For Sale – 2xMacBook Pro 15: 2015 & 2018 Applecare+ to 2022

Edit: 2015 MBP added below

Testing the waters with this one, I bought this laptop brand new off eBay but have had a bit of a change of heart so putting it up for sale at the price I bought it for. If I can’t get my money back then maybe I’ll have to consider keeping it!

Space Grey 15″ MBP 2018
2.6GHz 6-core Intel Core i7, Turbo Boost up to 4.3GHz, with 9MB shared L3 cache
512GB SSD
16GB 2400MHz DDR4 RAM
Radeon Pro 560X with 4GB of GDDR5
AppleCare+ until April 16, 2022
Charger and cable untouched (have an old Apple USB-C adapter)

Battery cycles: 2 (I’ve literally just turned it on to check that I received what I bought on eBay and hadn’t been scammed!)

In pristine as new condition, it’s only been out of the box briefly at all.

Price and currency: 1935
Delivery: Delivery cost is not included
Payment method: Bank transfer
Location: Surrey
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Go to Original Article
Author:

For Sale – Macbook Pro 2017 128GB / 8GB Space Grey – £625

Hi all,

for sale is my 2017 macbook pro i5 128GB SSD 8GB model in space grey. Condition is good, few very minor marks on the side of the laptop but nothing major. Keyboard works perfectly, screen is great.

Comes with box and charger

Looking for £625 collected

Pictures to follow shortly.

Price and currency: £625
Delivery: Delivery cost is not included
Payment method: BT / Cash
Location: Sheffield
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Go to Original Article
Author:

New Approaches to Home and Xbox Voice Commands Roll Out to Xbox Insiders – Xbox Wire

As Xbox Insiders, your feedback helps inform the decisions and updates we make on Xbox, from new features to how gamers interact with the console itself. Based on your valuable feedback, we’ve been continuing to iterate on two key experiences on Xbox, delivering you a faster Home experience and evolving the way we support Xbox voice commands to improve the voice experience.

Evolving Home

The Home on Xbox One is the first thing you see when you turn on your Xbox One, and we want to deliver an easy and seamless experience for you to navigate your console. We’ve heard your feedback and have continued to iterate on Home to get you into your gaming experiences faster and keeping more of your content front and center. With today’s update, we’re experimenting with a streamlined user interface.

With this new experimental Home design, the first thing you’ll notice is we’ve removed the Twists from the top of Home in favor of separate buttons that launch your gaming experiences. The goal is to let you jump into Xbox Game Pass, Mixer, Xbox Community and Microsoft Store quicker than ever. We’ve also shifted things around to make more room for your recently played titles.

We need your help testing out the new interface. The new experimental Home rolls out this week to select Xbox Insiders in our Alpha and Alpha Skip Ahead rings. For more details on rollout, keep an eye on the Xbox Insiders section of Xbox Wire. The Home experience will continue to evolve and change based on your feedback, so please let us know what you think and share your ideas for Home at the Xbox Ideas Hub. You may see this layout change and even come and go as we iterate on your feedback.

Changes to voice commands on Xbox One

Last fall, we expanded Xbox voice commands to hundreds of millions of smart devices by enabling Xbox One to connect with Xbox Skill for Cortana and Alexa-enabled devices. Xbox Skill continues to grow and change based on your feedback, including new updates that rolled out earlier this month.

Building on these efforts, we are now further evolving the way we support voice commands on Xbox and are moving away from on-console experiences to cloud-based assistant experiences. This means you can no longer talk to Cortana via your headset. However, you can use the Xbox Skill for Cortana via the Cortana app on iOS, Android, and Windows or via Harmon Kardon Invoke speaker to power your Xbox One, adjust volume, launch games and apps, capture screenshots, and more —just as you can do with Alexa-enabled devices today. We’ll also continue to improve the Xbox Skill across supported digital assistants and continue expanding our Xbox voice capabilities in the future based on fan feedback.

Starting this week, this update will roll out to our Alpha Skip Ahead ring and will fully rollout to all users this fall.  As part of these changes, this update will temporarily disable dictation for the virtual keyboard on Xbox One. Don’t worry though, our team is working to provide an alternative solution and will have more details to share soon.

As always, your feedback is important to us and our partners as we continue to evolve the Xbox One Home and shape the digital assistant and voice command experience on Xbox. We have some exciting updates in the works and can’t wait to share what’s next, so stay tuned for more.

Go to Original Article
Author: Steve Clarke

Citrix breach blamed on poor password security

Following an investigation lasting nearly five months, Citrix revealed cybercriminals did not access any customer data but did steal business documents.

According to Citrix president and CEO, David Henshall, malicious actors accessed the company’s internal network via a password spraying attack that exploited weak passwords. Henshall asserted that the Citrix breach did not involve the exploitation of any vulnerabilities and did not impact the security of “any Citrix product or customer cloud service.”

“Once in our network, the cyber criminals intermittently accessed and, over a limited number of days between October 13, 2018, and March 8, 2019, principally stole business documents and files from a company shared network drive that has been used to store current and historical business documents, as well as a drive associated with a web-based tool used in our consulting practice,” Henshall wrote in a blog post. “The cyber criminals also may have accessed the individual virtual drives and company email accounts of a very limited number of compromised users and launched without further exploitation a limited number of internal applications.”

The FBI originally notified Citrix on March 6 that malicious actors may have accessed to company systems, meaning it took just two days for access to be shut down to the attackers.

Jake Williams, founder and president of Rendition Infosec in Augusta, Ga., said for an intrusion as significant as the Citrix breach, “the speed of the response is very unusual.”

“Honestly, I’m surprised they did it that quickly. I would have expected it would take longer,” Williams told SearchSecurity. “It’s very important that you identify all access methods the attackers are using before tipping your hand with the response.”

Usman Rahim, digital security and operations manager at The Media Trust, said it was “concerning” that attackers had access to Citrix systems for five months before the FBI alerted the company.

Time is very sensitive in attacks like these, and in this case, the attackers had plenty,” Rahim told SearchSecurity. “We expect better security measures from tech companies like Citrix around their assets and infrastructure. However, the information Citrix provided paints a picture of adequate security that allowed attackers access to their systems.”

In light of the findings of the Citrix breach investigation, Henshall said the company has “taken significant actions to safeguard our systems and improve protocols,” including deploying FireEye’s endpoint security technology.

“We performed a global password reset, improved our internal password management, and strengthened password protocols,” Henshall wrote. “Further, we improved our logging at the firewall, increased our data exfiltration monitoring capabilities, and eliminated internal access to non-essential web-based services along with disabling non-essential data transfer pathways.”

It is unclear if these improvements include implementing two-factor authentication (2FA); Citrix declined to provide comments beyond what was in the public disclosure.

Williams noted that stronger passwords should help mitigate password spraying attacks.

“Password spraying is always successful if you don’t have lockout policies, which unfortunately impact the user experience significantly. It’s not an easy thing to shut down,” Williams said. “Most orgs don’t use 2FA internally because it absolutely impacts productivity. If it didn’t have a business cost, everyone would use it for everything.”

Richard Ford, CTO at threat intelligence vendor Cyren LLC, said he is shocked when corporate accounts don’t use 2FA.

“With the adoption of mobile phones, companies such as Duo or RSA provide an easy way to supply a ‘soft’ second factor that significantly complicates life for the attacker,” Ford wrote via email. “I keep hoping that this is the year we move away from simple username/password combinations, but adoption remains slow. It’s something that we, as an industry, just need to embrace.”

Rahim added that “basic multi-factor authentication could have prevented” the Citrix breach.

“They have not mentioned some of the measures they are planning to do, but MFA, password expiration, password hardening and policies for system access should be the starting points,” Rahim said. “Companies need to think about these measures before the damage is done.”

Go to Original Article
Author:

Acronis CEO: ‘Backup is dead’

Backup provider Acronis is evolving into a vendor of what it calls “cyber protection.”

Acronis CEO Serguei Beloussov said backup alone is not enough to provide true data protection. In order to be fully protected, organizations need to guarantee their data is recoverable, accessible, private, authentic and secure. Later this year, Acronis will be launching security products with its backup capabilities included, alongside capabilities that handle the other aspects of protection Beloussov mentioned.

Beloussov said due to the automation, low cost and low risk of getting caught, ransomware and other cyberattacks have become more rampant. Backup and security need to be converged because full protection from these bad actors must involve being able to prevent attacks, respond to them and recover from them in case they succeed. He also saw digital transformation as opening up new vectors for criminals to attack from.

We spoke with Beloussov about these new risks, how Acronis plans to address them, its IPO and acquisition plans, and one of his new customers – the World Series-winning Boston Red Sox.

What are the most important things for people to know about backup and data protection right now?

Serguei Beloussov: Backup is dead. There is no “just backup” anymore. Data protection is about safety, accessibility, privacy, authenticity and security. Backup is just the safety portion – ensuring nothing is lost.

It’s important that data isn’t just safe, but also accessible. And the process to access it has to be private, so you know who has access to the data. Next, you need to guarantee authenticity to know it’s not modified. And then there’s security, to prevent unauthorized access.

All of these things need to be done to get full protection, or cyber protection, as we call it. In my opinion, companies need to think about protection in a non-static way. You need to be able to prevent problems, respond to them and recover from them.

And so you need tools for recovery and forensics. If somebody somehow logged into your [Microsoft] Office 365, unless you have proper logs, proper information for you to analyze, you will not find out how they did it. And you cannot prevent it from happening again.

We’re currently in a state where mobile devices are being broken into, we’re losing privacy, we’re losing our authenticity. It’s happening with elections, it’s happening with businesses, it’s happening with NGOs. And so everybody has to think about how they protect their data, applications and systems.

Which kind of companies are most at risk right now from ransomware and cyberthreats?

Beloussov: Unfortunately, cyberattacks have become very automated and industrialized, as the cost of attack is very low. You don’t need to spend too much money, you can attack many people at once and it could be managed by AI.

Unfortunately, cyberattacks have become very automated and industrialized… And you don’t have to attack Citibank to make a disaster.
Serguei BeloussovCEO, Acronis

So everybody’s at risk, but in my opinion, the people at most risk are small and medium businesses and consumers because they just don’t have the money. They’re not like enterprises, which are equipped to deal with it.

The issue is current law enforcement and government policy is very much focused on government agencies and large businesses, and not really focused as much on SMBs. But I think more than half of the US economy is SMBs. And of course, everybody is a consumer.

And you don’t have to attack Citibank to make a disaster.

Another area which is making everything more vulnerable is digital transformation. In a lot of industries, you have to become more connected. But as soon as you get that smart TV or create an ecosystem, you will become vulnerable. You immediately have data applications and systems that, if you didn’t think about protection, are open to attack. Everything is connected now.

Is data management becoming synonymous with data backup?

Beloussov: We believe data management is kind of an extra market. Data management is not about protection; it’s about extracting value from data. It’s very close to an organization’s computing core, which is not where we’re focused. We’re focused outside of the core, at the organization’s endpoints. And on the edge, the data is less valuable, typically.

That said, we have data management as part of our products, but it’s focused on managing data which is outside of your core. There, the management problem is different. For example, we provide the ability to search for a file’s location across multiple servers and desktops, virtual or physical. We can do this because we have a central place where we store it.

This is different from the enterprise search tools and data management you see from our perceived competitors because we are moving away from data protection and data management to cyber protection.

Will you launch any new products this year?

Serguei Beloussov, CEO of AcronisSerguei Beloussov

Beloussov: We are shipping three products in October through November. The first is Total Protect, which is cyber protection. It’s a protected software-defined network designed specifically to be available as a secondary infrastructure to run your application systems and data when your primary is under attack or broken.

Then we’re shipping Acronis Cyber Protection, which covers vulnerability assessment, patch management, malware prevention, backup, remote management, authenticity management and privacy management in one package. It is a single agent, single policy, single UI, all integrated, for you to install on your PC or your server.

And then we’re releasing Acronis Cyber Platform, an underlying platform on top of which we will build all of our products. And products can actually be built by third parties. We will open our platform to third parties so that they can support workloads that we don’t.

How are the Red Sox using Acronis software?

Beloussov: It’s very simple; they have data and applications, and we provide protection. For recovery, we set up file sync and share to send applications and files around, it’s protected and you can always know where it is. And you can control the rights – you can have very fine-grained permissions and audit logs and so on.

Nowadays, data is very important for baseball. All sorts of data is being recorded – data about players’ behavioral plans, about the stadium and, of course, about the game. This is important for training, playing, making decisions about changing players, buying new players and so on.

And it’s important to have data about fans, because you need to know what fans like and don’t like, where they do and don’t engage. You can really fine-tune the way the stadium operates and the way the game is played so that fans are more engaged.

Are you pursuing an IPO?

Beloussov: Not right now, as we’re still doing some major launches. In five years, it’s highly likely. I mean, we can go public at any point. We have almost $250 million in revenue, we are around one thousand employees and we’re making money. And we’re growing.

So technically, it’s totally doable, but it’s not a strategy to go public – it’s just a sort of side effect of having a successful company.

Are acquisitions on the table?

Beloussov: We are considering multiple companies, but nothing major. We’re not going to change our strategies from cyber protection, cyberinfrastructure and a cyber platform.

The thing about cyber protection is what workloads do you protect. There’s Salesforce, NetSuite and a bunch of other applications you can protect. And it’s also about which data destinations. We have our own cyberinfrastructure, but we can also send data to Microsoft, Google, Amazon, Wasabi and a bunch of others. And there will be more.

We always have two to three companies with which we’re talking to about acquisition, and we will definitely do at least three acquisitions this year. We’re looking at $10- or $15-million companies – nothing major. We’re not going to acquire Veritas.

Go to Original Article
Author:

For Sale – REDUCED: Corsair ONE PRO GTX 1080TI, Hydro Cooled, i7 7700K, 16GB DDR4, 480GB M.2 SSD

Discussion in ‘Desktop Computer Classifieds‘ started by MartinH32, Jul 24, 2019 at 2:23 PM.

  1. MartinH32

    Well-known Member

    Joined:
    May 6, 2005
    Messages:
    2,535
    Products Owned:
    7
    Products Wanted:
    5
    Trophy Points:
    136
    Location:
    Selby
    Ratings:
    +836

    REDUCED NOW to £1300

    Decided to sell this after all as I’m using mainly for business now and a mac is more suited for what I do.

    i7 7700k
    480 m.2 ssd boot drive
    2TB ssd data drive (upgraded to a Crucial MX500 from mechanical drive)
    GTX 1080ti
    16gb Ram

    Totally unmarked and still has nearly six months warranty left with Scan – receipt will be provided.

    I’d prefer collection but can arrange delivery if needed (prefer not to due to value)

    Scan are selling one

    on ebay at the moment for £1535 and whilst it’s got more warranty it hasn’t got the SSD data drive. IMG_0427.jpg IMG_0428.jpg

    Price and currency: 1300
    Delivery: Delivery cost is not included
    Payment method: BACS / PPG
    Location: Selby
    Advertised elsewhere?: advertised elsewhere
    Prefer goods collected?: I have no preference

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Last edited: Jul 25, 2019 at 6:39 PM

Share This Page

Loading…

Go to Original Article
Author:

End users will make or break an Office 365 migration

An Office 365 migration can improve an end user’s experience by making it easier to work in a mobile environment while also keeping Office 365 features up to date. But if the migration is done without the end users in mind, it can lead to headaches for IT admins.

At a Virtual Technology User Group (VTUG) event in Westbrook, Maine, about 30 attendees piled into a Westbrook Middle School classroom to hear tips on how to transition to Office 365 smoothly.

Office 365 is Microsoft’s subscription-based line of Office applications, such as Word, PowerPoint, Outlook, Teams and Excel. Rather than downloaded onto a PC, Office 365 apps are run in the cloud, enabling users to access their files wherever they are.

“As IT admins, we need to make the digital transformation technology seem easy,” said Jay Gilchrist, business development manager for Presidio Inc., a cloud, security and digital infrastructure vendor in New York and a managed service provider for Microsoft. Gilchrist and his Presidio colleague, enterprise software delivery architect Michael Cessna, led the session, outlining lessons they’ve learned from previous Office 365 migrations.

Importance of communication and training

Their first lessons included communicating with end users, keeping a tight migration schedule and the importance of training.

“You want to make it clear that you’re not just making a change for change’s sake,” Gilchrist said. “Communicate these changes as early as possible and identify users who may need a little more training.”

One practical tip he offered is to reserve the organization’s name in Office 365 early to ensure it’s available.

You want to make it clear that you’re not just making a change for change’s sake.
Jay GilchristBusiness development manager, Presidio

Conducting presentations, crafting targeted emails and working to keep the migration transparent can help IT admins keep end users up to date and enthused about the transition.

“End users are not information professionals,” Cessna said. “They don’t understand what we understand and these changes are a big deal to them.”

Cessna and Gilchrist said that if IT admins want end users to adopt apps in Office 365, they’ll need to provide the right level of training. IT admins can do that by providing internal training sessions, using external resources such as SharePoint Training Sites, as well as letting users work with the apps in a sandbox environment. Training will help end users get used to how the apps work and address questions end users may have in real time, thereby reducing helpdesk tickets once the Office 365 migration is completed. 

Governance and deployment

Before an Office 365 migration, IT admins need to have a governance of applications and deployment plan in place.

“Governance built within Microsoft isn’t really there,” Cessna said. “You can have 2,000 users and still have 4,500 Team sessions and now you have to manage all that data. It’s good to take care of governance at the beginning.”

Deployment of Office 365 is another aspect that IT admins need to tackle at the start of an Office 365 migration. They need to determine what versions are compatible with the organization’s OS and how the organization will use the product.

“It’s important to assess the digital environment, the OSes, what versions of Office are out there and ensure the right number of licenses,” Cessna said.

Securing and backing up enterprise data

One existing concern for organizations migrating from on-premises to an Office 365 cloud environment is security.

Microsoft provides tools that can help detect threats and secure an organization’s data. Microsoft offers Office 365 Advanced Threat Protection (ATP), a cloud-based email filtering service that helps protect against malware, Windows Defender ATP, an enterprise-grade tool to detect and respond to security threats, and Azure ATP, which accesses the on-premises Active Directory to identify threats.

Microsoft has also added emerging security capabilities such as passwordless log in, single-sign-on and multi-factor authentication to ensure data or files don’t get compromised or stolen during an Office 365 migration.

Regulated organizations such as financial institutions that need to retain data for up to seven years will need to back up Office 365 data, as Microsoft provides limited data storage capabilities, according to Cessna.

Microsoft backs up data within Office 365 for up to two years in some cases, and only for one month in other cases, leaving the majority of data backup to IT.

“[Microsoft] doesn’t give a damn about your data,” he said. “Microsoft takes care of the service, but you own the data.”

Picking the right license

Once the organization is ready for the migration, it’s important to choose the right Office 365 license, according to Gilchrist.

There are several ways for an organization to license an Office 365 subscription. Gilchrist said choosing the right one depends on the size of the organization and the sophistication of the organization’s IT department.

The subscription choices for Office 365.
When deciding on which Office 365 subscription to license, it’s important to examine the size and scope of your organization and decide which offering works best for you.

Smaller businesses can choose an option of licenses for 300 or less users, as well as options for add-ons like a desktop version of Office and advanced security features. The cost for enterprise licenses differs depending on the scope of the licenses and number of licenses needed, and educational and non-profit discounts on licenses are offered as well.

Other licensing options include Microsoft 365 bundles, which combine Office 365 with a Windows 10 deployment, or organizations could use Microsoft as a Cloud Solution Provider and have the company handle the heavy lifting of the Office 365 migration.

“There are different ways to do it. You just have to be aware of the best way to license for your business,” Gilchrist said.

Measuring success and adoption

Once completed, IT still has one more objective, and that’s to prove the worth of an Office 365 migration.

“This is critical and these migrations aren’t cheap,” Cessna said. “You want to show back to the business the ROI and what this new world looks like.”

To do that, IT admins will have to circle back to their end users. They can use tools such as Microsoft’s Standard Office 365 Usage Reports, Power BI Adoption reports or other application measurement software to pin down end user adoption and usage rates. They can provide additional training, if necessary.

“Projects fail because the end users aren’t happy,” Cessna said. “We don’t take them into account enough. Our end users are our customers and we need to make sure they’re happy.”

Go to Original Article
Author:

Use PowerShell printer management for quicker setups

Even the most high-tech organizations still need printers for users to do their jobs.

While the electronic transition of business documents has greatly reduced the need to print most documents, networked printers and print servers remain important pieces of the infrastructure. For a Windows shop, the simplest approach is to use Windows Server as the foundation for printing services. Armed with PowerShell printer management know-how, administrators have an automation tool to configure and manage these print servers.

Install print services

The first step to set up a Windows print server is to add the feature to the server. We can use the Server Manager GUI, but it’s easily done with a PowerShell command:

Add-WindowsFeature -Name Print-Server

PowerShell printer command
A PowerShell cmdlet adds the print feature to the Windows Server system to manage printing jobs.

The True value under the Success Boolean indicates the feature installed and is ready for use without requiring a restart.

Add printer drivers

Starting with Windows 8 and Windows Server 2012, Microsoft added class printer drivers, also called v4 printer drivers, for various manufacturers. You can add these and other v3 print drivers to a print server with the Add-PrinterDriver cmdlet. Keep in mind to use the cmdlet requires the driver in the server’s DriverStore folder; you can use the PnPUtil command-line tool to add any missing drivers.

The following command installs all drivers in INF files from a folder on a local drive for an HP LaserJet M607 M608 M609 PCL 6:

pnputil.exe -i -a C:HP_LJM607-M608-M609HP_LJM607-M608-M609_V3*.inf
Microsoft PnP Utility

Processing inf : hpat6b2a_x64.inf
Successfully installed the driver on a device on the system.
Driver package added successfully.
Published name : oem10.inf

Processing inf : hpat6b2a_x86.inf
Successfully installed the driver on a device on the system.
Driver package added successfully.
Published name : oem12.inf

Total attempted: 2
Number successfully imported: 2

After a successful attempt, you can add the drivers to the print server with Add-PrinterDriver by specifying the name of the driver:

Add-PrinterDriver -Name 'HP LaserJet M607 M608 M609 PCL 6'

The command does not generate any output to let you know if it worked, but the Get-PrinterDriver will let you verify its availability:

Get-PrinterDriver -Name 'HP LaserJet M607 M608 M609 PCL 6'

Add a port for printers

Most organizations use networked printers on a Windows print server by adding a port that connects to the printer IP address. The following command adds a standard TCP/IP port for the IP address 172.16.26.8 with the port 9100 which uses the RAW printer protocol:

Add-PrinterPort -Name '172.16.26.8' -PrinterHostAddress '172.16.26.8' -PortNumber 9100

Add print queues

To combine all these commands, let’s add a new print queue to the print server with PowerShell.

To make this tutorial easier to read, the settings are in a hashtable $Settings to use splatting with the Add-Printer cmdlet. This example limits the Add-Printer parameters to include a comment, driver name, location, name, port name, print processor and make sure it’s a shared printer:

$Settings = @{
Comment = 'HP m607'
DriverName = 'HP LaserJet M607 M608 M609 PCL 6'
Location = 'My Office'
Name = 'HP M607'
PortName = '172.16.26.8'
PrintProcessor = 'winprint'
Shared = $True
}
Add-Printer @Settings -Verbose

Run the Get-Printer command with the name HP M 607 to see the printer’s settings:

Get-Printer 'HP M607' | Format-List

Name : HP M607
ComputerName :
Type : Local
ShareName : HP M607
PortName : 172.16.26.8
DriverName : HP LaserJet M607 M608 M609 PCL 6
Location : My Office
Comment : HP m607
SeparatorPageFile :
PrintProcessor : winprint

Printer settings
The Get-Printer command generates a detailed listing of a printer’s settings.

Perform bulk changes with PowerShell printer management

One of the advantages of PowerShell scripting is speed and efficiency. When you need to make multiple changes across your infrastructure, PowerShell will save you time with these types of tasks. For example, you can use PowerShell to change the driver for many printers at once. The command below takes any printer whose name starts with HP M and changes the print driver to the HP universal print driver.

Get-printer "HP M*" | Set-Printer -DriverName 'HP Universal Printing PCL 6'

Next, to make a printer port for every IP address in a subnet, in this case 172.16.26.1/24, start by creating an array for the last octet:

$Sub = 1..255

Use the $Sub variable and perform a loop with Add-PrinterPort, changing the last octet each time:

$Sub | ForEach-Object {Add-PrinterPort -Name "172.16.26.$_" -PrinterHostAddress "172.16.26.$_" -PortNumber 9100}
PowerShell loop
This PowerShell command sets up the multiple printer ports using a loop to automate the process.

PowerShell gives you a simpler way to handle printer configuration via the command line or with a script that you can save and modify for the next round of printer setups. While it’s still valid to use the Windows Server GUI to work with printers, it’s not as efficient as PowerShell.

Go to Original Article
Author:

For Sale – Casa Node – Bitcoin and Lightning Node – Build your own Bank – SALE !!

Discussion in ‘Desktop Computer Classifieds‘ started by bobster316, Jun 28, 2019.

  1. bobster316

    bobster316

    Active Member

    Joined:
    Nov 24, 2005
    Messages:
    100
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    18
    Location:
    Isleworth
    Ratings:
    +8


    Why Casa Node?

    Simple, easy access to the Lightning Network. Make and receive payments, get connected and strengthen the network, and be one of the first to Ride the Lightning.

    How’s it work?
    Just plug it in and step through our easy setup. We’ve pre-downloaded the Bitcoin blockchain so you can sync quickly and start using the Lightning Network.

    LASER-FOCUS ON EXCELLENT DESIGN

    • A beautiful, web-based interface for Node management
    • No coding experience required
    • Intuitive setup guidance
    • Simple, elegant hardware

    WHAT’S IN THE BOX

    • Full Lightning and Bitcoin node
    • Raspberry Pi, 1TB hard drive
    • Power and hard drive adapter cords
    • White hard-shell case

    Price and currency: 199
    Delivery: Delivery cost is not included
    Payment method: Cash / Bank Transfer
    Location: Isleworth
    Advertised elsewhere?: Not advertised elsewhere
    Prefer goods collected?: I have no preference

    ______________________________________________________
    This message is automatically inserted in all classifieds forum threads.
    By replying to this thread you agree to abide by the trading rules detailed here.
    Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

    • Landline telephone number. Make a call to check out the area code and number are correct, too
    • Name and address including postcode
    • Valid e-mail address

    DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

    Attached Files:

  2. CraigF1969

    CraigF1969

    Active Member

    Joined:
    Oct 12, 2008
    Messages:
    1,339
    Products Owned:
    0
    Products Wanted:
    0
    Trophy Points:
    48
    Ratings:
    +86

    Is there any Haxxor software in this liable to steal my Bitcoins?
    Also do i just plug this into the wall and make millions straight away?
    Just one more point. Is it not dangerous “riding” lightning?
    Can i put my own blockchain in it? I have spent 1 year making a chain out of daisies and would like to use that instead as i think the “Lightning will work in harmony with the daisies as in nature and make more Bitcoins”

Share This Page

Loading…

Go to Original Article
Author: