Latest Posts from all MSMVPS.COM blogs

  • How to Add or Remove Customize tab in Folder Properties in Windows
    The Customize tab in the properties of a folder or non-OS drive allows you to change the folder template, folder pictures, and folder icons if a supported option for the folder. To open the Customize tab, you can right click or press and hold on a folder or non-OS drive, and click/tap on Properties. You can also right click or press and hold on the background of a folder or non-OS drive, and click/tap on Customize this folder to open the Customize tab. This tutorial will show you how to add or remove the Customize tab in folder properties and Customize this folder context menu for all users in Windows 7, Windows 8, and Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Sunday, August 19, 2018By Brink
  • File searches with WMI
    I saw a question about file searches with WMI. If you just know the file name it’s a very slow process. Painfully slow. If you have an idea about the folder its much quicker.   function get-wmifile { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string]$path, [string]$file ) if ($path.IndexOf('') -le 0 ){ $path = $path.replace('', '') } if ($path.IndexOf('*') -ge 0 ){ $path = $path.replace('*', '%') } Write-Verbose -Message "Path to search: $path" $folders = Get-CimInstance -ClassName Win32_Directory -Filter "Name LIKE '$path'" foreach ($folder in $folders){ if ($file) { Get-CimAssociatedInstance -InputObject $folder -ResultClassName CIM_DataFile | where Name -Like "*$file" | Select Name } else { Get-CimAssociatedInstance -InputObject $folder -ResultClassName CIM_DataFile | Select Name } } }   Take the path and replace any single with . WMI expects c:test NOT c:test. Likewise replace the wildcard * with the WMI wildcard equivalent % Get the folders that are like the path. Foreach folder use the WMI association between Win32_Directory and CIM_datafile to get the files. if you’ve specified a file then just return that otherwise all files in the folders matching path.   The WMI approach works and if you add in the computer name you can use remoting to get ... read more
    Source: Latest Blog PostsPublished on Sunday, August 19, 2018By richardsiddaway
  • Get help with Windows 10 upgrade and installation errors
    Having trouble with upgrading or installing Windows 10? Here are some common errors that can be fixed with a few steps that you can do on your own. #WindowsSupport https://t.co/QWilTgE0Pi pic.twitter.com/7JAOTtBOGK — Microsoft Support (@MicrosoftHelps) August 19, 2018 ... read more
    Source: Latest Blog PostsPublished on Sunday, August 19, 2018By don
  • Security Mailer – Week 33
    Source: Latest Blog PostsPublished on Sunday, August 19, 2018By hankshelp
  • Windwos 10: Filtrar las redes inalambricas ajenas
    Para evitar que cuando pulsamos en el icono del systray de conexion a internet aparezcan todas las redes inalambricas que tenemos a nuestro alrededor, podemos realizar el siguiente procedimiento para que se muestren solo aquellas que nos interesa. https://answers.microsoft.com/es-es/windows/forum/windows_10-networking/windwos-10-filtrar-las-redes-inalambricas-ajenas/84159578-3edc-4686-a472-7ab90461ab00?tm=1534068240246%20… ... read more
    Source: Latest Blog PostsPublished on Saturday, August 18, 2018By Alez Curquejo
  • Variable type
    Usually when you create a variable you implicitly set the type by the value you use. Sometimes though you may want to explicitly set the variable type.   if you don’t give the variable a type you can do this: PS> $x = 35 PS> $x 35 PS> $x = ‘now a string’ PS> $x now a string   If you give the variable an explicit type PS> [int]$x = 35 PS> $x 35 PS> $x = ‘now a string’ Cannot convert value “now a string” to type “System.Int32”. Error: “Input string was not in a correct format.” At line:1 char:1 + $x = ‘now a string’ + ~~~~~~~~~~~~~~~~~~~ + CategoryInfo : MetadataError: (:) [], ArgumentTransformationMetadataException + FullyQualifiedErrorId : RuntimeException   The variable expects an integer or something that can be converted to an integer PS> $x = ‘123’ PS> $x 123   You can’t supply a type when you use New-Variable so if you need a read only or constant variable then create it as shown above then use Set-Variable to make it read only or constant. ... read more
    Source: Latest Blog PostsPublished on Saturday, August 18, 2018By richardsiddaway
  • Best definition of the cloud…ever!
    Source: Latest Blog PostsPublished on Saturday, August 18, 2018By hankshelp
  • WebCast: SharePoint Framework, paso a paso
    Colegas, nos vemos el próximo 29 de Agosto del 2018 las 10:00 AM tiempo del pacífico en una conferencia en línea sobre SharePoint Framework. Esta sesión es introductoria y le servirá para comprender lo que se necesita para construir web parts para las páginas modernas de SharePoint Online. Los invito pues a que anote en su calendario la fecha y se una vía GoToMeeting usando el siguiente enlace: https://global.gotomeeting.com/join/600685781 ... read more
    Source: Latest Blog PostsPublished on Friday, August 17, 2018By HelpDesk SharePoint
  • Announcing Windows 10 Insider Preview Build 17741
    Sorry for the delay #WinowsInsiders but yes we have indeed released Build 17741 to the Fast ring! https://t.co/kt4WOTNQYT — Dona Sarkar (@donasarkar) August 17, 2018 ... read more
    Source: Latest Blog PostsPublished on Friday, August 17, 2018By don
  • Foreshadow – 3rd new INTEL side-channel vulnerability emerges
    Foreshadow” is a new  side-channel vulnerability (similar to what we see with “Meltdown” and “Spectre.”) and researchers have recently discovered it is potentially vulnerable https://mcpmag.com/articles/2018/08/16/intel-alarm-foreshadow-cpu-attacks.aspx https://foreshadowattack.eu/ Researchers from Microsoft, Intel and Red Hat this week turned the spotlight on a newly discovered execution side-channel attack method they’ve dubbed “Foreshadow.”  Researchers notified Intel of Foreshadow, also known as the “L1 Terminal Fault” (L1TF), on Jan. 3 this year. The L1TF attack methods potentially can affect Intel Core and Intel Xeon processors only. However, attackers need to have access to a system or they need to be able to run code on a machine for the attacks to be carried out. Fixing the vulnerability requires applying both firmware and operating system updates, which are expected to have few performance degradations for most users. There are no active exploits known as yet for the L1TF attack methods. The vulnerabilities have already been assigned common vulnerability and CVEs: * CVE-2018-3615 “for attacking SGX”* CVE-2018-3620 “for attacking the OS Kernel and SMM mode”* CVE-2018-3646 “for attacking virtual machines” ... read more
    Source: Latest Blog PostsPublished on Friday, August 17, 2018By harrywaldron
  • Windows 10 – ConPTY pseudoconsole coming in FALL 2018 release
    A new “Linux like” console capability called “ConPTY” is coming in Redstone 5 (FALL 2018 release) as shared in following article https://redmondmag.com/articles/2018/08/16/windows-10-console-apps-support.aspx Microsoft is bringing a pseudoconsole to Windows 10, which will make it easier for developers to connect their command-line and graphical user interface (GUI)-based applications.  In a “back to the future” moment, inspired by Unix and Linux (*NIX), the next version of Windows 10 will include a Windows Pseudo Console, known as “ConPTY.” Microsoft is promising that the Windows Pseudo Console will facilitate terminal-style communications for apps without Windows getting in the way. Unlike *NIX operating systems, Windows currently lacks a pseudoconsole. It doesn’t speak the “text/VT” language that was used to support terminal communications in *NIX operating systems. As a consequence, Windows currently “obstructs third-party consoles and server apps.”  Turner indicated that the Windows Pseudo Console in Windows 10 will fix problems currently associated with connecting command-line applications in Windows. It will support “all Command-Line and/or GUI applications that communicate with Command-Line applications,” “Using the new ConPTY infrastructure, third party Consoles can now communicate directly with modern and traditional Command-Line applications, and speak text/VT with all of them,” Turner described Microsoft’s switch to the ConPTY API as ... read more
    Source: Latest Blog PostsPublished on Friday, August 17, 2018By harrywaldron
  • How to Turn On or Off Show OneDrive Cloud-only Content in Windows 10 Photos app
    The Photos app is included in Windows 10 by default. You can use the Photos app to view and edit your photos and videos, make movies, and create albums. You can use video remix to instantly create a video from photos and videos you select. Use the video editor for fine-tuned adjustments — change filters, text, camera motion, music, and more. You can even add 3D effects like butterflies, lasers, or explosions that magically appear in your video. The Photos app in Windows 10 gathers photos from your PC, phone, and other devices, and puts them in one collection place, where you can more easily find what you’re looking for. The Photos app displays your collection of images from folders you add located on your PC, an external drive, or a network drive connected to your PC. Subfolders of the folders you add will be included, too. The Photos app automatically displays the photos and videos in the Pictures folder on your PC and OneDrive by default. If you sign in to the Photos app with your Microsoft account, the Photos app will show your cloud-only content from OneDrive by default. This tutorial will show you how to turn on ... read more
    Source: Latest Blog PostsPublished on Friday, August 17, 2018By Brink
  • Removal instructions for Restoro
    What is Restoro? The Malwarebytes research team has determined that Restoro is a “system optimizer”. These so-called “system optimizers” use intentional false positives to convince users that their systems have problems. Then they try to sell you their software, claiming it will remove these problems. https://forums.malwarebytes.com/topic/235321-removal-instructions-for-restoro/ ... read more
    Source: Latest Blog PostsPublished on Friday, August 17, 2018By don
  • How to Add and Remove Folders in Photos app in Windows 10
    The Photos app is included in Windows 10 by default. You can use the Photos app to view and edit your photos and videos, make movies, and create albums. You can use video remix to instantly create a video from photos and videos you select. Use the video editor for fine-tuned adjustments — change filters, text, camera motion, music, and more. You can even add 3D effects like butterflies, lasers, or explosions that magically appear in your video. The Photos app in Windows 10 gathers photos from your PC, phone, and other devices, and puts them in one collection place, where you can more easily find what you’re looking for. The Photos app displays your collection of images from folders you add located on your PC, an external drive, or a network drive connected to your PC. Subfolders of the folders you add will be included, too. The Photos app automatically displays the photos and videos in the Pictures folder on your PC and OneDrive. This tutorial will show you how to add and remove folders in your collection in the Photos app for your account in Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By Brink
  • Announcing Windows 10 Insider Preview Build 18219
    New build for #WindowsInsiders who have opted into Skip Ahead: https://t.co/EjhaIZSQcu — Windows Insider (@windowsinsider) August 16, 2018 ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By don
  • How to Add or Remove Favorites in Photos app in Windows 10
    The Photos app is included in Windows 10 by default. You can use the Photos app to view and edit your photos and videos, make movies, and create albums. You can use video remix to instantly create a video from photos and videos you select. Use the video editor for fine-tuned adjustments — change filters, text, camera motion, music, and more. You can even add 3D effects like butterflies, lasers, or explosions that magically appear in your video. A new Favorites feature has been added to the Photos app. You can now mark your images as a favorite to make sure you can quickly find them later in your Favorites album. When you mark an image as a favorite, it gets added to your Favorites album in the Photos app. The Favorites album will automatically be created if it doesn’t already exist. Note: Only images from within an added folder in the Photos app Folders area will get added to the Favorites album, even if marked as a favorite. This tutorial will show you how to add and remove images as Favorites in the Photos app for your account in Windows 10. Read more… ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By Brink
  • Pale Moon 28.0 Released August 16, 2018
    We are excited to bring you Pale Moon 28.0. This is a new major milestone in Pale Moon’s release history. Official binary Linux versions will be published soon but with a small delay — please be patient! We are now building on the Unified XUL Platform which has been forked off from Mozilla’s mozilla-central at a point before Rust and Quantum to continue focus on the XUL interface language and traditional browser extensions. Many thousands of things have changed since the v27 (AKA “Tycho”) versions, which can’t possibly all be listed here. Instead, the most pertinent improvements in this new release are highlighted here: SpiderMonkey update: The JavaScript engine has received a major upgrade and now supports all landmark features from the ECMAScript standards as carried by mainstream browsers. This should put an end to the increasing JavaScript issues we’ve seen due to web frameworks not being browser-agnostic in that respect, or the browser not supporting what websites expect. Goanna update: The layout and rendering engine (Goanna) has been updated to its 4th generation (version 4.*) which brings with it improved compatibility with “trendy” CSS styling techniques that build on a few very specific features (e.g. CSS Grid). Goanna continues ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By don
  • Wireless – 5G in-depth review by PC Magazine
    PC Magazine shares an in-depth review of the new Wireless 5G that will be forthcoming as a standard offering, in the next few years https://www.pcmag.com/article/345387/what-is-5g AT&T, Verizon, and other carriers will start to launch 5G networks this year. But what exactly is 5G, and how fast is it compared with 4G? Here’s what we know so far. At the end of 2017, the wireless industry came up with the first official 5G standard. AT&T plans to launch mobile 5G in the US this year, Verizon says it will launch 5G for homes, and both T-Mobile and Sprint say that they’re launching 5G phones early next year. But a standard doesn’t mean that all 5G will work the same—or that we even know what applications 5G will enable. There will be slow but responsive 5G, and fast 5G with limited coverage. Let us take you down the 5G rabbit hole to give you a picture of what the upcoming 5G world will be like. 1G, 2G, 3G, 4G, 5G — The G in 5G means it’s a generation of wireless technology. While most generations have technically been defined by their data transmission speeds, each has also been marked by a break in ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By harrywaldron
  • Microsoft Security Updates – AUGUST 2018 fixes 2 public exploits
    The ISC highlights 2 current public exploits circulating “in the wild” and prompt patching actions will help better protect home & corporate users  https://isc.sans.edu/forums/diary/Microsoft+August+2018+Patch+Tuesday/23986/ https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39 https://blog.talosintelligence.com/2018/08/ms-tuesday.html This month, Microsoft fixes 63 vulnerabilities. 2 of which have been publicly disclosed: CVE-2018-8414 : This is the “Settings.ms” issue. These files were introduced in Windows 8, and they are used to create shortcuts to specific settings pages. The XML instructions for the link can lead to code execution and the user is not warned before opening the files. This has been widely exploited. For details, see the report by SpecterOps: CVE-2018-8373: Not a lot of details here other than the fact that this is yet another scripting engine memory corruption issue. There have been plenty like it, so exploit writers likely have already a game plan how to write yet another exploit for this problem. ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By harrywaldron
  • Microsoft Security Updates – AUGUST 2018
    Below are key resources documenting this recent monthly Microsoft Patch Tuesday release https://isc.sans.edu/forums/diary/Microsoft+August+2018+Patch+Tuesday/23986/ https://patchtuesdaydashboard.com/ https://blog.talosintelligence.com/2018/08/ms-tuesday.html https://portal.msrc.microsoft.com/en-us/security-guidance/summary Microsoft released its monthly set of security advisories today for vulnerabilities that have been identified and addressed in various products. This month’s advisory release addresses 62 new vulnerabilities, 20 of which are rated “critical,” 38 that are rated “important,” one that is rated moderate and one that is rated as low severity. These vulnerabilities impact Windows Operating System, Edge and Internet Explorer, along with several other products. In addition to the 60 vulnerabilities referenced above, Microsoft has also released a critical update advisory, ADV180020 which addresses the vulnerabilities described in the Adobe Flash Security Bulletin APSB18-25.  This month, Microsoft is addressing 20 vulnerabilities that are rated “critical.” Talos believes 10 of these are notable and require prompt attention. ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By harrywaldron
  • Read only and constant variables
    When you create a variable you usually want to be able to change its value – the clue is in the term variable. Sometimes though you might want to use a value that doesn’t change – you want read only and constant variables. Standard variables are changeable: PS> $x = 10 PS> $x 10 PS> $x += 5 PS> $x 15 PS> $x -= 3 PS> $x 12   The variable holds a value that can be changed to match your needs. Another example is the variable used in a for loop: PS> for ($i=1; $i -lt 6; $i++){$i} 1 2 3 4 5   If you want to use a value in your code that is pre-set and doesn’t change you have a couple of options – read only variables and constants. To create a read only variable use New-variable with the ReadOnly option PS> New-Variable -Name x -Value 10 -Option ReadOnly PS> $x 10   Now if you try to change the value PS> $x += 5 Cannot overwrite variable x because it is read-only or constant. At line:1 char:1 + $x += 5 + ~~~~~~~ + CategoryInfo : WriteError: (x:String) [], SessionStateUnauthorizedAccessException + FullyQualifiedErrorId : VariableNotWritable   ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By richardsiddaway
  • Removal instructions for goDownload Search Plus
    What is goDownload Search Plus? The Malwarebytes research team has determined that goDownload Search Plus is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements. https://forums.malwarebytes.com/topic/235273-removal-instructions-for-godownload-search-plus/ ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By don
  • Microsoft Security Advisory Notification Issued: August 15, 2018
    Security Advisories Released or Updated on August 15, 2018 * Microsoft Security Advisory ADV180002 – Title: Guidance to mitigate speculative execution side-channel vulnerabilities – https://portal.msrc.microsoft.com/en-us/security-guidance/ advisory/ADV180002 – Reason for Revision: Updated FAQ #18 to announce that with the Windows security updates released on Augus 18, 2918, Microsoft is providing the solution for customers with AMD-based devices who experienced high CPU utilization after installing the June or July security updates and updated microcode from AMD. Microsoft recommends that these customers install the August Windows secrurity updates and re-enable the Spectre Variant 2 mitigations if they were previously disabled. This solution is available in the August Windows security updates for: Windows 10 version 1607. Windows 10 version 1709. Windows 10 version 1803, Windows 7 Service Pack 1, Windows Server 2016, Windows Server, version 1709 (Server Core Installation), Windows Server, version 1803 (Server Core Installation), and Windows Server 2008 R2 Service Pack 1. The FAQ will be updated as further updates become available. – Originally posted: January 3, 2018 – Updated: August 15, 2018 – Version: 24.0 * Microsoft Security Advisory ADV180021 – Title: Microsoft Office Defense in Depth Update – https://portal.msrc.microsoft.com/en-us/security-guidance/ advisory/ADV180021 – Reason for Revision: Information published. – Originally posted: August ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By don
  • Microsoft Security Update Releases Issued: August 15, 2018
    Summary The following CVEs have undergone a major revision increment: * CVE-2018-8202 * CVE-2018-8284 Revision Information: – CVE-2018-8202 | .NET Framework Elevation of Privilege Vulnerability – https://portal.msrc.microsoft.com/en-us/security-guidance – Reason for Revision: Microsoft is releasing the August Monthly Rollup, Security Only, and Security Updates to fully resolve known issues some customers experienced after installing the July security updates for .NET Framework. Customers who installed either the Standalone updates or Alternate Cumulative update should also install the August updates. See the Affected Products table for links to download and install the August updates. – Originally posted: July 10, 2018 – Updated: August 15, 2018 – Aggregate CVE Severity Rating: Important – Version: 5.0 – CVE-2018-8284 | .NET Framework Remote Code Injection Vulnerability – https://portal.msrc.microsoft.com/en-us/security-guidance – Reason for Revision: Updated the Affected Products to include affected versions of Microsoft SharePoint Server, Microsoft SharePoint Foundation, Microsoft SharePoint Enterprise Server, and Microsoft Project Server. Customers running any of the SharePoint products listed in the Affected Products table and who are also running any affected versions of .NET Framework need to install the security updates for the versions of .NET running on their system to be fully protected from this vulnerability. – Originally posted: July 10, ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By don
  • Intuit accelerating move to the cloud
    Intuit Accelerates Cloud Strategy, Sells Data Center Just what I wanted… My tax info in AWS.. ... read more
    Source: Latest Blog PostsPublished on Thursday, August 16, 2018By hankshelp

Windows 10 users (16299.334 and higher) – Get the latest articles from MSMVPs.com bloggers with our Progressive Web App.

Available in the Windows Store

https://www.microsoft.com/en-us/store/p/msmvps/9pj5grdshnz1?rtc=1 – Pin to your Start menu and/or Taskbar.

Questions? Contact Susan at Susan-at-msmvps.com or Barb-at-msmvps.com. Each post's copyright held by the original author. All rights reserved. Blog site is an independent site not sponsored by Microsoft.


Our servers would like to thank www.ownwebnow.com and www.exchangedefender.com . We wouldn't be here without the generosity of Vlad Mazek and his companies.