With the number of fraudulant bids I’ve recently received when attempting to sell my iPhone I figured I would post a quick “how to” guide on securing a PayPal account.
The guide is quick and simple. Buy a key fob from PayPal. It’s $5 and worth every penny.
Link to buy PayPal Key Fob
I got this idea from geektechnicque.org. Full DIY details can be found bellow.
The apple symbol is lit indicating that the graphics chip is in fact now working. I purchased this iBook off ebay for $125 and fixed it for nearly nothing.
The Windows built in command “net user” allows modification of local account settings.
: Creates account and sets password + user full name & description
net user <username> <password> /ADD /fullname:"name" /comment:"description"
: Set Account Password to never expire and add account description
net user <username> /EXPIRES:NEVER /COMMENT:"<comment>"
net user <username> /ACTIVE:NO
net user <username> /DELETE
:Full net user configuration flags and options
net user /help
A few cautionary warnings… this script will delete files from whatever location you specify as LOGPATH. Use with care. As a best practice I always create my logs with a pre-fix. ex: CheckUpTime-.log which can then be used in the deletion script. This will ensure that you only delete logs that start with “CheckUpTime”.
:: Delete log files older then 14 days
:: Echo’s logs which will be deleted (use this before using the command which contains “del”)
forfiles -p %LOGPATH% -m CheckUpTime-*.* -d -14 -c “cmd /c echo 0x22@Path@File0x22”
:: Actual Delete Command (remove :: to run command)
::forfiles -p %LOGPATH% -m CheckUpTime-*.* -d -14 -c “cmd /c del /q @path”
After working in the tech industry for over 5 years I’ve started to notice a trend. The trend being that most individuals whether highly motivated or slovenly in their technical aspirations tend to horde information. Now you’re probably saying to yourself “information?” what type of information could people be hiding/hording?
To be more specific with any product or technical implementation there end up being a number of tips and tricks which arise through out the integration and general up keep. The documentation of these tips is seldom undertaken because people get caught up in the doing of the task and not focusing on the fact that they should also be documenting any shortcuts or lessons learned that may come up. Now… I just used the coined phrase that everyone out there either loathes or loves “lessons learned”. People either jump to the task of creating a lessons learned sheet or run for the hills. My version of a “lessons learned” document is one that begins when you start implementing a product and continues to grow over time as both you and the product mature. This makes the lessons learned document less of a chore and more of a reference guide that can be passed along to the next poor sap who has to use the product. It also allows you… YES YOU to be able to clear your brain of all that code and syntax BS that comes up. Bottom line you end up creating a product integration guide for the product which fits your company.
So, with every product that I come in contact with I create a document which covers all of the caviates that I run into with that product and how they have been dealt with in the product environment. It doesn’t have to be lengthly and there is no real scope.
This brings me to my next topic, product implementation and integration. We’ve all heard of it and we’ve all experienced it. It starts when some bloke comes into your organization and attempts to sell a product which is a catch all of sorts. The product is designed to make life easier by simplifying some task or objective which the company has been yearning (yeah right) to fix. In the end your management is so impressed they go out and buy the whole software suit with little input from anyone else (This issue I will address in a seperate post).
So… the product is now on your door step and surprise suprise you have been hand picked to implement it. Lets say it’s one of those products which pulls information from other products and makes sense of it. Whether it be SNMP trap interpretation, or host monitoring the product claims to be able to easily integrate into your environment and provide value added in no time. Any hint of customization is down played and for all intensive purposes it appears to be a real wiz bang solution.
When integrating the product you WILL customize it. This seems to put a sour taste in managements mouth. The word “customize” raises eye brows because uninformed people assume that this means their environment will not meet the standard build or will require endless customization. Depending on the complexity of the product this may be true, but and I emphasize BUT if the product has a strong support and development group behind it you will be able to implement it with minor tweaks and modifications. So expect to make some minor modifications to the product, also expect to dedicate one team member (NOT a manager) to cover the care and feeding of the product. The product will be worthless to your organization if no one internal maintains it. This kind of goes without saying but is sometimes overlooked due to the nature of the content a product may provide. If this is the case you (the manager/management) should be asking yourself why this data is so very important when you didn’t have it before this product was installed. Visibility can be conceived as dangerous especially when it concerns cost but at the same time keep in mind your employees probably already have a rough idea how much of that $$$ they earn is actually tied up in the organization. I’m not suggesting that you throw open the doors on your operation I’m only saying you must allocate at least one trusted employee to maintain the new software package.
After the product is installed you will get a certain level of knowledge transfer. Be ready to learn as much as possible in as little time as the vendor sees fit. Set your requirements and expectations before getting this valuable training (from the vendor). This will ensure that your expectations are either met or exceeded. If they are not you can clearly show what you were looking for and how the training fell short.
Cutting cords with the vendor. At some point you will fall back into the client vendor relationship. The product will be running and the vendor will leave. Someday the product will hose itself and you’ll end up calling these fine people up (testing the waters of that silly support contract). Be curteous and direct in your description of the problem and expected resolution time. Again… set the expectation in terms of how quickly you need it fixed and the impact on the organization. Call me crazy but this just seems to make sense. The response may not be immediate but guaranteed there will be a response of some kind. If necessary escalate.
I’ll tweak and edit this post as things settle… the RANT is over. 🙂
Expansion of non-dynamic NTFS partitions can be accomplished by using the Microsoft Utility called DiskPart.exe. DiskPart allows examination of disks, volumes, and partitions. Cloning of disk and also expansion on existing partitions.
CAUTION! Use at your own risk – Disk corruption can occur if an application is using the partition while expansion is in progress.
Link to Microsofts full description of DiskPart Util
Download DiskPart Util from Microsoft
- Launch a command window Start -> Run
- type in diskpart, you will be placed at a DISKPART> prompt
- list disk to view all visible disks
- select disk <number>
- select volume <number> Note you cannot expand a volume if the volume does not have extra unused space.
- extend volume <number> size=<number in MBs>
- exit exits the program…
This is for the old school Windows peeps who grew up with Windows 95 and Windows 3.1 and remember when windows default view used to be Explorer.
Set all folders to open in Explorer view:
Open a new window. Go to Tools -> Folder Options and select the File Type tab and scroll down to Folder. Click on Advanced and select explorer and then click the Set as Default option to the right. Click Okay.