Skip to main content

Posts

batch file - Read CSV for variable and check the cells on that line for another variable

I am trying to create a batch file to read a CSV file to find a username that will be a variable then check the next 10 cells on that line if they match another variable which will be a number. Example CSV: bsmith, 22, 14, 15, 12, 18, 19 cwright, 10, 15, 11, 2 hwrong, 2, 6, 3 csmith, 10, 16, 19, 3, 5, 19, 18, 7, 2, 4 any help would be greatly appreciated! Thanks I have this to find the username but now I want to check the numbers if they match another variable: Variables are: 'username' and 'sitenum' findstr /c:"%username%" "ACL.csv" >nul 2>&1 IF NOT ERRORLEVEL 1 ( echo AUTHORIZED ) else ( echo UNATHORIZED!!!! ) Answer I want to check the numbers if they match another variable Just pipe ( | ) the output from the first findstr into another findstr as follows: findstr /c:"%username%" "ACL.csv" | findstr /c:" %sitenum%," >nul 2>&1 Note: the leading (space) and trailing , (comma) are important as thi...

Outlook 2010: View source of the mail message

Is there any way to look the source of the mail in MS Outlook 2010? Answer You should look at the full headers . To do that, go to File > Info > Properties while the email is selected. The following information may help you understand the details about email headers. (Source: here ) What is an email header? The email header is the information that travels with every email, containing details about the sender, route and receiver. It is like a flight ticket: it can tell you who booked it (who sent the email), the departure information (when the email was sent), the route (from where it was sent and how did it arrive to you) and arrival details (who is the receiver and when it was received). As when you would book a flight ticket with a false identity, the same goes for emails: the sender can partially fake these details, pretending that the email was sent from a different account (common practice for spammers or viruses). How to interpret email headers? Starting from the assumpt...

mac - How to make TimeMachine back up contents of any path or mounted volume

I keep different types of data in different encrypted sparsebundle images (say, one for each client) which automatically mount upon login but can't be opened by anybody other than myself. So, after login I have a number of virtual volumes in /Volumes/ which keeps my client data both secure and organized. How do I include data inside these virtual Volumes in TimeMachine's backups , or data residing in any path on any partition/volume? I found a promising solution description (blog post no longer available online) involving editing the com.apple.TimeMachine.plist but all I can get TimeMachine to do is backing up the sparsebundle files themselves. I want it to back up the files inside the mounted image, though - something like adding /Volumes/Client_abc/ to TimeMachine's search path. Please do not redirect my to this previous question as it doesn't solve the problem at all. Please also refrain from telling me why you think I should not want this answer as that will n...

networking - What is VPN actually used for?

I've never really understood why VPNs are used. I know it stands for Virtual Private Network, but in simple terms how does it work and what is it used for? Answer It's used to allow secure remote access to a network. The second paragraph from the Wikipedia article sums it up nicely: It encapsulates data transfers between two or more networked devices which are not on the same private network so as to keep the transferred data private from other devices on one or more intervening local or wide area networks. It effectively makes the remote machine part of host network for access to resources and other machines on that network. So you can use the company e-mail, intranet and printers for example. Find out more on Wikipedia

email - Thunderbird - Delete all junk mails at once

is there a button or something like that to delete all Junk mails at once? I sort the mail atm and select it with CTRL+SHIFT+UP and than I press delete. Answer In your case, it's deleteJunk Get the Keyconfig extension Following the guide in the above link, create a new shortcut key for the desired command (Copied from above link) In Thunderbird, choose: Tools – Keyconfig... The Keyconfig dialog opens. At the bottom of the Keyconfig dialog, press the button "Add a new key". The Key editor dialog opens. Name the key: Compact This Folder (You can use any name—it does not affect the operation of the key.) Copy and paste the following code sample where you see the comment / CODE /: goDoCommand("cmd_compactFolder") Press OK to close the Key editor. Go to the field at the bottom of the Keyconfig dialog, and press the key combination Alt+C. (Do not type the characters A l t + C, but instead hold down the Alt key and press the C key.) Press the Apply button, then the C...

How to turn off auto start on-screen-keyboard on Windows 7 64 bit?

I'm on Windows 7 64-bit in a Laptop HP Elitebook 8460p I really don't like the keyboard so I plugged in an external usb keyboard and it worked fine, but accidentally I kept pressing the keys cause I work with the usb keyboard above the laptop keyboard so I decided to disable the standard laptop keyboard from "device manager", but as a result now everytime I turn on the cpu the on-screen-keyboard is launched, and the standard keyboard is also still automatically enabled. So I want to know how can I stop launching the on-screen-keyboard each time I start the cpu, cause I tried with msconfig searching process for osk.exe, but can't find it. I appreciate your answers. Answer Goto Control Panel - ease of access center - use the computer without a mouse or keyboard and uncheck the use on-screen keyboard box

How can I keep a Windows registry key constant?

Is there a way to lock a system registry key from being changed? Or to somehow keep it constant? In Windows 7, I'm trying to prevent a system registry key from being automatically changed any time a monitor is turned off or my system is rebooted. NOTES The key is in: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render\{39de53a5-eb32-44e2-a457-eca85387442b}\Properties It's where Windows sets the properties for a particular sound device (my HDMI sound output). Anytime a monitor is turned off or system rebooted, Windows resets the speaker configuration of this device to a 2-channel "Stereo" setup, and resets the sampling rate/bit depth to 16bit/44KHz. I'd like to lock the respective keys/properties to prevent Windows from constantly resetting them. Without any pre-clearance from those knowledgable, I'm hesitant to tamper with permissions of a system-level key like this. If this is an impossibility to lock a system-level key such as...