Skip to content

Thoughts on many things Posts

iPhone: Using Apple Pay with facial recognition

I enabled Apple Pay on my iPhone shortly after it became available in Norway. Some time after that, however, I was pickpocketed, and got a new phone. While my previous one was one of the models with a fingerprint scanner, I replaced it with one with facial recognition. It took me a little while to figure out how to use Apple Pay with it. In case someone else are in that same situation.

Leave a Comment

Replacing Premiere Pro

When I wrote my series on a video editing workflow back in 2017, I had settled on Adobe Premiere Pro as my video editing suite of choice. Despite the rather hefty price tag, I felt the toolset it provided me with – particularly the ability to synchronise clips based on audio profile – was worth it. Since then, I started encountering some usability bugs when editing clips from certain cameras, and let multi-cam support be multi-cam support, replacing it entirely with iMovie.

Leave a Comment

Information management: Need To Know -v- Free Access

In security thinking, there are two basic concepts of access. One is Need To Know, the other is Free Access. Under Need To Know, access is only granted to those who have a specific need to access the information, regardless of what the information is. This should be familiar from all too many movies and TV shows, where the protagonist demands access to files, and is told “You don’t have a need to know”.

Leave a Comment

PowerShell: Check Remote Computer Disk Capacity

From time to time, I get tickets where one of many possible root causes may be a full disk. While accessing this information over RDP is often an option, it is rather more intrusive than needed. What’s more, I usually don’t have access to access file servers over RDP. Enter PowerShell and the get-WmiObject query!

Leave a Comment

Outlook: Mail merge

I have previously written about one of my many responsibilities; contacting users whose login credentials have shown up in breach lists. While the pertinent results of the breach files are delivered to me in a flat file, I use Excel’s Text to Columns feature to separate logins (usually email addresses) from the password. While this might take a little fiddling with the delimiters, it is worth it to ensure that you have a good basis on which to work.

Leave a Comment

Outlook: Offline Mode

From time to time, I need to run Outlook in Offline Mode. This is usually the case when I want to ensure that a mail merge has worked successfully. It is also a good option to reduce data usage when on mobile networks. Going to Offline Mode is straight forward. In Outlook, go to the Send/Receive tab, and then click “Work Offline”:

Leave a Comment

Excel: Text to Columns

I work a lot with text files containing data which is, to some degree or another, structured. Whether a breach file from a published breach, or the result of a powershell query such as Get-ADUser, Get-ADComputer, or Get-ADDirectReports, I need to separate the data into columns so that I can work with it. This is where the Text to Columns feature in Excel comes in handy.

Leave a Comment