CISA is coming into Force, dark side of the Force

If you missed this important news check this out:

Eric Schmidt (Google) said:
“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”

“In the world of pattern recognition, we talk about “feature extraction”. That’s the process whereby we measure things, so if we were interested in classifying motor vehicles, one of the features we might extract is “number of axles”. Another might be “number of wheels”, and still another might be “number of doors”.

The idea, of course, is to use those features to figure out what kind of vehicle we’ve got. But not all features are equally useful: if we’re trying to tell the difference between a Mercedes sedan and a Toyota sedan, “number of wheels” won’t help.

So the next step is “feature selection”: what’s actually useful? Which features will enable us to make decisions?

And the step after that is “feature weighting”, because even if we’ve decided that there are 22 features useful for decision-making, they’re almost certainly not all equally useful.

There is no doubt that by now extensive theoretical and experimental analysis has been carried out on the Facebook data corpus and that algorithms have been written which perform this process, at scale, and quickly. Facebook themselves have no doubt done this because processing the data in this fashion yields saleable output, and we all know that Facebook sells everything that it can to anyone with cash in hand. And any government in possession of Facebook’s data has undoubtedly done the same thing — with their own purposes in mind.

The combination of this approach with machine learning yields code that cuts right through the “5,000 friends” problem like it isn’t even there.” author: Anonymous

Can you imagine yourself browsing the Internet without being logged into Facebook or Google at the same time?

Feel free to share any non US based alternatives to those technology moguls.

The Best non-US Based Email Providers you can Trust your Privacy on
Free Webmail and Email by
GMX in Germany
La Poste in France
Lycos Mail in South Korea (slow page load) in Germany in Russia in India
Yandex in Russia

Cable colour coding?

Blue – network, PC connections (network cabinet)
Red – IP phones (network cabinet)
Orange – interconnections between switches
Grey – Phone connection (desk)
Black – PC connection (desk)
Green – Tills
Yellow – PDQs

Dell XPS 13

This laptop looks very promising to me however without this Thunderbolt adapter there is no way to connect to HDMI.
I think I have to wait a little bit for the price to go down and also so they can release other relevant peripherals.

Intel AMT

Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers. Almost all AMT features are available even if PC power is off, the OS is crashed, the software agent is missing, or hardware (such as a hard drive or memory) has failed.

A Ring -3 rootkit was demonstrated by Invisible Things Lab for the Q35 chipset; it does not work for the later Q45 chipset as Intel implemented additional protections.[38] The exploit worked by remapping the normally protected memory region (top 16 MB of RAM) reserved for the ME. The ME rootkit could be installed regardless of whether the AMT is present or enabled on the system, as the chipset always contains the ARC ME coprocessor. (The “-3” designation was chosen because the ME coprocessor works even when the system is in the S3 state, thus it was considered a layer below the System Management Mode rootkits.) For the vulnerable Q35 chipset, a keystroke logger ME-based rootkit was demonstrated by Patrick Stewin.

Another security evaluation by Vassilios Ververis showed serious weaknesses in the GM45 chipset implementation. In particular, it criticized AMT for transmitting unencrypted passwords in the SMB (small business) provisioning mode when the IDE redirection and Serial over LAN features are used. It also found that the “zero touch” provisioning mode (ZTC) is still enabled even when the AMT appears to be disabled in BIOS. For about 60 euros, Ververis purchased from Go Daddy a certificate that is accepted by the ME firmware and allows remote “zero touch” provisioning of (possibly unsuspecting) machines, which broadcast their HELLO packets to would-be configuration servers. Source: Wikipedia

Office365 and calendar permissions

Run PowerShell and run following commands:
$UserCredential = Get-Credential
$Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri -Credential $UserCredential -Authentication Basic -AllowRedirection
Import-PSSession $Session

Remove-MailboxFolderPermission -Identity user@mycompany:\calendar -user

After that, re-grant the calendar permission Review, Editor or Owner to the user. In this case:
Add-MailboxFolderPermission –Identity\Calendar -AccessRight Editor,Owner -User

Qi wireless charging

This is the list of Android phones that support this feature:
Samsung Galaxy S5
Samsung Galaxy S6
Samsung Galaxy S6 Edge
Samsung Galaxy Note 4
Google Nexus 4-7
Motorola Droid Maxx
Nokia Lumia 920
Nokia Lumia 928
Nokia Lumia 929
Nokia Lumia 930
Nokia Lumia 1020
Nokia Lumia 1520

We expect future furniture to have this build in so you can charge things just by putting them on the table or drawer. IKEA has announced it.
Mocreo has some nice and cheap wireless chargers.


Our civilization is advancing, Microsoft Windows window logo is becoming every time plainer and Google logo too. People cannot hand write properly anymore and serif font does not look right too.

Shortcuts on the terminal

For shortcuts on the desktop do not bother with crap group policies to deploy shortcuts.
Just create them and copy to C:\Users\Public\Desktop and if you have icons of choice copy them over lets say to C:\Users\Public\Pictures

To pin useful shortcuts to Outlook or Word use THIS guide.

Word templates location

The best location for e.g. autotext templates is C:\Users\user\AppData\Roaming\Microsoft\Word\StartUp
especially if you have a group policy that overrides templates and the one you have added just for yourself will get unticked again by GPO, very annoying.

ARP address mismatch

The normal ARP request/response is like below.
A ask who is B.
B replies B is xx-xx-xx-xx-xx-xx.
However, in some cases the behavior will like this.
A ask who is B.
C replies B is xx-xx-xx-xx-xx-xx.
When Vigor detects this behavior, Vigor will send the ARP mismatch messages.
This abnormal ARP was blocked by Vigor with former firmwares.
However, some networks will have this ARP so Draytek allows this in most of new firmwares.

Neopost franking machine and Draytek router

The issue was with the franking machine not able to connect to their central server.
I have tried multiple things with no avail.
Then my intuition told me to check VPN settings and voila!
SSL VPN was enabled which in case of Drayteks sticks to port 443 which is exclusively used by franking machine service.
This VPN SSL port has to be changed to something else away from 443 then franking machine should work again.
Good luck

Noise cancellation

Applications can be “1-dimensional” or 3-dimensional, depending on the type of zone to protect. Periodic sounds, even complex ones, are easier to cancel than random sounds due to the repetition in the wave form.

Protection of a “1-dimension zone” is easier and requires only one or two microphones and speakers to be effective. Several commercial applications have been successful: noise-cancelling headphones, active mufflers, and the control of noise in air conditioning ducts. The term “1-dimension” refers to a simple pistonic relationship between the noise and the active speaker (mechanical noise reduction) or between the active speaker and the listener (headphones). Continue reading Noise cancellation

Windows registry corruption

In this case I was having problems fixing a DVD drive on a laptop. The main issue was with a corrupt registry. The idea was to delete a corrupt key and allow the system to recreate it, but the following issue was inability to delete the registry key even as administrator.
The solution is to use PSEXEC tool available from Microsoft HERE
Run this from CMD as administrator:
psexec -i -d -s c:\windows\regedit.exe
The you should be able to delete the registry. Make sure to backup the registry key beforehand.
Once deleted the device should disappear. Restart the laptop and scan for devices. Recover the key from a backup and DVD should come back to life.


Sky is messing around. Their router is at least once a day losing the connection, then it asks you to run some troubleshooting in the web-browser then as a mandatory step redirects you to their website.
I think they do this on purpose to force their customers to view it. Strange thing is that for some time you can browse their website, read articles while the rest of the Internet is still unavailable.
Not good Sky, not good.

Not able to install .NET Framework 3.5?

On the Server 2012 for instance? In my case it was failing when using Add Roles & Features
Please just run this command in elevated PowerShell.
Install-WindowsFeature –name NET-Framework-Core –source :\sources\sxs
I hope you have an installation DVD at hand.

NTRFS: error event 13508

I ran into this problem so I ran the Authoritative FRS restore procedure using the D4 flag on the old server.
Click Start, and then click Run.
In the Open box, type cmd and then press ENTER.
In the Command box, type net stop ntfrs.
Click Start, and then click Run.
In the Open box, type regedit and then press ENTER.
Locate the following subkey in the registry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Backup/Restore\Process at Startup
In the right pane, double click BurFlags.
In the Edit DWORD Value dialog box, type D4 and then click OK.
Quit Registry Editor, and then switch to the Command box.
In the Command box, type net start ntfrs.
Quit the Command box.
Continue reading NTRFS: error event 13508

whatever you do or fix please test it afterwards, better however do not fix things that work, wait until they break otherwise feel the wrath of dummy users.