Minimizing PowerShell Windows while executing

Okay, I realize it has been a really long time since I last posted anything… Essentially my role changed, but I am back. I recently came across an issue whereby I have been executing PowerShell scripts to perform various functions on some digital signage and the PowerShell window was clearly visible. i.e. in these cases…

1

Querying Windows 8 Application Manifests for NFC launching

Recently I embarked on a supposedly simple challenge to determine if I could use Near Field Communications (NFC) to launch applications on a Windows 8 machine so I don’t have to attach a keyboard… if you ever come to the Microsoft Redmond Executive Briefing Center (EBC), I will be happy to show you, but suffice…

0

Capturing and Restoring a Windows 8 Start Screen Tile Lineup

Ever wondered how you take a snapshot of the layout of the tiles on a Windows 8 Start Screen and then restoring them exactly as they were before. No? Well nor had I until I got asked just that question recently… It turns out that the answer is really simple. I started down the route…

1

Recovering a multiboot system after a drive failure

Okay, this is I am sure a topic that has been covered many, many times. However, it took me a few tries and a bit of searching to find the answer to the following challenge: I had a PC with two hard drives. Each drive had an operating system (Windows 8 and Server 2008 R2)….

0

Webcast: Code Red to Zbot: 10 Years of Tech, Researchers and Threat Evolution

For those of you that joined us at RSA this year in San Francisco, you may have taking in the session presented by Jeff Jones and Tim Rains on 10 Years of Tech, Researchers and Threat Evolution. Jeff and Tim followed up with a series of blog posts delving in to more detail: Trustworthy Computing:…

0

The Road to CSUN

Okay, I admit it… I had no real idea going in to a conversation today what the CSUN conference was. It turns out that I am referring to the Technology & Persons with Disabilities Conference. The road to it is another question… The team (Trustworthy Computing) that I sit in includes a range of different…

0

Microsoft PhotoDNA Technology Helping Law Enforcement Fight Child Pornography

Having worked with Law Enforcement around the world for many years, there is always a huge demand for tools and resources to help investigations. One such tool is PhotoDNA, which essentially creates something like a fingerprint of an image which can be compared with the signatures of other images to find copies. The National Center…

0

Mouse Without Borders and Windows 8 Consumer Preview

I have blogged about using Mouse Without Borders before, but today after installing the Windows 8 Consumer Preview on my system I wanted to see if I could get Magic Mouse running. While the computer I installed it on has a basic touch screen, I wanted to put a mouse and keyboard on the device,…

4

Creating a Windows 8 Bootable USB flash drive

Now I am back from the RSA Conference, I have a few moments to put the Windows 8 Consumer Preview on my ASUS EEE Top machine. The fastest way for me to do this considering the machine does not have a DVD drive is to create a bootable USB flash drive with the Windows 8…

4

Trust in Computing Research

Yesterday in Scott Charney’s RSA 2012 keynote, he made reference to a statistic stating that 92.5 percent of respondents believe cybercrime laws need updating. This was one of the many findings of the Trust in Computing research recently conducted by the Trustworthy Computing team. The Microsoft “Trust in Computing” research was conducted in nine countries…

0