Enable Milk Music on CM12

I have a Samsung Galaxy S4, but I prefer to a rooted non-stock rom. I recently installed Resurrection Lollipop. This rom is based on CM12 and the Samsung Milk Music application will not install.

To get the application to install and run correctly you need to preform several steps.

  • Using ES File Explorer, edit your /system/build.prop file. Change to following lines:

ro.product.model=Galaxy S4

  • Install the Samsung Framework. Either download or copy the following files from the stock rom:


  • Using ES File Explorer, change the permissions on the above files to (rw-r-r)
  • Reboot your phone
  • Install the Samsung Account application
  • Install the Samsung Milk application from the Google Play Store (or side load)
Posted in Uncategorized | Leave a comment

How to permanently hide the tools bar in Adobe Acrobat Reader DC

Adobe has rebranded Adobe Acrobat Reader as adobe Acrobat Reader DC. The new version adds a toolbar that you can not permanently hide.


While you can temporally hide the toolbar by click on the arrow to close it, the next time you open Adobe Acrobat Reader DC, the bar will be back.

To permanently hide the toolbar:

  • Go to ” C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU”
  • Create a subfolder called “Disabled”
  • Move “AppCenter_R.aapp”, “Home.aapp”, and “Viewer.aapp” to the “Disabled” folder

Now when you open Adobe Acrobat Reader DC, there will be no toolbar.


Posted in Uncategorized | 1 Comment

Windows 8.1 Does Not Search Google Drive

Issue: When you use the Windows 8.1 search feature, you do not see results from documents in your Google Drive.

Cause: This is caused by the “System” object not having permissions to the Google Drive folder.

Solution: In Explorer, browse to your Google Drive folder. Be sure it is the actual Google Drive folder and not the shortcut in your Favorites. It defaults to “C:\Users\username\Google Drive”. Right-click and open the “Properties”, then click on the “Security” tab, then click on the “Advanced” button.


Click on the “Enable inheritance” button, make sure that “Replace all child object…” is checked, and click “OK”.


Verify that the “SYSTEM” user is now listed and click “OK”.

In a few minutes (once Windows indexes the location) you should start seeing results from Google Drive in your Windows Search.

Posted in Uncategorized | Leave a comment

Windows 8.1 “Couldn’t Mount File” error when mounting ISO

Issue: You receive an error “Couldn’t Mount File” when attempting to mount an ISO file in Microsoft Windows 8.1.


Cause: When you download an ISO file to an NTFS volume, Windows may set the “sparse” attribute on the file. A sparse file attempts to use file system space more efficiently by using metadata to represent empty blocks of data. The built-in ISO mounting feature of Windows 8.1 cannot mount a file if it is sparse.

Solution: One way to correct this issue is to simply make a copy of the ISO file. The copy will have the sparse attribute off.

You can also view or change the sparse attribute of a file. To view the current sparse setting of a file use:

fsutil sparse queryflag <filiename>

To change the current sparse setting of a file use:

fsutil sparse setflag <filename> 0|1


Posted in Uncategorized | Leave a comment

Outlook 2013, IMAP, and “You don’t have permission to create an entry in this folder” error


Using an IMAP email account with Outlook 2013 and no email are displaying in the main “Inbox” fold. If you try to create a new email in the “Inbox” folder you receive the error “You don’t have permission to create an entry in this folder”.


You may need to define a “Root folder path”. On the “Advanced” tab in your account settings, set the “Root folder path” to “Inbox”.


Posted in Uncategorized | 2 Comments

Smart Card (CAC) Authentication with IIS 8.5

In this example I will show you how to setup IIS to require smart card authentication using the DoD Root CA 2, but you can configure IIS to use any trusted root certificate authority.

For this example I am using Windows Server 2012 R2 (IIS 8.5), but these steps should also work for Windows Server 2008 R2 (IIS 7.5).

1. Install Root Certificates

The first step is to ensure you have the root certificates installed for the certificate authority you will authenticate against. For the DoD, we will install them using the “InstallRoot 4” application available at the IASE website: http://iase.disa.mil/pki-pke/.


After the application installs, run “InstallRoot” and click on “Install Certs”. Verify that the DoD certificates are installed and subscribed.


2. Configure the IIS Site for SSL

We now need to setup our website to use SSL. For this example, we will create a “self-signed” certificate. In IIS Manager, click on your server and choose “Server Certificates”.


Choose “Create Self-Signed Certificate” for the list on the right. Give your certificate a name and choose “Web Hosting” for the certificate store.


Next we need to bind the certificate to the website. Browse to your website and choose “Bindings”. Select “https” for the “Type” and choose the certificate we created earlier in the “SSL certificate” box.


Now choose “SSL Settings”


Check “Require SSL” and choose “Require” under “Client certificates”.


Now when we browse to our website we are prompted for our smart card. Select your certificate and enter your pin and the website now loads.


3. Certificate Trust List

At this point, we verified that our website is able to authenticate using our smart card, but there is a problem. Windows will authenticate any smart card that has a certificate issued by any certificate authority in the servers “Trusted Root Certificate Authority”. In order to limit which certificate authority can authenticate, we need to create a certificate trust list.

To create the Certificate Trust List (CTL) we will use the Microsoft MakeCTL.exe tool. Run this tool on the server “As Administrator” to start the CTL Wizard.


Enter a name for your CTL in the “prefix” box. Click the “Add Purpose” button and enter for the “Object ID”.

Click “Add from Store” and choose the root certificate authority that you will use for authentication.


Click “Browse” on “Select Certificate Store” and make sure to check the “Show physical stores” box. Choose “Local Computer” under “Intermediate Certificate Authorities”.


Complete the wizard. Use the same name (prefix) you used in the beginning for the the “Friendly name”.


Now we need to associate the CTL with our website. Start an Administrative Command Prompt and type:

netsh http show sslcert

Note the IP Port, Certificate Hash, and Application ID. We also will need the friendly name of our CTL.


Now we delete the existing SSL binding:

“netsh http delete sslcert ipport=”


Now add the new binding with the CTL. Replace the ipport, certhash, appid, and sslctlidentifier with your unique configuration.

netsh http add sslcert ipport= certhash=e50a486ffd7b22431db143cfa24ffd61d9170890 appid={4dc3e181-e14b-4a21-b022-59fc669b0914} sslctlidentifier=”DoD CTL” sslctlstorename=CA

That’s it. Now the site should now only authenticate users who have certificates trusted by certificate authorities listed in the CTL.

Posted in Uncategorized | 5 Comments

My new Samsung Galaxy S4


Purchased a new Samsung Galaxy S4. Its a nice device and my first smartphone. I was not a big fan of the Touch wiz interface and opted to install Apex.

Next step is to root the phone and perhaps a custom ROM. I have to consider how I will use the phone, tablet, and laptop and share data between devices.

Posted in Uncategorized | Leave a comment