In earlier versions of Windows, I – and I would assume many with me – used the Startup folder in the Start menu to manage startup applications. In Windows 10, however, this folder is no more, and so we must find other ways of dealing with them. There are three ways to do so, all of which are relevant.
Thoughts on many things Posts
A couple of months ago, a customer sent us a ticket, complaining that a mail group was incomplete. Specifically, his manager was not listed among the recipients. The mail group in question contained all managers, and membership was gained through dedicated active directory (AD) organisational units (OUs), one for the manager of each business unit (BU). I checked the Exchange address book in Outlook, and sure enough; the manager group for his BU was not listed among the recipients.
Some time ago, a user sent a request specifically for a new shared mailbox, that all users should be able to access. When we asked why they didn’t simply use one of the already existing addresses for the use, they said something to the effect that, while there should be no restrictions on accessing the mailbox, only those who wanted to receive email to it should do so. At this point, we started questioning why they had ordered a shared mailbox, rather than a mail group.
As much as we might want to prevent them by policies, odds are that a shared user account will be created at some point. In order to mitigate the potential issues with such accounts (lack of accountability, lack of control, account available to just about anyone to mention a few), there are a number of steps we can take, including limiting what network shares can be accessed, logon hours, and what computers the account may log on to. By default, user accounts can log on to all computers in Active Directory. This can be limited on a per-user basis. Here is how:
There is an encryption policy in effect, limiting writing to flash drives to those drives that are encrypted with BitLocker. From time to time, a user will call in, reporting that the encryption process has stalled, and does not seem to want to continue. Invariably, this occurs on drives that already contain data, and the encryption stalls when the process starts encountering actual data. A workaround is easy enough to enact, if a bit fiddly. Here’s how:
Some time ago, one of my friends posted a link to an article called “6 Reasons Why Being Called a Cis Person Is Not ‘Oppressive’“, which made me think. In general, I think that the author is getting things mostly right, but their conclusion seems to me to be off the mark, and badly so. I will freely admit that I am of two minds here. One part of me is “well, cisgender is not hate speech”, whereas the other part is “offense is defined, not by the offender, but by the person who is being offended”. I would like to expand on that.
When I edit videos, I keep meticulous notes on where any third party content comes from, and note it in the description of my video. Even so, I have had copyright claims made against my videos, mostly regarding the music I use. These claims can be obnoxious, though I don’t necessarily agree that there’s any merit to claims that they are scams. At any rate, when a claim is made, you need to file a dispute, detailing where the music is sourced from.
As some of you may have noticed, my old posts now feature the following notice:
To transfer notes from GMail to Google Keep as demonstrated last week, I had to grant access to my Google account to a third-party application. While I was happy to do so to accomplish what I wanted, once that had been done, I no longer saw any value (and indeed quite a bit of inherent risk) in allowing the application continued access. Call me paranoid if you wish, but I prefer it that as few people as possible have access to my accounts. Luckily, revoking access is simply achieved:
While I have a number of software tools that I use and like, I do like trying out alternatives. Sometimes the alternatives supercede the tool I used to use, sometimes I revert to the old tool, and sometimes I go forward using both. Back in November, I started using Google Keep, wanting to see if it did what I needed it for. The first thing I noticed, was that there was no way for me to import stuff from my GMail, where a number of my notes were stored. Luckily, the internet had the answer – simply install a plugin in Google Chrome and run the import. Here are the detailed instructions, by Jimmy Patrick on Quora: