Fibs, half-truths, lies and the liars that tell them. There’s now a clear sense in this 2020 U.S. election season that our reality is being shaped by those who craft false stories – what’s left is equally false outrage and more lies. I can’t really point to the moment all of this started, but technology […]
This one’s a real pain because of how little information is out there. For what I describe below, I’m basing it on an installation of a Hosted Screenconect (Connectwise Control) version 20.9.799.7542 on a domain-joined Windows Server 2016. Your mileage may vary, but the fundamentals of this issue should hold across servers and platforms.
I’ll just cut to the chase: You need a Mac. Or, more specifically OS X running in virtual machine. Every other step you’re going to take will lead you to failure. But, I can off you hope that it is possible and you can get your Mac running again. Read on.
Imagine being lured into a website with promises of golden shores, beautiful sunsets and wonderful coastlines. There are convenient flights and an ultra-smooth booking process. But, the people running this site know they’re getting your cash and once they have it, you’ll never get it back.
My problem here was that a client asked needed to extract data from a few disparate sources and build a clean, usable list of email addresses. Certainly, no small feat since some of this would have to come out of an email account itself. I wasn’t even going to benefit from working from contacts either – addresses had to come from the messages themselves. I’m going to describe what I did to get there.
My list for last year was rather short at only three books, but I’ve managed to expand my reading. Reading is something I do as much as I can. That can be difficult at times. If I’m not reading every day, things feel off. I try to sneak a couple pages of reading in line at the supermarket.
While posting a product online, I came across a well-developed scam. When I saw it, I wanted to humour the bad guys and see what information I might glean from the process. This is not something you should do, but the details I’ve gathered can help you look at these scams with a more critical […]
Passwords aren’t going anywhere. Even though we’ve seen a rise in a new type of authentication including two-factor and even Yubico-style log-in options; passwords still seem to persist in our lives. If you’re online and use passwords (I know you do), you want to be as sure as possible when storing them. This means, no […]
That writing needs to hold some value is not a new concept. Those that write have some basic intuition that what they create needs to have some intrinsic value. Of course, if I want to write a science fiction story, it should entertain and enlighten those who read it. When I write on this blog, […]
I’ve been writing a book for a very long time. In fact, I think I’ve been on this book for more than two years. Two years of going away, distracted by all that life offers, and returning to inch along, trying to add to my word count. One thing I’ve become very familiar with is returning cold to a book that’s been in some form of completion. Here’s how I approach this.