List of msi-settings URI Shortcuts to Open Settings Pages in Windows 10

The Settings app is where you can change most settings at in Windows 10. Settings will eventually replace the Control Panel.

Almost every Settings page has its own URI (Uniform Resource Identifier) that allows you to open any Setting page directly from a command via the command prompt, Run (Win+R) dialog, address bar of File Explorer, address bar of web browser, and in scripts (ex: .bat). You can also use these commands to create shortcuts.

This tutorial will provide you with a list of ms-settings URI commands to directly open any Settings page in Windows 10.

Read more…

How to Choose Where Apps can be Installed from in Windows 10

Starting with Windows 10 build 15042, you can choose where apps can be installed from.

  • Allow apps from anywhere – Users will be able to install both desktop and Store apps without getting a message dialog.
  • Prefer apps from the Store, but allow apps from anywhere – Users will be able to install both desktop and Store apps. Users will get a “The app you’re installing isn’t from the Windows Store” message dialog when trying to install a desktop app to see if they want to visit the Store for more apps.
  • Allow apps from the Store only – Users will only be able to install apps from the Store. If users try to install a desktop app, they will get a “You can only install apps from the Windows Store” message dialog to visit the Store for more apps. Limiting installations to apps from the Store helps to keep you PC safe and reliable.

This tutorial will show you how to choose where apps can be installed from for all users in Windows 10.

Read more…

Where are the default SCCM Boot Images stored?

Where are the default SCCM Boot Images stored?

Need to know where the default ConfigMgr boot images are kept so you can make copies before upgrading to a later version of ConfigMgr? Answer’s in this FAQ.

You need quality SCCM content you can trust, right? We can provide what you are looking for, when you need it, all in one place free of adverts. But to do so we charge a low subscription fee to cover our costs. Here is more information about why we charge, and here are the details of our various subscriptions.

And don’t forget, you can check out for FREE all the various pages containing our FAQs and their extracts to give you a feel for how much easier your life could be if you subscribed.

The post Where are the default SCCM Boot Images stored? appeared first on FAQShop.

Source:: http://faqshop.com/feed

Removal instructions for SuperCouponPro

What is SuperCouponPro?

The Malwarebytes research team has determined that SuperCouponPro is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements.

https://forums.malwarebytes.com/topic/196925-removal-instructions-for-supercouponpro/

List of Commands to Open Windows 10 Apps

This tutorial will provide you with a list of commands to open specific Windows 10 apps via the command prompt, Run (Win+R) dialog, and scripts. You can also use these commands to create shortcuts.

Read more…

How to Turn On or Off Airplane Mode on Windows 10 Mobile Phone

Airplane mode is a feature that turns off all cellular, Wi-Fi, FM radio, Bluetooth, and NFC sharing wireless communication at once on your Windows 10 Mobile phone.

While in Airplane mode, you can still turn on Wi-Fi, FM radio, Bluetooth, and NFC sharing separately.

This tutorial will show you how to quickly turn on or off Airplane mode for all wireless communication on your Windows 10 Mobile phone.

Read more…

How to Unpair a Bluetooth Device on Windows 10 Mobile Phone

Bluetooth is a short range wireless technology which enables wireless data transmission between two Bluetooth–enabled devices located nearby each other.

Bluetooth lets you use all sorts of wireless devices with your phone—Bluetooth headsets, headphones, a hands‑free system in your car, speakers, fitness trackers—just to name a few. You can pair your Bluetooth device with your phone.

If one Bluetooth–enabled (turned on) device is in discovery mode and discovers another Bluetooth–enabled device nearby, it can query for its services and choose to establish a Bluetooth link, or a ‘pairing relationship’, with the other Bluetooth–enabled device. Establishing a Bluetooth link with another Bluetooth–enabled device is also known as pairing.

Wireless devices with Bluetooth radios must be paired with each other before they can communicate.

Once the two devices have been paired, they will automatically connect to each other when they are within range and have Bluetooth turned on.

This tutorial will show you how to remove a paired Bluetooth device on your Windows 10 Mobile phone.

Read more…

How to Unpair a Bluetooth Device on Windows 10 PC

Bluetooth is a short range wireless technology which enables wireless data transmission between two Bluetooth–enabled devices located nearby each other.

If one Bluetooth–enabled (turned on) device is in discovery mode and discovers another Bluetooth–enabled device nearby, it can query for its services and choose to establish a Bluetooth link, or a ‘pairing relationship’, with the other Bluetooth–enabled device. Establishing a Bluetooth link with another Bluetooth–enabled device is also known as pairing.

Wireless devices with Bluetooth radios must be paired with each other before they can communicate.

Once the two devices have been paired, they will automatically connect to each other when they are within range and have Bluetooth turned on.

This tutorial will show you how to remove a paired Bluetooth device on your Windows 10 PC.

Read more…

This a new test post

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

 

 

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

How to Pair Windows 10 Mobile Phone with Windows 10 PC using Bluetooth

Bluetooth is a short range wireless technology which enables wireless data transmission between two Bluetooth–enabled devices located nearby each other.

If one Bluetooth–enabled (turned on) device is in discovery mode and discovers another Bluetooth–enabled device nearby, it can query for its services and choose to establish a Bluetooth link, or a ‘pairing relationship’, with the other Bluetooth–enabled device. Establishing a Bluetooth link with another Bluetooth–enabled device is also known as pairing.

Wireless devices with Bluetooth radios must be paired with each other before they can communicate.

Once the two devices have been paired, they will automatically connect to each other when they are within range and have Bluetooth turned on.

This tutorial will show you how to pair your Windows 10 Mobile phone with your Windows 10 PC using Bluetooth.

Read more…

Facebook – How to report FAKE USER accounts in 2017

Below are the latest guidelines that describe how to report an impersonation of a user account to Facebook security team.  Please be careful in accepting “FRIEND” or “CONTACT” requests as FAKE ACCOUNTS are used to gain trust & confidential information. These FAKE ACCOUNTS can gleam information even to create identity theft exposures. 

A few PERSONAL TIPs listed below when new FRIEND REQUEST is received:

1. Always verify before you trust (never click just on a photo recognition alone)
2. click on name of account (but do not yet CONFIRM as friend)
3. look at their list of friends (are there just a few — with strange & possibly fake accounts listed)
4. Do posts look out of character for person
5. Or if you actually accept the “friend request” – do you immediately get a private chat message probing for information

https://www.facebook.com/help/167722253287296

How do I report an account for impersonation?

If you have a Facebook account and want to report someone that’s pretending to be you or someone you know:

1 — Go to the profile of the impersonating account — If you can’t find it, try searching for the name used on the profile or asking your friends if they can send you a link to it.

2 — Click  on the cover photo and select Report

3 — Follow the on-screen instructions for impersonation to file a report

If you don’t have a Facebook account and want to report someone that’s pretending to be you or someone you know, please fill out  this form.

Encryption – Legacy SHA1 algorithm now completely UNSAFE

While this early 1995 encryption protocol has replaced by improved standards in newer products, even in 2017 there are “pockets” of current use

http://www.networkworld.com/article/3173787/security/stop-using-sha1-it-s-now-completely-unsafe.html

Researchers have achieved the first practical SHA-1 collision, generating two PDF files with the same signature. Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. This shows that the algorithm’s use for security-sensitive functions should be discontinued as soon as possible.

SHA-1 (Secure Hash Algorithm 1) dates back to 1995 and has been known to be vulnerable to theoretical attacks since 2005. The U.S. National Institute of Standards and Technology has banned the use of SHA-1 by U.S. federal agencies since 2010, and digital certificate authorities have not been allowed to issue SHA-1-signed certificates since Jan. 1, 2016, although some exemptions have been made.

However, despite these efforts to phase out the use of SHA-1 in some areas, the algorithm is still fairly widely used to validate credit card transactions, electronic documents, email PGP/GPG signatures, open-source software repositories, backups and software updates.

What are the different types of SCCM Boot Image?

What are the different types of SCCM Boot Image?

So you want to know what different types of Boot Image ConfigMgr Supports? Well in this FAQ we explain the different types of Boot Images and their purpose.

You need a subscription to access the answer.

The post What are the different types of SCCM Boot Image? appeared first on FAQShop.

Source:: http://faqshop.com/feed

Wanted

Wanted one nice kind PowerShell community member to buy the last lonely ticket for the 2017 PowerShell and DevOps Summit.

 

That’s right we have one place left. And its definitely the last. if you want it – better hurry.

Removal instructions for DriverUpdaterPro

What is DriverUpdaterPro?

The Malwarebytes research team has determined that DriverUpdaterPro is a “system optimizer”. These so-called “system optimizers” often use intentional false positives to convince users that their systems have problems. Then they try to sell you their software, claiming it will remove these problems.

https://forums.malwarebytes.com/topic/196805-removal-instructions-for-driverupdaterpro/

Microsoft Security Bulletin Minor Revisions Issued: February 23, 2017

Summary

The following bulletins and/or bulletin summaries have undergone a
minor revision increment.

Please see the appropriate bulletin for more details.

* MS16-155

Bulletin Information:

MS16-155

– Title: Security Update for .NET Framework
https://technet.microsoft.com/library/security/ms16-155.aspx
– Reason for Revision: Revised bulletin to announce a detection
logic change to Monthly Rollup Release KB3205403 and Monthly
Rollup Release KB3205404. This is an informational change only.
Customers who have already successfully updated their systems
do not need to take any action.
– Originally posted: December 13, 2016
– Updated: February 23, 2017
– Bulletin Severity Rating: Important
– Version: 2.1

How to Turn On or Off Bluetooth Wireless Communication in Windows 10 Mobile

Bluetooth lets you use all sorts of wireless devices with your phone—Bluetooth headsets, headphones, a hands‑free system in your car, speakers, fitness trackers—just to name a few. You can pair your Bluetooth device with your phone.

If you don’t use Bluetooth, then turning off Bluetooth wireless communication will help improve the battery life of your phone.

This tutorial will show you how to turn on or off Bluetooth wireless communication on your Windows 10 Mobile phone.

Read more…

Mobilisez votre petite entreprise

La libertĂ© de travailler en dehors de son bureau est devenue la norme pour les entreprises de toutes tailles. Il est donc primordial de fournir les outils adĂ©quats Ă  ce nouveau mode de travail. 
En téléchargeant gratuitement ce
livre blanc, vous découvrirez à quel point il est facile de mobiliser votre entreprise, ainsi que d’accroître son efficacité et sa productivité.

https://resources.office.com/ww-landing-mobilize-your-business.html?LCID=FR&wt.mc_id=AID532419_EML_4889053

En téléchargeant cet e-book gratuit, vous découvrirez à quel point il est facile de mobiliser votre entreprise, ainsi que d’accroître son efficacité et sa productivité.

Bonne journée.
Patrice

Does the SCCM Network Access Account require Full Control Permissions to the Client Cache for Peer Cache to work?

Does the SCCM Network Access Account require Full Control Permissions to the Client Cache for Peer Cache to work?

Unsure if the ConfigMgr Network Access Account (NAA), requires Full Control permissions to the Client Cache for Peer Cache to work? Here’s the answer…

You need a subscription to access the answer.

The post Does the SCCM Network Access Account require Full Control Permissions to the Client Cache for Peer Cache to work? appeared first on FAQShop.

Source:: http://faqshop.com/feed

Backup Revisited

After using the program developed in the last post, I was thinking about some ways to optimize it. Then I went to the FileFinder class and saw this:

class FileFinder
{
    public async Task<ConcurrentDictionary<string, List>> GetFiles(string[] paths, 
        Regex excludeFilesRegex, Regex excludePathsRegex, bool incremental)
    {
        var files = new ConcurrentDictionary<string, List>();
        var tasks = paths.Select(path =>
            Task.Factory.StartNew(() =>
            {
                var rootDir = "";
                var drive = Path.GetPathRoot(path);
                if (!string.IsNullOrWhiteSpace(drive))
                {
                    rootDir = drive[0] + "_drive";
                    rootDir = rootDir + path.Substring(2);
                }
                else
                    rootDir = path;
                var selectedFiles = GetFilesInDirectory(path, excludeFilesRegex, excludePathsRegex, incremental);
                files.AddOrUpdate(rootDir, selectedFiles.ToList(), (a, b) => b);
            }));
        await Task.WhenAll(tasks);
        return files;
    }

    private List GetFilesInDirectory(string directory, Regex excludeFilesRegex, 
        Regex excludePathsRegex,bool incremental)
    {
        var files = new List();
        try
        {
            var directories = Directory.GetDirectories(directory);
            try
            {
                var selectedFiles = Directory.EnumerateFiles(directory).Where(f => !excludeFilesRegex.IsMatch(f.ToLower()));
                if (incremental)
                    selectedFiles = selectedFiles.Where(f => (File.GetAttributes(f) & FileAttributes.Archive) != 0);
                files.AddRange(selectedFiles);
            }
            catch
            {
            }
            foreach (var dir in directories.Where(d => !excludePathsRegex.IsMatch(d.ToLower())))
            {
                files.AddRange(GetFilesInDirectory(Path.Combine(directory, dir), excludeFilesRegex, excludePathsRegex, incremental));
            }
        }
        catch
        {
        }

        return files;
    }
}

I pass the filters to the GetFilesInDirectory method and do my filter there. That way, the folders I don’t want aren’t enumerated. For that, I had to make a change in the Config class, adding a new property for the path Regex and initializing it:

public class Config
{
    public Config(string fileName)
    {
        if (!File.Exists(fileName))
            return;
        var doc = XDocument.Load(fileName);
        if (doc.Root == null)
            return;
        IncludePaths = doc.Root.Element("IncludePaths")?.Value.Split(';');
        ExcludeFiles = doc.Root.Element("ExcludeFiles")?.Value.Split(';') ?? new string[0] ;
        ExcludePaths = doc.Root.Element("ExcludePaths")?.Value.Split(';') ?? new string[0];
        BackupFile = $"{doc.Root.Element("BackupFile")?.Value}{DateTime.Now:yyyyMMddhhmmss}.zip";
        ExcludeFilesRegex = new Regex(string.Join("|", ExcludeFiles));
        ExcludePathRegex = new Regex(string.Join("|", ExcludePaths));
    }

    public Regex ExcludeFilesRegex { get; }
    public Regex ExcludePathRegex { get; }
    public IEnumerable IncludePaths { get; }
    public IEnumerable ExcludeFiles { get; }
    public IEnumerable ExcludePaths { get; }
    public string BackupFile { get; }
}

With this changes, I could run the program again and measure the differences. That made a great difference. Before the change, the program was taking 160s to enumerate the files and give me 470000 files. After the change, enumerating the files took only 14.5s to give me the same files (I ran the programs three times each to avoid distortions). That’s a huge difference, no?

Then I started to think a little bit more and thought that the Regex could be compiled. So, I made two simple changes in the Config class:

ExcludeFilesRegex = new Regex(string.Join("|", ExcludeFiles),RegexOptions.Compiled);
ExcludePathRegex = new Regex(string.Join("|", ExcludePaths), RegexOptions.Compiled);

When I ran again the program, it took me 11.5s to enumerate the files. It doesn’ t seem much, but it’s a 25% improvement with just a simple change. That was really good. That way, I have a backup program that enumerates files way faster than before.

All the source code for the project is at https://github.com/bsonnino/BackupData

Recent Comments

Archives