List of Commands to Open Windows 10 Apps

This tutorial will provide you with a list of commands to open specific Windows 10 apps via the command prompt, Run (Win+R) dialog, and scripts. You can also use these commands to create shortcuts.

Read more…

How to Turn On or Off Airplane Mode on Windows 10 Mobile Phone

Airplane mode is a feature that turns off all cellular, Wi-Fi, FM radio, Bluetooth, and NFC sharing wireless communication at once on your Windows 10 Mobile phone.

While in Airplane mode, you can still turn on Wi-Fi, FM radio, Bluetooth, and NFC sharing separately.

This tutorial will show you how to quickly turn on or off Airplane mode for all wireless communication on your Windows 10 Mobile phone.

Read more…

How to Unpair a Bluetooth Device on Windows 10 Mobile Phone

Bluetooth is a short range wireless technology which enables wireless data transmission between two Bluetooth–enabled devices located nearby each other.

Bluetooth lets you use all sorts of wireless devices with your phone—Bluetooth headsets, headphones, a hands‑free system in your car, speakers, fitness trackers—just to name a few. You can pair your Bluetooth device with your phone.

If one Bluetooth–enabled (turned on) device is in discovery mode and discovers another Bluetooth–enabled device nearby, it can query for its services and choose to establish a Bluetooth link, or a ‘pairing relationship’, with the other Bluetooth–enabled device. Establishing a Bluetooth link with another Bluetooth–enabled device is also known as pairing.

Wireless devices with Bluetooth radios must be paired with each other before they can communicate.

Once the two devices have been paired, they will automatically connect to each other when they are within range and have Bluetooth turned on.

This tutorial will show you how to remove a paired Bluetooth device on your Windows 10 Mobile phone.

Read more…

How to Unpair a Bluetooth Device on Windows 10 PC

Bluetooth is a short range wireless technology which enables wireless data transmission between two Bluetooth–enabled devices located nearby each other.

If one Bluetooth–enabled (turned on) device is in discovery mode and discovers another Bluetooth–enabled device nearby, it can query for its services and choose to establish a Bluetooth link, or a ‘pairing relationship’, with the other Bluetooth–enabled device. Establishing a Bluetooth link with another Bluetooth–enabled device is also known as pairing.

Wireless devices with Bluetooth radios must be paired with each other before they can communicate.

Once the two devices have been paired, they will automatically connect to each other when they are within range and have Bluetooth turned on.

This tutorial will show you how to remove a paired Bluetooth device on your Windows 10 PC.

Read more…

This a new test post

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

 

 

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

How to Pair Windows 10 Mobile Phone with Windows 10 PC using Bluetooth

Bluetooth is a short range wireless technology which enables wireless data transmission between two Bluetooth–enabled devices located nearby each other.

If one Bluetooth–enabled (turned on) device is in discovery mode and discovers another Bluetooth–enabled device nearby, it can query for its services and choose to establish a Bluetooth link, or a ‘pairing relationship’, with the other Bluetooth–enabled device. Establishing a Bluetooth link with another Bluetooth–enabled device is also known as pairing.

Wireless devices with Bluetooth radios must be paired with each other before they can communicate.

Once the two devices have been paired, they will automatically connect to each other when they are within range and have Bluetooth turned on.

This tutorial will show you how to pair your Windows 10 Mobile phone with your Windows 10 PC using Bluetooth.

Read more…

Facebook – How to report FAKE USER accounts in 2017

Below are the latest guidelines that describe how to report an impersonation of a user account to Facebook security team.  Please be careful in accepting “FRIEND” or “CONTACT” requests as FAKE ACCOUNTS are used to gain trust & confidential information. These FAKE ACCOUNTS can gleam information even to create identity theft exposures. 

A few PERSONAL TIPs listed below when new FRIEND REQUEST is received:

1. Always verify before you trust (never click just on a photo recognition alone)
2. click on name of account (but do not yet CONFIRM as friend)
3. look at their list of friends (are there just a few — with strange & possibly fake accounts listed)
4. Do posts look out of character for person
5. Or if you actually accept the “friend request” – do you immediately get a private chat message probing for information

https://www.facebook.com/help/167722253287296

How do I report an account for impersonation?

If you have a Facebook account and want to report someone that’s pretending to be you or someone you know:

1 — Go to the profile of the impersonating account — If you can’t find it, try searching for the name used on the profile or asking your friends if they can send you a link to it.

2 — Click  on the cover photo and select Report

3 — Follow the on-screen instructions for impersonation to file a report

If you don’t have a Facebook account and want to report someone that’s pretending to be you or someone you know, please fill out  this form.

Encryption – Legacy SHA1 algorithm now completely UNSAFE

While this early 1995 encryption protocol has replaced by improved standards in newer products, even in 2017 there are “pockets” of current use

http://www.networkworld.com/article/3173787/security/stop-using-sha1-it-s-now-completely-unsafe.html

Researchers have achieved the first practical SHA-1 collision, generating two PDF files with the same signature. Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. This shows that the algorithm’s use for security-sensitive functions should be discontinued as soon as possible.

SHA-1 (Secure Hash Algorithm 1) dates back to 1995 and has been known to be vulnerable to theoretical attacks since 2005. The U.S. National Institute of Standards and Technology has banned the use of SHA-1 by U.S. federal agencies since 2010, and digital certificate authorities have not been allowed to issue SHA-1-signed certificates since Jan. 1, 2016, although some exemptions have been made.

However, despite these efforts to phase out the use of SHA-1 in some areas, the algorithm is still fairly widely used to validate credit card transactions, electronic documents, email PGP/GPG signatures, open-source software repositories, backups and software updates.

What are the different types of SCCM Boot Image?

What are the different types of SCCM Boot Image?

So you want to know what different types of Boot Image ConfigMgr Supports? Well in this FAQ we explain the different types of Boot Images and their purpose.

You need a subscription to access the answer.

The post What are the different types of SCCM Boot Image? appeared first on FAQShop.

Source:: http://faqshop.com/feed

Wanted

Wanted one nice kind PowerShell community member to buy the last lonely ticket for the 2017 PowerShell and DevOps Summit.

 

That’s right we have one place left. And its definitely the last. if you want it – better hurry.

Removal instructions for DriverUpdaterPro

What is DriverUpdaterPro?

The Malwarebytes research team has determined that DriverUpdaterPro is a “system optimizer”. These so-called “system optimizers” often use intentional false positives to convince users that their systems have problems. Then they try to sell you their software, claiming it will remove these problems.

https://forums.malwarebytes.com/topic/196805-removal-instructions-for-driverupdaterpro/

Microsoft Security Bulletin Minor Revisions Issued: February 23, 2017

Summary

The following bulletins and/or bulletin summaries have undergone a
minor revision increment.

Please see the appropriate bulletin for more details.

* MS16-155

Bulletin Information:

MS16-155

– Title: Security Update for .NET Framework
https://technet.microsoft.com/library/security/ms16-155.aspx
– Reason for Revision: Revised bulletin to announce a detection
logic change to Monthly Rollup Release KB3205403 and Monthly
Rollup Release KB3205404. This is an informational change only.
Customers who have already successfully updated their systems
do not need to take any action.
– Originally posted: December 13, 2016
– Updated: February 23, 2017
– Bulletin Severity Rating: Important
– Version: 2.1

How to Turn On or Off Bluetooth Wireless Communication in Windows 10 Mobile

Bluetooth lets you use all sorts of wireless devices with your phone—Bluetooth headsets, headphones, a hands‑free system in your car, speakers, fitness trackers—just to name a few. You can pair your Bluetooth device with your phone.

If you don’t use Bluetooth, then turning off Bluetooth wireless communication will help improve the battery life of your phone.

This tutorial will show you how to turn on or off Bluetooth wireless communication on your Windows 10 Mobile phone.

Read more…

Mobilisez votre petite entreprise

La libertĂ© de travailler en dehors de son bureau est devenue la norme pour les entreprises de toutes tailles. Il est donc primordial de fournir les outils adĂ©quats Ă  ce nouveau mode de travail. 
En téléchargeant gratuitement ce
livre blanc, vous découvrirez à quel point il est facile de mobiliser votre entreprise, ainsi que d’accroître son efficacité et sa productivité.

https://resources.office.com/ww-landing-mobilize-your-business.html?LCID=FR&wt.mc_id=AID532419_EML_4889053

En téléchargeant cet e-book gratuit, vous découvrirez à quel point il est facile de mobiliser votre entreprise, ainsi que d’accroître son efficacité et sa productivité.

Bonne journée.
Patrice

Does the SCCM Network Access Account require Full Control Permissions to the Client Cache for Peer Cache to work?

Does the SCCM Network Access Account require Full Control Permissions to the Client Cache for Peer Cache to work?

Unsure if the ConfigMgr Network Access Account (NAA), requires Full Control permissions to the Client Cache for Peer Cache to work? Here’s the answer…

You need a subscription to access the answer.

The post Does the SCCM Network Access Account require Full Control Permissions to the Client Cache for Peer Cache to work? appeared first on FAQShop.

Source:: http://faqshop.com/feed

Backup Revisited

After using the program developed in the last post, I was thinking about some ways to optimize it. Then I went to the FileFinder class and saw this:

class FileFinder
{
    public async Task<ConcurrentDictionary<string, List>> GetFiles(string[] paths, 
        Regex excludeFilesRegex, Regex excludePathsRegex, bool incremental)
    {
        var files = new ConcurrentDictionary<string, List>();
        var tasks = paths.Select(path =>
            Task.Factory.StartNew(() =>
            {
                var rootDir = "";
                var drive = Path.GetPathRoot(path);
                if (!string.IsNullOrWhiteSpace(drive))
                {
                    rootDir = drive[0] + "_drive";
                    rootDir = rootDir + path.Substring(2);
                }
                else
                    rootDir = path;
                var selectedFiles = GetFilesInDirectory(path, excludeFilesRegex, excludePathsRegex, incremental);
                files.AddOrUpdate(rootDir, selectedFiles.ToList(), (a, b) => b);
            }));
        await Task.WhenAll(tasks);
        return files;
    }

    private List GetFilesInDirectory(string directory, Regex excludeFilesRegex, 
        Regex excludePathsRegex,bool incremental)
    {
        var files = new List();
        try
        {
            var directories = Directory.GetDirectories(directory);
            try
            {
                var selectedFiles = Directory.EnumerateFiles(directory).Where(f => !excludeFilesRegex.IsMatch(f.ToLower()));
                if (incremental)
                    selectedFiles = selectedFiles.Where(f => (File.GetAttributes(f) & FileAttributes.Archive) != 0);
                files.AddRange(selectedFiles);
            }
            catch
            {
            }
            foreach (var dir in directories.Where(d => !excludePathsRegex.IsMatch(d.ToLower())))
            {
                files.AddRange(GetFilesInDirectory(Path.Combine(directory, dir), excludeFilesRegex, excludePathsRegex, incremental));
            }
        }
        catch
        {
        }

        return files;
    }
}

I pass the filters to the GetFilesInDirectory method and do my filter there. That way, the folders I don’t want aren’t enumerated. For that, I had to make a change in the Config class, adding a new property for the path Regex and initializing it:

public class Config
{
    public Config(string fileName)
    {
        if (!File.Exists(fileName))
            return;
        var doc = XDocument.Load(fileName);
        if (doc.Root == null)
            return;
        IncludePaths = doc.Root.Element("IncludePaths")?.Value.Split(';');
        ExcludeFiles = doc.Root.Element("ExcludeFiles")?.Value.Split(';') ?? new string[0] ;
        ExcludePaths = doc.Root.Element("ExcludePaths")?.Value.Split(';') ?? new string[0];
        BackupFile = $"{doc.Root.Element("BackupFile")?.Value}{DateTime.Now:yyyyMMddhhmmss}.zip";
        ExcludeFilesRegex = new Regex(string.Join("|", ExcludeFiles));
        ExcludePathRegex = new Regex(string.Join("|", ExcludePaths));
    }

    public Regex ExcludeFilesRegex { get; }
    public Regex ExcludePathRegex { get; }
    public IEnumerable IncludePaths { get; }
    public IEnumerable ExcludeFiles { get; }
    public IEnumerable ExcludePaths { get; }
    public string BackupFile { get; }
}

With this changes, I could run the program again and measure the differences. That made a great difference. Before the change, the program was taking 160s to enumerate the files and give me 470000 files. After the change, enumerating the files took only 14.5s to give me the same files (I ran the programs three times each to avoid distortions). That’s a huge difference, no?

Then I started to think a little bit more and thought that the Regex could be compiled. So, I made two simple changes in the Config class:

ExcludeFilesRegex = new Regex(string.Join("|", ExcludeFiles),RegexOptions.Compiled);
ExcludePathRegex = new Regex(string.Join("|", ExcludePaths), RegexOptions.Compiled);

When I ran again the program, it took me 11.5s to enumerate the files. It doesn’ t seem much, but it’s a 25% improvement with just a simple change. That was really good. That way, I have a backup program that enumerates files way faster than before.

All the source code for the project is at https://github.com/bsonnino/BackupData

Military exchanges will be open to honorably discharged veterans

Not exactly a tech issue, but being a Vietnam Veteran, this is great news.

Military exchanges will be open to honorably discharged veterans

Removal instructions for Easy Interests Access

What is Easy Interests Access?

The Malwarebytes research team has determined that Easy Interests Access is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice.
Easy Interests Access is a member of the Spigot family as described in the blogpost Spigot browser hijackers.

https://forums.malwarebytes.com/topic/196771-removal-instructions-for-easy-interests-access/

How to Turn On or Off Mail app Signature in Windows 10

Windows 10 comes with a new Mail app. The new Mail app brings improved performance and a familiar three-pane email UI, with a toggle to quickly move between your email and calendar. Mail includes customizable Swipe Gestures, letting you swipe right or left to take actions like delete, flag, move or mark as read/unread. Also check out the new email authoring experience. Mail leverages the familiar and rich capability of Word to that allows you to easily insert tables, add pictures and use bullets and color to your text. The new Mail apps support Office 365, Exchange, Outlook.com, Gmail, IMAP, POP and other popular accounts.

By default, the Mail app automatically attaches the default Sent from Mail for Windows 10 signature to the bottom of all emails sent from the Mail app.

This tutorial will show you how to turn off or turn on and change the signature used by the Mail app for your account in Windows 10.

Read more…

How to Import or Export Google Chrome Bookmarks as HTML in Windows

You can keep track of the websites you visit frequently by storing them as bookmarks in Google Chrome. The bookmarks bar is a toolbar in Chrome that you can also add your favorite websites you visit frequently on to make opening them faster and more convenient.

This tutorial will show you how to import or export your Google Chrome bookmarks as a .html file in Windows 7, Windows 8, or Windows 10.

Read more…

Recent Comments

Archives