How to get your Local IP Address on a Windows Machine
What’s an IP address? I have two? If you’re using a router, you sure do! Let us show you how to tell the difference and why you need to know both!
Read moreWhat’s an IP address? I have two? If you’re using a router, you sure do! Let us show you how to tell the difference and why you need to know both!
Read moreGiving SFTP access can expose your whole filesystem. Here’s how to lock down your users.
Read moreSource: http://superuser.com/questions/16007/how-can-i-mass-rename-files-from-the-command-line-or-using-a-3rd-party-tool Thanks to zdan of superuser.com tl;dr? Here’s the script: dir /B > fileList.txt for /f “tokens=1,2,3,4,5 delims=-” %i in (fileList.txt) DO ren “%i-%j-%k-%l-%m” “%i-flowers-%l-%m” rm fileList.txt Enjoy. Now for the curious, read on. 😀 What those commands do are as follows: Create a list of the files in your current folder as a text file. Loops through the list of files and renames them. Deletes the text file so you’re left with your deliciously renamed files en masse. Now, the way the loop works is really cool, and I mean REALLY cool. Here’s what happens: It loops through every line in the file we just created, passing it to the rename command. So then for every line, the rename command then “tokenizes” the line based on the delimiters, AKA separators. Renames the file based on these temporary tokens to the desired string of text and/or arrangement of tokens. So, now we can gather what info the script is using: Tokens: 5, %i, %j, %k, %l, %m Delimiters: – Current File Name Pattern: “%i-%j-%k-%l-%m” Desired File Name Pattern: “%i-flowers-%l-%m” Now we know, after that close look at what the command does, that the script is using 5 tokens, what their variables are, how it’s delimiting the file name, what the file name pattern currently is, and how it will be renamed. I told you it was neat. It certainly makes life easier when you’re handed a batch of files improperly renamed ever-so-slightly. 🙂 Enjoy.
Read moreIt took a while to find this one. After accidentally installing a virus and cleaning it manually, I wanted to clean up the registry entries in MSConfig to not show the now defunct startup .dll’s and .exe’s The way to do this is quite simple actually. There are 3 locations in your registry where the information is held. The first two are: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run When you click on the folders you will find the names of the programs. Delete them and they are gone from MSConfig (Note: This does not actually delete the file). Make sure you browse too and delete the offending files before deleting them from the registry. Check both the Local Machine and Current User because they can have separate or duplicate entries. You also want to make sure one program doesnt reinstall another after rebooting thinking you had fixed the issue! The third location is: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\MSConfig Here you will find two folders: /startupfolder/ and /startupreg/ Startupfolder will have full path folders of items that startup with the “/”‘s trimmed as “^”. You can find information on the programs by clicking the folder and viewing the contents. Delete the folder if you want it out of the MSConfig list. Startupreg has more descriptive startup items. You can clearly see the names you would normally see in MSConfig. Once you delete the files from these locations, give your computer a restart and you should no longer have them showing / loading. These 3 Registry keys/folders are very handy for manually removing viruses, especially those “ANti Virus” Viruses. The ones that make it seem as if they are an anti virus. You MUST make sure to remove every file associated with them…they will try to hide. Be vigilant and careful. Once manually removed it is recommended ot always followup with antimalware/spyware software such asSpybot Search and Destroy, Malwarebytes Anti-Malware, and a general Anti-Virus.
Read more