Windows Terminal as Standard User With Dedicated Admin Account Feature-wise, Windows Terminal is a fantastic replacement for the dated console host. It presents entirely new problems, however, in a secure setup with a standard user for day-to-day operations and […] Read more
Windows 11: How To Configure Secure DNS (DoH) for All WiFi Networks This post explains how to configure DNS over HTTPS (DoH) for all WiFi networks in Windows 11 via the Settings app. Unfortunately, this is less intuitive than it should be; […] Read more
Split-Tunnel VPN & WiFi: No Internet via IPv4 Due to Interface Priority I had a weird issue on my laptop: whenever I connected to our company’s VPN, I lost local internet connectivity. As it turned out, this was caused by incorrect network […] Read more
Controlling RGB Keyboard Lighting Without Bloated Vendor Software Vendors in the gaming space often make wonderful keyboards, but their software is not always up to par. Take the Razer Huntsman Elite: its software is a whopping 422 MB […] Read more
Free Services to Send Files End-To-End Encrypted There are a number of services for sending files to someone else that are both free and secure. This post provides an overview. Read more
ShareX: Free Screen Recording Tool & Mouse Pointer Offset Fix This is a quick post to remind me of two things: 1) ShareX is the tool of choice for screen recordings on Windows. 2) On high-DPI (4K) screens there is […] Read more
Changing the Location of Total Commander Configuration Files Depending on how you installed Total Commander, the default settings location may resolve to the installation directory or the user profile. This article explains how to locate the configuration files […] Read more
Finding (Executables in) User-Writeable Directories This article presents two different detection types for insecure filesystem permissions on Windows endpoints: scanning for directories that are user-writable, and detecting processes that are started from user-writeable directories. Read more
Checking Windows Hello Key Storage: TPM or Software? Windows Hello for Business (WHfB) stores a cryptographic key on the device. The preferred storage location is a hardware TPM module. However, if a TPM is not available, the key […] Read more
How to Check the TPM Status & Enable the CPU’s fTPM/PTT The recent Windows 11 announcement has created a lot of confusion due to the requirement for a trusted platform module (TPM). This article explains why your machine almost certainly has […] Read more
Top 10 IT Security Tips for Individual Users This is a list of simple things that will protect you from nearly all the real-world IT security issues affecting individuals and SOHO users. Read more
Royalty-Free Images for Blogs, Websites & Social Media Social media posts are so much more memorable if they feature a picture. To make your blog articles look great on Twitter, LinkedIn, Facebook, etc., you, therefore, need to include […] Read more
Splunk Search Results: JSON to HTML Table Conversion in PowerShell Splunk search results can be exported from the UI as CSV, JSON, and XML, but not as HTML. This article presents a PowerShell script that converts exported search results from […] Read more
Adobe Acrobat & Photoshop: Network Connection Target Hosts This post lists the internet communication targets of Adobe Acrobat Reader, Photoshop, and Creative Cloud. This post is a part of my application network connection monitoring series, a group of […] Read more
Citrix CVAD: Network Connection Target Hosts This post lists the internet communication targets of Citrix Virtual Apps and Desktops (formerly XenApp/XenDesktop). This post is a part of my application network connection monitoring series, a group of […] Read more
Anatomy of WerFault.exe’s Application Crash Error Reporting Not much information is available on Windows Error Reporting’s WerFault.exe, the process that is launched by the OS whenever an application crashes. This post documents the launch sequence of WerFault.exe […] Read more
Windows OS, Services & Apps: Network Connection Target Hosts This post lists the internet communication targets of the Microsoft Windows operating system, including its various services and UWP apps. This post is a part of my application network connection […] Read more
MS Office & Teams: Network Connection Target Hosts This post lists the internet communication targets of Microsoft Office and Teams. It is a part of my application network connection monitoring series, a group of articles that explain how […] Read more
Application Network Connection Monitoring With Splunk & uberAgent This is part 1 of my application network connection monitoring series, a group of articles that explain how to analyze the network traffic of any Windows or macOS app. Read more
Per-User Services in Windows: Info & Configuration It’s a little-known fact that Windows comes with per-user services, background processes that complement the well-known per-machine system services. This article explains what per-user services are, how to create your […] Read more
JavaScript Linting (Static Code Analysis) in VS Code Lint is a static code analysis tool that is used to identify various kinds of problems, with the goal of making source code more consistent and avoiding bugs. There are […] Read more
VS Code as Markdown Note-Taking App In the last few years, I have tried many note-taking applications. They all shared a common UX flaw: lack of keyboard accessibility. Finally, I had the idea to give Visual […] Read more
JavaScript Development with Type Checking in VS Code This is a collection of things I found helpful for JavaScript development in Visual Studio Code, specifically the easy availability of TypeScript’s advanced type checking and error reporting functionality. Please […] Read more
How to Check Which Bluetooth A2DP Audio Codec Is Used on Windows This is a follow-up to my earlier article Bluetooth Audio Quality & aptX on Windows 10, based on a comment by reader eluxe. Windows makes it unnecessarily hard to identify […] Read more
Regex Search & Replace in WordPress Posts With WP-CLI Maintaining a WordPress site that goes back years or even decades (as in this case) can be a challenge. You want to ensure formatting is consistent, even for old posts, […] Read more
Twitter Automation: Scheduled Tweets From Google Sheets This article explains how to set up a Twitter bot in a Google Sheets spreadsheet. It provides an easy way to efficiently schedule a large number of tweets in a […] Read more
Should I Have Separate Personal & Professional Twitter Accounts? That was a question I was asking myself more and more recently. After a bit of deliberation, I answered it with yes. This article summarizes my reasoning. Read more
Google Analytics: Cookieless Tracking Without GDPR Consent This article presents a simple method to use Google Analytics without cookies. Going cookieless means there is no need for a cookie consent dialog. It also means much easier GDPR […] Read more
Azure DevOps: Restricting Credentials to a Single Repository You may find yourself in a situation where you need to limit a set of credentials to a single Git repository only – like I did when I was working […] Read more
Improved Home Network Privacy With NextDNS & DNS over TLS (DoT) This article is for you if you want to improve privacy and block ads on all devices on your network without installing any software, simply by configuring a modern DNS […] Read more