appcmd restore backup access is denied

You might be looking to find out the solution of the error “appcmd.exe restore backup” while restoring the IIS backup or settings. I had faced this similar issue on IIS 7.0.

To fix the issue, I’ve tried various approach like

Solution 1 (Doesn’t work for me)

Open command prompt in Admin mode.

Solution 2: (Doesn’t work for me)

  • attrib -r% windir% \ system32 \ inetsrv \ config \ schema \ schema.xml
  • attrib -r% windir% \ system32 \ inetsrv \ config \ schema \ rewrite_schema.xml
  • Change Permissions in DCOM

Solution 3: (Doesn’t work for me)

Then I tried to become the owner of the file. But for some reason, I was not able to do so.

  • “C: \ Windows \ System32 \ inetsrv \ History”
  • “C: \ Windows \ System32 \ inetsrv \ MetaBack”
  • “C: \ Windows \ System32 \ inetsrv \ config”

Solution 4: (Worked for me)

Then I tried the clean to do the clean re-installation of IIS and after that, this worked for me.

Please refer to this link for clean re-installation using this blog.

Hope you like it.


What is the difference between JWT and OAuth Authentication?

Comparing JWT and OAuth is like we are comparing apple and apple cart. JWT is an authentication protocol whereas OAuth is an authentication framework. It is possible to have an OAuth implementation that issues JWT as an authentication mechanism. Before getting into more details let’s first understand individually, what is JWT and OAuth.


What is OAuth?

OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. This means it is a strict protocol for the issuing and validating of signed access tokens by providing limited access to a web service. Just remember OAuth only works using HTTPS.

How OAuth works

Let’s assume a user has already signed into one website or service. The user then initiates a feature that needs to access another site or service. The following happens

  1. The first website connects to the second website on behalf of the user, using OAuth, providing the user’s verified identity like client id, secret key etc.
  2. The second site generates a one-time token and a one-time secret unique to the transaction and parties involved.
  3. The first site gives this token and secret to the initiating user’s client software.
  4. The client’s software presents the request token and secret to their authorization provider (which may or may not be the second site).
  5. If not already authenticated to the authorization provider, the client may be asked to authenticate. After authentication, the client is asked to approve the authorization transaction to the second website.
  6. The user approves a particular transaction type at the first website.
  7. The user is given an approved access token.
  8. The user gives the approved access token to the first website.
  9. The first website gives the access token to the second website as proof of authentication on behalf of the user.
  10. The second website lets the first website access their site on behalf of the user.

Continue reading “What is the difference between JWT and OAuth Authentication?”

Introduction to Visual Studio App Center

Hello Everyone, in this article, we are covering Visual Studio App Center services with complete guidelines of installation for Xamain iOS.

What is Visual Studio App Center?

Visual Studio App Center is the one-stop solution for all the different services like HockeyApp, Xamarin Test Cloud, Xamarin Insight, Azure Mobile Engagement, Azure App Service, Code Push etc, all of them seamlessly integrated to make the development and shipping of application much easier.

Platform Support:

  1. Android
  2. iOS
  3. UWP
  4. macOS (preview)

Framework Support:

  1.  JAVA
  2.  Objective C/ Swift
  3.  Xamarin
  4. React Native

Visual Studio App Center

Continue reading “Introduction to Visual Studio App Center”

Python Fundamentals Part 1


Hello Guys, this article is the first part of the Python fundamentals trilogy. Python is a big language, and a single course can’t possibly cover everything there is to know, this article will serve you well with solid foundation for becoming productive in python.



Firstly, what is so great about python? Why do you want to learn it?

Python is powerful meaning it is expressive and productive so you can create solutions quickly. Often you don’t need to write much code as python comes with a great standard library.

This makes python very popular across web development, scientific computing, cloud configuration, data science and education.

In Web Development

Python has taken a prominent position in web development providing the backend for high traffic sites including YouTube, Instagram, Reddit and Dropbox using python web frameworks such as Django, Flask, Pyramid.

In Cloud Computation

Python plays a huge role in cloud computation in deploying systems to cloud with python based tools such as Ansible for configuration management, Boto3 for Amazon Web Service and Microsoft Azure development kit for Python.

In Data Analytics

Python plays a vital role in data analysis using tools such as Pandas, Bokeh, TesnorFlow, Scikit learning.

With Python, you can build applications quickly, safely and efficiently. Python is also open source so you can know every aspect of it if you want.

What is Python?

Python is a programming language. Python is developed as an open source project and is free to download. It is strongly typed language in a sense that every object in a language has a definite type. Python is dynamically typed meaning that there is no type check on the code prior to running it. It uses duck typing where object suitability is only determined at runtime. Python is general purpose programming language and is not intended to use in any particular domain or environment.

Who is using Python?

Continue reading “Python Fundamentals Part 1”

What is Machine Learning?

Machine Learning

Hello everyone, this article will be a part of a series of articles on Machine Learning. In this
series, we will take you from the basics of Machine Learning and teach you a few of the famous
algorithms used in Machine Learning. This article will be a soft introduction for those of you
who are not at all familiar with this particular field. So let’s dive in.

What is Machine Learning?

There isn’t a well-accepted definition for Machine Learning but one definition for the term
given by Arthur Samuel in 1959 is “Field of study that gives computers to learn without
explicitly being programmed”. An example of such a task would be automatic spam detection.
Another well-known definition of Machine Learning is “A computer program is said to learn
from experience ‘E’ with respect to some task ‘T’ and some performance measure ‘P’, if its
performance on ‘T’, as measured by ‘P’, improves with experience ‘E’.”

Continue reading “What is Machine Learning?”

Automating tasks with Cron jobs

Hello, everyone we are back again and this time with a handy tutorial on how to schedule tasks with Cron jobs

What are Cron jobs?

Cron is utility software used for automating tasks on a server system.  “Cron” stands for chronological, jobs which are supposed to run at a particular time. So using a Cron job you could specify to run a script or a command at a specific time on a specific day, week and month.

Syntax to specify a Cron job:

To specify a Cron job, you have to specify the exact time at which you want the command to run. Here is the syntax you need to use to specify a job.

  1. The number of minutes after the hour (0 – 59)
  2. The hour in military time (0 – 23)
  3. The day of the month (1 – 31)
  4. The month (1 – 12)
  5. The day of the week (0 – 7)


The Asterisk (*) Symbol:

As can be seen in the image above each asterisk symbol is a field and has a meaning, like the first “asterisk” is for the time in minutes. If you don’t want to specify a value for a field you can leave the Asterisk symbol there (*).

Example: If you want to specify a job that needs to run every month, then leave * in the fourth position that is the month field.

Here are a few examples with description to specify a job:

  1. 00  16  *  *  5  date

        The “date” command will run at 4:00 PM in the afternoon every “Friday” of every “Month”

     2. 30  16  *  12  5  date

        The “date” command will run at 4:30 PM in the afternoon every “Friday” in December

     3. 00  16  10  12  *  date

        The “date” command will run at 4:00 PM in the afternoon on the 10th of December.

     4. 00  16  10  12  5  date

         The “date” command will run at 4:00 PM in the afternoon if the 10th day was a Friday in       December.

With that cleared out, we can move on to the next segment of the article.

Continue reading “Automating tasks with Cron jobs”

How to setup RAID 1 on LINUX Server

RAID 1 consists of an exact copy of a set of data on two or more disks; a classic RAID 1 mirrored pair contains two disks. This configuration offers no parity, striping, or spanning of disk space across multiple disks, since the data is mirrored on all disks belonging to the array, and the array can only be as big as the smallest member disk. This layout is useful when read performance or reliability is more important than write performance or the resulting data storage capacity.


How to setup RAID 1 on LINUX

This article contains steps which give you the glance about “How to setup RAID 1 on your Linux server”. Things you will need:

  • More than one hard disk installed on your system.
  • Basic knowledge of Linux filesystem in case you come across any errors.Raid 1

So here is the step by step guide to setup RAID 1 on your system/server:

  • First, check the hard disks attached to the system using the command fdisk –l.

Here is what the output should look like.


  • Create a RAID 1 partition:  Type mdadm –create /dev/md1 –level=1 –raid-devices=2 /dev/sdg /dev/sdh.

NOTE: replace “sdg” and “sdh” with the names of the hard disk on your server that you want to add in RAID.


Continue reading “How to setup RAID 1 on LINUX Server”

Linux – Change the password of any Ubuntu user account including root

Have you forgotten your administrator password or the password of any user account on your Linux installation?  Well, worry not, because we are going to show you how to change it without needing a live installation of Linux.

Things you will need:

  • Know your way around a Linux terminal.

You can change the password of any user account in these easy steps:

  1. Enter recovery mode: To enter recovery mode press and hold down the shift key as the computer starts to boot.
    This is what recovery mode looks like:Linux
  2. Select the one that says (recovery mode) from the list. 
  3. Now you will see a recovery menu on your screen, Scroll down that list and select the option that says “root”. 
  4. Now the filesystem is in read only state, you have to remount it to get write permissions, to do that type: mount –o rw, remount / 
  5. Now you can set any user’s password using this simple command: passwd USERNAME (replace USERNAME with the name of the account whose password you want to change) 
  6. After entering this command you will be asked to type and retype the password, once you have done that, your password will be changed.

That is all you need to do to change the password of any user account on your Linux installation.

Stay tuned for our next article…

WordPress Google AdSense Plugin has been deprecated

You might be wondering why your Google AdSense plugin has been deprecated. Google has officially deprecated their AdSense plugin for WordPress. It is no longer available for new publishers to sign up for.


On April 5, 2017, existing publishers will not be able to change their ad settings or ad units through the plugin. Then on May 3, 2017, Google will no longer provide support for the plugin.

Google said “We frequently review our products and features to ensure they’re providing maximum value to our users. After reviewing the AdSense Plugin for WordPress, we’ve decided that going forward we can better support WordPress publishers through new innovative features like our automatic ad formats and other upcoming initiatives.”

Continue reading “WordPress Google AdSense Plugin has been deprecated”

Getting Started with Entity Framework Core

In this article, you will learn about the new lightweight version of entity framework that is entity framework core. If you have entity framework experience, you may be aware that EF core has been written from scratch to achieve some new goals. Here you will learn about similarities and differences from EF 6.

So What is Entity Framework ?

Entity framework is the set of .net APIs for performing data access in your software  and entity framework  is official data access tooling  from Microsoft .

It originated from Microsoft research and  then it was adopted from team who was responsible for ADO.Net as the next generation of Microsoft’s data access technology .

EF has gone through number of major revolution with most of new capabilities being added on top of what was built into the .net framework.With EF6 ,Entity framework was moved to codeplex and became open source and since then it moved to github and remains quite active.

Entity framework fits into a category of data access technologies called Object Relational Mappers (ORM). ORMs are designed to reduce the friction between how data is structured in relational database and how you define your classes ,without ORM we have to transform lot of code to transform database results into instance of our classes inn our software .

An ORM allows us to express our queries using our classes and then ORM builds and executes relevant SQL for us,but Entity framework is different from any ORM you might be familiar with.

While a typical ORM infers that the classes and database tables are of  a similar structure,Entity framework has a mapping layer in between and gives us a lot more flexibility in to how to get from objects to table and from object properties to table columns and for these mapping entity framework does start with some assumptions and we refer to those as  conventions but then you can apply additional mappings rules on top of conventions to be sure that in your specific scenario that the data is able to find its way back and forth between your objects and your database.


Why Entity Framework ??

EF Core Advantages

Continue reading “Getting Started with Entity Framework Core”