Skip to content

Category: How To

Outlook: Offline Mode

From time to time, I need to run Outlook in Offline Mode. This is usually the case when I want to ensure that a mail merge has worked successfully. It is also a good option to reduce data usage when on mobile networks. Going to Offline Mode is straight forward. In Outlook, go to the Send/Receive tab, and then click “Work Offline”:

Leave a Comment

Excel: Text to Columns

I work a lot with text files containing data which is, to some degree or another, structured. Whether a breach file from a published breach, or the result of a powershell query such as Get-ADUser, Get-ADComputer, or Get-ADDirectReports, I need to separate the data into columns so that I can work with it. This is where the Text to Columns feature in Excel comes in handy.

Leave a Comment

SCCM: Find client BIOS information

With some regularity, I find myself needing to fetch information from the BIOS of a client computer, preferably without having to go onsite to do so. This may be because I need to know what BIOS version the client is running, the serial number of the computer, or when it was manufactured. If you’re running SCCM (System Center Configuration Manager), this is relatively easily done. Here’s how:

Leave a Comment

AD: Inspecting object attributes

A little while ago, I was asked about when a specific user last logged in with their active directory (AD) user account. While looking up that information was easily done, finding out how to look up the information was a mite more challenging. There are a number of ways of achieving it; including command line and Powershell commands. My preferred way of doing it is using the Attribute Editor in Active Directory Users and Computers (ADUC). Here’s how:

Leave a Comment

Excel: Highlight duplicates

Among my many areas of responsibility at work, is contacting all the users found in various data breach lists that our InfoSec team get their hands on (typically, these are the same lists that eventually make their way to HIBP). Not unsurprisingly, there is a significant amount of overlap between some of these lists, and one of the things I do is to ensure that I do not contact users about passwords I’ve already talked to them about.

Leave a Comment

View message headers

For most users, the message headers of any given email are irrelevant; the email has arrived, and that is all there is to say about that. It does, however, have applications both in IT support and in information security. While those applications are outside the scope of this article, accessing the message header is not.

Leave a Comment