Tag Archives: between

Wanted – Various Mini-ITX parts

Torn between an Intel NUC and Mini-ITX.

Looking to build similar to this but with second hand parts.

System Builder – Ryzen 5 2600 3.4GHz 6-Core, GeForce GTX 1050 Ti 4GB STRIX, H200 (White) Mini ITX Tower – PCPartPicker United Kingdom

CPU
AMD – Ryzen 5 2600 3.4GHz 6-Core Processor

Motherboard
ASRock – B450 GAMING-ITX/AC Mini ITX AM4 Motherboard

Memory
G.Skill – Ripjaws V Series 16GB (2 x 8GB) DDR4-3200 Memory

Video Card
Asus – GeForce GTX 1050 Ti 4GB STRIX Video Card

Case
NZXT – H200 (White) Mini ITX Tower Case

Power Supply
EVGA – SuperNOVA G3 550W 80+ Gold Certified Fully-Modular ATX Power Supply

Location: South Wales & Bristol

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – Various Mini-ITX parts

Torn between an Intel NUC and Mini-ITX.

Looking to build similar to this but with second hand parts.

System Builder – Ryzen 5 2600 3.4GHz 6-Core, GeForce GTX 1050 Ti 4GB STRIX, H200 (White) Mini ITX Tower – PCPartPicker United Kingdom

CPU
AMD – Ryzen 5 2600 3.4GHz 6-Core Processor

Motherboard
ASRock – B450 GAMING-ITX/AC Mini ITX AM4 Motherboard

Memory
G.Skill – Ripjaws V Series 16GB (2 x 8GB) DDR4-3200 Memory

Video Card
Asus – GeForce GTX 1050 Ti 4GB STRIX Video Card

Case
NZXT – H200 (White) Mini ITX Tower Case

Power Supply
EVGA – SuperNOVA G3 550W 80+ Gold Certified Fully-Modular ATX Power Supply

Location: South Wales & Bristol

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – 12-13 inch Windows Laptop

Hi all,

I’m looking for a small windows laptop, between 12-13 inches for effectively, university use.
Microsoft Office, Internet browsing, Netflix etc but small/light enough to carry around and transport.

Does anyone one have such a laptop they are looking to sell?

Thanks,

Ben

Location: Nottingham

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

PowerShell commands to copy files: Basic to advanced methods

Copying files between folders, drives and machines is a common administrative task that PowerShell can simplify. Administrators who understand the parameters associated with the Copy-Item commands and how they work together will get the most from the PowerShell commands to copy files.

PowerShell has providers — .NET programs that expose the data in a data store for viewing and manipulation — and a set of common cmdlets that work across providers. These include the *-Item, *-ItemProperty, *-Content, *-Path and *-Location cmdlets. Therefore, you can use the Copy-Item cmdlet to copy files, Registry keys and variables.

The example in the following command uses variable $a:

Copy-Item -Path variable:a -Destination variable:aa

When working with databases, administrators commonly use transactions — one or more commands treated as a unit — so the commands either all work or they all roll back. PowerShell transactions are only supported by the Registry provider, so the UseTransaction parameter on Copy-Item doesn’t do anything. The UseTransaction parameter is part of Windows PowerShell v2 through v5.1, but not in the open source PowerShell Core.

When working with databases, administrators commonly use transactions — one or more commands treated as a unit — so the commands either all work or they all roll back.

PowerShell has a number of aliases for its major cmdlets. Copy-Item uses three aliases.

Get-Alias -Definition copy-item

CommandType     Name           Version    Source

———–     —-            ——-    ——

Alias           copy -> Copy-Item

Alias           cp -> Copy-Item

Alias           cpi -> Copy-Item

These aliases only exist on Windows PowerShell to prevent a conflict with native Linux commands for PowerShell Core users.

Ways to use PowerShell commands to copy files

To show how the various Copy-Item parameters work, create a test file with the following command:

Get-Process | Out-File -FilePath c:testp1.txt

Use this command to copy a file:

Copy-Item -Path C:testp1.txt -Destination C:test2

The issue with this command is there is no indication if the operation succeeds or fails.

When working interactively, you can use the alias and positional parameters to reduce typing.

Copy C:testp1.txt C:test2

While this works in scripts, it makes the code harder to understand and maintain.

To get feedback on the copy, we use the PassThru parameter:

Copy-Item -Path C:testp1.txt -Destination C:test2 -PassThru

    Directory: C:test2

Mode          LastWriteTime    Length Name

—-          ————-     —— —-

-a—-       13/08/2018  11:01    40670 p1.txt

Or we can use the Verbose parameter:

The Verbose parameter
Administrators can use the Verbose parameter to see detailed output when running PowerShell commands.

The Verbose parameter gives you information as the command executes, while PassThru shows you the result.

By default, PowerShell overwrites the file if a file with the same name exists in the target folder. If the file in the target directory is set to read-only, you’ll get an error.

Copy-Item -Path C:testp1.txt -Destination C:test2

Copy-Item : Access to the path ‘C:test2p1.txt’ is denied.

At line:1 char:1

+ Copy-Item -Path C:testp1.txt -Destination C:test2

+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

+ CategoryInfo          : PermissionDenied: (C:testp1.txt:FileInfo) [Copy-Item], UnauthorizedAccessException

+ FullyQualifiedErrorId : CopyFileInfoItemUnauthorizedAccessError,

Microsoft.PowerShell.Commands.CopyItemCommand

You need to be a PowerShell Jedi to overcome this. Use the Force parameter:

Copy-Item -Path C:testp1.txt -Destination C:test2 -Force

As part of the copy process, you can rename the file. You must include the new file name as part of the destination. For example, this code creates nine copies of the p1.txt file called p2.txt through p10.txt.

2..10 | foreach {

 $newname = “p$_.txt”

 Copy-Item -Path C:testp1.txt -Destination C:test$newname

}

PowerShell commands to copy multiple files

There are a few techniques to copy multiple files when using PowerShell.

Copy-Item -Path C:test*.txt -Destination C:test2

Copy-Item -Path C:test*  -Filter *.txt -Destination C:test2

Copy-Item -Path C:test* -Include *.txt -Destination C:test2

These commands copy all the .txt files from the test folder to the test2 folder, but you can also be more selective and only copy files with, for instance, a 6 in the name.

Copy-Item -Path C:test* -Include *6*.txt -Destination C:test2 -PassThru

    Directory: C:test2

Mode        LastWriteTime       Length Name

—-         ————-      —— —-

-a—-       13/08/2018 11:01    40670 p6.txt

-a—-       13/08/2018 11:01    40670 x6.txt

You can also exclude certain files from the copy operation. This command copies all the text files that start with the letter p unless there is a 7 in the name:

Copy-Item -Path C:test*  -Filter p*.txt  -Exclude *7*.txt -Destination C:test2

PowerShell copying
Administrators can fine-tune the PowerShell commands to copy certain files from a folder and exclude others.

You can combine the Path, Filter, Include or Exclude parameters to define exactly what to copy. If you use Include and Exclude in the same call, PowerShell ignores Exclude. You can also supply an array of file names. The path is simplified if your working folder is the source folder for the copy.

Copy-Item -Path p1.txt,p3.txt,x5.txt -Destination C:test2

The Path parameter accepts pipeline input.

Get-ChildItem -Path C:testp*.txt |

where {(($_.BaseName).Substring(1,1) % 2 ) -eq 0} |

Copy-Item -Destination C:test2

PowerShell checks the p*.txt files in the c:test folder to see if the second character is divisible by 2. If so, PowerShell copies the file to the C:test2 folder.

[embedded content]

How to use PowerShell cmdlets to copy, move
and delete files

If you end up with a folder or file name that contains wild-card characters, use the LiteralPath parameter instead of the Path parameter. LiteralPath treats all the characters as literals and ignores any possible wild-card implications.

To copy a folder and all its contents, use the Recurse parameter.

Copy-Item -Path c:test -Destination c:test2 -Recurse

The recursive copy will work its way through all the subfolders below the c:test folder. PowerShell will then create a folder named test in the destination folder and copy the contents of c:test into it.

When copying between machines, you can use UNC paths to bypass the local machine.

Copy-Item -Path \server1fs1testp1.txt -Destination \server2arctest

Another option is to use PowerShell commands to copy files over a remoting session.

$cred = Get-Credential -Credential W16ND01Administrator

$s = New-PSSession -VMName W16ND01 -Credential $cred

In this case, we use PowerShell Direct to connect to the remote machine. You’ll need the Hyper-V module loaded to create the remoting session over the VMBus. Next, use PowerShell commands to copy files to the remote machine.

Copy-Item -Path c:test -Destination c: -Recurse -ToSession $s

You can also copy from the remote machine.

Copy-Item -Path c:testp*.txt -Destination c:test3 -FromSession $s

The ToSession and FromSession parameters control the direction of the copy and whether the source and destination are on the local machine or a remote one. You can’t use ToSession and FromSession in the same command.

Copy-Item doesn’t have any error checking or restart capabilities. For those features, you’ll need to write the code. Here is a starting point:

function Copy-FileSafer {

 [CmdletBinding()]

 param (

   [string]$path,

   [string]$destinationfolder

 )

 if (-not (Test-Path -Path $path)) {

   throw “File not found: $path”

 }

 $sourcefile = Split-Path -Path $path -Leaf

 $destinationfile = Join-Path -Path $destinationfolder -ChildPath $sourcefile

 $b4hash = Get-FileHash -Path $path

 try {

    Copy-Item -Path $path -Destination $destinationfolder -ErrorAction Stop

 }

 catch {

   throw “File copy failed”

 }

 finally {

   $afhash = Get-FileHash -Path $destinationfile

   if ($afhash.Hash -ne $b4hash.Hash) {

      throw “File corrupted during copy”

   }

   else {

     Write-Information -MessageData “File copied successfully” -InformationAction Continue

   }

 }

}

In this script, the file path for the source is tested and a hash of the file is calculated. The file copy occurs within a try-catch block to catch and report errors.

With additional coding, the script can recursively retry a certain number of times. After each copy attempt, the script can calculate the hash of the file and compare it to the original. If they match, all is well. If not, an error is reported.

Wanted – 12-13 inch Windows Laptop

Hi all,

I’m looking for a small windows laptop, between 12-13 inches for effectively, university use.
Microsoft Office, Internet browsing, Netflix etc but small/light enough to carry around and transport.

Does anyone one have such a laptop they are looking to sell?

Thanks,

Ben

Location: Nottingham

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – 12-13 inch Windows Laptop

Hi all,

I’m looking for a small windows laptop, between 12-13 inches for effectively, university use.
Microsoft Office, Internet browsing, Netflix etc but small/light enough to carry around and transport.

Does anyone one have such a laptop they are looking to sell?

Thanks,

Ben

Location: Nottingham

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Five Eyes wants to weaken encryption, or legislation may be needed

Five Eyes — the government intelligence alliance between Australia, Canada, New Zealand, the U.K. and the U.S. — issued a threat to tech companies that don’t find ways to comply with law enforcement in the face of encrypted data and devices.

Following a meeting in Australia on Aug. 30, representatives of the Five Eyes nations detailed principles expressing support for privacy and claimed they did not want to weaken encryption. The coalition described a vision of cooperation between government and tech companies that would allow law enforcement to gain access to encrypted evidence. However, the Five Eyes partners reserved the right to take stronger action, if necessary.

Many of the points made by the Five Eyes governments are arguments the infosec community has heard before in pleas from the FBI, for example. But this is the first time the coalition of major Anglosphere countries has issued a joint statement on encryption.

In the “Statement of Principles on Access to Evidence and Encryption,” Five Eyes claimed “encryption is vital” to economies and for protecting information, but added that these protections are also being abused by “child sex offenders, terrorists and organized crime groups to frustrate investigations and avoid detection and prosecution.”

“Privacy laws must prevent arbitrary or unlawful interference, but privacy is not absolute,” the Five Eyes partners wrote. “It is an established principle that appropriate government authorities should be able to seek access to otherwise private information when a court or independent authority has authorized such access based on established legal standards.”

Although the statement did not mention encryption backdoors or how companies would have to weaken encryption in order to provide law enforcement access, there were also no details on how the Five Eyes partners expected tech companies to comply.

“The Governments of the Five Eyes encourage information and communications technology service providers to voluntarily establish lawful access solutions to their products and services that they create or operate in our countries,” the Five Eyes report read. “Governments should not favor a particular technology; instead, providers may create customized solutions, tailored to their individual system architectures that are capable of meeting lawful access requirements.”

Much like past arguments about how to gain access without having to weaken encryption, the statement urged cooperation and said government access to encrypted data should be “underpinned by the rule of law and due process protections.”

However, the statement ended with a threat: “Should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.”

Experts defend encryption

Just as the Five Eyes argument for lawful access echoed past statements from law enforcement, experts took to Twitter with many of the same arguments used against previous law enforcement efforts to weaken encryption.

Chad Loder, founder of Rapid7, based in Boston, said even if law enforcement got its way, other software services would arise.

Others noted that even if the governments of the Five Eyes countries were to legislate weakened encryption, those laws would only apply to software companies based in one of the five countries.

Sergei Boeke, researcher and lecturer at the Institute of Security and Global Affairs and Cyber Security Academy at Leiden University in the Netherlands, expressed doubt that the Five Eyes partners would see the cooperation it hoped.  

Craig Lawson, research vice president at Gartner, said legal access was impossible without weakening encryption.

Wanted – 12-13 inch Windows Laptop

Hi all,

I’m looking for a small windows laptop, between 12-13 inches for effectively, university use.
Microsoft Office, Internet browsing, Netflix etc but small/light enough to carry around and transport.

Does anyone one have such a laptop they are looking to sell?

Thanks,

Ben

Location: Nottingham

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – 12-13 inch Windows Laptop

Hi all,

I’m looking for a small windows laptop, between 12-13 inches for effectively, university use.
Microsoft Office, Internet browsing, Netflix etc but small/light enough to carry around and transport.

Does anyone one have such a laptop they are looking to sell?

Thanks,

Ben

Location: Nottingham

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Microsoft and Amazon sync AI voice assistants Alexa, Cortana

Microsoft and Amazon have launched the first phase of a long-awaited integration between Alexa and Cortana. Although currently targeted at consumers, the partnership could boost adoption eventually of AI voice assistants in the workplace.

The link between the two platforms lets users access some basic Cortana features through Alexa-enabled devices, and vice versa. The public preview works on Amazon Echo speakers, Windows 10 computers, and Harman Kardon Invoke speakers.

Both vendors appear poised to benefit from the partnership, which brings together Amazon Alexa’s large footprint in the consumer market with Microsoft Cortana’s link to office productivity tools, said Werner Goertz, analyst at Gartner.

“Alexa and Cortana can address my needs as a private individual and as a professional knowledge worker,” Goertz said. “That is a very important and winning combination.”

If Microsoft and Amazon decide to pursue a long-term partnership, the deal could pose a challenge to Google and Apple, the two other big players in the market for AI voice assistants.

But Microsoft and Amazon will likely approach the relationship cautiously given that they compete against each other on many fronts, said Jon Arnold, principal analyst of Toronto-based research and analysis firm J Arnold & Associates.

“They will know in time if it’s a good idea or not,” Arnold said. “And if they get the synergies, then they will do more of it. And if not, then they will put the walls back up.”

One possible stumbling block is Alexa for Business, which is excluded from the integration with Cortana launched this week. Released by Amazon in late 2017, the platform connects Echo speakers to enterprise messaging and meetings software.

The absence of a link between Cortana and Alexa for Business — at least for now — suggests their creators are targeting the partnership primarily at consumers, said Juan Gonzalez, analyst at Frost & Sullivan.

“While it may seem that both companies can gain and benefit from this agreement, it’s still not clear who will grab the lion’s share of it,” Gonzalez said. “Will this initiative be the beginning of a long-standing partnership where both companies can combine forces against Apple and Google? Only time will tell.”

Cortana-Alexa integration starts off small  

For now, users need to command their smart devices to open the alternative AI voice assistant software: “Hey Cortana, open Alexa,” or “Alexa, open Cortana.” The two vendors said they were planning for a more seamless link between the two platforms in the future.

Until then, office workers could use an Echo speaker to have Cortana check their morning emails and meetings. At work, they could access Alexa through a Windows 10 work computer to monitor package shipments or control smart home devices.

But many advanced functions, such as music streaming, are not yet available across platforms, as Microsoft and Amazon seek customer feedback during the public trial. The two tech giants first announced plans to sync their AI voice assistants in August 2017, initially promising a paring by the end of last year.

“It’s still very clunky. … In the end game, that should look a little bit different,” Goertz said. “There should be some intelligent mechanism that determines which of the two personal assistants would be the ideal one in any given circumstance to respond to the user’s command.”