Author Archives: Nadeem
Disabling Thumbs.db creation
Overview of Thumbs.db Files Thumbs.db files are hidden system files created by Windows operating systems. They are used to store thumbnail images for the contents of a folder when viewed in Thumbnail or Filmstrip mode in File Explorer. This caching helps speed up the display of images and other media files.Purpose and FunctionalityKey Functions File …
How to configure a Hyper-V guest VM to use processor compatability mode
How to Unenroll a PC from Azure Entra/AD/Intune
Moving the Mac Dock to another screen
One of the most annoying things about using the Mac in a multiscreen setup is that sometimes the Dock moves to a different screen when it is not your intention to do so. Per Apple design, the Dock cannot be displayed simultaneously on multiple screens. To move the Dock to the bottom of the screen …
How to remotely control another Mac on your local network
There are many ways to connect to another Mac on your local network. Here’s one that is one of the easiest.
How to increase a VMware Fusion virtual machine’s display resolution beyond the maximum listed for Windows (especially Windows 11 ARM)
How to flush DNS cache on a Mac
How To Automatically Clear Google Chrome Browsing Data On Exit
In certain situations, it makes sense to delete browsing data when exiting the browser. However, Google has made it a bit difficult to find the setting. Go to Settings / Privacy and security / Site settings / Additional content settings / On-device site data / Default behavior / and select Delete data sites have saved …
Continue reading “How To Automatically Clear Google Chrome Browsing Data On Exit”
How to locate and edit the Hosts file on a Mac
1. Open the Terminal app on your Mac. 2. Type “sudo nano /private/etc/hosts”. 3. Enter the administrator password for your user account. 4. Enter the IP address and hostname you need in the hosts file. For example: <IP address> <hostname> 10.8.4.2 server1 5. Press “Control + X” and then “Y” to save the changes. 6. …
Continue reading “How to locate and edit the Hosts file on a Mac”
How to disconnect a device from Azure Active Directory
When setting up a new PC, if you had to use a Microsoft account for the initial setup but want to set it up for local administration and you have exhausted other options for removing the Microsoft account from your PC, you can try the following method: 1. Download PsExec from Microsoft (https://learn.microsoft.com/en-us/sysinternals/downloads/psexec) and extract …
Continue reading “How to disconnect a device from Azure Active Directory”
Disable Microsoft Recall
Microsoft Recall is a new AI-powered tool for Windows 11 that allows users to search and retrieve anything they’ve seen or done on their PC, functioning like a personal historian. It logs activities across apps, tracks communications in meetings, and remembers websites visited, all accessible through an explorable timeline interface. It does so by taking …
How to clear MS Teams cache
When some feature in MS Teams doesn’t work right and you have exhausted most troubleshooting steps, it’s possible that the MS Teams Cache has become corrupted. On a Windows PC, you can delete the MS Teams cache and when Teams starts again, a fresh copy of the cache will be created. Follow the instructions below …
Missing mapped network drives in QuickBooks
If you have a mapped network drive but are unable to see it when trying to open a QuickBooks data file stored on the mapped drive, you may need to EnableLinkedConnections in Windows 10 and 11. 1. Add or edit the following Registry Key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System and add or edit the DWord Value of EnableLinkedConnections and enter a …
Continue reading “Missing mapped network drives in QuickBooks”
Clearer phone calls on iPhones
After updating your iPhone to iOS 16.4, you can change the Mic Mode setting from Standard to Voice Isolation to block out ambient noise and make the calls sound clearer to the party on the other end, especially when you are speaking. To turn on this feature dial a number and while on the call, …
How to Move Microsoft Authenticator to a New iPhone
Moving Microsoft Authenticator to a new iPhone is a straightforward process. Here are the steps to follow: That’s it! Your Microsoft Authenticator app should now be set up on your new iPhone and all your accounts and settings should be restored.
How to opt out of Intuit QuickBooks Workforce
Intuit Workforce lets employees view their pay stubs, W-2s, and more from a secure website. However, many business owners and employees consider this a big intrusion of their privacy. If you use a QuickBooks Desktop product, go to Employees > Manage Payroll Cloud Services and you will see QuickBooks Workforce with a toggle switch. Change …
Continue reading “How to opt out of Intuit QuickBooks Workforce”
Use the Microsoft 365 admin center to enable or disable SMTP AUTH
If you need to relay messages from devices like MPF printers and use a low-cost Office 365 license like Exchange Online Kiosk, you can enable SMTP AUTH for specific mailboxes. By default SMTP AUTH is disabled on Microsoft user accounts. 1. Open the Microsoft 365 admin center and go to Users > Active users. 2. …
Continue reading “Use the Microsoft 365 admin center to enable or disable SMTP AUTH”
Preventing human error in IT environments
Human error is one of the most common causes of IT incidents, and preventing it can significantly reduce the risk of data breaches, system downtime, and other issues. Here are some strategies that can be used to prevent human error in IT environments: By implementing these strategies, organizations can reduce the likelihood of human error …
Continue reading “Preventing human error in IT environments”
Strategies to minimize threats from cyber attacks for SMBs
Small and medium-sized businesses (SMBs) are often targets of cyber attacks, which can result in significant financial losses and reputational damage. However, there are several strategies that SMBs can implement to mitigate the risk of cyber attacks: By implementing these strategies, SMBs can reduce their risk of cyber attacks and protect their operations and data …
Continue reading “Strategies to minimize threats from cyber attacks for SMBs”
Potential IT disasters facing SMBs
Small and medium-sized businesses (SMBs) rely heavily on information technology (IT) to operate efficiently and effectively. However, they are also vulnerable to IT disasters that can cause significant damage to their operations. Here are some examples of IT disasters that SMBs should prepare for: SMBs should have comprehensive disaster recovery plans in place to prepare …
What’s an antifragile IT environment?
An antifragile IT environment can withstand unexpected events and even thrive under pressure. It is a system that can learn from past experiences and continuously improve to become more resilient over time. Here is a plan for creating an antifragile IT environment: By following these steps, you can create an antifragile IT environment that is …
What is IT Ops culture?
IT Ops (Information Technology Operations) culture refers to the set of practices, values, and behaviors that define how an organization manages and operates its IT infrastructure and systems. It focuses on ensuring the availability, reliability, and performance of IT services and infrastructure. In an IT Ops culture, the primary goal is to maintain stable IT …
What should a disaster recovery plan look like for a SMB?
Disaster recovery planning is critical for every organization, including small and medium-sized businesses (SMBs). A disaster recovery plan outlines the steps that your organization will take in the event of a disaster to ensure business continuity and minimize the impact of the disaster. Here is a disaster recovery plan for an SMB: By following these …
Continue reading “What should a disaster recovery plan look like for a SMB?”
What’s DevOps culture?
DevOps culture is a set of practices that combines software development (Dev) and IT operations (Ops) to improve collaboration and communication between development, operations, and other stakeholders involved in the software delivery process. It aims to create a culture of continuous improvement, automation, and collaboration among teams to enable organizations to deliver high-quality software products …
What is 3-2-1 backup?
3-2-1 backup is a widely recommended data backup strategy that helps ensure the safety and recoverability of important data. The strategy involves creating three copies of your data, storing the copies in two different storage media, and keeping one backup copy offsite or in the cloud. The 3-2-1 backup strategy helps protect against data loss …
How to get computer make and model, RAM, HD information via CLI
Open a Command Prompt with Administrator privileges and type one of the commands in bold below: wmic computersystem get model,name,manufacturer,systemtype Output: Manufacturer Model Name SystemType Dell Inc. Latitude 7390 2-in-1 HOUPC401 x64-based PC wmic MEMORYCHIP get BankLabel, DeviceLocator, Capacity Output: BankLabel Capacity DeviceLocator BANK 0 8589934592 System Board Memory BANK 1 8589934592 System Board Memory …
Continue reading “How to get computer make and model, RAM, HD information via CLI”