How to Change Country or Region Home Location in Windows 10

The country or region home location in Windows, referred to as geographic location (GeoID), indicates the country or region that you are in. Some software, including Windows, may provide you with additional content for a particular location. Some services provide you with local information such as news and weather.

If you move or go to a different country or region, you may want to change your home location (GeoID). You can switch back to your original country or region at any time.

This tutorial will show you different ways on how to change the country or region home location for your account in Windows 10.

Read more…

A quick look at Xbox Wireless

Right now, when you want to play Xbox games on your PC you have a few options: mouse/keyboard, Xbox controller using a cord, a wireless dongle or using Bluetooth (in the case of the most recent version of the controller). Bluetooth is more ideal, for controllers, because you don’t have to have a doohickey sticking out of your machine. Yet, Xbox is now moving forward with Xbox Wireless. What this means is that you’re able to connect your Xbox controller to a PC that has Xbox connectivity built right into it.

The newly announced Surface Studio is such a device. While designed, primarily, for creation (think artists, musicians, etc) the specs in the Studio make it ideal for gaming. In fact, Xbox Wireless is built into the base. When you’re ready to game, simply connect your controller and let the ‘pew, pew!” fly.

Here’s some other key benefits of Xbox Wireless:

  • Gamers can connect up to eight (8) devices at the same time.
  • Includes the ability to hear wireless stereo sound through the headsets.
  • Support for accessories from companies like Astro, Turtle Beach, and others.
  • Currently supports Xbox controllers, Xbox One consoles, Xbox wireless adapter.

For more details on Xbox Wireless, check out their page.

Importing users into Active Directory

When you need to create a single user in Active Directory Domain Services (AD DS), the tendency is to just “do it” in the GUI – either Active Directory Users and Computers (ADUC) or Active Directory Administrative Center (ADAC). But if you’ve got 25 users to add, or even 5 users to add, that’s just painful. Plus, having this scripted ensures that each user is correctly entered following the same format.

For me, the easiest way to do this is by putting the users in a spreadsheet and then leveraging PowerShell’s Import-CSV command. So, for the sake of argument, let’s assume I have 8 new users to add to my domain. I open Excel, and create a spreadsheet with the following information for each user: Name, Given Name, Surname, Display Name, SamAccountName, and Description. The spreadsheet would look like this:blog_01

We’ll save that as “TreyUsers.csv”, and ignore any warnings about formatting, etc. This gives us a file with:

David Guy,David,Guy,Dave R. Guy,Dave,Customer Appreciation Manager
Alfredo Fettucine,Alfredo,Fettuccine,Alfie NoNose,Alfie,Shop Foreman
Stanley Behr,Stanley,Behr,Stanley T. Behr, Stanley,Webmaster
Priscilla Catz,Priscilla,Catz,Dame Priscilla,Priscilla,Shop Steward
Harold Catz,Harold,Catz,Harold S. Catz,Harold,Engineering Manager
William Wallace,William,Wallace,Sir William Wallace,Wally,Marketing Manager
Trey Barksdale,Trey,Barksdale,Lord Barksalot,Trey,Sales Manager
Charlie Derby,Charles,Derby,Sparky,Sparky,Chief Security Officer

Now, we use PowerShell’s Import-CSV to import this set of users into a variable $TreyUsers.

$TreyUsers = Import-CSV TreyUsers.csv

To create the users, we’ll use a simple ForEach loop:

ForEach ($user in $TreyUsers ) {
   New-AdUser -DisplayName $User.DisplayName `
              -Description $user.Description `
              -GivenName $user.GivenName `
              -Name $User.Name `
              -SurName $User.SurName `
              -SAMAccountName $User.SAMAccountName `
              -Enabled $True `
              -ChangePasswordAtLogon $True `
              -PasswordNeverExpires $False `
              -UserPrincipalName $user.SAMAccountName `
              -AccountPassword (ConvertTo-SecureString `
                   -AsPlainText `
                   -Force `
                   -String "P@ssw0rd!" ) 2>$NULL

(If you find that plain text password a bit problematic, use a Read-Line -AsSecureString early in the script to prompt you for an initial password. )

Finally, if you want to copy the security groups of an existing template user, stay tuned — I’ll cover that shortly

Adobe Security – Critical OOB security release OCT 2016

An out-of-band security release for Adobe Flash player security has just been released and Microsoft also has quickly updated where needed as well

Adobe today released a critical update for Flash Player. The update was released outside of Adobe’s regular patch cycle.  The singled vulnerability fixed by this update, CVE-2016-7855, has already been exploited in targeted attacks against Windows.  Windows, Linux and Mac versions are affected, including versions embedded in Chrome and Edge/Internet Explorer 11. Please expedite this update, and review that Flash does not start automatically in your browser but only if enabled by the user for a specific site. Consider removing Flash whenever possible.

Microsoft Security Bulletin MS16-128 – Critical:

Leadership – The five levels of Development

John Maxwell shares an excellent article on the five levels of Leadership Development

Level 1 — Position — The lowest level of leadership—the entry level, if you will—is Position. It’s the only level that requires no ability or effort to achieve. At Level 1, people only follow if they believe that they have to.

Level 2 — Permission — Level 2 is based on relationship. At this level, people choose to follow because they want to. When you like people and treat them as individuals who have value, you begin to develop positive influence with them. Trust grows, which usually leads to respect.

Level 3 — Production — The best leaders know how to motivate their people to get things done! On this level, leaders who produce results build their influence and credibility.

Level 4 — People Development — Level 4 can be summed up in one word: reproduction. Your goal at this level is to identify and develop as many leaders as you can by investing in them and helping them grow.  The reason is simple: When there are more leaders, more of the organization’s mission can be accomplished.

Level 5 — Pinnacle — The highest level of leadership is also the most challenging to attain. It requires longevity as well as intentionality. You simply can’t reach Level 5 unless you are willing to invest your life into the lives of others for the long haul. But if you stick with it, if you continually focus on both growing yourself at every level, and developing leaders who are willing and able to develop other leaders, you may find yourself at the Pinnacle.

Temporary Post Used For Theme Detection (e5a57c59-336f-4b1e-82e9-9e57b69cd2dc – 3bfe001a-32de-4114-a6b4-4005b770f6d7)

This is a temporary post that was not deleted. Please delete this manually. (fa6a67ba-7158-4c47-9710-9e478d54259e – 3bfe001a-32de-4114-a6b4-4005b770f6d7)

WatchOS 3.1 update is now available for Apple Watch users

To install the update, you need to have your iPhone on WiFi (and power, preferably). Once it starts, don’t undock or turn off the iWatch.

WatchOS 3.1 update is now available for Apple Watch users

Critical Flash Player Update

Adobe has release a critical update to Flash Player. If you are still using it, you should update it ASAP. You also should  really check whether you need it installed or not. Users of IE 11 on Windows 10 have no choice since its cooked into IE.

Removal instructions for Adobe Flash TSS

What is Adobe Flash TSS?

The Malwarebytes research team has determined that Adobe Flash TSS is a Tech Support Scam. These so-called “Tech Support Scammers” try to trick you into calling their phone number for various reasons, all of which turn out to be fraudulent in the end.

How to Set Menus to Open Aligned to Left or Right in Windows 10

In Windows, you can change where menus appear on the screen by indicating which hand you write with.

If you set right-handed, then menus appear to the left of your hand.

If you set left-handed, then menus appear to the right of your hand.

This tutorial will show you how to have menus open aligned to the left or right by default for your account in Windows 10.

Read more…

Microsoft Creators Update – Coming changes for 2017

Microsoft announced highly innovative new graphical devices & 3-D software capabilities that will be forthcoming during 2017:

Microsoft wants artists and content creators to want its products. The company unveiled multiple creative-minded products at its keynote today, including a major Windows 10 upgrade called the “Creators Update” and a gorgeous PC called the Surface Studio. It has 80 custom parts in its arm alone! Most of today’s announcements were about advancing into the future, but Microsoft also stayed true to its roots with an update to Paint. We have all the highlights below.

1. Windows 10 Creators Update
2. 3D Paint
3. Windows VR headsets
4. Xbox live streaming
5. Windows People mode (new key contact approach)
6. Surface Studio (touchscreen all-in-one desktop computer – hi-res 28″ touch screen display)
7. Surface Dial (new input device for Surface)
8. Surface Book i7 (high-end version with Intel i7 microprocessor)

Transforme su hoja de cálculo de Excel en página web con Office 365 SharePoint Online

A lo largo de mi carrera como profesional en portales de colaboración he encontrado algunos usuarios expertos en Excel capaces de construir en un santiamén complejos análisis de datos o aplicaciones que realizan cálculos basados en el uso de fórmulas. En cuanto a SharePoint se refiere, si ven atractivo el hecho de que ahora pueden compartir su hoja de cálculo con otros y de alguna forma hacer accesible su hoja de Excel para que otros re utilicen su trabajo. Sin embargo sigue siendo el mismo modelo, seguimos usando a SharePoint como repositorio de datos, usuario tendría que descargar la hoja de cálculo y usarla.

He grabado un breve video donde explico el uso de parámetros en plantillas de Excel para poder exponer su hoja de cálculo en Office 365 SharePoint Online en una página web accesible a los empleados de su empresa y usar su hoja como si fuese una especie de aplicación. EL uso de parámetros en Excel permite exponer celdas de la hoja de cálculo como parámetros que cualquier usuario o aplicación puede usar para enviar datos a nuestra hoja de cálculo.

Espero este pequeña demostración le permita a usted potencializar aún más su experiencia y conocimiento de Excel.



Apple iOS 10 updated to 10.2

Looks like Apple has released an update to address a problem with images that can carry malware.

The most (and least) secure messaging apps

Somehow, this doesn’t surprise me.

SnapChat, Skype among worst messaging apps for not respecting users’ right to privacy

Release Notes for Flash Player 23 and AIR 23 – October 26, 2016

Welcome to the Flash Player and AIR 23 release notes!

October 26, 2016

In today’s release, we’ve updated Flash Player with important security updates.

Fixed Issues

Flash Player

  • Security Fixes

Removal instructions for Trojan.Agent.GenX.IPH

What is Trojan.Agent.GenX.IPH?

The Malwarebytes research team has determined that Trojan.Agent.GenX.IPH is a Trojan.Agent.

Spybot Search & Destroy Weekly Update – October 26, 2016

++ Ad.SunriseBrowse + Firseria
+ Clearsearch.Net + NavExcel Websearch
+ QuickBrowser
+ ++ + Win32.VB.ik
Total: 2622327 fingerprints in 833465 rules for 7728 products.

» ··· updates/

This example teaches you how to convert a text string to lower, upper or proper case in #Excel

How to Change the Default Font in Windows 10

Windows 10 uses the Segoe UI font as the default system font. This font is used for icons, menus, title bar text, File Explorer, and more.

If you would like to use a different font, then you are able to change this default font to any font you like.

This tutorial will show you how to change the default system font in Windows 10 for all users.

Read more…

Internet Cyber Security – Dyn attack harnessed IOT security exploits

A brand new way for hackers shutdown INTERNET emerged earlier in the week when a DYN a key internet hosting company suffered a massive DDoS attack.  They recovered quickly, as a new approach of manipulating a new evolving technology called IOT (Internet of things) was discovered

I also don’t want to get too far into this post without:

1.Acknowledging the tremendous efforts of Dyn’s operations and support teams in doing battle with what’s likely to be seen as an historic attack.

2.Acknowledging the tremendous support of Dyn’s customers, many of whom reached out to support our mitigation efforts even as they were impacted. Service to our customers is always our number one priority, and we appreciate their understanding as that commitment means Dyn is often the first responder of the internet.

3.Thanking our partners in the technology community, from the operations teams of the world’s top internet companies, to law enforcement and the standards community, to our competition and vendors, we’re humbled and grateful for the outpouring of support.

Attack Timeline — Starting at approximately 7:00 am ET, Dyn began experiencing a DDoS attack. While it’s not uncommon for Dyn’s Network Operations Center (NOC) team to mitigate DDoS attacks, it quickly became clear that this attack was different (more on that later). Approximately two hours later, the NOC team was able to mitigate the attack and restore service to customers. Unfortunately, during that time, internet users directed to Dyn servers on the East Coast of the US were unable to reach some of our customers’ sites, including some of the marquee brands of the internet. We should note that Dyn did not experience a system-wide outage at any time – for example, users accessing these sites on the West Coast would have been successful.

What we know — At this point we know this was a sophisticated, highly distributed attack involving 10s of millions of IP addresses. We are conducting a thorough root cause and forensic analysis, and will report what we know in a responsible fashion. The nature and source of the attack is under investigation, but it was a sophisticated attack across multiple attack vectors and internet locations. We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack.

Recent Comments