Recent content by neemobeer


  1. Anyway to inhibit any site that has words BUY or Purchase on them.

    I mean if you can dream it up someone can probably make it. Is there really a big interest, unlikely. Why not just an internet search or GenAI tool and ask I want free/open source solution for X?
  2. Solved Recommend vendor to buy an 11 key for a virtual machine

    Groupon is a fairly reputable site. VARs are usually going to sell full priced licenses only
  3. Solved Recommend vendor to buy an 11 key for a virtual machine

    If there not trying to customize it and just using for testing, not activating is an option. Lots of 3rd parties sell licenses for cheap as they recycle old systems and pull the old licenses when they are retail. Groupon for example sells licenses for in the ~$10 range. There's always a small...
  4. Checking the UEFI boot sector

    High level UEFI loads from a ROM chip Drivers load to read disks Drives are scanned for a EFI boot loader Boot loader is selected and takes over boot process Possibly messed up ESP partition or corrupted EFI file.
  5. Checking the UEFI boot sector

    UEFI doesn't utilize a boot sector. There is a legacy MBR record but it's not used by UEFI.
  6. Running Windows in a Docker container - anyone (or Kubernetes)

    This kind of defeats the purpose of containers. The point is to run the minimum components to run an application. Also fairly certain only dotNET core based apps really work in a container.
  7. Malware Alert

    Info on scareware https://www.crowdstrike.com/en-us/cybersecurity-101/malware/scareware/
  8. Malware Alert

    Can you post a screenshot? Was this in a browser? Without seeing the popup I would suspect what you're seeing is scareware. Often it's in the form of an ad or part of a webstie, but it can also be an installed form of malware. The goal is to get you to pay money for a non-existent problem.
  9. Install hidden hardware inside mouse

    Agreed it's a bit of a rabbit hole. but it wouldn't piggie back off the mouse. Since you can daisy chain 127 devices off 1 usb port the malicious device would show up as another device and can act independent of the actual mouse
  10. Install hidden hardware inside mouse

    I'd say the risk is so low for the mundane user that's it's not worth worrying about. Someone would have to have physical access to your device (mouse) This isn't a mouse but a normal looking USB cable. https://www.pcmag.com/news/evil-usb-cable-can-remotely-accept-commands-from-hacker
  11. Two questions....

    1. You can click the gear icon in task manager and change the 'real time update speed' to low or paused 2. You can go into Control Panel > credential manager, the credentials will be saved there, find the cred click remove
  12. Best algorithm or other solution for photo compare

    Get-FileHash should work just fine. I would recommend using SHA256, while slower it has a nearly 0% chance of having a collision (meaning where two non-duplicate files end up having the same hash).
  13. Windows users

    Did you check Settings Accounts 'Email and Accounts' This is where you specifically tie MS services to MS accounts
  14. Windows users

    MS account users are stored in the SAM just like local users. You can remove the account without a reinstall. Settings Accounts 'Other Users' Click the arrow next to the account name On the line that says 'Account and Data' click remove
  15. Safely / Easily Sharing Between system and Hyper-V Win 7 Session?

    If the VM is on the same host with the disk you want to share, you can just use enhanced session mode and share the disk. Share devices with Windows virtual machines
Back
Top Bottom