How To Image A Computer With Windows 10 Using dism

If you want to image a lot of computers with a clean Windows 10 image, Microsoft  has lots of built-in tools to help do this, but it’s easy to get lost and overwhelmed with their documentation.  To alleviate that headache, I will explain step-by-step how to:

  • create and use an Unattended.xml file that will:
    • skip the initial setup screens
    • create a local admin account
    • activate Windows with a product key
    • (optionally) configure other Window settings
  • capture a deployable Windows 10 .wim file using sysprep
  • deploy the image to multiple computers using the dism command line tool and WinPE
  • (optionally) add drivers to the .wim file

Continue reading “How To Image A Computer With Windows 10 Using dism”

Automatically Change .om to .com To Prevent Malware

Malcontents are sneaky.  In their latest ploy, they are counting on you misspelling “.com” so they can send you to one of their fake domains.  So instead of going to netflix.com, you end up at netflix.om–a phony site determined to infect you with malware.  If you are not paying attention, you might not realize you are on the wrong domain. Continue reading “Automatically Change .om to .com To Prevent Malware”

Convert DOCX to PDF Natively With A Right-Click

Microsoft Office for OS X is usually very sluggish and slow.  This is one reason I don’t like working with DOCs or DOCXs in OS X.  Yes, you can easily view the document using QuickLook (pressing the Space bar while the file is highlighted), but if you actually want to open the file and manipulate it, you need to either buy Office, or get an open source alternative.

Download a pre-built workflow (or create your own by following the steps below).

Continue reading “Convert DOCX to PDF Natively With A Right-Click”

Prevent Ransomware By Automatically Finding The Checksum Of Downloaded Files

Apple has already shut down the ransomware found in the Transmission torrent client.  You can easily prevent this from happening to you in the future by adding a Hazel rule to your downloads folder, which will automatically determine the checksum, so you can compare it with the one the legitimate file has. Continue reading “Prevent Ransomware By Automatically Finding The Checksum Of Downloaded Files”

C.H.I.P. and Pi-hole Gets You Network-wide Ad Blocking for $9

It’s already easy to block ads network-wide with the Pi-hole on a Raspberry Pi, but now you can do it for even less money by running it on a C.H.I.P. microcomputer, which you can buy for $9.  There is a little bit of manual work to get it on the network since it doesn’t come with an Ethernet port.  You also need to install the curl command, but once you do those two things, you can use the same installation command that you use for the Raspberry Pi. Continue reading “C.H.I.P. and Pi-hole Gets You Network-wide Ad Blocking for $9”

Pi-hole: Reaching Critical Mass

The Pi-hole project has been growing steadily for quite some time now and is been becoming difficult to manage.  I usually spend a few hours a night after my full-time job fielding questions and reviewing pull requests.   Lately, it has been mostly responding to people instead of writing code, because without a userbase, there is really no reason for the project, so you are my first priority.  That said, there is still a lot of work to do. Continue reading “Pi-hole: Reaching Critical Mass”

Turn Your Useless GameStick Into A Powerful Emulator

The GameStick

I had high hopes when I backed the GameStick Kickstarter project.  After finally receiving mine, it was underwhelming.  The UI was slow and sluggish, there were not many games, and the controller had considerable lag.

Many of the issues were fixed, but you can turn your LGameStick into an old school emulator.  You can play games from NES, SNES, Sega Genesis, GBA, N64, and more. Continue reading “Turn Your Useless GameStick Into A Powerful Emulator”