Can’t see network computers after upgrading to latest Windows 10

Homegroup removed! How to get network sharing work with Windows 10 update v1803.

Here is short description how I get my network sharing work with Windows 10 v1803.

1.)All PC’s: Check network profile and network discovery and share settings


Sometimes this selection to change between Private and Public network profile is missing from Settings / Networks page. In that case profile must be changed by PowerShell. Right Click Windows Icon (Start button) and open PowerShell (Admin) and use following commands to get interface index number and change profile to Private (or Public):

Set-NetConnectionProfile -InterfaceIndex <index number> -NetworkCategory Private


1.2 )All PC’s: Check Network Discovery and Share settings


1.3)All PC’s: Set Start type to Automatic and start following services that allow PC’s to be visible on Network. (Reboot required!)

Push Win Key and type “Services” and locate these services:

  •    Function Discovery Provider Host
  •    Function Discovery Resource Publication
  •    SSDP Discovery
  •    UPnP Device Host


2.) All PC’s: Setting shares.

2.1.) Check your current shares.

Open file explorer and type \\localhost to address bar to see what shares are made in this computer.


2.2. ) Create new share. This way you can share any folder you like.

(Setting “Turn on sharing so anyone …” in Step 1.2.  make this share for C:\Users automatic.)


Folder is now shared and Network share path is: \\PCNAME\FolderToShare

2.3.) Security settings.

Right click “FolderToShare” and:

  • Open Properties
  • Select Security tab and click Edit
  • On Permission dialog click Add
  • New dialog open and you can add “User” (3 options)
  • Everyone (Access allowed all users even if they don’t have account on that PC. (Very unsafe setting! Think carefully do you need to select this!)
  • Authenticated Users (Access allowed all users who have account on that PC)
  • “User Name” (Access allowed only that user)
  • When back to Permissions dialog select which rights you want to give other users.
  • This same work for any folder you create and want to share your home network.



Now anyone on your home network should have access to shared folders without credentials or having user account on your computer.

3.) Now when click Network on File Explorer all your PC’s should be visible in Computer and Network sections.


This should be cover the essentials to sharing your data over local network. This share is not limited to C:\Users folder, every folder can be handled like shown in steps 2.

Now your PC’s should visible, but if you start getting error message “Windows cannot access \\PC_NAME” you need to go continue to step 4.

4.) There is some bug on Windows 10 1803 and because of that PC’s can’t always connect to each other by Name.

If you get error “\\PCNAME path not found” you can solve this by adding your PC’s and IP addresses to hosts file.

Instead of using \\PC_NAME\Folder use \\IP_OF_PC\Folder which will also help and you won’t need to add ip addresses to host file.

4.1) New routers (or modems) may have feature to remember which IP-addresses are assign to each device, but with older routers (or modems) you have to check that your router or modem is set give predefined IP-addresses linked to each PC’s MAC-address.

This way PC’s will get same IP-address every time when it ask IP-address form router (or modem) DHCP-server.

There should be some kind of list of PC names with MAC addresses and given IP-addresses of each connected PC.

Picture show that list on my router. In my case with old router I had to select manual assignment  in each line.


4.2.) Add all PC’s IP-addresses and Names to C:\Windows\System32\drivers\etc\hosts file.

You can check your IP-address and PC’s name by opening command prompt (CMD)

For IP-address type command: ipconfig you get line like this: IPv4 Address ……….

For PC name type command:  hostname

Take down IP-address and Names of each PC and add those to that hosts file.

To edit copy hosts file to some another location, right click it and use notepad to edit and save it. Replace original file with edited file. Because hosts file is located on system folder replace will ask administrators rights to perform it.

# localhost name resolution is handled within DNS itself.
#             localhost
# ::1                   localhost  PC1   # Ethernet  PC2   # Ethernet  PC2   # Wi-Fi

Cake, Bake is not recognized as an internal or external command

I wanted to start using CakePHP framework but I’ve encountered an error when trying to bake something:

'cake' or 'bake' is not recognized as an internal or external command

So I was wondering how to fix it. When I searched over the internet I found a lot of articles which weren’t helpful at all. That’s why I want to share a quick fix for everyone.

Here is the fix:

  1. Right click on My Computer
  2. Select Properties
  3. Go to Advance system settings
  4. Click on Environment Variables
  5. Go to System variables
  6. Select PATH and edit or add this:

After this restart your PC and you will see that now it’s working.

Also I’ve notice that some have written the command as bin\cake bake … but for me it’s working as cake bake … without bin\. For a notice I’m using Windows 10 Pro.

Hopefully it will spare you some time fixing it and if you like it shares are welcome!

Beta Tester for HIRE


I’m happy to announce that i’m available for beta testing.

It doesn’t matter if you are a web , game or app developer I can cover your back.

I can give you a honest review and report of your product. All my progress can be tracked true my CRM system, where you can see what I’m doing at the moment.

My pros:

  • honest review and report
  • bug search
  • tips
  • simple tracking of my doing

My rates:

  • Hourly Rate: 9.40$
  • Hourly Tips: 1.25$
  • Overtime: 10$

The rates can be communicated depending on your project requirements.

If you think I’m the right person please don’t hesistate to contact me.


Trouble solver


do you need any extra help with your project ?

You run into the next troubles:

  • installation issues
  • running issues
  • security issues

I’m here to help you out! I will try to fix the issue as soon as possible but before I will do my work I will need some details such as:

  • admin credentials
  • a review of the issue
  • registration to my CRM system

After all details are collected and reviewed I will start working on the issue itself. The time needed to finish an issue really depends and it can’t be provided in before.

Please don’t hesistate on Contacting Me

Would recommend SiteGround Hosting

I’ve been managing the SiteGround account for many months now and I haven’t encountered any major issues yet. My site is loading fast and is always up. One thing worth noting about their service is that they have a built-in caching system called SuperCacher. Users who don’t want to tinker with caching options or plugins could activate SuperCacher with a few clicks and this will give their site a decent speed boost.

Also their support is insane! Twice I’ve had server issues, because some of my scripts. The scripts weren’t working at all and I couldn’t figured it out. So I’ve asked the SG support team and they’ve told me the solution for both errors.

I would really prefer and recommend SiteGround as your hosting provider, because you really get what you pay for!

SiteGround is a definitely a decent host. You can be sure your sites will be up most of the time and their support team is friendly.

Sign up below

Web Hosting

Best Operating System For Ethical Hacking And Penetration Testing

Kali Linux

Developed by Offensive Security as the rewrite of BackTrack, Kali Linux distro tops our list of the best operating systems for hacking purposes. This Debian-based OS comes with 600+ preinstalled pen testing tools that make your security toolbox richer. These versatile tools are updated regularly and are available for different platforms like ARM and VMware. For a forensic job, this top hacking operating system comes with a live boot capability that provides a perfect environment for vulnerability detection. Now Kali Linux is based on a rolling release model.

Download Kali Linux


In the next article I will explain how to make a Kali Linux Bootable USB, that you will have your Kali everywhere with yourself.

Let’s see what Kali is:

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company.

Kali Linux was released on the 13th March, 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards.

  • More than 600 penetration testing tools included: After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar functionality. Details on what’s included are on the Kali Tools site.
  • Free (as in beer) and always will be: Kali Linux, like BackTrack, is completely free of charge and always will be. You will never, ever have to pay for Kali Linux.
  • Open source Git tree: We are committed to the open source development model and our development tree is available for all to see. All of the source code which goes into Kali Linux is available for anyone who wants to tweak or rebuild packages to suit their specific needs.
  • FHS compliant: Kali adheres to the Filesystem Hierarchy Standard, allowing Linux users to easily locate binaries, support files, libraries, etc.
  • Wide-ranging wireless device support: A regular sticking point with Linux distributions has been supported for wireless interfaces. We have built Kali Linux to support as many wireless devices as we possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with numerous USB and other wireless devices.
  • Custom kernel, patched for injection: As penetration testers, the development team often needs to do wireless assessments, so our kernel has the latest injection patches included.
  • Developed in a secure environment: The Kali Linux team is made up of a small group of individuals who are the only ones trusted to commit packages and interact with the repositories, all of which is done using multiple secure protocols.
  • GPG signed packages and repositories: Every package in Kali Linux is signed by each individual developer who built and committed it, and the repositories subsequently sign the packages as well.
  • Multi-language support: Although penetration tools tend to be written in English, we have ensured that Kali includes true multilingual support, allowing more users to operate in their native language and locate the tools they need for the job.
  • Completely customizable: We thoroughly understand that not everyone will agree with our design decisions, so we have made it as easy as possible for our more adventurous users to customize Kali Linux to their liking, all the way down to the kernel.
  • ARMEL and ARMHF support: Since ARM-based single-board systems like the Raspberry Pi and BeagleBone Black, among others, are becoming more and more prevalent and inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, with fully working installations for both ARMEL and ARMHFsystems. Kali Linux is available on a wide range of ARM devices and has ARM repositories integrated with the mainline distribution so tools for ARM are updated in conjunction with the rest of the distribution.

Kali Linux is specifically tailored to the needs of penetration testing professionals, and therefore all documentation on this site assumes prior knowledge of, and familiarity with, the Linux operating system in general. Please see Should I Use Kali Linux? for more details on what makes Kali unique.

How to secure your Twitter account

Don’t waste time covering yourself after Twitter’s colossal screwup

Twitter just revealed that it made a monumental security blunder by exposing the passwords of users in plain text. The company says there’s been no indication of a security breach tied to the log that contained those login credentials, but let’s not kid ourselves. It’s 2018. You need to change your password — on Twitter and with any other account where you might’ve repeated that password — and secure your Twitter account immediately. The full scope of what happened here isn’t yet clear (or how many users were directly affected), but there’s no downside to taking immediate action.


On the web: Go to Twitter.comclick your profile image in the upper right, choose Settings and privacy and then when the next page loads, select Password in the list running down the left side. Twitter will ask for your existing password and then your new one. Use a strong, unique password. And never repeat them between multiple services, apps, and online accounts.

From the mobile app: Tap your profile photo at the upper left and choose Settings and privacy. Then Account, followed by Change password. Again, ensure that your new password is used exclusively for your Twitter account.


A password alone isn’t enough of a wall between you and people with tech smarts and bad intentions. Aside from changing your Twitter password, locking down your account to the fullest extent possible requires enabling the company’s login verification feature.

This two-factor authentication process can either send a code to your mobile phone number whenever a new device attempts signing into your account with the correct password. Or you can generate your own code within a third-party app made for that specific purpose — like Authy. The latter approach is safer since SMS itself can be compromised.

Turning on login verification from the web:

  • Click your profile icon, then click Settings and privacy.
  • Choose Account and then Set up login verification. On mobile, there’s an extra step here where you’ll have to tap on the Securitysection inside Settings and privacy.
  • Read the overview instructions, then click Start.
  • Enter your password and click Verify.
  • Click Send code to add your phone number if that’s the verification method you want.
  • Enter the verification code sent to your phone, hit Submit, and login verification will then be enabled.

Using a third-party app to generate secure login codes:

  • Click or tap your profile icon, then click Settings and privacy.
  • Choose the Account tab.
  • Under Security and next to Login verification, click the Review your login verification methods button to get started.
  • Enter your password and click Confirm.
  • Look for Mobile security app and you should see a Set up next to it.
  • Read the instructions and then hit Start.
  • Verify your password if asked to.
  • You’ll then be shown a QR code that you’ll scan with the app that will generate your Twitter login code. Once that’s done, you should see the app automatically generate a six-digit code. The code changes every 30 seconds.
  • Enter the currently active code in the Security code text field and click Done.


Some password managers, including 1Password, offer built-in code generators for two-factor authentication. Other apps meant specifically for two-factor codes include:

Authy (iOS / Android)

Google Authenticator (iOS / Android)

Microsoft Authenticator (iOS / Android)

LastPass Authenticator (iOS / Android)

The best gaming laptop – MSI GS65 Stealth – of 2018

Thin. Beautiful. Powerful.

CPU: Intel Core i7
Graphics: Nvidia GeForce GTX 1070 (8GB GDDR5X VRAM, Max-Q)
Screen: 15.6-inch FHD (1,920 x 1,080) anti-glare, wide-view 144Hz panel
Storage: 512GB M.2 SSD

Beautiful, subtle design

Excellent performance

Underside gets very hot

Hailing in Coffee Lake to the world of the best gaming laptops, the MSI GS65 packs a ton of power into a very unassuming package. Rocking an 8th-generation Intel Core i7-8750H CPU and an Nvidia GeForce GTX 1070 GPU, there’s nothing that can stand in the way of this laptop. And, what’s better, thanks to its subdued design, you’ll be able to bring this power out wherever you go without having to hide your nerdy pastimes.

Check the full informations: MSI GS65 Stealth 

I would say this is a really good but a little expensive gaming laptop. The prices are from 1.799$ to almost 3.000$ if you check Amazon. But still if you are a gaming nerd you will defenitly need this laptop. It really offers a lot. If you had a change to play on it you know what colour difference appear. I would really recommend you to buy this.

Setting Up a Permanent 301 Redirect in .htaccess

A permanent 301 redirect in your .htaccess file lets search engines and others know that an old link has been replaced by a new one. It’s the recommended method for directing traffic from an existing page.

Some common uses of a 301 .htaccess redirect:

You have the ability to setup redirects for a domain in your cPanel interface one link at a time. You can also add the redirects manually by modifying your .htaccess file directly.

Getting to your .htaccess file

On a Linux server you would use your .htaccess file to implement a 301 redirect for your pages.

Redirect individual files

To redirect individual files, like example.com/oldfile.htm to newfile.htm you can use a 301 redirect like this:

Redirect 301 /oldfile.htm /newfile.htm

To redirect one specific file to another domain such as example.com/oldfile.htm to example.net/newfile.htm:

Redirect 301 /oldfile.htm http://example.net/newfile.htm

Redirect an old domain to a new domain

If you had an old domain such as example.com, and now you decided you actually want to use example.net for the website. You could setup a 301 redirect for the entire domain, so that old links to example.com carry over.

Code in the example.com domain’s .htaccess file:

RewriteEngine on
RewriteCond %{HTTP_HOST} ^example.com [NC,OR]
RewriteCond %{HTTP_HOST} ^www.example.com [NC]
RewriteRule ^(.*)$ http://example.net/$1 [L,R=301,NC]

Force www. version of domain to be used

A search engine like Google would see example.com and www.example.com as essentially two separate websites. They recommend you pick one version you’d like search engines to display and using a 301 redirect is a possible option.

If you have a lot of links on the web where people are linking to your site as example.com, but you would like your visitors to instead end up at www.example.com you can force this version of your domain with these rules:

RewriteEngine on
RewriteCond %{HTTP_HOST} ^example.com [NC]
RewriteRule ^(.*)$ http://www.example.com/$1 [L,R=301,NC]

Force non www. version of domain to be used

If you have a lot of links on the web where people are linking to your site as www.example.com, but you would like your visitors to instead end up at example.com you can force this version of your domain with these rules:

RewriteEngine on
RewriteCond %{HTTP_HOST} ^www.example.com [NC]
RewriteRule ^(.*)$ http://example.com/$1 [L,R=301,NC]

Redirect all files with certain extension

To re-direct all of one type of file to another, such as example.com/file.php to example.com/file.htm

RewriteEngine On
RewriteCond %{REQUEST_URI} .php$
RewriteRule ^(.*).php$ /$1.htm [R=301,L]