One Command – Download and Usage
From an Elevated (Run as Administrator) PowerShell prompt
iwr -useb https://christitus.com/win | iex
SOURCE: https://christitus.com/windows-tool/
The windows root
From an Elevated (Run as Administrator) PowerShell prompt
iwr -useb https://christitus.com/win | iex
SOURCE: https://christitus.com/windows-tool/
Reading Time: 4 minutes maybe
The official Microsoft documentation teaches us that Microsoft Intune is an optional requirement to configure Windows Hello for Business to show the option to display the FIDO security key sign-in method as part of the Sign-in options on the Windows Logon Screen for Azure AD accounts.
However, a method to achieve the same goal without Microsoft Intune is not part of the documentation…
To make FIDO Key sign-in work with an Azure AD account, you’ll need to meet the following requirements:
Enabling FIDO2 Security Keys as a sign-in method for Windows Hello for Business requires four steps:
Perform these steps to enable FIDO2 security keys as a valid authentication method in Azure Active Directory:
Perform these steps to configure an actual security key for sign-in for the user account that will use the key as the sign-in method. This can be the same account as used in the previous steps, but the best way to show off the feature is with an account that has no privileges in the Azure AD tenant:
Perform these steps to configure the Windows 10 device:
Note:
If the PassportForWork and SecurityKey registry keys don’t exist, create them.
The above steps show how to configure Windows Hello for Business to show the option to display the FIDO security key sign-in method as part of the Sign-in options on the Windows Logon Screen for Azure AD accounts without using Microsoft Intune.
Appears that it may be best to charge your Apple device daily at a routine cadence using a charging mechanism detailed in the specifications of the device.
Reference:
When to charge your iPhone or iPad by Lawrence Finch.
Go to address “chrome://version/” in Chrome address bar. Profile Path will be displayed in addition to other Chrome details.
Everyone is annoyed by the pervasive cookie permission
banners which compliance with the European Union’s GDPR
has forced upon the world. I recently realized that I had
become similarly annoyed by another increasingly
pervasive website feature, which is the proactive offer to
sign into whatever website I may be briefly visiting…
Chrome address bar: chrome://settings/content/v8
Default is to Sites can use the V8 optimizer
Set to Don’t allow sites to use the V8 optimizer
Can add Customized behaviors for specific sites if trouble occurs with a specific site
From Chrome Enterprise and Education release notes
Last updated on: February 16, 2024
New V8 security setting back to top
Chrome 122 adds a new setting on chrome://settings/security to disable the V8 JIT optimizers, to reduce the attack surface of Chrome browser. This behavior continues to be controlled by the DefaultJavaScriptJitSetting enterprise policy, and the associated JavaScriptJitAllowedForSites and JavaScriptJitBlockedForSites policies. The setting is integrated into Site Settings. The enterprise policies have been available since Chrome 93.
Chrome 122 on ChromeOS, LaCrOS, Linux, MacOS, Windows, Fuchsia
Discovered nice cookie banner at the Security Now website.
Also, nice details on cookies at What are cookies?
Received this popup today on my Windows Desktop from the Teams malware:
Thanks, but it is October 13th. WTF?!?!
Azure Arc Setup is now on my servers and I don’t remember asking or installing it!!!
Good take here by C:Amie (not) Com!
Start menu item:
System tray/notification area item:
Chrome reset
Close all chrome.exe instnaces
Go to folder %USERPROFILE%\AppData\Local\Google\Chrome
Rename folder User Data to User Data.old
Launch Chrome
Chrome cache folder: %USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\Cache
Computer\HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders