Over the past couple of weeks, a story has been breaking that video conferencing vendor Zoom leaves a back door on your Mac when uninstalling it, which will let them run their service and reinstall that much quicker in the future. For details, I recommend this Medium article.
Category: How To
I could have sworn I wrote about this years ago. When I looked for it the other day, however, I couldn’t find it, so here goes. I love the fact that Google Chrome has combined the search and address bars into one cohesive unit. While it does, on occasion, mean that I search when I mean to enter an address, that is preferable to having that piece of monitor real estate split into two.
As has been the case so many times before, this week I’m bringing you the direct result of a customer request. The customer in question needed to know how to run a .ps1 script. As you may or may not know, double-clicking the script defaults to editing the script. At any rate, here’s how you do it:
Email has long been a vector for more or less targeted attacks such as virus attacks, phishing, and spearphising. In my years of working in IT, I have seen a number of examples of this, including one which in effect took down most of the fileshare in a corporate environment for as much as a week while we were restoring from backup.
Many companies, my employer included, uses spreadsheets on a more or less consistent basis in order to track such things as vacation planning and KPI reporting. For me, as an employee, keeping track of these spreadsheets can, from time to time, be a bit annoying. Much to my surprise, at some point in the past few years, Microsoft added a pin item feature to MS Office.
I’ve been using Adobe Premiere pro for a while now, but am finding that I can’t really defend the cost of Adobe Creative Cloud. While having multicamera support has been very nice, the product quite simply is cost prohibitive for me, especially as it really only offers a single feature I need; the ability to sync clips based on their audio. For my needs, iMovie will suffice.
In the past year or so, I have been using Twitter a fair amount, and I have found that, despite all of the systemic issues of bullying and harassment, there are also plenty of communities from which to learn, exchange ideas, and commiserate. From time to time, I need to find a specific tweet, and have taken to using a few searches, filters, and operators to find what I need:
I am a big believer in the principle of putting information out there, for the world to see. This blog is part of pursuing the goal of achieving just that. It made sense to me, then, to ensure that the data from my weather station would be made available to as many people as possible.
Every so often, a customer will call in, saying that they are unable to access one of the servers that are mapped through their login script. There are generally two reasons for this; either there’s an issue with the network connection, or the drive letter is already being used for another device. To troubleshoot the issue, then, we start by confirming that the computer is online, and then have the customer log off and back on again. ‘
I am, with surprising regularity, faced with the need to access UNC paths from the command line, as that is perhaps pretty much the quickest way to browse to network shares with a different user than the one currently logged in. There’s just one issue: the Windows command line does not support UNC paths from the cd/chdir command. There is, however, a way to work around this issue; by creating a temporary virtual drive.