Latest Posts from all MSMVPS.COM blogs

  • Creating objects
    In my recent post about avoiding Add-Member I showed how to create objects. As with most things in PowerShell there are a number of different ways of creating objects. I showed this code: $os = Get-CimInstance -ClassName Win32_OperatingSystem $comp = Get-CimInstance -ClassName Win32_ComputerSystem $props = @{ OS = $os.Caption Version = $os.Version Name = $comp.Caption Manufacturer = $comp.Manufacturer Model = $comp.Model } $op = New-Object -TypeName PSObject -Property $props $op   A number of comments objected to this saying I should have used: $os = Get-CimInstance -ClassName Win32_OperatingSystem $comp = Get-CimInstance -ClassName Win32_ComputerSystem $op = [pscustomobject]@{ OS = $os.Caption Version = $os.Version Name = $comp.Caption Manufacturer = $comp.Manufacturer Model = $comp.Model } $op   In PowerShell v3 s you gained the option to directly create the object by using a type declaration as shown. There’s a couple of advantages – it’s slightly less typing and it preserves the order of the properties as if you’d used an ordered hashtable.   The disadvantage to my mind is that you have to remember to use [pscustomobject] which is a placeholder for PSObject. You have to do it this way because you’re effectively using the PSObject constructor with no parameters.   There are ... read more
    Source: Latest Blog PostsPublished on Thursday, June 21, 2018By richardsiddaway
  • Removal instructions for Spyware Clear
    What is Spyware Clear? The Malwarebytes research team has determined that Spyware Clear is a “system optimizer”. These so-called “system optimizers” use intentional false positives to convince users that their systems have problems. Then they try to sell you their software, claiming it will remove these problems. https://forums.malwarebytes.com/topic/231898-removal-instructions-for-spyware-clear/ ... read more
    Source: Latest Blog PostsPublished on Thursday, June 21, 2018By don
  • How to Change User Account Control (UAC) prompt Behavior for Standard Users in Windows
    When User Account Control (UAC) is enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed or run. With the Always notify or Default UAC setting enabled, your desktop will be dimmed and switched to the secure desktop when you get an elevation request by the User Account Control (UAC) prompt. A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 automatically prompts the user for Y/N approval. This prompt is called an elevation prompt for UAC consent prompt. The user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By Brink
  • How to Change User Account Control (UAC) prompt Behavior for Administrators in Windows
    When User Account Control (UAC) is enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed or run. With the Always notify or Default UAC setting enabled, your desktop will be dimmed and switched to the secure desktop when you get an elevation request by the User Account Control (UAC) prompt. A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 automatically prompts the user for Y/N approval. This prompt is called an elevation prompt for UAC consent prompt. The user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By Brink
  • How to Enable or Disable User Account Control (UAC) prompt for Built-in Administrator in Windows
    When User Account Control (UAC) is enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed or run. With the Always notify or Default UAC setting enabled, your desktop will be dimmed and switched to the secure desktop when you get an elevation request by the User Account Control (UAC) prompt. A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 automatically prompts the user for Y/N approval. This prompt is called an elevation prompt for UAC consent prompt. The user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By Brink
  • Windows 10 – Never uninstall Microsoft Store facility
    The “Microsoft Store” component of Windows 10 is built in as a vital communications function.  Some users may wish to remove this facility (e.g., sometimes there is minor amount of advertising in this “sales-like” facility; or they feel they would never use it).  The proper approach for the “store” is to corporately block access or for users to simply ignore infrequent communications from this facility. Removing, uninstalling, or reinstalling Microsoft Store application in Windows 10 is not supported as documented below. It will break WIN10 and a re-install of complete O/S is required.  https://support.microsoft.com/en-us/help/4339074/removing-uninstalling-reinstalling-microsoft-store-app-not-supported In Windows 10, we do not recommend removing or uninstalling the Microsoft Store app.  This behavior is by design. If you uninstalled Microsoft Store by any means and want to reinstall it, the only Microsoft-supported method is to reset or reinstall the operating system, which will reinstall Microsoft Store. IT professionals can configure, limit, or block access to Microsoft Store for client computers. See the following article for more information: https://docs.microsoft.com/en-us/windows/configuration/stop-employees-from-using-microsoft-store ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By harrywaldron
  • Multi Instancing in UWP
    One thing that went unnoticed in the last post is that the console app is multi-instance: if you click in the live tile or in the start menu, instead of bringing the same app to the front, you are opening a new window and running a new instance of it. This is something new for UWP apps: until now, you could only have one instance of the app running in your machine. While this works for many apps, when you are developing an LOB app, for example, you may need to open more than one instance and that can be limiting. The SDK released in the Aril 2018 update allow you to create multi instanced apps. Single instance apps The default UWP apps have a single instance. When you activate it for the first time, it opens the main window and runs the app. After the second call, the same app is activated and you can handle the activation in the OnLaunched method, like this: private int _activationNo; /// <summary> /// Invoked when the application is launched normally by the end user.  Other entry points /// will be used such as when the application is launched to open a specific file. /// </summary> /// <param name="e">Details about the launch request and process.</param> protected override void OnLaunched(LaunchActivatedEventArgs e) {     Frame rootFrame = Window.Current.Content as Frame;     // Do not repeat app initialization when the Window already has content,     // just ensure that the window is active     if (rootFrame == null)     {         // Create a Frame to act as the navigation context and navigate to the first page         rootFrame = new Frame();         rootFrame.NavigationFailed += OnNavigationFailed;         if (e.PreviousExecutionState == ApplicationExecutionState.Terminated)         {             //TODO: Load state from previously suspended application         }         // Place the frame in the current Window         Window.Current.Content = rootFrame;     }     if (e.PrelaunchActivated == false)     {         if (rootFrame.Content == null)         {             // When the navigation stack isn't restored navigate to the first page,             // configuring the new page by passing required information as a navigation             // parameter             rootFrame.Navigate(typeof(MainPage), e.Arguments);         }         if (rootFrame.Content is MainPage page)             page.MainText =                  $"Activation# {++_activationNo}";         // Ensure the current window is active         Window.Current.Activate(); ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By bsonnino
  • Windows server 2019 preview build 17962
    The availability of Windows server 2019 preview build 17962 has been announced.   Also available is:   A preview of Hyper-V Server 2019   System Insights – a new feature bringing local predictive analytical capabilities to Windows Server. Systems Insights is managed through Windows Admin Center or PowerShell   Server Core App Compatibility on Demand – includes ability to install system components that need some of the GUI capabilities not present on server core including MMC, perfmon, sysinternals tools and PowerShell ISE   A new preview of Windows Admin Center (WAC was formerly known as project Honolulu)   I’m not a big fan of WAC – its perpetuating the GUI based focus of admin tools. One good thing in this preview is that the underlying PowerShell scripts are know visible. This may just make it useful as a learning tool in the same way that the AD Adninistrative center is a way to learn how to manage AD with PowerShell ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By richardsiddaway
  • Spybot Search & Destroy Weekly Update – June 20, 2018
    Spybot Search & Destroy Weekly Update – June 20, 2018 2018-06-20Adware + Ad.InstallBrain + AirAdInstaller + Win32.InCoreDialer + Dialer_XXPUPS + DealPly + PU.AdvanceSystemCare ++ PU.Mindspark.RecipeSearch ++ PU.Polarity.FileConverter + PU.RealTimeGaming ++ PU.SpeedAnalysis4Spyware + Conducent.TimeSinkTrojans ++ BadRAT + Java.Adwind + Win32.Agent.gaa + Win32.VB.ikTotal: 2642319 fingerprints in 853352 rules for 8231 products. »www.safer-networking.org ··· updates/ ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By don
  • Removal instructions for Screen Watch
    What is Screen Watch? The Malwarebytes research team has determined that Screen Watch is a browser NewTab. These so-called “NewTabs” can manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. https://forums.malwarebytes.com/topic/231834-removal-instructions-for-screen-watch/ ... read more
    Source: Latest Blog PostsPublished on Wednesday, June 20, 2018By don
  • SharePoint REST API and Lists with Folders : A Redux
    Last July I wrote a blog post on the PAIT Group blog entitled SharePoint REST API and Lists with Folders. I wrote the post because the REST API has incomplete support for folders in lists and a lot of people were having problems trying to figure out how to perform common tasks. The two main culprits were creating new folders and adding items into a folder. I was recently going over some forum questions and I saw one on creating list items in a folder. One of the answers to the post mentioned using the SharePoint 2010 REST API to solve the problem. This hadn’t occurred to me previously but it turns out that using the SharePoint 2010 REST API makes the tasks of folder creation and adding items to a folder easy peasy. Adding a Folder In the code below I’m adding a Folder named Folder 99 to the root folder of a list named FolderTest. The ContentTypeID property of the message body indicates that I want to create a folder and the Path property of the message body identifies the parent folder for this new folder. function addFolderButtonClick() { var call = jQuery.ajax({ url: _spPageContextInfo.webAbsoluteUrl + "/_vti_bin/ListData.svc/FolderTest", type: "POST", ... read more
    Source: Latest Blog PostsPublished on Tuesday, June 19, 2018By Rob Windsor
  • Announcing Windows Server 2019 Insider Preview Build 17692
    Hello #WindowsInsiders, we have released Windows Server 2019 Insider Preview Build 17692 https://t.co/x9nKuLuWlY — Dona @ #InsiderDevTour (@donasarkar) June 19, 2018 ... read more
    Source: Latest Blog PostsPublished on Tuesday, June 19, 2018By don
  • Avoid Add-Member
    There’s a huge amount of code still being created that looks like this: $os = Get-WmiObject -Class Win32_OperatingSystem $comp = Get-WmiObject -Class Win32_ComputerSystem $op = New-Object -TypeName PSObject | Add-Member -MemberType NoteProperty -Name OS -Value $os.Caption -PassThru | Add-Member -MemberType NoteProperty -Name Version -Value $os.Version -PassThru | Add-Member -MemberType NoteProperty -Name Name -Value $comp.Caption -PassThru | Add-Member -MemberType NoteProperty -Name Manufacturer -Value $comp.Manufacturer -PassThru | Add-Member -MemberType NoteProperty -Name Model -Value $comp.Model -PassThru $op   Some data is acquired and a custom object is created for the output. In this case an empty object is created and Add-Member is used to create and populate the object’s properties.   The best thing that can be said about this method is that it works. This method is a hang over from the early days of PowerShell. It’s about time that people moved on and learned how to do this properly.   NOTE: Get-CimInstance should be used these days instead of Get-WmiObject as the WMI cmdlets aren’t available in PowerShell v6.0 and are effectively deprecated.   Instead of using Add-Member use a hash table to create and populate the properties: $os = Get-CimInstance -ClassName Win32_OperatingSystem $comp = Get-CimInstance -ClassName Win32_ComputerSystem $props = @{ ... read more
    Source: Latest Blog PostsPublished on Tuesday, June 19, 2018By richardsiddaway
  • Microsoft Security Advisory Notification Issued: June 19, 2018
    Security Advisories Released or Updated on June 19, 2018 * Microsoft Security Advisory ADV180010 – Title: June 2018 Oracle Outside In Library Security Update – »portal.msrc.microsoft.co ··· DV180010 – Reason for Revision: Information published. – Originally posted: June 19, 2018 – Updated: N/A – Version: 1.0 ... read more
    Source: Latest Blog PostsPublished on Tuesday, June 19, 2018By don
  • Removal instructions for Quick Speedup 2018
    What is Quick Speedup 2018? The Malwarebytes research team has determined that Quick Speedup 2018 is a “system optimizer”. These so-called “system optimizers” use intentional false positives to convince users that their systems have problems. Then they try to sell you their software, claiming it will remove these problems. https://forums.malwarebytes.com/topic/231793-removal-instructions-for-quick-speedup-2018/ ... read more
    Source: Latest Blog PostsPublished on Tuesday, June 19, 2018By don
  • Google to Fix Location Data Leak in Google Home, Chromecast
    Source: Latest Blog PostsPublished on Tuesday, June 19, 2018By hankshelp
  • How to Enable or Disable Dimmed Secure Desktop for UAC prompt in Windows
    When User Account Control (UAC) is enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed or run. With the Always notify or Default UAC setting enabled, your desktop will be dimmed and switched to the secure desktop when you get an elevation request by the User Account Control (UAC) prompt. A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 automatically prompts the user for Y/N approval. This prompt is called an elevation prompt for UAC consent prompt. The user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily ... read more
    Source: Latest Blog PostsPublished on Monday, June 18, 2018By Brink
  • Leadership – Three techniques for executive networking
    The John Maxwell leadership training center shares 3 valuable techniques for executive networking, which can enhance corporate goals & vision at higher levels in the organization: http://johnmaxwellcompany.com/blog/how-to-improve-your-executive-networking-skills Executive networking is a crucial component of corporate leadership. A great leader prioritizes relationships and recognizes that these relationships — those with employees, with business partners, with potential clients — are what determine the success or demise of a company. 1. FIND THE COMMON GROUND – Find a common point of interest, and your conversations will feel less forced. Talking with professionals can feel tricky if you only talk about their industry, or credentials. Remember that all successful people are first, and foremost, people and have families, interests, likes and dislikes. If you try and connect with someone over just their title, you won’t get very far. 2. CONSIDER WHAT YOU CAN GIVE – When your goal is to serve others, your focus is turned outward and suddenly your efforts have true meaning and purpose that are tied to something larger than just yourself. You will be a more effective leader within your company by knowing your employees and understanding their interests and talents, as well as helping them realize their own special ... read more
    Source: Latest Blog PostsPublished on Monday, June 18, 2018By harrywaldron
  • How to Enable or Disable User Account Control (UAC) in Windows
    When User Account Control (UAC) is enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed or run. A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 automatically prompts the user for Y/N approval. This prompt is called an elevation prompt for UAC consent prompt. The user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily perform an administrative task by entering valid credentials for a local administrator account. The default, built-in UAC elevation component for standard users is the UAC credential prompt. This tutorial will show you how ... read more
    Source: Latest Blog PostsPublished on Monday, June 18, 2018By Brink
  • How to Enable or Disable Ctrl+Alt+Delete Secure Desktop for UAC prompt in Windows
    When User Account Control (UAC) is enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed or run. A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 automatically prompts the user for Y/N approval. This prompt is called an elevation prompt for UAC consent prompt. The user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily perform an administrative task by entering valid credentials for a local administrator account. The default, built-in UAC elevation component for standard users is the UAC credential prompt. See also: How User Account Control ... read more
    Source: Latest Blog PostsPublished on Monday, June 18, 2018By Brink
  • Mobile Browsers – Malicious JavaScript redirects to spam sites
    The SANS Internet Storm center shares an awareness that malware actively circulates in mobile vector, which a new Javascript that uses hexadecimal coding to hide in an obfuscated manner https://isc.sans.edu/forums/diary/Malicious+JavaScript+Targeting+Mobile+Browsers/23778/ A reader reported a suspicious piece of a Javascript code that was found on a website. In the meantime, the compromized website has been cleaned but it was running WordPress. The de-obfuscation is quite easy to perform. The most interesting part is in the array of hex-encoded strings. This code performs some verifications. If the following conditions are met, a cookie is created and the visitor is redirected to the URL present in the code. * The cookie does not exist yet * The visitor is not the Google crawler * The visitor is using a mobile device/browser Nothing really malicious here, the visitor is redirected to a bunch of spam websites but keep in mind that such websites can also deliver much more malicious content like an exploit kit (it was not the case here). ... read more
    Source: Latest Blog PostsPublished on Monday, June 18, 2018By harrywaldron
  • Removal instructions for Search Inspired
    What is Search Inspired? The Malwarebytes research team has determined that Search Inspired is a browser hijacker. These so-called “hijackers” manipulate your browser(s), for example to change your startpage or searchscopes, so that the affected browser visits their site or one of their choice. This one also displays advertisements. https://forums.malwarebytes.com/topic/231743-removal-instructions-for-search-inspired/ ... read more
    Source: Latest Blog PostsPublished on Monday, June 18, 2018By don
  • Cool Hardware Chart
    Don’t know if it’s worth $43 for a matte copy, but lots of good info.. Computer Hardware Chart 2.0 ... read more
    Source: Latest Blog PostsPublished on Monday, June 18, 2018By hankshelp
  • How to Hide or Show Administrators in UAC prompt for Standard Users in Windows
    When User Account Control (UAC) is enabled, Windows prompts for consent or prompts for credentials of a valid local administrator account before starting a program or task that requires a full administrator access token. This prompt ensures that no malicious software can be silently installed. A user that is a member of the Administrators group can log on, browse the Web, and read e-mail while using a standard user access token. When the administrator needs to perform a task that requires the administrator access token, Windows 10 automatically prompts the user for Y/N approval. This prompt is called an elevation prompt (UAC). When UAC is enabled, the user experience for standard users is different from that of administrators in Admin Approval Mode. The recommended and more secure method of running Windows 10 is to make your primary user account a standard user account. Running as a standard user helps to maximize security for a managed environment. With the built-in UAC elevation component, standard users can easily perform an administrative task by entering valid credentials for a local administrator account. The default, built-in UAC elevation component for standard users is the credential prompt. If you like, you can set a policy ... read more
    Source: Latest Blog PostsPublished on Sunday, June 17, 2018By Brink
  • Security Mailer Volume 18 Number 24
    Security Mailer V18 #24 Apple Security update for Xcode Browser Pale Moon update Linux updates Microsoft Tuesday updates advisories revisions General Security reviews last week, Update info for VPN Filter VMware Security Advisory Excel spreadsheet from Microsoft covering all the updates released on Tuesday ... read more
    Source: Latest Blog PostsPublished on Sunday, June 17, 2018By hankshelp

Windows 10 users (16299.334 and higher) – Get the latest articles from MSMVPs.com bloggers with our Progressive Web App.

Available in the Windows Store

https://www.microsoft.com/en-us/store/p/msmvps/9pj5grdshnz1?rtc=1 – Pin to your Start menu and/or Taskbar.

Questions? Contact Susan at Susan-at-msmvps.com or Barb-at-msmvps.com. Each post's copyright held by the original author. All rights reserved. Blog site is an independent site not sponsored by Microsoft.


Our servers would like to thank www.ownwebnow.com and www.exchangedefender.com . We wouldn't be here without the generosity of Vlad Mazek and his companies.