You can use check boxes to make selecting multiple items in any order easier to do in File Explorer and on your desktop in Windows.
When check boxes is turned on, you can hover the pointer over each item to reveal the check box to be able to check (select) or uncheck (unselect) it.
This tutorial will show you how to turn on or off using check boxes to select files, folders, and drives in your user account in Windows 10.
Yes, it still works, and yes, I am still pleased with it. However, it does have an issue that I never noticed before.
Before any major task is started, it appears to need ‘warming up’ time. The CPU LED flashes away like all hell for a good twenty minutes, while various maintenance utilities ply their trade.
I don’t mind because the Netbook isn’t capable of too much at the best of times, and presently it is walking with the Windows 10 crowd. At least I don’t have to wait for the latest builds to install. They took far longer.
The other machines have more about them and do not have to warm up.
Anyway, a month on and everything is good here..
OK, this is one cause for flickering screens after a Windows 10 upgrade. It may be the only one, I don’t know..
The cause? Norton.. See here..
No, I don’t like Norton or Symantec Anything, but I don’t like any of the other big anti-virus suites either. I have tried them all, and just as I think I have found a good one, the software author trashes it.
Anti-virus programs weren’t always this way. There was a time when nobody really knew if they did anything at all. All we could do was believe what we were told. One thing is for sure, they were supposed to work seamlessly in the background.
They don’t do that anymore. Every now and again, the computer stops doing something that has not been an issue before, and invariably it is the huge anti-virus suite spoiling the party.
Best plan is to use the Microsoft offering. It works seamlessly, never stopping anything that is harmless, and you never get a virus infection because I suspect there is nothing for Windows Defender to stop. ‘Virus infections’ these days refers to popups et al, invited in by the user, not let in by your anti-virus suite.
What is DNS Unlocker?
The Malwarebytes research team has determined that DNS Unlocker is adware. These adware applications display advertisements not originating from the sites you are browsing.
Windows includes the common This PC (aka: Computer), User’s Files, Network, Recycle Bin, and Control Panel shortcuts that you can add or remove as icons on your desktop.
This tutorial will show you how to add or remove an Internet Explorer desktop icon for your account in Windows 10.
The Internet Explorer desktop icon will have Open Home Page, Start Without Add-ons, Start InPrivate Browsing, and Properties (Internet Options) included in it’s context menu.
The Store app in Windows 10 has a My Library feature that shows you all of the apps, games, music, and movies & TV that you installed on all devices while signed in with your Microsoft account. My Library in the Store makes it easy to quickly download and install an app or game owned by a Microsoft account to any account (local or Microsoft) on any Windows 10 PC or device.
My Library in the Store can be useful if:
â€˘You want to see all the Windows apps you own for your Microsoft account.
â€˘You uninstalled a Windows app, and would like to reinstall it.
â€˘You would like to install and app owned by your Microsoft account to another local account or Microsoft account.
This tutorial will show you how to use My Library in the Store to install your Windows apps to any account in Windows 10.
This is part two of a series of posts on interception in .NET. You can find the first part here.
There are two possible targets for interception:
Types, such as classes or interfaces;
Instances of classes.
Depending on the target, we can use different interception techniques.
In .NET, like in other OOP languages, we have the following interception techniques:
Virtual method interception: this is a type interception technique by which we subclass dynamically a target type â€“ an interface or a class, since structures do not allow subclassing â€“ and add method overrides for the methods we want to intercept. Of course, only virtual methods can be intercepted (abstract methods and interface methods are treated as virtual); the interceptor returns an instance of the dynamically generated subclass of the target type, which is treated exactly as if it were this target type;
Interface interception: an instance interception technique. There has to be an existing object for us to intercept, and it must implement one or more interfaces. We can intercept any method or property exposed by one of these interfaces; basically, the generated interceptor code sits between the exposed interface and the existing target;
Transparent proxy interception: another instance interception technique. The target types must either be interfaces or classes inheriting from MarshalByRefObject, one instance of which should exist. It is possible to intercept any interface methods or any method declared in the MarshalByRefObject-derived class; the interceptor acts as a proxy between the exposed interface or class and the actual object;
Context-bound object interception: this a .NET-specific interception technique for instance interception by which we can intercept any calls to objects of classes inheriting from ContextBoundObject. This one is not as generic as the others because we need to have our class inherit from ContextBoundObject, which we wouldnâ€™t normally do, and add some boilerplate code.
Next post will talk about static interception.
At first glance, it looks like a great idea. It won’t, however, make that much of a difference for its own ads. Google has been automatically converting a lot of Flash ads served via its network to HTML5 anyway, and I’m not sure how much safer HTML5 may prove to be, in the end.
- SharePointâ€™s interesting hybrid cloud search service
- Removing on-hold items from Exchange and SharePoint: unsupported but doable
- Windows 10 Build 10525, PowerShell, and Office 365
- New report slams Office 365 compliance features unfairly
- Office 365 roadmap signs point to collaboration
- Words to go: Exchange 2013 management tools and features
- Outlook 2016 for Mac: Enhancements make the mail client even better than before
- We Must Fundamentally Transform Our Approach to Security
- Windows 10 (RTM) RSAT tools now availableâ€¦
- Using PowerShell for Message Analyzer Text Log Parsers
- Site-aware Failover Clusters in Windows Server 2016
- Tip oâ€™ the Week #292 â€“ Stop the ads on Edge
- Microsoft Updates Its Privileged Identity Management Preview
- Windows Server 2016 Preview 3 Gets a GUI and Less Flexibility
- Microsoft Releases Remote Server Administration Tools for Windows 10
- Beyond MDMâ€”how to protect your data with BYOD and SaaS implemented
- Introducing the Office IT Pro Deployment Script project
- Deeper integration between Office documents and Outlook for iOS
- Office 365â€”monthly Dev Digest for August
- Office 365 news roundup
- Announcing availability of SharePoint Server 2016 IT Preview and cloud hybrid search
- Office 365 Mailbox Migration – Target Mailbox Doesnâ€Ž’t Have An SMTP Proxy Matching
- TechNet Gallery Resources
- How to identify the replication technology in use by Active Directory
- Office 365 Mobile Device Management Enrolment on Apple iOS Devices
- Renewing an SSL Certificate for Exchange Server 2013
- PowerShell Script to Configure Exchange Server Client Access URLs
- Office 365 Mobile Device Management Enrolment for Android Devices
- A brave new world for Exchange 2016 cmdlet reference topic delivery and updates
- Setting properties via EWS on a Draft message in a Compose Mail App
- OWA Voting Buttons Compose App for Office365/Exchange 2016
- Intune and Exchange ActiveSync (Part 4)
- Exchange Server 2013 offsite protection using DPM and Microsoft Azure (Part 4)
- Exchange Archiving: On-Premises vs Cloud-Based (Part 5)
- Off-boarding email from Office 365 to Exchange 2013 (Part 4)
- Reminder to call a Contact
- Delete or Hide the Clutter folder
- Should I install the 32-bit or 64-bit version of Office/Outlook?
- Create a Contact Group for contacts belonging to the same Category
- Prepare to update Office 365 ProPlus to the Office 2016 version
- Outlook Error Ox800CCC13 in Windows 10
- Empty Multiple Deleted Items Folders using a Macro
- Fix for MSExchange Unified Messaging Event ID 1423 “A TLS API failure occurred. Error = 0x80090331”
- Exchange â€“ No log files can be truncated.
- ESEUTIL – even more evil for DAGs
The Your computer has been locked Ransomware is computer infection that prevents you from accessing your Windows desktop, files, or applications until you pay a $300 ransom to the malware developers. This ransomware pretends to be a lock screen placed on your computer by the Department of Justice, Department of Homeland Security, and the FBI that states child pornography was detected on your computer. It then proceeds to state that you will face a $250,000 fine imprisonment from 4 to 30 years unless you pay a fine in the amount of $300. In reality, this is just a computer infection and not a legitimate government message, so you should ignore anything that it requests you to do.
As explained in this great blog article and site, this infection will also check your web browser history to see if you accessed certain sites. If you have, it will include the list of matched web sites in the lock screen to further scare you into thinking that your activities have been monitored. Once again, this is just the infection accessing your browser history and you do not have to be concerned about it.
If you’ve been around Windows for a while, you will know that there used toÂ be ‘copy to’ and ‘move to’Â functions in the right click menu but there isn’t anymore, and hasn’t been since Vista.
I will admit that neither is much use on a single drive computer, but my system is NOT single drive and never has been. So, every time that I move to the next OS, I run a couple of registry tweaks which you can get here..
Scroll down to the install section, click on theÂ download link, save them toÂ ‘downloads’ and then run each of them in turn.
Now you have ‘copy to’ and ‘move to’ functions..
Deal of the Day August 31: Half off my book Learn Active Directory Management in a Month of Lunches. Use code dotd083115au at https://manning.com/books/learn-active-directory-management-in-a-month-of-lunches
Learn ConfigMgr 2012 in a Month of Lunches and Learn SQL Server Administration in a Month of Lunches also included
With the launch of Windows 10 came a new browser, Microsoft Edge. As every web designer/developer knows, you should preview your web pages in as many browsers as you can. However, Microsoft didn’t make it possible to add Microsoft Edge to the browser list in Expression Web. The searching I did said that the executable was atÂ C:WindowsSystemAppsMicrosoft.MicrosoftEdge_8wekyb3d8bbweMicrosoftEdge.exe but adding that to the browser list didn’t work. I also found an executable atÂ GitHub but that didn’t work either. I reached out to the Microsoft MVPs on Facebook to see if someone could look at the code of the exe on Github and figure out why it wasn’t working. I heard back from David Ching – he had downloaded the code, found the problem, and fixed it. Thank you David!
I have zipped the file and and made it available for download from my web site. All you need to do is unzip the file and then add MicrosoftEdgeLauncher.exe to the list of of browsers you use in Expression Web.
This tutorial will show you how to add or remove a Select context menu for all users in Windows 10 that expands open with Select all, Select none, and Invert selection for easy usage.
You can make the text of icons on your screen easier to see by making them larger while keeping your display set to its recommended resolution and default DPI.
This tutorial will show you how to change the font size of text for the name of icons to what you want for your account in Windows 10.
The UK PowerShell User Group was the Worldâ€™s first user group dedicated to PowerShell. Its been in hibernation for the last few years but Ryan Yates is bringing it back to life.
Heâ€™s set up a meeting in Manchester for Tuesday 13 October 2016. See http://www.kilasuit.org/Blog/Post/18/Coming-to-Manchester-October-13th—Get-PSUGUKMan
If youâ€™re in the area Iâ€™d recommend you get there if you can
What is Shopperz?
The Malwarebytes research team has determined that Shopperz is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements and acts as a LSP-hijacker.
In Windows 10, there are a few different ways to find and change your settings: Settings app, Control Panel, app settings, and search. Most of the settings that you’ll want to change can be found in the Settings app.
In Settings, you can change most Windows settings, such as changing your screen resolution, adding and removing devices, personalizing the lock screen, changing the date and time, and adding user accounts.
The Control Panel includes some additional settings that you might use less often, such as customizing the desktop.
This tutorial will show you how to add or remove Control Panel under Folders in This PC for all users in Windows 10.
Well worth reading, and sharing:
“The incidentÂ occurred when people who where simply browsing MSNâ€™s news, lifestyle or other portals were served withÂ a malicious advertisement that silently loaded the AnglerÂ exploit kit and attempted to infect their computers.”
“While we did not collect the malware payload associated with this campaign, we believeÂ it is either Ad fraud or ransomware, Anglerâ€™sÂ trademark.”