Like many others, my work days are – to some extent – made up of meetings with others. It’s not uncommon for these meetings not to have an assigned meeting room, and I find it annoying that Outlook asks me if I want to enter a meeting location:
Category: How To
I enabled Apple Pay on my iPhone shortly after it became available in Norway. Some time after that, however, I was pickpocketed, and got a new phone. While my previous one was one of the models with a fingerprint scanner, I replaced it with one with facial recognition. It took me a little while to figure out how to use Apple Pay with it. In case someone else are in that same situation.
If you’re like me, you use the run menu. A lot. One of the features I like about the run menu is that it stores your recently used commands in a list, called the Most Recently Used list (MRU for short). From time to time, I like to remove superfluous items from that list. Here’s how:
From time to time, I get tickets where one of many possible root causes may be a full disk. While accessing this information over RDP is often an option, it is rather more intrusive than needed. What’s more, I usually don’t have access to access file servers over RDP. Enter PowerShell and the
I have previously written about one of my many responsibilities; contacting users whose login credentials have shown up in breach lists. While the pertinent results of the breach files are delivered to me in a flat file, I use Excel’s Text to Columns feature to separate logins (usually email addresses) from the password. While this might take a little fiddling with the delimiters, it is worth it to ensure that you have a good basis on which to work.
From time to time, I need to run Outlook in Offline Mode. This is usually the case when I want to ensure that a mail merge has worked successfully. It is also a good option to reduce data usage when on mobile networks. Going to Offline Mode is straight forward. In Outlook, go to the Send/Receive tab, and then click “Work Offline”:
I work a lot with text files containing data which is, to some degree or another, structured. Whether a breach file from a published breach, or the result of a powershell query such as Get-ADUser, Get-ADComputer, or Get-ADDirectReports, I need to separate the data into columns so that I can work with it. This is where the Text to Columns feature in Excel comes in handy.
A little while ago, I had a user call in and ask when their password would expire. Luckily, this information is readily accessible if you know where – and how – to look. Here’s how:
With some regularity, I find myself needing to fetch information from the BIOS of a client computer, preferably without having to go onsite to do so. This may be because I need to know what BIOS version the client is running, the serial number of the computer, or when it was manufactured. If you’re running SCCM (System Center Configuration Manager), this is relatively easily done. Here’s how:
Back in December, I showed you how to install RSAT on a Windows client. As you will have seen, the method depends on what version of Windows the client is running, which means that correctly identifying the version running is somewhat important (although trial and error does work – eventually).