I had to figure this out for a client I’m working with, and in case any of you are Instagram addicts, here is what I found. Couple of updates on some of the comments here; Gramblr can get you banned because of misuse of the API, as mentioned online. Well, push.photo and deskgram use the SAME API; it says so right on their sites. It seems there are a bunch of apps that are essentially Gramblr knockoffs. So, if you’re using any of the tools that use the API, you can get banned. I haven’t used the Instapic app on windows, but I think it would be safe as it’s not using the API. The other non-API method is to use Bluestacks emulator, which is free. I don’t use Instagram myself a lot, but I had a client with some needs that forced me to figure this out and I posted a video here;
This is simply a quick video showing how to open the case on this HP Envy M6 AE 151 D laptop since there didn’t seem to be anything online. These were a pretty popular Black Friday sales item this year (2015) so there are probably a few people working on replacing the default mechanical 1 Tb drive with a SSD, adding memory, etc.
These came without a optical drive. The battery is NOT removable. But you can upgrade the battery also by opening the case. I’ve had a couple open replacing the drive with a SSD.
So I got a call tonight from those scammers that try to get you to let them connect to your computer. I
Microsoft scammers webpage
recorded the call if you want to listen to what it sounds like. I’m not as dumb as I sound on the audio; it was an act to drag it out and build rapport to try to get more information. It’s about 30 minutes. Everything I say on the call is made up; I was trying to stretch it out but finally I had other things to do. When I told him there was someone at the door I actually made me some dinner. This is actually a fairly unsophisticated attack, entirely based on social engineering and not technical. Some tips to avoid this type of attack, based on this call (based on my 20 years in IT, some in Director roles);
1) It was a blocked number on caller ID. This alone is already illegal.
2) Who INITIATED the call? If THEY initiated the call, you are at risk. If you have a problem with your computer, go fix it, don’t wait for someone legit to call you.
3) I it was pretty obvious it was a crowded, lots of background noise, and not very good English. A real Microsoft support person has a very professional demeanor.
4) Even without being technical, it was/should be a red flag when the Microsoft guy said they could also fix Apple. One guy said they COULD fix Android, one said they could not.
5) The website they directed me to was a “free” hosted website company. I have already contacted them, and the site is being shut down.
6) Technically; they ask you to open Event Viewer, and look at the Critical Events, and you’re supposed to get panicked, but there are ALWAYS bad looking events in there.
7) Then, they directed me to a website, which had several remote control links on it, I’m sure the next step was to get me to install one of them. The tools listed on that site; Teamviewer, Goto Meeting, etc, are legit tools, just being used for a scam.
8) I started asking about a phone number, for my “friends” to call them. They hung up. Most of their website and phone activity can be faked, but a call back number would be a way to identify them, and they knew it.
From what I’ve read, if it works, they get you to go to a Western Union site and send them money to pay for their “help” fixing your computer.
Here are two quick videos showing the install and first boot of Server 2016 Technical Release 4
Server 2016 Technical Review 4
This first video we install and boot to Core. Core is the default of the two options; Core or GUI. So, if you select all the defaults, you will have Core.
In this second video we install and boot to the GUI install.
If you remember the old process, you could set up one host, connect to the host with vSphere Client, and then import the .OVA and you’d be up and running in mere minutes.
Fortunately, the new process is almost as simple, as long as you get a couple of pieces right up front. Please watch the video from our YouTube Channel and we walk through the process. Essentially, you 1) download the .iso, 2) install the Client Integration Plugin and 3) install / push / import the VCSA to a host.
Desired State Configuration is a big part of most 2012 R2 certification tests; get an understanding from these 5 videos.
I have tried to arrange these in order; if you watch them in order, you should have a good basic understanding of DSC. It’s a very useful capability. The first two are approximately 1 hour each. DSC can do PUSH or PULL. Push would normally be ad hoc, test, or small needs. Most normal production use would be PULL.
Time = 1:09
Description; Targeted somewhat to developers; or with a dev mindset. Give a good overview of the design, deployment and possible uses. Lots of groundwork explanation. .MOF (Managed Object Format) file creation and use. This is a classroom recording, so there is some live Q & A.
VIDEO 2 – DSC is the ENDGAME for PowerShell
Time = 1:04
Published on May 19, 2014
Description; Windows PowerShell 4.0 introduces Desired State Configuration (DSC), and it’s time to put it to use. With DSC, you declaratively tell computers what you want them to look like, and how you want them to be configured, and let DSC make it happen and KEEP that configuration enforced. In this session, you not only see how DSC works, but you will be introduced to custom resource development, letting you start teaching; DSC how to configure internal applications, databases, and other infrastructure elements.
VIDEO 3 – More hands on and examples
Time = 1:17
Published on Nov 9, 2014
Description; Are you paying attention to DevOps? Adoption of DevOps practices can greatly improve your company’s deployment efficiency. PowerShell Desired State Configuration (DSC) helps teams take the management of their Windows-based infrastructure into the DevOps space by capturing their infrastructure as code. The declarative PowerShell model enables autonomous, idempotent, and transparent configuration and deployment of Windows infrastructure and components. Capturing infrastructure as code is not only a means to manage what they have, at scale and speed, it is also a way to decouple the complexity of their existing environment in order to facilitate a migration to the cloud. Come see how DSC works and how you can use it to make configuration of internal applications, databases, and other infrastructure elements more efficient.
VIDEO 4 – Use Powershell DSC to install SQL Server
Time = :14
Published on Dec 18, 2014
Description; I briefly show how powershell DSC can be used to configure and deploy a brand new SQL Server installation.
Instead of playing games with this process, someone there should step back and look at how this works from the customer’s perspective.
Google reviews still apparently has NO WAY to use a QR code to point customers directly to a review page. I have received two different confirmations of this from Google Support. In the past, this HAS been possible with Google Places, or straight links to a url. Now, this has all been broken with recent Google Business updates, and the push to the MAPS app. This is an incredible failure to support the local businesses, making it impossible to offer your customers a QR link where they can easily go straight to a review URL. QR codes have been around for over 20 years now, and various competitors (Yelp) DO offer this functionality, and it’s clearly time for Google to make this work consistently and reliable without forcing user to use an APP.
This is probably the biggest hurdle to adoption of Google Reviews and Google seems unaware or clueless about it. Google it; local business owners are frustrated by this gap, and looking for a solution.
In case anybody who matters at Google reads this, here is the problem statement; “As a business owner, I need a simple, quick, easy way to create a QR code that goes DIRECTLY to the review page (no additional clicks or links) and allows the user to post stars, and a review, WITHOUT any app, and on any platform (windows or mac pc, Android or Apple phone) or browser (Chrome, Firefox, IE, etc.)”.
Today the news came out that http://error.000webhost.com/ was hacked and 13,000,000 user’s information was released. This isn’t even the biggest breach. In order of size the Adobe breach was still the largest at 152,000,000. The site is now in “maintenance” mode for all, causing a lot of alarm with the user community.
The background of the issue, and the site’s reluctance to face the issue is outlined in numerous articles
Has my account been compromised or hacked? Look it up here.
What I do want to show you is a site or two that can tell you IF your data was included in any of the recent hacks. You can find out quickly here; https://haveibeenpwned.com/
Flashcard Sets for ITIL and PowerShell for 70-410, 411, 412, 417
I have created two flashcard sets at http://www.flashcardmachine.com/, one for ITIL Foundations terms (remember, no acronym memorization is needed for Foundations test).
ITIL – 52 flashcards on the key terms and definitions.
70-410, 411, 412 and 417 PowerShell commands.
You can review these online, or you can download an APP to study them on your phone. The app is
Flashcard Machine flashcards for ITIL and 70-410
called Flashcard Machine, and it’s FREE. To find my two flashcard sets search for these terms on FlashCardMachine.com;