How to earn a bad reputation by frustrating your customers to death.

The three great essentials to achieve anything worthwhile are, first, hard work; second, stick-to-itiveness; third, common sense.

~ Thomas A. Edison

Supposedly, Voltaire coined the saying that common sense is not so common. When it comes to American business practices, that is in full evidence. I’m a busy guy. I have not been busy updating the blog recently. Why? Mostly because I have been dealing with stupid things that companies do to drive away customers. Continue reading “Stupid Things Companies Do to Drive Away Customers”

Unimpressed by the spaghetti cabling of cheap USB to SATA adapters on eBay? Check this one out!

I had one of those kludgy USB to SATA and IDE adapters. I used it so much that some hard drives would no longer spin up on it, and finally no 3.5″ drives would at all. So, I decided to get something a bit beefier and less clunky to deal with. So, I read various reviews and settled on a Tripp-Lite U339-002 USB to SATA Dock/Cloning Station. Continue reading “Review: Tripp-Lite USB to SATA Dock/Cloning Station”

The arguments for encryption backdoors are so ludicrous, they either have to be morons or liars.

So why do they continue to argue for these backdoor mechanisms, now more loudly than ever?

The answer appears to be that they’re lying to us.

This is a reblog of an article at Lauren Weinstein’s Blog

Despite a lack of firm evidence to suggest that the terrorist attackers in Paris, in San Bernardino, or at the Planned Parenthood center in Colorado used strong (or perhaps any) encryption to plan their killing sprees, government authorities around the planet — true to the long-standing predictions of myself and others that terrorist attacks would be exploited in this manner — are once again attempting to leverage these horrific events into arguments for requiring “backdoor” government access to the encryption systems that increasingly protect ordinary people everywhere.

This comes despite the virtual unanimity among reputable computer scientists and other encryption experts that such “master keys” to these encryption systems that protect our financial and ever more aspects of our personal lives would be fundamentally weakened by such a government access mechanism, exposing us all to exploits both via mistakes and purposeful abuse, potentially by governments and outside attacks on our data.

It’s difficult — one might say laughable — to take many of these government arguments seriously even in the first place, given the gross incompetence demonstrated by the U.S. government in breaches that exposed millions of citizens’ personal information and vast quantities of NSA secrets — and with similar events occurring around the world at the hands of other governments.

But there are smart people in government too, who fully understand the technical realities of modern strong encryption systems and how backdoors would catastrophically weaken them.

So why do they continue to argue for these backdoor mechanisms, now more loudly than ever?

The answer appears to be that they’re lying to us.

Or if lying seems like too strong a word, we could alternatively say they’re being “incredibly disingenuous” in their arguments.

You don’t need to be a computer scientist to follow the logic of how we reach this unfortunate and frankly disheartening determination regarding governments’ invocation of terrorism as an excuse for demanding crypto backdoors for authorities’ use.

We start with a fundamental fact….

Read more at Lauren Weinstein’s Blog

How to create USB Multiboot thumb drive with MBR

The typical USB boot drive uses the legacy MBR to boot, which is fine for most utility and Windows installation images up to Windows 7. There are several free applications that can be used to create USB multiboot thumb drive with various strengths and weaknesses, but the most versatile without sacrificing ease of use might be Easy2Boot. If all that is needed is MBR booting from ISO images, then it often is as simple as adding the appropriate ISO image to the correct directory. In addition, using Easy2Boot makes it easier to transition into more sophisticated boots, including UEFI. Continue reading “Create USB Multiboot Thumb Drive w/ MBR”

This is a suggested template for malware removal guidelines document.

This document consists of a set of suggested guidelines and steps to aid in the successful removal of malware. No set of steps can 100% guaranty the state of any machine as far as malware infection goes, but following this guide will hopefully provide a framework to make malware removal more complete, more successful and less likely to end up with wiping the user’s system and starting over.

Factors in determining this must balance the inconvenience of the enduser in needing to backup and restore documents and settings of the various applications they use on a daily basis against the need for security and time allocated in cleaning the malware off of the machine.

Continue reading “Malware Removal Guidelines”

You need the Dell service tag number for a computer, but the machine is not currently in tech’s possession. However, it is up and on the domain.

From a command prompt (does not need to be admin), type:

wmic /user:\administrator /node: bios get serialnumber

Substitute the remote computer’s name for <domain> if logging in as local administrator.
It will prompt for the administrator’s password for the remote computer, and, hopefully, spit out the info you need.

Network issues can interfere with this, though, so if you don’t succeed at first, try again at a later time.

Windows licensing always seems to be an enigma. It is ever-evolving, hair pulling and rather fragile, quite frankly. So, it is no suprrise when even professionals trained to fix those errors get caught up in it all.
Continue reading “MGADiag Validation Unsupported OS in Windows 8”

Keeping tabs on your server is very important. Being able to drill down and determine the cause is just as necessary. However, the tools to determine it can seem elusive.

I was happy to discover a new resource in InMotion Hosting and their article “Create server load monitoring bash script“. I immediately set about putting this script on a server that was giving me some issues. It also allowed me to experiment with some server caching and see how well it worked out.

I still find DigitalOcean’s documentation to be among the best, but InMotion Hosting has a nice stash of it as well.

It seems that a problem that plagued beta versions of Windows 10 has crept into the mainstream. I am convinced that there is an update that causes this, although, because we no longer have control over updates, it is really difficult to know which one. Essentially, the start menu works when you first install it, but somewhere along the line Windows 10’s Start Menu quits working.
Continue reading “Windows 10’s Start Menu Quits Working”