Like many others, my work days are – to some extent – made up of meetings with others. It’s not uncommon for these meetings not to have an assigned meeting room, and I find it annoying that Outlook asks me if I want to enter a meeting location:
Thoughts on many things Posts
I enabled Apple Pay on my iPhone shortly after it became available in Norway. Some time after that, however, I was pickpocketed, and got a new phone. While my previous one was one of the models with a fingerprint scanner, I replaced it with one with facial recognition. It took me a little while to figure out how to use Apple Pay with it. In case someone else are in that same situation.
When I wrote my series on a video editing workflow back in 2017, I had settled on Adobe Premiere Pro as my video editing suite of choice. Despite the rather hefty price tag, I felt the toolset it provided me with – particularly the ability to synchronise clips based on audio profile – was worth it. Since then, I started encountering some usability bugs when editing clips from certain cameras, and let multi-cam support be multi-cam support, replacing it entirely with iMovie.
As long-time readers of the blog will know, I have owned, and thoroughly enjoyed, several pairs of Bose headphones. After over three years of more or less daily use and abuse, my last pair of QC35s had started acting up. When a local store ran a good offer on a pair of NC700, I went for it. Here are my thoughts.
If you’re like me, you use the run menu. A lot. One of the features I like about the run menu is that it stores your recently used commands in a list, called the Most Recently Used list (MRU for short). From time to time, I like to remove superfluous items from that list. Here’s how:
In security thinking, there are two basic concepts of access. One is Need To Know, the other is Free Access. Under Need To Know, access is only granted to those who have a specific need to access the information, regardless of what the information is. This should be familiar from all too many movies and TV shows, where the protagonist demands access to files, and is told “You don’t have a need to know”.
From time to time, I get tickets where one of many possible root causes may be a full disk. While accessing this information over RDP is often an option, it is rather more intrusive than needed. What’s more, I usually don’t have access to access file servers over RDP. Enter PowerShell and the
I have previously written about one of my many responsibilities; contacting users whose login credentials have shown up in breach lists. While the pertinent results of the breach files are delivered to me in a flat file, I use Excel’s Text to Columns feature to separate logins (usually email addresses) from the password. While this might take a little fiddling with the delimiters, it is worth it to ensure that you have a good basis on which to work.
From time to time, I need to run Outlook in Offline Mode. This is usually the case when I want to ensure that a mail merge has worked successfully. It is also a good option to reduce data usage when on mobile networks. Going to Offline Mode is straight forward. In Outlook, go to the Send/Receive tab, and then click “Work Offline”:
I work a lot with text files containing data which is, to some degree or another, structured. Whether a breach file from a published breach, or the result of a powershell query such as Get-ADUser, Get-ADComputer, or Get-ADDirectReports, I need to separate the data into columns so that I can work with it. This is where the Text to Columns feature in Excel comes in handy.