General articles and random thoughts that don’t fit into the knowledgebase.
Latest Blog Posts
How can I know if a user has access to a file or a folder in Linux? Also, what groups is a user a member of? A few things I can never remember how to do.
The workflow for updating version numbers and doing git/GitHub/npm releases is far too complex to easily remember when you aren’t doing it very often. This post is a reminder of the various steps.
PayPal seem to think that SMS text messages are a secure two-factor authentication method. Sadly, they are greatly mistaken. This article explains why and what to do about it.
The May 2018 version of Windows 10 has an updated alt-tab view called the timeline. While it will eventually be more useful, its current implementation is poor.
Having just brought a Google Home, I’ve quickly realised that, although Google are supposedly fairly open about allowing people to develop for it, there are still far too many limitations. To try and get round these, I’ve been looking at automation tools. In this article, I will list some of the key tools and their strengths and weaknesses.
📖 Posts | 📎 Blogging, Development | 🔖 security, security threats, threat management, vulnerabilities, web
📖 Posts | 📎 Enterprise, Linux, Microsoft, Operating Systems, Software, Windows | 🔖 configuration, cross-platform, enterprise systems, group policy, microsoft, microsoft intune, microsoft windows administrators, mobile device management, operations, software delivery, system center configuration manager, windows desktops
Microsoft Windows administrators now have a number of ways for managing their estates. Group Policy (GPO) Allows very fine-grained control over every aspect of Windows. Primarily aimed at Windows desktops. Requires Active Directory (AD) and very careful configuration. Requires well trained specialist staff to get it right. System Center Configuration Manager (SCCM) Allows central control over software delivery. Also requires AD. Configuration of delivery packages can be complex and very careful change control is required.
iTunes on Windows has always been a horrible application. It is highly intrusive, installing many background services. It also has a terrible UX/design. So, now that it is available in the Windows Store, is there a difference? Improvement?
Outlook has a custom URL protocol that allows interaction with different elements such as folders, mail and calendar items and contacts, Since Outlook 2007, this has been restricted for use only within Outlook itself but there are some tremendous opportunities for use from simple web systems. This post explains how to turn it on, even for Outlook 2013 (Office 365 version). It also gives pointers to other articles on how to use the protocol.
Update 2018-04-22: Reformatted after move from WordPress to Hugo. Wow! I’ve just discovered by accident that Windows 7 beta supports a few IPTC XMP attributes in picture files. At last, Microsoft supporting standards! Above is a screen shot from the properties of a test picture. The Description and Origin sections seem to be standard IPTC fields and I checked them out using iTag. In iTag the Title attribute comes out as both the Title and the Description.
One of the features available under UNIX is the Message of the Day (MOTD). This is run every time you start a command prompt and displays the content of a file. In addition, the UNIX shells allow all sorts of stuff to be run and configured every time you start a new prompt using the .profile and .bashrc command files. Windows users don’t generally expect that kind of flexibility from their command prompts.
The migration from WordPress is now completed. This blog and the new Knowledgebase are generated using Hugo and hosted with Netlify.
I’ve been fed up with the speed of WordPress for years but haven’t had the time to learn how to properly switch to an alternative. Until I discovered Hugo!
📖 Posts | 📎 Enterprise, IT Security, Microsoft | 🔖 cyber security, enterprise architecture, enterprise systems, governance, government, microsoft, nhs, office 365, presentation, security, solutions architecture
Here is a presentation that I did recently for NHS CIO’s and CCIO’s. It is all about how NHS England has followed a journey to cloud services and the IT Security & Information Governance issues we had to deal with along the way. It tries to also show other NHS organisations how they might work towards similar aims. Security and governance in the cloud from Julian Knight
📖 Posts | 📎 Enterprise | 🔖 design, government, integration, open data, open source, planning, proprietary, software
NB: This article is incomplete - it was converted from a previous blog site. It is included as a draft. Open source does not necessarily mean that open integration and open data is facilitated The issue of open source vs proprietary applications for organisations related to the UK government comes up regularly. the UK’s Cabinet Office have issued clear guidance that open source is preferred and should always be considered when procuring new systems.