How to reverse the F-Keys of Logitech K380 Keyboard

I have been using my Logitech K380 Keyboard for about a week now and I’m very happy with it.

I like it because it is quiet, has some weight, and can connect and switch to 3 devices with a press of the button.

When I received it when I press the F-keys, its default behavior is to use alternate functions like control the volume and media.

If I wanted to use F1 or F2 I have to click on the fn key then press the F-key. As someone who uses a lot of the F-keys due to my work, this is annoying.

Luckily, I was able to solve this issue by reversing the behavior of the F-keys. Now when I press the F11 to full screen my chrome browser it will work without pressing the fn key.

I think some people call this process Fn Lock

Follow the instructions below to reverse the behavior of the F-keys.

Continue reading How to reverse the F-Keys of Logitech K380 Keyboard

EC2 with IAM Role: CloudFormation Sample Template

Creating an EC2 Instance with an IAM Role is easy when you do it via the AWS Console but doing this with CloudFormation is not as direct. You will need an Instance Profile to connect an EC2 with an IAM Role.

TL;DR: See the CloudFormation Template below.

Continue reading EC2 with IAM Role: CloudFormation Sample Template

How to get the ARN of an S3 Bucket

Each resource in AWS has an Amazon Resource Name (ARN). An ARN is a unique identifier of your resource. Its value has no duplicate in other accounts and only exists in your account.

It’s used especially in IAM policies where you set which resources you will allow access to.

You can actually predict the ARN of an S3 Bucket since it has a standard format of arn:aws:s3:::S3_BUCKET_NAME.

But if you are like me who is afraid of making a mistake typing the S3 bucket ARN, I prefer going to the AWS Console, searching for the S3 Bucket ARN, and copy-pasting it.

Follow the instructions below to get the S3 Bucket ARN.

Continue reading How to get the ARN of an S3 Bucket

How to install WSL on multiple Windows User Accounts

If you are using multiple user accounts in your Windows computer and have installed Windows Subsystem for Linux (WSL) in one of your users, when you try to run WSL in another account you will encounter the WSL has no installed distributions error.

If you try going to another Windows profile, you will end up with the same error.

Continue reading How to install WSL on multiple Windows User Accounts

Minimum IAM Permission to create S3 presigned URLs

If you wanted to publicly share a file or an object inside a private S3 bucket you will need to create an S3 presigned URL. This will create a temporary link to the S3 file which you can share and access publicly.

As best practice, we must apply the least privileged permission to the IAM user or IAM role that will create the S3 presigned URL. Which brings us to the question, what is the minimum IAM permission to create an S3 presigned URL?

Continue reading Minimum IAM Permission to create S3 presigned URLs

How to download all files in an S3 Bucket using AWS CLI

There are many ways to download files from an S3 Bucket, but if you are downloading an entire S3 Bucket then I would recommend using AWS CLI and running the command aws s3 sync s3://SOURCE_BUCKET LOCAL_DESTINATION.

In the examples below, I’m going to download the contents of my S3 Bucket named radishlogic-bucket.

My S3 Bucket in the AWS Console
My S3 Bucket in the AWS management console


Example 1: Download S3 Bucket to Current Local Folder

If you want to download the whole S3 Bucket in the same folder that you are in, then you should use the command aws s3 sync s3://SOURCE_BUCKET ..

In our example S3 Bucket above, the AWS CLI will be like this.

Continue reading How to download all files in an S3 Bucket using AWS CLI

How to Disable Internet Explorer Enhanced Security Configuration in Windows Server

If you have launched a new Windows Server 2016, 2019, or 2022 and opened Internet Explorer it will automatically open a page saying Internet Explorer Enhanced Security Configuration is enabled.

When you open a website, it will then prompt you that the content that you are accessing is being blocked by Internet Explorer Enhanced Security Configuration.

Windows recommends adding this to a list called Trusted sites zone, but adding all the many websites that you are accessing is tedious.

The solution to this is to disable the Internet Explorer Enhanced Security Configuration. Follow the tutorial below on how to disable it.

Continue reading How to Disable Internet Explorer Enhanced Security Configuration in Windows Server

How to create IAM User Access Keys via AWS CLI

To create programmatic Access Keys for an AWS IAM User using AWS CLI, run the command aws iam create-access-key.

On the command below change MyUser with the username of your target IAM User.

aws iam create-access-key --user-name MyUser

This will return the following JSON formatted string.

Continue reading How to create IAM User Access Keys via AWS CLI

How to create IAM User Access Keys using AWS Console

If you want to be able to control your AWS resources on your local computer you will either use AWS CLI or AWS SDK. To use those tools, you will need to have an Access Key ID and a Secret Access Key.

In this post, we will show you how you can generate your own Access Keys so you can programmatically access your AWS resources.

For the instructions later the target username that I want to create Access Keys is rabano. Yours will be different.

Continue reading How to create IAM User Access Keys using AWS Console