Find in Files With Grep-Like Context (Lines Surrounding Matches)

Find in Files With Grep-Like Context (Lines Surrounding Matches)
I sometimes need all occurrences of a search string in the files of a directory. OK, that’s easy. Here’s the difficult part: I need search results displayed with context around the matching lines. In other words: I need to know what is in the lines above and/or below the results. None of the text editors and IDEs I am using regularly seem to be able to do display search results with context lines. Enter AstroGrep.
Tips and Tools

Total Commander: Getting Started

Total Commander: Getting Started
This article explains how to get started with Total Commander, one of those few magical tools that can boost your productivity as an IT pro significantly. It not only replaces File Explorer; it does so in a way that makes you wonder how you suffered Explorer for such a long time. It has keyboard shortcuts for everything and is super-configurable, fast and efficient. On top of that, it can probably replace half a dozen tools in addition to File Explorer.
Tips and Tools

Hardware-Encode Video in H.265 with Free Tools to Save Disk Space

Hardware-Encode Video in H.265 with Free Tools to Save Disk Space
Many web meeting services have a recording functionality. Most recordings are provided as MP4 files with the video encoded in H.264 because that offers the most universal compatibility. However, it also needs a lot of disk space. H.264 has a successor, H.265, which only requires half the space for the same visual quality. This post shows how to use StaxRip, a free tool, to re-encode H.264 video into H.265 quickly by making use of GPU hardware encoding.
Tips and Tools

Registry Tricks

Registry Tricks
Here are some pretty cool ways to work with the Windows registry. Regedit Multiple Instances Start multiple instances of Regedit by appending the command-line parameter -m, e.g.: regedit -m. Multiple instances of RegeditExporting/Importing Favorites Regedit’s favorites are a handy way to get to keys you often need. The list of favorites is stored in the registry (where else?): HKCU\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit\Favorites. Exporting the favorites to a .REG file can easily be automated with reg.exe (see below).
Tips and Tools

New Articles, Tools, Tips and Tricks: Windows, Hyper-V, Citrix, PowerShell and Application Streaming / App-V

Windows Beginning with Vista, when formatting a drive the entire disk is overwritten with zeroes. While this is good for end users who like to wipe all data prior to selling or throwing away a disk drive, SAN-based volumes should not be formatted like this. Perform a quick format instead. But if you want to make sure the data is really gone - no need for “secure erase” programs any more! The need for multiple overwrites is a myth.
Tips and Tools

New Articles, Tools, Tips and Tricks: Bugs, Annoyances, PowerShell and some other Stuff

New Articles, Tools, Tips and Tricks: Bugs, Annoyances, PowerShell and some other Stuff
Bugs and Annoyances ICA connections initiated over the ICA client object (ICO) SDK fail because 128-bit encryption cannot be enabled. Apparently, setting EncryptionLevelSession does not work. Annoyingly, this bug is more than a year old, was fixed in the ICA client 10.2 and reappeared in the current version 11.0. Bugs like this one are bad for the entire Citrix ecosystem, because they break cool tools like Citrix Quick Launch, xConnect and others I may not even know about. [Update 2009-09-30: this bug has been fixed in ICA client 11.2.]
Tips and Tools

Cleaning up the Mess Left Behind by Multiple EFS Certificates

In case you have (un?)wittingly been juggling around with multiple EFS certificates like me, you may feel a strong urge to clean up the mess. Which mess? It can happen quite easily that different files are encrypted with different keys. In addition to that, directories that are marked for encryption have EFS certificates associated with them, and there is no UI to manipulate that. In order to straighten this out, once the proper certificate is in place each file and directory needs to be “touched” in order to update their encryption keys.
Tips and Tools

How to Prevent Users from Changing Permissions on File Servers

On file servers in corporate environments one typically does not want users to change permissions, even on their own files. It might seem that it would be sufficient to simply grant change permissions instead of full control, but unfortunately that is not the case. The problem is that whenever a new file gets created, the user creating the file will be its owner. And owners can always change permissions, regardless of the contents of the DACL.
Tips and Tools