion of your screen.
  • Click Location.
  • From there, just select Share Live Location and your friend will get to see your current location. They in turn can share their location with you.

Location Tags and #Hashtags

Search for a location tag of someone on your friends list and their location is all but a few clicks away. The most common way in which to discover a location tag is by checking Facebook Stories.

  • If a location tag has been left on one of the images, you can just tap on it, select show location and have it pulled up on your smartphone screen.
  • Tap on the tag text and you will be redirected to Google Maps, which will display the target’s location.

It’s not the most reliable method of discovery seeing as the location is not necessarily current, but when the image was originally published. There is also the problem of the location tag providing an incorrect location as the publisher can post any location they choose. But it’s still worth a shot.

Third-Party Apps

How to use facebook’s search to find anyone or anything

Here’s where location tracking starts to become less consensual and more privacy invasive. Although there are applications of location tracking that could be beneficial in a positive way, more often than not, this method has ‘cybercriminal’ written all over it.

Using a free online service like IPLogger can help you to find the exact location of a friend as of the time a post was made.

  • All you’d need to do is go to the website and choose a tracking option from the list.
  • Enter the URL of the site you’re tracking the location from and copy the provided IPLogger code.
  • From here, it’s all about getting your friend to click the generated URL, which you can send through Facebook Messenger. Once this happens, you’ll be able to use a second generated URL that enables you to view the location statistics directly from your browser.

The Nearby Friends Feature

This feature requires that you have the actual Facebook app installed. You can then enable it by going into the More Options menu and selecting Nearby Friends. Then just tap the option to turn it on.

How to use facebook’s search to find anyone or anything

You will now be able to see all of your other friends who are currently using the feature. Each will be listed by location, showing their physical distance between you. The closest friends will be shown first and will be accompanied by a Facebook Messenger button which you can use to open up a chat with them.

By simply using the feature, you’ve given consent to anyone who is also using the feature, and happens to be on your friends list, an open invitation to your location. This particular feature is primarily used for real-life meetups between friends and colleagues, but can also be used by non-friends you’ve mistakenly put on your friends list.

Conclusion

As you can tell, it doesn’t take much to locate anyone you want to, as long as they’re on your friends list. With a little bit of sharing on both ends, you can pinpoint any of your friend’s whereabouts, and they can do the same.

Be smart about who you share things with, especially online, as not everyone is as friendly as they may seem.

Former US Army IT communications specialist who began his online blogging career in 2016. Joseph has over 10 years experience in the IT industry as both an analyst and communications expert. He’s a night owl and an avid Red Bull consumer who spends most of his downtime enthralled by online gaming and website building. Read Joseph’s Full Bio

When you're trying to find someone online, Google's not the only game in town. In the last two years, a handful of new people search engines have come onto the scene that offer better ways to pinpoint people info by name, handle, location, or place of employment. While there's still no killer, one-stop people search, there are more ways than ever to track down a long-lost friend, stalk an ex, or screen a potential date or employee. The next time you wonder, "What ever happened to so-and-so?" you've got a few power people search tools to turn to.

Note: Stalking is serious business. When we say 'stalk,' we're exaggerating, not recommending.

Find Phone Numbers and Addresses with ZabaSearch

Look up anyone's home address(es) and phone numbers at ZabaSearch , a creepily-comprehensive people search engine that will freak you out when you search on your own name but save your ass when you desperately need a former coworker's phone number. ZabaSearch's index includes listed and unlisted numbers and addresses (though the founders say all the info is public record.)

ZabaSearch people search

Recently-launched Zaba Search uncovers a whole lot of information about people given their first…

Sounds good
Have up to 20 hours of battery life and can be used in multiple different listening modes to make you as aware as you want to be of your surroundings.

Search the "Deep Web" with Pipl

My favorite new search engine of the bunch, Pipl digs up information about a person Google often misses, supposedly by searching the "deep web" (or " invisible web .") Pipl returns an impressive number of results for most people who use their "real" names online, including personal web pages, press mentions, MySpace pages, and Amazon wishlists. You can also narrow your search for common names by entering city, state and country, too.

Special: Seek and Ye Shall Find

by Wendy Boswell

Search Several Social Sites at Once with Wink

So the person you're looking for likely has a Friendster, LinkedIn, MySpace, Twitter, or Xanga account? Instead of searching each service individually, enter their full name or screen name, plus other identifying information like interests and location at Wink to do a one-hit comprehensive search of all those services at once.

Get Employment Results at ZoomInfo

Job-centric search engine ZoomInfo aggregates people and company information in one place to help candidates find the right job, but its people search tool also turns up information about corporate types especially well. ZoomInfo's information listings on people, culled from the web, include people's employment history and current job title, whether or not they're looking for a job. Search by a person's full name at ZoomInfo, and when you get too many results, filter them by geography (U.S. and Canada only.)

Find More than College Students at Facebook

Incessant notifications, Beacon, and zombies aside, one of Facebook 's greatest utilities is finding people online, and it's not just for students anymore. Chances are your grandmother set up a Facebook account this year, so all those annoying emails might be worth tracking down your best friend when you were 9 years old who moved to Florida on Facebook.

Practice Your Google-fu for Better People Results

Okay, fine, you can't talk finding people online without mentioning the big G. For internet superstars you'll get great results by just typing his/her name into Google's search box, but for civilians, common names or names with double meanings, a few advanced Google techniques can help narrow down the field of results.

  • Enclose the first and last name of the person you're searching for in quotes when you enter it into the search box (like "John Smith").
  • Include other relevant words, like the person's profession, employer, location, or screen name, too (like banker or Austin, Texas.)
  • If the person you're searching for is likely to appear on a particular web site—like a school—search only that site using the site:URL operator (like site:ucla.edu "John Smith").
  • To look up people by face, search for them on Google Images to get a quick visual—especially useful for people with common names, or to determine the gender of a name you never heard before.

Get Context-Menu Access to People Search Engines with the Who Is This Person? Firefox extension

Finally, if you run across folks online you want to know more about often, search a ton of engines for someone's name with the Who Is This Person? Firefox extension . Simply highlight the name on any web page and look 'em up on Wink, LinkedIn, Wikipedia, Facebook, Google News, Technorati, Yahoo Person Search, Spock, WikiYou, ZoomInfo, IMDB, MySpace and other engines from the Who Is This Person? context menu item.

For more online sleuthing resources, check out Wendy's great tutorial on searching public records online . To make yourself more findable? Have a say in what Google says about you . Also, many of these services let you "claim" your name and add information to your results. Do a search for your own name and click the link that says, in effect, "Is this you?"

Where to Find Public Records Online

You can use the internet to find almost anything: a good restaurant, a recording of a…

Does the current crop of people search engines make you want to change your name, fail you entirely, or help you get in touch? Let us know what you think in the comments.

Gina Trapani , the editor of Lifehacker, likes to find and be found. Her weekly feature, Geek to Live , appears every Friday on Lifehacker. Subscribe to the Geek to Live feed to get new installments in your newsreader.

How to use facebook’s search to find anyone or anything

On Monday, Facebook officially rolled out Graph Search to everyone on the social network. The new search engine, originally accessible to only a select group after its introduction in March, lets you search through the mountains of information the site’s more than 1 billion members produce daily. Starting this week, everyone with a Facebook account can find “friends from London who like ‘True Blood’ ” or “married people who like prostitutes.”

In Facebook’s attempt to connect friends and friends of friends to one another, your information, now fed into a search engine, is more public than ever before. If you’re irked by the the idea of strangers finding out personal details of your life with a few clicks in a search bar, there are steps you can take to ensure your privacy on Facebook. Here’s what to do:

First things first. Head to your main Facebook page and click the little padlock in the upper-lefthand or upper-righthand corner (depending on which layout Facebook has decided you get). When you click on it, the following box will appear:

How to use facebook’s search to find anyone or anything

Take a look at “Who can see my stuff?” In order to get a sense of how drastically your settings need to be changed, click “View As” to see how a particular person who is not your friend sees your profile. You may be surprised by how much of your information is visible to the public.

How to use facebook’s search to find anyone or anything

Under “Who can see my stuff?” there’s an option to click “Use Activity Log.” This will show you a log of all your actions (comments, posts, photos, etc.) on Facebook and the visibility of each post. Anyone that a post is visible to can potentially search for it on Facebook now. That means information that you probably thought would never be searchable — like the photos you’ve liked — now is. It may be time to go on an unliking spree.

How to use facebook’s search to find anyone or anything

Then you’ll want to check out your tagged photos. Click “Photos” on the lefthand side of the “Activity Log” to see the photos you’ve uploaded and photos you’re tagged in.

How to use facebook’s search to find anyone or anything

Remember that photos your friends have tagged you in may be visible to more people than you want. If you don’t want certain photos visible to certain people on Graph Search, you can always untag yourself. For photos and other things you posted yourself, you can alter the group of people (“Public,” “Friends,” “Only Me”) who can see them from this page as well.

How to use facebook’s search to find anyone or anything

Time to check out one of Facebook Graph Search’s main sources of information, the pages you’ve liked. Go to your profile’s “About” page and scroll all the way down to find the music, movies, TV shows and books you’ve given a thumbs-up to over the years. Don’t get concerned with the first line of “likes” in each category. Those are just Facebook’s suggestions for you.

How to use facebook’s search to find anyone or anything

You will need to go through all of your “likes” to make sure there’s nothing embarrassing in there. People will be able to search things like “Friends of friends who like Kidz Bop” and you don’t want your name coming up. Don’t let those super old or ironic “likes” get the best of you.

You can also alter the audience that can see the musicians or companies that you’ve liked. For example, you can go to the “Music” section, click on the “Edit” button in the right corner and then click “Edit Privacy. This window will pop up, letting you make your music tastes invisible to the general public.

How to use facebook’s search to find anyone or anything

If you’d like to start reviewing all of the things you’re tagged in, you can set up notifications every time someone tags you in something. Go to your “Accounts Settings” page and click “Timeline and Tagging.”

How to use facebook’s search to find anyone or anything

On that page, you can change a setting so that you review your tags, decide who can post on your timeline, who can see posts on your timeline and more.

Be it personal communications or professional communications, most of them nowadays take place on Facebook. When someone wants to say something, they can just log-in to their Facebook account and spread their message across to all Facebook users. What that means is, if you ever wish to find out information about someone, you can then hack Facebook account of theirs. It will provide you with all information the user has shared on the social media website.

There are multiple ways that let you hack Facebook online using your computer or your other devices. Each of them uses a unique way to help you get access into any user’s profile on the Facebook platform. In the following guide, you are going to learn just about that – how to hack Facebook account.

Method 1. The Most Efficient Way to Hack Facebook ID with Spyera

There are tons of spy apps that let you spy on someone’s device so you can view their Facebook conversations. However, only a handful of those apps actually work. If you have not found a working app for yourself, the following section will suggest you one.

How to use facebook’s search to find anyone or anything

Enter Spyera, a fully-featured spy app that allows you to spy on anyone’s device without them knowing anything about you or the app. Once the app is installed on the victim’s device, you can keep an eye on all of their activities that take place on their device.

There are two ways you can use the app to hack someone’s Facebook account.

1. Directly Spy on Someone’s Facebook Conversations

In this method, you just need to install the app on victim’s device and it will begin to send you all of their activities. This doesn’t require you to know the username or the password of the victim’s Facebook account. Here’s how to execute this method:

  • Purchase a license for Spyera from its official website.
  • Get access to the victim’s phone somehow and install the Spyera app on it. You don’t need the phone once the app is installed.
  • Access your Spyera account and head to Messages > IM > Facebook to view your victim’s Facebook account activity.

There you go. That’s how you can use the Spyera Facebook hack software to hack into someone’s Facebook account.

2. Use Keylogger to Find Out Victim’s Login Details

Another option in the Spyera app that allows you to view someone’s Facebook data is keylogger. Using the keylogger feature, you can find out what someone’s typing including their username and password and you can then use those details to log-in to their Facebook account.

Once you purchase a license for the Spyera app, you will get more information as to how you can install the keylogger and get someone’s Facebook login credentials on your device.

Method 2. Hack Facebook Online with Face Geek

If you don’t already know, Face Geek is a web based service that allows you to crack passwords of the specified Facebook accounts. It will let you hack into anyone’s Facebook account as long as you know the URL of the victim’s Facebook account. The following is how you implement this method:

    Open a web browser and head over to the Face Geek website. When you’re there, click on the button that says Click here to start to start hacking Facebook accounts.

How to use facebook’s search to find anyone or anything

How to use facebook’s search to find anyone or anything

There’s nothing else you need to do to hack the account as the tool will take care of the rest for you. It will somehow find out the password of the account and then you can use that password to log-in to your victim’s Facebook account.

Method 3. Hack Facebook Password Using Forgot Password Method

You may not be aware of but Facebook has a weakness on it’s forgot password page that you can use for your own advantage to hack a Facebook account. What you basically need to do is enter the name of the Facebook account you wish to hack and then click the option that lets you reset a password. You then use the recovery options to get a new password. Here’s how to hack Facebook using the forgot password method:

    Launch a web browser and head over to the Facebook homepage. Find and click on the link that says Forgotten account to access the page we need.

How to use facebook’s search to find anyone or anything

How to use facebook’s search to find anyone or anything

What Facebook will do is send a code to the chosen recovery option and you can use that code to set up a new password for the account. That way, you will gain access to that Facebook account and the owner of the account will lose access as the password has been changed.

Method 4. Hack Facebook Account Using the Phishing Method

Phishing method is a well-known method in the hacking world and it can also be used to hack other accounts such as Google and Yahoo accounts. What you basically need to do in this method is create a login page that looks exactly like the original one and then capture user’s login details.

You need to get a hosting account and a domain name. Then, create a fake login page and send the link of that page to your victim. Somehow convince the victim to open the page and enter in his or her login details. The details will then be sent to your email address allowing you to access the victim’s Facebook account.

This method uses a bit of social engineering so it helps to have knowledge of that as well.

Conclusion

There may be tons of methods to hack Facebook account but the ones described in this guide actually work and let you get into someone’s Facebook account. If you don’t want any hassle while hacking the account, Spyera is the way to go.

How to use facebook’s search to find anyone or anything

Although it seems younger people are leaving Facebook in their droves for hipper social media platforms, it remains one of the largest and most important social media providers.

This fact also makes it a prime target for hackers who can put access to your Facebook account to all sorts of profitable uses. As you might expect, this means there’s a long list of hacks collected by the community that can provide you access to another person’s Facebook account.

Now, before you get excited you should understand that we aren’t providing this information as a way to tell you that you should hack people’s accounts. In fact, you should not hack into people’s personal information for many reasons, least of which possible jail time. No, the point of this article is to demonstrate how weak Facebook’s security can be in some instances. By the time you read this many of these holes will already have been plugged by Facebook. Which is exactly what they should be doing, after all.

Besides, none of this information is secret. Anyone with a few hours to kill on Google can learn at least one potentially effective way to compromise Facebook security.

Method 1: Password Reset Hacking

How to use facebook’s search to find anyone or anything

Just like any other online service, Facebook provides a way for you to reset your password. Most people do this when they simply forget their passwords, but it is ironically also a feature that’s meant to help you regain control of your account if it should be hacked and the password is changed. This method requires the email address of the target.

Basically, you do the following:

  • Go to the Facebook login page
  • Click on “forgot your password”
  • Enter the target email
  • Click on “No longer have access to these?”
  • Enter an email address that belongs to you and is not associated with any Facebook account
  • Enter answers to the security questions with third-party information gathered through Google or other methods.

As you can see, this method relies on either knowing additional information about your target or the target having weak security answers. Funnily enough, it’s often possible to get the needed information to answer security questions from the public portions of a person’s Facebook page.

How Can I Stop it From Happening?

This exploit is pretty easy to prevent. One of the most effective ways to stop email reset hacking is to use a unique email address for Facebook. Open a Ymail, Gmail or other mail accounts for the sole purpose of using it for Facebook. That way if someone knows your main email account address it’s of no use when it comes to hacking.

The second defense is making sure you have really tough security questions. In fact, it is in your best interest not to tell the truth when it comes to your security questions. Make things up and then don’t forget what your made-up answers are. It’s not a great idea to have what is effectively a password someone can look up using public information.

Method 2: Use Keylogger Malware

How to use facebook’s search to find anyone or anything

A keylogger is a small piece of software or specialized USB device that records everything typed on the keyboard during a specified time. This keylogger is then sent back to the hacker by the software keylogger. A hardware keylogger must be retrieved, so it can only be used on someone you have physical access to like a coworker.

You can either buy a keylogger from various places on the net or write your own if you’ve got the talent. Infecting a user’s computer can be done in a few ways. Leave a flash drive lying around where they are likely to find and plug it in out of curiosity. Tricking people into opening infected attachments is another way if their antivirus doesn’t catch it.

Once you receive the logs you need to search the text for the person’s email address, the Facebook URL or any other text inputs that might come just before a password is entered.

How Can I Stop it From Happening?

Software keyloggers need to call back home to send their logs to the hacker who planted them. Obviously, you should schedule regular scans of your computer for malware, spyware, and viruses.

Two-factor authentication is also effective since the keylogger can’t read your phone messages. Finally, make sure only software you approve is white-listed on your computer firewall so that the keylogger can’t communicate with the hacker.

Method 3: Phishing for Passwords

How to use facebook’s search to find anyone or anything

Phishing is a method of getting the user to actually provide the password to you directly.

The basic process of phishing works like this:

  • Create a website that looks like the login page of Facebook. The site should not be traceable back to you.
  • Create an anonymous email account and then send a spoofed email posing as Facebook. Inform the target something has gone wrong and that they need to log in by clicking on the link in the email.
  • If the target falls for it, then click on the link, fill in their credentials and submit it straight to you

Phishing is a pretty common attack method and is effective mainly because it gets spammed to thousands of addresses, some of whom fall for the scam. If you actually know the target you can make the message more compelling by including information such as their name and actual recent activity from their account.

How Can I Stop it From Happening?

Because phishing is so common we’ve actually put together a comprehensive guide to phishing protection, but it basically boils down to never click on links you find in unsolicited emails. If you can manage that, you’ll be fine.

Staying Scam Free

Some of these methods work for plenty of other services too. Online scams are everywhere and you have to keep your head on a swivel if you want to stay safe. Of course, as always the best place to start with online security is a reliable VPN service. Our favorite as the best all-round VPN right now is ExpressVPN. Be sure to give it a try!

The How to Use the Facebook Group Finder has been the questions a lot of individuals has been seeking answers to, and am not surprised if you are one of the many individuals out there. Facebook makes group recommendations based on the pages you visit the most, so be prepared to get into group finding with this content. But before we proceed, what is Facebook Group Finder? Well, it is using Facebook search to locate groups that you would like to be a part of.

How to use facebook’s search to find anyone or anything

Locating a Facebook group has is a lot easier than you think. In other to locate the group, you would be required to have a profile or create one if you do not already have one.

Facebook Group Finder

Jarvee’s group finder tools is basically used for extracting and locating groups that are related to a particular topic. This group is way over the top compared to the finder tools on LinkedIn and Google Plus accounts. The Group finder is a free tool to use and it makes search a lot easier and faster for people making use of it. Jarvee has a lot of interesting ways of locating groups. First, extracting the keywords, extract from Local groups, and extract from URLs.

Facebook Group Search Tool – How to use

Below, expect the three methods of how to find groups using the finder tools below. The methods include:

Extract from Keywords

  • First, add the keyword to the search box. “extract Groups that contain the following Keywords”. Include one or more keywords.
  • If you want to remove some keywords, add them In the provided box for the “Exclude groups that hold the following keywords”.
  • Scroll down the page to the Group filter section and then set the filters.
  • After which you would click the “Extract groups” tab and jarvee toll will start searching for the available groups.
  • You can locate the results below the find of the finder.

Extract from local Groups

This process is easy and straight, it enables you the find relevant groups in your location. This is quite helpful if you want to take part in activities in your city or close to you.

Extract from URLs

This method enables you to extract groups that your friends are part of or other users if the groups are public.

Aside from these methods, there are other simple methods of locating Facebook groups’ search tools. This process is quite simple and it is can be carried out within the Facebook Platform.

Facebook Group Search

This method should be known to you already. If you want to locate groups with having to use any Finder tool, you can search for the groups making use of the following key phrases:

Groups Joined by:

  • Friends
  • Family
  • Location
  • Your city
  • Favorite books or celebrities.

With the activities you carry out on Facebook, getting a nice group for yourself should be a lot of complicating. As a matter of fact, Facebook would bring up suggestions for interesting groups that match your personality.

How to use facebook’s search to find anyone or anything

If you can’t log into Facebook, this post offers instructions for how to recover your Facebook account. MiniTool Software not only helps users solve various computer problems but also provides some useful computer software like MiniTool Power Data Recovery, MiniTool Partition Wizard, MiniTool ShadowMaker, etc.

This post mainly talks about how to recover your Facebook account when can’t log into Facebook. Check the Facebook account recovery guide if you forgot Facebook password, email, or phone number, or have other troubles in logging into your Facebook account.

Recover Facebook Account with Facebook Recovery Options

  1. You can open https://facebook.com/login/identify in your browser. Do use the device that you used to log into your Facebook account.
  2. Type the name, email address, or phone number associated with your account to search for the account you want to recover.
  3. Select the account you want to recover and choose a method to receive the verification code.
  4. Follow the instructions and enter the code to verify your account and reset Facebook password.

How to use facebook’s search to find anyone or anything

You can download Facebook app for Windows 10/11 from Microsoft Store, get Facebook for iPhone from App Store and Facebook for Android from Google Play Store.

Recover Facebook Account with Friend’s Account

  1. Log into your friend or family member’s Facebook account on a computer. Click the friend or family member’s profile at the upper-right to enter into his/her Facebook home page.
  2. Click the Friends tab and you can see all friends of his/her account.
  3. In the Friends list, find the profile of your account that you want to recover. Move your mouse on that account and click the three-dot icon below the profile. And click the Find support or report profile option.
  4. Select Something Else and click Next.
  5. Click Recover this account and follow the instructions to conduct your Facebook account recovery.

Recover Facebook Account If You Forgot Password

If you forgot your Facebook account password, you can check how to recover your Facebook password to get back your account.

How to use facebook’s search to find anyone or anything

Why Facebook logged me out randomly? Here are 6 solutions to fix Facebook keeps logging me out issue in 2021.

How to Recover Facebook Account without Email or Phone Number

If you have issues with the email or phone number that you used to log into Facebook, you might use an alternative email or mobile phone number that you’ve ever added to your account to restore your Facebook account.

You can also contact your email service provider to get back your email and then follow the ways above to do the Facebook account recovery.

How to use facebook’s search to find anyone or anything

You might want to download YouTube app on your Windows 11/10 PC, Mac, Android, or iPhone. Check how to get YouTube app for free in this post.

Best Free File Recovery Software

If you’ve ever deleted a file by mistake or lost some important files due to unknown reasons, don’t worry, you have a chance to recover the deleted or lost files.

MiniTool Power Data Recovery, the professional data recovery software for Windows, enables you to easily recover any deleted or lost data from Windows PC or laptop, memory card, USB flash drive, external hard drive, SSD, etc. It is a 100% clean program.

It offers an extremely intuitive interface and you can perform the data recovery in a few clicks. Take recovering deleted files from PC as an example.

You can download and install MiniTool Power Data Recovery on your Windows computer. Click This PC and select a drive that contains your lost or deleted files in the right window. Click the Scan button to start the scan process. Wait for the scan to finish. Check the scan result to find wanted files, tick them and click the Save button to specify a location to store the recovered files.

  • Facebook
  • Twitter
  • Linkedin
  • Reddit

ABOUT THE AUTHOR

Position: Columnist

Alisa is a professional English editor with 4-year experience. She loves writing and focuses on sharing detailed solutions and thoughts for computer problems, data recovery & backup, digital gadgets, tech news, etc. Through her articles, users can always easily get related problems solved and find what they want. In spare time, she likes basketball, badminton, tennis, cycling, running, and singing. She is very funny and energetic in life, and always brings friends lots of laughs.

If you think of Facebook as a place to post photos of your pets and kids, well, you’re not wrong. But the social media site is also a powerful tool for networking and engaging in a job search.

Think about it: How often have you seen a friend post that his or her company is looking to fill a position? And, how many groups exist that are related to your field? Much like the office water cooler or a get-together with friends, Facebook is a virtual gathering place where people talk about kids, pets, the news — and work, too. Try these simple strategies to use Facebook to further your job search.

How to use facebook’s search to find anyone or anything

Use Facebook’s search function to find groups of people talking about your industry. If you’re a marketer, for instance, try searching “marketing.” Once you’ve typed a keyword into the search bar, hit the “see all results” text, then choose the “groups” tab on the search results page.

Some groups may be “secret” or “closed” to permit only people related to a topic to join. Ask friends and colleagues to recommend the Facebook groups they find useful for networking or learning about their industries. Get a Facebook invite from them, if needed.

You can also do an online search — outside of Facebook — to see which Facebook groups people recommend in your industry. Try putting “Best Facebook groups for [industry/field/job title]” into a search engine and see what pops up.

You don’t have to be a moderator of the group — the person who reviews every post. But aim to be an active member by regularly reading the posts. Comment on posts when you have an opinion, advice, or a tip to share. You can also post yourself by sharing articles and photos.

Here are some ideas for how to participate:

  • Comment on posts asking for advice or sympathy: Even something as simple as “liking a post” can get you noticed by the group moderator and other members.
  • Share a relevant news story: Post interesting news related to the group is an easy way to participate.
  • Ask icebreakers: You might post something like: “My name is Sam and I went to SCAD as a textile major before becoming a production director for TV shows. Just curious: how did you find your way into this field?”
  • Ask questions: Group members are usually willing to answer questions and share advice. Before you ask a question though, search the group’s history to see if it’s been addressed.
  • Request help with your job search: If you’re looking for a job in a certain location or to meet people in your city, you can post with these direct asks. You may be surprised to find how generous people are sharing advice or connections.
  • Follow the rules: Make sure to note the group’s rules before posting. Some groups, for instance, have rules against self-promotion, so you’ll want to make sure to avoid pushing your book, if you’ve written one, or any products where you make money.

Typically, you’ll find that most groups have only a few active members and a lot of lurkers — people who read posts, and sometimes “like” the posts, but rarely comment. Be more active than this silent majority — join (and start) the conversation.

If people post about networking events — conferences or drink gatherings in your area — consider attending. You’ll already have something in common with other attendees, which can make small talk easier. The connections formed by meeting someone in person tend to be stronger than those created with online interactions.

With closed groups, you won’t be able to see the quality and quantity of posts before joining.

Don’t hesitate to leave any Facebook group you join that isn’t helpful or is cluttering up your feed with content that isn’t actionable.

Just think of it as unsubscribing from a marketing newsletter. Spam isn’t going to further your job search; it’ll only eat up your valuable time. Your goal is to join groups with meaningful information, where you can form connections.

Most of your friends on Facebook are probably people you’ve met in real life. But, as you engage with fellow group members, you may discover you have a lot in common — even more than the topic of the group. Inside jokes can form. Personal details may get shared. This is the process of becoming friends online.

Once you’ve had a few interactions on comment threads — beyond just liking each other’s comments — it may feel reasonable to extend the relationship beyond the group, and connect as friends. You may also send direct messages to people in groups, using Facebook’s messenger functionality. Be cautious, however. Unlike LinkedIn, most people do associate Facebook with friends — not professional networking — so you do not want to abuse the messenger functionality.

The primary purpose of Facebook is connecting with friends and family. Once you’re in a group, however, you should know that people click through to your profile page once you post. What will they see? You’d better make sure your profile doesn’t have anything starkly unprofessional showing (i.e., pictures of you drunk, scandalous outfits, hateful or unkind language, curses, etc.).

These are good policies to follow if you’re job searching anyway, because recruiters and hiring managers are known to check profiles as part of their pre-interview prep work. You can also fill in your profile with details on your education and work history.

What crosses your mind when you hear someone talking about hacking a Facebook account? A tech-savvy geek who has a doctorate in software engineering? Or a hooded online thug with a lethal digital arsenal ready to access anything in other people’s online world?

The truth is, pretty much anyone can break into a Facebook account by using a few simple methods. However, this information is not for those who want to satisfy their hacking curiosity but rather for someone in dire need.

Table Of Contents

How to Hack Facebook Account of Another Person: 5 Methods That You Didn’t Know About

There are numerous ways to hack Facebook Messenger conversations. The ones below are the easiest methods to monitor someone’s Facebook activity. However, note that you need to have a good excuse to monitor someone’s social media account without permission.

1. Installing a Monitoring App

How to use facebook’s search to find anyone or anything

If you are looking for how to monitor a Facebook account in a minute without the minesweeper-level strategy, this is for you. One way of doing so is by using a monitoring tool, such as mSpy.

Here is how you can view data from someone’s Facebook account with the help of the app:

  1. Go to mSpy.comand sign up.
  2. Select and buy a subscription.
  3. Log in to your mailbox and find the installation instructions from mSpy. Follow them to set up the app.
  4. Sign in to your mSpy account and link the target device.
  5. Give the app a few minutes and start monitoring the target person’s Facebook.

How to use facebook’s search to find anyone or anything

2. Hacking into Facebook Account Using the Manual Method

Hacking Facebook manually is a perfect solution for those who don’t want to soil their hands and sweat buckets while figuring things out. Here is how you can access a Facebook account:

  1. Get the email address of the target person used to sign up with Facebook.
  2. Open their login page and click Forgot password. Tap on the popup for more prompts to take further action.
  3. Facebook will ask you to give your recovery email address to send a link for a password reset. Since you might not have access to the email address, you will need to click No longer have access to these?.
  4. Next, the browser will ask you to provide an alternative email address. You need to provide an email address that isn’t tied to the Facebook account you want to monitor.
  5. You will be asked a few questions to prove that you own the account tied to the password you are trying to reset. If you know the target user close enough, it will be easier to guess the correct answers.
  6. If you fail in the previous stage, you can use your friends to help you reset the password. In this case, you will select three friends and create fake Facebook accounts in their names. It will be easy to evade the previous roadblock because Facebook will contact those “friends” for confirmation.
  7. After succeeding with the earlier stages, you will get an email notification sent to the alternative email address you gave. From there, you may reset the password and access the account you want to monitor.

3. Using keylogging software

How to use facebook’s search to find anyone or anything

Using a keylogger is another straightforward method to hack Facebook account of another person. A keylogger is used to record keystrokes on another person’s cell phone, making it possible to intercept their Facebook login credentials.

You need to install the software directly to the user’s device to capture passwords and other credentials. Once the app is set up, it will record and send you everything the user inputs on their cell phone.

To use keyloggers effectively, you need to do the following:

  1. Google for a keylogging softwareand choose the one that suits your needs best.
  2. Go ahead and install the software on the device you want to monitor. Make sure you have activated the app before accessing any keylogging service.
  3. After installing and verifying the application, it is time to sign in to your software’s control panel and view the app harvested passwords. A high-quality app will capture all the passwords the person used on their devices and screenshots of their most recent interactions.

Although you can find numerous free keyloggers online, we recommend that you avoid using them. Free apps are insecure and can corrupt your or the target person’s device. If you want to monitor someone’s Facebook safely, consider paying a couple of bucks for a good app.

4. Matching a Password

This trick depends on the negligence and naivety of Facebook users who use weak and predictable passwords. However, using this method may not be as fruitful because it is based solely on luck and someone’s ignorance.

People often use dates and names of the highest importance to them. So, it would be pretty easy to crack the password when you know enough information about them. This includes things like:

  • year of birth
  • wedding anniversary
  • spouses’ or children’s names
  • mobile phone numbers

5. How to hack Facebook Using Cookies

How to use facebook’s search to find anyone or anything

Cookies are another way of hacking someone’s Facebook Messenger without them knowing. The reason is that cookies help websites store information on a person’s hard drive to retrieve it later. Also, they contain sensitive data because they can track whole browsing sessions.

Therefore, you can sniff and harvest them if you use the same Wi-Fi network as the person you want to monitor. Even though they will not give you access to the person’s password, you can clone them to trick Facebook into believing that the browser is already authenticated.

This way, you will log into the account and continue where they left without suspicion. You can use extension apps and add them to your browsers to store cookies in a tab on the browser’s sidebar.

Our Final Take

Passwords are the official gatekeepers of any Facebook account. Hacking them is illegal and can lead to some unpleasant consequences. If you need to track someone’s conversations on Facebook to protect them from online predators or want to prevent data from leaking, we recommend using an official monitoring app.

With such software as mSpy, you can legally monitor all the information a person gets on their phone, including other messengers, social media apps, calls, and locations. All in all, it’s up to you to make a decision. Just make sure to analyze the pros and cons of the chosen method and prevent yourself from violating someone’s privacy without a dire need.

How to use facebook’s search to find anyone or anything

Even technically sophisticated friends are currently getting “hacked” on Facebook — here’s how to avoid it, and how to make sure your hacked account is fully recovered.

Usually, accounts are “hacked” because someone somehow gets a hold of your password. That’s bad for Facebook in particular, because people often use Facebook to log into other things — so if someone gets into your Facebook account, they have access to a bunch of other things too.

If your account has been hacked

Your account being “hacked” can take many shapes. Perhaps someone is sending messages on your behalf, posting as you or doing something else weird.

If you can still log in, you’re in luck; here’s what to do:

Change your password right away — that’s your first step, if you still have the power to do so. If you can’t log in, request a password reset. If that doesn’t work, it’s possible that someone has changed the email address on the account. There’s a way of dealing with that, too.

Report the weird behavior to Facebook, so they can help stop it happening to others.

Go to your security settings, and see if you recognize everywhere you are logged in. If you don’t recognize a location or a device, press the three-dot menu, and select “not you?”. This will log you out and will help you further secure your account.

How to use facebook’s search to find anyone or anything

Check that you recognize all apps and websites that have access to your Facebook account. Same as above; if there’s something you don’t recognize, hit “remove”.

In your general settings, check the e-mail addresses Facebook has listed for you. If there’s anything there that isn’t yours, remove it.

Change your password one more time, now that you know hackers (in theory) don’t have access to your account anymore. It should be a secure password (with letters, numbers and special characters). Don’t re-use your password from somewhere else. Ideally, use a password manager to ensure that you can keep track of all your different passwords, and use higher-quality passwords in general.

Turn on two-factor authentication. That means that even if your password was somehow stolen, they can’t log in without also having access to your phone or your authenticator app.

And finally, whenever something weird happens to your security and/or social media, change your email password. It’s bad enough to lose access to your social accounts, but your email is the holy grail for hackers, so rotating that password regularly (every 1-3 months) and changing it whenever something strange happens is a very good idea.

How to prevent getting hacked

The most common way that a Facebook account is compromised is by tricking you into giving the hackers your password. You may get a Messenger message from a friend on Facebook, saying something like “OMG did you see who died?” with a link. You click on the link, it looks like Facebook, but suddenly you’re being asked to log in again. You think nothing of it, and you type in your email and password… Uh-oh. Problem: The site that you just gave your password to isn’t actually Facebook, and now they have your password.

The best way to avoid this is to follow the steps above and turn on two-factor authentication. Then be vigilant: Whenever you log in, are you logging into a site that starts with https://www.facebook.com? If not — if it looks like something like ffacebook.com or facebook.this-is-a-security-notification.com — don’t type in your password. The safest thing, typically, is to manually type in Facebook.com into your URL bar if you’re using a web browser.

Remember that the Facebook app has a browser built in. So it’s possible that you are ‘in’ the Facebook app, but it could ask you for a password. It looks legitimate — how could it not be, this is the Facebook app — but use your head; if you’re already in the app, why would it ask you to log in? In short: If it seems weird, it is weird — don’t type in your password!

Check the apps that have access to your Facebook account (see above) semi-regularly. If you recognize an app but you haven’t used it in a while and you don’t think you’ll need it — delete it. You can always add it again later.

How to use facebook’s search to find anyone or anything

How to use facebook’s search to find anyone or anythingHow to use facebook’s search to find anyone or anythingWondering how to find someone on all social networks?

Also looking for hidden profiles?

Perfect! This article will give you 3 options to help.

The smartest social media marketers have a presence on many social sites:

  • Facebook
  • Instagram
  • Twitter
  • LinkedIn
  • Google+
  • Pinterest
  • and the list goes on & on.

But finding someone on each & every one of these social networks takes a lot of effort.

It’s more challenging than just typing a name into a search bar.

Don’t worry — I can help.

How to use facebook’s search to find anyone or anything

How to Find Someone on ALL Social Networks (including Hidden Profiles)

There are actually many services for searching for someone across the internet and social media.

I recommend these 3 options:

1. Social Catfish

Social Catfish does people search and verification for professionals.

The site helps you find lost connections and verify a person’s online identity using images, email addresses, phone numbers and online profiles.

It will provide details like:

  • Profile photo
  • Social accounts like Twitter, Facebook & LinkedIn
  • Angle.co
  • Video
  • Location
  • Contact information

To get started, head to the website and set up an account.

Then do a name search in their search function:

How to use facebook’s search to find anyone or anything

2. PeopleLooker

PeopleLooker is super powerful

To get started just head to their site and search any name:

How to use facebook’s search to find anyone or anything

In just a few minutes, they look up billions of public records.

You have to create an account to access the full report.

Once you do that you can view the report and explore other available records.

3. TruthFinder

TruthFinder goes even deeper than social media accounts.

Just do a people search:

For more information about someone — like viewing contact information, criminal and arrest records, social profiles, possible photographs, and much more — you need to upgrade to a paid TruthFinder membership to view unlimited background reports.

Get started with your people search now by entering a name in the search box

How to turn on https-only mode in mozilla firefox

Starting in Firefox version 83, you can change your preferences to HTTPS-Only Mode. This security enhancing mode forces all connections to websites to use HTTPS. Most websites already support HTTPS; some support both HTTP and HTTPS. Enabling this mode provides a guarantee that all of your connections to websites are upgraded to use HTTPS and hence secure. Learn more about the benefits and how to enable HTTPS-Only Mode.

Table of Contents

HTTP stands for Hypertext Transfer Protocol and is the foundational protocol for the web and encodes basic interactions between browsers and web servers. The problem with the regular HTTP protocol is that the data transferring from server to browser is not encrypted, meaning data can be viewed, stolen, or altered. HTTPS protocols fix this by using an SSL (secure sockets layer) certificate, this creates a secure encrypted connection between the server and the browser which protects sensitive information.

When you use HTTPS-Only Mode, this ensures all of your connections are encrypted and secure. So you have peace of mind that no one can snoop on the content of the pages you visit or hack into your connection to a website to steal your passwords, credit card information, or other personal information. This is especially useful when you are using a public WiFi where you can’t be sure of the integrity of your internet connection.

For example when HTTPS-Only Mode is active and a site is visited such as http://example.com , Firefox will silently upgrade to https://example.com :

Enable/Disable HTTPS-Only Mode

In the Menu bar at the top of the screen, click Firefox and select Preferences . Click the menu button and select Options Preferences . Click the menu button and select Settings .

Some websites only support HTTP and the connection cannot be upgraded. If HTTPS-Only Mode is enabled and a HTTPS version of a site is not available, you will see a “Secure Connection Not Available” page:

How to turn on https-only mode in mozilla firefox

If you click Continue to HTTP Site you accept the risk and then will visit a HTTP version of the site. HTTPS-Only Mode will be turned off temporarily for that site.

Click the Go Back button if you want to avoid any unencrypted connections.

If HTTPS-Only Mode is enabled and you frequently visit a website that does not support HTTPS or does not seem to be rendering certain elements of the page correctly, you can turn off HTTPS-Only Mode for a particular site.

  1. Click on the Lock icon in the address bar.
  2. Use the dropdown under HTTPS-Only Mode and select Off . How to turn on https-only mode in mozilla firefox

If a website isn’t displaying correctly and it’s one you trust and want to visit, you can turn off HTTPS-Only Mode for that site. Exceptions allow you to visit an HTTP version of a website while you’re browsing in HTTPS-Only Mode. Exceptions can be applied temporarily for a single browsing session, or permanently. To add an exception for a website:

In the Menu bar at the top of the screen, click Firefox and select Preferences . Click the menu button and select Options Preferences . Click the menu button and select Settings .

These fine people helped write this article:

How to turn on https-only mode in mozilla firefox

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

How to turn on https-only mode in mozilla firefox

Mozilla Firefox’s HTTPS-only mode provides additional online privacy and security. With it enabled, Firefox will strive to load only encrypted HTTPS websites. If only HTTP is available, Firefox will not load the unencrypted website without prompting you.

Why is HTTPS important?

The secure HTTPS protocol is the fundamental method of maintaining privacy and security on the web. It establishes an encrypted connection between your browser and the web server that prevents third parties from listening to or manipulating the data that is sent between you and the site you are browsing.

Unfortunately, not all sites support HTTPS, and some that do may fall back to unencrypted HTTP versions of a site if you visit them via an HTTP link (such as http://www.example.com instead of https:/ /www.example.com: note the missing ‘s’ in the address).

Starting with , which was released on November 16, 2020, you can enable HTTPS-only mode. Firefox will try to automatically load the HTTPS version of a website even if you visit the site via a link to an unencrypted HTTP address. If one isn’t available, you’ll need to provide explicit permission before Firefox loads an HTTP page. Here’s how to enable this option.

How to enable HTTPS only mode in Firefox

First, open Firefox and click the hamburger button (three horizontal lines) in any Firefox window. From the menu that appears, select “Options” on Windows and Linux or “Preferences” on a Mac.

Tip: If you’re not running Firefox version 83 or higher, you’ll need to update Firefox to use the HTTPS Only Mode feature. To manually check for updates, click the Firefox menu, then select Help > About Firefox. Then click the “Update Firefox” button.

In the “Options” or “Preferences” tab, click on “Privacy and security” in the sidebar menu.

On the “Browser Privacy” preferences page, scroll to the bottom and find the “HTTPS Only Mode” section. Click the radio button next to “Enable HTTPS-only mode on all windows” to select it. (You also have the option to enable HTTPS-only mode on private windows only, so select that if you prefer.)

After that, close the Options tab and the change will take effect immediately. If you visit a website through an unencrypted HTTP link that supports HTTPS, you will be automatically redirected to the encrypted HTTPS version of the site.

What if a site doesn’t support HTTPS?

If you visit a site with HTTPS only mode enabled and the site does not support HTTPS, you will see an error page similar to this.

Also, if you visit a site that is only partially HTTPS secure, that is, it pulls unencrypted elements into the secure page, it may not display correctly with HTTPS-only mode enabled.

In any case, Mozilla has provided a quick way to temporarily disable HTTPS-only mode. To do so, click the lock icon next to the website address in the URL bar.

report this ad

In the menu that appears, click the dropdown below “HTTPS Only Mode” and choose “Temporarily Disable” to temporarily disable HTTPS Only Mode.

Alternatively, if you want to permanently disable HTTPS-only mode for this particular site only, select “Off” from the list. Firefox will remember these settings individually for each website.

After that, you will be able to view the site as usual. If the site is ever upgraded to fully support HTTPS, you can enable HTTPS Only Mode for the site again using the same menu option hidden under the web address block icon. Happy browsing!

Web browsers like Mozilla Firefox and Google Chrome are encouraging websites to move from HTTP to more secure HTTPS connections. Firefox’s HTTPS-only mode is likely to one day become the default option, increasing online privacy and security, and further encouraging website owners to upgrade to HTTPS.

Firefox’s new feature automatically redirects from HTTP to HTTPS and should be considered a must-use for the security-minded. Jack Wallen explains, and shows you how to enable it.

Image: Mozilla

Must-read security coverage

  • Best encryption software 2022
  • The 10 best antivirus products you should consider for your business
  • 8 enterprise password managers and the companies that will love them
  • Security incident response: Critical steps for cyberattack recovery (TechRepublic Premium)

We all use a web browser throughout the day. I probably spend at least seven hours a day within a web browser. Not only am I spending a large portion of my day using a browser, I’m also transmitting important (and sometimes sensitive) data. Because of that, I tend to take the security of my web browsers seriously. That’s why, when Mozilla announced it would include an HTTPS-Only mode in Firefox 83, I did a little happy dance.

For IT pros, this information is quite basic, but it can be a good way to help teach your end-users about the importance of HTTPS. For those that don’t know, HTTPS is the secure version of HTTP. For example, when you visit a website, you either start out by typing http:// or you cut that part out and directly to the URL of the site in question.

When you use HTTP, you transmitting data over the insecure protocol, such that the data is sent over the internet, in unencrypted clear text. What that means is if anyone is snooping on your network activity, with the right tools and knowledge, they can view everything you send. When you use HTTPS, that transmitted data is encrypted, so it’s much harder to view. That’s what you want, by default.

Now, here’s the trick: A website might automatically direct your insecure call to the secure protocol, so HTTP automatically directs to HTTPS. When that happens, you’re good to go.

Unfortunately, not every site makes use of HTTPS auto-redirects. Even though their site might be set up to use HTTPS, it can also function with standard HTTP. When you visit the site with http://, a poorly-coded site won’t automatically send your traffic through the secure protocol. When that happens, you don’t benefit from the added security that HTTPS offers. When you run into such a case, Firefox will warn you with an exclamation point in the address bar. Click on that exclamation point to view the warning (Figure A).

Figure A

How to turn on https-only mode in mozilla firefoxA website that does do HTTPS, but not via auto-redirect.

HTTPS-Only saves the day

Starting with version 83 of Firefox, you can enable a new feature that will automatically default to https://, even when you type http://. The only caveat to this happens when a site doesn’t use the secure HTTPS protocol, at which point you will receive an error (Figure B).

Figure B

How to turn on https-only mode in mozilla firefoxOops! This site doesn’t use HTTPS.

Even though you’ll run into this issue, I consider forcing HTTP to HTTPS a necessary option in today’s world of constant hacks and data breaches. With the new HTTPS-Only option in Firefox, it will:

Always attempt to establish a fully secure connection to every website you visit

If a site doesn’t use HTTPS, Firefox will be unable to connect to the site

It’s the second point that might be a non-starter for some users. If you happen to work with sites that do not use SSL, they won’t work with HTTPS-Only enabled–unless you only enable it for private windows. Of course, if you’re using sites that do not work with SSL, you should contact those sites and ask them why they haven’t joined the 21st century.

How to enable HTTPS-Only

With Firefox 83 or newer (I used Firefox Nightly), this feature is quite easy to enable. Here’s how:

  1. Open Firefox and click the menu button.
  2. Click Settings.
  3. In the left sidebar, click Privacy & Security.
  4. In the resulting window, scroll down to HTTPS-Only Mode.
  5. Click to Enable HTTPS-Only Mode In All Windows (Figure C).

Figure C

How to turn on https-only mode in mozilla firefoxEnabling HTTPS-Only mode for all windows.

You could always enable HTTPS-Only for private windows, but that would require you remembering to use private windows for the majority of your browsing–chances are pretty good you won’t want to do that.

However, in the end, you’ll have to decide if this new feature is worth having to deal with when you have must-use websites that don’t take advantage of HTTPS. If the sites you use can do both HTTP and HTTPS, you are much better off enabling HTTPS-Only on Firefox.

How to turn on https-only mode in mozilla firefox

Cybersecurity Insider Newsletter

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

Mozilla has introduced a new option in the Nightly version of the browser. When enabled, it only allows opening websites over the HTTPS, refusing connections to the plain unencrypted HTTP.

The user can ‘Accept the risk and continue’, or go back and do not proceed to the insecure web site. However, if a website has an HTTPS mirror with resources embedded via HTTP, those resources won’t be loaded silently, without warnings. The page may appear broken.

So, if you are going to try the new feature, you need to get Firefox Nightly. As of now, the Nightly channel of the browser represents Firefox 80.

To Enable or Disable HTTPS-only Mode in Mozilla Firefox,

  1. Open the Firefox browser.
  2. Open the menu ( Alt + F ), and click on Options.How to turn on https-only mode in mozilla firefox
  3. In options, click on Privacy and security.
  4. On the right side, scroll down to the HTTPS-only mode under Security.
  5. Select (dot) Enable HTTPS-only mode in all windows to turn on the feature for all browser windows.
  6. Select (dot) Enable HTTPS-only mode in private windows only to turn on the restriction for the private browsing. Regular windows won’t be affected.
  7. Finally, it is disabled by default in Firefox Nighty 80, and set to Don’t enable HTTPS-only mode

You are done. The feature is currently available in Nighly Firefox version 80. In a few months it should reach the stable version of the Firefox browser.

Mozilla is constantly making improvements for Nightly users. Recently, the company has added a useful Nightly Experiments page, and the ability to clear the Startup cache to resolve the startup issues in Firefox.

Winaero greatly relies on your support. You can help the site keep bringing you interesting and useful content and software by using these options:

If you like this article, please share it using the buttons below. It won’t take a lot from you, but it will help us grow. Thanks for your support!

Author: Sergey Tkachenko

Sergey Tkachenko is a software developer who started Winaero back in 2011. On this blog, Sergey is writing about everything connected to Microsoft, Windows and popular software. Follow him on Telegram, Twitter, and YouTube. View all posts by Sergey Tkachenko

2 thoughts on “Enable or Disable HTTPS-only Mode in Firefox”

In Firexox 78 you can activate it through advanced preferences “dom.security.https_only_mode” to true.

Take this opportunity to ask if there is something similar in Edge Chromium?

This is causing a problem, and now brings up the warning for every site, including those with https!

Mozilla Firefox’s HTTPS-Only Mode provides extra privacy and security online. With it enabled, Firefox will try hard to only load encrypted HTTPS websites. If only HTTP is available, Firefox won’t load the unencrypted website without asking you.

Why Is HTTPS Important?

The secure protocol HTTPS is the bedrock method of maintaining privacy and security on the web. It sets up an encrypted connection between your browser and the web server that prevents third parties from eavesdropping on or tampering with the data being sent between you and the site you’re browsing.

Unfortunately, not all sites support HTTPS, and some that do may fall back to non-encrypted HTTP versions of a site if you visit them through an HTTP link (such as http://www.example.com instead of https://www.example.com—notice the missing “s” in the address).

Starting in Mozilla Firefox version 83, which was released on November 16, 2020, you can turn on HTTPS-Only Mode. Firefox will automatically attempt to load the HTTPS version of a website even if you visit the site through a link to an unencrypted HTTP address. If one isn’t available, you’ll have to provide explicit permission before Firefox will load an HTTP page. Here’s how to enable this option.

RELATED: What Is HTTPS, and Why Should I Care?

How to Enable HTTPS-Only Mode in Firefox

First, open Firefox and click the hamburger button (three horizontal lines) in any Firefox window. In the menu that pops up, select “Options” on Windows and Linux or “Preferences” on a Mac.

Tip: If you’re not running Firefox version 83 or higher, you’ll need to update Firefox to use the HTTPS-Only Mode feature. To check for updates manually, click the Firefox menu, then select Help > About Firefox. Then click the “Update Firefox” button.

RELATED: How to Update Mozilla Firefox

In the “Options” or “Preferences” tab, click “Privacy & Security” in the sidebar menu.

On the “Browser Privacy” preferences page, scroll down to the bottom and locate the “HTTPS-Only Mode” section. Click the radio button beside “Enable HTTPS-Only Mode in all windows” to select it. (You also have the choice to enable HTTPS-Only Mode in private windows only, so select that instead if you prefer.)

After that, close the Options tab, and the change will take effect immediately. If you visit a website through a non-encrypted HTTP link that supports HTTPS, you will be redirected to the encrypted HTTPS version of the site automatically.

What Happens If a Site Doesn’t Support HTTPS?

If you visit a site with HTTPS-Only Mode turned on and the site does not support HTTPS, you will see an error page similar to this one.

Also, if you visit a site that is only partially HTTPS-secure—that is, it pulls non-encrypted elements into the secure page—it may not display properly with HTTPS-Only Mode enabled.

In either case, Mozilla has provided a quick way to temporarily disable HTTPS-Only Mode. To do so, click the lock icon beside the website address in the URL bar.

In the menu that pops up, click the drop-down menu below “HTTPS-Only Mode” and choose “Off temporarily” to temporarily disable HTTPS-Only Mode.

Alternately, if you’d like to permanently disable HTTPS-Only Mode just for this particular site, select “Off” from the list. Firefox will remember these settings individually for each website.

After that, you’ll be able to see the site as usual. If the site ever upgrades to support HTTPS fully, you can enable HTTPS-Only Mode for the site again using the same menu option hidden under the web address lock icon. Happy browsing!

Web browsers like Mozilla Firefox and Google Chrome are encouraging websites to move away from HTTP to more secure HTTPS connections. It’s likely that Firefox’s HTTPS-Only Mode will one day become the default option, boosting privacy and security online—and further encouraging website owners to upgrade to HTTPS.

Начиная с Firefox версии 83, вы можете изменить свои предпочтения на режим Только HTTPS. Этот режим повышения безопасности заставляет все подключения к веб-сайтам использовать HTTPS. Большинство веб-сайтов уже поддерживают HTTPS; некоторые поддерживают как HTTP, так и HTTPS. Включение этого режима гарантирует, что все ваши подключения к веб-сайтам будут обновлены для использования HTTPS и, следовательно, безопасны. Узнайте больше о преимуществах и о том, как включить режим Только HTTPS.

Оглавление

HTTP означает протокол передачи гипертекста и является основополагающим протоколом для Интернета и кодирует базовые взаимодействия между браузерами и веб-серверами. Проблема с обычным протоколом HTTP заключается в том, что данные, передаваемые с сервера в браузер, не зашифрованы, что означает, что данные можно просматривать, украсть или изменить. Протоколы HTTPS исправляют это с помощью сертификата SSL (уровня защищенных сокетов), который создает безопасное зашифрованное соединение между сервером и браузером, которое защищает конфиденциальную информацию.

Когда вы используете режим Только HTTPS, это обеспечивает шифрование и безопасность всех ваших подключений. Таким образом, вы можете быть уверены в том, что никто не может отслеживать содержимое посещаемых вами страниц или взламывать ваше соединение с веб-сайтом, чтобы украсть ваши пароли, данные кредитной карты или другую личную информацию. Это особенно полезно, когда вы используете общедоступный Wi-Fi и не можете быть уверены в целостности вашего Интернет-соединения.

Например, если режим Только HTTPS активен, и сайт набран как http://example.com , Firefox незаметно обновит адрес до https://example.com :

Включение/Отключение режима Только HTTPS

На Панели меню в верхней части экрана щёлкните Firefox и выберите Настройки . Нажмите кнопку и выберите Настройки . Нажмите кнопку и выберите Настройки .

Некоторые веб-сайты поддерживают только HTTP, и соединение не может быть обновлено. Если Режим Только HTTPS включен и HTTPS-версия сайта недоступна, вы увидите страницу “Безопасное соединение недоступно”:

How to turn on https-only mode in mozilla firefox

Если вы нажмёте кнопку Продолжить с HTTP сайтом , вы принимаете на себя риск и затем посетите HTTP-версию сайта. Для этого сайта режим Только HTTPS будет временно отключен.

Щёлкните по кнопке Назад , если вы хотите избежать любых незашифрованных соединений.

Если Режим Только HTTPS включен и вы часто посещаете веб-сайт, который не поддерживает HTTPS, или веб-сайт, похоже, неправильно отображает определённые элементы страницы, вы можете отключить режим Только HTTPS для определённого сайта.

  1. Щёлкните по значку Замка в адресной строке.
  2. Используйте выпадающее меню в разделе Режим Только HTTPS и выберите Выключить . How to turn on https-only mode in mozilla firefox

Если веб-сайт не отображается корректно и вы ему доверяете и хотите посетить, вы можете отключить режим Только HTTPS для этого сайта. Исключения позволяют вам посещать HTTP-версию веб-сайта, когда вы осуществляете просмотр в режиме Только HTTPS. Исключения могут быть применены временно, для единственной сессии просмотра, или постоянно. Чтобы добавить исключение для веб-сайта:

На Панели меню в верхней части экрана щёлкните Firefox и выберите Настройки . Нажмите кнопку и выберите Настройки . Нажмите кнопку и выберите Настройки .

These fine people helped write this article:

How to turn on https-only mode in mozilla firefox

Volunteer

Grow and share your expertise with others. Answer questions and improve our knowledge base.

This article will help you in enabling HTTPS only mode in Mozilla Firefox web browser to improve security.

Now-a-days most of the websites use HTTPS secure protocol to improve the connection security. You may have seen HTTP:// and HTTPS:// in the beginning of website URLs which specifies whether a website is using HTTP (old unsafe protocol) or HTTPS (secure protocol) for the connection to the server.

It’s always advised to check for the HTTPS protocol if you are opening banking or other organization websites as the HTTPS connections are encrypted and provide better security.

Still there are some websites which are not using the secure connection protocol and they still use old HTTP protocol for the connection. To overcome this issue, there are many 3rd party extensions available such as HTTPS Everywhere which automatically and forcefully enable HTTPS encryption for websites.

Now newer versions of Mozilla Firefox (version 76.0 and later) come with a hidden secret built-in feature known as “HTTPS Only Mode” which works similar to these extensions.

“HTTPS Only Mode” forces Firefox to open websites using the secure HTTPS protocol even if a website was designed to use old HTTP protocol. If the website supports HTTPS protocol, it’ll be upgraded to open using HTTPS protocol. If a website doesn’t support HTTPS protocol, the website will not load and you’ll receive error message.

How to turn on https-only mode in mozilla firefox

This new feature is very useful for users who regularly do online transactions and other similar activities.

“HTTPS Only Mode” is disabled by default and interested users need to manually activate and enable it using a hidden preference/flag.

UPDATE: Newer versions of Firefox (version 83.0 and later) come with a direct UI option in Firefox Preferences window to enable/disable this new HTTPS-Only mode. Check out following article for details:

If you also want to enable HTTPS only mode in Mozilla Firefox web browser, following steps will help you:

1. Open Mozilla Firefox and type about:config in the addressbar and press Enter. It’ll show you a warning message, click on “Accept the Risk and Continue” button. It’ll open Firefox’s hidden secret advanced configuration page i.e. about:config page.

2. Now type https_only_mode in Search filter box and look for following preference in the window:

The preference value is set to false by default, which means the HTTPS Only Mode is deactivated and disabled in Firefox.

3. To manually activate and enable HTTPS only mode feature, double-click on dom.security.https_only_mode preference and set it to true. Alternatively, you can click on the Toggle icon given next to the preference name.

That’s it. Now try to open any known website which was using HTTP protocol for the connection, now it’ll be upgraded to HTTPS protocol automatically.

You are here: Home » Mozilla Firefox » [Tip] Enable Hidden Secret HTTPS Only Mode for Websites in Mozilla Firefox

Published in: Mozilla Firefox

About the author: Vishal Gupta (also known as VG) has been awarded with Microsoft MVP (Most Valuable Professional) award. He holds Masters degree in Computer Applications (MCA). He has written several tech articles for popular newspapers and magazines and has also appeared in tech shows on various TV channels.

Comments

NOTE: Older comments have been removed to reduce database overhead.

“HTTPS everywhere” is the recommended add-on for all Firefox and Chromium based browser. I mean it is very helpful for everyone.
This add-on not only helps to open websites in HTTPS but also can encrypt connection by selecting add-on and turn-on encryption mode.
For Pale Moon browser users, use “HTTPS always” download from official Pale Moon add-on page.

How to hide or remove “Activate Windows” watermark which is appearing in right-down corner of desktop? I will activate Windows later, but currently it is annoying for me, specially in case of watching videos.

^^ As far as I know the only way to remove the watermark is activate Windows. You can check following articles:

When choosing one web browser or another, we take into account a multitude of aspects. These can be related to both the functionality and the security or the interface of the program itself. Considering that we have a good number of proposals to choose from, this is easier than ever.

With all this and with this, most users increasingly take into consideration everything related to privacy and security in this type of program. The developers of these are fully aware of all this, which is why more and more solutions of this type are available to us. In this way, the functionalities related to taking care of our privacy and security are increasing.

These come to us as a rule through new updates that are sent periodically to our teams. At the same time, these programs, which serve as a way to connect us to the Internet, have to adapt to the latest trends and technologies on the Internet. And that is precisely what we are going to talk about next, focusing on the browser owned by Mozilla, Firefox.

As we mentioned before, the creators of this type of program take into account the preferences of their millions of clients. Hence, they are increasingly careful to take care of the sections that concern them the most.

What is it and why should I enable Firefox HTTPS Only mode

It is precisely for this reason that now we are going to talk about a functionality that has arrived relatively recently in the Firefox browser. This is known as HTTPS Only mode , an element that helps us improve the experience of using the program. In fact, we could say that, with this mode enabled, Firefox takes care of loading only HTTPS websites encrypted in advance.

To give you an idea, in the event that we activate this functionality , the program will not load an unencrypted website without asking us first. In this way, we largely avoid accessing potentially dangerous websites. Specifically, the secure HTTPS protocol is a very important method to maintain privacy and security on the web. It establishes an encrypted connection between the browser and the web server . In this way, what is avoided is that third parties have the possibility of spying on the data that is sent between our local computer and the web that we are visiting.

Another section that we must take into account is that all sites are compatible with HTTPS at the moment. Therefore, some of these make use of unencrypted HTTP versions of a website when we access it, with the risks that this entails in the times. also for all this, the heads of Firefox opted to make the aforementioned Only HTTPS mode available to us.

How to activate this mode to increase security in the browser

It is interesting to know that this mode we are talking about is going to propose three configuration alternatives to choose from. With the active mode the browser itself will try to automatically load the HTTPS version of a website. The interesting thing about all this is that this step occurs even if we connect to the website in question through an unencrypted HTTP link. Thus, in the event that there is no other option, we will have to give an explicit permission before Firefox loads an HTTP page .

Enable HTTPS Only mode

Well, once we are clear about what this new implemented functionality is about, let’s see how we can make it work in Mozilla’s browser. The first thing we do is go to the main menu of the program. This is found in a button located in the upper right corner of the main window and is represented by three horizontal lines. Now we just have to click on it to click on the option called Settings. This will lead us to the configuration window of the browser itself.

In it, specifically in the left panel we see a category called Privacy & Security, where we are located. Here we are going to find a good number of configurable and customizable parameters related to these two important aspects of the program. All this will allow us to determine the level of security that we want to do and use in Firefox. At that moment, in the right panel, we scroll down the screen to locate the section called HTTPS-only mode.

It is worth mentioning that by default the program has this functionality disabled. In this way, if we want to benefit from the aforementioned, we will have to activate it ourselves by hand. At this point we only have to opt for one of the two options that allow us to activate this mode that we are talking about.

Configure security feature in Mozilla browser

While the HTTPS Only mode is disabled by default, when activating it we find two options. The first one refers to activating this function for all the windows of the program. However, at the same time we have the possibility that it only starts when we navigate through a private window. It is very likely that most of the time, since we are opting for the first option .

With everything and with it, we have the possibility of using all this that we tell you only when we are browsing in private mode. And there are many users who opt for these windows when they are going to move through certain internet web pages . So this functionality is nothing more than an added plus to improve this section. Regardless of the option we have chosen, we also have the possibility of managing a series of exceptions in the function.

With this, what we want to tell you is that we have the possibility of indicating to Firefox a series of web pages in which we do not want this mode to start working. This is usually used in certain somewhat special websites that we know in advance are safe even using HTTP . As we can see and in a simple way, thanks to this mode implemented by Mozilla, we can increase security when using our browser in a few seconds. In the event that it becomes more of a nuisance than a positive measure, we can always deactivate it again if we wish.

As the modern web continues to evolve, one fortunate trend we have witnessed is the widespread adoption of the HTTPS protocol. That necessarily wasn’t the case a few years back when most websites were not enforcing HTTPS by default. Earlier, we had to rely on browser extensions like HTTPS Everywhere to make sure we are browsing websites securely. But now, with HTTPS Everywhere entering maintenance mode next year, this article will teach you how to enable HTTPS-only mode in popular desktop web browsers, including Chrome, Firefox, and Edge.

Enable HTTPS-Only Mode in Your Browser (2021)

Enable HTTPS-Only Mode in Google Chrome

  1. Open Google Chrome, click on the vertical three dots menu at the top right, and choose Settings from the list of options that appear.

How to turn on https-only mode in mozilla firefox

2. Switch to the ‘Privacy and security‘ tab from the left sidebar and click on ‘Security’ on the right panel.

How to turn on https-only mode in mozilla firefox

3. Then, scroll down until you find Advanced settings and enable the ‘Always use secure connections’ toggle. This way, Chrome will try redirecting all websites you visit to HTTPS. This toggle is available on Chrome 94 and newer versions.

How to turn on https-only mode in mozilla firefox

4. If you are on an older version of Chrome, you can enable HTTPS-only mode through a Chrome flag. Visit chrome://flags, enable the ‘HTTPS-First Mode Setting’ flag and restart the browser. You can also directly access the flag by pasting the following URL to Chrome’s address bar.

How to turn on https-only mode in mozilla firefox

5. After enabling HTTPS-only mode, you will see a warning similar to the image below when you visit unsecure HTTP websites. If you trust the website and would like to visit it anyway, click on ‘Continue to site’. Clicking the ‘Go back’ button will take you to the previous page.

How to turn on https-only mode in mozilla firefox

Activate HTTPS-Only Mode in Firefox

1. If you are a Firefox user, you should first click on the hamburger menu at the top-right corner and choose ‘Settings’ to view Firefox Settings.

How to turn on https-only mode in mozilla firefox

2. Under the Privacy & Security section, look for ‘HTTPS-Only Mode’. Once you’re there, select the ‘Enable HTTPS-Only Mode in all windows’ toggle.

How to turn on https-only mode in mozilla firefox

3. You even have the option to set exceptions for specific websites. Click on ‘Manage Exceptions…’ and add the URLs to the allowlist and hit the ‘Save Changes’ button to confirm the list of websites you would like to browse in HTTP.

How to turn on https-only mode in mozilla firefox

4. If you don’t want to manually add exceptions, you can always click on the ‘Continue to HTTP Site’ button to access the HTTP webpage from a trusted source.

How to turn on https-only mode in mozilla firefox

Set up HTTPS-Only Mode in Microsoft Edge

Microsoft Edge’s HTTPS-only mode is not widely available just yet. Instead, it is hidden behind an Edge flag, and we will show you how to access the feature right away in this tutorial.

1. First, visit edge://flags, enable ‘Automatic HTTPS’, and restart the browser.

How to turn on https-only mode in mozilla firefox

2. After enabling the flag, click on the horizontal three dots menu and move to visit Edge’s Settings page.

How to turn on https-only mode in mozilla firefox

3. Switch to the ‘Privacy, search, and services’ section from the left sidebar and enable the ‘Automatically switch to more secure connections with Automatic HTTPS’ option. In addition, choose ‘Always switch from HTTP to HTTPS (connection errors might occur more often)’ toggle.

How to turn on https-only mode in mozilla firefox

4. Now, when you see a connection error for an HTTP website, you can choose to click on the direct HTTP link to access the page. Otherwise, Microsoft’s native browser will load secure HTTPS websites moving forward.

How to turn on https-only mode in mozilla firefox

Switch on HTTPS-Only Mode in Safari

Unlike Chrome, Edge, and Firefox, Safari doesn’t have an HTTPS-only mode. However, what it does have is the ability to automatically switch sites from HTTP to HTTPS if available. The feature is enabled by default with Safari 15 on macOS Monterey, macOS Big Sur, and macOS Catalina.

Browse Securely with HTTPS-Only Mode in Your Favorite Web Browser

Although most websites have shifted to the HTTPS protocol in 2021, some websites continue to stay in the past with HTTP. If visiting such websites isn’t something you do often, we hope this tutorial helped you enable HTTPS-only mode in your favorite web browser. To further enhance your privacy, you could consider using a VPN service. Have any doubts or queries about the topic? Let us know in the comments section.

A step by step guide to enable DNS-over-HTTPS (DoH) support in the Firefox browser.

Catalin Cimpanu was a security reporter for ZDNet between Sep 2018 and Feb 2021.

The DNS-over-HTTPS (DoH) protocol is currently the talk of the town, and the Firefox browser is the only one to support it.

However, the feature is not enabled by default for Firefox users, who will have to go through many hoops and modify multiple settings before they can get the DoH up and running.

But before we go into a step-by-step tutorial on how someone can enable DoH support in Firefox, let’s describe what it does first.

How DNS-over-HTTPS works

The DNS-over-HTTPS protocol works by taking a domain name that a user has typed in their browser and sending a query to a DNS server to learn the numerical IP address of the web server that hosts that specific site.

This is how normal DNS works, too. However, DoH takes the DNS query and sends it to a DoH-compatible DNS server (resolver) via an encrypted HTTPS connection on port 443, rather than plaintext on port 53.

This way, DoH hides DNS queries inside regular HTTPS traffic, so third-party observers won’t be able to sniff traffic and tell what DNS queries users have run and infer what websites they are about to access.

Further, a secondary feature of DNS-over-HTTPS is that the protocol works at the app level. Apps can come with internally hardcoded lists of DoH-compatible DNS resolvers where they can send DoH queries.

This mode of operation bypasses the default DNS settings that exist at the OS level, which, in most cases are the ones set by local internet service providers (ISPs).

This also means that apps that support DoH can effectively bypass local ISPs traffic filters and access content that may be blocked by a local telco or local government — and a reason why DoH is currently hailed as a boon for users’ privacy and security.

This is one of the reasons that DoH has gained quite the popularity in less than two years after it launched, and a reason why a group of UK ISPs nominated Mozilla for the award of 2019 Internet Vilain for its plans to support the DoH protocol, which they said would thwart their efforts in filtering bad traffic.

The below step-by-step guide will show Firefox users in the UK and Firefox users all over the world how to enable the feature right now, and not wait until Mozilla enables it later down the road — if it will ever do. There are two methods of enabling DoH support in Firefox.

Method 1 – via the Firefox settings

Step 1: Go to the Firefox menu, choose Tools, and then Preferences. Optionally type about:preferences in the URL bar and press enter. This will open the Firefox prerences section.

Step 2: In the General section, scroll down to the Network Settings panel, and press the Settings button.

How to turn on https-only mode in mozilla firefox

Step 3: In the popup, scroll down and select “Enable DNS over HTTPS,” then configure your desired DoH resolver. You can use the built in Cloudflare resolver (a company with which Mozilla has reached an agreement to log less data about Firefox users), or use one of your choice, from this list.

How to turn on https-only mode in mozilla firefox

Method 2 – via about:config

Step 1: Type about:config in the URL bar and press Enter to access Firefox’s hidden configuration panel. Here users will need to enable and modify three settings.

Step 2: The first setting is network.trr.mode. This turns on DoH support. This setting supports four values:

  • 0 – Default value in standard Firefox installations (currently is 5, which means DoH is disabled)
  • 1 – DoH is enabled, but Firefox picks if it uses DoH or regular DNS based on which returns faster query responses
  • 2 – DoH is enabled, and regular DNS works as a backup
  • 3 – DoH is enabled, and regular DNS is disabled
  • 5 – DoH is disabled

A value of 2 works best.

How to turn on https-only mode in mozilla firefox

Step 3: The second setting that needs to be modified is network.trr.uri. This is the URL of the DoH-compatible DNS server where Firefox will send DoH DNS queries. By default, Firefox uses Cloudflare’s DoH service located at https://mozilla.cloudflare-dns.com/dns-query. However, users can use their own DoH server URL. They can select one from the many available servers, from this list, here. The reason why Mozilla uses Cloudflare in Firefox is because the companies reached an agreement following which Cloudflare would collect very little data on DoH queries coming from Firefox users.

How to turn on https-only mode in mozilla firefox

Step 4: The third setting is optional and you can skip this one. But if things don’t work, you can use this one as a backup for Step 3. The option is called network.trr.bootstrapAddress and is an input field where users can enter the numerical IP address of the DoH-compatible DNS resolver they entered in Step 3. For Cloudflare, that would be 1.1.1.1. For Google’s service, that would be 8.8.8.8. If you used another DoH resolver’s URL, you’ll need to track down that server’s IP and enter it here, if ever necesarry.

How to turn on https-only mode in mozilla firefox

Normally, the URL entered in Step 3 should be enough, though.

Settings should apply right away, but in case they don’t work, give Firefox a restart.

How to turn on https-only mode in mozilla firefox

Mozilla Firefox 76 is getting a new ‘HTTPS Only’ mode that automatically upgrades all HTTP requests to HTTPS when browsing the web and blocks all connections that can’t be upgraded.

When connecting to an HTTP site, your connection is not encrypted and your ISP and programs running on the computer can monitor the data being sent over it. This includes your passwords, credit card info, and other sensitive information.

Due to this, it is always recommended that you only use HTTPS sites, which encrypt the connection between the browser and the web site.

While most web sites are now using HTTPS, some continue to only use the HTTP protocol and Mozilla is adding a new feature that will automatically upgrade your connection to HTTPS or block you from visiting the site.

Mozilla’s ‘HTTPS Only’ mode

Similar to the HTTPS Everywhere addon, when Firefox’s HTTPS Only feature is enabled the browser will automatically change any HTTP requests to HTTPS and if unable to connect will display an alert asking if you wish to continue connecting via HTTP.

Being developed for Firefox 76, this feature will not be enabled by default and will also attempt to upgrade subresources like CSS files, scripts, and images to HTTPS and if unable to do so, quietly block them from loading.

Currently, if a Firefox user types foo.com in the address bar then our internal machinery establishes an HTTP connection to foo.com. Within this project we will expose a preference which allows end users to opt into an ‘HTTPS Only’ mode which tries to establish an HTTPS connection rather than an HTTP connection for foo.com. Further, we will upgrade all subresources within the page to load using https instead of http.

  • For top-level loads which encounter a time-out we could provide some kind of error page with a button which would allow the end user to load the requested page using http.
  • For subsource loads we could fail silently and just log some info to the console.

This feature is currently available in the Firefox 76 Nightly builds and can be enabled by toggling the ‘dom.security.https_only_mode’ setting to ‘True’ in about:config.

dom.security.https_only_mode flag

Once enabled, if you go to an HTTP site, Firefox will automatically change it to an HTTPS connection. If unable to connect via HTTPS, it will display an alert as shown below.

Warning about an HTTP connection

This alert warns that continuing to the HTTP site is a “Potential Security Risk” and recommends that you do not continue. If you choose to continue, the ‘HTTPS Only’ mode will be disabled for the site.

This is an interesting feature and one that many would enable by default as it only increases the security of the websites you visit with the minor inconvenience of an alert here and there as you browse to insecure web sites.

I found the option to enable DNS over HTTPS for Firefox on the desktop but I can’t find it on the Android version of the browser. Is it supported? How do I enable it?

3 Answers 3

I try to complete Dale answer

Open Firefox and type: about:config

filter with: network.trr.* and set the following values:

network.trr.mode value 3

network.trr.bootstrapAddress and set value as one ip from this page (mine value is currently 104.16.249.249 )

now open a new tab to this page used to verify if everything is working. You should have all green except sni . To make all green you should

switch tab and go back to config page

change filter with: network.security.* and set:

network.security.esni.enabled value true

go back to previous tab and refresh. You should have all green.

Although I have not been able to prove it’s really changing the routing of DNS queries, I have changed the settings on Firefox for Android: network.trr.mode to 2 (fail-over enabled) or 3 (fail-over not enabled) and network.trr.uri to 1.1.1.1 (Cloudflare) or 8.8.8.8 (Google) or 9.9.9.9 (Quad9). This came from this Mozilla page (not specific to Android Firefox). So you type about:config in the address bar, then search for and change the network.trr* settings.

But as mentioned by Irfan, you can have all your DNS go to cloudflare by using their 1.1.1.1 app, or if you’re on the Android Pie, you can go to Settings > Network & Internet > Private DNS and select Automatic (I’m sure that’s GOT to be Google’s 9.9.9.9) or Private DNS provider hostname with 1dot1dot1dot1.cloudflare-dns.com , for instance (credit to this page on TechRepublic).

Things have changed since the time most of the answers were written so here’s an updated version:

  • The previous TRR (Trusted recursive resolver ) only encrypted the SNI(server name indication) which proved to be insufficient in masking your DNS queries. It has been shown that DNS queries , especially the SNI can still be leaked. So a new draft has been proposed which suggest to encrypt the entire ‘Client Hello’ message. This new draft (initially called draft 8) has been now referred to as ECH (encrypted client Hello). And it still under development, no browser have yet released it for production. This upgraded version would require all DNS servers to implement it for it to work properly. And as of date not many (I think none) have it working. Meanwhile firefox had removed Encrypt SNI since version 85. It would replaced by ECH in near future.

Though one can still enable DoH (DNS over HTTPS) or TRR(Trusted Recursive Resolver ) as Mozilla calls it.

From the firefox nightly version, go to about:config

then turn network.trr.mode to 2 or 3 depending on whether you want to fail the request if TRR fails to resolve the address or use a fallback default (your ISP) as your resolver.

firefox has cloudflare’s 1.1.1.1 set as the default TRR so you don’t have to change anything else.

In the absence of Encrypted SNI, it won’t be as secure but still be able to access some DNS blocked sites because most of the ISP’s still don’t have the means to find out. Some ISP that have advanced DPI( deep packet inspection) means would be able to detect it though

Mozilla has announced the release of Firefox 83, an update that introduces support for HTTPS-Only Mode. And, wait for it: pinch-to-zoom.

HTTPS-Only Mode will attempt to establish a secure connection to the website you’re visiting. That means if you click on an HTTP link or you manually enter an HTTP address, Firefox 83 will attempt to visit the site using HTTPS instead. If a secure connection can’t be established, Firefox will ask for your permission before connecting to the website.

Firefox noted that most major websites today support the HTTPS protocol, which offers better encryption between your browser and the website you’re visiting. But there are some websites out there that are still using the HTTP protocol. There are also millions of legacy HTTP links, so HTTPS-Only Mode in Firefox 83 aims to provide users with a more secure connection.

Firefox said that there may also be the rare instance when a website is available over HTTPS but includes resources within the website that aren’t available over HTTPS. As a result, some websites may not look right or will malfunction altogether. If this happens, users can easily disable HTTPS-Only Mode by clicking on the lock icon in the address bar.

Firefox 83 also includes pinch-zooming support on Windows and Mac. If you’re on a Windows device with a touchscreen, you can easily pinch-to-zoom on websites all you want. The same goes with touchpads on Mac devices. It’s a feature that’s been available in competing browsers for years, but better late than never.

There are several other features included in Firefox 83, including keyboard shortcuts for picture-in-picture mode, support for AcroForm, and support for Apple’s new M1 chips. Firefox 83 has also been pushed out to Android devices with support for several new plugins, including FoxyProxy, Bitwarden, AdGuard AdBlocker, Tomato Clock, LeechBlock NG, Web Archives, and Ghostery.

If you want a more secure browsing experience and you’re a Firefox user, then you should download the latest update now. You can view the full Firefox 83 changelog for desktops below.

In a recent academic publication titled HTTPS-Only: Upgrading all connections to https in Web Browsers (to appear at MadWeb – Measurements, Attacks, and Defenses for the Web) we present a new browser connection model which paves the way to an ‘https-by-default’ web. In this blogpost, we provide technical details about HTTPS-Only Mode’s upgrading mechanism and share data around the success rate of this feature. (Note that links to source code are perma-linked to a recent revision as of this blog post. More recent changes may have changed the location of the code in question.)

Connection Model of HTTPS-Only

The fundamental security problem of the current browser practice of defaulting to use insecure http, instead of secure https, when initially connecting to a website, is that attackers can intercept the initial request to a website. Hijacking the initial request suffices for an attacker to perform a man-in-the-middle attack, which in turn allows the attacker to downgrade the connection, eavesdrop or modify data sent between client and server.

How to turn on https-only mode in mozilla firefox

Left: The current standard behavior of browsers defaulting to http with a server reachable over https; Right: HTTPS-Only behaviour defaulting to https with fallback to http when a server is not reachable over https.

Industry-wide default Connection Model: Current best practice to counter the explained man-in-the-middle security risk primarily relies on HTTP Strict-Transport-Security (HSTS). However, HSTS does not solve the problems associated with performing the initial request in plain http. As illustrated in the above Figure (left), the current browser default is to first connect to foo.com using http (see 1). If the server follows best practice and implements HSTS, then the server responds with a redirect to the secure version of the website (see 2). After the next GET request (see 3) the server adds the HSTS response header (see 4), signalling that the server prefers https connections and the browser should always perform https requests to foo.com (see 5).

HTTPS-Only Connection Model: In contrast and as illustrated in the above Figure (right), the presented HTTPS-Only approach first tries to connect to the web server using https (see 1). Given that most popular websites support https, our upgrading algorithm commonly establishes a secure connection and starts loading content. In a minority of cases, connecting to the server using https fails and the server reports an error (see 2). The proposed HTTPS-Only Mode then prompts the user, explaining the security risk, to either abandon the request or to connect using http (see 3).

Implementation Details of HTTPS-Only

We designed HTTPS-Only Mode following the principle of Secure by Default which means that by default, our approach will upgrade all outgoing connections from http to https. Following this principle allows us to provide a future-proof implementation where exceptions to the rule require explicit annotation by setting the flag HTTPS_ONLY_EXEMPT.

Our proposed security-enhancing feature internally upgrades (a) top-level document loads as well as (b) all subresource loads (images, stylesheets, scripts) within a secure website by rewriting the scheme of a URL from http to https. Internally this upgrading algorithm is realized by consulting the function nsHTTPSOnlyUtils::ShouldUpgradeRequest().

Upgrading a top-level (document) request with HTTPS-Only entails uncertainties about the response that the browser needs to handle. For example, a non-responding firewall or a misconfigured or outdated server that fails to send a response can result in long timeouts. To mitigate this degradation of a users browsing experience, HTTPS-Only first sends a top-level request for https, and after a three second delay, if no response is received, sends an additional http background request by calling the function nsHTTPSOnlyUtils::PotentiallyFireHttpRequestToShortenTimout(). If the background http connection is established prior to the https connection, then this signal is a strong indicator that the https request will result in a timeout. In this case, the https request is canceled and the user is shown the HTTPS-Only Mode exception page.

In addition to comprehensively enforcing https for sub-resources, HTTPS-Only also accounts for WebSockets by consulting the function nsHTTPSOnlyUtils::ShouldUpgradeWebSocket().

Ultimately, HTTPS-Only also needs full integration with two critical browser security mechanisms related to subresource loads: (a) Mixed Content Blocker, and (b) Cross-Origin Resource Sharing (CORS). We adapt both security mechanisms by consulting nsHTTPSOnlyUtils::IsSafeToAcceptCORSOrMixedContent().

Success Rate of HTTPS-Only

The HTTPS-Only approach specifically aims to ensure connections use the secure https protocol, where browsers traditionally would connect using the http protocol. To target this data set, we record information when HTTPS-Only Mode is able to upgrade a connection by rewriting the scheme of a URL from http to https and a load succeeds.

How to turn on https-only mode in mozilla firefox

Attempts to upgrade top-level (document) legacy addresses from http to https via HTTPS-Only (data collected between Nov 17th and Dec. 17th 2020).

As illustrated in the Figure above, the HTTPS-Only mechanism successfully upgrades top-level (document) loads from http to https for more than 73% of legacy addresses. These 73% of successful upgrades originate from the user clicking legacy http links, or entering http (or even scheme-less) URLs in the address-bar, where the target website, fortunately, supports https.

Our observation that HTTPS-Only can successfully upgrade seven out of ten of top-level loads from http to https reflects a general migration of websites supporting https. At the same time, this fraction of successful upgrades of legacy addresses also confirms that web pages still contain a multitude of http-based URLs where browsers would traditionally establish an insecure connection.

How to turn on https-only mode in mozilla firefox

Use of https for top-level (document) loads when HTTPS-Only is enabled (data collected between Nov 17th and Dec. 17th 2020).

As illustrated in the Figure above, our collected information shows that in 92.8% of cases the top-level URL is already https without any need to upgrade. We further see that HTTPS-Only users experienced a successful upgrade from http to https in 3.5% of the loads, such that, overall, 96.3% of page loads are secure. The remaining 3.7% of page loads are insecure, on websites for which the user has explicitly opted to allow insecure connections. Note that the total number of insecure top-level loads observed depends on how many pages a user visited on the website or websites they had exempted from HTTPS-Only.

Going Forward

Providing architectural insights into the security design of a system is crucial for truly working in the open. We hope that sharing technical details and the collected upgrading information allows contributors, hackers, and researchers to verify our claims or even build new research models on top of the provided insights.

UPDATE: The method given in this tutorial to access “Kiosk Mode” works in both Mozilla Firefox and Microsoft Edge web browsers.

This article will help you in learning how to launch Mozilla Firefox and Microsoft Edge web browsers in a hidden secret “Kiosk Mode” and how to exit from Kiosk Mode?

Table of Contents

What is Kiosk Mode?

Kiosk Mode is a hidden secret feature introduced in newer versions of Mozilla Firefox web browser. It allows users to launch Firefox in a very restricted and limited mode best suitable for public areas or customer-facing displays such as libraries, vending machines, etc or for presentations, demonstrations, etc.

When Firefox is launched in Kiosk Mode, following restrictions or limitations are applied:

  • Firefox runs in Full Screen mode and you can’t exit from full screen mode
  • All toolbars, navigation bar, titlebar, menubar, tab bar, bookmarks bar (favorites bar) are removed/disabled, so you can’t access any menus or options
  • Close, minimize and maximize buttons are also removed, so you can’t close Firefox window
  • F11 key doesn’t work to exit from full screen mode
  • If you right-click on a web page, nothing happens, no context menu is shown
  • Status bar is also hidden, so you can’t show website URLs by hovering over hyperlinks

Following screenshot shows Mozilla Firefox running in Kiosk Mode without any toolbar, titlebar, Taskbar, etc:

How to turn on https-only mode in mozilla firefox

Basically Kiosk Mode is a highly restricted mode of Mozilla Firefox browser which only lets users to open a web page, nothing else. You can’t open multiple tabs (Ctrl+T hotkey works to open multiple tabs). You can’t change or customize Firefox options and settings (you can use about:preferences and other similar about URLs to open Firefox Options and other default built-in pages). Kiosk Mode only shows the web page content occupying whole screen area without any browser chrome.

You can consider Kiosk Mode as a single web app mode or digital signage where you can’t interact with Firefox.

How to Open Firefox in Kiosk Mode?

You just need to launch Firefox with –kiosk or -kiosk switch via RUN dialog box or Command Prompt and it’ll open in Kiosk Mode. Make sure no other Firefox windows are running before starting Firefox in Kiosk Mode.

If you want to create a direct shortcut to always launch Firefox web browser in Kiosk Mode, following steps will help you:

1. Create a new shortcut of Firefox, right-click on the new shortcut and select Properties.

2. Now add following text at the end of the string present in Target text box:

–kiosk

Remember there must be a blank space between existing text string and the appended string.

PS: You can also use -kiosk instead of –kiosk parameter.

How to turn on https-only mode in mozilla firefox

3. Click on Apply button and now try to launch Firefox and it’ll open in Kiosk Mode without any UI elements such as toolbars, titlebar, etc.

How to Exit or Close Firefox from Kiosk Mode?

Once you open Firefox in Kiosk Mode, you’ll notice that there is no option provided to exit from Kiosk Mode.

You can press ALT+F4 or CTRL+T keys together to close Firefox running in Kiosk Mode.

You can also press ALT+Spacebar keys together to show titlebar menu at top and then select Close option.

BONUS TIPS:

1. You can also mention a website URL with –kiosk parameter. For example:

–kiosk https://www.microsoft.com/

If you add above mentioned string at the end of Target text box in Firefox’s shortcut properties, it’ll open Microsoft.com website in Firefox using Kiosk Mode.

2. You can also use following string to launch Firefox in kiosk mode along with private browsing mode:

-kiosk -private-window https://www.microsoft.com/

3. All hotkeys such as Ctrl+T, etc work in Kiosk mode. Also you can access Firefox pages such as Options, Add-ons Manager, etc using their URLs such as about:preferences, about:addons, etc.

4. Although Kiosk Mode displays Firefox in full screen, you can still use ALT+Tab hotkey to switch between other running software programs. You can also press WIN key to show Start Menu and select other programs.

You are here: Home » Microsoft Edge » [Tip] How to Use Secret “Kiosk Mode” in Mozilla Firefox and Microsoft Edge Web Browsers

About the author: Vishal Gupta (also known as VG) has been awarded with Microsoft MVP (Most Valuable Professional) award. He holds Masters degree in Computer Applications (MCA). He has written several tech articles for popular newspapers and magazines and has also appeared in tech shows on various TV channels.

Comments

NOTE: Older comments have been removed to reduce database overhead. Be the first one to start the discussion.

DNS over HTTPS is a relatively new feature designed to improve the privacy, security and connection reliability of DNS look-ups; the feature is currently in draft status and tested by companies such as Google, Cloudflare or Mozilla.

DNS resolves play an important part on today’s Internet; domain names that you enter in your browser’s address bar need to be linked to IP addresses, and that is what DNS is used for. These DNS look-ups happen automatically and often without any form of encryption or protection from prying eyes or tampering.

DNS over HTTPS attempts to fix this by sending DNS requests in encrypted form to a compatible DNS server so that these don’t reveal the target of the request anymore to third-parties, e.g. someone on the same network or an Internet Service Provider.

Internet users up until now had options to connect to a non-leaking VPN provider, switch the DNS provider to one that promises better privacy and security, or use DNSCrypt to improve privacy and security.

DNS Over HTTPS in Firefox

DNS Over HTTPS offers another option. Mozilla added the core functionality in Firefox 60 and ran tests in Firefox Nightly to find out how good of a solution the new technology is.

Mozilla started to roll out DNS over HTTPS for Firefox users in the United States in 2019. The service is in fallback mode which means that the browser will first try to use DNS over HTTPS for the query and only if that fails traditional unencrypted DNS to ensure that the query is successful.

Firefox users in the United States will receive a popup notification in the browser when DNS over HTTPS is first enabled. The prompt explains what the feature does and includes an option to disable it.

Note that the feature won’t be enabled if any of the following is found:

  1. Parental controls are used (as these often use DNS filtering).
  2. If the default DNS provider supports malware filtering.
  3. If the device is managed by an organization.

Users who opted in may opt out on about:studies at any time by removing the “DNS over HTTPS US Rollout” study.

Configure DNS over HTTPS manually in Firefox

Firefox users from around the world may configure the browser to use DNS over HTTPS. Type about:support to check the version of Firefox; it if it at least version 60.x, you may configure the feature. Please note that this may lead to connectivity issues (which may be limited by configuring a fallback).

Note: You may use a number of DNS over HTTPS supporting services now. You can check out the latest listing on GitHub. Some examples:

  • Adguard: https://dns.adguard.com/dns-query
  • Cloudflare: https://cloudflare-dns.com/dns-query
  • Google RFC 8484: https://dns.google/dns-query
  • Google JSON API: https://dns.google/resolve
  • Open DNS: https://doh.opendns.com/dns-query
  • Secure DNS EU: https://doh.securedns.eu/dns-query
  • Quad 9: https://dns.quad9.net/dns-query

All current versions of Firefox come with options to enable DNS over HTTPs in the settings. These don’t provide the same level of customization that the advanced configuration offers but it is easier to setup

It is necessary to change three Trusted Recursive Resolver preferences in the browser. Here is how that is done:

  1. Load about:preferences#general in the web browser’s address bar.
  2. Scroll down to the Network Settings section (at the bottom of the page) and activate the Settings button.
  3. Scroll down on that page until you find the “Enable DNS over HTTPS” setting.
  4. Check the box and pick one of the providers (Cloudflare or NextDNS), or pick custom to specify a custom provider (see list above).
  5. Click okay to complete the configuration change.

Firefox users who want more control over DNS over HTTPS may configure additional details in the advanced configuration:

  1. Load about:config in the Firefox address bar.
  2. Confirm that you will be careful if the warning page is displayed.
  3. Search for network.trr.mode and double-click on the name.
    • Set the value to 2 to make DNS Over HTTPS the browser’s first choice but use regular DNS as a fallback. This is the optimal setting for compatibility.
    • Set the value to 3 to only use DNS over HTTPS (no fallback).
    • If you want to set it to off, set the value to 0. Configuration values 1 and 4 are no longer used.
  4. Search for network.trr.uri. Firefox expects a DNS over HTTPS server. Double-click on the name and add the URL of one of the providers listed above.
  5. Search for network.trr.bootstrapAddress and double-click on it. Note that this is no longer required from Firefox 74 onward if mode 3 is being used.
    1. Set the value to 1.1.1.1 (if you use Cloudflare, or look up the IP on the provider’s website or use a DNS query tool to find out)

    Tip: Use the preference network.trr.excluded-domains on about:config to exclude domains from DNS over HTTPS. Edit the value, add domains, and separate them with a comma. See also Mozilla’s help article on configuring networks to disable Dns over HTTPs.

    Note: Mozilla has a special agreement with Cloudflare which limits the logged data and data retention. Cloudflare launched the public DNs service 1.1.1.1 yesterday which supports DNS over HTTPS as well.

    Tip: Check out our Firefox DNS over HTTPS article which lists all available parameters and what they do.

    Closing Words

    The core benefit of DNS over HTTPS is that you limit exposure of your DNS queries. You need to trust the public provider, Cloudflare or Google are the only ones right now. It is likely that other providers will introduce support for it if the feature is integrated into the stable versions of popular web browsers.

    Now You: Have you changed the DNS provider on your devices?

    How to turn on https-only mode in mozilla firefox

    Mozilla Firefox 83 was released today with a new feature called ‘HTTPS-Only Mode’ that secures your browsing sessions by rewriting URLs to secure HTTPS versions.

    Windows, Mac, and Linux desktop users can upgrade to Firefox 83 by going to Options -> Help -> About Firefox. The browser will automatically check for the new update and install it when available.

    How to turn on https-only mode in mozilla firefox

    With the release of Firefox 83, all other Firefox development branches have also moved up a version bringing Firefox Beta to version 84 and the Nightly builds to version 85.

    You can download Firefox 83 from the following links:

    If the links above haven’t yet been updated to download Firefox 83, you can manually download it from Mozilla’s FTP release directory.

    Below you can find the major changes and improvements in Firefox 83 — if you want to read the full release notes, you can do so here.

    Introducing HTTPS-Only mode

    With the release of Firefox 83, Mozilla introduces a new ‘HTTPS-Only mode’ that automatically modifies URLs so that they use a secure HTTPS version.

    If HTTPS-Only mode is enabled, Firefox will rewrite any http:// URLs that you are visiting to their secure https:// equivalent, as illustrated below.

    If Firefox is cannot connect to the rewritten secure URL, it will display a “Secure Connection Not Available” error, which asks if you would like to continue to the insecure site.

    How to turn on https-only mode in mozilla firefox

    Error message when secure URL doesn’t work

    By default, this new feature is disabled in Firefox 83 but can be enabled under Settings > Privacy & Security.

    HTTPS-Only Mode setting

    Zero-day Firefox vulnerability fixed

    Mozilla has also fixed 21 vulnerabilities in Firefox 83, including a zero-day discovered by Google Project Zero.

    In October, Google Project Zero disclosed a zero-day vulnerability in Freetype used in active attacks against Google Chrome. This vulnerability, though, affected any software that utilizes Freetype, including Mozilla Firefox.

    With this release, Mozilla has fixed the “CVE-2020-15999: Heap buffer overflow in freetype” vulnerability in Firefox Linux and Android versions.

    For a complete list of security updates in Firefox 83, you can visit Mozilla’s security advisories.

    Other changes in Firefox 83

    While HTTPS-Only mode is the most significant new feature with this release, it is not the only improvement.

    Below is the change log for Firefox 83:

    Firefox keeps getting faster as a result of significant updates to SpiderMonkey, our JavaScript engine, you will now experience improved page load performance by up to 15%, page responsiveness by up to 12%, and reduced memory usage by up to 8%. We have replaced part of the JavaScript engine that helps to compile and display websites for you, improving security and maintainability of the engine at the same time.

    Pinch zooming will now be supported for our users with Windows touchscreen devices and touchpads on Mac devices. Firefox users may now use pinch to zoom on touch-capable devices to zoom in and out of webpages.

    Picture-in-Picture now supports keyboard shortcuts for fast forwarding and rewinding videos: use the arrow keys to move forward and back 15 seconds, along with volume controls. For a list of supported commands see Support Mozilla

    When you are presenting your screen on a video conference in Firefox, you will see our improved user interface that makes it clearer which devices or displays are being shared.

    We’ve improved functionality and design for a number of Firefox search features:

    • Selecting a search engine at the bottom of the search panel now enters search mode for that engine, allowing you to see suggestions (if available) for your search terms. The old behavior (immediately performing a search) is available with a shift-click.
    • When Firefox autocompletes the URL of one of your search engines, you can now search with that engine directly in the address bar by selecting the shortcut in the address bar results.
    • We’ve added buttons at the bottom of the search panel to allow you to search your bookmarks, open tabs, and history.

    Firefox supports AcroForm, which will allow you to fill in, print, and save supported PDF forms and the PDF viewer also has a new fresh look.

    Our users in India on the English build of Firefox will now see Pocket recommendations in their new tab featuring some of the best stories on the web. If you don’t see them, you can turn on Pocket articles in your new tab by following these steps.

    For the recently released Apple devices built with Apple Silicon CPUs, you can use Firefox 83 and future releases without any change. This release (83) will support emulation under Apple’s Rosetta 2 that ships with macOS Big Sur. We are working toward Firefox being natively-compiled for these CPUs in a future release.

    This is a major release for WebRender as we roll out to more Firefox users on Windows 7 and 8 as well as on macOS 10.12 to 10.15.

    How to turn on https-only mode in mozilla firefox

    Mozilla has started enabling encrypted DNS over HTTPS (DoH) with the latest version of Firefox for users in the US. The company is expected to enable DoH by default to other regions in the future.

    “Today, Firefox began the rollout of encrypted DNS over HTTPS (DoH) by default for US-based users. The rollout will continue over the next few weeks to confirm no major issues are discovered as this new protocol is enabled for Firefox’s US-based users.”, wrote Mozilla in an announcement.

    If you’ve no idea what DoH is, it is Cloudflare’s encrypted DNS service that lets you take control over your privacy. Cloudflare’s DNS neither logs your network activity nor sells it to third parties. You may learn more about DoH in Firefox’s explainer post.

    How to turn on https-only mode in mozilla firefox

    If you’re a Firefox user outside the US, you may enable DoH manually from Settings -> General -> Network Settings. In Network Settings, check the “Enable DNS over HTTPS” checkbox. The default DoH provider of Firefox is Cloudflare and hence, you need not perform any modifications there. However, you could opt for NextDNS in case you face network speed fluctuations with Cloudflare DNS. Credits: Mozilla

    In case you’re using a Chromium-based browser, you could enable DoH by enabling the “Secure DNS lookups” flag from Chrome flags. To ensure that the DoH is functioning as intended, visit this page and check if “Using DNS over HTTPS (DoH)” shows “Yes”.

    In the blog post, Mozilla mentions that the company is planning to bring more privacy-oriented features throughout the year. By enabling DoH by default, Mozilla has taken a huge leap ahead in terms of protecting the privacy of users and it indeed is a welcome move appreciated by privacy enthusiasts across the globe.

    Benj Edwards
    How to turn on https-only mode in mozilla firefoxBenj Edwards
    Associate Editor

    Benj Edwards is an Associate Editor for How-To Geek. For over 15 years, he has written about technology and tech history for sites such as The Atlantic, Fast Company, PCMag, PCWorld, Macworld, Ars Technica, and Wired. In 2005, he created Vintage Computing and Gaming, a blog devoted to tech history. He also created The Culture of Tech podcast and regularly contributes to the Retronauts retrogaming podcast. Read more.

    How to turn on https-only mode in mozilla firefox

    Mozilla Firefox’s HTTPS-Only Mode provides extra privacy and security online. With it enabled, Firefox will try hard to only load encrypted HTTPS websites. If only HTTP is available, Firefox won’t load the unencrypted website without asking you.

    Why Is HTTPS Important?

    The secure protocol HTTPS is the bedrock method of maintaining privacy and security on the web. It sets up an encrypted connection between your browser and the web server that prevents third parties from eavesdropping on or tampering with the data being sent between you and the site you’re browsing.

    Unfortunately, not all sites support HTTPS, and some that do may fall back to non-encrypted HTTP versions of a site if you visit them through an HTTP link (such as http://www.example.com instead of https://www.example.com —notice the missing “s” in the address).

    Starting in Mozilla Firefox version 83, which was released on November 16, 2020, you can turn on HTTPS-Only Mode. Firefox will automatically attempt to load the HTTPS version of a website even if you visit the site through a link to an unencrypted HTTP address. If one isn’t available, you’ll have to provide explicit permission before Firefox will load an HTTP page. Here’s how to enable this option.

    How to Enable HTTPS-Only Mode in Firefox

    First, open Firefox and click the hamburger button (three horizontal lines) in any Firefox window. In the menu that pops up, select “Options” on Windows and Linux or “Preferences” on a Mac.

    How to turn on https-only mode in mozilla firefox

    In the “Options” or “Preferences” tab, click “Privacy & Security” in the sidebar menu.

    How to turn on https-only mode in mozilla firefox

    On the “Browser Privacy” preferences page, scroll down to the bottom and locate the “HTTPS-Only Mode” section. Click the radio button beside “Enable HTTPS-Only Mode in all windows” to select it. (You also have the choice to enable HTTPS-Only Mode in private windows only, so select that instead if you prefer.)

    How to turn on https-only mode in mozilla firefox

    After that, close the Options tab, and the change will take effect immediately. If you visit a website through a non-encrypted HTTP link that supports HTTPS, you will be redirected to the encrypted HTTPS version of the site automatically.

    What Happens If a Site Doesn’t Support HTTPS?

    If you visit a site with HTTPS-Only Mode turned on and the site does not support HTTPS, you will see an error page similar to this one.

    How to turn on https-only mode in mozilla firefox

    Also, if you visit a site that is only partially HTTPS-secure—that is, it pulls non-encrypted elements into the secure page—it may not display properly with HTTPS-Only Mode enabled.

    In either case, Mozilla has provided a quick way to temporarily disable HTTPS-Only Mode. To do so, click the lock icon beside the website address in the URL bar.

    How to turn on https-only mode in mozilla firefox

    In the menu that pops up, click the drop-down menu below “HTTPS-Only Mode” and choose “Off temporarily” to temporarily disable HTTPS-Only Mode.

    How to turn on https-only mode in mozilla firefox

    Alternately, if you’d like to permanently disable HTTPS-Only Mode just for this particular site, select “Off” from the list. Firefox will remember these settings individually for each website.

    After that, you’ll be able to see the site as usual. If the site ever upgrades to support HTTPS fully, you can enable HTTPS-Only Mode for the site again using the same menu option hidden under the web address lock icon. Happy browsing!

    Web browsers like Mozilla Firefox and Google Chrome are encouraging websites to move away from HTTP to more secure HTTPS connections. It’s likely that Firefox’s HTTPS-Only Mode will one day become the default option, boosting privacy and security online—and further encouraging website owners to upgrade to HTTPS.

    • › Do You Still Need a VPN for Public Wi-Fi?
    • › How to Protect Your Wi-Fi From FragAttacks
    • › How to Connect to McDonald’s Free Wi-Fi
    • › The 5 Most Ridiculously Expensive Phones of All Time
    • › Have a Smart Speaker? Use it to Make Your Smoke Alarms Smart
    • › What Does “Touch Grass” Mean?
    • › Sony LinkBuds Review: A Hole New Idea
    • › How to Add Wireless Charging to Any Phone

    How to turn on https-only mode in mozilla firefox Benj Edwards
    Benj Edwards is an Associate Editor for How-To Geek. For over 15 years, he has written about technology and tech history for sites such as The Atlantic, Fast Company, PCMag, PCWorld, Macworld, Ars Technica, and Wired. In 2005, he created Vintage Computing and Gaming, a blog devoted to tech history. He also created The Culture of Tech podcast and regularly contributes to the Retronauts retrogaming podcast.
    Read Full Bio »

    All web browsers now have a privacy feature called private browsing that lets you browse websites without your history being tracked locally on your computer. I’ve already written about how to enable private browsing on IE 11 and Microsoft Edge and in this article we’ll talk about Firefox.

    Note that in Firefox, private browsing works a bit differently than other browsers. In addition to not recording your web browsing history, Firefox also enables tracking protection. This will block parts of sites that try to track your browsing history across multiple sites.

    Ever visit a travel website to do some research on a vacation and then suddenly see ads for that same place while browsing other websites? That’s you being tracked as you browse. Firefox will prevent this when you are in private mode.

    To enable private browsing in Firefox, click on the hamburger icon at the top right and then select New Private Window. You can also just use the CTRL + SHIFT + P keyboard shortcut.

    How to turn on https-only mode in mozilla firefox

    You will be able to tell you are in private mode because of the mask located in the top right of the window.

    How to turn on https-only mode in mozilla firefox

    You’ll also get a new window showing you what is saved and what is not saved while browsing in this mode. As with all private browsing, your activity is not tracked locally in your browser, but your ISP, employer or even software installed on your system can possibly track everything you are doing.

    How to turn on https-only mode in mozilla firefox

    As mentioned earlier, tracking protection is enabled also, but can be turned off. By default, it uses the list provided by Disconnect, which is an online security and privacy product. Firefox uses the standard list, which blocks common advertising trackers, social sharing trackers and analytics trackers.

    If you want even more protection, you can enable the strict protection list, which will block all trackers. The only issue with this is that it might break some sites since it blocks a lot of stuff. You can enable the stricter list by clicking on the hamburger icon, then clicking on Options and then going to Privacy.

    How to turn on https-only mode in mozilla firefox

    Next to Use Tracking Protection in Private Windows, click on the Change Block List button.

    How to turn on https-only mode in mozilla firefox

    Now go ahead and click on the Disconnect.me strict protection list and then click Save Changes. So what exactly does this do? Well, here’s an example of my own website below.

    How to turn on https-only mode in mozilla firefox

    If you open up the web console, you’ll see exactly what resources get blocked. In my case, all the ads from Google are blocked, Kontera, the Google Analytics script, and Google+. Your browsing will definitely be faster and more private using this mode. Obviously, it hurts sites that make their money off ads like mine, but that’s your choice.

    If you need to allow trackers on specific sites, you can click on the little shield icon in the address bar and then click on Disable protection for this session.

    How to turn on https-only mode in mozilla firefox

    Finally, if you want to enable private browsing mode all the time in Firefox, you can do that by going to the same Privacy tab under Options and then choosing Never remember history next to Firefox will: under the History heading.

    How to turn on https-only mode in mozilla firefox

    Choosing this option is the same as private browsing mode. The only difference is that you will not see that purple mask icon in the browser window. Firefox will have to restart in order for the changes to take effect. You can also click on Use custom settings for history and then check the Always use private browsing mode box.

    How to turn on https-only mode in mozilla firefox

    This is exactly the same as choosing Never remember history, so I’m not sure why they have the option here also. I’m guessing it’s more clear to users and therefore they feel safer. Private Browsing mode will also delete all cookies when Firefox is closed. Other data that is not stored include form and search bar entries, passwords, list of downloads, and cached web content (temporary Internet files).

    Overall, Firefox’s implementation of private browsing is really good from a privacy and security perspective and definitely worth using when you need to keep your browsing history private. If you have any questions, feel free to comment. Enjoy!

    Founder of Online Tech Tips and managing editor. He began blogging in 2007 and quit his job in 2010 to blog full-time. He has over 15 years of industry experience in IT and holds several technical certifications. Read Aseem’s Full Bio

    NSS has a “FIPS Mode” that can be enabled when NSS is compiled in a specific way. (Note: Mozilla does not distribute a “FIPS Mode”-ready NSS with Firefox.) This page attempts to provide an informal explanation of what it is, who would use it, and why.

    What’s a FIPS?¶

    The United States government defines many (several hundred) “Federal Information Processing Standard” (FIPS) documents. (FIPS sounds plural, but is singular; one FIPS document is a FIPS, not a FIP.) FIPS documents define rules, regulations, and standards for many aspects of handling of information by computers and by people. They apply to all US government employees and personnel, including soldiers in the armed forces. Generally speaking, any use of a computer by US government personnel must conform to all the relevant FIPS regulations. If you’re a US government worker, and you want to use a Mozilla software product such as Firefox, or any product that uses NSS, you will want to use it in a way that is fully conformant with all the relevant FIPS regulations. Some other governments have also adopted many of the FIPS regulations, so their applicability is somewhat wider than just the US government’s personnel.

    What is “FIPS Mode”?¶

    One of the FIPS regulations, FIPS 140, governs the use of encryption and cryptographic services. It requires that ALL cryptography done by US government personnel MUST be done in “devices” that have been independently tested, and certified by NIST, to meet the extensive requirements of that document. These devices may be hardware or software, but either way, they must function and behave as prescribed. So, in order for Mozilla Firefox and Thunderbird to be usable by people who are subject to the FIPS regulations, Mozilla’s cryptographic software must be able to operate in a mode that is fully compliant with FIPS 140. To that end, Mozilla products can function in a “FIPS Mode”, which is really “FIPS 140 Mode”, when paired with a compliant copy of NSS. (Note, the current version of FIPS 140 is revision 2, a.k.a. FIPS 140-2. FIPS 140-3 is being devised by NIST now for adoption in the future.) Users who are subject to the FIPS regulations must ensure that they have Mozilla’s FIPS Mode enabled when they use Mozilla software, in order to be fully conformant. Instructions for how to configure Firefox into FIPS mode may be found on support.mozilla.com.

    Is NSS FIPS-140 compliant?¶

    Mozilla’s NSS cryptographic software has been tested by government-approved independent testing labs and certified by NIST as being FIPS 140 compliant when operated in FIPS mode on 4 previous occasions. As of this writing, NSS is now being retested to be recertified for the fifth time. NSS was the first open source cryptographic library to be FIPS certified.

    What is FIPS Mode all about? ¶

    A FIPS-140 compliant application must do ALL of its cryptography in a FIPS-140 certified “device”. Whether it is hardware or software, that device will have all the cryptographic engines in it, and also will stores keys and perhaps certificates inside. The device must have a way for users to authenticate to it (to “login” to it), to prove to it that they are authorized to use the cryptographic engines and keys it contains. It may not do ANY cryptographic operations that involve the use of cryptographic keys, nor allow ANY of the keys or certificates it holds to be seen or used, except when a user has successfully authenticated to it. If users authenticate to it with a password, it must ensure that their passwords are strong passwords. It must implement the US government standard algorithms (also specified in other FIPS documents) such as AES, triple-DES, SHA-1 and SHA-256, that are needed to do whatever job the application wants it to perform. It must generate or derive cryptographic keys and store them internally. Except for “public keys”, it must not allow any keys to leave it (to get outside of it) unless they are encrypted (“wrapped”) in a special way. This makes it difficult to move keys from one device to another, and consequently, all crypto engines and key storage must be in a single device rather than being split up into several devices.

    How does this affect Firefox users?¶

    These requirements have several implications for users. In FIPS Mode, every user must have a good strong “master password”, and must enter it each time they start or restart Firefox before they can visit any web sites that use cryptography (https). Firefox can only use the latest version of SSL, known as “TLS”, and not the older SSL 2 or SSL 3.0 protocols, and Firefox can only talk to those servers that use FIPS standard encryption algorithms such as AES or triple-DES. Servers that can only use non-FIPS-approved encryption, such as RC4, cannot be used in FIPS mode.

    How is FIPS Mode different from normal non-FIPS Mode?¶

    In normal non-FIPS Mode, the “master password” is optional and is allowed to be a weak short password. The user is only required to enter his master password to use his own private keys (if he has any) or to access his stored web-site passwords. The user is not required to enter the master password to visit ordinary https servers, nor to view certificates he has previously stored. In non-FIPS mode, NSS is willing and able to use popular non-FIPS approved cryptographic algorithms, such as RC4 and MD5, to communicate with older https servers. NSS divides its operations up into two “devices” rather than just one. One device does all the operations that may be done without needing to authenticate, and the other device stores the user’s certificates and private keys and performs operations that use those private keys.

    Mozilla has released Firefox 83, including up to 15 per cent faster JavaScript and an optional HTTPS-only mode. The company has also found a new home for its Rust-based Servo project, which has been adopted by the Linux Foundation.

    The adoption by Mozilla of a four-week release schedule for Firefox means that some builds are light on few features, but version 83 packs in more than most. Introduced this time round is HTTPS-only mode, off by default. If enabled, navigating to an HTTP site automatically redirects to HTTPS, and if no secure connection is available, a warning comes up with an option to continue. Insecure resources such as images loaded over HTTP are blocked. HTTPS-only can be disabled for specific sites.

    Most traffic on the web is now encrypted. Google reports that between 80 and 98 per cent of pages are loaded over HTTPS in Chrome, with figures varying by platform (Linux is the lowest at 71 per cent). In 2015 it was under 50 per cent.

    How to turn on https-only mode in mozilla firefox

    Firefox 83 promises to ‘upgrade all connections to HTTPS’, though in reality it will block and warn users when only an insecure connection is available

    The increase has been driven in part by the security advantages, in part by Google ranking HTTP sites lower in search results, and in part by the availability of free SSL certificates from Let’s Encrypt. If a site never asks for a login or passwords, does it need to be encrypted? Arguably not, though there is still a risk from spoofing. The case for SSL everywhere has been won.

    The SpiderMonkey JavaScript engine has been updated and Mozilla claims up to 15 per cent improved page load performance and memory usage reduced by up to 8 per cent. Our casual tests suggest that Chrome’s V8 engine outperforms SpiderMonkey on the JavaScript benchmarks we tried, but these may not be accurate predictors of real-world use.

    Pinch to zoom, a much-requested feature, is now supported on Windows touchscreens and touchpads, as well as macOS touchpads. There is also better desktop performance on older versions of Windows, with an optimised WebRender architecture, already available for Windows 10, now coming to Windows 7, Windows 8, and macOS 10.12-15 (but not Big Sur yet).

    Mozilla is moving towards making a native Firefox build for Apple Silicon, the new Arm-based chips for macOS. Version 83 requires Rosetta 2 emulation but a nightly build for ARM64 is available for testing.

    How to turn on https-only mode in mozilla firefox

    Firefox 83 supports conic gradients, a CSS feature for graphical effects

    Developers will find new support for conic gradients in Firefox 83, a CSS feature for graphical effects. Chromium and WebKit-based browsers already have this but support in Firefox will help adoption.

    Servo adopted by Linux Foundation

    There is some good news for fans of Servo, a web browser engine coded in Rust that shares some code with Firefox, including WebRender. At the KubeCon North America virtual event, the Linux Foundation stated that it will host Servo. The future of Servo has been clouded since August, when Mozilla’s headcount was reduced by 250 with layoffs apparently including Servo developers. Servo is designed to be embedded in other applications and runs on Windows, macOS, and Linux.

    We asked about the implications for the funding of Servo development. Chris Aniszczyk, veep of strategic and dev programs at the Linux Foundation, told us: “As part of the move to the Linux Foundation, the Servo project is establishing a funding charter and will be funded by member organisations in the near future, similar to other Linux Foundation efforts.”

    The move means a change in governance for the project, which will now have a board and a technical steering committee (TSC). Currently the TSC has 19 members, at least eight of whom introduced themselves as “ex-Mozilla”. There are some clues about the direction in the initial minutes. What will be the relationship with Firefox? “We share some components that are co-maintained and nothing will change there,” said Manish Goregaokar, ex-Mozilla. What is Servo trying to make? “A browser engine,” said chair Alan Jeffrey, former Mozilla Research Engineer, though not a browser. “I don’t see Servo competing in the same space [as Firefox],” he added.

    Hosting within the Linux Foundation is better news for the Servo project than languishing with little funding at Mozilla. But questions remain about the extent of interest and how long it will take for Servo to become production-ready as an embeddable component. It is good for web standards that the Servo implementation exists, and Rust has advantages for secure coding, but it has formidable competition from Chromium. ®

    The text was updated successfully, but these errors were encountered:

    saschanaz commented Dec 10, 2020

    Duplicate of #14682 and of #12347

    Amejia481 commented Dec 10, 2020

    @saschanaz I think we could close the other ones are they are feature requests, this is an user story issue and it will be used for creating all the UI/UX and engineering tasks 🙂

    kbrosnan commented Dec 10, 2020

    This needs error page work as well. We need to figure out a way to provide the escape hatch button to http. Need to sort out how the error page will work with PWAs. Need to think about how the escape hatch persistence will work with things like private browsing.

    ghost commented Jan 12, 2021

    really needed feature

    julian-alarcon commented Apr 1, 2021

    As bug in Gecko view was already closed, it should be a priority.

    cschanaj commented Apr 15, 2021 •

    EFF has announced that HTTPS Everywhere is expected to reach its EOL by the end of 2021. HTTPS-Only Mode on Fenix could be a preferred alternatives to HTTPS Everywhere EASE mode to enforce HTTPS secure connections only and block HTTP connections on insecure mobile networks. I sincerely hope this feature can be prioritized.

    Amejia481 commented Aug 25, 2021

    @brampitoyo just to let you know that this is something that we want to add UI on Fenix and Focus, could you help us with the designs ? cc @amedyne

    brampitoyo commented Aug 26, 2021

    @Amejia481 @amedyne I would say that Focus should go HTTPS-Only by default, without showing any UI. This way, our users will get automatic browsing security without any hassle.

    But I wonder whether there’s any side effect to this decision? I’d love to hear your feedback.

    I will bring this up in the next UI Catchup meeting with @channingcarter, as well.

    cadeyrn commented Aug 26, 2021

    But I wonder whether there’s any side effect to this decision?

    It’s already on by default in Focus (or Fenix in private mode as well as in the desktop Firefox in private mode) and not having an UI already causes issues in Focus: mozilla-mobile/focus-android#5199

    Amejia481 commented Aug 26, 2021 •

    @brampitoyo as @cadeyrn mentioned Focus and Fenix are already using HTTPS-Only mode (in private browsing) by default without UI and the only side effect that we are experiencing is mozilla-mobile/focus-android#5199 as @cadeyrn mentioned, without the UI users don’t have a way indicate that they want to proceed to navigate to HTTP sites in edge cases like mozilla-mobile/focus-android#5199.

    amedyne commented Aug 26, 2021 •

    @brampitoyo desktop has provided options for users to change the default values. You can refer to them here. We can discuss further what we can do for Focus (and Fenix).

    brampitoyo commented Aug 30, 2021

    @amedyne For Fenix, I think we can safely implement the same UI as desktop: with identical explanation, radio buttons, and exceptions list. (Let’s consult @betsymi at Content Design first, though!)

    Do you know what desktop’s default value is? On Fenix, I feel pretty safe toggling Enable in private windows only to ON, but it’s best to follow desktop’s default value and not risk broken sites.

    As for Focus, it’s clear that this feature should be toggled Enable , and it should only have two radio buttons: Enable and Don’t enable . Focus is always private, and there’s no need for a third radio button.

    What will need more thinking is whether Focus should also ship with an exceptions list. I lean towards a “no”, so Focus stays slim and doesn’t maintain yet another list. If a site doesn’t work properly on a secondary browser like Focus, opening it on a primary browser like Firefox is an option.

    Firefox developers understand web browser security is at a premium, so they’ve started rolling out a new site isolation feature. Jack Wallen shows you how to enable Fission.

    We may be compensated by vendors who appear on this page through methods such as affiliate links or sponsored partnerships. This may influence how and where their products appear on our site, but vendors cannot pay to influence the content of our reviews. For more info, visit our Terms of Use page.

    Must-read security coverage

    • Best encryption software 2022
    • The 10 best antivirus products you should consider for your business
    • 8 enterprise password managers and the companies that will love them
    • Security incident response: Critical steps for cyberattack recovery (TechRepublic Premium)

    The Mozilla developers are doing everything they can to prevent Firefox from fading into the sunset, a browser forgotten and unused. That’s a good thing because Firefox is an important browser that has brought about game-changing features over the years. One thing (at least I hope) the developers are starting to see is that it’s more important to focus on releasing a browser that works reliably, efficiently and securely, rather than one bloated with features no one will use.

    To that end, the Firefox developers have turned to browser security with a new feature, called Fission (also known as Site Isolation), that is long overdue.

    What Site Isolation does is isolate each site into a separate process, which makes it harder for malicious websites to access private information such as passwords, credit card numbers, social security numbers and more, that has been loaded by other sites. With Fission, attackers won’t be able to use exploits (such as Spectre and Meltdown) to collect sensitive data from in-memory content.

    This is an important feature, one that everyone should be using. Although the feature is still in the experimental phase, it can be enabled on all versions of Firefox: Release, Beta and Nightly.

    I’m going to show you how to enable Fission on both the standard and Nightly release of Firefox.

    What you’ll need

    To enable Fission, you’ll need an updated version of your Firefox release of choice.

    How to enable Fission on Firefox

    We’ll first look at the regular release of Firefox. To enable Fission, open Firefox and type about:config. In the resulting window type fission.autostart. When the option appears, double-click False until it says True (Figure A).

    Figure A

    How to turn on https-only mode in mozilla firefoxEnabling Fission on the regular release of Firefox.

    Restart Firefox and Fission is now enabled.

    How to enable Fission on Firefox Nightly

    Now, let’s enable Fission on Firefox Nightly. This is somewhat easier. Open Firefox Nightly and type about:preferences#experimental in the address bar. Scroll down to Fission (Site Isolation) and check the associated box (Figure B).

    Figure B

    How to turn on https-only mode in mozilla firefoxEnabling Fission in Firefox Nightly.

    Restart Firefox Nightly to finish the enabling of Fission.

    Hopefully, the Mozilla developers will make this new feature enabled, by default, for every version of Firefox. The need for browser security is at an all-time high. If Firefox could only add a workspaces feature, I could switch back to the open source browser as my daily driver.

    How to turn on https-only mode in mozilla firefox

    Cybersecurity Insider Newsletter

    Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

    Delivered Tuesdays and Thursdays

    Image: Mozilla

How to use a custom firmware on your router and why you might want to

One of the most frequently asked questions we get is: why don’t you flash TP-Link routers? After all, they’re a very popular budget brand. In short, the answer boils down to performance.

Despite their enticing price, many TP-Link routers are underpowered, meaning they may struggle to handle open-source firmware. Because of this, using custom firmware on TP-Link routers is not the way to go.

Quick Overview

Instead of using underpowered TP-Link hardware, enhance your network with a FlashRouter today!

Best TP-Link ARouter lternatives

And, if you’re looking for the easiest way to set up your VPN, upgrading your wireless network router will help ensure a seamless streaming experience.

How to use a custom firmware on your router and why you might want to

Linksys WRT3200ACM – Great For Large Homes / Perfect For 10-15 Devices / 1.8 GHz Processor / Includes the FlashRouters Privacy App SALE PRICE: $349.99 $399.99 | BUY NOW

How to use a custom firmware on your router and why you might want to

Netgear R6400 – Great For Small Homes / Perfect For 2-6 Devices / DD-WRT Upgraded / Works With All ISPs & Supported VPNs SALE PRICE: $224.99 $274.99 | BUY NOW

Can Open Source Firmware Work On TP-Link Routers?

Currently, yes. After a lengthy legal saga, flashing TP-Link routers with open-source firmware like DD-WRT is possible. Unfortunately, the processor and other components seem to be too underpowered for the router to operate well with custom firmware.

Of course, anyone is free to try and flash their router themselves, but you run the risk of bricking your router and voiding your warranty. Why risk doing so when you might not even get a router running at the level you’d like?

How to use a custom firmware on your router and why you might want to

Let Your Network Be the Best It Can Be

We want our customers to be able to run their network at top levels, so for that reason, we’ve opted not to allow TP-Link users to use our Flash My Router plan. What alternatives do you have?

Alternative #1: Merlin Flash My Router

One option is purchasing a compatible Asus router and utilizing our Merlin Flash My Router plan, which unlocks a bevy of new features.

How to use a custom firmware on your router and why you might want toHow to use a custom firmware on your router and why you might want to

FLASH MY ROUTER SERVICE INCLUDES:

  • Supports Many Popular Asus Wi-Fi 6 Routers
  • 3 VPN Profile Configurations
  • Access to Asus App Management
  • Asus Stock Firmware Capabilities

How to use a custom firmware on your router and why you might want to

Alternative #2: Get A Custom-Configured FlashRouter

Of course, you can always just knock out all of your network needs at once with one of our top-rated FlashRouters. All of our FlashRouters come with open-source firmware already flashed on them. They can also come pre-configured with your VPN Provider information so it works out-of-the-box, with little to no setup required!

Best FlashRouter Alternatives for TP-Link Custom Firmware

Linksys WRT3200ACM

How to use a custom firmware on your router and why you might want to

  • Great For Large Homes
  • Perfect For 10-15 Devices

Netgear R6400

How to use a custom firmware on your router and why you might want to

  • Great For Small Homes
  • Perfect For 2-6 Devices

Asus RT-AC5300

How to use a custom firmware on your router and why you might want to

  • Great For Large Homes
  • Perfect For 15+ Devices

What Was Going On With TP-Link Routers Previously?

Some years ago, TP-Link locked down their routers, disabling the use of open-source custom firmware on them. This was the company’s response to changes in FCC standards, which prevented users from toying with the radio frequency on routers and Wi-Fi-enabled devices. The company felt that disabling third-party flashing was the best way to stay compliant.

Unfortunately for TP-Link, the FCC disagreed with their stance and won a judgment against them for selling routers that operated at power levels above approved limits. Part of the judgment included forcing TP-Link to allow their customers to install custom firmware on TP-Link routers. Thankfully, anyone is again free to use their TP-Link router how they see fit. So, if you’re dead set on customizing your TP-Link’s firmware, get Flashing!

How to use a custom firmware on your router and why you might want to

Everyone likes being in control – we don’t want to be told that we aren’t allowed to do something with our own hardware. In this world of locked-down operating systems, proprietary software and rights-removed content, anything that gives us control over our hardware is a good thing.

One such area is the world of wireless router hacking. You might not have come across it before, but it’s a well-established niche that provides fresh, Linux-powered firmware for a wide range of wireless routers, which wouldn’t necessarily get updated otherwise.

It’s something you should be interested in: it gives you total control over your wireless routers, and it’s fun.

Suitably scared

Before you dip a toe into these murky waters, you should be aware of the potential dangers. Router hacking isn’t without its risks – if you try to flash a router with the wrong firmware, you’ll brick it and end up with something that’s about as useful as a concrete kite. Because of this, we strongly recommend that you don’t try it if you only have one router to hand.

However, if you have a suitable old one lying around, you’ll be able to revitalise it with a raft of new features that might even push your current router into the background.

The idea here is simple: you circumvent the firmware upgrade process of an existing router to inject and run your own feature-packed software.

Over the years, certain manufacturers have made this job easier by making their router firmware and chipset software open source, thereby making it easier to implement third-party versions. This has led to the creation of a number of router-hacking projects. We’ll be looking at the benefits of some of the most common ones, because they tend to cater for different segments of the market.

WRT or WRT?

In the world of router hacking, the main branches of firmware code are OpenWRT and DD-WRT.

For our walkthrough, we’re going to concentrate on DD-WRT, which tends to be more end-user orientated. Its main aim is to provide a working firmware that you can actually install.

OpenWRT takes a slightly more high-brow approach, wanting to provide framework and source code support for embedded devices that also happen to be gateways and wireless routers. Having said that, many devices have ready-compiled OpenWRT firmware, with comprehensive installation guides provided.

Going back to DD-WRT, the first and most important step is to identify your router’s make and model. Make sure you’ve got the exact one – there may be several with similar model numbers and designs. Doing this will provide you with the correct firmware and tell you exactly how it should be installed.

It’s important that you follow the installation instructions to the letter – if you’re told to do a power cycle or reset, do it. These instructions are linked to clearing the NVRAM that stores tables and other settings. If these aren’t cleared, they can play havoc with the new firmware, and cause you headaches trying to work out the source of the problem.

Failure state

Oddly, it can be quicker to come from the other direction and check if you have an incompatible router. There’s a list of known incompatible devices here.

Can your internet router be used as a small webserver?

How to use a custom firmware on your router and why you might want to

Few people understand why some routers cost $15 and some hundreds of dollars.

There are hardware differences and. software differences.

Using a custom firmware (if supported by the router) can give you options/features available on much more expensive hardware.

Such a firmware is TomatoUSB. It's an open source firmware for Broadcom-based routers.

The first step is to see if your router is supported by Tomato, so please check Shibby Tomato Builds. If it is, get the newest version and flash it on the administration interface.

Usually, there are some flavors: AIO (All in One) or VPN (few features, smaller size, perfect for most users).

If it cannot be flashed through Web interface (like Asus RT-N53), you must use the emergency procedure (see router documentation) to upload the custom firmware to the router.

After you install and set up all the usual settings on Tomato (WIFI, LAN etc.), you can go further, and with some work, you can install many programs, for example a webserver with PHP support or Transmission Torrent client (the router must have USB ports).

Different routers have different flash memory sizes. Inside the flash reside the firmware and settings. Depending on the flash size and firmware size (VPN or AIO), some unused space might still remain, so you can create a JFFS partition to install software. This is critical for routers without USB or if you do not want to use a USB drive. If you do want to use a USB drive, read here how to create a partition, and after you create it, continue this tutorial from #3.

So. let's install some software.

Go to Administration – JFFS – Enable – Format Erase

In the text box paste:

2. Go to Administration – Admin Access and modify the default port settings for router administration (ex: 8082).

Now you can access the admin interface on another port

4. Install Optware package manager:

This will take some time, depending on your internet speed and router processing power.

5. Install nano (text editor), lighttpd (webserver), and php

How to use a custom firmware on your router and why you might want to

Here is how to install Tomato firmware on your cheap Wi-Fi router to attain functionality of a high cost router.

What if you could simply enhance your router’s functionalities just by some software alteration. well, Few people understand why some routers cost $15 and some hundreds of dollars.

There are hardware differences and… software differences.

Using a custom firmware (if supported by the router) can give you options/features available on much more expensive hardware.

Such a firmware is Tomato USB. Its an open source firmware for Broadcomm based routers.

The first step is to see if your router is supported by Tomato, so please check Shibby Tomato Builds. If it is, get the newest version and flash it on the administration interface.

Usually, there are some flavors: AIO (All in One) or VPN (few features, smaller size, perfect for most users).

If it cannot be flashed through Web interface (like Asus RT-N53), you must use the emergency procedure (see router documentation) to upload the custom firmware to the router.

After you install and set up all the usual settings on Tomato (WIFI, LAN etc.), you can go further, and with some work, you can install many programs, for example a webserver with PHP support or Transmission Torrent client (the router must have USB ports).

Different routers have different flash memory sizes. Inside the flash reside the firmware and settings. Depending on the flash size and firmware size (VPN or AIO), some unused space might still remain, so you can create a JFFS partition to install software. This is critical for routers without USB or if you do not want to use a USB drive. If you do want to use a USB drive, read here how to create a partition, and after you create it, continue this tutorial from Step 3.

Okay lets start.
Step 1: Create a JFFS partition.
Go to Administration – JFFS – Enable – Format Erase

In the text box paste:

Wait a few minutes, and if you do not get any message, reboot the router.

Step 2:
Go to Administration – Admin Access and modify the default port settings for router administration (ex: 8082).
This will allow you to access your router on specified port.

Step 3:
3. Access the router on SSH using Putty (Windows) or Terminal (Mac).

On Mac, the command is:

Username must be root and the password of the admin user.

Step 4:
Install Optware package manager by using the following code.

cd /tmp

wget https://tomatousb.org/local–files/tut:optware-installation/optware-install.sh -O – | tr -d ‘\r’ > /tmp/optware-install.sh

chmod 755 optware-install.sh

sh optware-install.sh

Note that it may take time depending on your internet speed and your router’s processing power.

Step 5:
Install nano (text editor), lighttpd (webserver), and PHP

ipkg install nano
ipkg install lighttpd
ipkg install php-fcgi

Step 6: Edit the lighttpd configuration file.

Modify the default running port of the webserver (default is 8081).

Save everything and close nano.

Step 7:
Restart the webserver.

Now you can put files and scripts in /opt/share/www/

If you want your webserver to be accessible from WAN, you need to add those lines to the Firewall script (Administration – Scripts – Firewall):

iptables -t filter -A INPUT -p tcp –dport 80 -j ACCEPT
iptables -t filter -A INPUT -p tcp –dport 443 -j ACCEPT

Its done! now enjoy the features on your budget router. Do post your queries or suggestions in the comments.

I want to know is there any consequences if I install recent US firmware (published on 2019-09-30) on my Archer C6(EU) V2 model. If I cannot update to recent US firmware, can I update to some other EU region’s recent firmware?

Looks like my region’s (Bangladesh) EU version didn’t get any firmware updated but rest of the world did. Even UK, Denmark and others EU country has more recent (published on 2019-02-20) firmware versions.

And i want to do it because my mobile phone can’t detect 5GHz of this device. At my office they use Archer C60. My mobile can detect and connect to that device’s 5GHz. So, read of reddit that changing region might solve the problem. That why.

EDIT: Spellings. (my bad)

  • Bookmark
  • Report Inappropriate Content

Hello, may I know what is the region version of your TP-Link router, please?

If it is the EU version, as we always stated that it only supports band 1 for the 5GHz, which is designed to comply with that of CE regulation. If all of your smartphones can only work with 5GHz band 4, you need to get the US version, so it is suggested to contact the distributor in Bangladesh to replace it with a US version if it is still running the TP-Link official firmware.

Hope this makes sense and thanks for your understanding. Have a nice day.

  • Report Inappropriate Content

Hello, it is not suggested to install the US firmware on the EU version product.

From the current firmware version, it should be JP version, not EU. You can confirm the country version on the back label of the actual device.

Besides, the firmware for the EU version is on its way now, it will be released soon. You can wait a while to install it.

  • Report Inappropriate Content

@Kevin_Z , thanks for the replay.

The back of my device says Archer C6(EU). But as you mentioned my firmware version date do match with JP firmware but dont match with EU. That’s weird.

So, can i install the UK one, which is EU like mine..

  • Report Inappropriate Content

Considering it shows EU on the back of the actual device, you can give it a go.

While it is more recommended to update the firmware from the local TP-Link official website of the purchase location for your TP-Link device.

  • Report Inappropriate Content

Brother did u able to solve ur %Ghz wifi band problem?? I am getting the same problem. Can u help to get rid of the problem?

  • Report Inappropriate Content

No man. After extensive research I came to the conclusion that problems are from both ends, the router and the device.

Router Problem: EU model router does not support 100+ 5GHz channels (i.e. channel 120, channel 121 …… channel 130 …. Etc.) but US model router do support this channel. And it’s a technology/hardware support thing. So, flashing US firmware will not give hardware new capabilities. And this might break by router and according to TP link, you can’t downgrade firmware version. So, this will put me in different firmware path. Though I have been using latest global EU firmware’s (I used last 3 of them). They do give some added functionality but not what I am looking for.

Now My device problem: My shitty phone do not support below 100 5GHz channels (i.e channel 36, channel 40 ….. etc.) which my EU router have. Fantastic.

Solutions: In my opinion, none.

Maybe it’s our fault that we are not educated enough regarding this subject. That we should have know what to look for when purchasing a new router. Maybe we should have known what 5GHz channel my device can read. OR maybe manufacture should have spent a little bit more to educate its customer. I had to read countless forum and reddit posts and still I am not sure that my conclusion is right or wrong.

Note: I do have considered installing padavan and other custom ones….. but that’s a different rabbit hole ……

DD-WRT is the most common choice for custom router firmware for a reason. It adds impressive features to your router like VPN support, QoS, and wake-on-LAN. If you’re an advanced user, this is the way to go.

  • Supports a huge list of routers both old and new
  • A list of features and options available
  • Strong QoS support
  • Features can get too technical for average users
  • Inconsistent features depending on your router

OpenWrt is the progenitor of custom firmware and that means it’s had time to mature and become a compelling option for your router. It might be a bit confusing to set up, but it has loads of features to increase the capability of your router.

  • Huge amount of customization
  • Fast updates
  • Can be tricky to use for less advanced users
  • Doesn’t support as many routers as the competition

The battle between DD-WRT and OpenWrt is a close one. Both custom router firmware offer a lot of features that make it hard to choose between them. For most people who aren’t buying a router for the specific purpose of having a custom firmware, DD-WRT is the way to go. If you have very particular needs and happen to have a supported router, then OpenWrt is a better choice overall.

DD-WRT vs. OpenWrt: Installation and compatibility

How to use a custom firmware on your router and why you might want to

Source: Windows Central

It’s tricky to compare DD-WRT versus OpenWrt for a variety of reasons. One of those is the first step in everyone’s custom router firmware journey: installation. Both custom firmware are pretty simple to install. You download the firmware and flash it onto your router. But where the comparison gets murky is the compatibility.

DD-WRT will work on what feels like any Wi-Fi router. Even if you have a router from almost 10 years ago, chances are that DD-WRT will probably work on it in some fashion. It’s ubiquitous enough to be supported on a list of routers. On the other hand, OpenWrt has a more curated list. That said, it’s a long list, but shorter than DD-WRT. Keep that in mind if you’re about to dedicate your router to one of them.

DD-WRT vs. OpenWrt: Updates

How to use a custom firmware on your router and why you might want to

Source: Windows Central

In a lot of ways, OpenWrt has moved ahead of DD-WRT in recognizing that constant updates can make for a more promising firmware. That’s not to say DD-WRT isn’t updated, but because of how much its list of supported routers is stratified with different versions, it’s not as consistent as OpenWrt.

OpenWrt is essentially the modern choice outside of Tomato. DD-WRT is archaic in some of its design and doesn’t seem to be on its way to an updated interface anytime soon. There may be a bigger learning curve for digging into OpenWrt’s features, but it’s worth it if your router supports it to stay current.

DD-WRT vs. OpenWrt: QoS and VPN support

How to use a custom firmware on your router and why you might want to

Source: Netgear

A lot of the features between the two routers like QoS and VPN support are very similar. Both DD-WRT and OpenWrt offer fairly easy setup for QoS if you’re interested in directing bandwidth to your most important devices like the XPG Xenia 14 over others. They’re not as simple as some stock firmware, but with a little tinkering and researching you can get them set up to start feeding your devices with strong connections.

On the VPN side of things, it’s a little more heated but ultimately just as even. DD-WRT gets the win here because it’s slightly easier than the setup process on OpenWrt. That said, they’re very similar and even for DD-WRT you might need to already know a bit about the process before doing it yourself. If you need a VPN and don’t want to fuss with much, go with DD-WRT. If you want to learn a bit and then have the options to tweak how the VPN works, go with OpenWrt.

DD-WRT vs. OpenWrt: Which to install?

When it comes down to it, OpenWrt is the way to go. DD-WRT is a close, close second. It’s proven to be a solid choice for custom router firmware, but it lacks in some features, customization, and update availability. OpenWrt is the best choice for most people with modern routers and with the time to sink into learning what exactly they can do with it. You can’t really go wrong with either, but if you want to stay on top of the latest features, stick with OpenWrt.

Reliable choice

DD-WRT

DD-WRT is the choice firmware if you have an old router or already are familiar with the fundamentals

DD-WRT may be dated, but it’s a solid choice for many, many routers. It features incredible support for QoS and VPNs and works for anyone willing to invest time into learning how to use it.

The ideal

OpenWrt

OpenWrt is the ideal choice for custom router firmware. Its constant updates and approachable design along with its list of features put it on top

OpenWrt is ultimately a lot more forward-looking than its competition. It might not be available on every router, but it’s worth looking into for its extensive feature set.

How to use a custom firmware on your router and why you might want to

These mesh Wi-Fi routers support the fastest Ethernet backhaul speeds

If transfer speeds are the priority for your mesh Wi-Fi setup, you need to choose from the best systems supporting Ethernet backhaul. Check out our roundup and make the right decision for your network.

How to use a custom firmware on your router and why you might want to

These are the best mesh Wi-Fi routers on a budget

Mesh Wi-Fi routers under $200 can be hard to find. Here are the routers that offer good performance and coverage for a great price.

How to use a custom firmware on your router and why you might want to

Avoid Spectrum rental fees by choosing your own router

Spectrum offers speedy internet with a modem free of charge, but renting a router sets you back $5 a month. Check out our compatible substitutes and save in the long term.

Your router is like a gate that protects all your WiFi your devices from hackers. However, your router can’t block new threats unless you keep its firmware up to date. Here’s how to update your router to enhance the performance of all your devices and improve your home security.

How to Update Your Router

To update your router’s firmware, type your router’s IP address into your web browser and enter your login information. Then locate the Firmware or Update section and download the latest firmware update on your router manufacturer’s website. Finally, upload the update and reboot the router.

Note: Your computer must be connected to your router’s network. You won’t be able to access your router’s settings if you are outside of your router’s WiFi network.

    Type your routers IP address into the search bar of any web browser. If you don’t know what your router’s IP address is, check out our article on how to find your router’s IP address.

Note: If you see a screen that warns you about your connection, you can click Proceed or Advanced > Proceed.

Note: If you don’t remember your router’s username and password, you can reset your router and use the default login information. To find out more, check out our article on how to log into your router and change its password.

Note: If you don’t see this section, make sure to check your manufacturer’s website for steps specific to the make and model of your router. Some routers also get firmware updates automatically, so you might not be able to update it manually.

Note: If you don’t know how to extract a ZIP file, check out our article on how to open a ZIP file on a Mac or PC here.

If you’re not able to update your router’s firmware, it might be time to get a new router. Check out our list of the best routers for 2020 here.

How to use a custom firmware on your router and why you might want to

Undoubtedly, the ESP8266’s biggest selling point is its WiFi capability for a ridiculously low price. Paranoid folks probably await the day its closed-source firmware bits will turn against humanity in a giant botnet, but until then, hobbyists and commercial vendors alike will proceed putting them in their IoT projects and devices. One of those devices is the Yeelight desk lamp that lets you set its color temperature and brightness via mobile app.

[fvollmer] acquired such a lamp, and while he appreciated its design and general concept, he wasn’t happy that it communicates with external servers. So he did the only reasonable thing and wrote his own firmware that resembles the original functionality, but leaves out the WiFi part. After all, the ESP8266 has still a lot to offer in its core essence: a full-blown 32-bit microcontroller with support for the most common, hobbyist-friendly SDKs.

The lamp’s color temperature and brightness are set with a rotary encoder / push button combo switch, and the LEDs themselves are controlled via PWM. All things considered, it’s a rather straightforward endeavour, for which [fvollmer] chose the standalone C SDK. And in the end, it’s not like he’s unreasonably cautious to keep some control over his household items.

42 thoughts on “ Dumb Down Your Xiaomi Smart Lamp With A Custom Firmware ”

For me it is surprising, that Xiaomi use ESP8266. I think espruna and tasmota will follow with their firmware.

Yeah. I got one of these and just assumed they used some broadcom chipset. Would love to get tasmota on here (like all my sonoffs). Default firmware is pretty crappy in other ways; the encoder feels sluggish and unresponsive. Would love to map the encoder “click” to other functions on my network.

Heck yeah, fvollmer, the less electronic hands on commands the better. Good job 🙂

So basically, he disconnected the lamp from WiFi with custom firmware? Hmm.

Basically he removed the “feature” that justified the purchase in the first place.
Good job on the execution – but you played yourself. I would have returned that lamp and be done with it. No proper product, no money.

“acquired” does not imply that he “purchased” it.
If he did purchase it, maybe its price was lower than other desk lamps with adjustable color temperature.

But, even so… how does an ESP8266 contact the mother ship, if you don’t allow it to pass through one’s router?

Far to many run their home networks without a proper router.

I think that’s how the UK dude from the news got his super-gonorrhea.

Now that you know what a router does and which kind is right for you thanks to our two handy guides on the subject, it’s time to delve into the last topic of them all: customization. Not many people know this, but it turns out that these days if you don’t like the way your router is set up at default or feel like it’s missing a few vital features, you can actually install your own custom firmware that comes with all the bells and whistles you want.

But how do these custom installations work, and do they actually have any benefits over a standard router’s dashboard? Read on to find out.

What’s the Point?

Right out of the gate, it helps to know why you would ever want to tinker with your router’s firmware in the first place. Although the amount of functionality available on newer routers from the likes of D-Link, Netgear, Cisco and Linksys is growing larger every day, there are still a whole range of hidden settings that the hardcore networking enthusiasts know is only available on custom designed firmware like Tomato or Open WRT.

How to use a custom firmware on your router and why you might want to

D-Links wants to match Tomato with a tomato-colored router

Like installing Linux on a machine that’s normally meant to use OSX, custom firmware opens up every nook and cranny of a router’s true capability, giving the user greater control over everything from the way the VPN feature routes any incoming or outgoing traffic, to overclocking options that let you max out the range and power of your networking hub to its absolute limit.

Custom firmware gives you as much control over your wireless networking experience as you could want, as well as providing a wider range of configurations when it comes to vital operations like creating firewall rules or locking down your media server with 256-bit AES encryption.

A Square Peg in a Round Hole

But for every router, there’s a different type of custom firmware designed to run in place of the dashboard it has already got. Whether you install DD-WRT, Tomato, or Open WRT, it all depends on the model of device you have, as well as the type of functionality you’re looking to achieve that your current router doesn’t already have.

How to use a custom firmware on your router and why you might want to

If this looks like your idea of a good time, DD-WRT might be the perfect fit

Upgrading to unknown firmware can be a dangerous prospect for someone who doesn’t know what they’re doing, and matching your model to its appropriate custom firmware is the most important part of getting started on the right foot. If you need to find out what types of custom software are out there or what you can actually install depending on the model of your device, you can visit any one of the three respective links above to search on each website for whether or not your router is compatible .

Last, if you feel like you’re up to the task and you’ve got a WiFi hub that will get the job done but still aren’t sure if custom firmware is worth the hassle, the folks behind DD-WRT have been kind enough to provide their own HTML5 mockup of what you could expect from your router if you ran their firmware instead. You can use this tool to navigate around, compare the features of a custom firmware to what your router already takes care of, and see if the switch would be worth it for your specific needs.

Custom firmware may not be for everyone, but the sheer number of customizable tweaks and settings it ads to your WiFi is certainly enough to entice anyone who’s interested in having ultimate flexibility on their home network.

I have a custom DNS server in my network that I want all clients to use (it has ad-filters etc, similar to PiHole).

I have set my router (LinkSys Velop) to use this DNS server. However, on the DNS server’s admin page, I see only the Router doing DNS queries, not the clients. I would assume that the router (sooner or later) tells the clients to use the specific DNS server. Despite restarting the clients (and doing various other network reset actions such as ipconfig /flushdns etc, they do not seem to access the DNS server directly however: only the router does.

So far, the only way I could get the clients access the DNS server directly was by entering the DNS Server manually at the client network config.

  • Is this expected behavior?
  • Is the DNS setting in a (or only my?) router simply making the router continue to "act" as a DNS server and re-direct the request to the set IP address, then sending the result back?
  • What do I have to do so that clients set a specific IP address as a DNS server? Do I have to setup my own DHCP server?
  • Do the usual (e.g. ISC DHCP as in CentOS?) linux DHCP servers tell the client which DNS server to use or do they as well just forward the requests instead?

How to use a custom firmware on your router and why you might want to

3 Answers 3

A router, as in just device+software that does the IP packet forwarding doesn’t do anything with DNS or DHCP at all.

Though since you mentioned a device that is commonly used as SOHO/home broadband router. That is a device that is acts provides routing, NAT, Firewall, DNS, DHCP, and many other services.

Anyway when a client that is configured for IPv4 DHCP and doesn’t have any static config connects to a network it will send out a DHCP request, that will include a request for the option 6 data which is a list of IPs to be used for DNS. The DHCP server may provide an answer with a list of IPs. Once a client get an answer it will continue to use those DNS servers until the address is released, or renewed and provided updated information.

So if you want to force a client to get updated DNS settings from the DHCP server you need to do a renew on the client. Though a restart, or disconnecting, and reconnecting the network interface will usually also trigger this.

SOHO/Home routers are usually pretty unconfigurable with the stock firmware. You can often get more control using non-standard firmware. Or just running the services on some other device on your network.

Yes hi, I just got a new Huawei Mediapad M5, and I tried to purchase a code to unlock the bootloader, but they said the firmware on my tablet is too new, and that I would need to downgrade to a firmware from before July 2018 first. But I don’t know how to do that, nor where to find the firmware.

I’m good with tablets so I’ll be able to do it, but I need to know how to first. Thank you

ElsaReyes

Senior Member
  • Feb 22, 2019
  • #2

Okay so quick update, my m5 is the CMR-W09. I downloaded the c432 version of it and unzipped everything, put in in the sd card root folder, and did the power/vol up/vol down button combo and it failed without even starting.

So I tried several other versions of the firmware that I found elsewhere. Trying things several different ways of doing with each one, and no matter what I tried, which was pretty much every version of the way to do this mentioned in the past two months on the bootloader guide thread, and every single one of them got the same failure message, so I seriously do not know what to do. Please help. What am I doing wrong?

ElsaReyes

Senior Member
  • Feb 24, 2019
  • #3

Okay so thank you everyone for all the help you’ve provided, they said sarcastically. But after three days of trying about a hundred different methods, I have officially given up on trying to downgrade the firmware on my tablet.

I’ve tried so many different methods listed in the guide on this forum, and other methods I found elsewhere.

I tried multiple firmware versions, of both sht and cmr, and none of them have worked.

I’ve put the dload folder with everything unzipped inside it and that didn’t work, I tried with the zips still zipped inside, nope. I tried the dload folder with nothing in it but the update.app file. That is the only time anything happened by the way. It gets to five percent, and then immediately fails, no matter how many times I try, or how many different firmware’s I do said method with, it always fails at five percent.

I even spent 17 dollars to join Easy Firmware so I could get one of the firmware versions they had that I couldn’t find anywhere else. And same thing.

So I don’t know what it is, maybe the firmware that came preinstalled on my tablet is a newer version that doesn’t allow downgrading anymore, that’s the most likely thing I can think of anyway. But yeah, it ain’t happening for me.

So unless anyone has any words of advice, or an idea on what might be going on, please close this thread for me, it’s existence is now pointless.

THE MAXIMUM POWER

Senior Member
  • Feb 25, 2019
  • #4

Okay so thank you everyone for all the help you’ve provided, they said sarcastically. But after three days of trying about a hundred different methods, I have officially given up on trying to downgrade the firmware on my tablet.

I’ve tried so many different methods listed in the guide on this forum, and other methods I found elsewhere.

I tried multiple firmware versions, of both sht and cmr, and none of them have worked.

I’ve put the dload folder with everything unzipped inside it and that didn’t work, I tried with the zips still zipped inside, nope. I tried the dload folder with nothing in it but the update.app file. That is the only time anything happened by the way. It gets to five percent, and then immediately fails, no matter how many times I try, or how many different firmware’s I do said method with, it always fails at five percent.

I even spent 17 dollars to join Easy Firmware so I could get one of the firmware versions they had that I couldn’t find anywhere else. And same thing.

So I don’t know what it is, maybe the firmware that came preinstalled on my tablet is a newer version that doesn’t allow downgrading anymore, that’s the most likely thing I can think of anyway. But yeah, it ain’t happening for me.

So unless anyone has any words of advice, or an idea on what might be going on, please close this thread for me, it’s existence is now pointless.

Are you trying to understand why DD-WRT open-source firmware is superior to default, factory-installed router firmware? Are you worried that as an inexperienced user, you might “brick your router” by attempting to “flash a router” with DD-WRT improperly? If you answered “yes” to either of those questions, then keep reading!

How to use a custom firmware on your router and why you might want to

While DD-WRT offers incredible upgrades to a consumer class router, the learning curve for DD-WRT installation, or “flashing,” can be steep. If flashed improperly, your router can be rendered useless, also known as “bricking your router.” The shiny new router that you spent $100 on can become a heap of plastic, metal in the blink of an eye. Not only will you have wasted time and money, but you will be missing the opportunity to experience the powerful VPN capable, DD-WRT router you set out to create.

Reviving a bricked router can be an even more painstaking task, and is only possible on certain router models. Most likely, it will involve purchasing a tool called a JTAG cable, opening your router, finding a connection point (if it exists), sending a signal through a very technical program and following a long set of instructions.

If you do manage to restore the factory firmware, it still will not be what you were looking for, namely, a DD-WRT router. How likely are you to try again after you nearly destroyed your router the first time? Weary after all of this effort, it takes someone with a strong tolerance for failure and plenty of patience to make additional attempts with no guarantee of success. You are just likely to spend hours attempting the process again and be right back where you began.

Avoid Bricked DD-WRT Routers with FlashRouters

With FlashRouters you’ll avoid all the hassle of bricking a router when upgrading to DD-WRT and unlock a plethora of benefits. Benefits such as boosting the antenna transmission of your router, using your router as a wireless bridge, and advanced bandwidth controls for devices in your household will be right at your fingertips. For a further list of advantages, check out this helpful list of DD-WRT Router Detailed Benefits.

Our goal at FlashRouters is to assist the non-technically savvy user who wants to unleash the advanced capabilities of a DD-WRT flashed router without having to worry about any complex setup issues. A FlashRouter arrives with a customized, simple step-by-step VPN DD-WRT Router Setup Guide created by one of our network specialists to work with your new network, just as you envisioned it.

Possibly the greatest advantage of purchasing a FlashRouter with OpenVPN DD-WRT firmware is VPN-Client integration. Each FlashRouter is pre-configured with a VPN passthrough and a VPN-Client. FlashRouters works with leading VPN Providers, including:

unidentified

  • Mark as New
  • Bookmark
  • Subscribe
  • Email to a Friend

I have set up my LB1200 with a sim card from a cellular device on my unlimited plan that I wasn’t using. On this plan, there are two ways of using data on each line – the dedicated data for the device itself and hotspot data. The device data is unlimited, then after a certain amount used it may be throttled down in times of network congestion. The hotspot data is technically unlimited, but is throttled to an absurdly low speed after a smaller amount of data usage is reached. I don’t know much about LTE networking, and I’m not sure how these devices differentiate between these data streams, but obviously, I want to use the dedicated device data as the source of my LTE internet on my modem, not the limited and throttled hotspot data associated with the line. I assumed it would do this by default, but I found out that it had used all my hotspot data instead of using the device data. How, if this is possible, might I go about changing this? It isn’t much use to me as it is now.

Note about my configuration: I’m using the modem in bridged mode so I can use my Netgear R6220 Wifi router as a DHCP server and have access to its more advanced features like port forwarding, QOS, etc. Not sure why this would have any effect on my issue, but it may be relevant, I suppose.

Want to improve this question? Update the question so it's on-topic for Server Fault.

Closed 8 years ago .

What is the most compelling reason to flash your router to the Tomato firmware?

10 Answers 10

Things I like about it:

  • Free
  • Very stable
  • Very easy to install on Linksys WRT54G routers
  • Allows you to increase your wifi signal strength!
  • UI is simpler and faster than the stock Linksys UI
  • bandwidth monitor helps me to see how much bandwidth others are using on my network, so I know why hulu is skipping, etc
  • The wireless survey is a nice, easy way to see what channels your neighbors are using, so you can set your wifi to a clear channel
  • Simple access restriction

The signal boost was the clincher for me. The stock firmware on the earlier WRT54G routers wouldn’t let me adjust the signal strength, but Tomato lets me do that. Before I upgraded to Tomato, I couldn’t get a clear signal in the back room in my house. Now, it’s as clear as any other room.

Tomato is pretty much “fire and forget”. The bandwidth graphs are nice, and it’s really quite easy to configure. It lets you ssh in, if you want to fiddle with low level settings, but ever since I set it up, I don’t think I’ve ever went back into the UI.

It just works, and works well.

It supports wireless bridging (WDS) if you want to set up more than one router to cover a large space.

But the biggest thing is that it’s very stable. I don’t ever have to reboot the router because of a freeze or a problem.

I think most people run one of the alternate WRT firmwares (like Tomato, OpenWRT, DD-WRT, Packet Protector, etc) just for the geeky fun of it.

However, there are some extra features that these firmwares have that are not available in the stock firmware. For example, others here have mentioned the ability to increase your radio output power beyond what’s allowed with the vendor firmware.

The big one for me was that the stock Linksys firmware on my WRT54GL wouldn’t allow me to setup a static NAT such that a service was available on the outside (internet) on a different port than it was actually running on the internal server. Specifically, I wanted to allow SSH access to one of my home boxes on several alternate ports (long story), but I didn’t want to have to setup SSH on my home box to run on those ports. The default Linksys firmware would allow that, but Tomato does.

Some of the other alternate WRT firmwares offer even more features. I’m considering upgrading my router from Tomato to OpenWRT because I’d like to run OpenWRT will let me setup my WRT54GL as an OpenVPN server.

So the shortened answer would be two reasons to run Tomato or otherwise reflash your router: 1) if you want to use features that are in Tomato (or another alternate WRT firmware) that aren’t in the vendors stock firmware 2) just for kicks! 🙂

I was going through some recent threads and noticed that several people no longer recommended DD-WRT. Is it really no longer good anymore? I've since switched to Merlin which I love but I used to put DD WRT on everything and remember it was the go-to custom firmware a few years back. It's still running fine on an old router at my parent's place. What firmware are people running these days instead?

I moved on to Ubiquiti gear now but stopped using DD-WRT with the release of the gigabit AC routers as most of them depend on hardware acceleration drivers to perform at full speed. Not to mention that stock firmware on most higher end home routers is very good now.

Firmware like Merlin keeps all the drivers in tacked and adds a few extras. It tends to be faster and more stable than DD-WRT.

Good info, thank you.

FYI, in tacked is spelled intact.

Have a look at openwrt if it's supported by your router.

I use OpenWRT on all my routers and it's solid.

Nah, it's kind of a bloated cobbled-together mess these days as it has been for a while. It was great when there was a gulf between professional and consumer hardware but these days there's no need to run it.

If you want to get 'features' on a bit of consumer kit that's limited otherwise I'd recommend OpenWRT but really it's pretty much the same money to go with something a little more pro, like Ubiquiti or Mikrotik, so you might as well just use that.

Although for info, I think Ubiquiti are going to be using a kind of LEDE/OpenWRT image as the basis of their APs at some point, at least they've had some betas knocking around which suggest as much.

I am using LEDE.

For info, LEDE has been rolled back in to OpenWRT and isn't being maintained any more (not as LEDE anyway).

For the time and effort trying to get DDWRT working on mediocre hardware, I just got Ubiquiti hardware. Just as customizable but it actually works well and is supported

Edit: ddwrt used to be really cool 10-15 years ago. Anymore, I don’t see the point though. There are much better options these days

It was the tits. a decade ago. Back then 10Mbps was fast. You had a couple computers, maybe, on your network. You were more likely to download a video than you were to stream it. The internet was a different place and we asked a lot less of our routers.

Almost every home router has extremely low end hardware in it. And now we're asking quite a lot from that shit hardware. We get around it by offloading to ASICs that can handle NAT. The WiFi chipsets are responsible for everything WiFi on their own. Custom firmwares, especially DD-WRT, have little to no support for this hardware.

The advice here is simple. Buy a router that meets your needs out of the box.

Mine looks dead. Device showing it is plugged in but not turning on.

It will be helpful if you share pins location so I can check if it is just a boot issue or the hardware

YOURKIN

Member
  • Jul 25, 2021
  • #102

i need help who have usb ttl converter and jiofi m2s
and have little knowledge about it .
DM me for helping me

then we backup the firmware. I need help because my jiofi boot is damaged .

YOURKIN

Member
  • Jul 27, 2021
  • #103

Mine looks dead. Device showing it is plugged in but not turning on.

It will be helpful if you share pins location so I can check if it is just a boot issue or the hardware

is your device on normally or what happen , if your device normally working then we can backup your firmware and i can fix my jiofi m2s boot.img , if it’s working then i tell you the process to get shell access after that we modify the firmware then i post all processes , with different from i show all port and connation list DM me if your devices is working .

i also searching this devices new or old one if i find then i can fix my old one also

YOURKIN

Member
  • Jul 27, 2021
  • #104

habib.my

Member
  • Jul 30, 2021
  • #105

YOURKIN

Member
  • Jul 30, 2021
  • #106

this is not for jiofi 6

this for usb to serial converter for ic to pc connection ,
search more about if from internet .

habib.my

Member
  • Jul 30, 2021
  • #107

this is not for jiofi 6

this for usb to serial converter for ic to pc connection ,
search more about if from internet .

YOURKIN

Member
  • Jul 30, 2021
  • #108

subhash_india

Member
  • Sep 15, 2021
  • #109

You should enter into DIAGNOSTIC Mode to backup firmware,

it should be visible as " Qualcomm HS-USB android DIAG 9008/901D/902D (com X) " in Ports section of Device Manager

SumanKaka

Member
  • Sep 16, 2021
  • #110

i need help who have usb ttl converter and jiofi m2s
and have little knowledge about it .
DM me for helping me

then we backup the firmware. I need help because my jiofi boot is damaged .

ishreyas

Member
  • Oct 6, 2021
  • #111

subhash_india

Member
  • Oct 9, 2021
  • #112

ishreyas

Member
  • Oct 9, 2021
  • #113

Thanks should I buy UART converter or buy Arduino UNO (maybe original or clone, depending on availability of local shop). as I’ve to take backup of another JioFi.

Do you know how to take backup of original firmware using any of these hardwares?

Thanks waiting for reply.

YOURKIN

Member
  • Oct 11, 2021
  • #114

Thanks should I buy UART converter or buy Arduino UNO (maybe original or clone, depending on availability of local shop). as I’ve to take backup of another JioFi.

Do you know how to take backup of original firmware using any of these hardwares?

Thanks waiting for reply.

ishreyas

Member
  • Oct 12, 2021
  • #115

subhash_india

Member
  • Oct 18, 2021
  • #116

Thanks should I buy UART converter or buy Arduino UNO (maybe original or clone, depending on availability of local shop). as I’ve to take backup of another JioFi.

Do you know how to take backup of original firmware using any of these hardwares?

Thanks waiting for reply.

ishreyas

Member
  • Oct 22, 2021
  • #117

r0bre

New member
  • Nov 5, 2021
  • #118

tmr369

New member
  • Nov 11, 2021
  • #119

YOURKIN

Member
  • Dec 3, 2021
  • #120

Similar threads

  • Locked
  • Locked
  • Locked
  • Home
  • Forums
  • General Discussion
  • Upgrading, Modifying and Unlocking

Breadcrumb

Top Liked Posts

Hello friends,
I have recently bought a new JioFi 2 M2S device and was trying to unlock it somehow.
After lots of trying I am able to figure out few things that I think can be helpful for unlocking by senior and experienced developers.

1. After logging in the Web Admin if we go to a page 192.168.1.1/engineer.html it asks for some engineer key which might open up some hidden settings of the router.
2. I have tried to figure out the javascript and it is some kind of md5 algorithm
3. On googling I found a post which says
a. Device made by Pegasus Telecom (Raysan technology) which is subdivision of Haier
b. Same device as Smartfren Andromax M2Y (Indonesian).
c. Also same as Beeline Uzbekistan Mobile router
d. Runs an embedded linux webserver: Boa version 0.94.14rc21
4. There is a directory of xml files if it helps at 192.168.1.1/wxml/
5. The device supports fastboot mode by pressing WPS button and power button fo 3 secs

Please experienced developers and geeks see if you can do something to unlock.Best of luck :good:
If you find anything please reply back or PM me

PEG_M2_B04 FIRMWARE LINK
Click here
All Credits To @sydikm
Decompress the file and use the bin file to upgrade from the web ui
Please note that this firmware is not unlocked. I am trying and it may be available in next few days.
Also try not to downgrade the firmware. Check your version before updating.
AND I AM NOT RESPONSIBLE FOR ANY BRICKED DEVICE

If you carefully read the JS code, the ultimate length of encrypted password is 12 and it comes only from the characters in 15 length character set. It’s still a probability game, who knows if JioFi manufacturers have made the JS look like that, to waste the reverse engineer’s time.

For the system folder part from the gdrive, it is still debatable. It’s not sure enough for me, that guy has accessed the device through ADB and providing the original files, or just some other files from unlocked firmwares of previous JioFi.

The firmware bin file is mostly just a zip file, if security aware, a magic hashed zip file. If you’re using Linux, try binwalker it will tell you exactly the file type, even if it’s magic hashed.

The installation of OpenWrt is device specific. These device specific procedures should be found in the wiki. See Table of Hardware for available procedures. If your device is not listed, information in this Howto may be helpful.

Warning!
This section describes actions that might damage your device or firmware. Proceed with care!

If your attempt to install OpenWrt fails, please view generic.debrick for fixes.

This HOWTO is VERY generic. You cannot use it in most situations, as you have to adapt values and other parts for specific hardware. Please look at the supported hardware page for device-specific documentation.

In most circumstances; you have three options:

Four Installation Methods

There are four ways to install OpenWrt on a device:

Method 1: via OEM firmware

Open the WebUI of the OEM firmware with your web browser and install the OpenWrt factory firmware image file using the “Firmware Upgrade” option. Your device should reboot with OpenWrt installed.

NOTE: Sometimes the OEM firmware will only allow you to flash your device with a specific firmware file. If that is the case, you will not be able to install OpenWrt using this method. However, for some devices the build bots prepare tagged builds such that they are compliant with the firmwares from the manufacturer. This should be documented on the device specific page for your model.

Method 2: via Bootloader and an Ethernet port

Most, if not all bootloaders provide built-in functionality for this purpose. Some use a TFTP-client, others a TFTP -server, others a FTP-client, some an FTP -server, some a web server and some use the XMODEM-protocol.

Before proceeding you need to determine the following:

Once you know all of the above parameters, you may proceed.

NOTES: Sometimes even the bootloader prevents you from flashing a non-OEM firmware. If you have a short time window, the connection between your computer and device needs to be established quickly. To make this as quick possible, you can disable auto-negotiation on your NIC and/or disable media sensing.

Specific Howtos

Method 3: via Bootloader and Serial port

Method 4: via JTAG

Install a ramdisk-image into main memory

This step shows you howto upload a new ramdisk image to the device. The existing firmware on the flash remains unchanged! You require a working serial cable to do the ramdisk upload.

(if you forget the bootargs piece below, the board will boot and look normal, but it won't be able to bring up any of the network interfaces!)

Installation Checklist

This checklist cannot and does not completely cover all the ways you can install OpenWrt.

I’m thinking about reverse engineering a few router models and trying to get them running with QEMU. In particular I’m trying to get the web server running. The current issue I’m thinking might be a problem is if the router’s firmware is trying to use a physical device that QEMU doesn’t emulate by default. My main goal is to emulate various routers’ firmware and be able to connect to their webservers. Do any members of the reverse engineering community have a general guide to emulating routers with QEMU?

How to use a custom firmware on your router and why you might want to

1 Answer 1

Emulating a complete physical device is always going to be more of an experimental exercise. In this regard you can use firmadyne which aims to emulate Linux based embedded firmware for MIPS and ARM devices. It’s based on the venerable QEMU project. There’s also firmware analysis toolkit which is a wrapper around firmadyne allowing you to automate some of the tasks.

However firmadyne is not without its pitfalls. Frequently, you will come across various firmware binaries that fail to emulate properly (like no network access) primarily due to the missing hardware in the emulated environment. In such cases manual tweaking may be necessary.

More often than not a full system emulation of the device is not always necessary in order to be able to interact with the web server. We can use binwalk to extract the filesystem and run the web-server using QEMU user mode emulation in a chrooted environment.

dkilshtein

  • Mark as New
  • Bookmark
  • Subscribe
  • Email to a Friend

It looks like the the option “Allow guest to see each other and access my local network” doesn’t really work. When I check this option, then connect to the guest network I can still all other network clients. It looks like this option is only for the L3 not L2 (tested with Fing mobile application). Is there a solution for that (maybe to use a custom Firmware)?

IrvSp

  • Mark as New
  • Bookmark
  • Subscribe
  • Email to a Friend

Don’t have your router but an R8000. There had been some old discussions on this, ” Allow guest to see each other and access my local network ” and you can search for this here, and it seems some wanted it broken into 2 parts. My R8000 has that feature:

Enable Guest Network
Enable SSID Broadcast
Allow guests to see each other and access my local network

Not sure if your router does as well. From what I’ve seen in the old discussions the two unchecked by default were really a single option to enable the Guest network at one time. Is that what you have?

I don’t use it as you can see.

Not sure what you meant by “L3 not L2” either? Fing should show the SSID’s you can see unless you mean a different one? A 2.4Ghz device will see all 2.4Ghz SSID’s available, and only Dual-band 2.4 and 5Ghz devices will see all SSID’s available.

dkilshtein

  • Mark as New
  • Bookmark
  • Subscribe
  • Email to a Friend

Thanks for the reply,

I have the same 3 options as you described.

The first two are clear:

Enable Guest Network – I checked this one to enable the guest network

Enable SSID Broadcast – I unchecked this one. I configured each of my devices manually (I guess it is more secure this way)

Allow guests to see each other and access my local network – this is the option I think might not as I have anticipated.

I was under the impression that, when this option is disabled (unchecked), each device that is connected to the guest network will not be able to see aother devices.

However, although devices that are connected to the guest network cannot access my LAN and cannot access each other, they can see all other devices (including their addressess, manufacturers and other info) on both the guest networks and my private LAN. I thought that, if this option is cleared, all devices that are connected to the guest network will not see any devices at all (especially on my private LAN)

IrvSp

  • Mark as New
  • Bookmark
  • Subscribe
  • Email to a Friend

Enabling SSID, well all that does is hide it. Might stop a ‘drive-by’ scanner from seeing it, that is all. Sure, you’d have to know it exists or tell someone what it is (with the p/w) to use it. Big deal. why bother?

The last choice, does (I assume) what is says. Keeps the Guest network in an individual LAN or integrated on your LAN.

However, although devices that are connected to the guest network cannot access my LAN and cannot access each other, they can see all other devices (including their addressess, manufacturers and other info) on both the guest networks and my private LAN. I thought that, if this option is cleared, all devices that are connected to the guest network will not see any devices at all (especially on my private LAN)

OK, but how did you determine this? Using a Netgear App? Seeing and being able to USE or BROWSE are two different things. Just like you can see SSID’s you ‘might’ be able to connect to.

That option (I do NOT use Guess Networks so I’m just guessing how it should work) when enabled should give the GUEST full LAN access. That means ANY unprotected device’s access, like a Printer for instance. Unless they KNOW passwords for protected devices (USB connected drives are the router can be protected or not) or PC’s allow via a Credential/User the GUEST device access, they have none. The same as walking around your house and seeing what you have there. They can look but can’t get in.

Of course this assumes they have the same application/program you have to see this information.

Am I missing something here? I assume you are using a Netgear App as a GUEST on the LAN. I bet you have saved the ROUTER access info in the app/device. If this wasn’t there, and let’s say on your iPhone you have the Netgear NIGHTHAWK app and opened it, you’d not be able to logon without the userid and password, ergo, not see any LAN Map or connected devices and info. Now if you left the router default userID and password and I happed to try and connect and it worked, well, I guess I’d see what you were worried about?

This is a read-only archive of the old OpenWrt forum. The current OpenWrt forum resides at https://forum.openwrt.org/.

In May 2018, the OpenWrt forum suffered a total data loss. This archive is an effort to restore and make available as much content as possible. Content may be missing or not representing the latest edited version.

The content of this topic has been archived between 3 Apr 2018 and 6 May 2018. There are no obvious gaps in this topic, but there may still be some posts missing at the end.

Downloaded the firmware from here:

Tried to install it and got the error:

Downloaded the latest official firmware from here:

Renamed the openwrt to match and get the same error, just to test, tried uploading the original firmware with absolutely no changes to the name and still get the same error.

Thought it might be because the firmware says it's the same as on the router:

So tried upping the version numbers, no joy, same error.

Googling suggested trying to put dd-wrt on first, they have only the v9:

but tried it anyway (factory-to-ddwrt.bin) and no joy, renaming as above had no so luck either.

I'm guessing it's checking something within the .bin itself but can't view the archive (as that's beyond my skill, I did give textpad a shot, as, why not, but no such luck).

Any other way to flash this? I see mention of TFTP but this seems like some weird voodoo, how many chickens do I need?

(apologies, new user, can't post links so bastardised them)

(Last edited by Sampler on 15 Sep 2016, 04:48)

have you tried my version *snip* ?

Thanks, given it a go and still getting the same error:

Tried renaming it to the latest official firmware:
wr841nv11_wr841ndv11_en_3_16_9_up_boot(150616)
And same result = (

can you downgrade to wr841nv11_3_16_9_up_boot(150821) like http://static.tp-link.com/res/down/soft … 150616.zip ?

(Last edited by maurer on 8 Sep 2016, 10:48)

Where would I find that, on the tp link site it only has wr841nv11_wr841ndv11_en_3_16_9_up_boot(150616) (there's no link to historic firmware or alternatives)

oh, nm, saw you'd edited the link in after I posted = )

(Last edited by Sampler on 8 Sep 2016, 10:49)

Same error, though I think that might be because it's the same firmware that the router shipped with:

Hi, I flashed brand new wr841n v11.1 today with latest trunk build http://downloads.openwrt.org/snapshots/ … actory.bin and there is no problem.

Have you tried tftp method?

(Last edited by nozombian on 8 Sep 2016, 12:30)

Finally managed to get it to work with the tftp method (over ethernet, rather than usb) – thanks for everyone's help, no idea why the default system gui wouldn't let me update.

no idea why the default system gui wouldn't let me update.

Because of the FCC regulations

But that wouldn't account for it not accepting it's own firmware from their site, plus, FCC don't have jurisdiction in Aus = p

Modified version 150616. New version 160325 will accept this file

Thanks NeDark, hopefully that'll help someone else coming across this post

It works Super here .
Thank you NeDark

Hello, got experience levels sort of mixed but I do feel comfortable trying to do this. Having said that if I'm looking to put Chaos Calmer on a WR-841N v11 AND I need LUCI is the current thinking to load v10 over the serial port with sysupgrade -F, if so do you need the setenv's and so forth to precede it (I don't see an exact list, model or video to crib from)? Or does someone have a mature patch for v11 with a countable # of things not working? I just bought the serial port but I haven't used this one in this context, doesn't bother me to type long command sequences (my error rate's low) but I don't know enough about what's going on to make my own sequences just yet.

works here too! thank you sooooooo much NeDark. I wasted many hours trying different builds for v11 (non US) before coming across this !! Cheers!

Hi NeDark, I'm very keen to try your bin file (post #13) but the link to your dropbox doesn't work any more. Are you able to make this available again please? Thanks.

Modified version 150616. New version 160325 will accept this file

I did modification explained in post .

Hi to all
I am on the same page .
Unfortunately the link is broken
Is it possible to reupload the file to another web hosting ?
Many thanks
Paolo

Look here for download
Guarda qui per il download

(Last edited by mh3g on 21 Apr 2017, 09:21)

@paolocorpo

Look here for download
Guarda qui per il download
.

Firstable many thanks for your support
Your link goes to a web page of DD-WRT forum where you=mh3g suggests to go to OPENWRT forum to this 3D
It is a closed circle

Do you have chance to upload the patched firmware that allows to upgrade with custom firmware ?
The link of Nedark is not working (as you can try)
Can you confirm that after upgraded using this firmware provided by NeDark I will be able to install one of my favourite firmare custom OPENWRT or DD-WRT ??
Pratically my question is : the fimrware provided by NeDark substitutes the official firmware with a new modified able to accept later a custom firmware or is itself a OPENWRT firmware ?

(Last edited by paolocorpo on 21 Apr 2017, 12:20)

@paolocorpo
You need to register to ddwrt forum to view the file to download attached in the discussion 😉

Ti devi registrare al forum di ddwrt per visualizzare il file da scaricare allegato nella discussione. 😉

(Last edited by mh3g on 21 Apr 2017, 13:25)

Thanks
I got it
I need to reset the router before use this patched firmware ?

Can you please support me with my other questions/doubt s ?

(Last edited by paolocorpo on 21 Apr 2017, 14:10)

With this file you unlock the router. After this flash the router is unlocked forever but you dont reflash again the orginal firmware 160325 from tplink (is locked). From the upgrade page, after the flash, you can install other firmware like ddwrt or lede or openwrt or gargoyle without the 18005 error.
Reset not required, my router works great. For other questions no problem.

Many Thanks
I installed the patched firmware by NeDark
After I installed the DD-WRT firmware
NO PROBLEM .
VERY GOOD !!

The ESP8266 seems to be the device of choice for those of us who want to run a webkit exploit locally without having to use a big computer*. I recently ordered one and didn’t find the time to properly explain how to set it up, until now.

The following tutorial is for people using Windows 10. Some of the steps might be different if you run on a different OS (or a different flavor of Windows)

0. Requirements

In this example, I will be installing and running the 5.05 PS4 Exploit, using the version compiled for the ESP8266 by C0d3m4st4. There are other binaries available from other tinkerers, but this one seems to be the most popular right now (and it’s fairly easy to use once installed on the ESP8266). You’ll need:

  1. An ESP8266. I use a NodeMcu v3 by Lolin, but there are multiple clones and they all should work as long as they have at least 4MB. Here’s one that works.How to use a custom firmware on your router and why you might want to
  2. A usb-to-micro-usb cable (that’s your typical android phone cable, or the one from your Dualshock 4) to connect the ESP8266 to your PC, then later to your PS4.
  3. A firmware binary for the ESP8266, hosting the PS4 5.05 exploit. I used ESP8266XploitHost 2.4 by C0d3M4st4 (source)
  4. A flasher tool that will help you copy the firmware from your PC to the ESP8266 device. Most people will want to download the x64 exe file.
  5. A PS4 running firmware 5.05. Here’s a guide on where to get one. (if you have a firmware lower than 5.05, it’s easy to upgrade. If you have a firmware higher than 5.05, you cannot downgrade and you need to buy a hackable PS4)
  6. Optional? Some people say you’ll need a driver for your PC to recognize the device. I did not need a driver for windows10, but you might need the one that matches your OS from this page

1. Loading the firmware onto the ESP8266

You only need to go through this step once, or, more precisely, every time you want to update the exploit you will be using (for example if a dev decides to improve the 5.05 exploit, or if someone publishes a new payload, you might need/want to update the esp8266 firmware again)

  1. Before you get started, make sure you read the README provided with your binary, if there is one. C0d3m4st4’s archive provides a fairly extensive readme that was the basis for this tutorial!
  2. extract the firmware binary somewhere on your hard drive (in my case, it’s a file named c0d3m4st4_ESP8266XploitHost_v2.4.bin)
  3. plug in the device to your computer via a USB cable. Your computer should recognize the device, if not, you might need to get a driver for it (see above)
  4. run the flasher (NodeMCU-PyFlasher-3.0). This should be a standalone executable, nothing to install
  5. From within the flasher, you should be able to choose your serial port (if the list is empty, it means the device was not recognized, in which case you might need to install one of the drivers mentioned above) and select your firmware binary (c0d3m4st4_ESP8266XploitHost_v2.4.bin). Other options are specific to your device: the baud rate (my device recommends to use 9600, but I had no issue with 115200 which is the default) and the flash mode (for clones of the NodeMcu it seems Dual I/O is the right choice). Last but not least, make sure to select “Erase Flash” as we’ll be installing a full 4MB binary.How to use a custom firmware on your router and why you might want to
  6. Hit the Flash button and wait until completion.

2. connecting your PS4 to the ESP8266 “router”

The 5.05 exploit and associated payloads are now loaded onto your ESP8266. You will now use the device as a “fake” router that your console can connect to, in order to run the exploit.

    Plug the ESP8266 into your PS4’s usb. The only purpose of doing this is to give the device power. Technically if you have another usb port somewhere that can give the device its power, it should work too. The port on the PS4 is just convenient.

How to use a custom firmware on your router and why you might want to

The God of War PS4 Pro limited edition came with firmware 4.73 🙂

  1. In C0d3m4st4’s binary, the entry point name is ESP8266XploitHost, and the password is ps4xploit. For everything else, use the “easy settings”. (This is why I like C0d3m4st4’s version, as there is no need for advanced wifi settings such as DNS, etc… Other binaries might have other wifi settings, so be sure to follow their readme for the wifi settings)How to use a custom firmware on your router and why you might want to

3. Launching the exploit

To run the exploit, go to Settings –> user guide, and launch the user guide.How to use a custom firmware on your router and why you might want to

If everything’s set up correctly, this should load the index page from the esp8266, which lets you choose the payload you want to run. For example, Mira + HEN is what I tried.How to use a custom firmware on your router and why you might want to

The exploit might fail a couple of times with an “out of memory” error, but ultimately it will go through, which you can confirm with the joke “GDPR” message. The web browser might crash, so only the “home” button will take you back to the main menu. the presence of the “debug settings” menu in your settings will definitely confirm that the hack was succesful.How to use a custom firmware on your router and why you might want to

* Please note that there are multiple ways to run the PS4 5.05 exploit and accompanying payloads. You can host the exploit locally on your computer, or android device. Or you can use an online option such as the version hosted on qwertyoruiop’s server. Using an ESP8266 is one other alternative and I personally find it quite elegant.

Hello. Today I am going to show you how to download Samsung B310E stock firmware file and how to flash it. Welcome and thank you for choosing technology sage blog site. If by any chance you have been looking for the Samsung B310E original stock firmware file, then this article is going to be so handy for you. And before we get further into this article, I would just like to thank you for visiting our website. We really appreciate the support you readers have given us over time. You are the reason why we keep publishing. Thank you so much. If you are interested in mobile phone unlocking and repair, then read more on mobile phones on our website under the ‘mobile phones’ category. You can also check my other recent article on Mediatek Universal Tool Download and How to Use it.

Anyway, back to our main topic now, in this article, we are going to look at the Samsung B310E Stock Firmware File download and how to flash it on your phone. So if you have flashed your phone with software and your phone is not behaving in a normal way, then flashing the original Samsung B310E firmware will solve your problem. Let us look at what you stand to gain by flashing Samsung B310E stock firmware:

Benefits of flashing Samsung B310E Stock Firmware

  • Solves network issues
  • Unbrick bricked phone
  • Solves dead issues
  • Removes security lock
  • Perfect replacement for Custom ROM

How To Download And Flash Samsung B310E Stock Firmware

Now, as I have highlighted above, flashing a new stock firmware file on your phone will fix a number of issues. Sometimes when you want to remove password or security lock on this phone, you will try to do it on the miracle box without success which will prompt you to flash a Samsung B310E PAC file from the internet. The pac file you will download and flash is a custom ROM and after flashing it you will find that your phone has got an interface that you cannot be able to use your phone efficiently and you might want to switch back to the original Samsung B310E Stock Firmware. Let us look at how to download the Samsung SM-B310E Stock file. You can also read my other article on how to unlock password on Nokia TA 1270 M-Kopa smartphone.

Step 1

The very first step is so more obvious. You need to Download Samsung SM-B310E Stock Firmware. There are a lot of websites promising to give you this file. But at the end of the day, you will realize that they don’t work or they are just custom ROMs. I am going to save you the agony of searching through numerous websites in search of this file. You can Download the Samsung SM-B310E stock firmware file from this link. Download it on your computer and extract it. The firmware is free firmware and doesn’t have a password.

Step 2

After you have downloaded your Samsung SM-B310E stock flash file, you need to extract it on your computer or laptop. This firmware is a bin file. You will now need to have software which you can flash this file. There are quite a number of tools you can use to flash firmware files. For this phone. It is an SPD feature phone. For this reason, you will need a flashing tool that can flash SPD bin files. For this purpose, I will recommend that you use Miracle Box 2.82 version.

Step 3

Now, after having the file and Miracle Box tool, it is time to flash your phone. To flash the file to your phone, launch the miracle box and go to the SPD tab. Under SPD, Click on the ‘WRITE’ button. Choose the boot type to SPD6600L/6226/6530/6610/20

How to use a custom firmware on your router and why you might want to

Now, click on the folder just down below. Navigate to the folder you extracted your Samsung SM-B310E stock firmware file and load the bin file.

How to use a custom firmware on your router and why you might want to

Step 4

After you’ve loaded the bin. file, click on the start button. Power off your phone. Hold the boot key which is the button above the call button. Connect your phone to the pc. Wait for a few moments for the file to write until it is completed at 100%. Disconnect your phone from the computer, remove the battery, and put it back. Power up your phone and that is it. That is the simplest way to Download and write a Samsung SM-B310E stock firmware file.

Thank you for reading. In case you have a question, then kindly contact me through Facebook. Also, like our Facebook page and join the technology sage forum. Thank you and let’s meet in the next article.

Routers (wifi ‘creator’) have a default operating system called ‘firmware’ . OpenWrt / DD-wrt are open source community made replacement linux base Operating system for routers.

This a guide of these open firmwares. Their Advantages / Disadvantages and Uses.

Summary: Turn your router to always on micro linux computer. Install programs that can serve files, play media , ssh , irc chat server and so much more. Its beautiful!

– Attach a 3g USB dongle to router.
– ad blocking for whole network or specific devices.
– custom guest SSID : Not common/easy to setup. But very cool. Create a custom wifi SSID. Any one who connects to it can be set to be restricted to specific things only! A folder on a device, just the internet, specific websites and so on..
– Increase wifi power/range: Be very careful to not fry your router.
Complete Access control: Set when and which device can connect to what .
– If USB port : Attach storage, access from any device. Download torrents!
Remember complete access control ? So limit certain adult folders on the USB drive (or any drive) to be visible to just my PC
– Measure Bandwidth being used, by which device and when.
– Limit bandwidth

Security
– most default firmwares are rarely updated, have major security holes.
– issues exists in certain wifi features itself! (Google ‘wps security’ ), many default firmwares do not address them, can have zero options to turn these security holes off.
Open firmware: – more regularly updated. – complete control to turn off any security risk ‘feature’
– DNS hijacking prevention for the whole network – dnscrypt

Advanced Uses:
– securely access your network remotely .
– port forwarding.
– custom scripts: Write your python script and make to do what you wish. Notifications for new device connections, wifi attacks, Downtime, or anything you can imagine.
– Log everything.
– run a server. ftp, irc ..

Disadvantages:
– For those who like tinkering.
– Risk of bricking router. EXACT ROUTER MODEL MUST BE SUPPORTED!
– Can be difficult to install and configure. Depends on router and your command line, linux skill.

I was searching for custom firmware for my D-Link DIR-400 and I stumbled upon DD-WRT. I had some issues trying to install the firmware (new stuff for me) but at the end I accomplished what I wanted to do. I ended up installing the lastest stable release of the DD-WRT firmware for my DIR-400 (2008) and that was because I tested with some of the newer ones and the router didn’t work properly. I tested installing at first some of the 2022, 2021 and 2018 firmwares and they all installed correctly but I wasn’t able to ping the router from my computer. There were a few times I was able to ping and access my router from the browser, but if I changed some configurations the router became unreachable again.

Why is that happening? Is it because it is Beta firmware or because my router might be old and rusty?

See flashing.txt in links above. Much discussion over the years:

I used the guide mentioned by @kernel-panic69 when installing lastest Beta firmware for my DIR-400

After installing the lastest firmware The router wasn’t accesible from the browser that’s why I tried to ping it from CMD to get more info about what could be happening.

At the end I tested with this firmware and was the one that worked.

Thanks for the links, I already had read some of them. I followed the flashing guides you mentioned for all my installations and also learned and succesfully returned to the original firmware thanks to this thread –> https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=33685

How can I get a serial log or a syslog? I am willing to share them as this problem might be happening to others.

Maybe I need to add more info on what I did. I can retry the process of installing the lastest beta firmware (and other older ones to test) for my router and give the information you may need. I didn’t document the exact steps but I can reproduce them again.

In newer firmwares (the lastest one for example), if I set up the router as in this guide:

and reboot the router, the router is unreachable. The wireless light in the router is just turning on and off at the same time rate so it is like the router cannot connect to the WiFi (for some reason) and is stuck in that state unless I use the reset button on the back. Powering it on/off doesn’t make a difference.

With the older firmware I was able to make all those configurations (the exact same ones) and after rebooting, the router connects to the WiFi and everything works correctly.

I couldn’t get a syslog because the router gets stuck because of what I said before (if I only change "wireless mode" to "client" the router gets in that state).

Maybe the issue is related to a default configuration that wasn’t default in the older firmware?

I tried upgrading the router through its web interface (without reseting to default configurations) and the router starts and connects to the WiFi and is accessible through the browser. Seems to work without problems after on/off as well.

However if I reset to default configurations and try to apply my configurations manually, the router gets stuck again.

I made a backup when I installed the lastest firmware through the web interface and tried restoring it through the web interface, the same happens, the router gets stuck.

The only way I can bring my configurations to newer firmwares is by doing them on the older firmware and then, upgrading to lastest through the DD-WRT web interface.

At this point I don’t know if it is a router hardware issue or a firmware issue when trying to write new configurations to the router. Changing the IP address to 192.168.2.1 in the newer firmware does not lock the router, it only locks when trying to change the wireless configurations.

How to turn off contact and event suggestions in apple mail

Matt Klein
How to turn off contact and event suggestions in apple mailMatt Klein
Writer

Matt Klein has nearly two decades of technical writing experience. He’s covered Windows, Android, macOS, Microsoft Office, and everything in between. He’s even written a book, The How-To Geek Guide to Windows 8. Read more.

How to turn off contact and event suggestions in apple mail

Apple products come preinstalled with an email client that can, on occasion, be quite smart. Today we want to show you another great feature: suggestions for event and contacts.

Apple Mail has a lot of nice things going for it. For example, you can easily markup attachments and send them back to the original recipient, and then there are Smart Mailboxes, which let you sort email into special “smart” mailboxes without actually moving it from its original location.

The idea behind event and contact suggestions is simple and not entirely new or original, but quite convenient and powerful. We like it because it makes short work of what has typically been a fairly tedious process.

To illustrate what this feature entails, let’s see an example in an email. Here’s an address included at the tailend of a message we received the other day.

If we hover over the address, a small arrow indicating a dropdown menu appears.

How to turn off contact and event suggestions in apple mail

Clicking on that arrow spawns the following dialog, which gives up three options, we can open the address in Maps, create a new contact, or add it to an existing one.

How to turn off contact and event suggestions in apple mailIf you decide to open an address in Maps, it will then let you get directions to it from your current location.

The nice thing is, utilizing this contact-adding method doesn’t even spawn the Contacts application. We can perform the procedure simply and easily from Mail, then go back to attending to our email.

How to turn off contact and event suggestions in apple mail

In some cases, Mail already knows when an email contains a contact and will alert you at the top of the message.

How to turn off contact and event suggestions in apple mail

If you click the “Add” button, it will again let you add it to your contacts without first needing to open the actual Contacts app.

How to turn off contact and event suggestions in apple mail

Here’s another example, this time with an event. In this message, there’s a date and time, which when hovered over with the mouse pointer, again shows us an arrow.

How to turn off contact and event suggestions in apple mailYou don’t actually need to highlight the date and time, Mail already knows what to do.

Clicking that arrow will then let us add it to our calendar. At the very least, you might want to add a title to the event, but you can also add or fix the location details and the calendar to which it will be assigned.

How to turn off contact and event suggestions in apple mail

If you click the “Details” button however, you can add further details particularly the location, but also to add an alert, invitees, and notes or attachments.

How to turn off contact and event suggestions in apple mail

Similar to adding contacts, if you receive a message and it detects an upcoming event, you will have the option to add it to your calendar using the “Add” button.

How to turn off contact and event suggestions in apple mail

And, just like before, a dialog will appear that will let you save it to your calendar.

How to turn off contact and event suggestions in apple mail

Hopefully you can see the value of the suggestions feature in your daily life. Instead of having to create new contacts (or update them) by copying the info from one app to another, this seamlessly lets you add it without ever leaving the Mail app.

Similarly, if you find yourself often spacing events, you can now add them as soon as they appear in your inbox.

This should save you lots of time and effort so now that you know where to look for it and how to utilize it, you have one more method to will help you become more organized and reliable.

  • › How to Turn Off Contact and Event Suggestions in Apple Mail
  • › Roborock Q5+ Review: A Solid Self-Emptying Robot Vacuum
  • › The 5 Most Ridiculously Expensive Phones of All Time
  • › What Does “Touch Grass” Mean?
  • › Every Microsoft Windows Logo From 1985 to 2022
  • › Samsung T7 Shield Review: The Best Portable SSD, Now Rugged
  • › What’s New in Chrome 101, Available Now

How to turn off contact and event suggestions in apple mail Matt Klein
Matt Klein has nearly two decades of technical writing experience. He’s covered Windows, Android, macOS, Microsoft Office, and everything in between. He’s even written a book, The How-To Geek Guide to Windows 8.
Read Full Bio »

How to turn off contact and event suggestions in apple mail

Even if you don’t know what event, contact, and location suggestions are, you’ve probably seen at least one of them floating around on your Mac.

Simply put, when things are suggested to you, it’s your Mac’s way of saying “you have a text from a stranger, they said in the text their name is Tanya, so therefore we’re going to suggest that the contact is named Tanya”.

While some people absolutely love this feature and find it helpful with not only their contacts, but locations and events, others might be somewhat annoyed with the constant bombardment of incorrect/wonky/not-as-right/annoying suggestions.

Whether you fall into group A or group B, here’s how you can enable or disable contacts, location, and event suggestions!

How to enable or disable contact suggestions

    Launch your Contacts from your home screen.

Click Contacts in the upper right-hand corner.

How to turn off contact and event suggestions in apple mail

Click Show Contacts Siri Found in Apps to enable or disable your suggested contacts feature.

How to turn off contact and event suggestions in apple mail

A reminder will appear on screen and read that doing this would delete any unconfirmed contact suggestions.

How to enable or disable location suggestions

    Launch System Preferences.

Click Security & Privacy.

How to turn off contact and event suggestions in apple mail

Click on the lock and key in the lower left corner. This will allow you to make changes.

How to turn off contact and event suggestions in apple mail

Click on System Services. You might have to scroll for a second to find it.

How to turn off contact and event suggestions in apple mail

Click to uncheck the box for Location-Based Suggestions to turn the feature off, or check the box to turn the feature on.

How to turn off contact and event suggestions in apple mail

Click Done When you’re finished to finish up turning on/off your location services.

How to enable or disable event suggestions

    Launch your Calendar from your home screen.

Click Calendar in the menu bar on the top left of your screen.

How to turn off contact and event suggestions in apple mail

Click Show Siri Found in Apps Calendar to enable or disable your suggested events feature.

How to turn off contact and event suggestions in apple mail

A reminder will appear on screen and read that doing this would delete any unconfirmed event suggestions from your calendar.

What’s your preference?

Are you a big fan of having things like location and contact suggestions pop up on your screen, or would you rather they go away and stay away?

How to turn off contact and event suggestions in apple mail

Removing unwanted email suggestions from mail on your iPhone and iPad is necessary as these suggestions can pester you quite often. While you start typing email address in the email, there can be unnecessary suggestions of recently sent email IDs.

This feature doesn’t help you every time; moreover, if you accidentally tap on the wrong email id, your important email may fall into wrong inbox. To save the situation, there is a trick on your iPhone or iPad.

How to Remove Suggested Emails from Mail on iPhone/iPad

Step #1. Launch Mail app on your iPhone/iPad.

How to turn off contact and event suggestions in apple mail

Step #2. Tap on Compose icon to write a new email.

How to turn off contact and event suggestions in apple mail

Step #3. Tap in “To” field to type in Email ID.

How to turn off contact and event suggestions in apple mail

You will see that unwanted suggestions start appearing on your iPhone/iPad screen.

Step #4. Tap on (i) icon next to the email you want to remove from the suggested list.

A few options will appear like: Send Message, Share Contact, Create New Contact, Add to Existing Contact, and Remove From Recents.

Step #5. Tap on the last option of Remove From Recents.

How to turn off contact and event suggestions in apple mail

The email id will be deleted from the suggested list and will never appear. Follow the same steps to remove other unwanted Email IDs from the list.

If you use the deleted email address in future for some time, it will start appearing in the suggested email list in Mail app on your iPhone/iPad. This is a very helpful trick that eliminates unnecessary emails that distract your attention while you are writing a serious mail to your office colleague or boss.

How do you like this tip? Share your feedback with us in comment.

How to turn off contact and event suggestions in apple mail

iGeeksBlog has affiliate and sponsored partnerships. We may earn commissions on purchases made using our links. However, this doesn’t affect the recommendations our writers make. You can read more about our review and editorial process here.
Benj Edwards
How to turn off contact and event suggestions in apple mailBenj Edwards
Associate Editor

Benj Edwards is an Associate Editor for How-To Geek. For over 15 years, he has written about technology and tech history for sites such as The Atlantic, Fast Company, PCMag, PCWorld, Macworld, Ars Technica, and Wired. In 2005, he created Vintage Computing and Gaming, a blog devoted to tech history. He also created The Culture of Tech podcast and regularly contributes to the Retronauts retrogaming podcast. Read more.

How to turn off contact and event suggestions in apple mail

By default, your iPhone and iPad suggest a list of people whenever you tap the Share button. It’s easy to share things accidentally. Starting with iOS 14 and iPadOS 14, you can remove suggested contacts from the Share sheet.

The Problem: Contacts in the Share Sheet

Apple uses the Share menu for more than just sharing something with friends. It’s also how you perform actions on an item, such as duplicating a photo or saving a PDF to the Files app.

Depending on what you’re trying to do, seeing a list of your friends or family members pop up when you’re just trying to copy a file can be surprising. You might worry that a stray tap would share a link or piece of media with someone by accident. Luckily, starting with iOS 14 and iPadOS 14, it’s now easy to completely remove the list of sharing suggestions on the Share sheet.

How to turn off contact and event suggestions in apple mail

How to Remove People From the Share Menu

To remove these contacts from the Share menu, open “Settings” on your iPhone or iPad.

How to turn off contact and event suggestions in apple mail

How to turn off contact and event suggestions in apple mail

In “Siri & Search,” tap the switch beside “Suggestions when sharing” to turn it off.

How to turn off contact and event suggestions in apple mail

Exit “Settings.” The next time you tap “Share” in an app, you’ll notice that the list of sharing suggestions is now gone. Instead, you’ll just see the regular row of app icons and a list of potential actions below.

How to turn off contact and event suggestions in apple mail

This one small change can potentially bring a great deal of peace of mind to some iPhone and iPad users, but if you ever want to bring it back, just enable the “Suggestions when Sharing” option in Settings again.

How to Remove Contacts from Share Sheet in iOS 13 or Older

If you want to remove contacts from the Share sheet on an iPhone or iPad running an older operating system—in other words, iOS 13 or below on an iPhone and iPadOS 13 or below on an iPad—you’ll need to delete a conversation within the Messages app or within other apps that support Share extensions, such as Discord

Even if you’re running iOS or iPadOS 14, it’s possible to temporarily remove particular contacts from your Share sheet this way.

Deleting message threads is not an ideal fix, however, so if your device supports it, consider updating your iPhone to iOS 14 or updating your iPad to iOS 14 (or whatever newer operating system is available), and you’ll be able to completely disable contact suggestions in the Share menu. Good luck!

  • › Roborock Q5+ Review: A Solid Self-Emptying Robot Vacuum
  • › What’s New in Chrome 101, Available Now
  • › Every Microsoft Windows Logo From 1985 to 2022
  • › The 5 Most Ridiculously Expensive Phones of All Time
  • › Samsung T7 Shield Review: The Best Portable SSD, Now Rugged
  • › What Does “Touch Grass” Mean?

How to turn off contact and event suggestions in apple mail Benj Edwards
Benj Edwards is an Associate Editor for How-To Geek. For over 15 years, he has written about technology and tech history for sites such as The Atlantic, Fast Company, PCMag, PCWorld, Macworld, Ars Technica, and Wired. In 2005, he created Vintage Computing and Gaming, a blog devoted to tech history. He also created The Culture of Tech podcast and regularly contributes to the Retronauts retrogaming podcast.
Read Full Bio »

How to turn off contact and event suggestions in apple mail

Source: Bryan M. Wolfe/iMore

When you send an email using the Mail app for iPhone, iPad, or Mac, it uses pre-saved autofill results to suggest addresses based on your recent messages. But “recent” can be relative: You might see an outdated address appear in the suggestion list even though you’ve updated the person’s information in your Contacts app, or an address you don’t recognize and don’t want auto-populating. Luckily, there are a few ways to remove suggested contacts in Mail right on your iPhone or iPad, or by using your Mac or Windows PC. Here’s what to do.

Why does Apple store these contacts?

When you receive an email, Apple stores the metadata for those contacts in the Mail section of your iCloud account even if you don’t add them to your Contacts app. It does this so that you can quickly address new emails without having to either have the person in your contacts list or manually type out the entire address. The information is stored in metadata, which you can find while you’re logged in to iCloud.com.

How to remove suggested contacts in Mail

If you have removed an email address from your Contacts app but it still appears when you address a new email message, you can remove it with just a few clicks or taps.

On iPhone or iPad

    Open the Mail app.

Tap the Write mail icon in the bottom right corner of the screen.

How to turn off contact and event suggestions in apple mailSource: iMore

Tap Remove from Recents.

How to turn off contact and event suggestions in apple mailSource: iMore

On your Mac or PC

You can also remove suggested contacts in Mail from your Mac or PC computer. It’ll just take a few extra steps. Here’s what you need to do:

  1. Go to icloud.com on your web browser of choice.
  2. Enter your login credentials (and two-factor information if you have it set up).

Click on the Mail app.

How to turn off contact and event suggestions in apple mailSource: iMore

Confirm by pressing Remove from Recents.

How to turn off contact and event suggestions in apple mailSource: iMore

How to delete all contacts from recents in the Mail app on your Mac

You can use the following free tool from developer Sabri Haddouche to clear all your recent contacts, though it currently requires a bit of tech meddling in Safari’s developer console.

  1. Open Safari.
  2. Go to the Safari menu from the menu bar.

Select Preferences.

How to turn off contact and event suggestions in apple mailSource: iMore

Click on the Advanced tab. Make sure Show Developer Tools has been checked.

How to turn off contact and event suggestions in apple mailSource: iMore

Click on the Mail app.

How to turn off contact and event suggestions in apple mailSource: iMore

How to update a contact with a new email address in the Mail app

If an old contact sends you an email with a new email address, or if you want to update the current information of your contacts, you can do it easily within the Mail app. Here’s how!

  1. Open the Mail app.
  2. Tap the email with the new contact.

Tap the email address.

How to turn off contact and event suggestions in apple mailSource: iMore

If you want to update the email address to a contact you already have, you can tap on Add to existing contacts and select a contact you already have.

Make all the changes you need and tap Done in the upper right corner of the screen.

How to turn off contact and event suggestions in apple mail

Source: iMore

Once added, the new email address will show up as a suggested option in autofill in the Mail app.

Anything else?

Is there anything more you want to know about removing recent contacts from the Mail app for iPhone? Add your questions below and we’ll let you know.

Updated October 2020: Reflected latest iOS and macOS versions.

How to turn off contact and event suggestions in apple mail

These are the 10 best Kirby games of all time

Kirby has been around for over 30 years now and he’s been in over 30 video games as well. After analyzing his adventures, we’ve determined which ones are the best of the best.

How to turn off contact and event suggestions in apple mail

Betas never stop: The third beta for watchOS 8.6 is out now!

The third beta of watchOS 8.6 is now available to developers.

How to turn off contact and event suggestions in apple mail

Review: Twelve South’s Curve Riser elevates your iMac a bit too much

If you’re looking for a monitor riser for your iMac or Apple Studio Display, the Twelve South Curve Riser is likely one to avoid.

How to turn off contact and event suggestions in apple mail

With a quality keyboard case, your iPad Pro is practically a laptop

You can make your 10.5-inch iPad Pro work like a MacBook for you with the right keyboard case.

How to turn off contact and event suggestions in apple mail

AI assistants like Apple’s Siri are designed to “be in the right place at the right time” – in other words, predict what you want to do and make smart suggestions to streamline your day. In reality, that means Siri often makes suggestions in places like Search and the Lock Screen which you either appreciate or find distracting.

If you’re not a fan of Siri’s suggestions, you can easily turn them off on your iPhone, or just customize which apps can take advantage of Siri suggestions.

How to turn off Siri suggestions completely

1. Open the Settings app on your iPhone.

2. Scroll down and tap “Siri & Search.”

3. In the “Siri Suggestions” section, turn off each of the Siri suggestion options you want to disable. Swipe the button to the right to disable suggestions while searching, on the Lock Screen, on the Home screen, or when sharing.

How to turn off Siri suggestions for certain apps

When Siri notes a trend – such as you always start a particular app around noon – the AI will start to suggest you run the app at that time. If you like getting some Siri suggestions but don’t want Siri to make suggestions about certain apps, you can fine-tune the way Siri works.

1. If you’re not already there, start the Settings app and tap “Siri & Search.”

2. Scroll down to the list of apps and tap the app you want to modify.

3. On the app’s details page, you can tweak how Siri interacts with this app.

Чтобы использовать режим фокусирования, Вы можете включить его напрямую в Пункте управления или запланировать его автоматическое включение.

Включение режима фокусирования в Пункте управления

Откройте Пункт управления, коснитесь «Фокусирование», затем коснитесь режима фокусирования, который требуется включить (например, «Не беспокоить»).

Примечание. Если включен другой режим фокусирования, он отключается, когда Вы выбираете новый.

Чтобы выбрать время завершения режима фокусирования, коснитесь кнопки alt=”«Не беспокоить»” width=”31″ height=”30″ />, выберите вариант (например, «На 1 час» или «До моего ухода из этой геопозиции», затем коснитесь кнопки alt=”«На беспокоить»” width=”31″ height=”30″ />еще раз.

Когда режим фокусирования включен, его значок (например, кнопка для режима «Не беспокоить») отображается в строке состояния и на экране блокировки, и Ваш статус автоматически отображается в приложении «Сообщения». Люди, которые попытаются отправить Вам сообщение, увидят, что Вы отключили уведомления, но они все равно смогут уведомить Вас, отправив сообщение с пометкой «Срочно».

Примечание. Также можно включить или выключить фокусирование: откройте «Настройки» > «Фокусирование», коснитесь фокусирования, затем включите его.

Включение или выключение фокусирования с помощью Siri

Можно включить или выключить фокусирование с помощью Siri.

Siri. Скажите, например: «Включи фокусирование “Работа”» или «Отключи фокусирование “Работа”». Узнайте, как давать команды Siri.

Планирование автоматического включения режима фокусирования

Вы можете запланировать включение режима фокусирования в определенное время, когда Вы находитесь в определенной геопозиции или когда Вы открываете определенное приложение.

Откройте «Настройки» > «Фокусирование», затем коснитесь режима фокусирования, который требуется настроить.

Коснитесь «Добавить расписание» или «Добавить автоматизацию», затем установите время, геопозицию или приложение, в которых требуется включить этот режим фокусирования.

Чтобы этот режим фокусирования включался автоматически на основе таких параметров, как Ваша геопозиция, использование приложений и т. д., коснитесь «Смарт-активация», включите параметр «Смарт-активация», затем коснитесь в левом верхнем углу.

Примечание. Когда настроен режим фокусирования «Сон», он следует расписанию сна, установленному в приложении «Здоровье». Чтобы добавить или изменить расписание сна, коснитесь кнопки открытия режима сна в приложении «Здоровье». См. раздел Добавление или изменение расписаний сна в приложении «Здоровье» на iPhone. Вы также можете изменить время следующего отхода ко сну и время пробуждения. См. раздел Установка будильника на iPhone.

Отключение режима фокусирования

Закончив использование режима фокусирования, можно быстро отключить его, чтобы снова разрешить прием уведомлений. После отключения режима фокусирования он по-прежнему отображается в Пункте управления, и его можно использовать повторно.

Можно выполнить описанные ниже действия.

Коснитесь значка фокусирования на экране блокировки и удерживайте его.

Коснитесь включенного режима фокусирования, чтобы отключить его.

Удаление режима фокусирования

Если Вам больше не нужен настроенный Вами режим фокусирования, его можно удалить.

Откройте «Настройки» > «Фокусирование».

Коснитесь «Фокусирование», прокрутите к нижнему краю экрана, затем коснитесь «Удалить фокусирование».

Если Вы удалили стандартное фокусирование, для его повторной настройки откройте «Настройки» > «Фокусирование», затем коснитесь .

Используйте боковую кнопку или кнопку «Сон/Пробуждение» (в зависимости от модели устройства), чтобы включить iPhone. Для выключения iPhone можно использовать верхнюю кнопку (вместе с любой из кнопок громкости на некоторых моделях) или приложение «Настройки» .

Если iPhone работает некорректно, попробуйте его перезагрузить. Для этого сначала выключите, а затем включите iPhone. Если проблема сохранилась после выключения и включения устройства, попробуйте принудительно перезагрузить его.

Включение iPhone

Нажмите и удерживайте боковую кнопку или кнопку «Сон/Пробуждение» (в зависимости от модели iPhone), пока не появится логотип Apple.

Выключение iPhone

iPhone c Face ID. Одновременно нажмите и удерживайте боковую кнопку и любую из кнопок управления громкостью до появления бегунков, затем перетяните бегунок выключения в верхней части экрана.

iPhone с кнопкой «Домой». Нажмите и удерживайте боковую кнопку или кнопку «Сон/Пробуждение» (в зависимости от модели устройства), затем перетяните бегунок.

На всех моделях. Откройте «Настройки» > «Основные» > «Выключить» и перетяните бегунок.

My name is Jon and I am an independent technical adviser. Sorry to hear you are experiencing issues and I would really like to help you find a resolution.

1. Open Windows Live Mail
Click on “+” icon, which is to create a New Email.
In the address bar, enter the letter of the recipient whose address you want to delete.
The app displays all the addresses that commence with the input letter.
Right click on a single addresses existing in the drop down and you wish to delete from the autofill. This brings up a tiny box at the top, click Open contact.
Open Contact link after right clicking the email address
The People app will open with the address being highlighted. On the top right, click on Save button and store it with an existing contact.

To Disable Autofill Email Id Suggestions in Windows 10 Mail App It is suggested to assign it to a fake account that does not have an email address. For adding click the + icon and write a name. It is your choice to write the email id. and Click Save.
Return to contacts and right click on the address and Delete it.
Delete button to confirm.
Reboot the PC.

2. Open Windows Live Mail.
Press Ctrl + 3 using your keyboard.
Right-click on the contact to delete it if it is a single contact.
Highlight all contacts by pressing Ctrl + A.
Click Delete located on the Ribbon bar.
Click OK when you see the message

By suggestions I mean the drop down menu appear when you start typing, and it’s suggestions are based on what you’ve typed before:

for example when I type ‘a’ in title field, it will give me a ton of suggestions which is pretty annoying.Does anyone know how to turn that off? Thanks in advance.

How to turn off contact and event suggestions in apple mail

10 Answers 10

Help us improve our answers.

Are the answers below sorted in a way that puts the best answer at or near the top?

What you want is to disable HTML autocomplete Attribute.

Setting autocomplete=”off” here has two effects:

It stops the browser from saving field data for later autocompletion on similar forms though heuristics that vary by browser. It stops the browser from caching form data in session history. When form data is cached in session history, the information filled in by the user will be visible after the user has submitted the form and clicked on the Back button to go back to the original form page.

Here’s an example how to do it.

If it’s on React framework then use as follows:

Update

Here’s an update to fix some browsers skipping “autocomplete=off” flag.

How to turn off contact and event suggestions in apple mail

On Chrome, the only method we could identify which prevented all form fills was to use autocomplete=”new-password” . Apply this on any input which shouldn’t have autocomplete, and it’ll be enforced (even if the field has nothing to do with passwords, e.g. SomeStateId filling with state form values). See this link on the Chromium bugs discussion for more detail.

Note that this only consistently works on Chromium-based browsers and Safari – Firefox doesn’t have special handlers for this new-password (see this discussion for some detail).

Update: Firefox is coming aboard! Nightly v68.0a1 and Beta v67.0b5 (3/27/2019) feature support for the new-password autocomplete attribute, stable releases should be coming on 5/14/2019 per the roadmap.

While iPhones are loaded with tons of features to help you make your communications, one of these features is your iPhone contact shows maybe. You may have seen your iPhone showing maybe when you received a call or a text message from someone on your device.

This ‘maybe’ has created a big confusion for many users as it does not mean anything to end-user. That’s not the case though. There is a reason as to why your iPhone shows ‘maybe’ for some contacts.

The following guide should tell you why your iPhone contacts say ‘maybe’ and how you can fix iPhone maybe contact.

Part 1. Why Do My iPhone Contacts Say “Maybe”?

What causes your iPhone contacts say maybe?

Well, whenever you receive some content, say a text message from someone on your iPhone, your iPhone tries to find out who sent the message. Next time you get a call or a message from them, your iPhone tells you maybe it’s them who messaged you earlier.

If you find this feature a little strange and would not want it any further on your device, here’s how to get rid of it.

Part 2. Top 6 Ways to Fix iPhone Maybe Contacts

The following are some of the methods you can use to fix the maybe contacts issue on your iPhone. Once you have applied these methods, your iPhone will stop showing the maybe contact thing and you will see the person’s phone number instead on your screen. Let’s check out the available fixes for the issue:

Method 1. Turn Off Siri Suggestions On Your iPhone

How to turn off contact and event suggestions in apple mail

Launch the Settings app from the springboard of your iPhone and tap on Siri. Then, turn the toggle for the option that says Suggestions on Lock Screen to the OFF position. It should disable Siri suggestions and you will no longer see the maybe contact text on your iPhone.

Method 2. Toggle Off “Find Contacts in Other Apps” In Contacts Settings

Your iPhone keeps on trying to find your contacts in the apps you have installed on your device. That is one of the reasons why you see the maybe message as when iPhone finds a text or something and thinks it is, say John, it shows Maybe: John. You can prevent your iPhone from finding your contacts in other apps using the following instructions.

Open the Settings app on your iPhone and tap on Contacts followed by Siri & Search. Turn the toggle for Find Contacts in Other Apps to the OFF position to disable the feature.

How to turn off contact and event suggestions in apple mail

Method 3. Sign In & Out Of iCloud Account

How to turn off contact and event suggestions in apple mail

Open the Settings app on your iPhone and tap on your name. Tap on Sign Out on the following screen and you will be logged-out of your iCloud account. Sign back in using your login credentials and you should have fixed the issue.

Method 4. Delete and Then Add the Contact

How to turn off contact and event suggestions in apple mail

Launch the Contacts app, find the contact, tap on Edit, and tap on the Delete Contact button. Then, re-add the contact as you would any other phone number.

Method 5. Add Maybe Contacts to Your Contact List

How to turn off contact and event suggestions in apple mail

Open the message thread on your iPhone, tap on the phone number followed by i sign, and then tap on Create New Contact. Get the phone number added as a contact to your contacts list.

Method 6. Check the Apps that Have Access Your Contacts

If you still have the iPhone contacts showing “Maybe” issue, you may want to check the third-party apps that you have installed on your device and have access to your contacts. These apps may be playing around with your contacts and it could be the reason why you see maybe next to some of your messages.

Uninstall any apps that you feel are shady to resolve the issue.

Method 7. Get Rid of Maybe on iPhone with ReiBoot

If none of the above methods could help you fix the iPhone contacts comes with maybe issue, you may need to use a third-party software to fix the issue on your device.

Meet Tenorshare ReiBoot, a software by Tenorshare that deals with all kind of issues on iOS devices. It has helped thousands of users fix various kind of issues including the contact issues on their iPhones and it should help you too to fix your maybe contacts issue.

  • Download and launch the software on your computer. Plug-in your iPhone to your computer and click on Repair Operating System in the software.

How to turn off contact and event suggestions in apple mail

How to turn off contact and event suggestions in apple mail

How to turn off contact and event suggestions in apple mail

The above should have resolved the issue you were facing on your iPhone.

Conclusion

If your iPhone contact shows maybe and you wish to learn why it does so and how you can fix it, our guide above should shed a light on it and provide you with the methods to get rid of the issue on your iPhone.

Is it possible to turn off the new invite badge and the list of new invitations within the Calendar application on the iPhone?

My boss has his assistant review his invitations and accept/deny them for him, so he has no need to do this from his phone. He therefore doesn’t want to see the red badge on the Calendar app icon on the home screen, or the red badge in the bottom right hand corner of the screen within the Calendar application that says he has six new invitations, and he doesn’t want to see the list of new invitations upon clicking that button.

I’ve recreated this on my iPhone and have screenshots available as an example (however because I’m a first time poster it won’t allow me to post them). Any help someone could provide would be appreciated.

7 Answers 7

Actually, this functionality has been moved into the Notification settings for Calendar items (Settings > Notifications > Calendar).

In that view you’ll have the option to change notifications for: Upcoming Events; Invitations; Invitee Responses; and Shared Calendar Changes. Each one give the ability to select: whether its shown in notification center; notification sound; badge app icon; show on lock screen; and the alert style!

How to turn off contact and event suggestions in apple mail

There are two things that you can do here.

  1. Open Settings > Mail, Contacts, Calendars > Scroll down to the Calendars section (near the bottom), and change “New Invitation Alerts” to Off.
  2. In the Settings app, tap Notifications > select Calendars, and then turn off Calendars notifications in Notification Center (if desired), and set the Alert style to “None”, and, most importantly, turn “Badge App Icon” to Off.

Unfortunately, to the best of my knowledge, there is no way to specifically disable the Red badge that is inside the app. However, it is possible turning off “New Invitation Alerts” will have that effect.

How to turn off contact and event suggestions in apple mail

Most of the replies so far are outdated, but there are probably some like me still interested in this.

As of iOS 10, this is easy. Open Settings>Notifications>Calendar. From here you can disable certain alerts, including only those for Invites.

I just tested answering the invites with my phone in Airplane mode. It appears to remove the invite badge without sending a notification to the source.

Personally Apple should have a Dismiss option, but this method might just do the trick until they provide that option.

Instantly clear notifications in calendar inbox, never get those again:

Calendar > calendars Next to each calendar (shared/subscribed) is an “info” button. Click.

Shared Changes: turn off. This will instantly clear the inbox.

FYI: Below the color choices is Event Alerts: choose on/off to get notification for the upcoming events (day before, hour before, time to leave, etc), whatever alert option was initially used when event was created.

Settings > Notifications > Calendar: You can specify what to receive.
Here is a pic of the choices: How to turn off contact and event suggestions in apple mail

I’ve had this same issue and unfortunately there is no way to turn off the invitation count one sees on the bottom right of the calendar app. I’ve shut off all notifications (badges, banners, etc) for calendar and these still show up, at least until the invite is attended to in the email inbox. So if one’s admin is completing invites, the counter should in theory update in the calendar app in the bottom right corner.

My situation is a bit unique in that my personal account is part of a family domain hosted on outlook.com (no longer offered for new signups at Microsoft) and I receive counters for invites to other “shared” calendars that aren’t even mine (belong to spouse, child, etc). I think these calendars are being seen by the device as “other” calendars of mine, when in fact they are not mine. If I click “accept” it just reappears right back in that list of notifications in calendar. I’ve determined that because I don’t have edit rights to those other family members’ calendars, the server just rejects my “acceptances” and resends the invite. Endless cycle. Very annoying. Invitations to calendars shared with me should not result in those other individuals’ calendar invites coming to me.

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged iphone calendar .

Related

Hot Network Questions

To subscribe to this RSS feed, copy and paste this URL into your RSS reader.

Site design / logo © 2022 Stack Exchange Inc; user contributions licensed under cc by-sa. rev 2022.4.21.42004

By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy.

Benj Edwards
How to turn off contact and event suggestions in apple mailBenj Edwards
Associate Editor

Benj Edwards is an Associate Editor for How-To Geek. For over 15 years, he has written about technology and tech history for sites such as The Atlantic, Fast Company, PCMag, PCWorld, Macworld, Ars Technica, and Wired. In 2005, he created Vintage Computing and Gaming, a blog devoted to tech history. He also created The Culture of Tech podcast and regularly contributes to the Retronauts retrogaming podcast. Read more.

How to turn off contact and event suggestions in apple mail

Sometimes it seems like every app in the world wants to get our attention. If you’re not careful when starting up new apps, you’ll soon find yourself juggling annoying notifications on your iPhone or iPad. Here’s a quick way to turn off notifications without having to dig around in Settings.

First, if your device is not locked, launch Notification Center by swiping down from the top center edge of your screen. If your device is locked, the next step will work on the locked screen as well.

How to turn off contact and event suggestions in apple mail

You will see a list of notifications you’ve received recently.

How to turn off contact and event suggestions in apple mail

Swipe left on one of the notifications you’d like to get rid of.

How to turn off contact and event suggestions in apple mail

Tap “Manage” to get rid of future notifications from the app that sent the annoying message.

Here’s what the options here do:

  • Manage allows you to manage future notifications from the app, including turning them off.
  • View shows you an expanded preview of the notification, if available, and any quick actions the app offers. For example, you can quickly reply to messages in some apps and quickly archive emails from here.
  • Clear removes this particular notification from your screen but does not turn off notifications from the app.

How to turn off contact and event suggestions in apple mail

Tap “Turn Off” to stop seeing notifications from this particular app.

The Deliver Quietly option will instead allow you to receive future notifications from this app, but your device won’t make a sound or vibration when the notifications arrive.

How to turn off contact and event suggestions in apple mail

A pop-up confirmation message will ask if you really want to turn off all notifications from the app you chose.

Tap “Turn Off All Notifications.”

How to turn off contact and event suggestions in apple mail

From now on, you’ll no longer receive notifications from that particular app.

And there you have it. Peace at last.

Turn Notifications from an App Back On

If you change your mind and want to enable notifications from the app you just turned off, navigate to Settings > Notifications.

Scroll down the list of apps until you find the app you want and tap it. Then tap the “Allow Notifications” switch.

How to turn off contact and event suggestions in apple mail

The switch will turn green, and Settings will display other options you can configure to your personal preferences.

How to turn off contact and event suggestions in apple mail

  • › 5 Easygoing Video Games to Help You Relax in Stressful Times
  • › How to Quickly Mute Any Notification on iPhone or iPad
  • › How to Master Notifications on Your iPhone
  • › How to Quickly Turn Off Annoying Notifications on Apple Watch
  • › iPhone SE: How to Find Long-Press Notification Actions
  • › How to Disable Apple Music’s New Release Notification on iPhone
  • › How to Hide Group Message Alerts Other Than Mentions on iPhone and iPad
  • › Samsung T7 Shield Review: The Best Portable SSD, Now Rugged

How to turn off contact and event suggestions in apple mail Benj Edwards
Benj Edwards is an Associate Editor for How-To Geek. For over 15 years, he has written about technology and tech history for sites such as The Atlantic, Fast Company, PCMag, PCWorld, Macworld, Ars Technica, and Wired. In 2005, he created Vintage Computing and Gaming, a blog devoted to tech history. He also created The Culture of Tech podcast and regularly contributes to the Retronauts retrogaming podcast.
Read Full Bio »

As you must have noticed, the virtual keyboard on iPhone suggests words as you try to type something. If you find this distracting, you can easily Turn OFF Predictive Text Suggestions on your iPhone.

How to turn off contact and event suggestions in apple mail

Disable Predictive Text on iPhone

Predictive Text Feature on iPhone is designed to speed up your typing in iMessage and other Apps by offering word suggestions that you are most likely to type next.

These Predictive Word suggestions resemble your writing style as they are based on data collected from your past conversations.

If you feel that Predictive Text Suggestions are interfering with your thought flow or making you write in a particular way, you can easily disable Predictive Text Feature on iPhone.

1. Temporarily Disable Predictive Text on iPhone

You can temporarily disable Predictive Text on iPhone at any time by following the steps below.

1. Open iMessage App on your iPhone or iPad.

2. Open any Conversation and tap within the Message body to activate the virtual keyboard.

3. Once the Keyboard appears, start typing and you will see suggested words appearing on the grey bar above the first row of keyboard (See image below).

How to turn off contact and event suggestions in apple mail

4. Tap and hold on one of the predictive text suggestions and drag it down towards the keyboard.

For example, in the above case tap and hold on the suggested word Hey and just drag it towards the first row of the keyboard.

5. The predictive text bar will immediately shrink and you will see a white bar in the middle.

How to turn off contact and event suggestions in apple mail

This will disable the Predictive Text on your iPhone and you will be able to continue typing without being bothered by predictive text suggestions for the rest of your conversation.

At any time, you can activate Predictive Text on your iPhone by swiping the white bar upwards.

2. Permanently Disable Predictive Text on iPhone

You can completely disable the Predictive Text feature on your iPhone by following these steps.

1. Go to Settings > General > scroll down and tap on Keyboard .

2. On the next screen, move the toggle next to Predictive Text to OFF position.

How to turn off contact and event suggestions in apple mail

After this, you will no longer find your iPhone bothering you with word suggestions, whenever you use the onscreen keyboard.

Most of the apps on your iPhone, whether they were downloaded or there by default, have some type of notification system. Some apps use notifications a lot, while others restrict their notifications to critical information. The News app can send you a lot of notifications, so you may be wondering how to disable notifications from the Apple News app on your iPhone.

Keeping up with the news is a good way to stay informed about what is going on in the world. There are a lot of different apps in the App Store that can provide you with news from different sources, but there is a default News app on your iPhone that you can also use.

If you haven’t changed any of the settings for this News app, then it’s possible that you are receiving notifications for certain types of events. This is common for large events, and can be a helpful reminder that something is happening locally, in your country, or around the world. But if you have your own way of staying up to date, then these notifications from the News app may be unwanted. Our tutorial below will show you how to stop all notifications from the News app on your iPhone.

How to Turn Off Apple News Notifications on an iPhone

  1. Open Settings.
  2. Choose Notifications.
  3. Select News.
  4. Turn off Allow Notifications.

Our article continues below with additional information on turning off notifications from the News app on your iPhone, including pictures of these steps.

How to Disable Notifications from the News App on Your iPhone (Guide with Pictures)

The steps in this article were performed on an iPhone 7 Plus in iOS 12. By completing the steps in this guide you will be turning off the notifications for the default News app on the device. This won’t affect the notifications from any other apps on the device. If you would like to keep some of the News notifications rather than disabling all of them, then you will be able to do so from the menu in the last step of the guide below.

Step 1: Open the Settings app.

Step 2: Select the Notifications option.

Step 3: Scroll down and touch the News option.

Step 4: Tap the button to the right of Allow Notifications to turn them all off.

As mentioned above you can also choose to customize the different types of notifications from the menu in the last step, rather than turning them off all together.

If you would like t o change other things about the behavior of the News app you can go to Settings > News and see all of the options available for the app. This includes things restricting stories in the Today section and showing story previews.

With newer versions of iOS it’s finally possible to uninstall some of the default apps that you don’t use. Find out how to delete an app on an iPhone if you would like to get rid of some of the default ones that are taking up space.

Additional Sources

Matthew Burleigh has been writing tech tutorials since 2008. His writing has appeared on dozens of different websites and been read over 50 million times.

After receiving his Bachelor’s and Master’s degrees in Computer Science he spent several years working in IT management for small businesses. However, he now works full time writing content online and creating websites.

His main writing topics include iPhones, Microsoft Office, Google Apps, Android, and Photoshop, but he has also written about many other tech topics as well.

How to turn off contact and event suggestions in apple mail

With iOS 15, Apple lets you enable notification announcements on your connected AirPods. This is a great feature, no doubt, but we won’t be surprised if some users found it to be a bit of a constant disturbance. If you are one of those who wish to turn off the message announcement on Airpods, here is how you can do that.

There are three ways to stop Airpods from announcing notifications on your iPhone: Via Settings, Control Centre, and even your Apple Watch. Let’s take a look.

  • How to Turn Off Announce Notifications on AirPods using Settings
  • How to Turn Off Announce Notifications on AirPods using Control Centre
  • How to Turn Off Announce Notifications on AirPods using Apple Watch
  • How to Choose which Apps you get Siri Announcements from

How to Turn Off Announce Notifications on AirPods using Settings

First, open the Settings app on iOS and tap on the ‘Siri & Search’ option.

How to turn off contact and event suggestions in apple mail

Inside the ‘Siri & Search’ screen, select the ‘Announce Notifications’ option.

On the next screen, toggle ON the ‘Announce Notifications’ switch at the top.

How to turn off contact and event suggestions in apple mail
Now, toggle the ‘Headphones’ switch under ‘Announce When Connected to’ to ON position to make sure Siri reads out whenever you receive an important text or notification on your iPhone.

How to turn off contact and event suggestions in apple mail

Additionally, you can toggle ON the ‘CarPlay’ option under the same section if you want Siri to announce your incoming notifications when you’re driving. This will save you some time that it previously took you to manually tap on the screen every time you received a text when driving.

Since the new ‘Announce Notifications’ feature comes with the ability to respond to them hands-free, Apple has by default disabled a ‘Reply without Confirmation’ toggle so that Siri repeats whatever you just asked it to respond to. You can, however, enable this ‘Reply without Confirmation’ toggle to avoid an announcement from Siri every time you ask it to craft a message.

How to turn off contact and event suggestions in apple mail

How to Turn Off Announce Notifications on AirPods using Control Centre

Apple offers an easy way to enable or disable Announce Notifications by letting you toggle the feature on and off through your iPhone’s Control Center. But before we get there, you need to first add the Announce Notifications shortcut to the Control Center. To do that, open the Settings app on iOS and select ‘Control Center’.

Inside the Control Center, scroll down the ‘More Controls’ section and tap on the green ‘+’ button adjacent to ‘Announce Messages with Siri’ option.

How to turn off contact and event suggestions in apple mail

This will add the Announce Notifications shortcut to your Control Center. To access it:

  • On iPhones without Home Button: Swipe down from the top-right corner of your screen.
  • On iPhones with a Home Button: Swipe up from the bottom edge of any screen.

When Control Center appears, tap on the ‘Announce Messages with Siri’ shortcut (the square icon marked with a waveform) that you added earlier. This will turn off the feature and you will stop receiving notification announcements on AirPods.

How to Turn Off Announce Notifications on AirPods using Apple Watch

The method of turning off Announce Notifications on the Apple Watch is similar to that on the iPhone since both steps involve the Control Center. On the Apple Watch, tap and hold on the bottom of the screen and open the Control Center by swiping up on the screen.

Inside the Control Center, tap the Bell icon with a waveform to disable the Announce Notifications option if it has been enabled.

How to Choose which Apps you get Siri Announcements from

Once you have enabled the ‘Announce Notifications’ option inside Settings, you can configure which apps you want to get Siri announcements from individually.

On your iPhone

To do select which apps you get announcements from on your iPhone, open the Settings app on your iPhone and go to Siri & Search > Announce Notifications.

Inside the Announce Notifications screen, scroll down and select the app you want to configure announcements from under the ‘Announce Notifications From’ section.

On the next screen, toggle on the ‘Announce Notifications’ option inside each of the apps so that you only get the notifications you’re interested in hearing.

On Apple Watch

To do select which apps you get announcements from on your Apple Watch, open the Settings app.

Inside Settings, go to Siri > Announce Notifications.

You should see the list of apps that are installed on your iPhone and Watch. Tap on the apps you want to get audio notifications from.

That’s all there is to know about making Siri announce notifications on your iPhone.

How to turn off contact and event suggestions in apple mail

Ajaay

Ambivalent, unprecedented, and on the run from everyone’s idea of reality. A consonance of love for filter coffee, cold weather, Arsenal, AC/DC, and Sinatra.

I’m just trying to find out how to stop my phone from popping up notifications about two-factor authentication. I have turned this feature off on my apple id account and have never set it up on my phones. I am constantly seeing a pop up notification for two-factor authentication and my Setting app is constantly showing the red badge app icon notification. It is a bit annoying. Can anyone help? I’ve tried searching and am just too ignorant. I just get more and more frustrated trying to find some help.

iPhone 6s, iOS 10.3.1

Posted on Apr 13, 2017 10:03 AM

Helpful answers

I DO NOT appreciate IOS updates automatically turning on Two Factor Authentication without my approval. This is very disruptive and I am FORCED to change all passwords for my Apple ID accounts and re-login on all of my devices and all accounts used on each.

BTW, I also DO NOT like the INVOLUNTARY downloads of IOS updates. This uses my network bandwidth, which I must pay for, and for uses that I have not approved.

Both of this items show poor judgement and lack of concern for your customers and a lack of trust that we know what to do for ourselves.

Please stop both of these practices!

Apr 15, 2017 9:32 AM

I ran into the same issue, do not want the 2 step authentication. I went through all the steps required, but still had the pesky red #1 popping up beside the Two-Step Authentication as you show in your post. I finally clicked on that arrow and signed in with the new password which I had been required to set up. And Voila, it worked! No more red #1 tags on my my phone.

Apr 17, 2017 6:49 PM

How did you fix it? I’m having the same issue and I’ve tried everything.

May 14, 2017 8:09 AM

Actually, there are times when two factor authentication is the WORST thing you can do. My company purchases and provisions phones for many of our employees. Many of them do not have another Apple device that they can receive the Secret Squirrel unlock code on. Since it is a work device, they do not have any type of credit card or other personal information on it. In cases like this, it is almost impossible to get the account unlocked if something happens. The Apple Store cannot help, neither can the Apple help desk. You have to start the process to unlock the account online and in one case it took them 8 WEEKS to unlock the account due to the things mentioned above. That’s two months she was unable to use her work phone. Needless to say, I disable that on every new device we set up.

Jun 5, 2017 7:44 AM

I appreciate the suggestion. I’ve already done that, also. I’ve already signed in to my apple id account and turned off the two-factor authentication, updated my security questions, etc. I’ve updated to the latest software versions on all phones, synced them, restarted them, etc. Still nothing has worked. I’m frustrated because I don’t think this should be so difficult. And, I have to say, I feel like no one has actually read my original post because I already said I’ve tried these steps. I truly appreciate everyone talking to me as if I am a novice. I have already done the research, read the Apple articles, and tried all the suggestions I can find on the internet; nothing has worked. I am tired of companies making changes and forcing me to do things, while telling me I have a choice.

Apr 14, 2017 10:03 PM

Now I know you aren’t reading my posts. I have already completed the steps you outlined. Two-factor authentication is turned off on my Apple account and my phones. The only options showing to me now are to turn it on, as I showed in one of my previous screen shots. I still keep getting messages and a notification badge. As shown below.

Apr 15, 2017 7:43 AM

To be fair, I don’t know who you are or who you think you are; though I don’t appreciate being called stupid. Just because you don’t understand my posts doesn’t mean I have “a lack of knowledge”. I never “made a first request to sign in to a secure service” and was never sent “a verification code”. That is one of the big points of my entire issue. I like how you went to the typical response for someone who doesn’t know what is going on or a solution and just suggested that I ‘reimage’ the thing. I don’t need to restore my device to fix an issue I didn’t cause. I don’t know why I am loyal to Apple when they don’t seem to care about me and I never seem to receive any actual help. No need to send me anymore suggestions. I’ve figured it out on my own today and didn’t have to go Scorched Earth on my phones to fix it. Feel free to hurl some additional insults my why, if it makes you feel superior; perhaps pick on my spelling or grammar or something.

Apr 15, 2017 4:27 PM

Hey, how did you end up fixing it anyways?

Apr 15, 2017 11:15 PM

It may be the order in which I did certain things. It is also possible that, in my rage, I missed doing something that was laid out in the suggestions sent to me or the documents I read.

In any event, what I did was to grab all my devices and the first thing I did was sign out of my Apple ID account on all my devices and powered them off. Then, I signed in to my Apple ID account on my computer and verified that two-factor authentication was not turned on, that I had selected my security questions and that all my information was up to date. Then, one by one, I connected each of my devices to iTunes and ensured I had the most up to date OS and synced them. Then, I signed back in to my Apple ID on each device. When I did that, everything seemed to sync up and the notifications went away.

I understand the rationale behind using two-factor authentication and appreciate everyone’s advice. It is still possible I may activate the two-factor authentication at some point, if it is more secure. What I had is being forced to do things. I hate when my free will is taken away. I hate when things get complicated or require me to use more than one device to prove who I am; that defeats the purpose.

In any event, if it is helpful, this is what I did and it seemed to work. I hope it helps you. I’ll stop my ranting now and stop posting on this thread, unless someone asks me a direct question that requires a response.

To revist this article, visit My Profile, then View saved stories.

How to turn off contact and event suggestions in apple mail

To revist this article, visit My Profile, then View saved stories.

Apple’s iOS 15 has dropped. The latest version of the mobile operating system and its iPad equivalent, iOS 15.5, are rolling out around the world. Apple made the download available after announcing the iPhone 13 at its annual hardware event last week.

This story originally appeared on WIRED UK.

Even before it was released, iOS 15 proved controversial. Apple’s child safety tools were intended to be included in this update but have been put on indefinite pause after a surveillance backlash. It’s the second year in a row that a key new feature is missing as the new version of iOS launches.

Content

This content can also be viewed on the site it originates from.

Apple’s iOS 14’s app tracking controls—that stop advertisers tracking you across your phone—were delayed until May 2021 and were included in iOS 14.5 after Facebook and other advertising firms complained about their impact. But the complaints didn't stop Apple from introducing the changes.

Child safety tools aside, there are still plenty of new privacy and security features included with iOS 15. As with any new software update you should install the new system as soon as possible. Updates often include much more than new features, and they often squash new bugs and security vulnerabilities—a last-minute iOS 14.8 update, released just before Apple’s iPhone event, shows how important installing new software is.

While Apple has made iOS 15 available to download, it often takes a little while to roll out around the world, which means it might take slightly longer to reach some people than others. Here’s what you need to change when you get the update installed on your phone.

In iOS 14, Apple cleaned up app tracking. This time around it’s the hidden trackers that are tucked away in the emails you’re sent that are being targeted. These trackers most often come in the format of pixels inserted into the body, header, or footer of emails which beam back information about you to the email sender.

Apple’s new Mail Privacy Protection stops email senders—most often those sending marketing emails and newsletters—from seeing your IP address and when you open the message. Instead, it will route your IP address through multiple proxy servers and randomly assign you another IP address. Mail Privacy Protection isn’t turned on by default, instead, you want to go to Settings, Mail, Privacy Protection and turn on the option for Protect Mail Activity.

Apple has added an App Privacy Report into the Privacy section of Settings in iOS 15—turn it on by tapping on Record App Activity and toggling the option to on. The privacy report gives you a quick glimpse of which of your phone’s sensors each app has used in the past seven days and the domains it has connected to over this time.

You’ll be able to see how many times an app has accessed your photos, camera, microphone, and contacts during the past week (if you have granted them permission to do so). This gives you the ability to check, for example, whether an app really does need to use your microphone to operate. If an app isn’t using the permissions you’ve granted it then it is probably worth turning them off, at least temporarily.

In September 2017, Apple introduced Intelligent Tracking Prevention for the Safari web browser as part of iOS 11. ITP is Safari’s way of blocking the online tracking that follows you around the web as you browse—Apple’s machine learning is used to find which domains track your browsing and then strip away the data that’s stored on people’s phones.

The technology has moved on in the past four years and with iOS 15 Apple is giving the option to hide your IP address from trackers. It means websites can’t turn your IP address into an identifier, which they can then use to connect all your browsing. To turn on IP address hiding, go to Settings, Safari, Hide IP Address and then turn on the toggle for Trackers and Websites.

One of the biggest things you can do to protect yourself from hacking is to turn on two-factor authentication for all your online accounts. Most often with two-factor authentication you’ll have to enter a code—often generated by an app or sent via SMS—alongside your password to access your account.

Codes sent via SMS aren’t as secure as those generated by an app. With iOS 15, Apple is introducing its own authenticator—meaning you don’t have to use an app from another company. This way you can, if you prefer, keep yourself locked inside Apple’s ecosystem. You can set up verification codes in Settings, Passwords. They can then autofill when you sign in to a site using Safari.

Apple is bundling some of its more advanced privacy options with its iCloud+ subscription. As well as the bump in online storage available with iCloud+ there are also four privacy and security features that are reserved for those who pay. It’s the latest extension of Apple’s push into services.

First is Apple’s iCloud Private Relay—a VPN-like service that routes your web traffic through multiple servers and keeps your location private. Your web traffic is routed in two directions: this is to stop anyone, including Apple, from being able to work out what you’re looking at online. The first part involves servers owned by Apple encrypting the URLs you are visiting and then deleting information tied to it that could identify you. And at the same time another company—Apple says it is working with “trusted partners”—will assign a temporary IP address.

To turn on iCloud Private Relay, if you’re paying for iCloud+, visit Settings, tap on your name at the top of the screen, go to iCloud, Private Relay, and turn the option on. While it shares similar features with VPNs, the service isn’t exactly the same as it only works in Safari rather than across your entire device.

How to turn off contact and event suggestions in apple mail

Every technology tends to have an ambivalent attitude towards its users. A new gadget can have good features for some while the same machine can be useless for others. Moreover, in different situations, devices act differently. And this also enables users to judge how good or bad that device is.

But there is a third dimension to this argument. What if the device boasts only good features? And sometimes, it tends to be overly good to its users? Well, users would be bewildered by the device and would appreciate if makers could “tone down” the goodness of that gadget.

I experienced this while I was using Mail, Contacts, Calendars feature on my iPhone 6s. After installing iOS 9, it started scanning my inbox and finding events mentioned within the body of the message. Then this feature would use that info to add tentative events to my calendar. The logic is admirable: I should not forget about any small or big event coming next week or month.

I appreciate this extra effort of iOS 9, but it began to clutter my calendar with hundreds of events in a year. In this situation, I was left with only one option to prevent iPhone or iPad from adding events from Mail to Calendar.

How to Prevent iPhone/iPad from Adding Events from Mail to Calendar

Step #1. Open Settings app on your iPhone/iPad.

How to turn off contact and event suggestions in apple mail

Step #2. Scroll down and tap on Mail, Contacts, Calendars option.

How to turn off contact and event suggestions in apple mail

Step #3. Scroll down again until you reach CALENDARS section.

You can see an option: Events Found in Mail. It’s the last option on Mail, Contacts, Calendars screen.

Step #4. Now toggle off that option: Events Found in Mail.

How to turn off contact and event suggestions in apple mail

This action will save you from seeing those unnecessary events added from Mail to Calendar.

How to turn off contact and event suggestions in apple mail

iGeeksBlog has affiliate and sponsored partnerships. We may earn commissions on purchases made using our links. However, this doesn’t affect the recommendations our writers make. You can read more about our review and editorial process here.

Learn how to remove single calendar events and repeating events.

* This post is part of iPhone Life‘s Tip of the Day newsletter. Sign Up. *

Deleting events from your iPhone calendar is a simple process—with a few quick taps you can clear clutter of canceled appointments. There are two types of events you might want to delete from your iPhone: a single event and an event series. A single event is a one-time event saved in your Calendar app (such as your call with a friend). An event series is a recurring event (like your weekly coffee meeting on Fridays). In either case, the process is the same except that deleting a recurring event requires an extra step.

Delete a Single Event

  1. Open the Calendar app, and navigate to the event you wish to delete. You can do this by either searching for the event name at the top or tapping on the day of the event to view it.

How to turn off contact and event suggestions in apple mail

How to turn off contact and event suggestions in apple mail

How to turn off contact and event suggestions in apple mail

How to turn off contact and event suggestions in apple mail

Delete a Recurring Event

  1. Open the Calendar app, and navigate to the event you wish to delete. You can do this by either searching for the event name at the top or tapping on the day of the event to view it.
  2. Tap the event to select and open it.

How to turn off contact and event suggestions in apple mail

How to turn off contact and event suggestions in apple mail

  • Tap Delete This Event Only if you only want to delete this week’s event.
  • Tap Delete All Future Events if you want to remove the entire event series from your calendar. (Say goodbye to those Friday coffee meetings!)

How to turn off contact and event suggestions in apple mail

And just like that, you’re off to a great start on clearing that calendar clutter!

Location Services is designed to protect your information and enable you to choose what you share.

Location Services allows Apple and third-party apps and websites to gather and use information based on the current location of your iPhone or Apple Watch to provide a variety of location-based services. For example, an app might use your location data and location search query to help you find nearby coffee shops or theaters, or your device may set its time zone automatically based on your current location.

To use features such as these, you must enable Location Services on your iPhone and give your permission to each app or website before it can use your location data. Apps may request limited access to your location data (only when you are using the app or approximate location) or full access (even when you are not using the app or precise location).

For safety purposes, however, your iPhone’s location information may be used when you place an emergency call to aid response efforts regardless of whether you enable Location Services.

Location Services uses GPS and Bluetooth (where those are available) along with crowd-sourced Wi-Fi hotspot and cell tower locations to determine your device’s approximate location.

Your Apple Watch may use the location of your paired iPhone if it is nearby.

If Location Services is on, your iPhone will periodically send the geo-tagged locations of nearby Wi-Fi hotspots and cell towers (where supported by a device) in an anonymous and encrypted form to Apple, to be used for augmenting this crowd-sourced database of Wi-Fi hotspot and cell tower locations.

By enabling Location Services, location-based system services such as these will also be enabled:

• Routing and Traffic: While you are in transit (for example, walking or driving), your iPhone will periodically send GPS data, travel speed, and barometric pressure information in an anonymous and encrypted form to Apple, to be used for augmenting crowd-sourced road traffic and atmospheric correction databases. Additionally, when you open an app near a point of interest (for example, a business or park) your iPhone will send location data in an anonymous and encrypted form to Apple which Apple may aggregate and use to let users know if that point of interest is open and how busy it is.

• Significant Locations: Your iPhone and iCloud-connected devices will keep track of places you have recently been, as well as how often and when you visited them, in order to learn places that are significant to you. This data is end-to-end encrypted and cannot be read by Apple. It is used to provide you with personalized services, such as predictive traffic routing, and to build better Memories in Photos.

• Location-Based Suggestions: The location of your iPhone will be sent to Apple to provide more relevant recommendations. If you turn off Location Services for location-based suggestions, your precise location will not be sent to Apple. To deliver relevant search suggestions and news, Apple may use the IP address of your internet connection to approximate your location by matching it to a geographic region.

• Location-Based Alerts: Your iPhone and Apple Watch will use your location in order to provide you with geographically relevant alerts, such as a reminder to call someone when you get to a specific place, when to leave for your next appointment, or an app or shortcut recommendation based on where you currently are.

• Share My Location: You can choose to share your current location with others, on a temporary or ongoing basis, from within certain apps such as Messages and Find My.

• HomeKit: Your iPhone will use your location to control accessories when you arrive at or leave a specific location, such as turning on your lights when you get home.

• System Customization: Your iPhone will customize system appearance, behaviors, and settings using your current location, for example by automatically enabling Optimized Battery Charging when you are at home. This customization data does not leave your device.

• Apple Pay Merchant Identification: Your iPhone will use your current location to help provide more accurate merchant names when you use your physical Apple Card.

• Emergency Calls & SOS: When you make an emergency call, in addition to location already provided to emergency services, your iPhone or Apple Watch will make supplementary data available through the Enhanced Emergency Data service. This may include street address information if your current location is near the Home or Work address in your personal contact card (My Card). Triggering Emergency SOS will also send location to your emergency contacts at the end of the call.

The crowd-sourced location data gathered by Apple does not personally identify you.

By enabling Location Services for your devices, you agree and consent to the transmission, collection, maintenance, processing, and use of your location data and location search queries by Apple and its partners and licensees to provide and improve location-based and road traffic-based products and services.

You can disable Location Services at any time. To do so, go to Settings > Privacy > Location Services, and either tap to turn off global Location Services or turn off the individual location switch of each location-aware app or feature by setting it to Never. To disable Location Services for all websites, set the Location Services setting for Safari Websites to Never. You can also disable location-based system services by tapping System Services and tapping to turn off each location-based system service.

If you allow third-party apps or websites to use your current location, you are subject to their terms and privacy policy and practices. You should review the terms, privacy policies, and practices of such apps and websites to understand how they use your location and other information.

When auto-completion becomes more annoying than helpful

  • University of Vienna
  • Tweet
  • Share
  • Email
  • Tweet
  • Share
  • Email
  • Yahoo! Mail
  • Gmail

The Mail application in Mac OS X and macOS completes a recipient’s email address as you start typing it in the To, Cc, or BCC fields of an email if you used it before or entered it on a Contacts card. If you have used more than one address for that person, Mail displays all the options beneath the name as you type it, and you click on the one you want to use.

However, people change email addresses. There's a way to delete old or unwanted addresses from the Auto-Complete list in Mail. The Mail application remembers all new addresses automatically, and soon the auto-complete feature is useful again.

Delete a Recurring Email Address Using the Auto-Complete List

When you want to remove auto-complete addresses, you can do it by working directly in the Previous Recipients list. To remove an email address from the auto-complete list in Mac OS X Mail or macOS Mail:

Open the Mail application in Mac OS X or macOS.

Click Window in the menu bar and select Previous Recipients in the drop-down menu to open a list of individuals to whom you have sent emails in the past.

Entries are listed alphabetically by email address. Also included in the list is the date you last used the email address.

Select the search field and start typing the name or email address of the person you want to remove from the Previous Recipients list. You may see several listings for a person in the search results screen as you type.

Click on the email address you want to remove to highlight it and then click Remove From List button at the bottom of the screen.

If you want to remove all the listings for a person with more than one email address, click in the search results field, use the keyboard shortcut Command+A to select all the results, and then click Remove From List.

To remove several listings, hold down the Command key while you select multiple entries. Then, click the Remove From List button.

This method does not remove email addresses that are entered on a card in the Contacts application.

Remove Previous Email Addresses From Contacts Card

If you've entered information for individuals on a Contacts card, you can't delete their old email addresses using the Previous Recipients list. For those people, you must open the Contacts application. Locate the individual's card and manually remove the old email information.

If you want to confirm that the email address has been removed, open a new email and enter the recipient’s name in the To field. You won’t see the address you just removed in the list that appears.

I get wrong suggestions for email addresses and am unable to delete them. The locked thread on this problem states that there is a cross to delete suggested addresses, see:

but I don’t have any crosses, nor on right button click, see:

The wrong addresses are not in any of my address databases shown in Outlook and I’ve spent an hour searching but can’t find where they are stored.

Moved from Outlook / Windows 10 / Microsoft 365 Apps or Office 365 Business

  • Subscribe
  • Subscribe to RSS feed

Report abuse

Replies (5) 

Thanks for your post and share above information with us.

About this issue, please go to File > Options > Mail > Send messages, click on the button Empty Auto-Complete List to clear all entries from the Auto-Complete List and check if this will make any difference.

Moreover, when this incorrect address shows, you can try to click on this incorrect email address, when it shows in the To: field, right click on the email address and select the option “Add to Outlook contacts”, then you can modify the email address of this contact to the correct one and click Save.

Then you can check if the contact will display the correct email address in the “Suggested” address list the next time you enter the contact name in the To: field.

If you need further assistance, please kindly share following information with us for analysis:

1. A screenshoot of your Outlook client version.

2. Do you use an Office 365 for Business account in Outlook?

Report abuse

1 person found this reply helpful

Was this reply helpful?

Sorry this didn't help.

Great! Thanks for your feedback.

How satisfied are you with this reply?

Thanks for your feedback, it helps us improve the site.

How satisfied are you with this reply?

Thanks for your feedback.

Thanks for the quick reply, Jennifer

Basically, I tried all of the above and the incorrect email is still there.

– ‘ File > Options > Mail > Send messages, click on the button Empty Auto-Complete List to clear all entries from the Auto-Complete List’. I closed Outlook and restarted it yet the suggested erroneous address is still there. I did this twice. The erroneous address is still there.

– click on this incorrect email address, when it shows in the To: field, right click on the email address and select the option “Add to Outlook contacts”, then you can modify the email address of this contact to the correct one and click Save. ‘ After modifying the email to the correct one and clicking Save it just prsent the correctt addreses and asks if I want to update it: t he incorect one doesn’t appear.

– deleting it in thee contact card: it asked if I wanted to save and I clicked yes. But it was still there aferwards and as a sggestion.

– when the wrong one is in the email To and I right click Open Contact card I have 4 options but no delete.

Microsoft Edge shows a list of search suggestions in the address bar to make it easier for the users. This feature is enabled by default in every Windows operating system. It also shows the favorites, history, and other browsing data when a user types in the address bar. This is a pretty common and useful feature in most browsers nowadays. However, some privacy concerned users may not like this feature on their browser. This also applies to a PC that is used by multiple users. There are methods through which users can simply disable this feature for the time being or for the long term.

Disabling Drop-down List through the Microsoft Edge Settings

The drop-down list suggestions can be disabled in the setting of the Microsoft Edge. This is the common and the default method for disabling and enabling this feature. However, if want to gray out this option or this option is grayed out for you in the Edge’s settings, then you can check other methods for that.

  1. Open the Microsoft Edge by double-clicking on the shortcut on the desktop or you can search it through the Windows search feature.
  2. Click on the Settings and more button (three dots) at the top right corner and then select the Settings option from the list.
  3. On the left pane, select the Privacy & Security option. Scroll down and turn OFF the toggle for the “Show search and site suggestions as I type” option. This will disable the drop-down suggestions list from Microsoft Edge.
  4. You can also enable it back any time by following the same steps and turning ON the toggle for that option.

Disabling Drop-down List through the Local Group Policy Editor

This method will disable the feature and also gray out the option from Microsoft Edge’s setting. The setting for this can be found in both the User Configuration and Computer Configuration categories of the Group Policy. Both will have the same path but different categories. It’s up to you if you want to set for a specific user or for the system. Follow the below steps to try it out:

Note: The Group Policy isn’t available in the Windows Home editions, so if you are using that operating system, then skip this method.

  1. Open a Run dialog box by pressing the Windows + R key combination on your keyboard, then type “gpedit.msc” in it and press the Enter key to open the Local Group Policy Editor.
  2. In the User Configuration category, navigate to the following path:

Note: You can also find the exact same setting in the Computer Configuration category. Choose the one that you want to set for your system.

Disabling Drop-down List through the Registry Editor

The alternative to the Group Policy method is by using the Registry Editor. Basically, the Group Policy setting will update our registry keys and value for that specific setting. We can also directly configure the setting in the Registry. Windows Home users can also use this method to gray out the drop-down list suggestion feature in the settings of the Microsoft Edge. It will have some of the technical steps for creating the missing key or value to make it work.

Note: We always recommend users to create a backup before making any new changes in the Registry.

  1. Press the Windows + R key combination on your keyboard to open a Run dialog box, then type “regedit” and press the Enter key to open the Registry Editor. If prompted by UAC (User Account Control), click on the Yes button.
  2. In the Current User hive, navigate to the ServiceUI key:

Note: You can also use the Current Machine hive for the exact same setting.

Note: Value data 1 is for enabling and value data 0 is for disabling. We need to disable the value to disable the drop-down suggestion list.

How to upgrade the windows 7 rc to rtm (final release)

For MS Technet subscribers the final version of Windows 7 was released recently. If you are unable to upgrade directly from the pre-release version – at least not without a fast and simple workaround – we can help.

The Problem

To prevent you from upgrading further Windows 7 checks if the current version you are running is a pre-release copy or not, and then prevents you from further upgrading. Just for reference this is the error message you receive when you try to make that upgrade.

How do you fix this?

The way around it is to edit a file which is inside the Windows 7 DVD – you will need to extract this to your hard drive before you proceed.

  • If you are using the DVD itself just simply copy all the files from the DVD into a folder on your hard drive.
  • If you are using an ISO image for the installation, you can simply use the 7-zip utility to extract the ISO to a folder on your hard drive.

Once you have extracted your file, browse to the *sources* folder to find the cversion.ini file.

Open up the cversion.ini file and you’ll notice that the MinClient line has a value of 7233.0, as the Windows 7 RC release is build 7100 you can see why it’s not working!

Simply change the MinClient value to something less than the current build you are using. For the RC release you can change it to 7000

All you need to do here is launch the setup.exe file from within the folder, and do your upgrade directly from your hard drive. Once you have started the setup, click *install now*

When you see this screen just choose to upgrade the existing install

When you have reached the Compatibility Report Screen (be happy if it doesn’t show up) you’ll see a list of applications that probably won’t work once you upgrade. Realistically while most of these apps will work just fine, the important thing is you will be able to upgrade.

TIP – You can always smooth the upgrade process by removing any apps that do have a compatibility problem, BEFORE you do the upgrade.

The upgrade should start working now, but it will take a long time.

Here are some important things to keep in mind when you are upgrading to the final version.

When possible you should back up all your files first and do a clean install. There are a lot less problems this way and you get the benefit of a nice clean profile

The Window 7 Beta or RC release were *Ultimate* editions, so you’ll only be able to upgrade to the RTM (final) if you are installing the Ultimate Edition.

Happy upgrading! If you think this in not your cup of tes, book a computer repairs technician now by calling 1300 883 021.

The final version of Windows 7 was released yesterday for MS Technet subscribers, but you can’t upgrade directly from a pre-release version—at least, not without a quick and easy workaround, and we’ve got you covered.
The Problem
Windows 7 checks whether or not the current version you are running is a pre-release copy, and prevents you from upgrading further. For reference purposes, this is the error you’ll see when you try and upgrade.

  • If you are using an ISO image for the installation progress, you can use the awesome 7-Zip utility to extract the ISO to a folder on the drive.
  • If you are using an actual DVD, you can simply copy all of the files from the DVD to a folder on your hard drive.

Once you’ve opened up the cversion.ini file, you’ll notice that the MinClient line has a value of 7233.0, and since the Windows 7 RC release is build 7100, you can understand why it’s not working.

All you need to do is change the MinClient value to something less than the current build you are using. For the RC release, you can change it to 7000.

Now you can simply launch the setup.exe file from within the folder, and do the upgrade directly from the hard drive. Once you’ve started the setup, click Install now.

Once you get to the type of installation screen, choose to Upgrade the existing install.

Once you reach the Compatibility Report screen (if it doesn’t show up at all, be happy about it), you’ll see the list of applications that probably won’t work once you upgrade. Realistically most of these apps will work just fine, but the important thing is that you’ll be able to upgrade.
Note: You could always smooth the upgrade process by removing any apps that have compatibility problems, before you do the upgrade.

At this point, the upgrade should start working, and will take a rather long time.

So you decided to try out Windows 7’s Release Candidate and you’re already dreading the day it expires and you have to format your computer and start fresh. You were probably disappointed to hear that you couldn’t upgrade your Release Candidate to the full Windows 7 version once it came out. Thankfully, you were being lied to.

There is only one thing stopping you from upgrading to the Release to Manufacturer version of Windows 7, and it is a mere text file. That’s right, you won’t need to bust ouf the hex editor or download any cracks to get this working.

Start off by extracting your ISO to a folder. Once that is done go into the sources folder and look for a file named cversion.ini. Open up this file and you should see the following:

Now edit the value for MinClient so that it is slightly less than what build you are currently running. You can determine your build number by looking at the bottom right corner of your desktop. So for example if you are running build 7100 you could set this to 7000.0 or lower. I have not tried this upgrade procedure with the earier Beta builds but as far as I am aware it will work as well. Unfortunately I was not aware of this method several weeks ago when I moved from Beta 2 to the Release Candidate.

I’m pretty excited about the upcoming launch of Windows 7, Microsoft’s next operating system. Not only because I’m running a very successful Windows 7 blog but also because I finally have the opportunity to install and use a new computer operating system.

Windows 7 has seen lots of praise since its first announcement and it is very likely that it will be a good – if not great – operating system that combines the best of Windows Vista and Windows XP.

Many users are already running a beta or release candidate build of Windows 7. Some even on their main computer system as Windows 7 has proven to be very stable and reliable.

These users may be interested in the following news: Microsoft is offering Windows 7 Upgrades to give users running specific Windows XP or Windows Vista operating systems the opportunity to upgrade to the new operating system.

Windows XP users will have to do a clean install but can purchase the Windows 7 Upgrade editions which are cheaper than the full retail editions.

Microsoft recently confirmed that it is also possible to upgrade a pre-RTM version of Windows 7 with a Windows 7 Upgrade edition. This means that users who are already running Windows 7 RC (or another build) can buy a Windows 7 Upgrade edition and get a full installation of Windows 7 this way.

That’s definitely an interesting strategy by Microsoft as it ensures that many users will adopt early or at least purchase a copy of Windows 7 for the discounted price.

There are some limitations on the other hand. No data will be taken over. The installation will move the old data into the folder windows.old from where the files are accessible. Most programs on the other hand will not work unless they are portable.

It also has to be noted that a clean install at a later time requires a Windows XP or Windows Vista installation (or a new installation of a pre-RTM build of Windows 7).

According to the answers in this question, upgrading from RC to RTM is a supported and tested upgrade path. Now that VS 2015 RTM is out I want to do exactly that. However, I can’t find out the interface menu to do it.

How do I upgrade Visual Studio Community 2015 RC to the RTM version?

5 Answers 5

I just did this today – I installed the RTM version of Visual Studio Community 2015.

All I had to do was download the installer file and it went through and updated everything to the RTM version. The only issue I had was missing Intellisense, so I had to close Visual Studio and run the ResetUserData flag. After I did that, Intellisense started working again.

Full Command (Start -> Run): devenv.exe /ResetUserData

This doesn’t open VS, but it cleared the data and I was able to restart. a few compatibility checker errors popped up, but I’m back running. Customization are gone, but for me it’s not a big deal to start fresh.

Update: For those also using ReSharper, I had to upgrade to the latest version (from 9.0 to 9.0 update 1) get it fully working. I ended up disabling it though as performance was suffering greatly. I will try investigating further later.

Update 2: I directed my coworker to update to the latest version, he received an error that he had a pre-release version of VS Web Express. We uninstalled the web express and we were able to continue.

Update 3: I’m no longer having any issues. I believe ReSharper pushed out another update and everything seems fairly smooth. ReSharper Version 9.1.3. There might be a few things here and there, but nothing that has been cause for me to regret upgrading. Pretty typical stuff. So far the reward has outweighed the risk. +1 to upgrade to VS 2015.

I’ve done this upgrade on two of my machines with no issues two of my own machines, and directed two other acquaintances to upgrade as well.

Blogger Brad Bird fully expects there to be a workaround to upgrade from Windows 7 RC directly to the RTM version. But would you want to do that?

Windows 7 has been around since early 2009 in either beta release or release candidate. The fact that this is a very stable client OS has been echoed time and time again throughout the IT community.

Microsoft released a statement that said to upgrade from Windows 7 beta to the RC version was not supported. As with most things in software, not supported and impossible are completely separate matters. Earlier I posted the workaround, which called for copying the installation source files to a rewritable location and then modifying a configuration file to, more or less, ignore an upgrade compatibility check, making such an upgrade possible for those who didn’t mind the risk.

Now that Microsoft has announced its public, release-to-manufacturing date (RTM) — when the product will be shipped and available on store shelves — many IT enthusiasts are wondering whether they should upgrade their current RC version to the public release.

Whether a similar workaround becomes available or not, it is my humble opinion that we should not be upgrading “test” software to “gold” software, no matter how stable the RC seems. When I say “gold” I mean the known-good, publicly available version. This software is always supported as its given, unless there are updates for the original code that are bundled or made publicly available during the release process to fix critical issues.

In the case of RTM software, I feel it is best to bring the system “back to basics,” meaning to wipe and install the operating system on a formatted hard disk. This will give the user the best chance to experience the software in its intended state.

IT enthusiasts will always attempt to push the limits and see what is possible. This is why I am certain that information will soon be released about upgrade possibilities. I simply don’t suggest doing so in any environment you rely on. Enjoy Windows 7!

What do you think about directly upgrading software releases? Would you try upgrading from RC to RTM, even for your home system?

Social Media, technology, and geeky stuff for your brain.

Let’s connect!

The final version of Windows 7 was released yesterday for MS Technet subscribers, but you can’t upgrade directly from a pre-release version—at least, not without a quick and easy workaround, and we’ve got you covered.

The Problem

Windows 7 checks whether or not the current version you are running is a pre-release copy, and prevents you from upgrading further. For reference purposes, this is the error you’ll see when you try and upgrade.

How to upgrade the windows 7 rc to rtm (final release)

The Solution

The solution is to edit a file inside the Windows 7 DVD—which you’ll have to extract to the hard drive to proceed.

  • If you are using an ISO image for the installation progress, you can use the awesome 7-Zip utility to extract the ISO to a folder on the drive.
  • If you are using an actual DVD, you can simply copy all of the files from the DVD to a folder on your hard drive.

Once you’ve extract the files, browse down into the “sources” folder to find the cversion.ini file.

How to upgrade the windows 7 rc to rtm (final release)

Once you’ve opened up the cversion.ini file, you’ll notice that the MinClient line has a value of 7233.0, and since the Windows 7 RC release is build 7100, you can understand why it’s not working.

How to upgrade the windows 7 rc to rtm (final release)

All you need to do is change the MinClient value to something less than the current build you are using. For the RC release, you can change it to 7000.

How to upgrade the windows 7 rc to rtm (final release)

Now you can simply launch the setup.exe file from within the folder, and do the upgrade directly from the hard drive. Once you’ve started the setup, click Install now.

How to upgrade the windows 7 rc to rtm (final release)

Once you get to the type of installation screen, choose to Upgrade the existing install.

How to upgrade the windows 7 rc to rtm (final release)

Once you reach the Compatibility Report screen (if it doesn’t show up at all, be happy about it), you’ll see the list of applications that probably won’t work once you upgrade. Realistically most of these apps will work just fine, but the important thing is that you’ll be able to upgrade.

Note: You could always smooth the upgrade process by removing any apps that have compatibility problems, before you do the upgrade.

How to upgrade the windows 7 rc to rtm (final release)

At this point, the upgrade should start working, and will take a rather long time.

How to upgrade the windows 7 rc to rtm (final release)

Important Notes

There are a few important things to keep in mind when you are upgrading to the final version:

  • The Windows 7 beta or RC releases were Ultimate edition, so you’ll only be able to upgrade to the RTM (final) if you are installing Ultimate Edition.
  • Whenever possible, you should really backup your files and do a clean install. There are less headaches this way, and you get the benefit of a nice clean profile.

I’m a groovy cat who’s into technology, Eastern Thought, and house music. I’m a proud and dedicated father to the coolest little guy on the planet (seriously, I’m NOT biased). I’m fascinated by ninjas, the Internet, and anybody who can balance objects on their nose for long periods of time.

I have a utility belt full of programming languages and a database of all my knowledge on databases. I practice code fu. Oh, I’ve also done actual Kung Fu, and have a black belt in Tae Kwon Do.

I run. I meditate. I dance. I blog at PaulSpoerry.com, tweet @PaulSpoerry, and I’m here on Google+.

I’m currently work for IBM developing web enabled insurance applications for IBM and support and develop a non-profit called The LittleBigFund.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Microsoft’s Windows 7 is an awesome Operating System. It’s bringing back all the glory that Microsoft lost with the release of Windows Vista OS. Several thousands of early adopters participated in testing phases (Beta & RC) of Windows 7 and most of them are running on Windows 7 RC now. I’m one such happy Windows 7 RC user

As the Windows 7 RC is set to expire sometime in the mid of 2010, these users should upgrade to Windows 7 final version at one point are other.

Microsoft is not supporting direct upgrade of RC to final version. If we run the upgrade process, we will be greeted with the following message and the installer terminates

You can’t upgrade this prerelease version of Windows 7. Go online to see how to install Windows 7 and keep your files and settings.

But luckily there is a simple trick that bypasses this version checking system and perform smooth upgrade without loosing any data or programs.

Here are the simple steps to be followed:

  1. Copy files of Windows 7 DVD to your local hard disk or external drive (If you got an Windows 7 ISO file then use 7-Zip app to extract the ISO).
  2. Browse to the sources directory.
  3. Open the file cversion.ini in a text editor like Notepad.
  4. Modify the MinClient build number to a value to 7000 (pictured below).
  5. Save the file in place with the same name.
  6. Run setup like you would normally from this modified copy of the image and the version check will be bypassed.

Note: As Windows 7 Beta & RC are Ultimate editions of Windows 7, we can only upgrade them to the final release of Windows 7 Ultimate edition. So you cant upgrade Windows 7 RC to Window 7 Starter or Home Premium or Professional editions the upgrade.

I thought MVPs were supposed to encourage customers to use Microsoft recommended methods instead of hacks found on the internet. An unauthorized hack found on the internet may work for you, but if the customer uses it who is going to provide support for this unauthorized hack? Are you going to provide the support?

I really don’t think an MVP should be promoting unauthorized hacks!
Perhaps your MVP status should be invalidated.

Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. ”

  • Proposed as answer by steve2050 Friday, September 3, 2010 12:49 PM
  • Unproposed as answer by Carey Frisch MVP Friday, September 3, 2010 9:58 PM

Just to put a few things in perspective:

1) I’m a Microsoft partner who has a great deal of interest in their products, especially Windows 7

2) As I have a msdn subscription, I was one among the few who got the R.C. and the RTM builds before the general public.

3) I tried to upgrade the R.C. to the RTM build, but i was unsucessful.

And as to the workaround this gentleman just referred to, I’m sure You can find a lot of hacks in the internet, but as this site is not dedicated to hacking, i could not show the workaround, because if this was such a site, I would have posted the workaround here.

4) And lastly, I’m not an amateur at this, I am a programmer with lots of experience developing on the windows platform.

I thought MVPs were supposed to encourage customers to use Microsoft recommended methods instead of hacks found on the internet. An unauthorized hack found on the internet may work for you, but if the customer uses it who is going to provide support for this unauthorized hack? Are you going to provide the support?

I really don’t think an MVP should be promoting unauthorized hacks!
Perhaps your MVP status should be invalidated.

Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. ”

  • Proposed as answer by steve2050 Friday, September 3, 2010 12:49 PM
  • Unproposed as answer by Carey Frisch MVP Friday, September 3, 2010 9:58 PM

Just to put a few things in perspective:

1) I’m a Microsoft partner who has a great deal of interest in their products, especially Windows 7

2) As I have a msdn subscription, I was one among the few who got the R.C. and the RTM builds before the general public.

3) I tried to upgrade the R.C. to the RTM build, but i was unsucessful.

And as to the workaround this gentleman just referred to, I’m sure You can find a lot of hacks in the internet, but as this site is not dedicated to hacking, i could not show the workaround, because if this was such a site, I would have posted the workaround here.

4) And lastly, I’m not an amateur at this, I am a programmer with lots of experience developing on the windows platform.

How to upgrade the windows 7 rc to rtm (final release)Microsoft’s Windows 7 is an awesome Operating System. It’s bringing back all the glory that Microsoft lost with the release of Windows Vista OS. Several thousands of early adopters participated in testing phases (Beta & RC) of Windows 7 and most of them are running on Windows 7 RC now. I’m one such happy Windows 7 RC user 🙂

As the Windows 7 RC is set to expire sometime in the mid of 2010, these users should upgrade to Windows 7 final version at one point are other.

Microsoft is not supporting direct upgrade of RC to final version. If we run the upgrade process, we will be greeted with the following message and the installer terminates

You can’t upgrade this prerelease version of Windows 7. Go online to see how to install Windows 7 and keep your files and settings.

But luckily there is a simple trick that bypasses this version checking system and perform smooth upgrade without loosing any data or programs.

Here are the simple steps to be followed:

  1. Copy files of Windows 7 DVD to your local hard disk or external drive (If you got an Windows 7 ISO file then use 7-Zip app to extract the ISO).
  2. Browse to the sources directory.
  3. Open the file cversion.ini in a text editor like Notepad.
  4. Modify the MinClient build number to a value to 7000 (pictured below).
  5. Save the file in place with the same name.
  6. Run setup like you would normally from this modified copy of the image and the version check will be bypassed.

How to upgrade the windows 7 rc to rtm (final release)

 

Note: As Windows 7 Beta & RC are Ultimate editions of Windows 7, we can only upgrade them to the final release of Windows 7 Ultimate edition.  So you cant upgrade Windows 7 RC to Window 7 Starter or Home Premium or  Professional editions the upgrade.

My journey in learning new ways to leverage Collaboration and Business Intelligence to improve business process.

Thursday, August 13, 2009

Upgrade Windows 7 RC to the Final RTM Release

To perform the hack for yourself, simply open up the cversion.ini file in the sources folder and change the MinClient value to 7000. Once you’ve done so, you can upgrade without any issues.

No comments:

Dream come true!

Me and Myrn

10th Anniversary

Me and Ethan

How to upgrade the windows 7 rc to rtm (final release)
Me and Ethan

A Thomas Family Christmas

How to upgrade the windows 7 rc to rtm (final release)

Montauk May 2009

My 33lb Stripper Bass

Montauk July 2008

How to upgrade the windows 7 rc to rtm (final release)
I’d rather be fishing.

iBIG Fat Boy!

alt=”iBIG Fat Boy!” width=”150″ height=”113″ />
Dream BIG!

100th Anniversary Fat Boy!

How I do.

Dylan and Ethan

How to upgrade the windows 7 rc to rtm (final release)

Me and My Baby

How to upgrade the windows 7 rc to rtm (final release)
Gotta love the V

If you have installed previous Windows7 Beta versions or Windows 7 RC (release candidate) version, in order to install the RTM version of Windows 7 you have to remove the previous Win7 setup and make a clean install of Windows 7.

Unfortunately a Windows 7 upgrade from Windows 7 RC is not supported by Microsoft or the Windows 7 Setup.
But there is still a work-around if you do not want to reinstall all your programs again on the new Windows 7 RTM version.
This work around for upgrading Windows 7 RC or previous Windows 7 Beta builds to Win7 RTM can be achieved by editing the cversion.ini file.

The contents of the cversion.ini file contains only minimum build numbers for a safe upgrade of Windows 7 systems.
The original cversion.ini file has the build number 7233.0 for the minimum client OS build identifying the minimum Windows 7 build which can be officially upgraded to Windows 7 RTM (Released to Manufacture) edition.
So when we alter the cversion.ini for a suitable build number which will let you continue installation process, we can finish successfully installing Windows7.

How to Edit cversion.ini File

cversion.ini file is in sources folder of the root of Windows 7 installation media or Windows 7 setup DVD.

Open the cversion.ini file with notepad application.
The contents of the cversion.ini file is as follows :

[HostBuild]
MinClient=7233.0
MinServer=7100.0

All Windows 7 RC users should do is changing the line “MinClient=7233.0” as something like “MinClient=7000.0 for example.

After saving the cversion.ini file, the Microsoft Windows 7 RC setup will be enabled for a proper Windows 7 upgrade.

Note that you might experience some minor problems. But all is in your risk.
I can say as a last word, I would install a clean Windows 7 for a perfect Windows 7 installation.

Times are changing and Microsoft is upgrading the operating system Windows to one level higher day by day. Now it’s the time of Windows 7 and the version of Windows 7 RC is going to expire soon and the upgraded version of the same is Windows 7 RTM (Release to Manufacturers).

If you have already got the package of RTM and it shows you an error as below while upgrading.

“You can’t upgrade this pre-release version of Windows 7. Go online to see how to Install Windows 7 and keep your files and settings”

If you are facing the same problem then we have a trick using which you can upgrade the version of Windows 7 RC to RTM. Before getting into this trick I would like you to know how it works. When we try install Windows 7 from the DVD then there is a file which looks for the previous version of the Windows 7 and if it finds the any lower version then it will deny the installation of the same.

The below steps will guide you to upgrade the Windows 7 RC to Windows 7 RTM:

Step 1: Copy all the files from the DVD to a folder on your drive.

Step 2: Inside the folder named “Sources”

Step 3: Look for the file “cversion.ini” and open with notepad.

Step 4: Find the following lines in the file

Step 5: Replace the number with 7233.0 with 7000.0

Step 6: Save this file.

Step 7: Now run the setup.exe

Now the Windows 7 RTM version will be installed believing that it is a non RC version. Upgrade your Windows 7 without any problems.

Phiên bản cuối cùng của Windows 7 đã được phát hành ngày hôm qua cho các thuê bao MS Technet, nhưng bạn không thể nâng cấp trực tiếp từ phiên bản tiền phát hành – ít nhất, không phải không có cách giải quyết nhanh chóng và dễ dàng, và chúng tôi đã bảo vệ bạn.

Vấn đề

Windows 7 kiểm tra xem phiên bản hiện tại bạn đang chạy có phải là bản sao trước khi phát hành hay không và ngăn bạn nâng cấp thêm. Đối với mục đích tham khảo, đây là lỗi bạn sẽ thấy khi thử và nâng cấp.

How to upgrade the windows 7 rc to rtm (final release)

Giải pháp

Giải pháp là chỉnh sửa một tệp trong DVD Windows 7 – bạn sẽ phải trích xuất vào ổ cứng để tiếp tục.

  • Nếu bạn đang sử dụng hình ảnh ISO cho tiến trình cài đặt, bạn có thể sử dụng tiện ích 7-Zip tuyệt vời để trích xuất ISO vào một thư mục trên ổ đĩa.
  • Nếu bạn đang sử dụng DVD thực tế, bạn chỉ cần sao chép tất cả các tệp từ DVD sang một thư mục trên ổ cứng của bạn.

Sau khi bạn giải nén các tập tin, hãy duyệt xuống thư mục nguồn của Pablo để tìm tập tin cversion.ini.

How to upgrade the windows 7 rc to rtm (final release)

Khi bạn đã mở tệp cversion.ini, bạn sẽ nhận thấy rằng dòng MinClient có giá trị 7233.0 và vì bản phát hành RC của Windows 7 là bản dựng 7100, bạn có thể hiểu tại sao nó không hoạt động.

How to upgrade the windows 7 rc to rtm (final release)

Tất cả những gì bạn cần làm là thay đổi giá trị MinClient thành giá trị nhỏ hơn bản dựng hiện tại bạn đang sử dụng. Đối với bản phát hành RC, bạn có thể thay đổi thành 7000.

How to upgrade the windows 7 rc to rtm (final release)

Bây giờ bạn có thể chỉ cần khởi chạy tệp setup.exe từ trong thư mục và thực hiện nâng cấp trực tiếp từ ổ đĩa cứng. Khi bạn đã bắt đầu thiết lập, bấm Cài đặt ngay.

How to upgrade the windows 7 rc to rtm (final release)

Khi bạn đến loại màn hình cài đặt, chọn Nâng cấp cài đặt hiện có.

How to upgrade the windows 7 rc to rtm (final release)

Khi bạn đến màn hình Báo cáo tương thích (nếu nó hoàn toàn không hiển thị, hãy hài lòng về nó), bạn sẽ thấy danh sách các ứng dụng có thể sẽ không hoạt động khi bạn nâng cấp. Thực tế hầu hết các ứng dụng này sẽ hoạt động tốt, nhưng điều quan trọng là bạn sẽ có thể nâng cấp.

Lưu ý: Bạn luôn có thể làm trơn tru quá trình nâng cấp bằng cách xóa mọi ứng dụng có vấn đề tương thích, trước khi bạn thực hiện nâng cấp.

How to upgrade the windows 7 rc to rtm (final release)

Tại thời điểm này, việc nâng cấp sẽ bắt đầu hoạt động và sẽ mất một thời gian khá dài.

How to upgrade the windows 7 rc to rtm (final release)

Ghi chú quan trọng

Có một vài điều quan trọng cần lưu ý khi bạn nâng cấp lên phiên bản cuối cùng:

  • Bản phát hành Windows 7 beta hoặc RC là phiên bản Ultimate, vì vậy bạn sẽ chỉ có thể nâng cấp lên RTM (bản cuối cùng) nếu bạn đang cài đặt Ultimate Edition.
  • Bất cứ khi nào có thể, bạn nên thực sự sao lưu các tập tin của mình và thực hiện cài đặt sạch. Có ít đau đầu hơn theo cách này, và bạn nhận được lợi ích của một hồ sơ sạch đẹp.

Chúc mừng nâng cấp!

Cái gì tiếp theo?

Chúng tôi đã có hơn 100 bài viết về cách sử dụng, tinh chỉnh và tối ưu hóa trải nghiệm Windows 7 của bạn. Chỉ cần vào trang danh mục Windows 7:

Over 8 million people tested Windows 7 when it was in development and I am sure many of you are still running the Windows 7 Release Candidate which expires in March 2010. You might have been running the RC in a production setup because of how stable and impressive the software is, especially for a pre-release product. At the same time, you are contemplating, how do I move to the final version of the software with my accumulated data on it? Can I simply do an in place upgrade from the RC to the final release? What about all my installed applications?

These are all good questions and its something I was curious about myself and decided to document. The first thing you should understand as a tester of pre-release software, means its pre-release and Microsoft is in no way responsible for anything that can happen running the software in a production environment. Yes, the software is very stable, especially since the first beta released back in January, but there are a few things users must know before deploying it and what happens when the software is going to expire. Here is a bit of information from Microsoft about the Windows 7 Upgrade path policies:

Upgrades to Windows 7 from the following operating systems are not supported:

  • Windows 95, Windows 98, Windows Millennium Edition, Windows XP, Windows Vista® RTM, Windows Vista Starter, Windows 7 M3, Windows 7 Beta, Windows 7 RC, or Windows 7 IDS
  • Windows NT® Server 4.0, Windows 2000 Server, Windows Server® 2003, Windows Server 2008, or Windows Server 2008 R2
  • Cross-architecture in-place upgrades (for example, x86 to x64) are not supported.
  • Cross-language in-place upgrades (for example, en-us to de-de) are not supported.
  • Cross-SKU upgrades (for example, Windows 7 N to Windows 7 K) are not supported.
  • Upgrades from Windows Vista to Windows N, Windows K, Windows KN, or Windows E are not supported. Cross-build type in-place upgrades (for example, fre to chk) are not supported.
  • Pre-release in-place upgrades across milestones (for example, Windows 7 RC to Windows 7 RTM) are not supported.

Q: Can computers running Windows 7 Release Candidate upgrade directly to Windows 7 Release to Manufacturer build?

A: Yes, but this is not a recommended or supported scenario. Microsoft recommends persons running the Release Candidate released in April 2009, reinstall Windows Vista and do upgrades from that release to Windows 7 RTM.

Q: Didn’t previous development versions of Windows support build to build upgrades?

A: True, but Microsoft has changed this policy for the Windows 7 release. They want users to test against real world scenarios. A build to build upgrade introduces unexpected complications that make it difficult to diagnose problems considering such scenarios do not exist in real world deployments.

You can learn more about the Windows Teams decision:

Q: What is the difference between Windows 7 RC and RTM?

Windows 7 RC software is a time limited build of the product that focuses on a phase of development. The Windows 7 RTM final release is a complete copy of the software that is designated as ready and fit for use in production environments. To reach Windows 7 RTM, a particular build has to go through a series of thorough regression test and optimizations to reach a level of quality satisfactory for production. Build 7600.16385 is that build and was completed on July 22nd 2009. Another major difference between Windows 7 RC and RTM (in particular Ultimate), with the RC it goes into Reduced Functional Mode on June 1st 2010, bi-hourly shutdowns will begin March 1st 2010. Windows 7 RTM does not expire, also the Windows 7 Ultimate RC are missing or won’t receive additional key updates and features such as Language Packs which was recently made available to RTM customers.

Tools of the trade:

So you want to move to the final product, but we now understand that in place upgrades are not supported and you must return to the prior installation of Windows and then upgrade to the final release. To make it easy, the first thing I recommend you do is have an external hard disk on hand, you are going to need this for Windows Easy Transfer, I am sure some of us have data that ranges in many gigabytes and a DVD disk is not gonna be enough or reliable for such a scenario. External hard disks are cheap and easy to use and make the migration process seamless.

The the next thing you will need to do is have your Windows installation disk nearby, if your computer previously had Windows Vista or XP installed, you will need to reinstall it after backing up your personal files and settings using Windows Easy Transfer the External hard disk. Also keep any necessary application disk nearby just in case you will need to reinstall any of your favorite programs. My migration was a unique one particularly because I was using Windows Vista Ultimate 64 bit SP2 prior to Windows 7. So, I was able to take advantage of the Complete PC Backup feature which is unique to Windows Vista Business, Enterprise and Ultimate. Complete PC Backup allows you to create a backup replica of your Windows Vista installation, so in case something catastrophic happens, you can restore your system from a image of your installation when it was working. No need to reinstall applications or device drivers. It is exceptionally convenient and easy to use. With the release of Windows 7, Microsoft has made System Imaging capabilities available in all editions of Windows 7.

If you are a tester who originally had Windows Vista Home Basic or Home Premium installed, prior to installing Windows 7 RC, you would have had to protect your files and settings using the Standard Backup and Restore tools or Windows Easy Transfer, since those editions do not include Complete PC Backup. This also means, if you reinstall Windows Vista Home Basic or Home Premium and restore personal files and settings using Windows Easy Transfer or Backup and Restore Center, your programs and device drivers must be reinstalled. Persons who used third party drive imaging tools such as Acronis Disk Director should not have to go through those steps since the capabilities available in that utility are identical in functionality where disk imaging is related.

Lets begin

How to upgrade the windows 7 rc to rtm (final release)

Here I am I booted to my Windows 7 Release Candidate desktop, the first thing I did was turn on my external hard disk, since that is where we will backup our Windows Easy Transfer .mig file. To start Windows Easy Transfer,

click Start, type: Windows Easy Transfer

How to upgrade the windows 7 rc to rtm (final release)

The Easy Transfer wizard will now begin, click next and follow the on screen wizard. Our particular choice for backup method will be done by saving the .mig file to a External hard disk.

I have been running the Release Candidate Windows 7 Ultimate (Build 7100) and am now looking to install the full version. My question is – Can I install the 64 Bit Version from the DVD without any problems – as an upgrade or Do I need to do a clean install? Or do I have to install the 32 Bit version only?

Edit: Is it possible to upgrade from the RC to Full Version (whether to a 32 or 64Bit) or would I need to rebuild the machine?

  • Subscribe
  • Subscribe to RSS feed

Report abuse

Pre-release in-place upgrades across milestones (for example, Windows 7 RC to Windows 7 RTM) are not supported.
For more details check out the link http://technet.microsoft.com/en-us/library/dd772579(WS.10).aspx

Its recommended you do a clean install.

Can computers running Windows 7 Release Candidate upgrade directly to Windows 7 Release to Manufacturer build?
A: Yes, but this is not a recommended or supported scenario. Microsoft recommends persons running the Release Candidate released in April 2009, reinstall Windows Vista and do upgrades from that release to Windows 7 RTM.

Q: Didn’t previous development versions of Windows support build to build upgrades?
A: True, but Microsoft has changed this policy for the Windows 7 release. They want users to test against real world scenarios. A build to build upgrade introduces unexpected complications that make it difficult to diagnose problems considering such scenarios do not exist in real world deployments.

How to upgrade the windows 7 rc to rtm (final release)

Die endgültige Version von Windows 7 wurde gestern für MS Technet-Abonnenten veröffentlicht. Sie können jedoch nicht direkt ein Upgrade von einer Vorabversion durchführen – zumindest nicht ohne eine schnelle und einfache Problemumgehung, und wir haben Sie abgedeckt.

Das Problem

Windows 7 prüft, ob es sich bei der aktuellen Version, die Sie ausführen, um eine Vorabversion handelt, und verhindert, dass Sie ein weiteres Upgrade durchführen. Zu Referenzzwecken wird dieser Fehler angezeigt, wenn Sie versuchen, ein Upgrade durchzuführen.

How to upgrade the windows 7 rc to rtm (final release)

Die Lösung

Die Lösung besteht darin, eine Datei auf der Windows 7-DVD zu bearbeiten, die Sie auf die Festplatte extrahieren müssen, um fortzufahren.

  • Wenn Sie für den Installationsfortschritt ein ISO-Image verwenden, können Sie mit dem awesome 7-Zip-Programm das ISO in einen Ordner auf dem Laufwerk extrahieren.
  • Wenn Sie eine echte DVD verwenden, können Sie einfach alle Dateien von der DVD in einen Ordner auf Ihrer Festplatte kopieren.

Wenn Sie die Dateien extrahiert haben, navigieren Sie zum Ordner "sources", um die Datei cversion.ini zu finden.

How to upgrade the windows 7 rc to rtm (final release)

Wenn Sie die Datei cversion.ini geöffnet haben, werden Sie feststellen, dass die MinClient-Zeile den Wert 7233.0 hat. Da die Windows 7 RC-Version Build 7100 ist, können Sie verstehen, warum sie nicht funktioniert.

How to upgrade the windows 7 rc to rtm (final release)

Alles, was Sie tun müssen, ist, den MinClient-Wert auf einen Wert zu setzen, der unter dem aktuellen Build liegt. Für die RC-Version können Sie sie auf 7000 ändern.

How to upgrade the windows 7 rc to rtm (final release)

Jetzt können Sie die setup.exe-Datei einfach aus dem Ordner heraus starten und das Upgrade direkt von der Festplatte durchführen. Wenn Sie das Setup gestartet haben, klicken Sie auf Jetzt installieren.

How to upgrade the windows 7 rc to rtm (final release)

Wenn Sie zum Installationsbildschirm gelangen, wählen Sie Upgrade der vorhandenen Installation.

How to upgrade the windows 7 rc to rtm (final release)

Sobald Sie den Bildschirm Kompatibilitätsbericht erreicht haben (wenn er überhaupt nicht angezeigt wird, freuen Sie sich darüber), wird die Liste der Anwendungen angezeigt, die nach dem Upgrade wahrscheinlich nicht funktionieren. Realistisch gesehen funktionieren die meisten dieser Anwendungen einwandfrei, aber es ist wichtig, dass Sie ein Upgrade durchführen können.

Hinweis: Sie können den Aktualisierungsvorgang jederzeit glätten, indem Sie vor dem Upgrade alle Apps entfernen, die Kompatibilitätsprobleme aufweisen.

How to upgrade the windows 7 rc to rtm (final release)

Zu diesem Zeitpunkt sollte das Upgrade funktionieren und wird ziemlich lange dauern.

How to upgrade the windows 7 rc to rtm (final release)

Wichtige Notizen

Beim Upgrade auf die endgültige Version sollten Sie einige wichtige Punkte beachten:

  • Die Betaversionen von Windows 7 oder die RC-Versionen waren Ultimate Edition. Daher können Sie nur dann auf RTM (final) aktualisieren, wenn Sie die Ultimate Edition installieren.
  • Wenn immer möglich, sollten Sie Ihre Dateien wirklich sichern und eine Neuinstallation durchführen. Es gibt weniger Kopfschmerzen auf diese Weise und Sie profitieren von einem schönen sauberen Profil.

Viel Spaß beim Upgrade!

Was kommt als nächstes?

Wir haben weit über 100 Artikel zur Verwendung, Optimierung und Optimierung Ihrer Windows 7-Erfahrung. Gehen Sie einfach zur Windows 7-Kategorieseite:

How to upgrade the windows 7 rc to rtm (final release)

Konečná verze systému Windows 7 byla včera propuštěna pro předplatitele MS Technet, ale nemáte možnost upgradovat přímo z předběžné verze – přinejmenším bez rychlého a snadného řešení, a my jsme vás zahrnuli.

Problém

Systém Windows 7 zkontroluje, zda je aktuálně spuštěná verze kopie před vydáním a zabrání dalšímu upgradu. Pro referenční účely je to chyba, kterou uvidíte při pokusu o inovace.

How to upgrade the windows 7 rc to rtm (final release)

Řešení

Řešením je upravit soubor uvnitř DVD systému Windows 7 – který budete muset extrahovat na pevný disk, abyste mohli pokračovat.

  • Pokud používáte obraz ISO pro pokrok v instalaci, můžete použít úžasný nástroj 7-Zip k extrahování ISO do složky na jednotce.
  • Pokud používáte skutečné DVD, stačí jednoduše zkopírovat všechny soubory z disku DVD do složky na pevném disku.

Po extrahování souborů přejděte dolů do složky "zdroje" a vyhledejte soubor cversion.ini.

How to upgrade the windows 7 rc to rtm (final release)

Jakmile otevřete soubor cversion.ini, zjistíte, že řada MinClient má hodnotu 7233.0 a od vydání Windows 7 RC je vybudováno 7100, můžete pochopit, proč to nefunguje.

How to upgrade the windows 7 rc to rtm (final release)

Vše, co musíte udělat, je změnit hodnotu MinClient na něco menší, než je aktuální sestava, kterou používáte. Pro vydání RC můžete jej změnit na 7000.

How to upgrade the windows 7 rc to rtm (final release)

Nyní můžete jednoduše spustit soubor setup.exe ze složky a provést upgrade přímo z pevného disku. Po spuštění instalace klikněte na možnost Instalovat nyní.

How to upgrade the windows 7 rc to rtm (final release)

Jakmile se dostanete k typu instalační obrazovky, zvolte Upgrade existující instalace.

How to upgrade the windows 7 rc to rtm (final release)

Jakmile se dostanete na obrazovku s kompatibilitou (pokud se vůbec neobjeví, buďte rádi), uvidíte seznam aplikací, které pravděpodobně nebudou fungovat po upgradu. Realisticky většina z těchto aplikací bude fungovat dobře, ale důležité je, že budete moci upgradovat.

Poznámka: Proces upgradu můžete vždy vylepšit odstraněním aplikací, které mají problémy s kompatibilitou, než provedete upgrade.

How to upgrade the windows 7 rc to rtm (final release)

V tomto okamžiku by aktualizace měla začít pracovat a bude trvat poměrně dlouho.

How to upgrade the windows 7 rc to rtm (final release)

Důležité poznámky

Při aktualizaci na konečnou verzi je třeba mít na paměti několik důležitých věcí:

  • Windows 7 beta nebo RC vydání byly vydání Ultimate, takže budete moci dokončit upgrade na RTM (finální), pokud instalujete Ultimate Edition.
  • Pokud je to možné, měli byste opravdu zálohovat soubory a provádět čistou instalaci. Existuje méně bolesti hlavy tímto způsobem a získáte výhodu pěkného čistého profilu.

Co bude dál?

Máme více než 100 článků o tom, jak používat, vyladit a optimalizovat své Windows 7 zkušenosti. Stačí se přesunout na stránku kategorie Windows 7:

Bagaimana Upgrade Windows 7 RC ke RTM (Final Release)

Versi final dari Windows 7 sudah diluncurkan. Tetapi tidak bisa untuk update secara lagsung dari pre-release ke final version / versi yang terakir.

Permasalahannya, windows akan mengecek dan apabila anda memakai pre-release, makan upgrade secara langsung tidak akan bisa di lakuka.

SOLUSI

Berikut akan di jelasakan step-by step update dari pre-release ke viersion yang terakhir.

Solusinya adalah mengedit file di dalam Windows 7 DVD. Dimana Anda harus mengekstrak ke hard drive untuk melanjutkan.

* Jika Anda menggunakan ISO untuk instalasi , Anda dapat menggunakan 7-Zip untuk mengekstrak ISO ke folder pada drive.
* Jika Anda menggunakan DVD instalasi, Anda dapat menyalin semua file dari DVD ke folder pada hard drive Anda.

Setelah Anda ekstrak file, browse ke dalam folder “sources” untuk mencari file cversion.ini.

Setelah anda buka file cversion.ini , Anda akan melihat bahwa MinClient memiliki nilai 7.233,0, dan karena Windows 7 RC rilis adalah membangun 7100, Anda dapat mengerti mengapa hal itu tidak bekerja.

Yang di butuhkan adalah mengubah MinClient = 7233.0 menjadi lebih rendah dari 7100. Misal dirubah menjadi 7000

Sekarang jalankan file setup.exe dari folder salinan windows7 yang berada di hard drive anda. Makan widows akan upgrade langsung dari hard drive. Setalah setup.exe berjalan kemudian klik Instal Now.

Setelah muncul pilihan instalasi, kemudian pilih Upgrade.

Setelah anda mencapai menu kompabilitas, (apabila tidak muncul kompabilitas, maka berbahagialah. D). Anda akan melihat daftar bebrapa aplikasi yang mungkin tidak berjalan setelah upgrade selesai. Tetapi sebagain besar aplikasi tersebut akan berjalan normal – normal saja.

Catatan: Proses upgrade akan berjalan mulus apabila anda menghapus semua aplikasi yang memiliki masalah kompatibilitas, sebelum Anda melakukan upgrade.

I wish to upgrade the RC Windows 7 to the RTM Windows 7. It is possible to get the RTM disk to accept the RC by altering a file, which I have done. I have avoided the problem of it refusing due to being unable to write to the mac partition via MacDrive. However when I use the update, it goes well until it gets to the part where it automatically restarts the system. When that happens, even if I have Windows as the default boot disk, it errors and just loads the normal Windows.

I tried burning the altered disk and running it via Bootcamp Assistant, but for some reason when I did so, it just booted Windows. What am I doing wrong here?

Macbook, Mac OS X (10.6.2)

Posted on Mar 4, 2010 8:06 PM

Does it matter. I think most people just read Boot Camp discussion, even if this is about installation.

Installing over RC or something may cut corners and avoid some reinstalling, but I wouldn’t.

If you use Disk Utility to burn a Windows DVD you need to do it at reduced burn speed, something like 2x or it won’t start the install, or it installs but doesn’t appear to work and run properly on restart.

I’d use Windows Easy Transfer for your data (hidden folders, Advanced options) and do clean install of all your apps and utilities. WET does a great job of returning your prefs and have the same desktop back.

An upgrade version to activate, I found it was easier to just reinstall over itself, to get it to activate (over the phone didn’t).

Posted on Mar 5, 2010 3:22 AM

All replies

Loading page content

Page content loaded

Mar 4, 2010 8:09 PM

Does it matter. I think most people just read Boot Camp discussion, even if this is about installation.

Installing over RC or something may cut corners and avoid some reinstalling, but I wouldn’t.

If you use Disk Utility to burn a Windows DVD you need to do it at reduced burn speed, something like 2x or it won’t start the install, or it installs but doesn’t appear to work and run properly on restart.

I’d use Windows Easy Transfer for your data (hidden folders, Advanced options) and do clean install of all your apps and utilities. WET does a great job of returning your prefs and have the same desktop back.

An upgrade version to activate, I found it was easier to just reinstall over itself, to get it to activate (over the phone didn’t).

Mar 5, 2010 3:22 AM

This is a reminder post for all the Windows 7 users still using the Release Candidate (build 7100) that was released to the public in May 2009. Bi-hourly shutdowns of this build began on March 1, 2010. This means that the user will be told to install a released version of Windows and their PC will shut down automatically every two hours. On June 1, 2010, if you are still on the Windows 7 RC, your license will expire and the non-genuine experience will be triggered. Your wallpaper will be removed and “This copy of Windows is not genuine” will be displayed in the lower right corner of your desktop, above the taskbar. Starting on February 15, 2010, Windows 7 RC should have started giving daily prompts to remind you about the expiration.
If you want to continue using Windows 7, we recommend moving over to the Windows 7 RTM (build 7600) that was released to the public in October 2009. Microsoft explained that this would happen when it gave out free copies of the beta (which has already expired) and RC builds, and you’ve had plenty of time to move over. If you haven’t reinstalled a final copy of Windows, do so as soon as possible so as to avoid problems in the next few weeks.

Officially Windows 7 does not allow upgrade path from prerelease version of Windows 7 such as Windows 7 Beta or Windows 7 RC (Release Candidate) to Windows 7 RTM, which has the build version 7600.16385. When user attempts to directly in-place upgrade Windows 7 RC or Beta or any pre-release version from within Windows 7 desktop itself to final Windows 7 RTM gold release, the setup will load, but stop at Compatibility Report, which shows the following error

You cannot upgrade this prerelease version of Windows 7. Go online to see how to install Windows 7 and keep your files and settings.

The blocked upgrade path is similar to Windows 7 RC, which does not allow in-place upgrade from Windows 7. The blocking of direct upgrade from beta, RC or prerelease builds to official RTM build is meant to avoid potential issues that may affect such upgrade path, as few tweaks and enhancements have been introduced during the development process, which may be skipped during build-to-build upgrade.

Microsoft recommends Windows 7 beta or RC users to perform a clean or fresh installation of Windows 7 RTM, and uses Windows Easy Transfer to save and transfer user accounts, Windows settings, program settings , personal customizations and files from current installation to newly installed Windows 7 RTM system.The mechanism built into Windows 7 RTM to block and prevent upgrade from all pre-release versions of Windows 7 earlier than build 7233 for client edition, including Windows 7 Beta Build 7000 and Windows 7 RC Build 7100. For Windows Server.

2008 R2, users can directly in-place upgrade from Windows Server 2008 R2 RC.

However, the hack similar to upgrade from Windows 7 Beta to RC can be used to hack the Windows 7 RTM installation DVD ISO to circumvent and bypass the blockage, in order not to be forced to exit gracefully from the upgrade.

Disclaimer: The following is no official advice or anything. I just did it and it worked ON MY MACHINE. Fell free to try but have a backup of your data.

The Windows 7 RTM bits will not allow an upgrade from an earlier version of Windows 7 (e.g. RC or beta). I belief that Microsoft did this to ensure that your new operating system works just fine and no beta and release bits get mixed up.

For the upgrade from the beta version to the release candidate quickly some patch occurred which allowed an upgrade. I used the same one and it works fine on my machine to upgrade Windows 7 RC to RTM.

What’s to do?

You need to change one file on the installation DVD. On way to do this is to copy all files to your computer, change the file and burn a new DVD. Since the upgrade will be run from within the already installed Windows 7 you do not need to boot from this DVD. I just copied all files to a USB drive and run the setup.exe from that drive. I belief you will be able to install Windows also from a directory on you local hard disk containing all the files from the DVD.

In the source folder you will find a text file named cversion.ini . The original file looks like:

Just change the MinClient number to the build version of you current Windows version. For the Windows 7 RC it will be 7100 .

The upgrade should work fine now. But if your new Windows 7 starts acting strange don’t blame Microsoft or me. Always remember you installed it with an unsupported patch.

2 Responses to “Upgrading Windows 7 RC to RTM”

  1. Andreas Heil Says:
    August 11th, 2009 at 6:12 pm

I was told today that upgrading RC to RTM does not stop the timebomb. So one should consider upgrading RC carefully.

How to upgrade the windows 7 rc to rtm (final release)

Microsoft made available for download Windows 7 Service Pack 1 (SP1) Release Candidate (RC) Build 6.1.7601.17105.100929-1730 and I thought I’d put together a small list of frequently asked questions (FAQ) and answers for testers. 1. What are the languages supported with Windows 7 SP1 RC? Just as for the Beta, Windows 7 SP1 RC is available in English, French, German, Japanese and Spanish.

2. When did Microsoft complete SP1 RC? The Build number indicates that the company signed off on the bits on September 29th, 2010.

3. Who can test Build 6.1.7601.17105.100929-1730? Well, Windows 7 SP1 RC is a public testing release, just as the Beta development milestone was. Still, this Build is designed for users with some experience in testing pre-release software, and not for end users to run day to day.

“The RC is best suited for IT Pros, tech enthusiasts, and developers who need to test the service pack in their organization or with the software they are developing. The final release of Service Pack 1 will be available through Windows Update for consumers when it is ready,” Microsoft said.

4. Are there any pre-requirements before installing SP1 RC? Not really. Just make sure you have Windows 7 RTM and that the operating system includes all the updates offered by Microsoft. In Windows Updates check for any refreshes you might have missed and deploy them ahead of installing the service pack.

5. I’m a Windows 7 SP1 Beta tester, what does installing SP1 RC mean for me? Users will need to first uninstall SP1 Beta before they deploy the Release Candidate. Upgrading from Windows 7 SP1 Beta to Windows 7 SP1 RC is not supported.

6. Will upgrades be supported from Windows 7 SP1 RC to Windows 7 SP1 RTM? Microsoft says that such upgrades will not be supported. Users will have to remove SP1 RC before they will make the jump to the final release of the service pack.

7. Is Windows 7 SP1 RC time-bombed? Yes. Like all Microsoft pre-release software, Windows 7 SP1 RC is time-bombed and set to expire on November 30, 2011. The platform will begin to highlight the imminent expiration date as of August 30, 2011.

Windows 7 SP1 RC will expire and be treated in a manner similar to non-genuine software even if the underlying Windows 7 RTM copy is perfectly genuine. Testers will need to upgrade to the RTM version of Windows 7 SP1 in order to avoid expiration.

8. Have any new features been introduced between the Beta and RC in SP1? No. And Microsoft will deliver no new feature for Windows 7 SP1 RTM.

9. When will Windows 7 SP1 be released to manufacturing and served to customers? Microsoft says that users will be getting Windows 7 SP1 RTM in the first half of 2011, most likely in the first quarter. But really, the actual availability deadline is anybody’s guess.

10. Is RC the final development milestone before RTM?

Absolutely. RTM is next in terms of the Windows 7 SP1 development process.

11. Can I perform a clean install of Windows 7 SP1 RC?

No. Microsoft is not offering public slipstreamed Builds of Windows 7 SP1 RC.

Windows 7 Service Pack 1 (SP1) Release Candidate (RC) Build 7601.17105.100929-1730 and Windows Server 2008 R2 Service Pack 1 (SP1) Release Candidate (RC) Build 7601.17105.100929-1730 are available for download here.

How to use a batch file to make powershell scripts easier to run

I am trying to run this script in PowerShell. I have saved the below script as ps.ps1 on my desktop.

I have made a batch script to run this PowerShell script

But I am getting this error:

How to use a batch file to make powershell scripts easier to run

How to use a batch file to make powershell scripts easier to run

9 Answers 9

Help us improve our answers.

Are the answers below sorted in a way that puts the best answer at or near the top?

You need the -ExecutionPolicy parameter:

Otherwise PowerShell considers the arguments a line to execute and while Set-ExecutionPolicy is a cmdlet, it has no -File parameter.

I explain both why you would want to call a PowerShell script from a batch file and how to do it in my blog post here.

This is basically what you are looking for:

And if you need to run your PowerShell script as an admin, use this:

Rather than hard-coding the entire path to the PowerShell script though, I recommend placing the batch file and PowerShell script file in the same directory, as my blog post describes.

you can convert any PowerShell script into a batch file easily using this PowerShell function:

To convert all PowerShell scripts inside a directory, simply run the following command:

Where is the path to the desired folder. For instance:

To convert a single PowerShell script, simply run this:

Where is the path to the desired file.

The converted files are located in the source directory. i.e., or .

Putting it all together:
create a .ps1 file (PowerShell script) with the following code in it:

And don’t forget, if you wanna convert only one file instead of many, you can replace the following

Aside – This post has received many tangential questions in the comments. Your best bet at getting an answer to those questions is to check Stack Overflow and/or post your question there.

A while ago in one of my older posts I included a little gem that I think deserves it’s own dedicated post; calling PowerShell scripts from a batch file.

Why call my PowerShell script from a batch file?

When I am writing a script for other people to use (in my organization, or for the general public) or even for myself sometimes, I will often include a simple batch file (i.e. *.bat or *.cmd file) that just simply calls my PowerShell script and then exits. I do this because even though PowerShell is awesome, not everybody knows what it is or how to use it; non-technical folks obviously, but even many of the technical folks in our organization have never used PowerShell.

Let’s list the problems with sending somebody the PowerShell script alone; The first two points below are hurdles that every user stumbles over the first time they encounter PowerShell (they are there for security purposes):

  1. When you double-click a PowerShell script (*.ps1 file) the default action is often to open it up in an editor, not to run it (you can change this for your PC).
  2. When you do figure out you need to right-click the .ps1 file and choose Open With –> Windows PowerShell to run the script, it will fail with a warning saying that the execution policy is currently configured to not allow scripts to be ran.
  3. My script may require admin privileges in order to run correctly, and it can be tricky to run a PowerShell script as admin without going into a PowerShell console and running the script from there, which a lot of people won’t know how to do.
  4. A potential problem that could affect PowerShell Pros is that it’s possible for them to have variables or other settings set in their PowerShell profile that could cause my script to not perform correctly; this is pretty unlikely, but still a possibility.

So imagine you’ve written a PowerShell script that you want your grandma to run (or an HR employee, or an executive, or your teenage daughter, etc.). Do you think they’re going to be able to do it? Maybe, maybe not.

You should be kind to your users and provide a batch file to call your PowerShell script.

The beauty of batch file scripts is that by default the script is ran when it is double-clicked (solves problem #1), and all of the other problems can be overcome by using a few arguments in our batch file.

Ok, I see your point. So how do I call my PowerShell script from a batch file?

First, the code I provide assumes that the batch file and PowerShell script are in the same directory. So if you have a PowerShell script called “MyPowerShellScript.ps1” and a batch file called “RunMyPowerShellScript.cmd”, this is what the batch file would contain:

Line 1 just prevents the contents of the batch file from being printed to the command prompt (so it’s optional). Line 2 gets the directory that the batch file is in. Line 3 just appends the PowerShell script filename to the script directory to get the full path to the PowerShell script file, so this is the only line you would need to modify; replace MyPowerShellScript.ps1 with your PowerShell script’s filename. The 4th line is the one that actually calls the PowerShell script and contains the magic.

The –NoProfile switch solves problem #4 above, and the –ExecutionPolicy Bypass argument solves problem #2. But that still leaves problem #3 above, right?

Call your PowerShell script from a batch file with Administrative permissions (i.e. Run As Admin)

If your PowerShell script needs to be run as an admin for whatever reason, the 4th line of the batch file will need to change a bit:

We can’t call the PowerShell script as admin from the command prompt, but we can from PowerShell; so we essentially start a new PowerShell session, and then have that session call the PowerShell script using the –Verb RunAs argument to specify that the script should be run as an administrator.

And voila, that’s it. Now all anybody has to do to run your PowerShell script is double-click the batch file; something that even your grandma can do (well, hopefully). So will your users really love you for this; well, no. Instead they just won’t be cursing you for sending them a script that they can’t figure out how to run. It’s one of those things that nobody notices until it doesn’t work.

So take the extra 10 seconds to create a batch file and copy/paste the above text into it; it’ll save you time in the long run when you don’t have to repeat to all your users the specific instructions they need to follow to run your PowerShell script.

I typically use this trick for myself too when my script requires admin rights, as it just makes running the script faster and easier.

Bonus

One more tidbit that I often include at the end of my PowerShell scripts is the following code:

This will prompt the user for keyboard input before closing the PowerShell console window. This is useful because it allows users to read any errors that your PowerShell script may have thrown before the window closes, or even just so they can see the “Everything completed successfully” message that your script spits out so they know that it ran correctly. Related side note: you can change your PC to always leave the PowerShell console window open after running a script, if that is your preference.

I hope you find this useful. Feel free to leave comments.

Update

Several people have left comments asking how to pass parameters into the PowerShell script from the batch file.

Here is how to pass in ordered parameters:

And here is how to pass in named parameters:

And if you are running the admin version of the script, here is how to pass in ordered parameters:

And here is how to pass in named parameters:

And yes, the PowerShell script name and parameters need to be wrapped in 4 double quotes in order to properly handle paths/values with spaces.

We are creating a custom powershell script that will uninstall AutoCAD 2016 products and install AutoCAD 2017 products. We have to do this by individual dept/studios after hours on several different days in the next couple of weeks.

Here is what i have so far and bolded the areas i need some additional assistance with.

If file exists C:\Program Files\Autodesk\AutoCAD 2016\Acad.exe then run uninstall bat script to remove programs, else skip down to 2017 file check/exist section skipping emails for 2016

$From mailto:[email protected]”>[email protected]
$to mailto:[email protected]”>[email protected]
$Subject = “Starting the uninstall of IDSU 2016 on $env:computername”
$Body = “Starting the uninstall of IDSU 2016 on $env:computername. Please wait”
$SMTP = “mail server”
Send-MailMessage -From $from -To $to -subject $Subject -Body $body -SMTPServer $SMTP
$batfile-2016U = “\\server.com\data\Software\Autodesk\IDSU2017\Install\Deployment\SMS_SCCM scripts\IDSU2016.bat”
Start-Process -ArgumentList “/c `’$batFile-2016U`'” -FilePath ‘cmd.exe’ how to get it to wait until all components have uninstalled and script has ran to completion before proceeding?

$From mailto:[email protected]”>[email protected]
$to mailto:[email protected]”>[email protected]
$Subject = “Completed the uninstall of IDSU 2016 on $env:computername”
$Body = “Completed the uninstall of IDSU 2016 on $env:computername”
$SMTP = “mail server”
Send-MailMessage -From $from -To $to -subject $Subject -Body $body -SMTPServer $SMTP

If file exists “C:\Program Files\Autodesk\AutoCAD 2017\Acad.exe” then go to exit, else run install .exe for 2017 install

$From mailto:[email protected]”>[email protected]
$to mailto:[email protected]”>[email protected]
$Subject = “Starting the install of IDSU 2017 on $env:computername”
$Body = “Starting the install of IDSU 2017 on $env:computername”
$SMTP = “mail server”
Send-MailMessage -From $from -To $to -subject $Subject -Body $body -SMTPServer $SMTP
$IDSU2017PD = \\server\data\Software\Autodesk\IDSU2017\Install\Deployment\Img
pushd $IDSU2017PD
Setup.exe /W /q /I Img\IDSU 2017.ini /language en-us how to get it to wait until all components have installed and script has ran to completion before proceeding?
popd

$From mailto:[email protected]”>[email protected]
$to mailto:[email protected]”>[email protected]
$Subject = “Completed the install of IDSU 2017 on $env:computername”
$Body = “Completed the install of IDSU 2017 on $env:computername”
$SMTP = “mail server”
Send-MailMessage -From $from -To $to -subject $Subject -Body $body -SMTPServer $SMTP

I am open to the best way to accomplish the following tasks below in the script. We will use a scheduled task GPO to kick it off on the filtered/targeted machines in the dept/studios at a specified time frame.

1. Needs to check if the following files exists. if it does then run the batch file that the AutoCAD deployments created for us.
C:\Program Files\Autodesk\AutoCAD 2016\Acad.exe if exists then run this .bat file to uninstall all products. if file does not exist then go to next file exist statement for 2017. if 2016 file exists, send email to IT dept before it uninstalls. send another email when uninstall completes then go to 2017 part of script to next if exist statement.

if C:\Program Files\Autodesk\AutoCAD 2017\Acad.exe exists then exit powershell script. if C:\Program Files\Autodesk\AutoCAD 2017\Acad.exe does not exist run this batch file script below

2. Will need both 2016 and 2017 batch files to wait until they are completed before advancing to the next line of text.

powershell run a batchfile or ps1 file on remote pc

I have some trouble to start a batchfile or ps1 file on a remote system with invoke-command. I know that when starting such a script or batch in powershell on a networkshare that there is some problems with double hop. So i first copy the files to the local system, that is a challenge already because i the copy command is in the batchfile or script that i want to execute on the remote pc or server.

What i have tried is directly read the batch or ps1 from a networkshare but that gives me a access denied, i think double hop. So then next:
$computerName = ‘testpc’
Copy-Item -path \\share\uninstalsp.bat -Destination \\$computername\c$\temp\uninstallsp.bat
Copy-Item -path \\share\bas.bat -Destination \\$computername\c$\temp\bas.bat
invoke-command -computername $computerName -scriptblock
invoke-command -computername $computerName -scriptblock

After this there is no error but nothing happens on the remote system. I have already had this before with other files, no error but nothing happens. In this example i try to uninstall a program, in the batchfile there are some registry keys changed and the uninstall certain software is executed so the last batchfile must wait for the first.

What am i doiing wrong? And how can i run this without copy the files to the local system and complicated double hop?

10 Answers

  • Sort by Created Created
  • Sort by Oldest Oldest
  • Sort by Votes Votes

In addition to Andreas’s comments, you are issuing a Start-Process but you are not waiting for it to finish. You would need to add -Wait to the command. But you would still be wondering what happened because you are not capturing stdout or stderr.

The path of the Copy-Item looks wrong: \\share\uninstalsp.bat
It should be \\computer\share\uninstalsp.bat

The destination of Copy-Item is an administrative share (`\\$computername\c$`).
The user running the script needs to be local administrator to access \\$computername\c$ .

On the remote computer the files are in C:\temp ?

(If the reply was helpful please don’t forget to upvote and/or accept as answer, thank you)

Regards
Andreas Baumgarten

Thanks andreas and MotoX, it looks like this is working

I would like to expand the script after this software is uninstalled in the same script install new software so i have added the line:

Get-Package -Name antivirus-oud | Uninstall-Package
Start-Process msiexec.exe -Wait “/i \\$computername\c$\temp\antivirus.msi /qn”

First one is to make sure antivirus-oud is uninstalled (although it is Sophos and there is always something left behind in programms) and the second one is installing a new virusscan. These commands i have put right beneath the copy-item commands and started a new copy-item at the begginning to copy the new antivirus msi to the local machine.

How ever it looks like the new antivirus install is popping up on my own computer when leaving /qn away. Must the line start process be elsewhere in the script?

These commands i have put right beneath the copy-item

Those statement need to be included in the script block so that they are invoked on the target pc.

You should also be adding error checking along the way to verify that a given step was successful before executing the next step.

Normally with an AV uninstall/reinstall, a reboot or 2 is required along the way.

I have done this but it looks like the install does not do anything. It says:
uninstall old software
install new software

The last 2 messages appear very quick and very quick after the message it comes with the prompt. The only thing i changed in your script is that i added 2 copy-item commands from the same share and to the same $computername right beneath the other 2 copy-item commands.
The lines: uninstall old software and install new software are displayed but i am in doubt that they are executed on the remote system.

I don’t know what commands or executables you have in your bat files. Do they contain any ECHO statements to display messages? If they don’t, add some like this example.

What logging options do the .exe’s provide? Can you specifiy the log file name as a command line switch? Add it and then do a Get-content to read the log file and display it.

!How to use a batch file to make powershell scripts easier to run

I have added what you mentioned but that displays on the screen, it does not add any troubleshooting. Still cannot see anuthing on the client machine, i think the msiexec is not starting or it does nothing. I cannot see any log in c:\temp in that machine.
Purpose is to deinstall Sophos and reinstall sophos. Maybe this is not nessecairy but that does not matter, this is also for future deinstallations and installation to know how powershell works with this on remote machines.

This is wat i have right now:

$sb = <
“Calling uninstall”
cmd.exe /c “C:\temp\uninstall-sophos-bas.bat” 2>&1
“”
“Calling Sophoszap”
cmd.exe /c “C:\temp\Sophosuninstall.bat” 2>&1
“Uninstall old software.”
Get-Package -Name Sophos | Uninstall-Package
“Install new software”
echo Bat file is starting. %date% %time%
Start-Process msiexec.exe -Wait “/i c:\temp\sophos_X64.msi /qn /l*v c:\temp”
set rc=%errorlevel%
echo someprogram ended RC=%rc%
echo Bat file is ending. %date% %time%
>
$computerName = ‘testpc’
Copy-Item -path \\server\path\Sophos_X64.msi -Destination \\$computername\c$\temp\sophos_X64.msi
Copy-Item -path \\server\path\Sophoszap.exe -Destination \\$computername\c$\temp\Sophoszap.exe
Copy-Item -path \\server\path\sophos\Sophosuninstall.bat -Destination \\$computername\c$\temp\Sophosuninstall.bat
Copy-Item -path \\server\path\uninstall-sophos-bas.bat -Destination \\$computername\c$\temp\uninstall-sophos-bas.bat
invoke-command -computername $computerName -scriptblock $sb

The echo commands need to go in the .bat files, not the PS script.

Edit C:\temp\Sophosuninstall.bat What statements are in it? Does it call msiexec, or some Sophos.exe?

Your start-process is wrong.

You could also use:

take a look to psexec from sysinternal tool. You can execute a script on remote computer with one/two lines

I want to execute vatch file though power shell script using the following command

“cmd.exe” /C “C:\Program Files\SmartBear\SoapUI-5.2.1\bin\mockservicerunner.bat” -m “BasicHttpBinding_ITwoWayAsyncVoid MockService”

it always gives me the Error

C:\Program is not recognised as an Internal or External COmmand

Can you Please hep me with this?

Answers

For proof create a batch file ‘test.bat’

====
@echo off
echo %1
echo %2
======

Place it in program files and run these two lines

& “$env:ProgramFiles\test.bat” -m BasicHttpBinding_ITwoWayAsyncVoid MockService

cmd /c $env:ProgramFiles\test.bat -m BasicHttpBinding_ITwoWayAsyncVoid MockService

  • Proposed as answer by Hello_2018 Sunday, October 2, 2016 11:57 PM
  • Marked as answer by Hello_2018 Monday, October 24, 2016 2:14 AM

All replies

cmd /C “C:\Program Files\SmartBear\SoapUI-5.2.1\bin\mockservicerunner.bat” -m “BasicHttpBinding_ITwoWayAsyncVoid MockService”

i have tried the above i still get the same error

An easier way is this:

$ProgramFiles\SmartBear\SoapUI-5.2.1\bin\mockservicerunner.bat -m BasicHttpBinding_ITwoWayAsyncVoid MockService

I think you need to wrap the parameters in their own quotes and escape those quotes.

In reality that command line needs no quotes if you use the environment variable for the folder path. Build the batch file and test it.

  • Edited by jrv Saturday, October 1, 2016 5:46 PM

Actually, I had the same issue just a few weeks ago. And the double quotes worked for me. But you’re right the folder path was not in my PATH environment variable. It gets quickly bloated when you append every single program path, doesn’t it. And we don’t know if the OP has it in his PATH!?

[By the way, you missed the $env: in your code alternative.]

Actually, I had the same issue just a few weeks ago. And the double quotes worked for me. But you’re right the folder path was not in my PATH environment variable. It gets quickly bloated when you append every single program path, doesn’t it. And we don’t know if the OP has it in his PATH!?

wizend

[By the way, you missed the $env: in your code alternative.]

I didn’t post anything about “path”. I posted “$env:PROGRAMFILES”. This is the correct method as it allows for the program files folder to be discovered at runtime.

Also this would be a way:

it is only the batch file path that requires quotes.

In reality CMD/C is not required because the “bat” extension implies “cmd/c”.

This will allow you to to call a powershell script from a batch file that creates and sends an email.

  1. SMTP Outgoing Server
  2. SMTP Outgoing Credentials

Apply this line to any Batch file line.

robocopy C:\Data D:\Data /L /MIR /Z /Copy:DAT /DCOPY:T /J /mt /tee /r:1 /W:1 /ETA /xd “$RECYCLE.BIN” /log+:”C:\RCLogs.txt”

PowerShell.exe -NoProfile -ExecutionPolicy Bypass C:\UsersbackupsDesktopemail.ps1

Create a new text file and save it as a .PS1, enter the following, changing as needed.
—–
#this works, just sends a simple email
$smtpServer = “mail.smtp2go.com”
$smtpFrom = “FROMEMAILENTERHERE”
$smtpTo = “TOEMAILENTERHERE”
$smtpSubject = “This is my email subject”
$username = “email_username”
$password = “email_password”
$body = “yo yo yo your boat”

$smtp = New-Object -TypeName “Net.Mail.SmtpClient” -ArgumentList $smtpServer
$smtp.Credentials = New-Object system.net.networkcredential($username, $Password);
$smtpBody = “[$(Get-Date -Format HH:mm:ss)] $body”
$smtp.Send($smtpFrom, $smtpTo, $smtpSubject, $smtpBody)

You can send this either as a regular powershell script or call it from a command line as shown above.

Summary: Learn how to use Windows PowerShell to rename files in bulk. Microsoft Scripting Guy, Ed Wilson, is here. Matt Tisdale is back today with another solution to a situation at work… I received a call from a gentleman named Cristofer this afternoon. He had a business need and he heard from someone that Windows PowerShell could help. I told him that I am sure Windows PowerShell can help—and that was before I even heard the question. His immediate need was to rename almost 250 files that are located in various folders on the file system. He needed to find all files with a specific character string in the name and replace this character string with a new character string. For example purposes, let’s say he needed to find all files with “current” in the name and replace “current” with “old”. I have never attempted this specific task, but by using Get-Command and Get-Help, we were able to find exactly how to do this in a couple of minutes. Assuming we need to find all files located under C:temp (including all subfolders) with “current” in the name and rename them using “old” in place of “current”, here are the steps.

  1. Open Windows PowerShell.
  2. Navigate to C:temp.
  3. Run the following Windows PowerShell command:

Get-ChildItem -Filter “*current*” -Recurse | Rename-Item -NewName <$_.name -replace ‘current’,’old’ >4. Sit back and let Windows PowerShell do all of the work for you. Anyone who has access to modify the files and is running Windows 7 can follow these steps. No special tools or elevated rights are required. Let’s pick the command apart and explain each piece.

  • Get-ChildItem -Filter “*current*”

Finds all files with the string “current” anywhere in the name.

  • -Recurse

Instructs Get-ChildItem to search recursively through all subfolders under the start point (the current directory where the command is run from).

  • | (the pipe character)

Instructs Windows PowerShell to take each item (object) found with the first command (Get-ChildItem) and pass it to the second command (Rename-Item)

  • Rename-Item

Renames files and other objects

Tells Rename-Item to find the string “current” in the file name and replace it with “old”. For an added bonus, I also recommended that Cristofer use the –WhatIf parameter with this command on his first run to get an output that shows what the command will do before he actually pulls the trigger. Using -WhatIf will tell Windows PowerShell to run the Rename-Item portion of this command in Report Only mode. It will not actually rename anything—it will simply show what files were found that match the filter criteria and what each new name would be. Here is the command with the -WhatIf parameter added.

Get-ChildItem -Filter “*current*” -Recurse | Rename-Item -NewName <$_.name -replace ‘current’,’old’ >-whatif Unfortunately, when we use –WhatIf, we cannot send our output to a text log file. If you need a log file that shows the results of using -WhatIf, you can follow these steps:

  1. Open Windows PowerShell.
  2. Run Start-Transcript.
  3. Run your command (including the -WhatIf parameter).
  4. After the command completes, run Stop-Transcript.
  5. Note the location and file name of the transcript file, and open this file to see the results.

It is always fun to solve business challenges with Windows PowerShell commands. Cristofer said he will probably need to use these commands for renaming 1000+ files in the near future, and he will share this process with other members of his team. Imagine how much “fun” it would be to rename all of these files manually or with some clunky old batch file. No thank you. I will stick with Windows PowerShell. Keep the requests coming in. I always enjoy helping fellow employees find ways to be more efficient and save time and money.

With more and more scripts written in PowerShell, a lot more tasks are scheduled to be run in PowerShell, instead of batch files. So it’s important to properly schedule a task that runs the PowerShell powered scripts smoothly and successfully.

To start, open Task Scheduler by clicking Start menu and typing Task Scheduler and click Create Basic Task… or Create Task… from the Actions pane.

At Action step, select Start a program and click Next.

How to use a batch file to make powershell scripts easier to run

At the next window, type PowerShell as the Program/script and the full-path of the script file as the argument. If the path includes any space, wrap the whole string up with a full quotation mark.

How to use a batch file to make powershell scripts easier to run

Click Next to finish the setup.

Why the job is failed?

The task will have no problem to run, as long as the local PowerShell execution policy is set as unrestricted. Or it will fail.

So how to prevent this from happening?

You can specify which policy to use with the switch -ExecutionPolicy, like below:

For Scheduled Tasks, put PowerShell in the Program/script box and the rest in the arguments box.

How do I hide the PowerShell window during the runtime?

By default, when the script runs it opens a PowerShell console window and closes it when the job is finished. If the job is relatively quick, it’s no big deal leaving it open but when the job takes longer to finish it’s better not so obvious.

That’s where the switch -WindowStyle comes in to play. There are 4 types of style you can choose from: Normal, Minimized, Maximized, and Hidden. Apparently, hidden is what we are after.

What about PowerShell 7?

If you have PowerShell 7 installed and want it to run your PowerShell 7 compatible script, use pwsh to launch PowerShell instead. All the switches mentioned above still apply.

How to use a batch file to make powershell scripts easier to run

The batch script, also known as batch file, actually refers to a list of several commands; whenever you double-click the file, the commands will be executed. If you want to copy files or folders from one folder to another automatically, creating a batch script is a nice choice. As for how to get the work done, please keep reading.

Windows Script/Batch File

When managing your data on PC, you may need to copy or move files and folders. The permissions set on files and folders may be changed when you move/copy them by using the Windows Explorer. Did you know this?

For instance, when you copy a folder/file in an NTFS partition or from one partition to another, the Windows system will regard it as the new folder/file; in this way, you will become the CREATOR OWNER since the system will take on the permissions. That’s why using script to copy files from one folder to another is necessary.

How to use a batch file to make powershell scripts easier to run

What Is Batch File

A batch file, also known as batch script, is actually a list of commands that will be run in the Command Prompt (CMD) tool. Users can create a batch file to let CMD copy and paste files for them automatically; all they need to do is double clicking on the batch file/script and waiting.

Can You Use Script to Copy Files from One Folder to Another

The Windows clipboard provides an easy way for users to copy and paste files/folder manually. The ordinary copy process seems pretty simple: select the file/folder that needs to be copied and choose copy option; open the destination; select the paste option.

Yet, do you want to automatically move files from one folder to another? The copying and pasting process can be finished quickly by using the Windows command line.

How to create batch file to copy files? How to use Windows script to copy files? Generally, it contains two stages: create batch file and create a task to run the batch file to copy files from one folder to another.

Stage One: Create Batch File to Copy

You can create a batch file to copy data in a file from one place to another place on your computer automatically. The following steps are finished on Windows 10.

  1. Open Windows search.
  2. Type notepad.
  3. Open the Notepad app.
  4. Copy & paste the script into the new Notepad file.
  5. Select File -> Save As.
  6. Give it a name.
  7. Select All Files.
  8. Click Save to finish creating the batch file.

Step one: click on the Cortana icon on the taskbar (fix taskbar not working on Window 10).

Step two: type notepad into the search text box.

Step three: select Notepad app from the search result by clicking on it.

How to use a batch file to make powershell scripts easier to run

Step four: type the following script in or copy & paste it into Notepad.

@echo off

set X=

set “source=C:\

set “destination=D:\

robocopy “source” “destination” “filename with extension” /z

exit /b

  • The source folder, destination folder, and number of days can be changed due to your needs.
  • The nunber of days refers to the time interval you want to a rchive your folders.
  • “<>” is necessary if the source or desitination folder path includes space.

Step five: choose File option from the menu bar and choose Save As… from submenu.

Step six:

  • Give it a name and type in the File name text box; the file name format is .BAT.
  • Select All Files for Save as type option to change the default file type.
  • Click on the Save button at the bottom to finish this step.

Stage Two: Create Task to Run Batch File

After finish this stage, you can use the batch file to copy folder to another location.

Step one: type task scheduler into the Cortana search box.

Step two: choose Task Scheduler from the search result.

Step three: find Actions section from the right-hand panel.

Step four: select Create Task… from the list.

How to use a batch file to make powershell scripts easier to run

Step five: give a name for the task and type it into the text box after Name.

Step six: shift to Triggers tab and click on the New… button.

Step seven: define the frequency to trigger the task, choosing from One time, Daily, Weekly, and Monthly.

Step eight: set the Start time to decide when the task will be triggered and click on the OK button to confirm.

How to use a batch file to make powershell scripts easier to run

Step nine: shift to Actions tab and click on the New… button.

Step ten: click on the Browse button to find & choose the .BAT file you have created in stage one.

Step eleven: click on the OK button to confirm. Then, you can close the Task Scheduler and start to move file from one folder to another by using it.

How to use a batch file to make powershell scripts easier to run

That’s how to use Windows batch to copy file. Besides, you can also use Xcopy or Robocopy to copy files and folders on your PC.

  • Facebook
  • Twitter
  • Linkedin
  • Reddit

ABOUT THE AUTHOR

Position: Columnist

Sarah has been working as an editor at MiniTool since she graduated from university. Sarah aims at helping users with their computer problems such as disk errors and data loss. She feels a sense of accomplishment to see that users get their issues fixed relying on her articles. Besides, she likes to make friends and listen to music after work.

Can you give an example of how I can create a PowerShell (*.ps1) script to execute custom notifications in PRTG?

Created on Apr 20, 2011 12:32:44 PM by Daniel Zobel [Product Manager]

Last change on Apr 20, 2011 12:43:15 PM by Daniel Zobel [Product Manager]

This article applies to PRTG Network Monitor 12 or later, as well as to previous (deprecated) versions

PRTG Network Monitor is a network monitoring tool that offers multiple possibilities to send notifications on important events, for example when a device or individual sensors are down, thresholds are breached, devices fail to respond in a timely matter, etc.

If the built-in notification types do not meet your needs PRTG allows you to create your own notification mechanisms using script files like batch files or powershell scripts.

The following powershell demo script has a very basic functionality to demonstrate how powershell scripts work in PRTG. It simply writes the current date/time to a file. You have to pass the filename as parameter to the script. This script may help you troubleshooting your own powershell notifications.

The script must be copied into the notifications\exe sub folder of your PRTG core server program directory (of each node, if in a cluster).

Security Issues

It’s a good practice to not enter passwords, parameters, etc. directly into your script. Instead, you can use the parameter field in PRTG to hand over these values to your script when calling it.

Information about signing Powershell scripts and the Execution Policy for scripts can be found in the following external resources:

Created on Apr 20, 2011 12:42:46 PM by Daniel Zobel [Product Manager]

Last change on Feb 26, 2014 2:59:30 PM by Torsten Lindner [Paessler Support]

You can change the ExecutionPolicy for PowerShell scripts/cmdlets by running the PowerShell command Set-ExecutionPolicy.

To elaborate your options for this command, simply run the following in PowerShell:

Personally, I prefer to set the ExecutionPolicy to “RemoteSigned”. This allows me to run my own scripts, but prevents unsigned scripts from others from running:

Set-ExecutionPolicy -ExecutionPolicy RemoteSigned

Test this as follows: Create a new PowerShell script on your Desktop. Right-click the Desktop, New > Text Document. Name it test.ps1

Right-click test.ps1 and select Edit. It should open up with PowerShell ISE (Integrated Scripting Environment). Type the following in the top pane:

Save it with Ctrl + S, and close it.

Now open up powershell, change to your Desktop and try running the script:

Then change your ExecutionPolicy to “RemoteSigned” and try again:

Set-ExecutionPolicy -ExecutionPolicy RemoteSigned

Notice that the script/cmdlet is referenced using “.\”. You can also use the full path, but cannot run it by simply typing its name (very Unix like, eh?).

Also note the use of “$env:userprofile” to represent the path to your user profile. In the classic Windows Command Processor, this was represented with simply “%userprofile%”.

Lastly, please note that this will not work as indicated if you are not in the local Administrators group. It is, in fact, a best practice to avoid daily use of an account which is in the local Administrators group, so this may be the case for you. To work around it, simply launch powershell as an Administrator to set the execution policy. See here.

When performed manually, creating Active Directory (AD) users in bulk can be a time-consuming and error-prone process. But, don’t worry, you can do it easily with Active Directory bulk user import using a CSV file.

Here, we’ll explain how to create Active Directory users in bulk using PowerShell. We’ll also go over how to automate bulk user addition in AD, as well as how to build a customized workflow structure to streamline the user creation process.

How to create bulk users in Active Directory using PowerShell

The CSV file required to create a new user account must contain the following fields as shown in the sample CSV file here:

When running the script bulkimport.ps, as shown below, the user objects for these CSV entries will be created in Active Directory. As a good security practice, the script will enable the account owners to reset the default passwords at the next logon. Keep in mind that the complexity of this process can vary depending on the organization’s provisioning process.

Instead of manually provisioning users, you can run the PowerShell script and have new users provisioned in your Active Directory at the same time. To simplify bulk user creation even further, the script can be scheduled to run periodically.

Using ADManager Plus to bulk import users from CSV

Although scheduling makes bulk user import easier, what organizations actually need is key stakeholders (line managers, heads of departments, reporting managers, etc.) involved in the user onboarding process. This is where a tool like ADManager Plus steps in to help admins automate this bulk user creation process.

During the automation of user provisioning,

If you’d like to try out workflow-based user creation feature of ADManager Plus, click here to download a 30-day free trial.

In this guide, you’ll see the complete steps to create a batch file to run a Python script.

But before we begin, here is the batch file template that you can use to run your Python script:

Steps to Create a Batch File to Run a Python Script

Step 1: Create the Python Script

To start, create your Python Script.

For example, let’s create a simple Python script that contains a countdown (alternatively, you may use any Python script that you wish to run):

Step 2: Save your Script

Save your Python script (your Python script should have the extension of ‘.py‘).

For our example, let’s save the Python script as: countdown

  • Where the file extension is .py

Step 3: Create the Batch File to Run the Python Script

To create the batch file, open Notepad and then use the following template:

You’ll need to adjust the syntax in two places:

  • “Path where your Python exe is stored\python.exe”
    Here is an example where a Python exe is located: “C:\Users\Ron\AppData\Local\Programs\Python\Python39\python.exe”
  • “Path where your Python script is stored\script name.py”
    And here is an example where a Python script is located:
    “C:\Users\Ron\Desktop\Test\countdown.py”

Note that you’ll need to change the paths to reflect the locations where the files are stored on your computer.

This is how the batch script would look like in Notepad for our example:

Save the Notepad with a ‘.bat‘ extension. For example, let’s save the Notepad as Run_Script.bat

A new batch file, called “Run_Script.bat,” will be created at your specified location.

Step 4: Run the Batch File

Finally, double-click on the batch file in order to run the Python script.

You’ll then get the countdown as follows:

You may also want to check the following source that contains additional guides about batch scripts.

When you open the PowerShell console on Windows 10 via Search bar, shortcut, or pinned taskbar item, the powershell.exe process starts in unprivileged mode. In this mode, you won’t be able to make system changes or perform administrative tasks. In this article, we’ll walk through a few easy ways to run a PowerShell console or script as an administrator.

Run PowerShell as Administrator Using Windows 10 Search Bar

How to use a batch file to make powershell scripts easier to run

  1. Click on the Start button or press the Windows key on your keyboard;
  2. Type powershell in the search field;
  3. Right-click on the Windows PowerShell icon and select Run as administrator (or select this item in the right pane);
  4. A UAC window will appear, in which you need to confirm the start of the process in the elevated mode.

There is also a separate item for starting PowerShell with elevated permissions in the Win+X menu of Windows 10. Just press Windows + X on your keyboard or right-click the Start button and select Windows PowerShell (Admin).

How to use a batch file to make powershell scripts easier to run

Create Taskbar Shortcut to Run PowerShell as Administrator

If you often run the PowerShell console as an administrator, you can create a shortcut to start the PowerShell in elevated mode automatically.

  1. Find the PowerShell icon in the start menu, right-click on it and select Pin to taskbar;
  2. Right-click on the PowerShell icon in the taskbar, select Windows PowerShell > right-click > Properties;
    How to use a batch file to make powershell scripts easier to run
  3. Click the Advanced button and enable the Run as administrator option;
  4. Click OK twice.
    How to use a batch file to make powershell scripts easier to run

Now, when you click on the PowerShell icon in the taskbar, the PS console will always open in privileged mode.

How to Run a PowerShell Script as Administrator?

When you run any PowerShell script in an elevated session, it runs as an administrator. Or you can run a PowerShell script file as an administrator with the following command:

Hint. Make sure the PowerShell Execution Policy on your computer is not blocking PowerShell scripts from running.

You can open the console as an administrator with the following command:

You can execute this command in cmd.exe command prompt, PowerShell, or using the Run feature.

How to use a batch file to make powershell scripts easier to run

Check if PowerShell is Running as Administrator

If your powershell.exe console is running with administrator privileges, the window title will say Administrator: Windows PowerShell.

In some PowerShell scripts, it is sometimes necessary to verify that the script is running with administrator privileges before starting any action.

Run the command:

If the command returned True, then this PowerShell session was started with administrator permissions.

In PowerShell v4.0 and newer, you can use a special statement at the beginning of your scripts to prevent a PowerShell script from running as a regular (non-administrator) user:

If a script with such a statement is executed in a non-elevated PowerShell process, you will receive an error message:

To run an application, process, or script from within PowerShell you could simply enter the path to file. But this will start the process in the same environment and within the same context as your PowerShell session.

When you want to run the process as a different user, start it in a new window, or even start multiple processes simultaneously then you will need to use the Start-Process cmdlet.

In this article, we are going to take a look at the start-process cmdlet. How we can run a process with elevated permissions, run it in a new window, or even completely hidden. I will also give you a couple of useful examples to get started.

Using Start-Process in PowerShell

The Start-Process cmdlet allows you to run one or multiple processes on your computer from within PowerShell. It’s designed to run a process asynchronously or to run an application/script elevated (with administrative privileges).

You don’t need to use the Start-Process cmdlet if you need to run a script or other console program synchronously in PowerShell. The reason for this is that you can redirect the output of it to PowerShell.

This is one of the downsides of the cmdlet, you can’t redirect the output or error streams to PowerShell. The only option that you have is to redirect the output to text files.

So let’s take a look at how to use the cmdlet. We can use the following parameters to start a process:

How to use a batch file to make powershell scripts easier to run

This will run the bat file and wait for it to finish before continuing the script or resuming input. Keep in mind that any output of the process isn’t captured by default. So you won’t know if the bat file failed or successfully completed.

Window size and Hidden processes

If we run the bat file with the example above, it will run the bat file in a new window. The window will have a normal size and close when the process completes. In the start-process cmdlet, we can specify the window size or even hide it completely.

We can choose between using the parameters -WindowStyle and -NoNewWindow . Obviously we can’t use both parameters together 😉

To run the bat file without any windows we can use the following command in PowerShell:

You won’t get any feedback, except that your script will continue when the process is finished. Hoever we can redirect the result of the process to a text file, more about that later.

To run a process in a maximized, normal, or minimized window you can use the following options:

Another parameter that we can use is -NoNewWindow. This will run the process in the same window as the PowerShell script. This option only works with command-line-based processes. You can’t for example, open Notepad in the same window as PowerShell.

How to use a batch file to make powershell scripts easier to run

Using Arguments with Start-Process

Some processes or scripts that you want to start require parameters (arguments). Probably your first thought is to add the arguments between the quotes in the filepath, but as you might have noticed, that won’t work.

To pass arguments to the process that you want to start, you will need to use the -arguments parameter.

Let’s run an MSI from PowerShell as an example. To run the MSI silently we will need to supply the arguments /quiet or /qn and we probably don’t want to restart as well, so we add /norestart to it.

PowerShell Start-Process Elevated

When you start a process with Start-Process it will run in the same user context as the PowerShell session. But some processes may need elevated permissions to run. To do this we can use the -Verb parameter.

Keep in mind that you can’t combine -Verb and -NoNewWindow because the process that you want to start must be opened in a new window.

To run the example.bat with elevated permissions we can use the following command:

Depending on the file extension other options are also possible. We could for example print a text file with -Verb Print .

Start Process as a different user

It’s also possible to run a process as a different user. By default, the process will be executed with the credentials of the currently logged-on user.

First, you will need t to create a PSCredential object and store it as a secure string. Then you can pass the credentials to the cmdlet with the parameter -Credential.

Keep in mind that secure strings are not super secure to use, so make sure that you keep the secure string as safe as possible.

Redirecting the Output

The output of the Start-Process cmdlet can’t be passed through to PowerShell. The only option that we have is to redirect the output to a text file. Variables won’t work.

So what you can do to capture the output is:

What won’t work is :

If you want to capture only the error of the process then you can use:

Getting the Process ID

The last option that I want to explain is the -Passtru parameter. It will return the process object of the process that we have started. This can be useful when you want to automatically stop a process when it’s running for too long.

Wrapping Up

The Start-Process cmdlet is great to run one or multiple applications or scripts from within PowerShell. Unfortunately, we can’t easily capture the output of the process, but with a small workaround, we are still able to inspect the results in PowerShell.

I hope you found this article useful, if you have any questions, just drop a comment below.

  • How to use a batch file to make powershell scripts easier to run
  • Members
  • 3 posts
  • OFFLINE
  • Local time: 05:06 PM

I have a Powershell command to count PDF’s within a folder and through all subfolders.  It works fine.

  Get-ChildItem -Recurse -File *.pdf | Measure-Object | %<$_.Count>
 

However, if I run this same command within a batch file it will fail.  I have tried the following syntax:

1. Powershell -Command Get-ChildItem -Recurse -File *.pdf | Measure-Object | %

Both give errors:  ‘Measure-Object’ is not recognized as an internal or external command, operable program or batch file.

I do not know why and went through the Powershell -Help.  Thoughts?

BC AdBot (Login to Remove)

  • BleepingComputer.com

#2 JohnC_21

  • Members
  • 32,206 posts
  • ONLINE
  • Gender: Male
  • Local time: 05:06 PM

You can’t run the powershell script inside of a batch file. You need to call the Powershell script file from the batch file using the -File Command. Give your Powershell script a file name with a .ps1 extension. 

It may not run because Windows 10 locked down running scripts so you need to set the Execution policy

#3 dlmclean

  • Topic Starter
  • How to use a batch file to make powershell scripts easier to run
  • Members
  • 3 posts
  • OFFLINE
  • Local time: 05:06 PM

Thank you John.  I am learning and appreciate your direction.  

#4 pseymour

  • Members
  • 41 posts
  • ONLINE
  • Gender: Male
  • Location: Ohio, USA
  • Local time: 05:06 PM

Your second attempt was close. You just need to wrap the command in quotes, and put an ampersand at the beginning.

The next thing you would run into is the percent alias, for ForEach-Object. Since you’re running it in the command prompt, that needs special handling. Either go with ForEach-Object, or double up on the percent symbols.

But actually you don’t need the ForEach at all. You can wrap the rest of the command in parentheses, and just get the .Count property from that.

Just a recommendation, I would specify an execution policy, and clarify that “*.pdf” corresponds to the Filter parameter.

Edited by pseymour, 02 April 2022 – 04:56 PM.

#5 JohnC_21

  • Members
  • 32,206 posts
  • ONLINE
  • Gender: Male
  • Local time: 05:06 PM

@pseymour, thank you for the detailed help. I guess I was wrong saying you can’t run a Powershell script in a bat file.

#6 dlmclean

  • Topic Starter
  • How to use a batch file to make powershell scripts easier to run
  • Members
  • 3 posts
  • OFFLINE
  • Local time: 05:06 PM

@pseymour-
From one native Ohioan to another, I appreciate your assistance more than you know.  Thank you!
I tried your suggestion and it worked flawlessly.  I still need to parse out what you’ve done here to grasp it completely.

Usually, users can’t run any scripts by just double-clicking a file. It is a troublesome process.

As a part of our Server Management Services, we assist our customers with script policy queries.

Today, let’s discuss how our Support Engineers do it easily for our customers.

A quick look at PowerShell

Windows PowerShell is an object-oriented automation engine and scripting language built on .NET.

In addition, it helps system administrators and power-users to rapidly automate tasks.

.ps1 file is the extension for the PowerShell script. By default, we can’t run a script by just double-clicking a file.

This usually restricts the accidental harm from happening.

During the execution of scripts via PowerShell, it seems like there are some policies that restrict the script execution from happening.

Execution Policies during PowerShell script execution

Let us now discuss some major policies. We get one of these outputs during script execution.

Restricted: This message will pop up when we first run any script. This is because Scripts are not allowable here

AllSigned: Here, with this setting, the script will ask for confirmation that we need to run before its execution.

Unrestricted: Here, there are no restrictions present. We can run any scripts that we want.

RemoteSigned: In this case, we can run the scripts that are only signed by a trusted developer.

How we enabled Script Execution in Powershell?

Recently, one of our customers approached us with the following error message.

Our Support Engineers checked the error and in order to fix it, we went ahead with the below steps:

Initially, we open the PowerShell command prompt with the ‘Administrator’ privilege.

Then we enter the following commands.

  1. Firstly we execute Get-ExecutionPolicy with result as “Restricted”.
  2. Then, to make it unrestricted we execute the “set-execution policy unrestricted” command.
  3. Next, it asked for confirmationDo you want to change the execution policy. By default, it is set to N and we need to change it to Y”.
  4. Finally, we execute the Get-ExecutionPolicy command so as to check the changed policies. It results in unrestricted privilege.

After doing all these we create a file in notepad and save it with an extension.ps1. For example, myscript.ps1

In the PowerShell, we call the script using the command & “X:\myscript.ps1”

Thus, we enabled the script execution in PowerShell.

How to use a batch file to make powershell scripts easier to run

[Couldn’t fix the error?- We’re available 24/7.]

Conclusion

In short, we changed PowerShell to enable script execution by running some commands. Today, we discussed how our Support Engineers resolve the script error for our customers.

Related posts:

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

While using laptops, sometimes you may want to disable the built-in webcam for some reasons, such as security or debugging webcam related programs. Not like a USB webcam, the built-in camera is unpluggable. Therefore, a general way is to open the device manager, find the camera, and disable it. To save time, we can create PowerShell scripts to toggle camera status quickly.

How to Disable / Enable Webcam with PowerShell Scripts

Run the Windows Powershell command-line tool as administrator.

We can use Get-PnpDevice cmdlet to enumerate all devices known to PnP (Plug and Play).

Since I just want to list webcam devices, I can filter the devices by name:

How to use a batch file to make powershell scripts easier to run

As you can see, I have two webcams: a built-in USB webcam and a Logitech C920 webcam.

How to use a batch file to make powershell scripts easier to run

The Logitech C920 webcam also supports audio input which should not be listed here. Therefore, I need to take a further step to filter the results by adding the class name:

How to use a batch file to make powershell scripts easier to run

The Logitech C920 webcam is physically removable, and thus my target is the built-in XiaoMi USB 2.0 Webcam.

Use Disable-PnpDevice cmdlet to disable the built-in webcam by instance Id:

Once a device is disabled, its status will be changed to Error. To make the webcam work again, use Enable-PnpDevice cmdlet. Change the current status from OK to Error:

I can use the online webcam app to check the camera status as I execute the commands.

Finally, in order to quickly run the scripts, save the commands to disable.ps1 and enable.ps1 files.

By default, a *.ps1 file will be opened in Notepad when we double-click it. To run the script directly, I created two batch files and corresponding desktop shortcuts. We have to use an absolute path, not a relative path for finding the ps1 file.

Right-click a shortcut file and go to Properties > Advanced. Check “Run as administrator”.

Batch files are typically used to automate repetitive tasks in Windows computers, and the ability to schedule those tasks to run at designated times make it a powerful productivity tool. Today, we will learn how to schedule batch files in Windows 10 using the built-in Task Scheduler utility. Even if you’re not an advanced user, the simple instructions will help you create batch files to run commands on a schedule to help to automate tedious tasks on your PC.

Schedule Batch Files to Run Automatically in Windows 10

This tutorial will show you not only how to schedule batch files to run automatically in Windows 10, but also tell you about what it is and how it helps advanced users automate tasks in Windows computers. We will also teach you how to make a batch file on Windows 10. So without further ado, let’s look at what a batch file is and how to use them to execute commands on a schedule in Windows using Task Scheduler.

What is a Batch File?

Batch Files in Windows are script files, typically with a .bat extension, capable of running a series of commands in the Command Prompt in a specified sequence and according to triggers defined by the user. You can make a batch file to run just about any Command Prompt command, either manually or on a schedule.

BAT files are supported by DOS, OS/2 and Windows, but not all extensions are supported by all platforms. While .bat is used in DOS and Windows, other platforms like Windows NT and OS/2 also added the .cmd extension. Batch files for other environments may have other extensions.

Batch files are similar to Job Control Language (JCL), DIGITAL Command Language (DCL) and other systems on mainframe and minicomputer systems. Unix-like operating systems, such as Linux, have a similar way to automate tasks, called shell script, which is designed to be run by the Unix shell.

What Can I Do With Scheduled Batch Files?

As mentioned already, batch files help you automate repetitive tasks in Windows. You can use it to modify system settings, open up specific programs at specific times, launch multiple apps on a schedule, automate system backups and more. All supported versions of Windows (server and client) have a set of built-in Win32 console commands that you can use to automate tasks by using scripts or scripting tools. You can use either the Windows PowerShell, Windows Commands or Windows Script Host for automation.

What Special Apps Do I Need to Create Batch Files?

You don’t need source code editors or fancy IDEs to write BAT files in Windows. All you need is the good old Notepad, because a barebones text editor is all you need create a batch file in Windows.

How to Make a Batch File in Windows 10?

  • Open Notepad and copy+paste the following line – @echo off
  • Now we’ll add the two following lines. They will start Firefox and Outlook simultaneously every time the file is executed.

start “Firefox” “C:\Program Files\Mozilla Firefox\Firefox.exe”
start “Outlook” “C:\Program Files\Microsoft Office\root\Office16\Outlook.exe”

How to use a batch file to make powershell scripts easier to run

There are three basic elements to the above commands. The first is the ‘start’ command that is used in batch files to open programs.

Next is the name of the application – Firefox, Outlook, etc. It is for your convenience only, so you can use any name you want without affecting the end result.

  • What you now have is a text file with a couple of lines of code. To save it as a batch file, click on File > Save As (see screenshot below).

How to use a batch file to make powershell scripts easier to run

  • You can save it under any name. I’m using “demo.bat” because this is a batch file created for demonstration purposes. Most importantly, make sure to change the file type to ‘All Files’ (*.*) instead of ‘Text Documents’ (*.txt).

How to use a batch file to make powershell scripts easier to run

You can create any number of files to perform tasks on your PC. Many batch files are also available for download online, but make sure you download them from reliable sources to avoid malware threats.

How to Schedule Batch Files

  • To open Task Scheduler, search ‘schedule’ in the Windows search bar and click on the Task Scheduler icon.
  • Once the Task Scheduler window opens, click on ‘Create Basic Task’ on the right pane.

How to use a batch file to make powershell scripts easier to run

  • Next, give your task any name you want. I chose the self-explanatory ‘Open Firefox and Office’. Now click on ‘Next’.
  • Now, we’ll need to choose a trigger. This will decide when the batch file will execute. In our case, we want it to run every time I log on, so I chose ‘When I log on’. Click on ‘Next’ once you’ve chosen an option.
  • Finally comes the most important part – choosing an ‘Action’. It will tell Windows what the task is all about in the first place. In our case, we want to run our batch script, so we’ll choose ‘Start a program’.
  • Next, we will point Windows towards the target batch file by clicking on the ‘Browse’ button and navigating to its location. In our case, we saved the file on the desktop itself, so the full path is “C:\Users\\Desktop\Stuff\File\demo.bat”. Now click on ‘Next’ at the bottom.

How to use a batch file to make powershell scripts easier to run

  • Finally, click on ‘Finish’ on the next screen to create the task.

How to use a batch file to make powershell scripts easier to run

That’s it! You now know how to create and schedule batch files to automate simple but repetitive tasks in Windows.

Use Batch Files to Automate Tasks on Windows

As mentioned already, you can play around with other options within Task Scheduler to automate various tasks in Windows. For example, check out our article on scheduling automatic shutdown of Windows 10 computers by clicking on the link. Once you start getting the hang of it, you will see that the possibilities are endless. So which tedious, repetitive task do you want to automate using batch files? Let us know in the comments down below.

Text files are ubiquitous and you’ll have to read through them, regardless of your role or job responsibilities. In fact, as an IT professional, you will have to create, read, or work with text files more often than you may think because text files come in a wide range of formats. This flexibility has also made text files the most convenient way to define scripts, store configuration details, and more. PowerShell understands this importance of text files and makes it easy to retrieve text and read from them easily. In this article, we’ll see how you can read a text file in PowerShell.

Reading the entire contents

How to use a batch file to make powershell scripts easier to run

Shutterstock

When you want to read the entire contents of a text file, the easiest way is to use the built-in Get-Content function.

Here is the code that allows you to do this:

When you execute this command, the contents of this file will be displayed in your command prompt or the PowerShell ISE screen, depending on where you execute it.

You can also move all the content to a variable and use that variable for further processing if that’s something that you want your code to do.

$file_data = Get-Content C:\logs\log01012020.txt

You can now use this variable $file_data for parsing or further processing.

Reading partial content

How to use a batch file to make powershell scripts easier to run

Many times, you may only have to read a certain part of a file to get the information you want. Similar to a SQL query, you can choose the lines you want to read and the code for that is:

As the code suggests, the first 10 lines of the content will be stored in the variable and not the entire content. You can display the contents of this variable or use it for more processing.

Likewise, we can read the last few lines too:

Reading line-by-line

When you want to read the file to understand its contents, you’d have to do so one line at a time and the good news is, this is possible with PowerShell.

In fact, there are two ways to do it.

Using Get-Content

The Get-Content function reads every line in the text and stores them as an array, where each line is an array element. In the above example, we used a variable for reading all the content.

$file_data = Get-Content C:\logs\log01012020.txt

If you print the type of this variable, you can see that it an array.

This means you can pick out specific lines using the array index. For example, if you want to read the first line, you can simply say:

And this will display the first line for you.

This will display the second line, and so on.

Using StreamReader class

The second option is to use a .NET class called StreamReader.

$stream_reader = New-Object System.IO.StreamReader

Now you have the contents of the log file in this $stream_reader variable and since it belongs to the StreamReader class, you can use many built-in methods to get the text you want.

…this will output all the contents on your screen, similar to Get-Content.

To read the current line, you can use the following method:

But this alone may not be helpful, so you’ll have to run it in a loop and read the contents of a text file, line by line.

The above code snippet will start with the first line and will print out each line with its line number for easy reading. You can even use any of the available string methods on the $current_line variable to parse it further.

This method is ideal for reading large files because when you store the contents in a variable, it can take up too much memory and can impact performance as well. So, this is a more efficient way to get to the content you want.

Finding specific text

How to use a batch file to make powershell scripts easier to run

Many times, you’d want to find a specific text in a file and the best to do that is to use the Where-Object cmdlet that filters the content to give you what you want.

$file_data = Get-Content C:\logs\log01012020.txt | Where-Object

The above code will output those lines that have the word “error” in them. Here, the $_ is a pipeline variable that represents the current line from the contents that come from Get-Content.

Besides Where-Object, you can also use match and regex operators to find the exact text you want.

More options with Get-Content

Get-Content is a highly versatile cmdlet that comes loaded with many options. Here are some things you can do with it.

Count the number of lines in the file

You may want to know the number of lines available in the file, so you can parse it accordingly. The code for that is:

$file_data = Get-Content C:\logs\log01012020.txt | Measure-Object

Specific number of lines at the beginning and the end

Earlier, we saw how to choose the first few or last few lines using the Select-Object cmdlet. You can also get the same results using some of the built-in methods of Get-Content.

To get the first few lines, the method is:

$file_data = Get-Content C:\logs\log01012020.txt -TotalCount 3

This will return the first three lines from the file.

$file_data = Get-Content C:\logs\log01012020.txt -Tail 3

This command will return the last three lines from the file.

Continuously updated file

Let’s say your log file is continuously updated and you want to see the end of the log file to read the last updated values. For that, you can add the Wait parameter, like this:

$file_data = Get-Content C:\logs\log01012020.txt -Tail 3 -Wait

This command will continuously monitor the log file for the new lines that are getting added to it and will display the same to you.

Thus, these are some of the different ways to read a text file in PowerShell. Do let us know if you know more ways to read the contents of a file in PowerShell.

The following article will use the “rename” or “ren” command to rename the file using a command prompt. Also, we will try to show some trick playing with the rename command. Just in case if you are looking to do this in multiple files check the following article – “rename multiple files in folder”.

Table of Contents

Batch script rename file using command prompt

Syntax:

Let’s see it in some examples of renaming the file.

How to rename file using command line:

  1. Searching on windows the “cmd” name an open as administrator
  2. Navigate to your path where you need to rename the file by type cd and the path
  3. Click Enter
  4. Execute the following command

Note! The quotation marks in the command are only required if the name includes spaces.

The above command will rename the file name “TESTA.txt” to “TESTB.txt”. You need to be located at the CMD on the folder where the file is.

If the “TESTA.txt” file is not located in your current directory, you must specify the path to the file as a prefix to the file name. For example, if the file was in the “C:” directory, you would type a command similar to the following example.

Since the “rename” command can address extensions, you can also use it to change the extensions of the file.

Rename a file keeping the original

Use the following command at the Windows command line or within a batch file.

The command will create a copy of the original files with the new extension.

Rename a single file with the move command

Like using the rename command, you can also use the move command to rename a file as shown.

What you need to know:

  1. If the files are being used by a program, then the rename command fails with the below error.
  1. You also need to have sufficient privileges to rename the file.
  1. Keep in mind that the rename changes just the file name, it does not convert a file from one type to another. For example, renaming a pdf file ‘test1.pdf’ to ‘test1.docx does not make the file readable in Microsoft Word.

How to create a simple batch script to rename the file

If you are going to automate the above activities or to execute over the network you will need to create a batch file. For example, you need to rename the same file on all computers of the network:

  1. Open a notepad file
  2. Copy the below command
  1. Save as rename.bat
  2. Execute the file and the file “TESTA.txt” will be changed to “TESTB.txt”

The batch files can be used for many other simple actions like to delete files in bulk or to delete folders.

How t0 rename the file using PowerShell:

PowerShell offers even more flexibility for renaming files in a command-line environment. Using PowerShell, you can pipe the output of one command—known as a “commandlet” in PowerShell terms—to another command, just like you can on Linux and other UNIX-like systems. The two important commands you’ll need are Dir, which lists the files in the current directory, and Rename-Item, which renames an item (a file, in this case). Pipe the output of Dir to Rename-Item and you’re in business.

  1. Open Start.
  2. Search for PowerShell and click the top result to open the app.
  3. Type the following command to rename a single file and press Enter:

Advanced features of “Rename” Commands

Below you will find some undocumented features of “Rename” commands to chop off everything from a file name after the last occurrence of a specified character:

Will rename TESTA.txt to TES.

Will not change the name at all (remember: the last occurrence…?).

REN TESTA.txt *ST

Will rename TESTA.txt to TEST.

REN TESTA.txt *sa

Will rename TESTA.txt to TESA, so it seems to mean chop off everything after the last S and then append an A.

Conclusion:

This is all about some methods and tricks to play with the “rename” or “ren” command. The first goal was to create batch script rename file using Command-Line.

You can use a PowerShell script to batch convert emails in MSG format to DOC files provided you have Microsoft Word and Microsoft Outlook installed.

There are a number of utilities, many of them quite pricey, that let you convert email messages stored in MSG format to other file formats. But if you want a quick and easy (and free) way to convert MSG files to DOC files, you can try the PowerShell cmdlet below.

Since there are a larger number of apps that deal with DOC files, once the emails are in DOC format, it is a relatively simple task to convert them to other file formats. For example, you could use Adobe Acrobat or other PDF software to convert the HTML files to PDFs.

The only catch is that you must have Microsoft Word and Microsoft Outlook installed. I’ve tested this with Microsoft Office 2010, but it should work fine with Microsoft Office 2007 and 2013 too.

Installation

Save the code to a file called MsgUtility.psm1 , and put it in its own folder called MsgUtility in your PowerShell modules folder.

On Windows Vista and newer, the PowerShell modules folder is typically found here:

On Windows XP, the PowerShell modules folder is typically found here:

If the PowerShell modules folder doesn’t exist, create it.

Usage

To use the cmdlet to convert all the MSG files in the current directory, simply import the new module and run the ConvertFrom-MsgToDoc as follows:

And of course you can pipe input files or specify a single file or a wildcard pattern as you can with other PowerShell cmdlets:

When I first learned about PowerShell, I immediately wanted to convert my batch files into PowerShell scripts and then enhance them with additional features. When I started that process, I quickly learned that PowerShell didn’t have anything equivalent to cmd.exe’s “Pause” command. I looked for a solution online and found the Microsoft TechNet article Windows PowerShell Tip: Press Any Key to Continue. This is the solution recommended by the article:

However, the above solution has two things wrong with it:

  • It doesn’t work from within Windows PowerShell ISE
  • Unlike cmd.exe’s “Pause” command, pressing keys like Ctrl and Alt causes the script to continue

To fix these two issues, I decided to write my own “Pause” function:

Here’s the minified version:

Share this:

Like this:

Related

17 comments

Other than the alternate codepath for the ISE, I think:

is similar to the ‘pause’ mechanics.

That should say $TRUE to hide the console echo.

Thank you! You are correct about your code being similar to cmd.exe’s “Pause” mechanics. Although your code is certainly much leaner than the code I have in this blog post, it only ignores *some* of the same keys as cmd.exe’s “Pause” command. One notable key your code doesn’t ignore is the Windows key.

Your loop would work easier and better like this:

DO <
$PressedKey = $Host.UI.RawUI.ReadKey(“NoEcho, IncludeKeyDown”)
> While ($Ignore -Contains $PressedKey.VirtualKeyCode)

Thanks for this. Very useful bit of code for leaving the output up on the screen to view

Hello,
What’s the difference with a simple : read-host “Click Enter to continue ” ??

For starters, read-host “Click Enter to continue ” ?
has no button that states Enter. It has OK and Cancel. Cancel will end up stopping your script. The verbage ‘Press any key’ was always a misnomer in that not every key caused the intended action to take place. However, there are plenty of keys that did. The action of clicking OK is very different than pressing any key that was sensed. And last, read-host pops up a box that may not fit with the authors design of running on a command-prompt type of environment.

Remember, your repliy should answer the author’s request more than steer them to do what you want to do. When someone does not have an answer and wants to suggest their alternative they should declare that is what they are doing.

I don’t get a pop-up for “read-host “click enter to continue.” ether in the ISE, or right-click/Run With Powershell, or running . I just get text in the powershell window that says “click enter to continue.”

Lots of googling finally led me to
# The “ReadKey” functionality is not supported in Windows PowerShell ISE.

Have you ever wanted to create a menu driven PowerShell GUI to conduct a series of automated tasks? You are in luck, because that is exactly what we are going to cover in this post. This very simple PowerShell GUI will help you easily distribute your code to other team members or maybe you just want to make your life easier.

To further enhance your simple PowerShell GUI, take a look at my Out-GridView blog post .

Lets jump right into the code

Start out by formatting the menu the way you want it; put something descriptive in for the menu title. Modify lines 1 to 6 with information for your GUI project. You can also add or remove lines based on how many menu items you need. Lines 13 to 17 need to be modified to reflect the functions that you want to call when a specific number is entered. More on the functions below.

Menu Code:

Now that you have your menu formatted the way you want it, we can jump into a brief walk through of how to setup the functions. In your ps1 script, you will want these functions above your code for the menu. If you changed the function names in your menu code then you will need to ensure the names line up here. Put your code for a given function in between the < >and when that function is called your code will be executed.

Functions Code:

At this point, you have everything you need if you want to utilize PowerShell ISE to run this GUI menu. Continue reading if you don’t want to use the ISE.

There is one final piece of code that you will want to put at the very bottom of your script. This code forces the user to hit a key to exit the GUI. This will allow you to put error handling or success codes inside of your script which will be presented to the user before the GUI closes.

Exit Code:

Final steps

To finalize this simple GUI, we need to do a few things to make it easy for others to execute it. In the following steps, we will create a shortcut that can be double clicked to launch the simple GUI.

  1. Create a folder structure to house this script and a shortcut to the script. You can have the shortcut and the script in separate locations if you prefer, but for this example, they will be in the same directory. This would ideally be on a share that is accessible by everyone that needs to run this.
  2. Save the ps1 script you’ve created for this simple GUI in the folder from step 1.
  3. Create a shortcut to the ps1 script in the folder from step 1
    1. Right Click -> New -> Shortcut
    2. In the location field put in the following (replace the file path):
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass -File “\\FullPath\ToYour\Script\Simple_GUI.ps1”
    3. Click Next
    4. Give the shortcut a name and then click Finish

    How to use a batch file to make powershell scripts easier to run

    Simple GUI in action

    Finally, we can see the Simple GUI in action. Double click on the shortcut and we are presented with the menu.

    How to use a batch file to make powershell scripts easier to run

    Upon entering the number 5, you can see that the function was successfully executed and it is now waiting for the user to press any key to exit.

    How to use a batch file to make powershell scripts easier to run

    That’s it for now, thanks for reading!

    Check out my other blog posts:

    Media Sync: Organize Your Photos and Videos with PowerShell

    Do you have photos and videos that you have taken over the years that are scattered all over the place? Do you want to have all your photos and videos organized? Do you want all your photos and videos to have a standardized naming scheme? If you answered YES to these questions, then this is … Continue reading Media Sync: Organize Your Photos and Videos with PowerShell →

    NetNeighbor Watch: The PowerShell Alternative To Arpwatch

    In this post, we are going to setup NetNeighbor Watch on a Raspberry Pi. NetNeighbor Watch can keep an eye on your network and send you an email when a new host is discovered. NetNeighbor Watch is done completely in PowerShell. The results are very similar to those of arpwatch. NetNeighbor Watch is for anyone … Continue reading NetNeighbor Watch: The PowerShell Alternative To Arpwatch →

    Generate a Citrix Desktop Report Based on Active Directory Users

    In this post, we are going to merge data from two different sources to generate a report that can provide insight into your Citrix environment. I will show you how to combine Active Directory data for the users in your domain with Citrix data. This report will provide you with the following knowledge: Users that … Continue reading Generate a Citrix Desktop Report Based on Active Directory Users →

    Creating a PowerShell Module to Improve Your Code

    Do you have PowerShell code that you reuse in your scripts over and over? Do you have server names hard coded in variables? Are you using a text file or CSV file to import server names? Do you find yourself only utilizing one server out of a cluster of servers to make your PowerShell commands? … Continue reading Creating a PowerShell Module to Improve Your Code →

    Generate a DHCP Report Via PowerShell

    Today we are going to look at how to generate a DHCP scope statistics HTML report by using PowerShell. This report will give you one location to see all of your DHCP scope statistics across all of your Windows DHCP servers. It will dynamically pull the DHCP servers and associated DHCP scopes within your Active … Continue reading Generate a DHCP Report Via PowerShell →

    Increase VMware VM Disk Size with PowerShell

    In this post, I will cover how to use PowerShell to increase the disk size of a Windows 10 VM running in a VMware vCenter environment. Automating simple but time consuming tasks like this can save precious time for your support staff or yourself. There are two parts to accomplishing this task; first we need … Continue reading Increase VMware VM Disk Size with PowerShell →

    Manage Citrix Tags with PowerShell

    In this post, we are going to cover how to manage Citrix tags with PowerShell. Citrix Studio is a great tool, but it can be very time consuming especially if you have to do bulk tag actions. Citrix tags can be used in several methods, but this post is focused on desktop tagging. This post … Continue reading Manage Citrix Tags with PowerShell →

    Create a Text Box to Accept User Input for PowerShell GUI

    Do you have a PowerShell GUI that needs to accept text input? Maybe you want to be able to copy and paste a list of computers, ip addresses, user names or some other data. I will show you how to add a text box into your PowerShell GUI to handle that input. If you haven’t … Continue reading Create a Text Box to Accept User Input for PowerShell GUI →

    Utilizing PowerShell Out-GridView as a GUI Alternative

    In my previous post, I showed how you can build a simple menu driven PowerShell GUI; check it out here. To further improve upon that simple GUI, we will go over how to use Out-GridView. Out-GridView is a built-in powershell cmdlet that sends the output from a given command to an interactive window. This post … Continue reading Utilizing PowerShell Out-GridView as a GUI Alternative →

How to use activity monitor on apple watch to track your fitness

With new fitness and activity features in watchOS 8, your Apple Watch can help you stay fit and track workouts.

How to use activity monitor on apple watch to track your fitness (Photo: Angela Moscaritolo)

The Apple Watch has always been a handy tool for tracking workouts and physical activity, but you can do even more courtesy of watchOS 8. With the latest version, you can track additional activities and get voice feedback when you hit certain exercise milestones. Plus, the Fitness app on your iPhone can display workout progress and offer suggestions for improving your health.

View Available Workouts

The Apple Watch has long supported several default workouts such as walking, running, cycling, and rowing. See all the activities available by opening the Workout app on your watch and swiping down the list.

There is a large array of workouts to discover, including archery, bowling, downhill skiing, equestrian sports, golf, hockey, jump rope, paddling, wrestling, and more. Each new version of the watch’s operating system adds others to the mix. High interval training was added with watchOS 6, while dance, functional strength training, core training, and cooldown were included with watchOS 7 in 2020. For watchOS 8, Apple adds tai chi and pilates.

If you don’t spot your favorite workout, swipe to the bottom of the list and select Add Workout.

Start a Workout

When you’re ready to track a workout or activity, swipe through the different activities until you find the one you want. If you wish to set your workout to specific calories, distance, or time, tap the ellipsis icon on the workout and make your pick. Otherwise, tap the workout to begin.

Pause the workout at any time by swiping the screen to the right and tapping Pause. When you’re done, swipe to the right and tap End. A summary screen displays your total time, calories, and other data. Swipe to the bottom of the Summary screen and tap Done to record the workout.

Workout Reminders

You can set reminders on your Apple Watch to tell you to start and stop a workout if the watch detects that you’re performing some type of physical activity. If reminders are enabled and you’ve started a workout, your watch should automatically detect the activity you’re performing and ask if you want to start recording.

The request to record appears as a notification on your watch and offers a few choices: Record Workout, Change Workout, Mute for Today, and Dismiss. You may choose to record your workout if the watch identifies the correct activity. The device should also ask to stop recording after it determines that you’ve finished the workout.

The reminders option is automatically enabled in watchOS 5 or later, but it can be turned off. Open the Settings app on your Watch, swipe to the bottom of the screen, and tap Workout. Swipe down the Workout screen to see the options for Start Workout Reminder and End Workout Reminder; disable one or both of these reminders by tapping the switch.

Additional Workout Settings

At the Workout screen under Settings, you can enable or disable other options. Power Saving Mode turns off cellular connectivity and the built-in heart rate sensor during walking and running workouts to extend battery life.

Tap Auto-Pause and turn on the switch to automatically pause running or outdoor cycling workouts when you stop moving and resume them when you start moving again. Activate Press to Pause to pause or resume your workout by pressing the Side button and the Digital Crown simultaneously. Turn on Detect Gym Equipment to synchronize your workouts with compatible gym equipment.

Get Voice Feedback

Siri can give you voice feedback when you reach certain milestones during a workout. For example, Siri may say that you’ve closed an exercise ring. You don’t even need a headset as the feedback will play over the watch’s built-in speaker.

To set this up directly on your watch, go to Settings > Workout and turn on the switch for Voice Feedback. The next time you reach a specific milestone, such as completing a specific exercise ring, Siri will chime in.

View Activity on Apple Watch

After you’ve compiled some workouts, check your history through the Activity app on your watch. The app shows your activity for the current day in the form of rings around the circle as well as individual charts. The red Move chart displays the calories you’ve burned since the start of the day. The green Exercise chart indicates the amount of time you’ve spent exercising so far. And the blue Stand chart points to the number of hours you’ve spent standing that day. The goal is to close each ring.

Swipe down the screen to see the specific details for the day’s physical activity so far. Then swipe down to the bottom of the screen. Tap Weekly Summary to view a graph for the week and the total number of calories, steps, distance, and other goals you’ve achieved. Tap Change Move Goal to increase or decrease the number of calories you want to burn each day.

View Activity in the Fitness App

The Fitness app on your iPhone offers more data and options than the Activity app on the watch. Open the Fitness app on your phone. The History tab displays activity data and details for the current day. Tap the left arrow next to the month at the top of the screen to display a calendar. Choose a specific date to view the information for that day.

The Workouts section in the Fitness app shows your workout activity for the month. Tap the year at the top to see your overall workouts for each month; tap a specific month to drill down. Tap the All Workouts link at the top to filter the list to show only specific workouts.

With the Activity app on your Apple Watch, you can track how much you move, exercise, and stand from day to day.

Track your Activity

To get started, open the Activity app on your Apple Watch and follow the onscreen steps. Your Apple Watch lets you know when you reach your goals and it offers suggestions and encouragement to help you close your rings. Learn how to close each ring or change your goals.

The Move ring shows how many active calories you’ve burned so far. Complete your daily Move goal by burning active calories every day. Active calories, unlike resting, are ones that you burn by standing or moving around. Get help earning Move and Exercise credit.

For users 13 years and younger, the Move ring shows how many minutes the user has spent actively moving around.

Exercise

The Exercise ring shows how many minutes of brisk activity you’ve completed. Complete your daily Exercise goal by exercising for at least 30 minutes each day. Learn how to meet your exercise goal.

Stand

The Stand ring shows hours in which you’ve stood and moved for at least a minute. Complete your daily Stand goal by standing up and moving around for at least 1 minute during 12 different hours in the day. Even if you stand all day, you still need to move around to earn credit for standing.

If you specify that you use a wheelchair, the Stand ring switches to the Roll ring. Roll shows hours in which you’ve pushed around for at least 1 minute.

Check your Activity history

You can check your progress for the day on your Apple Watch, or check your entire history from the Fitness app on your iPhone.

On your iPhone

How to use activity monitor on apple watch to track your fitness

  1. Open the Fitness app on your iPhone.
  2. Tap Activity in the Summary tab to see details about your all day activity.
  3. Tap the calendar to see your progress for the month. On the calendar, a green dot appears next to the days that you worked out.
  4. To see more detail, tap a day.
  5. To get information about a workout, such as your route or total distance, scroll down to the Workouts section, then tap the item.*

On your Apple Watch

  1. Open the Activity app on your Apple Watch.
  2. Swipe up to see details for each ring.
    How to use activity monitor on apple watch to track your fitness
  3. Swipe up again to see more, like your total steps, your distance, and workouts.
  4. To see your weekly summary, swipe up again, then tap Weekly Summary.

Set activity reminders

How to use activity monitor on apple watch to track your fitness

  1. On your iPhone, open the Watch app.
  2. Tap the My Watch tab, then tap Activity.
  3. Choose your notifications and reminders. For example, coaching notifications are based on your previous progress.

Learn more

    . ? . With watchOS 6, you can see awards directly on your Apple Watch. .

* The metrics that appear depend on the type of workout. For example, route is available for outdoor walk, run, open water swim, or cycle workouts when you have GPS.

If you own a new Apple Watch, then you might still be getting used to the Activity monitor and wondering what the heck all those circles are about. Today we want to explain to you how to use and configure the Apple Watch’s Activity monitor.

The Activity monitor isn’t a necessarily a new concept. It’s just Apple’s version of it, and it’s not a bad one either, but it might take some getting used to.

The first thing about the Activity monitor that you will notice are the three concentric rings: red, green, and blue. When you first set up your Watch, you will be asked what you want your daily caloric burn goal to be.

You will have an opportunity to change this every Monday when you see your weekly activity summary.

When you tap the Activity monitor on the watch face, you can swipe right to access more information on each ring. When you swipe up, you’ll be able to see more detailed information about what each ring indicates (as you see to the right in each screenshot).

The Activity rings show movement (calories), exercise (time), and standing. Swipe up to see more activity information.

The red ring is the Move ring and indicates how many estimated calories you have burned.

The green ring is the Exercise ring and tells you how much of your daily exercise goal (in minutes) you have achieved.

Finally, the blue ring is the Stand ring and tells you how many times you’ve stood up (per hour) during the day.

This will give you a great idea of how you do each day, and what you need to work on. That said, if you take your activity seriously and want to keep track of it from week to week and month to month, then you need to use the Activity app on your iPhone to really dig into the data.

Using the Activity App on Your iPhone

The Activity app is your one-stop place for all your daily, weekly, and monthly activities. You can step through each week of each month and see your Activity circles on a day-to-day basis. Tap on any single day for a complete breakdown of how that day shook out.

In the Move section, you can see how you did on any single day with regard to your daily caloric burn, how it stacks up against your daily goal, and the total calories you burned that week.

The Exercise section will show you how much time you spent moving, how it compares to your daily goal, and the total time you spent moving that week.

Finally, the Stand section will show you how you stood up (no pun intended) to the daily goal, and how many hours you spent idle.

At the bottom of the Activity history, you can see any workout you might have started that day, and achievements earned.

Tap on the Workout section to see a detailed readout of everything contained therein including calories burned, time spent working out, distance, type of workout, and more.

If you tap on the Achievements tab at the bottom of the Activity app, you can see all the achievements you’ve earned so far, and any you have not. If you’re into this sort of thing, then it gives you something to strive toward.

Only four achievements so far, we’ve been slacking.

If you don’t care about achievements or you want to stop Watch from nagging you to stand up, and other Activity nuisances, then you can configure these things using the Watch app on your iPhone.

Configuring the Activity Monitor on Your iPhone

If you want to change the behavior of the Activity monitor, such as how it alerts you and when, then you will need to open the Watch app on your iPhone and tap open the Activity section.

The first item is the ability to mute reminders for one day, which is useful if you’ve no intention of getting off the couch, you’re stuck in a meeting all day, or some similar situation.

Stand reminders can be annoying, particularly when you’re not able to do so. If you don’t want to receive stand reminders, this is where you can disable them.

You can set the interval between when you receive progress updates from none, four, six, or eight hours.

Some people need more attaboys than others. When you disable Goal Completions, you won’t receive notifications when you reach your daily activity goals.

The Activity monitor likes to reward you with achievements. Again, this largely depends upon how much motivation you get out of this. For some, this might seem like a nuisance or unnecessary, so you can turn it off if you desire.

Finally, you can get a weekly summary every Monday, which is a summary of your Move performance from the previous week. You’ll also have the opportunity to adjust your Move goal (remember, that’s how many calories you burn in a day) for the week to come.

While the Apple Watch does a great many things beyond monitoring your Activity, we admit the circles concept is a fun one and tends to motivate us pretty well.

The weekly summary will give you an accounting of your total steps, calories, distance, and so on. Just make sure you always wear your Watch when you perform any activities so you get an accurate picture.

Oh, and one more thing, if you intend to use your Apple Watch to monitor your activities and workouts, then you might want to consider buying one with a Sport Band or at least switching it out when you do anything that’s going to make you sweat. Swapping out bands is ridiculously easy so it shouldn’t be too much of a hassle.

We hope you found this article useful and you now understand the ins and outs of the Apple Watch’s Activity monitor. If you have anything you would like to add, such as a comment or question, please leave your feedback in our discussion forum.

Start your fitness and wellness journey with Apple Watch.

How to use activity monitor on apple watch to track your fitness

Set your goals and reach them

Learn how to track your progress, customize your metrics, and get better results.

  • Use the Workout app
  • Get accurate measurements

How to use activity monitor on apple watch to track your fitness

Work out with Apple Fitness+

Follow studio-style workouts that integrate your personal metrics from your Apple Watch.

  • Get Apple Fitness+
  • Use Apple Fitness+

Track all the ways you’re active

Workout types

Choose the option that best matches what you’re doing, so you get accurate credit.

How to use activity monitor on apple watch to track your fitness

Close your rings

Your Activity rings tell you how much you move, exercise, and stand every day.

How to use activity monitor on apple watch to track your fitness

Go for a run

Learn how to start your run, check your progress, and choose which metrics to track.

Go for a swim

Measure your laps in a pool or your distance in open water, and get better results.

Connect, share, and track your progress

Share with friends

Encourage each other to close all three rings, set up competitions, and track your daily progress.

View your trends

See your trends over time in the Fitness app, so you can make sure you’re on track.

How to use activity monitor on apple watch to track your fitness

How to use activity monitor on apple watch to track your fitness

Photo: Amazon

Shop now: Apple Watch Series 6, $380

Ahead, we round up the five best Apple Watch Series 6 features for movement (and teach you how to use ’em). From keeping an eye on your heart rate to graphing your activity over time to queuing up a yoga class, here’s how to use your new wearable to unlock 360-degree fitness.

How to use Apple Watch to track your fitness goals

1. Monitor your heart during (and outside of) workouts

Your heart is, quite literally, the beating heart of your fitness routine—and Apple Watch gives you a ton of information about how it’s doing. By navigating to the red heart app on your watch, you can see your current heart rate, resting heart rate, and walking heart rate. These metrics are an easy and effective way of measuring how your workouts improve your cardiovascular health.

“In general, your heart rate gives you a good indication of your overall health and well being, and how good your cardio fitness is,” says cardiovascular specialist Jennifer Haden Haythe, MD. You can calculate your maximum predicted heart rate is 220 minus your age (a 28-year-old should have a maximum heart rate of 192, then). “That doesn’t mean you need to be at a heart rate of 192 during your whole workout; it’s just your maximum predicted—but you want to get your heart rate up and have it sustained in the 150s, 160s, 170s, and even 180s while you’re exerting yourself,” adds Dr. Haythe. That means that when you’re doing vigorous exercise (like a HIIT workout or sprint training), you should see your heart rate spike towards that 192 goal.

2. Take note of your VO2 Max

Your Apple Watch also keeps track of your VO2 max, or the maximum rate of oxygen your body can take in during exercise. “It can indicate a person’s essential aerobic capacity, or the maximal working heart rate of that individual,” Brandon Hirose, a master trainer at Crunch Gym in New York City, previously told Well+Good. After a few workouts, you’ll be able to find your VO2 max in the summary section of your fitness app (under the “cardio fitness” trend). Then, watch as it improves over time with all your hard work.

3. Queue up a class on Apple Fitness+

Apple Fitness+, the tech giant’s new on-demand workout service, wants to help you close your activity rings every single time. Every Apple Watch user gets a free, three-month trial ($10 per month thereafter) that you can access via the fitness app. Inside, you’ll find Pilates, treadmill running, spin, yoga, strength training, and so much more from top-notch trainers like Betina Gozo. The app will also recommend classes for you based on the movement types you already love (and the ones you should do to round out your week of workouts).

4. Pay attention to your activity summary

Consider your Apple activity summary your dashboard. From there, you’ll be able to check how much exercise you’ve logged in any given day, how many hours you took a break to stand up, and what workouts you’ve logged over time. This is also where you’ll find “trends” or markers of how your physical fitness improves over time. If you shave five seconds off your mile time, you better believe that Apple Watch will notice and give you a gold star. Same if you step up the pace on your morning walk or improve that VO2 max.

5. Share your workouts with other pals who have Apple Watches

One of the most underrated features on the Apple Watch (IMO) is the fact that you can share your workouts with friends. That means that you get to congratulate them when they hit the finish line on a tough workout and receive all the adulation when you do the same. You’ll find this feature in the fitness app. Just invite your pal and engage in a little friendly competition.

Oh hi! You look like someone who loves free workouts, discounts for cult-fave wellness brands, and exclusive Well+Good content. Sign up for Well+, our online community of wellness insiders, and unlock your rewards instantly.

How to use activity monitor on apple watch to track your fitness

The fitness tracking on Apple Watch goes beyond just counting steps or tracking calories, instead focusing more on your overall health, differentiating between movement and actual exercise, and encouraging you to stand more than you already might. Performing the activities suggested by your Apple Watch helps fill up those rings in the Activity app, but how does Apple measure all of that, anyway? Well not to worry, we’ve got you covered right here.

Here, you’ll find absolutely everything you need to know about the Apple Watch and activity tracking, from how to set it up and sharing activities to starting workouts.

Let’s start with what the Activity app actually does, what it tells you, and what kind of data it collects.

The Rings

How to use activity monitor on apple watch to track your fitness

The Stand, Exercise, and Move rings make up the central display for your overall activity as captured by your Apple Watch. Scrolling down in the Activity app on your watch will show you an hour-by-hour breakdown of your activity for each (when you’ve moved, when you’ve recorded exercise minutes, and when you’ve stood).

Stand

This one seems pretty easy. You fill the stand ring by standing up for one minute an hour in 12 separate hours. What this ring and the alert that comes with it are actually telling you is that you haven’t moved in a little while. So when your Apple Watch notifies you that it’s time to stand, don’t just stand up and stay still, but walk around a little bit. Take a short stroll around your office, or if you’re at home, go check the mail.

Exercise

This ring tracks a specific kind of activity. Apple defines exercise as anything equivalent to a brisk walk or more that raises your heart rate consistently. Apple monitors your heart rate and your movement data to make sure you’re actually exercising, and you can track workouts using the Workout app on your Apple Watch. Additionally, you can feed workout data into the Activity app using third-party workout apps that support this feature, meaning you can use all of the features provided to you by your favorite workout app while still filling the Exercise ring.

One thing to note about the Apple Watch’s exercise measurements is that, as you more, they will change over time. So the same activities that would potentially help you close your Exercise ring when you first got your Apple Watch may only get you part of the way there after months or even years of consistent activity. The Apple Watch learns your habits, and will consistently push you to go further.

This ring shows how many calories you’ve burned throughout the day. It takes into account everything from motion to heart rate data, but it represents your total movement in a 24-hour period, not just exercise. You work towards a calorie goal that you set, and as you continue to wear your Apple Watch, it will be better able to measure how you burn those calories.

The Health app on iPhone, Workout app on Apple Watch, and Activity apps on both are separate and have distinct functions, but can work together to offer a detailed picture of your overall health.

Health

The central repository for all of the information your Apple devices have collected about your health. The data in the Health app includes the activity data collected by your Apple Watch, included Stand, Exercise, and Move data.

With your permission, the app can accept data from third-party apps, and you can also let those apps import your health data as well, to better help them tailor workouts to you. As long as you have granted access to read and write data to any third-party apps of your choice, the data they provide will become part of the overall picture of your health.

Workout app

This is the default app for tracking workouts, comes built-in with every Apple Watch, and exists solely on the watch. The data from this app feeds into the Health app on your iPhone, covering all sorts of activities, such as indoor and outdoor walks and runs, cycling, elliptical machines, rowing, hiking, and more. This is the data that will most likely go into your Exercise ring.

Activity app

Existing on both the Apple Watch and iPhone, the Activity app keeps detailed records (more on the iPhone than the watch, admittedly) of each day’s activity. Using the iPhone app, you can explore your activity for each day that you’ve worn your Apple Watch, getting breakdowns of how and when you burned calories, looking at exact details of each workout, and exploring your past achievements and achievements still to come.

Third-party fitness apps

Whether you use Pedometer++ to track your steps or Runkeeper to track more intense workouts, third-party fitness apps on the Apple Watch have come a long way since the device debuted in 2015. These apps can contribute to your Exercise ring on your watch and send and read detailed workout data from the Health app on your iPhone.

With this knowledge in hand, it’s time to actually get activity tracking set up.

BBeen using an elliptical machine off and on for a few months. The Apple Watch shows 1 minute of activity even when I do 15 minutes or more. How do I correct this to accurately track activity?

Apple Watch, watchOS 2.2.1

Posted on Jul 24, 2016 10:23 AM

When using the elliptical, be sure to record the activity as a workout using the Workout app and to choose Elliptical as the activity type:

Posted on Jul 24, 2016 10:27 AM

Helpful answers

Note also that, to credit progress towards your daily Exercise goal, the Activity app aims to identify activity that equals or exceeds the intensity of a brisk walk. This requirement applies both during general daily wear and when recording workouts (whether Elliptical or any other type) via the Workout app.

It is possible that your Elliptical workouts have not met this requirement for the full duration of your workouts.

The definition of a brisk walk depends on your personal information. To check that this is accurate – and to update it over time:

– On your iPhone, in the Watch app, go to: My Watch (tab) > Health > Edit – tap and adjust items, then tap on Done.

During general daily wear and when using the Workout app to record Indoor Walk, Indoor Run and certain outdoor workouts when the iPhone is not taken along, the Activity app and Workout app rely on arm motion (measured by the accelerometer) to track movement for the purpose of estimating results including distance, pace and progress towards the Exercise goal.

For the best results, allow the arm on which you are wearing your watch to swing naturally as you move around and during workouts (where relevant to the activity type).

Calibrating your watch can improve the accuracy of estimations made by the apps. More information and instructions for calibrating your watch are available via the link below. The article also includes instructions for resetting any existing calibration data and starting the process afresh.

One of the main features the Apple Watch has to offer is the ability to track your daily activities and workout routines. The Apple Watch has a comprehensive set of health and fitness tools to help you keep track of your movement, reach workout goals, and get more activity into your life. One of Apple’s main goals with the Apple Watch was to provide users with tools to keep them healthy, and the Activity and Workout apps on the Apple Watch are part of that effort.

If you’ve been a couch potato for too long, Apple Watch might be just what you need to motivate you to get moving and get healthy. The following video and tutorial will show you how to track your daily activities and how to monitor your workouts using the Activity and Workout apps.

Tracking Daily Activities

alt=”Activity Ring Apple Watch” width=”250″ height=”313″ />Thanks to the motion sensors built into Apple Watch, it’s always keeping track of your movement when it’s on your wrist. Whether you are sitting around doing nothing, or participating in a decathlon, Apple Watch knows your movements and will keep you informed.

  1. Open the Activity app on Apple Watch.
  2. Swipe left to the “Move, Exercise, and Stand” screen and tap Get Started.
  3. Enter your personal information (gender, age, weight, and height).
  4. Turn the Digital Crown to set the information and tap to Continue.
  5. Tap Start Moving.
  6. Or, use the Apple Watch app on your iPhone to enter the information, under the “Health” section of the app.

Once the information is entered, Apple Watch will do the monitoring for you. When you take a brisk walk, run, or take a spin class, your movement heart rate data will be tracked on your Activity Rings.

The Move Ring
The Move ring tracks calories you’ve burned by moving. Depending on how regularly you get around, Apple Watch will adjust your goals. So, if you are fairly sedentary, a short walk up and down a few flights of stairs will help you on your way to filling in your ring. However, if you regularly walk 12,000 steps in a day, your Move ring will be harder to fill. During the setup process, you choose your typical level of activity to get a ballpark movement goal, adjust it manually if you wish, and then let the Apple Watch tweak things over time.

The Exercise Ring
The Exercise ring tracks how many minutes of brisk activity you have completed in a day. Brisk exercise means movement that gets your heart rate up. So, a leisurely stroll to your boss’ office across the building does not count. However, if you were to skip to his or her office, you might make some progress on your Exercise ring.

The Stand Ring
The Stand ring is there to remind you that you need to move your body. Once per hour, Apple Watch will remind you to take a walk for a minute. Even if you are at a standing desk, you will be reminded. The idea is to get away from your desk for a minute, whether you are standing or sitting, and the Apple Watch wants to see you up and around in at least 12 hours of your day.

How to View Your Progress

  1. Swipe up on the Watch face, then swipe to the Activity Glances.
  2. Tap the Glance to open the Activity App.
  3. Swipe to see individual activities.
  4. Swipe up on an activity or turn the Digital Crown to see the activity as a graph.
  5. Or, you can view the information on the Activity app on your iPhone. Some watch faces include Activity as a complication option, letting you see your miniature activity rings at any time and access the Activity app with a tap right from there.

How to View Activity Achievements

alt=”Activity Achievements Apple Watch” width=”250″ height=”250″ />
You will earn achievements for completing fitness goals, like working out every day of the week, doubling your daily move goal, and completing all of your activity goals for the entire week. You can keep track of which achievements you’ve earned in the Apple Watch app.

  1. Open the Apple Watch app on your iPhone.
  2. Tap the Achievement tab.
  3. Tap an achievement to see your progress.

How to Manually Adjust Your Goals

alt=”Change your Move Goal Apple Watch” width=”200″ height=”250″ />
Apple Watch will update your goals every Monday based on your previous week’s activities. However, you can manually change them whenever you like.

  1. Open the Activity app on Apple Watch
  2. Firmly press on the display screen until you see a prompt to change your move goal.
  3. Adjust your goal according to your realistic ability.

Controlling Notifications

alt=”Activity Notifications Apple Watch” width=”250″ height=”444″ />
Apple Watch will send you friendly reminders about your daily activities. If you’d rather not get notifications, you can turn some or all of them off.

  1. Open the Apple Watch app on your iPhone.
  2. Tap My Watch.
  3. Tap Activity.
  4. Toggle the switches for each reminder on or off according to your desire.

Tracking Workouts

In addition to keeping track of your daily activities, Apple Watch will help you monitor your workouts. You can set specific goals based on length of time, calories burned, or distance. Once activated, Apple Watch will track your heart rate and movement and help you get through your workout.

alt=”Select a Workout Apple Watch” width=”173″ height=”217″ />Starting a Workout

  1. Open the Workout app, then tap the type of workout you will be doing, including running, cycling, rowing, and more. As you select workouts, Apple Watch will track your preferences and put the most used ones on top.
  2. Swipe left or right to choose a calorie, time, or distance goal.
  3. Turn the Digital Crown to set the number.
  4. When you are ready to start your workout, tap Start.

Pausing your Workout
You can pause a workout at any time by firmly pressing the display screen. Do this if you stop for any reason during your workout when you don’t want things like your heart rate tracked. Tap Resume to continue.

alt=”Pause Workout Apple Watch” width=”173″ height=”217″ />Ending your Workout
To stop a workout early, or if you’ve gone past your goal and still wanted to do more, but now it is time to stop, firmly press on the display screen. Then, tap End. Turn the Digital Crown to view your result summary. Tap Save to keep the information or Discard to delete it.

Apple Watch’s Activity and Workout apps are great for getting you motivated and keeping you on track. The Activity app on Apple Watch will show you your progress and allow you to fine-tune your daily activities in order to ensure that you keep moving and stay healthy.

How to use activity monitor on apple watch to track your fitness

One of the valuable, and lesser-known health features on Apple Watch is Cardio Fitness. The measurement is based on your VO2 max which Apple Watch can estimate when recording certain workouts. Follow along for a look at how to use Cardio Fitness on Apple Watch and iPhone including why it’s important, how to set it up, and how to measure/view Cardio Fitness levels.

Table of contents

Cardio Fitness background

Whether you’ve just recently gotten an Apple Watch or have had one for a while and haven’t used Cardio Fitness before, it’s a valuable measurement to understand and use.

Here’s how Apple describes it:

Apple Watch users can view their cardio fitness level in the Health app on iPhone, and receive a notification on Apple Watch if it falls within the low range. Breakthrough technology released in watchOS 7 allows Apple Watch to easily measure low cardio fitness, and today cardio fitness notifications empower users to be more active for dramatic long-term health benefits.

Cardiorespiratory fitness, as measured by VO2 max, is the maximum amount of oxygen the body can use during exercise, and it can be increased through physical activity. Apple Watch already estimates average and higher levels of VO2 max during vigorous outdoor walks, runs, or hikes, which many runners and other athletes monitor to improve performance.

By measuring the “body’s ability to take in, circulate, and use oxygen” Cardio Fitness is a metric that gives a good indication of overall health and can also predict long-term health. While there’s a correlation between low Cardio Fitness levels and future health issues, you’ve got the power to raise your levels with consistent aerobic exercise 🙂.

And another great supplemental resource to track heart health is with the Withings “Vascular Age” feature on its latest Body Cardio smart scale.

How to use Cardio Fitness Apple Watch and iPhone

Setup

  • If you haven’t set it up before, open the Health app on your iPhone
  • Tap Summaryand swipe down near the bottom and look for Cardio Fitness (under “Get More From Health”)
  • Choose the blue Set Up button
  • Follow the prompts like confirming your health details (users must be at least 20 years old)
  • You can choose to turn Low Cardio Fitness Notifications on for your Apple Watch
  • Now you’ll see Cardio Fitness show up under the Heart section in the Health app

How to measure Cardio Fitness with Apple Watch

  • You won’t see Cardio Fitness level data points for every workout recorded with Apple Watch, here’s what Apple says:
    • Apple Watch can record an estimated VO2 between 14 and 60 mL/kg/min when you do a brisk hike, walk, or run outdoorswith persistent heart rate measurement. It can estimate your VO2 max if you start one of those workouts in the Workouts app
    • VO2 max is validated for users 20 and older. Most people can improve their VO2 max with more intense and more frequent cardiovascular exercise. Certain conditions or medications that limit your heart rate may cause an overestimation of your VO2 max. You can indicate you’re taking certain medications in the Health Details.
    • You can read more specifics about Cardio Fitness in the Cardio Fitness section in the Health app.

    Interestingly, Cardio Fitness levels will show up even for outdoor walk/hike/run workouts that you’ve previously done. You can tap the timeframe icons at the top of Cardio Fitness to see daily, weekly, monthly, and yearly data (see more on this below).

    Apple notes that cycling is another great aerobic exercise to improve Cardio Fitness, but for now, it doesn’t look like tracking Cycling workouts on Apple Watch will record Cardio Fitness data.

    How to view Cardio Fitness levels on iPhone

    • You can look at your Cardio Fitness levels any time by heading to the Health app
    • Tap Browse > Heart > Cardio Fitness
    • Tap the blue “Show All Cardio Fitness Levels” to see all your available data
    • Now you can see the months you’ve been in the low, below average, above average, and high categories
    • If you happen to have another device that measures VO2 max (or have gotten it professionally measured) you can tap “Add Data” in the top right corner to manually add measurements
    • You can read more about why Cardio Fitness is important and how to increase it in the Health app – but the simplest and biggest factor is regular aerobic exercise 😎

    Read more 9to5Mac tutorials:

    FTC: We use income earning auto affiliate links. More.

    How to use activity monitor on apple watch to track your fitness

    Apple Watch

    Apple Watch is Apple’s wearable is designed to help you stay active, motivated, and connected. It runs watchOS, and it comes in 40mm and 44mm size options.

    How to use activity monitor on apple watch to track your fitness

    iPhone

    Introduced in 2007 by Steve Jobs, iPhone is Apple’s flagship iOS device and easily its most popular product around the world. The iPhone runs iOS and includes a large collection of mobile apps through the App Store.

    About the Author

    Michael Potuck

    Michael is an editor for 9to5Mac. Since joining in 2016 he has written more than 3,000 articles including breaking news, reviews, and detailed comparisons and tutorials.

    How to use activity monitor on apple watch to track your fitness

    Whether you’ve just gotten an Apple Watch or have had one for a while and just haven’t tracked your steps closely before, it’s easy to do. Follow along for how to see steps on Apple Watch including distance, flights climbed, along with daily, monthly, and yearly trends. We’ll also look at how to make custom complications to track steps right on Apple Watch faces.

    Table of contents

    Once you’ve got your Apple Watch paired with your iPhone and it’s up and running, it will automatically track steps whenever you’re wearing it.

    You can’t set goals for step count specifically, but it’s easy to quickly view and we’ll cover an option to place it on your watch face too.

    • Related:How to change Apple Watch Move goal and Exercise goal

    In the default Activity app on Apple Watch, you can see steps, distance, and flights climbed. And the Fitness app on iPhone shows your daily, monthly, and yearly distance trends in addition to all the data you can see on Apple Watch.

    How to track and see steps on Apple Watch

    Apple Watch automatically tracks steps whenever you’re wearing it. Here’s how to view your progress:

    1. Open the Activity app on Apple Watch
    2. Swipe down or scroll down with the Digital Crown
    3. Your daily steps, distance, and flights climbed will appear at the bottom
    4. You can also swipe down further and tap Weekly Summaryfor more data
    5. To see steps and related Activity data for another day, you’ll need to use the Fitness app on iPhone (walkthrough below)

    How to use activity monitor on apple watch to track your fitness

    Add step count to your Apple Watch face

    If you prefer to see your step count right on your Apple Watch face, check out our walkthrough on that process via the third-party Complication Lab app:

    How to track Apple Watch steps on iPhone

    There are two ways to look at steps and distance on iPhone.

    Daily steps and distance

    1. Open the Fitness app
    2. Choose the Summary tab
    3. Tap the Activity rings at the top
    4. Swipe down to see your steps and distance at the bottom or choose another date by swiping on the Activity rings at the top or tapping the calendar icon

    Distance trends

    1. Open the Fitness app
    2. Choose the Summary tab
    3. Swipe down to see your Trends with Distance walked/run and more
    4. Tap Show More next to Trends to see more data

    Here’s how it looks:

    How to use activity monitor on apple watch to track your fitness

    As shown above, Trends show you if your Move, Exercise, and Distance activity is on the upswing or downswing. Tap one of them to see daily, monthly, and yearly data.

    Keep in mind your data between Apple Watch and iPhone won’t always be exactly in sync. But after a few minutes of fresh activity, your iPhone should match up with your watch.

    The one caveat will be if you take your Apple Watch off and have your iPhone on you and do a decent amount of walking or running. In that case, the Health app on iPhone will show more steps than in the Activity app that’s pulling from Apple Watch data.

    Read more 9to5Mac tutorials:

    FTC: We use income earning auto affiliate links. More.

    How to use activity monitor on apple watch to track your fitness

    Apple Watch

    Apple Watch is Apple’s wearable is designed to help you stay active, motivated, and connected. It runs watchOS, and it comes in 40mm and 44mm size options.

    How To

    A collection of tutorials, tips, and tricks from the 9to5Mac team helping you fix and get the most out of your favorite gear.

    No matter which Apple Watch you have, they all display your fitness data in pretty much the same way — with Activity Rings. Here’s what they made and how to customize them so they better work for you.

    How to use activity monitor on apple watch to track your fitness

    How to use activity monitor on apple watch to track your fitness

    Apple currently sells three different Apple Watch models — the Series 6, SE and Series 3 — and while it’s true that each one has slightly different features and capabilities, they all track your fitness in pretty much the same way.

    This is because every Apple Watch has most of the same sensors that track fitness, including a built-in heart-rate sensor, GPS, gyroscope and altimeter. They all sync with Fitness and Health apps on your iPhone, and they all use Activity Rings to show you how you’re progressing on your fitness goals throughout the day.

    What do the red, green and blue Activity rings mean?

    If you don’t know, Activity Rings have been a feature of the Activity app — which is now the “Fitness” app — since Apple released the first Apple Watch in 2015. And to be honest, the Activity Rings haven’t changed much in the last five years. There are still three rings, each of represents a different fitness or movement goal that you should aim to achieve in one day.

    • The red Activity ring (aka your Move ring) represents your movement and shows you how many active calories you’ve burned.

    • The green Activity ring (aka your Exercise ring) represents your exercise and shows you how many minutes of “brisk activity” you’ve done in the day.

    • And the blue Activity ring (aka your Stand ring) shows how many times you’ve stood up throughout the day.

    Finally, you can customize all your Activity goals.

    When you first set up an Apple Watch — any Apple Watch — it asks some basic information about yourself, such as your sex, age, height and weight, and then it uses that information to automatically set the activity goals that populate the Fitness app. If you want to change those goals for some reason, whether you’re hitting them too easily or not finding them difficult to complete, you can.

    Before the latest software update, watchOS 7, was released, the red Move ring, which measures your active calories burned, was the only Activity ring that you could adjust — which had been a bit of a bummer. But with watchOS 7, which is available on every Apple Watch Series 3 of later, you can customize your Stand hours and Exercise minutes, too.

    Here’s how to change your activity goals:

    • Open the Activity app on your Apple Watch.

    • Scroll down to the bottom of the first (left-most) screen.

    • Select “Change Goals” and use the “+” or “—” to increase/decrease your goals.

    You’ll have to adjust/keep your Move (red) goal first. Then once you hit “Next” you’ll be able to change your exercise goal. And finally, after selecting “Next” again, you’ll be able to adjust your Stand goal. Select “OK” when finished.

    Customize reminders and notifications.

    Let’s be honest, not every one of us wants to be reminded that we haven’t stood up in the last hour. While some of us need to that extra bit of encouragement to get a workout in to complete that daily goal or monthly challenge. Fortunately you can adjust these notifications — but only on your iPhone. Here’s how:

    • Open the Apple Watch app on your iPhone.

    • Make sure you’re in the My Watch tab, then select Activity.

    • You can toggle on/off your various notifications and reminders as you see fit.

    If you like tracking your step count, the Apple Watch is one of the most convenient and accurate ways to do so.

    You can track steps directly on your Apple Watch via the Fitness app, or on the Fitness app or Health app for iPhone. If you want to see the number of steps you’ve taken each day without having to tap through the Fitness app on your Apple Watch, you can add a pedometer complication to your Watch face. Here’s everything you need to know.

    How to track steps on Apple Watch

    Though the Activity app doesn’t show it upfront, it is counting steps, and you can check the number at any time.

    1. Open the Fitness app on your Apple Watch. Its icon has three red, green, and blue concentric circles on it.

    2. Scroll down by turning the Digital Crown or by swiping up on the Watch face to view your total step count for the day. You can also view your move, exercise, and stand progress for the day in percentages; how you’ve progressed in each of the rings during each hour of the day; your total distance; and flights of stairs climbed.

    Quick tip: If you have an Activity Watch face, you can view your steps by simply tapping on your rings. This will bring you to the same information, but saves you the step of going to the Home screen and opening the app from there.

    3. Scroll down to the bottom of the list and tap Weekly Summary to see your progress throughout the current week, including the total number of steps you’ve taken so far.

    How to track Apple Watch steps on iPhone

    1. Open the Fitness app on your iPhone.

    2. Tap the Summary tab. Swipe down to the Trends section to see your average numbers for Move, Stand, Distance, and more. Tap Show More to see additional information.

    Quick tip: You can view your step history in the Activity section of the Health app.

    How to see steps on Apple Watch face

    2. Open the Watch app on iPhone.

    3. In the My Watch tab, tap the watch face you want to add the pedometer complication to.

    Quick tip: Complications pull information from apps and display that info on the face of your Apple Watch. Examples include the date (Calendar app), weather (Weather app), Activity rings, and more.

    4. Under Complications, tap to select a location for the pedometer complication.

    5. Tap to select the specific information you want displayed on your Apple Watch face.

    How to use activity monitor on apple watch to track your fitness

    Apple Watch is a great device for tracking health and fitness goals, and one important aspect of that is how much energy you’re burning. Follow along for how to see your calories burned on Apple Watch for active and passive metrics plus your daily total.

    Apple Watch keeps track of your active calories burned, and your Move ring shows that progress compared to your daily goal.

    But Apple Watch also tracks your total calories burned which is your active plus passive calories. Active calories are those you burn from movement.

    And passive calories are the set amount of calories your metabolism burns just being alive, even if you just sat on the couch all day. That’s called your base metabolic rate.

    Let’s take a look at how to calculate your passive calories along with where to see your overall numbers to get a better picture of your metabolism, help with meal planning, and more.

    While Apple Watch tracks and records your calorie metrics, you have to use iPhone to see the most calorie data.

    How to see Apple Watch calories burned – active, passive, and total

    Apple Watch – active calories

    1. On Apple Watch head to the Activity app
    2. Swipe or scroll down with the Digital Crown
    3. You’ll see your active calories burned under the Move goal
    4. You can also add the Activity complication to a variety of watch faces or use an Activity watch face to see active calories burned at a glance

    How to use activity monitor on apple watch to track your fitness

    iPhone – active and passive calories

    1. The Activity app on iPhone allows you to see more calorie data
    2. Once you open it, tap the Activity rings at the top
    3. Just under the move data you’ll see your total calories burned for the day in the bottom left of your screen
    4. Subtract your active (“Move” goal) calories from total to get your passive calories burned (base metabolic rate)

    To see the total calories burned for more days, choose another day from the top of your screen, or tap the calendar icon in the top right corner.

    Here’s how these steps look on iPhone:

    How to use activity monitor on apple watch to track your fitness

    Read more 9to5Mac tutorials:

    FTC: We use income earning auto affiliate links. More.

    How to use activity monitor on apple watch to track your fitness

    Apple Watch

    Apple Watch is Apple’s wearable is designed to help you stay active, motivated, and connected. It runs watchOS, and it comes in 40mm and 44mm size options.

    How To

    A collection of tutorials, tips, and tricks from the 9to5Mac team helping you fix and get the most out of your favorite gear.

    We know Polar H10 is a heart rate sensor that helps read the heart rate during any workouts. But to monitor the heart rate, you need to sync the Polar H10 with any Apple Smartphone or watch.

    Now the question is how to use Polar H10 with Apple watch. Do not worry because, in this content, we are trying to explain the pairing process of the Polar H10 heart rate sensor with Apple Watch by providing simple steps.

    To learn in detail, go through the next segments of this article and clear your question ‘how to use Polar H10 with Apple Watch’ as well successfully pair the Polar H10 with your Apple Watch.

    Brief Information about the Polar H10

    The polar H10 heart rate sensor comes along with a chest strap that allows you to wear it around your chest and monitor the real data of your heart rate during any exercise.

    There are two electrodes both in the strap and the sensor so that you can attach the sensor with the chest strap.

    How to use activity monitor on apple watch to track your fitness

    How to use activity monitor on apple watch to track your fitness

    How to Use Polar H10 with Apple Watch

    Now to learn how to use Polar H10 with Apple Watch you can follow the given steps-

    Step 1: Attach the Sensor with the Chest Strap

    To activate the Polar H10 sensor at first, you need to attach it with the chest strap properly, as shown in the figure below, and after that, wear the strap around your chest so that it can take the perfect reading of your heart rate.

    Step 2: Do Not Pair the Sensor with Your Smart Phone

    If you want to use the Polar H10 heart rate sensor with your Apple Watch, make sure you have not paired the sensor with your Apple Smartphone before. If you have synced the sensor with your smartphone, in that case, your watch might not find any devices for syncing.

    In the given figure, you can see Polar H7 is paired with the Apple Phone, and as a result of that, the Apple Watch could not be able to find any health devices to pair.

    How to use activity monitor on apple watch to track your fitness

    Step 3: Go to the Settings Option of Your Apple Watch

    From this step, the primary syncing process starts. You can sync the Polar H10 heart rate sensor without using any app.

    At first, you need to go to the settings option of your Apple Watch, as shown in the figure below.

    How to use activity monitor on apple watch to track your fitness

    Step 4: Select Bluetooth Option from Settings

    From the settings option of your Apple Watch, now you need to go to the Bluetooth option as shown in the picture and wait until your Apple Watch finds your Polar H10 heart rate sensor.

    How to use activity monitor on apple watch to track your fitness

    How to use activity monitor on apple watch to track your fitness

    Step 5: Pair Your Polar H10 to Start Your Workout

    It is the final step before starting your activities. Now all you need to do is to pair the Polar H10 using your Apple Watch so that you can start your activity.

    How to use activity monitor on apple watch to track your fitness

    Step 6: Start Your Workout

    Now to start monitoring your heart rate, go to the activity option of your Apple Watch as you usually do, then select your workout goal.

    Within a few seconds, your Apple Watch will start showing your heart rate accurately that the Polar H10 heart rate sensor is measuring.

    Why Use Polar H10 Heart Rate Sensor?

    A common question may arise in our mind why should we use a Polar H10 heart rate sensor when the Apple Watch itself can take your heart rate.

    As you are an Apple Watch user, then you might have noticed that during your workout, Apple’s two series watch only activates for 15 seconds to save battery life. But using the Polar H10 heart sensor, you can instantaneously monitor your heart rate.

    How to use activity monitor on apple watch to track your fitness

    Another reason for using the Polar H10 heart rate sensor is the accuracy of the reading. The Apple Watch sometimes could not monitor your heart rate accurately so that it is better to go for a Polar H10 heart rate sensor.

    See the figure given below, and you will understand the difference. You can see in the given picture, the yellow-colored section is a bit confusing, and it is not providing the accurate value of heart rate.

    Now consider the second section of this picture here you will see using a Polar H10 heart rate sensor you can achieve more accuracy in the process of monitoring the heart rate.

    How to use activity monitor on apple watch to track your fitness

    Verdict

    Following these steps, you can successfully learn how to use Polar H10 with Apple Watch. We are optimistic that you will find this article useful, and all your confusion will come to an end.

    Set your workout goal and monitor every beat of your heart with the help of a Polar H10 heart rate sensor by syncing it with your Apple Watch.

    • 9 Effective Exercises Alternative to Step ups!
    • How to Create a Training Plan in Garmin Connect
    • How to Use Polar Heart Rate Monitor: 2-Different Process
    • How To Change Time On Fitbit
    • Jump Rope Alternative | Workout Smoothly
    • Garmin Fenix Vs Vivoactive – Who Owns the Fitness Trackers World?
    • Garmin 245 vs 645 || Which Is The Best Smartwatch For Runners?
    • 9 Best Garmin for Mountain Biking With Comprehensive Reviews
    • 7 Best Batteries For Garmin Vector 3- Perfect Picks For Garmin Owner
    • 7 Best Heart Rate Monitor for Garmin Edge 520 with a Complete Buying Guideline

    report this ad

    Thefitnesskits.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees.

    alt=”Ezoic” width=”” height=”” /> report this ad alt=”Ezoic” width=”” height=”” /> report this ad

    How to use activity monitor on apple watch to track your fitness

    Curious where to find all the workouts you’ve tracked with Apple Watch? Read on for how to see your Apple Watch workout history on both your wearable and iPhone as well as your move, exercise, and stand trends over time.

    Tracking workouts with Apple Watch records a lot of useful activity and health data. You can only see the details for the current day’s workout(s) on Apple Watch, but on the Activity app on iPhone, you can take a look at your full workout history, workout trends, and more.

    Apple Watch: How to see your workout history

    On Apple Watch

    1. Open the Activity app on your Apple Watch to see your daily workout history
    2. Swipe or scroll to the very bottom
    3. Tap your saved workout(s) to see all the data

    Here’s how this looks on Apple Watch:

    How to use activity monitor on apple watch to track your fitness

    Now you’ll see all most of the recorded data (iPhone offers more, covered below), swipe or scroll down to see more.

    How to use activity monitor on apple watch to track your fitness

    On iPhone

    1. Open the Activity app on your iPhone to see your full workout history
    2. By default, you’ll see the Today view
    3. Tap the month in the top left corner to see workouts from past weeks, months, and years.
    4. Tap on a day and swipe to the bottom to see your workouts
    5. Select a workout to see your time, calories burned, average heart rate, heart rate recovery, weather, and a map
    6. Alternately, you can tap the Workouts tab at the bottom of the Activity app to see a list of just your workouts
    7. Don’t forget to check out the Trends tab to see how your different metrics are changing over time

    Note when looking at the heart rate average from recorded workouts on iPhone, swipe from right to left to see your heart rate recovery data.

    Here’s how these steps look on iPhone:

    How to use activity monitor on apple watch to track your fitness

    Swipe down to the bottom of any day to see your workouts, or use the Workouts tab in the Activity app.

    How to use activity monitor on apple watch to track your fitness

    Here’s how the Workouts and Trends tabs look:

    How to use activity monitor on apple watch to track your fitness

    Read more 9to5Mac tutorials:

    Apple Watch:

    iPhone & iPad:

    AirPods Pro:

    FTC: We use income earning auto affiliate links. More.

    How to use activity monitor on apple watch to track your fitness

    Apple Watch

    Apple Watch is Apple’s wearable is designed to help you stay active, motivated, and connected. It runs watchOS, and it comes in 40mm and 44mm size options.

    How To

    A collection of tutorials, tips, and tricks from the 9to5Mac team helping you fix and get the most out of your favorite gear.

    How to use activity monitor on apple watch to track your fitness

    Want to use your Apple Watch as a speedometer for tracking speed? Here’s how you can.

    Track Your Speed Using an Apple Watch – Perfect While Riding a Bicycle or Just for Fun

    Our mobile devices are capable of doing so much that we sometimes forget about the little things. Take measuring speed as an example. There are countless apps for doing so on an iPhone, but you’ll be pleased to learn that the same can be achieved on an Apple Watch. Now, why would you want to do that? For a number of reasons. For instance, you’re riding a bicycle and want to see on your wrist if you’re crushing that speed limit or not. Or, you know, just because you can!

    So, we will show you how you can use the Apple Watch as a speedometer for tracking speed.

    Using Apps from the App Store (The Obvious)

    Downloading and installing an app for tracking speed is the convenient route and you get a whole lot more in the entire package. The two apps that are best for the job are linked below.

      (App Store link) – Price: $0.99 (App Store link) – Price: Free
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness

    Both apps have their pros and cons, but at the end of the day they’ll track your speed as expected.

    The Non-App Route (Workaround)

    The built-in Activity app on Apple Watch lets you track speed as well. But of course, in order to do that you need to fire up an Activity session in the first place. Furthermore, if you have an Apple Watch Series 2, then you’re absolutely golden. Why? Because the wearable features built-in GPS for accurate tracking.

    To start things off, launch the Activity app on your Apple Watch. Once you do, tap on the Outdoor Cycle option. Now swipe all the way to the right of the display and you’ll reach the Open, No Goal screen. Tap on Start.

    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness
    • How to use activity monitor on apple watch to track your fitness

    Right under the elapsed time counter, you’ll see your speed calculated using GPS. Pretty neat, right?

    Keep one thing in mind though: the speed changes are somewhat slow, so don’t expect real-time updates as you move along. But hey, you’ll get a good estimate of how you’re doing in the speed department once the skies clear up.

    I just had a tennis lesson and I wanted to set my Apple Watch to count that as an exercise. I have no idea how many calories I am supposed to burn with that, or what my heart rate should be, etc. I just want something simple: to direct Apple Watch to note that I did some exercise today, 45 minutes of tennis lessons. How do I do that?

    Posted on Sep 6, 2015 6:34 AM

    All replies

    Loading page content

    Page content loaded

    When you play tennis, start and finish a workout in the Workout app, choosing Other as the activity type.

    From the Home screen (single press on Digital Crown) > tap on the Workout app (runner symbol on green background).

    Sep 6, 2015 6:37 AM

    That takes me to a calorie counting screen that asks me to “set calories.” I have no idea how many calories I’m supposed to burn in the workout. There is no simple “tennis” setting.

    Sep 6, 2015 6:45 AM

    You are using “Other” because the Workout app does not have a tennis setting.

    On the screen that you are referring to, you can swipe left or right to set a different type of goal for the activity you are about to start – for example, you can choose time instead.

    For more instructions, click the link I provided above.

    Sep 6, 2015 6:50 AM

    You can suggest that Apple adds an activity type to the Workout app (eg specifically for tennis) here:

    Sep 6, 2015 6:52 AM

    You cannot add – via the Workout app – an activity that you have already completed. To record a workout so that it is shown in your activity history in the Activity app on your iPhone, you need to start and end that workout via the Workout app on your Apple Watch when you are actually doing that activity.

    It is possible to add data – after the fact – via the Health app on your iPhone, but it will not be reflected as a workout in the Activity app on your iPhone:

    On your iPhone: Health > Health Data tab > Fitness > Workouts > Add Data Point.

    Sep 6, 2015 7:01 AM

    Redrudy wrote:

    That takes me to a calorie counting screen that asks me to “set calories.” I have no idea how many calories I’m supposed to burn in the workout. There is no simple “tennis” setting.

    From the “set calories” screen, swipe right for the ability to set the duration of your workout. Set it to 45 minutes, then Start.

    If you don’t want to set any particular goal (calories or time) then swipe once more to the right and choose “open”.

    Sep 6, 2015 7:41 AM

    As a tennis player, I too have this problem, so I built a TennisKeeper app. It tracks your tennis activities and add it as a workout to your Apple Health so that you can get the credit in your Apple activity app.

    Mar 18, 2017 8:07 AM

    TennisKeeper is the best tennis tracking app for Apple Watch. If you play and wear an Apple Watch, get this app TODAY!!

    Jun 3, 2017 2:42 PM

    Check out the tennis app, Swing. It was featured on Episode 3 of Apple’s new Planet of the Apps TV Show! It saves your tennis workouts to Activity and Health 🙂

    Aug 14, 2017 2:24 PM

    The “other” setting does a poor job tracking tennis.

    Dec 2, 2017 5:45 AM

    Question: Q: How do I set tennis as a workout on my Apple Watch More Less

    The Apple Watch is best the fitness tracker for iPhone users, with the ever-popular three rings tracking your stand, move and exercise goals for each day. Whether you’re going above and beyond your originally set fitness goals or need a break from achieving those three colorful rings, there’s a way to change your goals.

    On the Activity app on your Apple Watch, you can change the number of active calories for your daily Move goal, the number of minutes for your daily Exercise goal, and the number of hours for your daily Stand goal. Looking to increase or decrease your daily numbers? Here’s how to change fitness goals on your Apple Watch.

    How to change the Activity goal on Apple Watch

    Finding how to change settings on an Apple Watch can be tricky, as there are only so many options that can be shown on a small screen. However, you’ll find plenty of information by scrolling using the dial or touchscreen.

    • On your Apple Watch, navigate to the Activity app and tap on it
    • On the first screen, scroll down to the bottom and tap “Change Goals.”
    • Tap on the “+” or “-” icons to increase or decrease your Move, Exercise or Stand goals.
    • Tap “OK” on the “Stand Goal” menu to finish changing your Activity goals.

    That’s it. You can also check your weekly summary in the Activity app to find out what goals you achieved during the week. However, your iPhone will give you a more in-depth report on daily goals throughout the year.

    As you’ll find in our Apple Watch Series 7 review, the Apple Watch is well ahead of the competition, especially with its other health-tracking features including the ECG sensor, SpO2 monitoring and heart rate tracking. The latter even helps tracks workouts in the exclusive Apple Fitness subscription program.

    How to use activity monitor on apple watch to track your fitness

    Apple Watch is a powerful device with lots of benefits, but if your Activity and Workout data seems off or totally broken, the smartwatch loses a lot of its value. Let’s look at how to fix Apple Watch Workout tracking and Activity tracking.

    Whether something seems wrong with your heart rate data, or step, distance, calorie, or even GPS tracking, there are four steps to first try to fix Apple Watch Workout and Activity tracking.

    Part of the issue could be trying to track workouts and activity where GPS is unavailable, but the problems may also be due to your location services settings, motion calibration settings, and more.

    Below we’ll look at how to fix Apple Watch tracking with some quick solutions you can use on iPhone and Apple Watch.

    How to fix Apple Watch Workout tracking and Activity tracking

    On iPhone

    First, look at location services

    • Open the Settings app > choose Privacy
    • Now tap Location Services
    • Check Location Services is turned on at the top
    • Swipe down to the very bottom and tap System Services
    • Check Motion Calibration & Distance is toggled on

    Now, you can check your personal details to make sure they’re up to date:

    • In the Watch app on your iPhone, choose the My Watch tab in the bottom left corner
    • Swipe down and tap Health
    • Choose Health Details
    • Make sure your height, weight, and more are accurate

    Next, you can reset your calibration data.

    • Still in the Watch app on your iPhone
    • Choose the My Watch tab in the bottom left corner
    • Swipe down and tap Privacy
    • Tap Reset Fitness Calibration Data

    On Apple Watch

    To calibrate Apple Watch after you’ve reset your fitness calibration:

    • Apple says head outside to a “flat, open outdoor area that offers good GPS reception and clear skies.”
    • For Apple Watch Series 2 and later you don’t need to bring iPhone (for Series 1 and 0 you do)
    • Open the Workout app on your Apple Watch and start an outdoor walk or run
    • Complete 20 minutes or so of the walk/run

    Apple shares more specifics on how the recalibration works in a support document:

    If you don’t have time to finish the workout, you can complete 20 minutes over multiple outdoor Workout sessions. If you work out at different speeds, you should also calibrate for 20 minutes at each of the speeds that you walk or run.

    Whenever you walk or run outside using the above steps, your Apple Watch continues to calibrate the accelerometer by learning your stride length at different speeds. Calibration can also improve the accuracy of your calorie calculations in the Workout app, and the calorie, distance, Move, and Exercise calculations in the Activity app.

    More tips from Apple to get the best Apple Watch tracking include making sure you have a snug fit, choose the most accurate workout type in the Workout app, and make sure wrist detection is on (Watch app on iPhone > My Watch tab > Passcode > Wrist Detection).

    If you’ve tried all of the steps above and are still having trouble with accurate Apple Watch Workout tracking and Activity tracking, reach out to Apple Support.

    How to use activity monitor on apple watch to track your fitness

    watchOS 5 comes with a new workout detection feature. This simple feature tries to predict when you’re working out and helps you record it. While the workout detection happens automatically, there is still a manual step involved. Unlike Fitbit, your Apple Watch won’t start recording a supported workout automatically. What you’ll get instead is a helpful notification asking if you’d like to begin the workout that Apple Watch has just detected.

    This is a welcome improvement if you’re the kind of person who always forgets to start tracking a workout. Now, you won’t end up losing out points for your Move goal. Even if you start the workout late, you do get credit for the couple of minutes you missed out on (but only as far back as Apple Watch recorded).

    How Workout Detection in watchOS 5 Works

    The feature is turned on by default once you upgrade to watchOS 5. But if for some reason, it’s not enabled, go to Settings -> General -> Workout and turn on the Start Workout Reminder and End Workout Reminder features.

    • Running
    • Walking
    • Swimming
    • Elliptical
    • Rower

    Once you start moving, Apple Watch will detect the movement and will try to pair it with one of the above workouts. After a couple of minutes and Apple Watch is sure about the workout, you’ll get a helpful notification asking if you’d like to start a workout.

    You’ll also get to see multiple versions of the same workout. For instance, if you’re running, you can either start an Outdoor Run or an Indoor Run right from the notification. Once you tap on it, you’ll be taken straight to the Workouts view.

    How to End Workouts Automatically in watchOS 5

    Similarly, you’ll get a notification when you’ve stopped workout out but you forgot to turn off the workout tracking. After a couple of minutes of inactivity, Apple Watch will say something like “Finished your workout?”. Tap on the End Workout option. If you want to change the workout, you can do that from the notification as well.

    How Do You Use Apple Watch?

    Do you use Apple Watch primarily as an activity tracking device or to manage your notifications? Share with us in the comments below.

    How to use activity monitor on apple watch to track your fitness

    Fitness tracking is one of the glaring features of Apple Watch. As a matter of fact, this smartwatch is produced to measure your fitness activities. While you can always check your daily goals, calories, steps, distance walked, and flights climbed after finishing your activity, it takes a little effort to see the weekly activity summary. No worries! You can read this quick guide to view weekly activity summary on your Apple Watch.

    Apart from Apple Watch, you can also check your weekly activity summary on your iPhone. However, your iPhone shows you limited data of daily, weekly, monthly, and yearly activity summary.

    How to Check Weekly Activity Summary on Apple Watch and iPhone

    On your Apple Watch

    Every Monday, your Apple Watch shows you how you performed in the last week. Apart from Monday, you can take a glance at your weekly summary on any day during the week.

    Step #1. Open Activity App on your Apple Watch and apply 3D touch on the rings of your exercise goals.

    How to use activity monitor on apple watch to track your fitness

    Step #2. Two options appear on the watch screen: Weekly Summary and Change Move Goal. Tap on Weekly Summary.

    How to use activity monitor on apple watch to track your fitness

    Your Weekly Summary describes your weekly fitness activity, which includes Calories, Avg. Calories, Steps, Distance, and Flights Climbed.

    You can revise your move goals by taping on Change Move Goal and then rotate the digital crown.

    How to use activity monitor on apple watch to track your fitness

    View Weekly Activity Summary On Your iPhone

    Activity app on your iPhone doesn’t show you weekly activity summary. However, you can use Health app on your iPhone to get the weekly activity summary.

    Step #1. Open Health app on your iPhone → By default, you are on Today screen; if not there, tap on Today from the bottom → Now, tap on Activity banner, which is seen on the top in black background.

    Step #2. On Activity screen, you can see the summary for Today, Date range, Month, and Year. Check those tabs displaying initials: D, W, M, and Y. Tap on W and the app will show you weekly activity summary. You can scroll horizontally to view previous weeks’ summary.

    How to use activity monitor on apple watch to track your fitness

    Signing off…

    There is some difference between the weekly activity summary displayed on Apple Watch and iPhone. While your watch offers some detailed figures, your iPhone only shows Move, Exercise, and Stand goals.

    You may also like to refer:

    How often do you check your weekly activity summary? Share your feedback with us in the comment section.

    How to use activity monitor on apple watch to track your fitness

    iGeeksBlog has affiliate and sponsored partnerships. We may earn commissions on purchases made using our links. However, this doesn’t affect the recommendations our writers make. You can read more about our review and editorial process here.

    The Apple Watch is packed with health and fitness features—so many that it can be overwhelming. But with a little thought, you can set up your watch so that it helps you to do great workouts and gets you ready for the next one.

    How to Track Your Workouts With AppleWatch

    However you get your workouts in, you might eventually reach a point where you want to keep track…

    Set Your Activity Goals

    In the Activity app, which is separate from the Watch app, you can check whether you’ve been “closing your rings” every day, and you can set goals for two out of three of the rings. The rings are:

    • Move (the red outer ring) – how much the watch thinks you’ve moved around today. It’s measured in calories.
    • Exercise (the green middle ring) – how many minutes of exercise you’ve had today. The watch detects exercise when you’re moving around and your heart rate is elevated, but it also understands when you’ve logged a workout with an app (for example, you’ll get credit for a 30-minute yoga session even if your movement and heart rate didn’t trigger the automatic exercise detection).
    • Stand (the blue inner ring) – how many hours of the day it thinks you’ve spent with at least one minute on your feet. The goal is 12. It is not very good at telling when you are standing, so you may have to wave your arm around when it gives you those “Stand up!” reminders as you’re, say, standing at your standing desk.

    Sounds good
    Have up to 20 hours of battery life and can be used in multiple different listening modes to make you as aware as you want to be of your surroundings.

    The app encourages streaks, so if you like to see all your rings closed every day (and earn the associated badges) make sure that your Move and Exercise goals are set to a level that feels doable every day (even your rest days).

    Turn Off Most of the Notifications

    Notifications are bullshit even on your phone , but there’s no need for emails to bother you mid-workout. Go into the Watch app, and then Notifications. By default, the watch will mirror notifications from your phone apps. Turn off everything unless it really, truly can’t wait. (It can all wait.)

    Choose Your Favorite Fitness Apps

    If you’re a Strava person, you’ll love Strava on the Apple Watch. If you do Nike Run Club instead, there’s an app for that too. If you’re not sure how you’d like to track your workouts, stick with the stock Activity app .

    Some fitness apps can work on the watch and phone at the same time; others demand you use one or the other, and you may have to figure out what you prefer. (I do outdoor runs on the watch and lifting workouts on my phone, for example.) Take a few workouts to experiment. You may find a new favorite app!

    Queue Up Your Audio Situation

    You can play music and podcasts directly from the watch, through wireless headphones, but you’ll have to download them to the watch first. This is ideal if you want to work out without carrying your phone.

    But if you prefer to have your phone on you anyway, you may prefer to stick it in a pocket, run your headphone cable to the phone, and use your watch as a remote to control playback. All your favorite music, podcast, and audiobook apps can work this way; again, decide what you prefer. On long runs, I like to set up a queue of podcast episodes in Castro, then stick my phone in my pocket and control everything from my wrist.

    Put Motivating Complications on Your Watch Face

    I use the Infograph watch face as a control center for planning my morning workouts. I’ve got:

    • My workouts all plugged in to my calendar, which means that at night my watch face tells me what’s on deck for the morning. For example: “6:30am Easy Run.”
    • Sunrise/sunset and alarm time, so I know when I’m waking up and how much of the workout I’ll have to do in the dark (sigh).
    • Weather, specifically Dark Sky. I tap this complication and it tells me what the weather will be at each hour of the day so I know what clothes to set out for that morning run.
    • Phase of the moon, which is not a necessity but the dark is less depressing when there’s a full moon.
    • Battery level, so I know whether I have enough juice for a night of sleep tracking followed by a morning workout.
    • Monthly mileage, a complication that comes from the Nike Run Club app. It automatically calculates how many miles I’ve run (with the app) so far this month, and I love watching the numbers tick up.

    I also use the Nike watch face (you can have multiple faces, just swipe left and right), with its default “start a Nike run” complication, plus activity rings, battery level, and current heart rate. This is the watch face I use the most for everyday time checks.

    Keep Tabs on Your Heart Rate

    If you track workouts with the watch, you can see your heart rate in the activity app on your phone, or in the heart rate app on the watch. You can see your running intervals or even your weightlifting sets in the rise and fall of your heart rate during the activity. (No lie, I have used this feature when I forgot exactly how many intervals I did during a workout.)

    On your watch, you can check your heart rate at any time with the heart rate app. Scroll down and you’ll see some more data. The very last screen is your heart rate recovery, which is a measure of heart health and fitness . The average person’s heart rate drops by 15 to 20 beats per minute after a workout; the faster it returns to normal, the healthier your heart is (as a rule of thumb, your watch is not a replacement for a doctor).

    If you wear the watch when you sleep, you can also check your resting heart rate. The heart rate app on the watch will show it to you, but you can also see it graphed in the Health app. A low resting heart rate is good; if it suddenly rises, you may be overtraining, stressed, or sick.

    How to use activity monitor on apple watch to track your fitness

    Although Apple Watch sensors measure our heart rates precisely, people love to use some third-party apps. These apps provide neat and clean user interface and easy-to-understand metrics. It also allow users to customize their fitness activities and workouts. To make your life easy, we have listed some of the best heart rate monitor apps for Apple Watch.

    1. Qardio Heart Health

    How to use activity monitor on apple watch to track your fitness

    Qardio Heart Health is an award-winning health app for your Apple Watch. The app has won many laurels and accolades, and the reason is medical grade accuracy and extraordinary user experience. You can easily pair the app with any Qardio device and start taking measurements by pressing a single button.

    Since Qardio devices are clinically proven and validated, you can trust its readings. The app also seamlessly works with your Apple Watch. Instead of giving complex data, the app serves users with simple charts, statistics, and trends.

    Price: Free
    Download

    2. Zones for Training

    How to use activity monitor on apple watch to track your fitness

    Unlike the default Health and Activity apps on Apple Watch, Zones for Training can track more than 70 fitness activities. Measure your workouts on your watch and review it on the bigger screen of your paired iPhone. The app can monitor real-time exercise intensity and heart rate during your fitness sessions.

    The app is primarily divided into four heart rate zones viz. Peak, Cardio, Fat Burn, and Warm Up. By using this app on your Apple Watch, you can surely improve your performance, speed, cardio endurance, etc.

    Price: Free (Pro – $4.99)
    Download

    3. HeartWatch: Monitor Heart Rate

    How to use activity monitor on apple watch to track your fitness

    HeartWatch is a paid app and therefore, there are no interruptions in the form of advertisements or third-party codes. Moreover, the app does not track your analytics. The app measures different metrics of daytime, sedentary, sleeping, waking, and workouts.

    Two of the notable features of this app is detailed trend analysis and exporting all health metrics. Get your heart rate, training, summary, GPS maps and more. You can also stream workout information from your watch to iPhone.

    Price: $3.99
    Download

    4. Heart Analyzer

    How to use activity monitor on apple watch to track your fitness

    Heart Analyzer provides you what your Apple Watch does not. The app explore the full potential of your Apple Watch and presents your health data in graphs, metrics, and reports. Apart from the current health data, the app also shows average, maximum, minimum, and resting heart rates from the past three years.

    The best thing about the app is it exports PDFs of monthly heart reports, which you can send to your doctor. The app lets you customize complications so that you can keep pace with your heart rate.

    Price: Free (In-app purchase starts from $1.99)
    Download

    5. Cardiogram: Heart Rate Monitor

    How to use activity monitor on apple watch to track your fitness

    Keep your eyes on your heart’s everyday activities by using Cardiogram on your Apple Watch. The app gives visual presentation of your heart rate with interactive graphs; you can quickly spot any anomalies and trends. Check the heart rate graph in real time on your wrist.

    As you see any change in trends, you can take a note of it and also jot down the symptoms or potential triggers of the change. Cardiogram combines the capabilities of Health and Activity apps on your iPhone and Apple Watch respectively.

    Price: Free (In-app purchase starts from $3.99)
    Download

    6. Heart Graph

    How to use activity monitor on apple watch to track your fitness

    Get a real-time graph of your heart rate on your iPhone. The app supports Bluetooth sensors and Apple Watch as well. You can also review your workout sessions offline to check trends in data. An important feature is integration with Apple Health app; this allows you to import your current workout data and store new sessions.

    Landscape orientation allows you to watch your data on the bigger screens of iPhone and iPod touch. Make a single payment and enjoy premium features of the app.

    Price: Free (In-app purchases starts from $0.99)
    Download

    That’s all folks!

    Summing up…

    Since third-party apps provide more detailed data to uses, they wish to download heart rate monitoring apps on their Apple Watches. Moreover, such apps allow users to customize their fitness activities and workout sessions.

    You may also like to read…

    Which heart rate monitor would you like to download? Share your choice with us in the comment below.

    How to use activity monitor on apple watch to track your fitness

    iGeeksBlog has affiliate and sponsored partnerships. We may earn commissions on purchases made using our links. However, this doesn’t affect the recommendations our writers make. You can read more about our review and editorial process here.

How to use alexa to make house guests feel more at home

You’re probably not using Alexa to its full potential. Change that by using these voice commands.

Sarah Mitroff is a senior editor for CNET, managing our health, fitness and wellness content. She’s written for Wired, MacWorld, PCWorld, and VentureBeat.

With Alexa and the range of Echo devices, — including smart displays and smart speakers — Amazon has built a robust service that can deliver seemingly endless information and control your home. But, are you actually taking full advantage of all it can do?

If you haven’t yet unlocked the full potential of Alexa, the following seven voice commands will get you closer. These are the amazing things Alexa can do that you should start using now.

Read more: Amazon announced the new Echo Show 15 smart display at its September 2021 fall product launch event , along with several other new Echo and Ring products .

Welcome you home

What makes Alexa so useful is that it can plug into many other smart home devices . Connect your Philips Hue or LIFX smart light bulbs to your Echo and you can tell Alexa to turn on the lights .

Take it up a few notches and create a routine for when you arrive home so that when you say the magic words, such as “Alexa, I’m home” it can turn on your lights, play music and turn on the heat (or many other sets of actions).

Give your brain a break from remembering important info

Always forgetting your sister-in-law’s birthday or to pick up your dry cleaning? Alexa can remember for you . Just say “Alexa remember [exactly what you want to remember]” and it will take care of the rest.

Act as a host

When you have friends or relatives staying at your house, inevitably they’re going to ask what’s the WiFi password or where to find an extra set of towels. Let Alexa handle it with a custom command (called Skills) . With a Skills Blueprint, you can create a Custom Q&A for your home so that visitors can get answers without you.

Head to Amazon’s Skills Blueprint page and pick the “Houseguest” option to create a guide with FAQs your guests might have while staying with you. When they arrive, they can ask “Alexa, where is the toilet paper?” or “Alexa, how do I turn on the shower?” and it will give them the answers.

Smart plugs can make your regular “dumb” home appliances smarter. And if you want to add voice control to manage your appliances via a smart plug, they can be synced to the Amazon Echo, too. Find out how to connect your smart plug to an Alexa device with this step-by-step guide.

What is a Smart Plug?

A smart plug is a device that plugs into your wall outlet and lets you control any device you plug into it with your phone or Echo device. If you plug a lamp into a smart plug, you tell Alexa to turn it off. Or you can schedule your coffee maker to turn on before you wake up every morning.

How to use alexa to make house guests feel more at home

What Can a Smart Plug Do?

You can use a smart plug to turn an appliance on or off, even when you’re not at home. A smart plug can also reduce your electric bill if you schedule your electronic devices to turn off at set times.

How to use alexa to make house guests feel more at home

Gosund Smart Plug (Image Source: Amazon)

How to Connect a Smart Plug to your Alexa

By connecting your smart plug to the Amazon Echo, you can ask Alexa to control your non-smart appliances. Follow the steps below to pair a smart plug with Alexa:

Note: This guide was made for the Gosund Smart Socket. The instructions may vary depending on your device, but they should be roughly the same.

  1. Plug your smart plug into an outlet.
  2. Download the app that goes with your smart plug app. You can find the proper app on the App Store or Google Play Store by searching for the name of your smart plug device or manufacturer.

Warning: Make sure to download the correct app. Certain smart devices have apps with very different names. If you are not sure which app to download, your instructions should have information about which app to download.

This will usually involve you pushing a physical button on your smart plug until it begins flashing. Then the device can be discovered by the app during the setup process.

How to use alexa to make house guests feel more at home

After you set up your smart plug in the app, you still have to set it up with Alexa if you want to control it with voice commands or create a routine with the Alexa app.

Warning: Make sure to download the correct skill. Check to see how many downloads it has before selecting it. If there aren’t many downloads, it could be the wrong app.

In most cases, you will be asked to link the account you created in the app to the Alexa Skill (this is where that password from before comes in handy). Then you will need to let Alexa discover the device.

Once you have paired your smart plug with the Amazon Echo, going through the day and managing even “dumb” electronics would be much smoother.

Want to make sure your kids aren’t using Alexa to turn your devices on and off? Check out our previous article on how to set parental controls on Alexa.

A significant majority of Americans and Australians are intent on learning more about humanity’s impact on the environment, and what they can do to live a more sustainable lifestyle. 913 people in both countries were part of a cross-generational study led by Southern Cross University to investigate how engaged citizens in both nations were regarding the environment, and just how far they were willing to go to protect the planet.

This year, air pollution will cause one of every eight deaths across the globe. An entire truckload . [+] of plastic enters our oceans every minute. Half of the world’s forests are completely gone.

The Survey

The data collected showed that 93% of all surveyed indicated a general concern for the environment , with plastic pollution (40.1%), biodiversity loss (39.1%), and climate change (38%) deemed the top three issues. Both the United States and Australia have been dealing with these particular problems, with climate change notably being blamed for the record-setting wildfires in California as well as the major bleaching events on the Great Barrier Reef. One of Australia’s endemic species, the koala, was recently declared “ functionally extinct ” and a range of species across the United States “ are quietly disappearing ”. Plastic pollution has become an ever-present issue worldwide as governments try to tackle single-use plastics and other forms of packaging – leading to a vast awareness campaign targeting consumers with the aim of educating the public as to the impacts their lifestyle choices can have.

While these were ranked as the major issues amongst respondents, they also indicated that they were ready to act on them, with 77% of individuals wanting to learn more about sustainable lifestyles. Most citizens have already taken steps to become more green – 83.4% of them recycle, 57.5% use reusable bags and 45.2% avoid single-use plastics. However, the vast majority of respondents believe it is up to governments (79%) to tackle environmental problems head-on. This is an interesting contrast to their respective nations’ own environmental policies, with both Australia and the United States deemed to be some of the largest contributors to global emissions and have shown no signs of heeding climate change warnings.

A person holding a sign depicting the motto “Save Our Planet”, in the context of environmentalist . [+] protests on Germany.

Photo by Markus Spiske/Unsplash

Under the Trump administration, the United States became the first and only country to withdraw from the Paris Agreements, while the US Environmental Protection Agency has rolled back many policies set to regulate pollution and greenhouse gas emissions. Australia’s government has also been at the center of many environmental debates. Canberra has repeatedly ignored warnings from international watchdogs regarding the nation’s increasing emissions and has gone as far as censoring a UN report describing how the Great Barrier Reef was being affected by climate change. Both countries have collaborated on the global stage to promote so-called “clean coal” technology and have ignored renewable energy. However, local state governments in both countries have been leading environmental efforts and going against federal policies that are putting their nations “ at-risk ”.

That being said, governments were not the only group that was expected to lead environmental actions. Major corporations were identified by almost three-quarters of respondents as responsible for reducing pollution , waste and other issues, and some major companies have already been making strides in decreasing their environmental impact. Unilever has embraced the United Nations’ Sustainable Development Goals and has set a goal of halving emissions by 2030. The company has already reduced waste from its production chain by 97%, and source 56% of raw materials from sustainable sources. Other industry leaders include Air New Zealand who have committed to transitioning away from single-use plastics on flights – a number as high as 55 million units per year – and 4Ocean , a company that collects and recycles plastic waste from the ocean. Companies are working towards becoming more environmentally-conscious, and opportunities abound .

Gen Xers cited more concern about plastic pollution than any other generation studied: 43% said it . [+] was their top environmental concern.

Southern Cross University

Changing Perspectives

While respondents believe that governments should be leading action on climate change, they also identify the issues that prevent them from doing more in their daily lives. The higher prices of eco-friendly products (82.6%) and inconvenience (51.6%) ranked highest, with 61.6% of those surveyed thinking that living a more sustainable, eco-friendly lifestyle was more expensive overall. 12.9% would be unwilling to spend more on a product if it was certified eco-friendly. This particular question showed the divide across generations, with millennials (89.6%) much more willing to pay above-average prices than baby boomers (79.3%). This corroborates further research that younger generations are driving consumer trends towards more environmentally-friendly products. As more information becomes available regarding the impacts of consumerism on the environment, individuals are becoming more and more likely to purchase products that are less damaging to the planet.

While opinions and preferences vary across the board regarding eco-friendly lifestyles and what green habits people were already partaking in, there was one underlying theme: hope.

87% of respondents said they made efforts to live an eco-friendly lifestyle, and that 72% were driven to leave a better planet for their children. Overall, people showed an interest in learning more about the environment, how they could live a more sustainable lifestyle, and how humanity’s actions are affecting the planet. In recent years, the environment has taken center-stage as new generations look to safeguard the future of the planet. From taking on major corporations to speaking on a global stage spurring governments into action, environmental accountability has become a part of everyday routine. Education is set to become one of the best tools to fight climate change and environmental degradation, and as this survey notes, we have an appetite for it.

How to understand those confusing windows 7 file/share permissions

Hi all. Our company is running Lotus Notes and recently I installed a MS Outlook interface and it worked well for about two days. Then suddently I am receiving an error message “Microsoft Office Outlook : You don’t have appropriate permission to perform this operation”. This happens when I perform any action in Outlook. I login fine but when try sending or replying to emails. I get this error. I have full access(Admin) on my machine(Win XP) Any ideas on where to start troubleshooting. I cnt stand Lotus anymore. We will be migrated to Outlook only in December or Jan 2013, but I cannot wait that long. Please note that all my emails are coming in to Outlook fine. I just cannot reply or send anything

Thank you in advance

  • Subscribe
  • Subscribe to RSS feed

Report abuse

Although many of the following tips are for vista or Win7, the basic concept often still applies to XP

How to fix Access Rights problem

Sometimes the problem has been that Windows has had problems granting the right access to files, folders and the registry. The following tips provide some workarounds.

As you go from XP to Vista to Win7 certain operations require higher access rights to perform. These access rights are “higher” than even those granted to the Administrator ID by default. These “elevated” rights are accessed by way of the UAC confirmation dialog which is invoked when you select to “Run As Administrator”.

In theory, any one of the following tips should work. The process is: run one of the fixes, run each affected Office app, reboot TWICE (sorry, I don’t know why, but there appears to be some “Voodoo” at play here. We do it because it works!) TWICE (sorry, I don’t know why, but there appears to be some “Voodoo” at play here. We do it because it works!), try the office apps again to confirm the fix worked.

If you want to first confirm that access rights are a problem this article describes how: http://www.windowsecurity.com/articles/Why-Applications-Dont-work-standard-users.html

This is a good tool for reporting on file access rights

Access Rights FYI: How to Understand Those Confusing Windows 7 File / Share Permissions

FYI: One person had to fix access rights to their won %TEMP% folder.

How do I restore security settings to a known working state? – http://support.microsoft.com/kb/313222

FYI: for this situation, you can consider Vista and Win7 to be essentially interchangeable with only minor differences between the user interface in the 2 versions.

In Windows 7, even when you are logged in as administrator, UAC no longer gives you “Full” administrator rights. To get all of the access you now also have “run as administrator”

It appears there is an error where your userid is not being allowed to update the activation information in the registry.

The general process is :

· Close all of the office apps

· Start one of the Office apps using any one of the following “run as admin” techniques

· Start it normally, confirm the message has “gone away”

· If the message is gone, reboot the computer

· Start the office app again to confirm that the message really is gone for good (was saved in the registry)

What you need to do is “runas admin”:

· Go to the start menu and find the program icon you want to start

  • on it
  • Select “Run as …”

If that doesn’t work try this:

· In the start menu, right click on the shortcut for any Office app, select “RunAs Admin”
If runas does not appear, right click and drag the shortcut to the desktop

  • create a shortcut on the desktop.
  • Right click on the desktop shortcut,
  • runas admin should be there.

Activate the application/office:

· 2007 Office button / 2010 File tab

  • Help
  • Click on “Activate the Application”
  • Follow prompts to enter product key
  • Close the app
  • Restart app normally

If that doesn’t work, sometimes the problem has been that Windows has had problems granting the right access to files,folders and the registry. The following tips provide some workarounds.

If you are technically adept, you can try this fix.

Solving setup errors by using the SubInACL tool to repair file and registry permissions – http://blogs.msdn.com/b/astebner/archive/2006/09/04/739820.aspx

If that doesn’t work, try rebooting into Clean Boot mode (with networking) to do the install/activation.

The file server permissions must be carefully implemented to provide appropriate access to content. This involves locking down permissions on the share and physical folders.

Permissions

The following table lists permissions that were used for the file server share and folders in the Shared Hosting Setup mentioned in the Planning the Web Hosting Architecture section of the Hosting Guidance. Based on the shared hosting environment used, server administrators should develop their own custom permissions that meet their needs.

Path Permissions Reason
\server\share$ (share) Domain Administrators – Full Control Domain Users – Change MachineAccounts$ – Full Control The share permissions need to allow the administrators and site accounts to access the content. The physical path will be restricted to actual needed permissions.
E:\Content (physical path of share) Administrators – Full Control System – Full Control This is the folder that is shared. It does not need permissions for any accounts aside from the built-in Administrators group and System account.
E:\Content\ (the container for a specific site or user) Administrators – Full Control System – Full Control Site Owner – List Folder Contents This folder is used as a container for folders like the site’s home directory and its log files. The Site Owner should be able to read this folder but does not need write access.
E:\Content\ \wwwroot (the IIS home directory for the site) Administrators – Full Control System – Full Control Site Owner – Modify App Pool Username – Read This is the root of a Web site belonging to the user account. App Pool Username is used as both the application pool identity and the anonymous username for the Web site.
E:\Content\\Logs (the container for logs) Administrators – Full Control System – Full Control Site Owner – Read Note that this folder for logs is stored ABOVE the root of the site, so that it is not accessible by a visitor browsing the site. It is not recommended that you put this folder in any location accessible from a Web browser, for security purposes.
E:\Content\\Logs\FailedReqLogs (the container for failed request tracing logs) Administrators – Full Control System – Full Control App Pool Username – Full Control This is the folder used to store Failed Request log files, which allow a site owner to diagnose problems with their Web site. These logs are written by the worker process identity, App Pool Username.
E:\Content\\Logs\W3SVCLogFiles (the container for W3SVC traffic logs) Administrators – Full Control System – Full Control MachineAccount$ – Full Control This is the folder used to store the log files for the Web site, which allow a site owner to see their traffic patterns. If the server administrator does not wish to share these files or wants to provide an alternate method for determining traffic, these files can be stored elsewhere. MachineAccount$ is the Web server’s machine account, as these logs are written by HTTP.SYS.

Configuring Permissions

To configure permissions for the share

In Windows Explorer, right-click the folder you want to share, and then click Properties.

On the Sharing tab, click Advanced Sharing.

In User Account Control, click Continue to accept the prompt that Windows needs your permission to perform the action.

In the Advanced Sharing dialog box, check Share this folder.

Set the Share name and Comments as appropriate. To make the share hidden, add a $ to the end of the share name.

Hiding a share means that when you connect to [\server] (file://server/) you will not see the share unless you specifically enter the path [\server\share$] (file://server/share$) .

Click Permissions.

In the Permissions dialog box, remove the Everyone group, if it exists.

Add the appropriate user or group that should have access to the share.

Specify the permissions (Full Control, Change, Read) for the user or group.

Click OK twice and then click Close to close the dialog boxes.

To configure permissions for the folder structure

  1. In Windows Explorer, right-click the folder you want to share, and then click Properties.
  2. On the Security tab, click Edit.
  3. In the Permissions dialog box, add the appropriate users or groups that should have access at each level of the folder structure.
  4. Specify the permissions (Full control, Modify, Read & execute, List folder contents, Read, Write Special permissions) for the users or groups.
  5. Click OK twice to close the dialog boxes.

See C# and PowerShell Scripts Samples for a sample script to configure default documents. as an example of creation of a share and setting of permissions.

Open Windows Explorer by pressing the Windows key and clicking Computer; then browse to the folder whose permissions you want to manage.

Right-click the folder you want to manage and then choose Properties from the contextual menu.

The Properties dialog box for the folder appears.

Click the Sharing tab; then click Advanced Sharing.

The Advanced Sharing dialog box appears.

The dialog box shown appears. This dialog box lists all the users and groups to whom you’ve granted permission for the folder. Initially, read permissions are granted to a group called Everyone, which means that anyone can view files in the share but no one can create, modify, or delete files in the share.

When you select a user or group from the list, the check boxes at the bottom of the list change to indicate which specific permissions you’ve assigned to each user or group.

How to understand those confusing windows 7 file/share permissions

Click the Add button.

The dialog box shown appears.

How to understand those confusing windows 7 file/share permissions

Enter the name of the user or group to whom you want to grant permission and then click OK.

If you’re not sure of the name, click the Advanced button. This action brings up a dialog box from which you can search for existing users.

When you click OK, you return to the Share Permissions tab, with the new user or group added.

Select the appropriate Allow and Deny check boxes to specify which permissions to allow for the user or group.

Repeat Steps 5–7 for any other permissions that you want to add.

When you’re done, click OK.

If you want to grant full access to everyone for this folder, don’t bother adding another permission. Instead, select the Everyone group and then select the Allow check box for each permission type.

You can remove a permission by selecting the permission and then clicking the Remove button.

If you’d rather not fuss with the Share and Storage Management console, you can set the permissions from My Computer. Right-click the shared folder, choose Sharing and Security from the contextual menu, and then click Permissions. Then you can follow the preceding procedure, picking up at Step 5.

The permissions assigned in this procedure apply only to the share itself. The underlying folder can also have permissions assigned to it. If that’s the case, whichever of the restrictions is most restrictive always applies. If the share permissions grant a user Full Control permission but the folder permission grants the user only Read permission, for example, the user has only Read permission for the folder.

About This Article

This article is from the book:

About the book author:

Doug Lowe is the bestselling author of Networking For Dummies and Networking All-in-One Desk Reference For Dummies. His 50+ books include more than 30 in the For Dummies series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages.

A short video at windowsecurity.com, one of my favorite sites, explains the file sharing options on Windows 7, especially as they relate to permissions.

The examples use a system which is a member in a Windows domain. The lesson that Advanced permission settings give you much more flexibility and power than the basic ones goes as well in the case of workgroups/homegroup.

More Inside PCMag.com

About Larry Seltzer

Larry Seltzer has been writing software for and English about computers ever since—much to his own amazement—he graduated from the University of Pennsylvania in 1983.

He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.

For several years, he wrote corporate software for Mathematica Policy Research (they’re still in business!) and Chase Econometrics (not so …

More From Larry Seltzer

  • PopupDummy! v2.71
  • SpamKiller
  • Netgear ProSafe VPN Firewall FVS328NA
  • Spy Remover 5.0
  • SpyBot Search & Destroy
Comments

PCMag is obsessed with culture and tech, offering smart, spirited coverage of the products and innovations that shape our connected lives and the digital trends that keep us talking.

How to use calibre to correctly order your ebook series

Here’s the method I use for ordering the sequence of books in a series. By the way, I DO NOT TAKE CREDIT FOR THIS. LuvMyBrats on the kindleboards provided this answer.

You have 4 books you want to put into a collection in order so you don’t have to constantly look up which book is next.

In Calibre, Edit the Metadata button and change the date the book was published. The first book in the series should have the most recent date. I also add numbers to the title. It looks like this.

Book A (#1) – Aug 2010 (make this your starting date) – oldest book
Book B (#2) – July 2010
Book C (#3) – June 2010
Book D (#4) – May 2010 (last book in the series ends up the earliest date)

When you add these books to your collection, they will line up in the correct order #1-#4

You don’t have to add the numbers to the title. Personal choice, I like to see them with the numbers.

Also I don’t change the publishing date until AFTER I have downloaded the metadata because if you change publishing dates before, when you download the metadata it will put the correct publishing date and you have done a lot of work for nothing.

A little work involved but at the end of the day I have a series in order and I automatically know which book comes next. Given that most of what I read is series, this method has become invaluable to me because all of my collections with the exception of History and Single Novels are ALL serial books.

Good luck and perhaps someone will have a shorter method. It really doesn’t take that long once you get use to it.

Is there a best practice for naming books that come in a series? What is the best practice keeping things straight?

Dilemma #1: The book publication dates don’t match the Chronological order of the action in the story.

Dilemma #2: It sure would be nice to be able to view the books in chronological order (of the action within the series) on my storage device (in my case a Kindle) Note: I am using Calibre for managing my storage.

Example, the Jack Reacher series from author Lee Childs, sorted alphabetical by title:

  • 61 Hours (Jack Reacher Chron Order #15)
  • The Affair (Jack Reacher Chron Order #2)
  • Bad Luck and Trouble (Jack Reacher Chron Order #12)
  • Die Trying (Jack Reacher Chron Order #4)
  • Echo Burning (Jack Reacher Chron Order #7)

( etc. There are more than 20 books in this series. ) This just feels clumsy.

What is the best practice for file / title naming scheme here? Is there a “standard” here? What does everybody else do? Is there a way to easily display all the books in a series in the chronological order of the action within?

1 Answer 1

If you are using Calibre, its database is already set to have each piece of information about a book in its proper field (i.e., there will be a field for the title, another for the author, another one for the series and series numbering, and so on), but I’m sure that you already know this.

So, within Calibre, you don’t need (and you are not supposed) to change the title by including the series information; you can let Calibre rename those files on-the-fly when you export them to a given ereader by using its tool called Plugboard, that relies on the calibre template language.

Here is, in short, the recipe to use, pasted from MobileRead forums:

I have been playing around with the Metadata plugboards to get the titles on a Kindle 3 to show series information. I used the following template:

format: mobi
device: kindle2
template: 2s| – | – > <br />destination: title</p> <p>This works very nicely for books that are part of a series e.g.:</p> <p>A Song of Ice & Fire – 01 – A Game of Thrones <br />A Song of Ice & Fire – 02 – A Clash of Kings <br />A Song of Ice & Fire – 03 – A Storm of Swords <br />A Song of Ice & Fire – 04 – A Feast for Crows</p> </blockquote> <p>The process is very easy to do but if you are not used to its workings it is a bit long to explain, so I’m linking some of articles that show you step by step how to do it.</p> </p> <p>I own a Voyage and spent a while sorting my ebooks in Calibre, which included adding the series and number plus the release date to each one, only to get disappointed because you can't export the series as collections without jailbreaking your Kindle (<em>cough</em>).</p> <p>That's why I went through all the ebooks on the Voyage itself and added them to collections but I noticed that they aren't sorted in the proper order.</p> <p>Chamber of Secrets</p> <p>Prisoner of Azkaban</p> <p>Chamber of Secrets</p> <p>Prisoner of Azkaban</p> <p>I already found this post but it's 2 years old and I'm not especially fond of adding the number to the actual title since it'll also mess up the way the ebooks are sorted outside of collections. Is there maybe a better way of doing it (without adding the numbers to the titles or a jailbreak) by now?</p> </p> <p>Nope, not that I know of. Personally, I stick the number in the title and automatically sort them into collections (jailbroken), which works fine for me.</p> <p>Damn! Why does Amazon not at least let us sort by year?! So it's either have the right order but mess up the overall sorting or the right overall sorting but the wrong order for series. :/</p> <p>I don't know if this appeals to you, but Calibre has a plugin that I use (can't remember the name, but I believe it's stock). When you move items from your library to your Kindle, it adds the series and number, based on the metadata.</p> <p>Thanks for the suggestion but unfortunately I don't want to/can't do it this way because I have a couple of series with quite long names, which would make the actual titles (some of which are also pretty long) get cut off.</p> <p>The problem is that I still want the overall list of my ebooks to be sorted by the actual book title – so "Chamber of Secrets", not "01 – Chamber of Secrets" or "Harry Potter – 01 – Chamber of Secrets" because if I'm looking for a book of a series, I can just check the collections I created by hand – but I also want it to be sorted properly within a collection I created for a single series.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/windows-enterprise-product-36CAD.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="300" height="300" class=""/> </p> <p>The Windows 10 Enterprise product is absolutely official product code.</p> <ul> <li>Activate Windows 10 Enterprise version and support Microsoft Online Update.</li> <li>Work for all languages version.</li> <li>One Windows 10 Enterprise key works constantly on one PC.</li> <li>Lastingly useful to reinstall the OS or Application Software program.</li> <li>Not for OEM, Trial, Beta and Non-Genuine Version.</li> </ul> <p>Product Name: <strong>Windows 10 Enterprise</strong> <br />Product Type: <strong>Key Code and Download Link</strong> <br />Special Sale: $75.99 <s>$399.99</s></p> <p>Windows 10 Enterprise product key sale is guaranteed to be 120% official, valid, unused and non-banned. Microsoft Product Keys gives you the 120% non-muted Windows 10 Enterprise serial at discount price. Windows 10 Enterprise Product Key Sale, Email Delivery via Paypal .</p> <p>Diversified Authorized Products: High quality selection for peace of mind</p> <p>Best Prices: Give the members the real benefits</p> <p>Fast And Safe Ordering: Digital Delivery Within 5 Minutes and Worldwide Payments:</p> <p>Worry-free After-sales: Instant access to professional support 24/7 Live Chat</p> <p><strong>Frequently Ask Questions:</strong></p> <p>Q: Is the Windows 10 Enterprise Product Key genuine? <br />A: Yes, the is 100% genuine and authentic.</p> <p>Q: Has the key ever been issued to anyone else or previously activated? <br />A: No, the key has never been issued to anyone else, nor has it been previously activated. Key is not retrieved from Microsoft system until such time as buyer purchases key.</p> <p>Q: Will the Windows 10 Enterprise Product Key allow for product updates? <br />A: Yes, the key will allow for product updates for the life of the computer or installation.</p> <p>Q: Will the Windows 10 Enterprise Product Key allow for tech support from Microsoft? <br />A: Yes, the key will allow for telephone tech support directly from Microsoft.</p> <p>Q: Will you send me a copy of the software? <br />A: No, this listing is not for a copy of the software, but will provide download service.</p> <p>Q: Do I need to already own a copy of Windows 10 Enterprise? <br />A: No, if you already have a Retail copy of Windows 7 Enterprise installed on your PC, you can use the product key purchased from us to activate the software directly. If not, you can choose to download it through the torrent we send you.</p> <p>I would like to sort it in the Ereader by author then name of the series from 1 to X and then the title of the book!</p> <p>Latest PRS+ and Calibre</p> </p> <p>About the only way is to set up a custom column of series like data.</p> <p>Then use Calibre to put the books in the order you want. Click Title, then Series, then Author. Then use Bulk Edit Metadata to populate your custom column with a Collection name and to number them in order.</p> <p>Then you have to go into the Sony Plugin and tell it to create collections based on your custom column.</p> <p>BTW, why do you want the books in a series in Title order rather than Series Order?</p> </p> <p>..but all I get is the default. I must be doing something wrong!</p> <p>I haven’t really thought out the nicest way to sort the books on the Sony PRS T1. (nice, but very slow compared to my Androd phone), but I’d like to sort by series and then just wad through, one at a time. Well, maybe a couple of series in parallel LOL.</p> <p>I’d like to have the books sorted on the Sony like <br />series series_number: title (author)</p> <p>A bit wored but I read some series written by a bunch of different authors, sometimes an outhor takes over a series, somtimes co-authors pop up. So to get the flow of the timeline, I use Calibre series field to tags them in timeline order. I’m not too bothered about how they present, but it would be nice to know a book is book n in a series.</p> <p>As well as help on how to correctly set the plugin, can someone tell me the steps from the beginning as to what to do in case I’m missing something.</p> <p>At the moment, I’m going to Preferences > ASdvanced > Plugins > Device Interface Plugins > Sony PRST1 and newer devices. Am I missing something?</p> </p> <p>Thanks for that Helen, but like some other members; I have been reading these forums for a while and have done many searches and am still at a loss here. Perhaps manyu of the posts are making assumptions that new people like myself don’t share or perhsps it’s something earlier in a thread missed or archived. So, please be patient and thropw a few breadcrumbs here as what I’ve tried isn’t working and I’m looking for guidance.</p> <p>1) I’d surely try the Tweak ..if I knw where it was and how to try it.<br />2) I gotta admit, I have yet to read the Sony book on how to sort the collections <br />I’m sure it’s in there somewhere :-). It seems to be sorting OK with the few runs <br />that I’ve done, it’s just that I’d like them labelled with series numbers on the Sony <br />screen.<br />3) Could you perhaps throw me a like to the correct forum (and perhaps page number) <br />whereupon idiot-proof guidance can be gained?</p> </p> <p>I am new to eReading so there may be an easier way to do this, but I edited the Meta Data and put the number of the series IN the title like this:</p> <p>The Murder at the Vicarage (01)</p> <p>Now, when I look at my list of books on my Sony, I can see at a glance it is #1 in a series. I could also edit the title so it displays like this:</p> <p>Miss Marple 01 – The Murder at the Vicarage</p> <p>although that would make some titles quite long. I understand that the series name/number is redundant when viewing my books in Calibre since I have the series and number fields set up in the Meta Data. But this was a quick and easy way to get what I wanted to show up on my Sony. There is probably a more elegant solution, but this works for me. I hope this helps.</p> </p> <p>Hi Elise, thanks for that. It’s a last resort option as I have a number of series in double digists and some series pushing that! Hence the use of the [series] field in Calibre is a nicety that allows me to add books to series just by using a dropdown and it’s automatically sequenced. Books in the series I just re number as 0 or whatever according to timeline fit. I’d like to title books as you say, but have Calibre do the fiddling for me, as numbering the titles is a bit of a chore, especially as I’d need to be creative with those sub-series, i.e. seried within a series where I DO use the title.</p> <p>I bought the Sony reader rather than the tablet for just this purpose, as it apparently is a good match for Calibre (and yeah, I wish there was a reader out there that behaved like the Kobo and had the Calibre engine).</p> <p>My p[roblem is that although I’ve tried plugins, I must be doing something r=wrong, as I can’t get that output.</p> <p>But hey, as a last resort, yerah – it’ll do 🙂</p> </p> <p>I am new to eReading so there may be an easier way to do this, but I edited the Meta Data and put the number of the series IN the title like this:</p> <p>The Murder at the Vicarage (01) </p> <p>Please don’t do it this way, it messes up your Calibre metadata and will cause problems with other Calibre features (e.g. metadata download, search for covers). Calibre has all the features you need but some of them are well hidden</p> <p>If you can be patient I will post some basic general instructions in the next 24 hours.</p> </p> <p>OK . I’ll wait and thank you for the help.</p> <p>Um, If you include anything I should undo, or maybe uninstall / re-install Calibre is OK too just in case!</p> <p><img src="/wp-content/uploads/2022/05/e-kitap-serilerinizi-doru-D6F8.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Sadece kitap başlıklarına dayanarak, bir kitap dizisinin hangi sıraya girdiğini hatırlamaya çalışmak oldukça sinir bozucu olabilir. Sinirsiz okumalar için e-kitap okuyucunuza aktarılırken kitap başlıklarınızı nasıl açıklayacağınızı ve sıralayacağınızı gösterdiğimiz için okumaya devam edin.</p> <p>Yaygın bir durum: e-kitap okuyucunuza bir dizi kitap aktardınız ve bir kez okuyucuyu kitaplara ayırmanın kolay bir yolu yok. does <em>Gizemli Ahır</em> önce gel <em>Gizemli Yüzyıl Ortası Modern</em>? Seriye ve seri numarasını başlığa dahil etmeniz gereken her seri kitabını yeniden adlandırma zorluğunu yaşayabilirsiniz, ancak buna gerek yok. Popüler e-kitap yönetimi uygulaması Calibre’deki çok kullanışlı bir işlev sayesinde, e-kitap okuyucunuzda otomatik olarak yeniden adlandırılmış ve doğru numaralandırılmış kitapların keyfini çıkarmak için tek yapmanız gereken birkaç dakikalığına.</p> <h2>Neye ihtiyacım var?</h2> <p>Bu ders için sadece e-kitap okuyucunuza ve ücretsiz araçlara ihtiyacınız olacak. İşte ne kullanıyoruz:</p> <ul> <li>Calibre (ücretsiz ve açık kaynaklı bir ebook yöneticisi).</li> <li>A Kindle (bu numara Nooks ve diğer e-kitap okuyucular ile de çalışır).</li> <li>Bir ebook serisi.</li> </ul> <p>Daha önce Calibre’yi hiç kullanmadıysanız, uygulamaya alıştırmak için e-kitap koleksiyonunuzu Calibre ile düzenlemeye yönelik kılavuzumuza göz atmanızı öneririz..</p> <h2>Başlamak</h2> <p><img src="/wp-content/uploads/2022/05/e-kitap-serilerinizi-doru-B23C.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>En önemli şey Calibre’de kitap dizisine sahip olmak. Bu eğitimin amaçları doğrultusunda, fabrikada yazılan bir yazar tarafından bir e-kitap dosyası oluşturduk, özür dileriz, okuyucular için ne olduğunu bilmek isteyenlere <em>Gizemli Yüzyıl Ortası Modern</em>.</p> <p>İkinci en önemli şey, Series meta-data etiketini kullanarak Calibre’deki diziyi doğru bir şekilde etiketlemenizdir. Zaten yapmadıysanız, bunun eğitimin en emek yoğun (ve neyse ki bir kez) parçası olacağına söz veriyoruz..</p> </p> <p>Bir dizideki tüm kitapları hızlı bir şekilde etiketlemenin kolay bir yolu, kitapları vurgulamak, vurgulanan gruba sağ tıklayıp seçmektir. <strong>Meta verileri tek tek düzenleme</strong>. Meta Verileri Düzenle menüsünde, ekranın en üstüne Seri adı ve Numarayı girebilirsiniz. Düzenlemekte olduğunuz dizideki kitapların sırasını bulmak için yardıma ihtiyacınız olursa, FictFact-there web sitesini ziyaret etmenizi ve yazar adına ve kitap serisine göre göz atmanızı öneririz..</p> <p>Kitaplarını aldın mı? Onları doğru Seri ve numara ile etiketlediniz mi? Şimdi hepsini bir araya getirme zamanı.</p> <h2>Calibre Plugboard Kurma</h2> <h2><img src="/wp-content/uploads/2022/05/e-kitap-serilerinizi-doru-E9A1E.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></h2> <p>Calibre, Plugboard olarak bilinen harika bir özelliğe sahiptir. Bu pano yalnızca cihaza gönderme ve diske kaydetme işlemleri sırasında e-kitap meta verilerini düzenlemenizi sağlamak için mevcuttur. Panelin sihri sayesinde, seri adını / numarasını eklemek veya el ile çeşitli e-kitap cihazlarındaki biçimlendirme ve sipariş sorunlarını çözmek için el kitabını düzenlemek gibi can sıkıcı ve zaman alıcı şeyler yapmanız gerekmez..</p> <p>Şu anda dizimiz olan MysteryHouse, 6 kitap içeriyor:</p> <ul> <li><em>Gizemli Ev</em></li> <li><em>Gizemli Saray</em></li> <li><em>Gizemli Konak</em></li> <li><em>Gizemli Bungalov</em></li> <li><em>Gizemli Yüzyıl Ortası Modern</em></li> </ul> <p>Onları basitçe Kindle’ımıza transfer edersek, hangi kitabın dizide ilk veya son geldiğine dair bir gösterge olmazdı. Basit bir pano, kitaplar Kindle’a kopyalandığı için, başlık / meta verileri düzenleyerek, bir bakışta hangi kitabın hangisinin olduğunu görebilmemiz için çözebilir..</p> <p>Plugboard’unuzu oluşturmak için tıklayın <strong>Tercihler -> Meta veri panoları</strong> (İçe / Dışa Aktar bölümünde bulunur). Bunun gibi boş bir panoyla sunulacaksınız:</p> <p><img src="/wp-content/uploads/2022/05/e-kitap-serilerinizi-doru-A4869.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>İlk iş sırası, format ve cihazı seçmektir. “Herhangi bir format” ve “herhangi bir cihaz” seçiliyken geniş açılı çalıştırılabilirken, belirli cihazlar için belirli panolar ayarlamak daha akıllıca olur. Kindle 3 için bir tane ayarlayacağız (şimdi Kindle Klavye olarak bilinir). Format için MOBI’yi seçeceğiz ve Cihaz için Kindle2’yi seçeceğiz (Kindle 2 ve Kindle 3 aynı meta veri formatlamasını kullanıyor).</p> <p>Altında <strong>Kaynak şablonu</strong> Kitaplar için kullanmak istediğiniz ad dizesini eklersiniz. Konuyla ilgili bu Calibre el kitabını okuyarak kendi başınıza yazabilseniz de, sizi dertten kurtarır ve birkaç temelini burada paylaşırız. Örneklerimiz ilk önce dize ve ikinci örnek çıktı ile düzenlenmiştir..</p> <p><em>Serisi series_index: 0> 2s | # | – Başlık</em></p> <p>Gizemli Ev # 01 – Gizemli Ev</p> <p><em>Serisi series_index: 0> 2s | – | – Başlık</em></p> <p>Gizemli Ev – 01 – Gizemli Ev</p> <p><em>Serisi: || series_index: 0> 2s | [|] başlık</em> </p> <p>Gizemli Ev [01] Gizemli Ev</p> <p>Kullanmak istediğiniz ad dizesini seçtikten sonra, kodu Kaynak şablon yuvasına yapıştırın ve ardından “Başlık” ı seçin. <strong>Hedef alan</strong><em>.</em> Bu eğitim için listedeki ikincisini kullanıyoruz. Click <strong>Plugboard’u kaydet</strong>. Bu pano, şu şekilde var olan Mevcut karton kutularda görünecektir:</p> </p> <p>Gelecekte kontrol panelini ince ayar yapmanız gerekirse, basitçe seçin ve tıklayın; bu panelin değişkenleri düzenleme için otomatik olarak menüye yüklenir.</p> <p>Artık panoyu kurduğumuza göre, test etme zamanı geldi. Click <strong>Uygulamak</strong> Sol üst köşedeki panel menüsünden çıkmak ve çalışmanızı uygulamak. Tercihler ekranını kapatın ve ana Calibre menüsüne dönün.</p> <p>Cihazınızın bilgisayarınıza bağlı olduğundan emin olun ve ardından cihazınıza göndermek istediğiniz dizideki kitapları vurgulayın. Sağ tıklayın ve seçin <strong>Cihaza gönder</strong>-normalde kullandığınız cihazdaki depolama seçeneğini seçin, bizim durumumuzda “ana hafıza”.</p> <p>Cihazınızı çıkarın ve açın. Her şey planlandığı gibi giderse, şöyle derlenmiş ve düzenlenmiş kitap serisini görmelisiniz:</p> <p><img src="/wp-content/uploads/2022/05/e-kitap-serilerinizi-doru-82B8B.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Başarı! Artık merak edip etmediğinizi merak ediyorum <em>Gizemli Saray</em> ilerlettiği <em>Gizemli Konak</em>! Kararsız gizmosunuza daha fazla cihaz eklediğinizde, cihaz menüsüne geri dönüp cihaz için yeni bir pano komut dosyası oluşturabilirsiniz. Kitaplarınızın tekrar hangi sırayla girdiğini hatırlamaya çalışmaktan asla vazgeçmeyeceksiniz.</p> <p>Tatlı bir kalibre veya e-kitap okuyucu hile paylaşmak mı? Bunu yorumlarda duyalım.</p> <p>Are you tired of spending so much time looking for your eBooks on an ugly Amazon page? Did you download an eBook from another website, but it’s an <em>epub</em> and you can’t easily send it to your Kindle? Well, let me help you with that.Kindle devices are incredibly popular and sometimes they’re used to back up arguments that paperbacks are dead. You can fill them with eBooks in an impressive pace. eBooks are everywhere: on Amazon and in hundreds of other stores, you can also find millions of free onesonline. When you do, you might find it hard to get them on your device. Kindles are very particular when it comes to file formats.There’s this powerful tool called calibre. It can manage all your eBooks, no matter where they came from and help you select the ones that will get on your device. With it, you can track which books you read and which ones you liked. It can download covers and metadata or compile a series of novels. It can also convert books from one format to another and even make your personal documents into eBooks. Kindle applications just don’t measure up to what calibre is capable of.</p> <h3>How to Set Up Your Library</h3> <p>You open calibre and plug your Kindle with USB for the first time. The program will scan its contents and create a file with metadata – this will allow you to control what eBooks from your library are on the device and vice versa.</p> <p> <img src="/wp-content/uploads/2022/05/managing-your-kindle-E9F2.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Unfortunately, you cannot transfer eBooks you bought on Amazon from your Kindle to the calibre library directly. If you want to copy them:</p> <ol> <li>First, log in to your Amazon account. </li> <li>Then, choose “Manage Your Content and Devices” from the “My Account” tab. </li> <li>Finally, click “Download & transfer via USB” from under the “Actions” button.</li> </ol> <p>You will be prompted to select which device you’ll read this eBook on. This question pops up because of the DRM protection Amazon puts on eBooks they sell.To add the files, you just downloaded, to your calibre library, just drag-and-drop them to the calibre’s main window.Sending content from your calibre library to your Kindle is much easier. We’ll get to that in a bit.</p> <h3>How to Convert eBooks Using calibre</h3> <p>Let’s say you downloaded an eBook from somewhere on the Internet (say, The Gutenberg Project). But it turns out it’s in a different format than <em>mobi</em> or <em>azw</em>. Most likely, <em>epub</em>.<em>Epub</em> is the most popular eBook format and most eReaders support it because it’s open-source. Kindle devices, however, do not. Amazon uses its own two file formats: the older, <em>mobi</em> and the newer, <em>azw</em> (also: <em>azw3</em>). Both are Amazon’s property but offer a wider selection of options (e.g. adding a built-in dictionary or support for annotations and comments). The <em>azw</em> format was built upon <em>mobi</em> and offers better compression and encryption.If you want the eBook on your Kindle, you need to convert it to <em>mobi</em> or <em>azw</em> first. When you opened calibre for the very first time, you went through the configuration wizard. During this process, you already told calibre what device you use. Because of that calibre already chose the best file formats to convert to and you don’t even have to convert your eBooks by yourself, just send them and calibre will do the rest.</p> <h3>How to Send Your eBook to Kindle Using calibre</h3> <p>Okay, you prepared your eBook. Now, what? How to transfer them to your Kindle and start reading? Let’s dive in.</p> <h4>Sending eBooks To Kindle Via USB</h4> <p><img src="/wp-content/uploads/2022/05/managing-your-kindle-2D08.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>To send the eBook to your Kindle, just right-click on it and select “Send to device > Send to main memory”. Note, you should still be keeping your Kindle plugged in via USB. Your eBook will be on your Kindle in seconds.</p> <h4>Sending eBooks To Kindle with Email</h4> <p><img src="/wp-content/uploads/2022/05/managing-your-kindle-195C50.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>If you prefer to send your files with email, right-click on the eBook and select “Connect/share > Email to …@kindle.com”. The “…@kindle.com” bit should be <strong>your Kindle email</strong> you set up on Amazon.</p> <p> <img src="/wp-content/uploads/2022/05/managing-your-kindle-A3BA.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>If you want to setup or change this email, log in to your Amazon account and then:</p> <ol> <li>Go to “Manage Your Content and Devices” and choose the “Your Devices” tab. </li> <li>Then, click “Edit” by the mail listing.</li> </ol> <p>To manage your emails in calibre:</p> <ol> <li>First, click “Preferences” in the main window. </li> <li>Then, select “Sharing books by email” in the “Sharing” section. </li> <li>Finally, you can add new emails by pressing the “Add email” button and remove old ones by pressing the “Remove email” button.</li> <li>The e-mail displayed in the menu in “Connect/share” is whichever address you made default. To make an address default, press the “Make default” button.</li> </ol> <p>If you don’t get the eBooks you sent with email on your Kindle shortly, consider using an email relay like GMX.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-2944F50.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="750" height="350" class=""/></p> <p>It’s easy to add a table of contents to an ebook. But how do you add an ebook index to a digital book?</p> <p>For print books, you can create an index easily and automatically with most word processors. It will be in alphabetical order with page references.</p> <p>But an ebook doesn’t have page numbers, so you need to create a hyperlinked index.</p> <p>When a reader clicks on an ebook index entry, it will take them to the word or phrase in the text.</p> <h2>Add an ebook index</h2> <p>A table of contents is easy to create. If you use headings such as Heading 2 for your chapter titles, you can insert an automatic table of contents.</p> <p>Most ebook publishing platforms recognize these headings, so you often don’t even need to create one in your manuscript.</p> <p>However, unlike adding an index to a print book, you can’t add one at the end of an ebook automatically. You will need to create your index manually.</p> <p>It’s not difficult, and you can use Microsoft Word, Apple Pages, or any other word processor.</p> <p>If you are publishing fiction books, you would rarely bother. But for authors of nonfiction books, an index is often a necessary element.</p> <p>You might have an index in your print book and would like to replicate it for your digital version.</p> <p>If you follow the steps below, you can start building a clickable index for ebook files by creating jump links.</p> <h3>Step One: Create an ebook index page</h3> <p>At the end of your manuscript, add a new page and give it a title.</p> <p>You would probably use the word <strong>Index</strong>. Then format it to Heading 2, so it will show in your table of contents.</p> <p>After that, add your alphabet index headings in normal text.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-36B64C1.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="600" height="214" class=""/></p> <p>You could use groups such as A-K, L-Q, R-Z if your index is relatively short.</p> <h3>Step Two: Bookmark a word or phrase</h3> <p>Within the text of your book, find a word you want to add to the index. You can use the Find search tool in your word processor to locate words.</p> <p>Select the word or phrase, and then click Bookmark from the Insert menu dropdown.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-ADDC00F.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="600" height="212" class=""/></p> <p>You can see that I have chosen the word <strong>crime</strong>.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-92825E9.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="600" height="374" class=""/></p> <p>In the Bookmark Name field, type in a name for your entry. If it is more than one word, you can’t have any spaces.</p> <p>So if your entry is Mount Everest, you will need to type in, <em>mounteverest</em>.</p> <p>Click Add, and you are ready to create your first index entry.</p> <h3>Step Three: Add an index entry</h3> <p>Type in your entry in your index.</p> <p>You can see below where I have added the entry, <strong>Crime</strong>.</p> <p>Select your word, and then from the Insert menu, select Hyperlink. (For Apple Pages, select Add Link and Bookmark from the Format menu.)</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-667F2AE.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="600" height="262" class=""/></p> <p>From the popup box, select your Bookmark.</p> <p>You may need to click on Document, then Locate, then the dropdown arrow for Bookmarks.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-22DEB4D.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="600" height="469" class=""/></p> <p>Click OK, and you have created your first index entry.</p> <p>You will see that the entry is now a blue hyperlink.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-F0FAEEE.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="600" height="232" class=""/></p> <p>Repeat the same procedure for all the entries your need to add to your ebook index.</p> <h3>Step Four: Multiple index entries</h3> <p>It’s common to have multiple listings in an index. On a print page, you would have the indexed word followed by the page numbers for its location.</p> <p>For example: Imagination, 7, 34, 96, 175.</p> <p>But this is not possible in indexes for ebooks. The only workaround is to create numbered entries. When you bookmark a word multiple times, add sequential numbers.</p> <p>For example: imagination1, imagination2, imagination3</p> <p>Then, when you add the bookmarked word to your index, use Imagination (1), Imagination (2), Imagination (3).</p> <p>You can format your entries in one line or on separate lines.</p> <p>You could also choose to only link the word and not the number in brackets.</p> <p>Imagination (1), Imagination (2), Imagination (3).</p> <p>This allows more space for a reader to click the entry.</p> <h3>Step Five: Test your ebook index</h3> <p>When you finish creating your index, it will work in any ebook format, including mobi and epub files.</p> <p>You can do a quick check by uploading your manuscript to Kindle Create.</p> <p>Scroll down to your index, and click on a link. If your jump link index is working correctly, it will jump to the entry location in your ebook.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-add-index-2C65CD9.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="600" height="210" class=""/></p> <p>You can also use Calibre to convert your Word file to .mobi and .epub so you can check your index on your Kindle, the Kindle App, or iBooks on your iPad.</p> <h3>Summary</h3> <p>Digital indexes are easy to create, although it is a little time-consuming compared to a print index.</p> <p>But if you want to give your ebook readers the same experience as your paperback readers, it is worth the effort to create a jump link index.</p> <p>The ebook is a great innovation. But there are still some restrictions, including the creation of any form of automatic indexing.</p> <p>So until the technology improves, the only way to have indexes present in an ebook is to create them manually.</p> <h4>Derek Haines</h4> <p>A Cambridge CELTA English teacher and author with a passion for writing and all forms of publishing. My days are spent writing and blogging, as well as testing and taming new technology.</p> <p><img src="/wp-content/uploads/2022/05/ten-cool-tricks-BBE1.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>I was setting up my new laptop this weekend (well, newer) when I realized I hadn’t updated calibre in forever.</p> <p>Calibre is well known for being the best free app for managing your ebook and ereader collection, but this app can do a lot more than just move ebooks to your ereader or convert them from one format to another. I have been using calibre since long before it was even called calibre (since June 2007, in fact), and I know that I have just scratched the surface for all it can do.</p> <p>Since I haven’t really looked at calibre in at least a couple years, I decided now was a good time to update and expand this post from 2012.</p> <h2>Content Server</h2> <p>If you have to support a lot of ereaders or tablets, you’ve probably gotten used to having to plug them all in via USB so you can transfer ebooks and other content. By the time you get your 7th or 8th device this can get a little frustrating, and that’s why I’m glad calibre offers a better option.</p> <p>It’s called Content Server, and it basically lets calibre act as a file server for any device that can access a local network (wired or wireless) via a web browser – including Kindle, Nook, and some other ereaders. You can edit metadata, upload files, or even read the ebooks in your web browser</p> <p>You can find this feature by clicking on the <em>Connect/share</em> button and selecting “Start Content Server”. Setup is automatic, but accessing it once it is up and running takes a little work. If you want to visit the content server from another device, you will need to learn how to type the IP address and port number into your web browser.</p> <p>It will look something like this (don’t forget the colon!): 10.0.0.52: 8080</p> <h2>Metadata</h2> <p>Metadata is the pivot on which your ebook library turns. Without the proper info on the title, publisher, genre and other important details it is difficult to properly organize your library.</p> <p>And that’s why it is a very good thing that calibre can download metadata from a dozen or more different sources in a bunch of different languages including Dutch, Portuguese, German, Hungarian, Chinese, and more. You can also download metadata from most of the major ebookstores as well as OverDrive.</p> <p>You can edit an ebook’s metadata by clicking the button on calibre’s menu bar, but you can also expand the editing options by installing plugins. For example, there’s a plugin that will let you edit MP3 metadata.</p> <p>Right click on the <em>Preferences</em> button and select “Get plugins to enhance calibre”. You can search the list of available plugins by store, language, or some other important detail.</p> <h2>Merge & Split Epub eBooks</h2> <p>Have you ever bought an omnibus ebook and then regretted the file size? Or have you ever wished you could combine one of your favorite author’s many individually published short stories in a single anthology? There are a couple plugins which can help.</p> <p>EpubSplit and EpubMerge are a couple plugins for calibre which do pretty much what they say. Once installed, you can select one or more titles listed in the main menu of calibre, right click, and then select either EpubSplit or EpubMerge as an option. A new menu will pop up which will let you combine or divide the files in question.</p> <p>This option needs to be enabled by installing plugins. Right click on the <em>Preferences</em> button and select “Get plugins to enhance calibre”.</p> <h2>Remove DRM</h2> <p>This is a topic that I’ve covered in some detail in other posts, so I won’t repeat it here. But I do like being able to transfer my Kindle, Nook, and other ebooks to which ever device or app I’m using now without having to bother with registration or downloading the content again.</p> <p>You can find my posts on how to install DRM removal plugins for Kindle and Nook ebooks elsewhere on the blog.</p> <h2>Read the News</h2> <p>Calibre is known as an ebook library tool but it does a lot more. One featured loved by a number of dedicated readers is fetching the news. This lets you set a schedule for calibre to scan and download the contents of news sites and blogs. Calibre has to be running and your computer turned on, but the nice part is that calibre comes pre-configured with over 1300 news sources from all over the globe.</p> <h2>Wiki Reader</h2> <p>Wiki Reader is a plugin which lets you grab the contents of one or more Wikipedia articles and build them into an ebook. You’ll need to copy and paste the URLs for each article one at a time, so it could get time-consuming, but this is a good way to make your own ebook on a topic.</p> <p>You can find the plugin over on MobileRead.</p> <h2>Import eBooks from an eReader or Tablet</h2> <p>One feature that I keep forgetting, but is terribly useful, is how calibre can find ebooks on your tablet or ereader and add them to your calibre library ebook collection. This might not happen to you, but I often download ebooks from free ebook sites (Feedbooks, author’s websites, etc) to whichever tablet I am using. I don’t always remember to get a copy later to add to calibre, but that is largely because I don’t have to. All I need to do is plug in my tablet via USB and calibre will copy the ebook files off of it.</p> <p>This feature is particularly useful for stripping the DRM from Kepub (the Kobo-specific Epub format).</p> <h2>Import Annotations</h2> <p>Do you know what’s even cooler than pulling your ebooks off your device and adding them to your calibre library?</p> <p>Bringing the annotations with the ebooks.</p> <p>There’s a calibre plugin that will help you import notes, highlights, and other annotations from your Kindle or Kobo ereader. Hardware support is limited to just those two device makers, but it’s still better than a kick in the pants.</p> <p>Head over to MobileRead to find out more about the plugin.</p> <h2>calibre2OPDS</h2> <p>If you have a well maintained calibre library, and you have an account at Dropbox, you might want to consider combining them in a clever way. While you can always upload your ebooks and download them manually, there is a better option.</p> <p>Calibre2OPDS is an app for Windows, Linux, and macOS which build an OPDS catalog based on the contents of your calibre ebook library. Upload your ebook library to Dropbox, add the OPDS catalog generated by Calibre2OPDS, and assuming you follow all the steps you will be able to download your ebooks from inside reading apps like Stanza, Moon+ Reader, and others.</p> <h2>What’s Next?</h2> <p>The above 5 tricks are some of my preferred ways to use calibre, and I bet I’ve only scratched the surface. How do you use this app? What’s your clever trick? I’d like to hear about it, and I’m my readers would as well.</p> <p>I have been given a huge collection of books, papers and docs in various formats like pdf, epub, lit, among many others. I simply want to use Calibre to view these without adding to a library, at least initially. Later on I might create a library and catalogue the books I am interested in, but for now, all I want is a viewer that can handle numerous formats.</p> <p>Can Calibre do this and if not, can anyone recommend a viewer or small set of viewers that can handle all the popular ebook and document formats?</p> <p>Thanks in advance.</p> <p>It should be very easy to use only the viewer in calibre. Just associate the file formats with the ebook viewer.</p> <p>However you might benefit from the knowledge that the calibre ebook viewer actually is a epub viewer. But since calibre has the ability to convert between different formats, calibre can convert other formats to epub "on the fly" and let you read the resulting file in the calibre viewer that way.</p> <p>But you may improve the reading experience by using the tools in calibre to make a better conversion by making adjustments to the process. You can adjust things like layout, line breaks, paragraph spacing, page breaks, indentation, fonts, table of contents, headings, cover and other things.</p> <p>Pdf is a special case. It is very difficult to convert. I personally have standardised on just epub and pdf. I convert everything to epub, except for pdfs, and leave pdfs as they are. That way I only have to be able to read epub and pdf.</p> <p>So my main use of calibre is to fix metadata, convert to epub and then send the epub to my reading device. I don’t actually use calibre for much else, but I still keep my books there, as a backup. But I only keep the books in calibre as pdf or epub, all other formats are converted and then deleted. I also save the original unconverted formats outside calibre. Good to have if I discover that something went wrong in the conversion.</p> <p>I have downloaded some books in Mobi / PRC format from the library here at Mobile Read. In some cases, I want to change the cover image, but I can’t get it to work. I’d appreciate some help.</p> <p>I am using Calibre ver. 0.7.7.</p> <p>This is what I have been doing:</p> <p>1. Downloaded the book as a PRC file.</p> <p>2. Added it to my Calibre library.</p> <p>3. Went to the "Edit metadata individually" screen. In the Book Cover area, I can see the cover that comes with the book.</p> <p>4. Clicked the "Browse" button and selected a JPG file (on my hard drive) to use as the cover. The new image shows up correctly in the Book Cover area.</p> <p>I can now see the new image in Calibre, both in the main library page and also when I open the book within Calibre. I can also see a new file, named Cover.JPG, in the book’s containing folder; this file contains the new image.</p> <p>The problem is that when I try to open the book in Kindle for PC or the Mobi Pocket reader, or when I transfer it via USB to my Kindle, I still see the built-in image.</p> <p>I have also tried this:</p> <p>1. Selected the book in the Calibre library.</p> <p>2. Opened the Convert E-Book screen. I can see my new cover in the Book Cover part of the screen.</p> <p>3. Clear the checkbox labelled "Use cover from source file".</p> <p>4. Clicked the "Browse" button and selected the file with my new image.</p> <p>5. Clicked OK to convert the book from PRC to Mobi.</p> <p>The result is exactly the same as before. The new cover shows up in Calibre, but not in the other readers.</p> <h2>How to use Calibre program to add pdf pattern files to your Kindle</h2> <p>As I promised earlier, I am going to show you how to change your pdf files to mobi files (the kind that kindle readers utilize to display ebooks). There are a LOT of free patterns available on Ravelry, blogs, and yarn distributors’ websites that are wonderful — and did I mention — free. Now, I do have a printer, but I am lazy to a fault sometimes, and I a) can’t find the cable to connect it to my computer, b) don’t want to buy a new cartridge, and c) have been suffering from this printer lack for almost 3 years now (yes, true, THAT lazy…). Having been a graduate student for a few years now, I have learned to print off about 50 pdf patterns at a time from the university library for free. Hey, I’m paying the technology fee every semester, that might as well be MY paper, okay?</p> <p>So now that I have graduated and no longer have access to free library-printing, when I decide to knit something from a pattern that isn’t already available on paper or in a pattern book, I have a problem. Or do I??</p> <p>Enter the kindle that mom and stepdad got me for Christmas. I have already figured out how to fit tons of books on it, mostly free books that I got from gutenberg.org. So, because I have so many books on it already, I didn’t want to work to scroll through a ton of them directly on the kindle. I looked for a program that would organize the crap out of my ebook library. Enter Calibre.</p> <p>You can read all about the program on its website; I’m here to show you how to use it to make easily read pattern files for your kindle. As far as I know, this can work for a nook as well (I believe they also use mobi files).</p> <p>First, download and open calibre. It will look like this when opened (if you already have books in your calibre library, anyway).</p> <p><img src="https://emilancelace.files.wordpress.com/2012/06/screen-shot-2012-06-12-at-8-16-15-pm.png?w=580&h=363" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>The next thing you want to do (assuming you have already downloaded your free pdf pattern onto your computer) is locate the file through calibre.</p> <p><img src="https://emilancelace.files.wordpress.com/2012/06/screen-shot-2012-06-12-at-8-16-42-pm.png?w=580&h=363" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Click “add books from a single directory” at the top left corner.</p> <p><img src="https://emilancelace.files.wordpress.com/2012/06/screen-shot-2012-06-12-at-8-17-06-pm1.png?w=580&h=363" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Find the file (in my case, everything I download goes into a “download” folder, so it’s pretty easy to locate). Click ok. After it loads into calibre, click the big blue i button that says “edit metadata.” I do this to clean up the title, author, and make tags for easy searching.</p> <p><img src="https://emilancelace.files.wordpress.com/2012/06/screen-shot-2012-06-12-at-8-18-06-pm.png?w=580&h=363" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Click okay when your crazy urge to organize is satisfied.</p> <p><img src="https://emilancelace.files.wordpress.com/2012/06/screen-shot-2012-06-12-at-8-18-32-pm.png?w=580&h=363" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Make sure the “ebook” that you loaded is still highlighted. Up in the left top corner you’ll see the “convert books” button (near that “edit metadata” button you just finished with). Click this. You should see this open up:</p> <p><img src="https://emilancelace.files.wordpress.com/2012/06/screen-shot-2012-06-12-at-8-19-02-pm.png?w=580&h=363" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Near the top right corner of that pop-up, you’ll see the original file type in a drop down menu. Leave that one alone. Look in the top right corner, and you should see “mobi” as the output format. Click okay.</p> <p>There are one or two more steps to getting your file onto your kindle. You can either email it to your kindle account (using calibre), or you can plug your kindle into your computer and add the file from calibre. Both are fairly straightforward tasks, so I’ll leave you to that.</p> <p>I am trying to convert my ebooks from epub format to mobi/azw3, in order to put them onto my Kindle App and Paperwhite. Everything works fine except the book covers don’t show up in kindle app. There’s no description also, so it’s impossible to recognise which book I’m opening. I am using Calibre (osX) for the conversion.</p> <ul> <li>All my epub ebooks come with covers as the first page.</li> <li>I am not trying to convert from PDF, I know it can result in unpredictable outputs.</li> <li>When I make the conversion in calibre, everything seems to work fine. The computation produces three output files, the azw3 file, a jpeg file for the cover and a metadata file.</li> </ul> <ul> <li>I used the “Send to device” function in calibre after the conversion, (and I made sure I was sending the newly converted azw3 file, not the epub), and the cover doesn’t show up un Kindle App.</li> <li>I tried to use the “Save to disc” function, same result as before.</li> <li>I tried to manually edit the book cover downloading it again from amazon.com through calibre, and then reconverting again azw3 to azw3 to make sure the cover bound to the file. It doesn’t work.</li> <li>I also tried to manually put the azw3 file into the kindle library folder.</li> <li>I tried the same things as before with the mobi format. Same result.</li> </ul> <p>I really don’t know what to do anymore. Any help would be highly appreciated.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/epub-mobiazw3-conversion-57646.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="32" height="32" class=""/></p> <h2>1 Answer 1</h2> <blockquote> <p>Everything works fine except the book covers don’t show up in kindle app.</p> </blockquote> <p>Unfortunately, that’s the default behavior, because the Kindle for PC/OSX app will only display covers for “personal documents,” i.e. ePubs converted with Kindle Previewer/KindleGen, or books bought from Amazon.</p> <p>AFAIK, Calibre adds a fake ASIN and changes other metadata items so that books no longer appear in the Personal Documents folder. However, this change also causes the book to be displayed without a cover in the Kindle for PC/OSX apps.</p> <blockquote> <p>Everything works fine except the book covers don’t show up in kindle app. There’s no description also, so it’s impossible to recognise which book I’m opening.</p> </blockquote> <p>To display the book titles, click the hamburger icon (≡) in the Kindle app toolbar.</p> <p><img src="/wp-content/uploads/2022/05/mobileread-wiki-visual-C46E73.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>This is the home page of the Visual Kindle Guide as created by pilotbob, Leep and daffy4u with contributions from the MobileRead Community.</p> <h2>Contents</h2> <h2>[edit] How to use the Command Prompt</h2> <p>From time to time, you may need make use of the command line in order to perform some tasks on your Kindle. You need to know how to open a command window. Here are the steps to show you how:</p> <ul> <li>Command Prompt Vista/XP/Mac – If you are using Windows 7, the Vista instructions should work for you.</li> </ul> <h2>[edit] How to install Python for Windows</h2> <p>There are many tools being created to help extend the Kindle to be useful in other areas. Some of those tools require Python scripts. We will show you how to install Python on your Windows computer, so that you can take advantage of those scripts as they come along. NOTE: Even if you are using 64-bit Windows, install the 32-bit Python files.</p> <h2>[edit] How to work with Metadata</h2> <p>Want to manipulate the Metadata, like title and author info of your .azw, ,prc or .mobi books? Mobi2Mobi is the tool for the job. Please note that Mobi2Mobi does not work on Topaz formatted books (.azw1, .tpz). At this time there is no GUI for the Mac side. If you’re a Mac programming guru and would like to create one, please drop by Mobileread and let us know. :)</p> <ul> <li>Kindle Mobi2Mobi Vista/XP</li> <li>Kindle Mobi2Mobi GUI Vista/XP</li> </ul> <p>Mobi2Mobi for the Mac is a two part process. First the installation of the mobiperl tools and then the actual commands. Please note that Mobi2Mobi does not work on Topaz formatted books (.azw1, .tpz). NOTE: Due to updates in OSX, the installation instructions below may no longer work. We suggest using Calibre for Metadata editing.</p> <ul> <li>Install Mobi2Mobi Mac</li> <li>Kindle Mobi2Mobi Mac</li> </ul> <p>Tips on how to organize your Kindle books by tweaking the Metadata a bit more.</p> <p>Have you purchased or downloaded a freebie ebook from a retailer other than the Amazon Kindle store? Would you like to be able to sync that DRM-free ebook among your Kindles and Kindle for PC? If that same book is also sold at Amazon and has an ASIN number (eBook or pBook), we have a little trick using the Mobi2Mobi GUI to help you get your sync on. Unfortunately, at this time, this is a Windows only trick.</p> <p>Now you can use Calibre to organize your book series by using the Plugboards feature.</p> <h2>[edit] More Kindle Fun (Save Your Hack Files)</h2> <p>More ways to extend the usefulness of your Kindle. Beware, these modifications could damage your Kindle if not installed correctly and may void the warranty. Use at your own risk. :) <b>YOU MAY HAVE TO REMOVE THESE HACKS BEFORE YOUR KINDLE CAN BE UPDATED BY AMAZON, PLEASE BE SURE TO KEEP THE UNINSTALL FILES IN A PLACE WHERE YOU CAN FIND THEM EASILY</b>.</p> <h2>[edit] Which Kindle Do you Have?</h2> <p>The first thing you need to know is which Kindle you have.</p> <h2>[edit] Kindle Hacks Threads and Posts</h2> <p>There are many hacks becoming available for Kindle. Some are covered in this wiki others aren’t. I am collecting links to threads and posts about any and all hacks I learn about. Feel free to jump in with any I miss. :)</p> <h2>[edit] Kindle Screen Saver Hacks</h2> <p>Now on the the fun stuff.</p> <ul> <li>Kindle 1 Screen Saver Hack</li> <li>Kindle 2 Screen Saver Hack – [U.S. Sprint version only. Does not work with the 2.3 update.]</li> <li>KindleDX Screen Saver Hack – [U.S. Sprint DX, no visuals. Does not work with the 2.3 update.]</li> <li>Kindle 2 US, Int’l and Kindle DX Screen Saver Hack – [U.S. Sprint & International DX. Only works with the 2.3 update.]</li> <li>Kindle Screen Saver Hack for all 2.x and 3.x Kindles – This NiLuJe’s version</li> </ul> <h2>[edit] Kindle Font Hacks</h2> <p>If you’d like to read books in other languages on your Kindle 2, this is the hack for you.</p> <ul> <li>Kindle Font Hacks – Kindle 2 U.S. only [Does not work with the 2.3 update.]</li> <li>Kindle 2 US, Int’l and Kindle DX Font Hack – [Works with 2.3 update and now includes <b>Kindle DX International</b>.]</li> <li>Kindle Font Hack for all 2.x and 3.x Kindles – This is NiLuJe’s version</li> </ul> <h2>[edit] Kindle Registration Hack</h2> <p>Do you have the U.S. version of the Kindle 2 or Kindle DX and live outside the U.S.? Do you need the ability to register your Kindle so that you can take full advantage of Kindle Updates? This hack will help you.</p> <h2>[edit] How to use Calibre with your Kindle</h2> <p>You’ve probably heard about Calibre, the eBook Library Management program that is a <b>must have</b>, no matter what eBook Reader you own. For an introduction on how to use it to add books to the Kindle, check out:</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-convert-and-013E49.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="1024" height="682" class=""/></p> <p>If you rely on a Kindle (or Kindle app) for reading, you probably know that it supports not only ebooks, but also PDFs.</p> <p>In fact, if you’ve done your homework, you also know that your Kindle (or Kindle app) has its own email address, meaning you can send any PDF straight to your device just by attaching it to an email.</p> <p>But reading PDFs on a Kindle requires a little help. Portable Document Files (PDFs) are static images, boasting exactly the same dimensions, typeface, illustrations and formatting, on any device capable of opening them. That’s great news for anyone with a display large enough to view a PDF at its full size, but lousy news for anyone using a little Kindle e-reader. The comparatively small size of the display forces you to zoom and scroll around to read the document. It’s a pretty miserable experience.</p> <p>The solution to this is to convert the PDFs to be read on a Kindle. We’ll show you the aforementioned email trick first, and then a couple of other solutions. (Check out our latest Kindle reviews and ratings in our comprehensive roundup.)</p> <h2>Send a PDF to your Kindle via email</h2> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-convert-and-5796AE.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="700" height="507" class=""/></p> <p> <small>Seamus Bellamy/IDG</small></p> <p>Fun fact: every Kindle comes with its own email address, so you can send PDFs to your Kindle.</p> <p>Every Amazon Kindle comes with its own email address. You can find the address of your Kindle under <em>Settings > My Account > Send to Kindle Email</em>.</p> <p>Send an email to this address, typing <strong>Convert</strong> for the subject line and attaching the PDF you’d like to read. Amazon will automatically convert the contents of the PDF to a size that your e-reader can more readily handle. Once converted, the PDF will be sent to your Kindle using Amazon’s Whispersync technology.</p> <p>Using this method to convert PDFs has its drawbacks. First, it can take anywhere from 10 minutes to a few hours for the PDF to show up in your Kindle’s library. Second, if you’re using your Kindle out of the country where it was originally registered, using Whispersync to load the file on your e-reader could end up costing you a few bucks. Third, if your PDF contains images or charts, the conversion process may orient them the wrong way in the document or split them across several pages.</p> <h2>Send a PDF with the Send to Kindle App</h2> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-convert-and-C118D7.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="700" height="470" class=""/></p> <p> <small>Seamus Bellamy/IDG</small></p> <p>Sending a PDF to your Kindle is just a right-click away.</p> <p>If you read a lot of PDFs on a regular basis, you’ll likely not want to send an email every time you want to convert one. Amazon’s Send to Kindle app is the better option at that point. Available for Mac OS and Windows PCs, the Send to Kindle app is free to download and easy to use. Once installed, simply sign into the app using your Amazon credentials and right-click on the PDF you want to send to your Kindle. Boom: You’re done. The converted PDF will appear in your Kindle e-reader, with all of the same caveats that come with sending the document via email, sans the drudgery of typing out and sending a message.</p> <p>Amazon also offers a Send to Kindle browser extension for Firefox and Chrome users. A single click will send the PDF from your Browser to your Kindle via Whispersync.</p> <h2>How Calibre converts multiple PDFs for Kindle</h2> <p><img loading="lazy" src="/wp-content/uploads/2022/05/how-convert-and-D27754.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="700" height="432" class=""/></p> <p> <small>Seamus Bellamy/IDG</small></p> <p>Calibre is a free app that makes cataloging e-reader content, including PDFs, a breeze.</p> <p>If you need to bulk-convert a large number of PDFs for reading on your Kindle or want to maintain a library of Kindle-optimized files on your computer, you may want to consider downloading Calibre. Open-source and free-to-use, Calibre can convert multiple PDFs and send them to your Kindle quickly and easily.</p> <p>To use Calibre for this purpose, connect your Kindle to your PC via USB, open Calibre, and wait for it to recognize your connected e-reader. Add the PDF files to Calibre’s library and click <em>Send to device</em>. Your Kindle will be ready to show those PDFs within minutes.</p> <p><em>This story’s original version by Rick Broida was published as a “Hassle-Free PC” column on July 15, 2013.</em></p> <p>The main calibre window has a default set of columns that most people find useful in organising their ebook collection. These include Title, Author, Date, Size (of file in MB), Ratings, Tags , Series, Publisher and Published. Although these columns are sufficient for many users, most calibre features are made flexible to accommodate unusual needs and whims. The set of columns in the main window can be easily customized to include those columns that you find most useful. This demo video (the part between approximately 2 and 4 minutes of the 14 minute long video) illustrates how to manipulate the contents of columns as well as how to delete unwanted columns and add custom columns.</p> <p><strong>Manipulating the columns:</strong> Depending on your screen size only a few columns can be made visible so you will only want to include columns that are useful to you. If you need more columns than fit in your screen, you can move the most useful ones to the left so they are always visible. The order of the columns can be changed by left clicking on the column title and dragging it to the left or right of other column titles. As shown in the figure below you can right click on the column title to see ways in which you can manipulate it.</p> <p> <img src="/wp-content/uploads/2022/05/calibre-custom-columns-F183.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>You can hide the column if it is not useful to you. You can also sort the entries in your library in ascending or descending order of the entries in a particular column like the rating; having the highest rated bpooks on top and the lowest rated at the bottom of your list. This can also be used to arrange books in alphabetical (or reverse alphabetical) order of author or title. You can also implement this by simply left clicking on the title of the column you want to sort by. If you want the order reversed just click on the column title again. If the entries are arranged in descending (ascending) order of the entries in a particular column a little grey downward (upward) pointing arrow appears next to the column title; like for the Rating column in the figure above.<br />For a text type column like author or title you can choose the the text to be left, right, or center aligned. You can manipulate the width of the columns by hovering the mouse between two column titles, once the left-right double sided arrow icon shows up you can drag it left or right to adjust the width.</p> <p><strong>Adding custom columns:</strong> To add a custom column click on Preferences in the main calibre tool bar and in the new window that opens click “Add your own columns” in the first row of icons under Interface. The following window appears.</p> <p> <img src="/wp-content/uploads/2022/05/calibre-custom-columns-CBD6DDE.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>The columns marked with an “x” are the visible columns in your main calibre window. You can select or unselect columns here to choose which ones should be visible. To add a column not on the list click the green “+” sign button on the right and the following window appears.</p> <p> <img src="/wp-content/uploads/2022/05/calibre-custom-columns-28C1.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>First you must choose the nature of entries in your custom column. The figure above shows the available data types including integer numbers, text, binary yes and no entries, dates, floating point numbers, etc. This blog post will illustrate examples of two different data type columns.</p> <p><strong>Example Binary Yes/No type column:</strong> Here we are going to create a binary Yes/No type column with column heading “Read”, look up name “read” and column type Yes/No. The entry Yes in this column indicates the book is read and No indicates the book is not yet read. After filling the entries and clicking OK in the window in the above figure a new column appears with title “Read” in the main calibre window. By double clicking in the position of the entries of this column a drop down box opens that allows you to select “Yes” or “No” or leave it blank as shown in the figure below. So you can now mark the read status of the ebooks in you collection as done for a few in the figure below. A green tick indicates Yes or read and a white cross in a red circle indicates No or not read. You can also leave the read status blank.</p> <p> <img src="/wp-content/uploads/2022/05/calibre-custom-columns-A498.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p><strong>Example Text with fixed set of permitted values type column:</strong> We will use this type of column to indicate the genre of the book. The figure below shows how we have chosen the values and corresponding colors for the entries in this column.</p> <p> <img src="/wp-content/uploads/2022/05/calibre-custom-columns-E059.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Setting the column up as shown above will create a column titled Genre with allowed entries Adventure, Mystery, Classic, Humour, Play and News as shown below. The adventure entry will always be in black the Mystery entry in blue etc.</p> <p> <img src="/wp-content/uploads/2022/05/calibre-custom-columns-F1D5C.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>To fill the entries of this column as before double click on the column entry and a drop down box will show up with the allowed entries as shown in the figure above. The figure above also shows a few books with this entry filled in and the News entry is in red while the Humour entry is in green. The colors will help quickly distinguish the different genre at a glance.</p> <p>Hope you have fun playing around with various types of custom columns this week and find it useful. See you again in about a week.</p> <p>Ebooks are hot. They’re just about the only part of the book industry that’s growing. When “The Lost Symbol,” Dan Brown’s followup to “The Da Vinci Code” was published this week, aside from preorders, the Kindle edition of the book outsold the hardcover edition at Amazon.com,one report said, .</p> <p>Great news for InDesign users is that Adobe InDesign provides one of the best ways to create e-Books (you need InDesign CS3 or InDesign CS4). However, the methodology for doing this isn’t necessarily easy or obvious. But a new Adobe white paper published this week, along with a couple of helpful blog posts from Adobe, will help you get started exploring this new technology. Below, I’ll point out an alternative method of reading your InDesign-created eBook.</p> <p>The first step is to create an ePub file. As Mike Rankin wrote on InDesignSecrets.com in February, ePub is “an open standard XML-based file format that allows text to reflow and adjust to the size of various screens. epub is generally thought of as an intermediary format between the authoring/composition tool and the eBook itself. Think of epub as the eBook version of a press-ready PDF. Not the final product, but a necessary step.”</p> <p><strong>Exporting ePub Files</strong></p> <p>You can create an ePub file by choosing File > Export for Digital Editions (CS4) or File > Cross-media Export > XHTML / Digital Editions (CS3). There are three panels of choices.</p> <p><em><small>More after the jump! Continue reading below</small></em>↓<img src="/wp-content/uploads/2022/05/creating-ebooks-indesign-BC6D3B7.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/><br /><em><small>Free and Premium members see fewer ads! Sign up and log-in today.</small></em></p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/creating-ebooks-indesign-B67DF79.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="377" height="281" class=""/></p> <p>Basically, the InDesign file is being converted to XHTML and CSS (Cascading Style Sheets). However, not every InDesign file will work equally well. Long InDesign documents need to be broken into separate files, and text frames need to be threaded together into one flow. A highly useful blog post from Adobe called “Producing ePub documents from InDesign” provides some guidelines for preparing files correctly.</p> <p>InDesign CS4 will work much better than InDesign CS3. Quite a few bugs are fixed, and you have new capabilities like being able to include images as anchored objects. Local formatting like bold will really come through as bold. Another posting details some of the improvements in CS4.</p> <p>You can preview the ePub you create in Adobe Digital Editions. a free, lightweight eBook reading application for PC and Mac. You can use it to read and organize your eBook collection, as well as preview the ePub files you export from InDesign.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/creating-ebooks-indesign-8A939D.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="368" height="224" class=""/></p> <p><strong>New White Paper Covers Conversion to Kindle</strong></p> <p>The eBook reader you’ve probably heard the most about is the Amazon Kindle. However, it <em>doesn’t</em> read the ePub format. You need to convert your ePub file into the MOBI format, which the Amazon Kindle can read. This process, and how you can preview your eBook and upload it to the Amazon store are covered in a new white paper from Adobe just published this week. To do the conversion, you need to use Calibre, which is a free, open source eBook conversion tool. Calibre is available for Windows, Mac, and Linux platforms. The steps for the conversion are detailed in the white paper.</p> <p>This document also has helpful tips for formatting the InDesign file like this one:</p> <blockquote> <p>If your InDesign document contains local formatting (a manually bolded word without a Character Style applied to it, for example), make sure you select the Local Formatting option under Base for CSS Styles in the Digital Editions Export Options dialog. Local formatting export is supported in the latest version of InDesign CS4 (v. 6.0.3). If you’re using InDesign CS3, only Character Styles, Paragraph Styles, and Object Styles are preserved during the export.</p> </blockquote> <p><strong>Another Approach: Creating ePubs for the iPhone</strong></p> <p>But the Kindle is not the only way of viewing eBooks. A competitor is Apple’s iPhone and iPod Touch. There are several free eBook readers available from Apple’s App Store (Stanza, Kindle for the iPhone, B&N eReader, and others). This is potentially a huge market because Apple recently announced that there are now 30 million iPhones and 20 million iPod Touches. Most of these readers can read ePub files directly.</p> <p>My favorite way of reading ePubs on my iPhone is to use the free Stanza application. In Stanza for the iPhone/iPod Touch, you can use the Online Catalog feature to download free and paid eBooks from a variety of sources. But how do you get your own InDesign-created ePub into an iPhone? You use the free Stanza Desktop application for the Mac or PC, available from Stanza’s creator, Lexcycle.</p> <p>Once you’ve downloaded Stanza Desktop, launch it. Choose File > Open, and open the ePub file you created in InDesign. Unlike Adobe Digital Editions, the file will appear to lose its formatting because this application isn’t intended as an ePub reader for the desktop. Your computer needs to be on the same local network as your iPhone or iPod Touch. If it is, open the Stanza on the iPhone/iPod Touch, and choose Shared Books. Click on “Books on [name of your computer]”. You’ll see the name of the ePub file you’re viewing in Stanza Desktop. Click on the file’s name. If the book has a cover image, you can view it. Then click Download. Stanza Desktop will let you know that your iPhone/iPod Touch wants to download that file. When you confirm this, the file is transferred to the mobile device and added to the Stanza for the iPhone/iPod Touch’s library.</p> <p>Now you can view the Table of Contents.</p> <p><img loading="lazy" src="/wp-content/uploads/2022/05/creating-ebooks-indesign-3EE83D8.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" width="320" height="480" class=""/></p> <p>You can page through your pages. Stanza has a variety of reading controls. Click on the bottom part of the screen to view them. You can change text size and color, background color, and so on. Enjoy!</p> </p> <p>For various reasons, we come across “book not showing up on kindle” issue when we read ebooks with Kindle, no matter the books are purchased from Amazon, sideloaded or borrowed. If the books are not even showing in our library, how can we read them? Don’t worry. You’ll discover different solutions to “book not showing up on kindle” issue and finally get your books displayed well on your Kindle.</p> <h3>General Solutions for book not showing up on kindle</h3> <p>Solution 1 Check the internet of your Kindle. Please ensure it is connected to the internet.</p> <p>Solution 2 Restart can fix almost 80% problem caused by device glitch. This also works for kindle device. So please turn off your kindle and turn on. You may see your kindle books in the library this time. Learn how to restart Kindle now.</p> <p>Solution 3 Check if your kindle is registered or not. If your kindle is registered successfully, you will see “xx’s kindle” at the upper left corner.</p> <p>Solution 4 To sync kindle books across different kindle apps and devices, you need to ensure Whisper sync is on both on your kindle device and Amazon website. Below is how to enable whisper sync both on kindle and Amazon.com.</p> <p><b>On kindle:</b> Tap on your <b>menu tab>>Settings>>Device Options>>Advanced options</b>, then check whether Whispersync for books are enabled or not. It not, just enable it.</p> <p><img src="/wp-content/uploads/2022/05/solutions-for-book-E7512C1.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p><b>On Amazon website:</b> Go to “Manage Your Content and Devices” >><b>preferences>>Device Synchronization(Whispersync Settings)>>Turn on it</b>. Then go back to your kindle devices to <b>“Sync your kindle”</b>.</p> <p><img src="/wp-content/uploads/2022/05/solutions-for-book-2F133CE.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Solution 6 If your kindle clock gets out of sync, the kindle books also will not show in the kindle library. To fix this issue, Turn wifi-on, and go to <b>Home>> Settings>>Sync Your Kindle</b>.</p> <p><img src="/wp-content/uploads/2022/05/solutions-for-book-4E044EC.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Solution 7 If you have multiple kindle devices/apps registered with your Amazon account, you can set this one as the default device.</p> <p>Go to “Manage Your Content and Devices” on Amazon website>>Device>> find this kindle, click on “Device Actions” button and select <b>“Set as default device”</b>. This time the book you ordered will be delivered to this default device automatically.</p> <p><img src="/wp-content/uploads/2022/05/solutions-for-book-3543273.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <h3>Library books are not showing up on Kindle</h3> <p>Solution The outdated kindle firmware possible will be the reason that kindle books not showing. So go to check whether there is an update for your kindle and install the latest software for your kindle. This solutions especially works for the kindle that has been worked well for many years but suddenly did not show kindle books.</p> <p><img src="/wp-content/uploads/2022/05/solutions-for-book-0E96874.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <h3>Books not showing up on kindle app</h3> <p>Workaround 1 Go to <b>Settings>>Registration>>Deregister</b> this Kindle. Then restart this kindle app and register it again with your Amazon account.</p> <h3>Sideloaded kindle books have not been showing up on kindle</h3> <p><b>Possible reason:</b> Please check whether this book is protected by DRM as the Kindle would not read the DRM-protected ebooks, except the one downloaded via itself.</p> <p>Solution Remove Kindle drm and transfer it to your documents folder.</p> <p>If you ensure your ebooks are DRM-free, please follow this guide to transfer books to kindle/kindle fire.</p> <h3>Kindle books transferred from Calibre are not showing</h3> <p>Solution 1 On your kindle, you have to change the sort options from “All” to “Downloaded”. Please note that “All” means all the books in your Amazon cloud, while “Downloaded” means all the items downloaded to your device (and that can mean books not bought from Amazon and sideloaded from your computer to your Kindle.</p> <p><img src="/wp-content/uploads/2022/05/solutions-for-book-24A918A.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Solution 2 If you convert ebooks to mobi format with calibre, then Calibre automatically added a ‘[PDOC]’ tag, and this makes the Kindle organize those “doc” files differently (as personal documents). You can just <b>replace the tag ‘[PDOC]’ with ‘[EBOK]’</b> when you converting your ebooks. The books will show properly there.</p> <p><img src="/wp-content/uploads/2022/05/solutions-for-book-EEAFD9C.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Solution 3 Convert kindle books to azw3 format and then transfer it to the ‘Documents’ folder of your Kindle.</p> <p><b>Reminders:</b> <br />If Amazon has stopped selling this book any longer, and deleted it from their library, the book will disappear from your cloud and devices, because these books are linked to your account by amazon and you haven’t back them up. To completely own your kindle books, just remove kindle drm and convert them to drm free ebook format now. </p> </p> <p>Iris Yan joined Epubor since 2017. She always wants to share everything related to ebook reading and improve your reading journey.</p> <p>This is an article series that will explain the most common reasons why ebook users have trouble opening an ebook that was purchased from an ebook retail website. Most of these issues are easily avoided by simply following your download instructions, installing the software you need, and making sure that you’re using the correct ebook format for your eReader. This post covers reason #5: <em>The eBook File is Corrupted or The Download Link is Bad.</em></p> <p>These are the least commons reason why your ebook isn’t opening correctly, but they do happen from time to time.</p> <p>Sometimes the website selling the ebook will have made a mistake in the download link, which will cause it to not work when you attempt to download your ebook. Even the people running ebook websites are humans, so mistakes can be made. Sometimes the problem originated before it even got to the ebook store. When a book publisher wants to sell their books as ebooks, often they list their ebooks with a company that distributes ebooks and provides DRM on the downloads. The book publisher must provide the distributor with all of the pertinent information about the ebook, including the file name. If that file name is provided incorrectly, it will still be incorrect when it gets to the ebook store.</p> <p>Sometimes the ebook file itself has become corrupted. These files have to be sent from the book publisher to the distributor to the ebook store, and they go through a lot of different servers during that time, they’re stored in multiple databases, and the download happens through multiple pieces of software. It is a bit of a miracle that the files don’t get corrupted a lot more than they do. If you end up with an ebook file that has become corrupted and won’t open, keep this in mind.</p> <p>However, remember that these occurrences are not common. The majority of the time, when an ebook isn’t opening the reason is that the user is trying to open it with the wrong software or the wrong e-reader device. For example, if you try to open a DRM-protected PDF file with Adobe Reader, the program will give you a message that the file is corrupt. In this case, the file is not actually corrupt — that’s just the only way that Adobe Reader knows how to tell you that it can’t open the file when it’s meant for Adobe Digital Editions.</p> <p>If you’ve found this post through Google and haven’t yet read through the more common reasons why your ebook isn’t opening, please check those out first before you assume that your ebook file is corrupted. See all posts in this series.</p> <h3>Share this:</h3> </p> <h3>Like this:</h3> <p>This is an article series that will explain the most common reasons why ebook users have trouble opening an ebook that was purchased from an ebook retail website. Most of these issues are easily avoided by simply following your download instructions, installing the software you need, and making sure that you’re using the correct ebook format for your eReader. This post covers reason #4: <em>The DRM Has Gone Wrong Over Time</em>.</p> <p>This particular problem arises when you’ve purchased an ebook in the past. You might run into trouble if you try to use the ebook on a new computer/device, a computer that has had its operating system upgraded/reinstalled, or if you’re simply trying to re-download an ebook that you’d previously lost or deleted.</p> <p>Like we have in the previous articles, let’s consider this issue in terms of Adobe’s DRM, since Adobe provides the most prevalent DRM system for ebooks. Adobe does allow users to re-download previous purchases and to use their ebooks on multiple computers and devices. However, Adobe’s DRM system must be worked with properly if you want this to work.</p> <p>Before you download an Adobe ebook for the first time, you must “authorize” Adobe Digital Editions with your Adobe ID. If you do that, then you can authorize Adobe Digital Editions on other computers with the same Adobe ID, and Adobe will allow you to use your ebooks on those computers as well.</p> <p>Some people try to skip all of that and just email the ebook to their other computer, transfer it via a thumb drive, or something similar. That is exactly what the software is set up to prevent you from doing. The whole purpose of the DRM is to prevent people from sharing the file with others. Whether or not you agree with this is pretty much irrelevant. It is what you have to deal with right now if you want to use Adobe ebooks.</p> <p>If you don’t authorize Adobe Digital Editions with the same Adobe ID on each computer, you will probably get an error message that says “ebook already licensed to a different user” or some variation on that text. If you’ve gotten that type of error message, you will have to go back to the beginning of the process and start over.</p> <p>First, install Adobe Digital Editions on the computer where you want to read the ebook.</p> <p>Second, authorize it with the same Adobe ID that you used when you downloaded the ebook for the first time. (If you did not authorize Adobe Digital Editions with an Adobe ID before you downloaded the ebook for the first time, then you have effectively forfeited your right to use the ebook on multiple computers.)</p> <p>Third, return to the ebook store where you purchased the ebook, and download it from there to the computer where you want to use the ebook.</p> <p>If you suspect that you’ve authorized Adobe Digital Editions with the wrong Adobe ID, you can redo your authorization. Learn how to de-authorize and re-authorize Adobe Digital Editions here.</p> <p>The next installment in this series will be #5, the final part. See all posts in this series.</p> <p>If you still like reading real books, you may find it hard to keep them in order. So in this article, we explain how to organize your book collection.</p> <p>As an avid book reader and collector, you face two problems: you need to organize your book collection and deal with the lack of space. Books come in all shapes and sizes, cover all subjects, and put the world firmly on your doorstep. That’s the joy of books. But they can be a nightmare to sort through.</p> <p>Fortunately, technology can help you keep your books in order. What is the best way to organize your book collection? How do you organize a bookshelf with a lot of books? And should you really get rid of your prized novels?</p> <h2>5 Ways to Organize Your Book Collection</h2> <p>Books are personal, so you need to arrange them in a way that’s most accessible to you. Do you separate hardbacks from paperbacks? Do you stack them in piles? With that in mind, here are a few ways to organize your books.</p> <h3>1. Sort Books Using the Dewey Decimal System</h3> <p>How do you organize a library? This is the professional way to do it, i.e. how they’re listed in educational institutions. So what is the Dewey Decimal System?</p> <p>It’s simply a numerical-based method to organize books by genre, then by author surname. Here’s the basic system used in public spaces:</p> <p><strong>000:</strong> Computer science, information, and general works</p> <p><strong>100:</strong> Philosophy and Psychology</p> <p><strong>200:</strong> Religion</p> <p><strong>300:</strong> Social Sciences</p> <p><strong>400:</strong> Language</p> <p><strong>500:</strong> Natural Sciences</p> <p><strong>600:</strong> Applied Sciences and Technology</p> <p><strong>700:</strong> Arts and Recreation</p> <p><strong>800:</strong> Literature</p> <p><strong>900:</strong> History, Geography, and Biography</p> <p>Each number further splits into smaller categories. For instance, Literature is divided into American literature in English (810), English & Old English literatures (820), and many more. William Shakespeare even has his own subcategory (822.33).</p> <p>But of course, you can do your own thing by creating your own organizational system. Splitting by genre could just mean you group all detective fiction together. Romance has its own place, as do thrillers. Classics might deserve their own space—it’s entirely up to you.</p> <p>Or you can simply split your collection into fiction and non-fiction.</p> <p>Let’s explore some less intense ways to sort your collection.</p> <h3>2. Make a “To Read” Pile</h3> <p>You finish one book and want to start a new one. But they’re scattered haphazardly about so you can’t find the one you’re after.</p> <p>Instead, create different piles, shelves, or cupboards. These separate the books you’ve read (and want to keep—which we’ll come back to) from the tomes you still want to enjoy. This will mean it’s easier to decide what to enjoy next.</p> <h3>3. Keep Your Favorite Books Separate</h3> <p>Are there novels you want to reread? Or journals that will be useful for work? Keep them separated from the rest of your books.</p> <p>Keeping your favorite books to one side can prove a handy pick-me-up on days you’re feeling low. If you are feeling down, a fantastic immersive story can cheer you up. Don’t forget that there are plenty of websites you can browse when you’re feeling depressed too.</p> <h3>4. Organize Your Books Alphabetically</h3> <p>This is the easiest method for keeping your collection in order. Organize your volumes in alphabetical order, according to authors’ names, or by title.</p> <p>This can be first name or surname, as long as you remember which you’ve opted for. It wouldn’t be such a problem when looking for Christie, Agatha, but is more important for Zafón, Carlos Ruiz.</p> <h3>5. Sort by Series</h3> <p>Few things are as frustrating as finishing one book in a series and eagerly reaching for the next. only to find you’ve misplaced it. You spend the next day scouring your bookshelves, intermittently crying, and checking behind sofas. Then you order a replacement copy online.</p> <p>Alternatively, you could keep series in chronological order and make life as stress-free as possible.</p> <h2>Cataloging Sites Help Track Reading Progress</h2> <p>How do you keep track of which books you’ve read and which you’d like to catch up with?</p> <p>A good option is using a cataloguing website.</p> <p>The best-known one is Goodreads, which contains details on the vast majority of books, including different editions. You can mark any you’ve read and review them. Many authors are also members, so will see feedback and can be asked questions about their work. Plus, you can mark books you’re interested in and Goodreads will email you further recommendations.</p> <p>At the end of the year, Goodreads will give you a helpful summary of how much you’ve read.</p> <p>Another solution is LibraryThing, a similar service which is now free and also includes movies and music. The interface is simple but don’t be put off: this is a fantastic social network for readers. You can filter by tags, meaning organizing your collection is easy.</p> <p>And if you prefer physical records, LibraryThing lets you print off your catalog!</p> <h2>Collectorz Builds a Virtual Library</h2> <p>You can use various cataloging apps, but one of the best is Collectorz. This covers many mediums, including films, books, and video games. It goes above and beyond, however: the comic book version, for instance, includes a library of graphic novels.</p> <p>Okay, so basically, how do I prevent callibre from renaming files that I’ve added? Since I plan to open them with mobipocket (Amazon Kindle 4 PC does not display covers, but reconverting and opening the files with mobi does, every time.) Because it’s super annoying having to manually rename files that I’ve already renamed.</p> <p>Normally, it wouldn’t be a problem. But it’s a HUGE problem for Series books, since you can’t ‘Sort by Series’ with mobipocket, nor will Callibre locate the series every time.</p> <p>For example, I’m trying to add:</p> <p>Garth Nix [Abhorson Book 01] Sabriel <br />Garth Nix [Abhorson Book 02] Lirael <br />Garth Nix [Abhorson Book 03] Abhorson</p> <p>But when I add it to Callibre, it’s listed as:</p> <p>Sabriel <br />Lirael <br />Abhorson</p> <p>Normally, this wouldn’t be a problem, but for books like this, I have to re-check the folder to see what order the books go in, because the proper Series is rarely found.</p> <p>How would I prevent Callibre from doing this? Or how would I be sure that it finds the series EVERY time?</p> <p>You use the series and series index fields. That is why they are there.</p> <p>Sometimes it is possible to get the series information from the filenames, when you add books. There are a lot of threads about that here. Search for "metadata from filename".</p> <p>If all else fails, you can enter the series information manually.</p> <p>When you send the books to the device, you can add the series information to the filename using the send to device template, or to the title using a plugboard.</p> <p>Thank you. I’ll try that. But to be honest, I’m feeling a little overwhelmed by this at the moment, cause I have files that I’d like to send to friends and files that I’d like to keep, and yet Calibre cuts off part of the title in the Calibre Library Folder. For example:</p> <p>[Anna Strong Chronicles 01] The Becoming – Jeanne C. Stein</p> <p>[Anna Strong Chronicles 01] The Bec – Jeanne C. Stein</p> <p>See, I wouldn’t have a problem with that, because I’m planning to direct the mobi PC reader to find books from a shared network, but these are books I want to send to my love. Do I really need to rename them? Is there a reason that Callibre does this?</p> <p>Copying is out of the question because the ONLY reason why I’m using calibre with the files is to replace some of the covers for better ones.</p> <p>Basically, what I want to do is download the cover ONLY without Calibre renaming the file in the output folder, to prevent cutting off some words.</p> <p>You should NOT look inside the Calibre library. And you should definitely not copy any books from there.</p> <p>Use the Save to disk feature. Then you decide in the template exactly how the book should be named.</p> <p>But this only works if the different fields for the books contains correct information. The title should only contain the title, and not any series information. The series information goes in the series fields. If you have some extra information you wish to store, you create a custom field.</p> <p>If you use Calibre as intended, you will hopefully be less frustrated. But it may take some time before you get the hang of it. I suggest you do some experimenting to understand Calibre better. Try to get metadata from the filenames. Try to set all fields perfectly. Try fetching metadata for the book. Try to save to disk using different templates. Try the plugboard to see what it does.</p> <p>Okay, so basically, how do I prevent callibre from renaming files that I’ve added? Since I plan to open them with mobipocket (Amazon Kindle 4 PC does not display covers, but reconverting and opening the files with mobi does, every time.) Because it’s super annoying having to manually rename files that I’ve already renamed.</p> <p>Normally, it wouldn’t be a problem. But it’s a HUGE problem for Series books, since you can’t ‘Sort by Series’ with mobipocket, nor will Callibre locate the series every time.</p> <p>For example, I’m trying to add:</p> <p>Garth Nix [Abhorson Book 01] Sabriel <br />Garth Nix [Abhorson Book 02] Lirael <br />Garth Nix [Abhorson Book 03] Abhorson</p> <p>But when I add it to Callibre, it’s listed as:</p> <p>Sabriel <br />Lirael <br />Abhorson</p> <p>Normally, this wouldn’t be a problem, but for books like this, I have to re-check the folder to see what order the books go in, because the proper Series is rarely found.</p> <p>How would I prevent Callibre from doing this? Or how would I be sure that it finds the series EVERY time?</p> <p>You use the series and series index fields. That is why they are there.</p> <p>Sometimes it is possible to get the series information from the filenames, when you add books. There are a lot of threads about that here. Search for "metadata from filename".</p> <p>If all else fails, you can enter the series information manually.</p> <p>When you send the books to the device, you can add the series information to the filename using the send to device template, or to the title using a plugboard.</p> <p>Thank you. I’ll try that. But to be honest, I’m feeling a little overwhelmed by this at the moment, cause I have files that I’d like to send to friends and files that I’d like to keep, and yet Calibre cuts off part of the title in the Calibre Library Folder. For example:</p> <p>[Anna Strong Chronicles 01] The Becoming – Jeanne C. Stein</p> <p>[Anna Strong Chronicles 01] The Bec – Jeanne C. Stein</p> <p>See, I wouldn’t have a problem with that, because I’m planning to direct the mobi PC reader to find books from a shared network, but these are books I want to send to my love. Do I really need to rename them? Is there a reason that Callibre does this?</p> <p>Copying is out of the question because the ONLY reason why I’m using calibre with the files is to replace some of the covers for better ones.</p> <p>Basically, what I want to do is download the cover ONLY without Calibre renaming the file in the output folder, to prevent cutting off some words.</p> <p>You should NOT look inside the Calibre library. And you should definitely not copy any books from there.</p> <p>Use the Save to disk feature. Then you decide in the template exactly how the book should be named.</p> <p>But this only works if the different fields for the books contains correct information. The title should only contain the title, and not any series information. The series information goes in the series fields. If you have some extra information you wish to store, you create a custom field.</p> <p>If you use Calibre as intended, you will hopefully be less frustrated. But it may take some time before you get the hang of it. I suggest you do some experimenting to understand Calibre better. Try to get metadata from the filenames. Try to set all fields perfectly. Try fetching metadata for the book. Try to save to disk using different templates. Try the plugboard to see what it does.</p> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-10FFC5.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>พยายามจดจำตามชื่อเรื่องเพียงอย่างเดียวสิ่งที่ทำให้ชุดของหนังสือเข้ามาอาจทำให้น่าหงุดหงิด อ่านต่อเมื่อเราแสดงให้คุณเห็นว่าจะอธิบายและจัดเรียงหนังสือของคุณอย่างไรเนื่องจากหนังสือเหล่านี้ถูกโอนไปยังเครื่องอ่าน eBook ของคุณเพื่อการอ่านที่ปราศจากความยุ่งยาก</p> <p>ต่อไปนี้เป็นสถานการณ์ทั่วไป: คุณได้โอนชุดหนังสือไปยังผู้อ่าน ebook ของคุณและเมื่ออ่านแล้วไม่มีวิธีง่ายๆในการบอกหนังสือนอกเหนือจากนี้ ทำ <em>ฟาร์มลึกลับ</em> มาก่อน <em>ความลึกลับยุคกลางสมัยใหม่</em>? คุณสามารถผ่านความยุ่งยากอย่างมากในการเปลี่ยนชื่อหนังสือทุกเล่มที่คุณต้องใส่ซีรีส์และหมายเลขชุดไว้ในชื่อ แต่ไม่จำเป็นต้องทำเช่นนั้น ขอบคุณฟังก์ชันที่มีประโยชน์มากใน ebook การใช้งานที่เป็นที่นิยม Calibre การจัดการทั้งหมดก็จะเป็นไม่กี่นาทีของ tweaking เพลิดเพลินไปกับการเปลี่ยนชื่อโดยอัตโนมัติและหนังสือที่ถูกต้องในเครื่องอ่าน ebook ของคุณ</p> <h2>ฉันต้องการอะไร?</h2> <p>สำหรับบทแนะนำนี้คุณจะต้องมี eBook Reader และเครื่องมือฟรีเท่านั้น นี่คือสิ่งที่เรากำลังใช้:</p> <ul> <li>Calibre (ผู้จัดการ ebook ฟรีและโอเพ่นซอร์ส)</li> <li>Kindle (เคล็ดลับนี้ใช้งานได้กับ Nooks และผู้อ่าน ebook อื่น ๆ ด้วย)</li> <li>ชุด ebook</li> </ul> <p>หากคุณไม่เคยใช้ Calibre มาก่อนเราขอแนะนำให้ดูคู่มือการจัดเก็บ ebook ของคุณด้วย Calibre เพื่อทำความคุ้นเคยกับแอปพลิเคชัน</p> <h2>เริ่มต้นใช้งาน</h2> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-D00EA6.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>สิ่งที่สำคัญที่สุดคือคุณมีชุดหนังสืออยู่ใน Calibre เพื่อจุดประสงค์ของบทแนะนำนี้เราได้สร้างชุดไฟล์ ebook โดยผู้ประดิษฐ์ขึ้นเราขอโทษผู้อ่านผู้ที่กำลังจะตายเพื่อทราบว่าเกิดอะไรขึ้น <em>ความลึกลับยุคกลางสมัยใหม่</em>.</p> <p>สิ่งที่สำคัญที่สุดที่สองคือคุณได้ติดฉลากชุดข้อมูลใน Calibre อย่างถูกต้องโดยใช้แท็ก meta data data หากคุณยังไม่ได้ทำเสร็จเราสัญญาว่านี่จะเป็นส่วนที่ใช้แรงงานมากที่สุด (และ Thankfully one-time) ของบทแนะนำ</p> </p> <p>วิธีง่ายๆในการแท็กหนังสือทั้งหมดในชุดได้อย่างรวดเร็วคือการเน้นหนังสือคลิกขวาที่กลุ่มที่ไฮไลต์แล้วเลือก <strong>แก้ไขข้อมูลเมตาทีละรายการ</strong>. ในเมนูแก้ไขข้อมูลเมตาคุณสามารถป้อนชื่อซีรี่ส์และหมายเลขที่ด้านบนของหน้าจอ หากคุณต้องการความช่วยเหลือในการหาลำดับของหนังสือในซีรี่ส์ที่กำลังแก้ไขเราขอแนะนำให้คุณเยี่ยมชมเว็บไซต์ FictFact ที่เป็นประโยชน์ซึ่งคุณสามารถเรียกดูได้จากชื่อผู้แต่งและชุดหนังสือ</p> <p>คุณมีหนังสือแล้ว? คุณได้ติดแท็กพวกเขาด้วยซีรี่ส์และหมายเลขที่ถูกต้องหรือไม่? ตอนนี้ถึงเวลาที่จะผูกมันทั้งหมดเข้าด้วยกัน</p> <h2>การตั้งค่าปลั๊กอิน Calibre</h2> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-E39B.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Calibre มีคุณลักษณะน่ากลัวที่เรียกว่าปลั๊กอิน ปลั๊กอินมีอยู่โดยเฉพาะเพื่อให้คุณสามารถแก้ไขข้อมูลเมตาในระหว่างการดำเนินการส่งต่ออุปกรณ์และบันทึกลงดิสก์ได้ทันที ขอบคุณความมหัศจรรย์ของปลั๊กอินคุณไม่จำเป็นต้องทำสิ่งที่น่ารำคาญและใช้เวลานานเช่นการแก้ไขชื่อหนังสือเพื่อใส่ชื่อชุด / หมายเลขหรือแก้ไขปัญหาเกี่ยวกับการจัดรูปแบบและการสั่งซื้อบนอุปกรณ์ ebook ต่างๆ</p> <p>ปัจจุบันชุด MysteryHouse ของเราประกอบด้วยหนังสือ 6 เล่ม:</p> <ul> <li><em>บ้านลึกลับ</em></li> <li><em>พระราชวังลึกลับ</em></li> <li><em>แมนชั่นลึกลับ</em></li> <li><em>บังกะโลลึกลับ</em></li> <li><em>ความลึกลับยุคกลางสมัยใหม่</em></li> </ul> <p>ถ้าเราจะถ่ายโอนไปยัง Kindle ของเราจะไม่มีข้อบ่งชี้ว่าหนังสือเล่มไหนมาก่อนหรือเป็นชุดสุดท้าย ปลั๊กอินที่เรียบง่ายสามารถแก้ปัญหาดังกล่าวได้เนื่องจากเป็นหนังสือที่คัดลอกไปยังจุดแก้ไขชื่อ / เมทาดาทาเพื่อให้เราสามารถสรุปได้ว่าหนังสือเล่มใดเป็นหนังสือเล่มใด</p> <p>หากต้องการสร้างปลั๊กอินให้คลิกที่ <strong>ค่ากำหนด -> ปลั๊กอินข้อมูลเมตา</strong> (อยู่ในส่วนการนำเข้า / ส่งออก) คุณจะเห็นปลั๊กอินที่ว่างเปล่าเช่น:</p> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-D97E.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>ลำดับแรกของธุรกิจคือการเลือกรูปแบบและอุปกรณ์ ในขณะที่คุณสามารถใช้งานได้อย่างกว้าง ๆ ด้วย "รูปแบบใด ๆ " และ "อุปกรณ์ใด ๆ " ที่เลือกไว้คุณควรตั้งค่าปลั๊กอินเฉพาะสำหรับอุปกรณ์เฉพาะ เรากำลังจะตั้งค่าหนึ่งสำหรับจุด 3 (บัดนี้เป็นที่รู้จักในฐานะคีย์บอร์ด) สำหรับรูปแบบเราจะเลือก MOBI และสำหรับอุปกรณ์ที่เราจะเลือก Kindle2 (Kindle 2 และ Kindle 3 ใช้รูปแบบข้อมูลเมตาเดียวกัน)</p> <p>ภายใต้ <strong>เทมเพลตแหล่งที่มา</strong> คุณสามารถแทรกสตริงการตั้งชื่อที่คุณต้องการใช้สำหรับหนังสือ แม้ว่าคุณสามารถทำด้วยตัวเองโดยการอ่านรายการคู่มือ Calibre นี้เกี่ยวกับหัวข้อนี้เราจะช่วยให้คุณประหยัดปัญหาและแบ่งปันข้อมูลพื้นฐานบางอย่างที่นี่ ตัวอย่างของเราจะถูกจัดเรียงด้วยสตริงก่อนและตัวอย่างที่สองเอาต์พุต</p> <p>MysteryHouse # 01 – บ้านลึกลับ</p> <p>MysteryHouse – 01 – บ้านลึกลับ</p> <p>MysteryHouse [01] บ้านลึกลับ</p> <p>เมื่อคุณเลือกสตริงการตั้งชื่อที่คุณต้องการใช้แล้วให้วางโค้ดลงในช่องแม่แบบต้นทางแล้วเลือก "ชื่อ" ใน <strong>ฟิลด์ Destination</strong><em>.</em> เรากำลังใช้รายการที่สองในรายการสำหรับบทแนะนำนี้ คลิก <strong>บันทึกปลั๊กอิน</strong>. ปลั๊กอินจะปรากฏในกล่องปลั๊กอินที่มีอยู่เช่นนี้:</p> </p> <p>ขณะนี้เรามีการตั้งค่าปลั๊กอินแล้วถึงเวลาที่จะทดสอบ คลิก <strong>ใช้</strong> ที่มุมบนซ้ายเพื่อออกจากเมนูปลั๊กอินและใช้งานของคุณ ปิดหน้าจอการตั้งค่าและกลับไปที่เมนู Calibre หลัก</p> <p>ตรวจสอบว่าได้เสียบอุปกรณ์กับคอมพิวเตอร์ของคุณแล้วไฮไลต์หนังสือในชุดข้อมูลที่คุณต้องการส่งไปยังอุปกรณ์ของคุณ คลิกขวาและเลือก <strong>ส่งไปยังอุปกรณ์</strong>เลือกตัวเลือกจัดเก็บข้อมูลบนอุปกรณ์ที่คุณใช้ตามปกติในกรณีของเราคือ "หน่วยความจำหลัก"</p> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-B407.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>ที่ประสบความสำเร็จ! ไม่ต้องแปลกใจว่า <em>พระราชวังลึกลับ</em> แจ๋ว <em>แมนชั่นลึกลับ</em>! เมื่อใดก็ตามที่คุณเพิ่มอุปกรณ์อื่น ๆ ลงในเครื่อง Gizmos ที่มีเสถียรภาพคุณสามารถหวังกลับเข้ามาในเมนูปลั๊กอินและสร้างสคริปต์ของปลั๊กอินใหม่สำหรับอุปกรณ์ได้ คุณจะไม่เหลือพยายามจดจำสิ่งที่สั่งหนังสือของคุณไปอีกครั้ง</p> <p>มีเคล็ดลับขนาดเส้นผ่าศูนย์กลางหวานหรือเคล็ดลับสำหรับผู้อ่าน ebook เพื่อแชร์หรือไม่? ลองฟังเกี่ยวกับเรื่องนี้ในความคิดเห็น</p> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-D962A2F.png" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>제목만으로도 일련의 서적이 어떤 순서로 들어가는지 기억하기 위해 노력하는 것은 상당히 실망 스러울 수 있습니다. 읽기 불편 함이없는 독서를 위해 전자 책 리더로 전송할 때 도서 제목에 주석을 달고 정렬하는 방법을 보여줍니다.</p> <p>여기에 일반적인 상황이 있습니다. 일련의 서적을 전자 서적 독자에게 넘겨주었습니다. 독자가 읽은 후에는 서적을 구별하는 쉬운 방법이 없습니다. 그렇다 <em>신비한 목장</em> 전에 와라. <em>신비한 중반 – 세기 현대</em>? 일련 번호와 시리즈 번호를 제목에 포함시켜야하는 모든 시리즈 책의 이름을 바꿀 수있는 막대한 번거 로움을 겪을 수는 있지만 그렇게 할 필요는 없습니다. 인기있는 전자 책 관리 응용 프로그램 인 Calibre에서 매우 편리한 기능 덕분에 전자 책 리더에서 자동으로 이름이 바뀌었고 번호가 매겨진 책을 즐길 수있는 몇 분의 조정이 필요합니다.</p> <h2>내가 무엇이 필요 하나?</h2> <p>이 자습서에서는 eBook 독자와 무료 도구 만 필요합니다. 다음은 우리가 사용하는 것입니다.</p> <ul> <li>Calibre (무료 및 오픈 소스 전자 책 관리자).</li> <li>빛나다 (이 속임수는 Nooks와 다른 eBook 독자와도 작동합니다).</li> <li>전자 서적 시리즈.</li> </ul> <p>이전에 Calibre를 사용한 적이 없다면 Caliber로 전자 책 컬렉션을 정리하여 응용 프로그램에 익숙해지기위한 가이드를 확인하는 것이 좋습니다.</p> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-351B7.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>가장 중요한 것은 당신이 Calibre에서 책 시리즈를 가지고 있다는 것입니다. 이 튜토리얼의 목적을 위해 제작자가 작성한 일련의 전자 북 파일을 만들었습니다. 어떤 일이 발생하는지 알고 싶어하는 독자들에게 사과드립니다. <em>신비한 중반 – 세기 현대</em>.</p> <p>두 번째로 중요한 점은 Series 메타 데이터 태그를 사용하여 Calibre에서 시리즈의 라벨을 올바르게 지정했기 때문입니다. 이미 완료하지 않았다면이 튜토리얼에서 가장 많은 노동 집약적 인 (그리고 다행스럽게도 한 번) 부분이 될 것이라고 약속드립니다.</p> </p> <p>시리즈의 모든 책에 신속하게 태그를다는 쉬운 방법은 책을 강조 표시하고 강조 표시된 그룹을 마우스 오른쪽 버튼으로 클릭 한 다음 <strong>메타 데이터 개별 수정</strong>. 메타 데이터 편집 메뉴에서 시리즈 이름과 번호를 화면 상단에 입력 할 수 있습니다. 편집중인 시리즈에서 책의 순서를 알아내는 데 도움이 필요하면 도움이되는 웹 사이트 FictFact를 방문해보십시오. 저자의 이름과 책 시리즈별로 찾아 볼 수 있습니다.</p> <p>너는 너의 책을 가지고 있니? 올바른 시리즈와 번호로 태그를 지정 했습니까? 이제 모든 것을 하나로 묶을 때입니다.</p> <h2>Calibre 플러그 보드 설정하기</h2> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-9B4B.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>Calibre에는 Plugboard라고하는 멋진 기능이 있습니다. 플러그인 보드는 기기로 전송 및 디스크에 저장 작업 중 전자 책 메타 데이터를 편집 할 수 있도록 독점적으로 존재합니다. 플러그 보드의 마법 덕분에 시리즈 이름 / 번호를 삽입하거나 다양한 전자 책 장치의 형식 및 주문 문제를 해결하기 위해 책 제목을 직접 수정하는 등 짜증나고 시간이 많이 걸리는 작업을 수행 할 필요가 없습니다.</p> <p>현재 MysteryHouse 시리즈에는 6 권의 책이 있습니다.</p> <ul> <li><em>신비의 집</em></li> <li><em>신비한 궁전</em></li> <li><em>신비한 저택</em></li> <li><em>신비한 방갈로</em></li> <li><em>신비한 중반 – 세기 현대</em></li> </ul> <p>우리가 단순히 Kindle으로 옮길 수 있다면 시리즈의 첫 번째 또는 마지막에 어떤 책이 왔는지 알 수 없습니다. 간단한 플러그인 보드는 책이 Kindle에 복사 될 때 제목 / 메타 데이터를 편집하여 어느 책이 어느 것을 볼 수 있도록함으로써 문제를 해결할 수 있습니다.</p> <p>플러그인 보드를 만들려면을 클릭하십시오. <strong>환경 설정 -> 메타 데이터 플러그인</strong> (가져 오기 / 내보내기 섹션에 있음). 다음과 같이 빈 플러그 보드가 제공됩니다.</p> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-02CE.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>비즈니스의 첫 번째 순서는 형식과 장치를 선택하는 것입니다. '모든 형식'과 '모든 기기'를 선택하여 활발하게 운영 할 수는 있지만 특정 기기에 맞는 특정 플러그인 보드를 설정하는 것이 현명합니다. 우리는 Kindle 3 (현재는 Kindle Keyboard로 알려짐)를 설치하려고합니다. 형식은 MOBI를 선택하고 장치는 Kindle2를 선택합니다 (Kindle 2와 Kindle 3은 동일한 메타 데이터 형식을 사용함).</p> <p>아래의 <strong>소스 템플릿</strong> 책에 사용할 이름 지정 문자열을 삽입합니다. 주제에 관한이 Calibre 매뉴얼을 읽으면 스스로 해결할 수 있지만 문제를 해결하고 몇 가지 기본 사항을 공유합니다. 우리의 예제는 문자열을 먼저 배열하고 예제 출력을 두 번째로 배열합니다.</p> <p>미스터리 하우스 # 01 – 신비의 집</p> <p>미스테리 하우스 – 01 – The Mysterious House</p> <p>미스터리 하우스 [01] 신비의 집</p> <p>사용하려는 이름 지정 문자열을 선택했으면 코드를 소스 템플릿 슬롯에 붙여 넣은 다음 소스 템플릿 슬롯에서 '제목'을 선택하십시오. <strong>목적지 필드</strong><em>.</em> 이 자습서에서는 두 번째 목록을 사용하고 있습니다. 딸깍 하는 소리 <strong>플러그인 보드 저장</strong>. 플러그인 보드는 기존 플러 거 보드 상자에 다음과 같이 표시됩니다.</p> </p> <p>나중에 플러그인 보드를 조정해야하는 경우 해당 플러그인 보드를 선택하기 만하면 해당 플러그인 보드의 변수가 자동으로 메뉴에로드되어 편집됩니다.</p> <p>이제 플러그 보드를 설정 했으므로 테스트해볼 시간입니다. 딸깍 하는 소리 <strong>대다</strong> 왼쪽 상단 모서리에있는 메뉴를 종료하고 작업을 적용합니다. 환경 설정 화면을 닫고 기본 Calibre 메뉴로 돌아갑니다.</p> <p>기기가 컴퓨터에 연결되어 있는지 확인한 다음 기기로 보내려는 시리즈의 서적을 강조 표시합니다. 마우스 오른쪽 버튼으로 클릭하고 선택하십시오. <strong>기기로 보내기</strong>– 일반적으로 사용하는 장치의 저장소 옵션을 선택하십시오 (이 경우 "주 메모리").</p> <p>장치를 분리하고 전원을 켭니다. 모든 것이 계획대로 진행되면 책 시리즈가 깔끔하게 이름이 정해져 있고 그렇게 구성되어 있어야합니다.</p> <p><img src="/wp-content/uploads/2022/05/calibre--ebook-B8F3.jpg" alt="How to use calibre to correctly order your ebook series" title="How to use calibre to correctly order your ebook series" class=""/></p> <p>성공! 더 이상 궁금해하지 <em>신비한 궁전</em> 선행하다 <em>신비한 저택</em>! 기즈모에 안정적인 장치를 추가 할 때마다 언제든지 플러그 인 메뉴로 돌아가서 장치에 대한 새로운 플러그 보드 스크립트를 만들 수 있습니다. 책을 다시 주문하는 순서를 기억하려고하지 마십시오.</p> </div><!-- .entry-content --> <footer class="entry-meta"> This entry was posted in <a href="https://huckfinnsmoneytree.com/psy/" rel="category tag">Psy</a> on <a href="https://huckfinnsmoneytree.com/how-to-use-calibre-to-correctly-order-your-ebook-series/" title="1:37 pm" rel="bookmark"><time class="entry-date" datetime="2022-05-14T13:37:00+00:00">May 14, 2022</time></a><span class="by-author"> by <span class="author vcard"><a class="url fn n" href="https://huckfinnsmoneytree.com/author/howhack/" title="View all posts by Howhack" rel="author">Howhack</a></span></span>. </footer><!-- .entry-meta --> </article><!-- #post --> <nav id="nav-below" class="navigation" role="navigation"> <h3 class="assistive-text">Post navigation</h3> <div class="nav-previous"><a href="https://huckfinnsmoneytree.com/psy/page/2/" ><span class="meta-nav">←</span> Older posts</a></div> <div class="nav-next"></div> </nav><!-- .navigation --> </div><!-- #content --> </section><!-- #primary --> <div id="secondary" class="widget-area" role="complementary"> <aside id="search-2" class="widget widget_search"><form role="search" method="get" id="searchform" class="searchform" action="https://huckfinnsmoneytree.com/"> <div> <label class="screen-reader-text" for="s">Search for:</label> <input type="text" value="" name="s" id="s" /> <input type="submit" id="searchsubmit" value="Search" /> </div> </form></aside><aside id="categories-2" class="widget widget_categories"><h3 class="widget-title">Categories</h3> <ul> <li class="cat-item cat-item-7"><a href="https://huckfinnsmoneytree.com/economy/">Economy</a> </li> <li class="cat-item cat-item-6"><a href="https://huckfinnsmoneytree.com/house/">House</a> </li> <li class="cat-item cat-item-2"><a href="https://huckfinnsmoneytree.com/interesting/">Interesting</a> </li> <li class="cat-item cat-item-5"><a href="https://huckfinnsmoneytree.com/interior/">Interior</a> </li> <li class="cat-item cat-item-10"><a href="https://huckfinnsmoneytree.com/pets/">Pets</a> </li> <li class="cat-item cat-item-4 current-cat"><a aria-current="page" href="https://huckfinnsmoneytree.com/psy/">Psy</a> </li> <li class="cat-item cat-item-3"><a href="https://huckfinnsmoneytree.com/technologies/">Technologies</a> </li> </ul> </aside> <aside id="recent-posts-2" class="widget widget_recent_entries"> <h3 class="widget-title">Recent Posts</h3> <ul> <li> <a href="https://huckfinnsmoneytree.com/do-cats-smell-pregnancy/">Do cats smell pregnancy</a> </li> <li> <a href="https://huckfinnsmoneytree.com/why-do-cats-swat-at-you/">Why do cats swat at you</a> </li> <li> <a href="https://huckfinnsmoneytree.com/how-often-should-i-bathe-my-cat/">How often should i bathe my cat</a> </li> <li> <a href="https://huckfinnsmoneytree.com/is-cat-saliva-clean/">Is cat saliva clean</a> </li> <li> <a href="https://huckfinnsmoneytree.com/are-cats-tongues-clean/">Are cats tongues clean</a> </li> </ul> </aside> </div><!-- #secondary --> </div><!-- #main .wrapper --> <footer id="colophon" role="contentinfo"> <div class="site-info"> <a class="privacy-policy-link" href="https://huckfinnsmoneytree.com/how-to-be-humble-without-putting-yourself-down/">How to be humble without putting yourself down</a><span role="separator" aria-hidden="true"></span> <a href="https://wordpress.org/" class="imprint" title="Semantic Personal Publishing Platform"> Proudly powered by WordPress </a> </div><!-- .site-info --> </footer><!-- #colophon --> </div><!-- #page --> <script type='text/javascript' src='https://huckfinnsmoneytree.com/wp-content/themes/twentytwelve/js/navigation.js?ver=20141205' id='twentytwelve-navigation-js'></script> </body> </html> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script>