The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My badges

  • Twitter Updates

  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,708 other followers

Archive for February 18th, 2019

Calls from 18553308653 might be because someone is trying to use your phone number to setup a Microsoft account two factor authentication

Posted by jpluimers on 2019/02/18

Got some calls to my phone numbers in The Netherlands from 18553308653 that I did not ask for. The below searches revealed it is likely someone trying to use those to setup Two Factor Authentication.

It was not my live account, as that was already covered by the Microsoft Authenticator app (you can set up your phone number through account.live.com/names/Manage and authentication through account.microsoft.com/security, see steps at[WayBack] Microsoft – Authy).

Phone searches:

All of these indicate the phone calls come from the Microsoft phone verification system.

Problems for me are that:

  1. this number is not prominently listed on the Microsoft site, so at first I did not trust it was theirs
  2. even outside the USA they use this number, but for other purposes the use more local numbers (for The Netherlands the SMS verification came from +447754836756)
  3. the SMS verification number is not listed on their site either, hardly any hits outside it as well: [Archive.is] +447754836756 – Google Search

–jeroen

Posted in Authentication, Power User, Security | Leave a Comment »

That duh moment when you cannot read an SD card: it’s SDHC/SDXC in an SD card reader; Secure Digital – Wikipedia

Posted by jpluimers on 2019/02/18

That moment you facepalm yourself because you forgot that particular machine won’t read SD cards because they are too big for the SD card reader in it: SD goes up to 4 gigabyte, anything bigger (nowadays basically everything) requires SDXC or SDHC compatible readers.

Quotes from Wikipedia:

However, older host devices do not recognize SDHC or SDXC memory cards, although some devices can do so through a firmware upgrade.[11] Older Windows operating systems released before Windows 7 require patches or service packs to support access to SDHC cards.[12][13][14]

Older host devices generally do not support newer card formats, and even when they might support the bus interface used by the card,[6]there are several factors that arise:

  • A newer card may offer greater capacity than the host device can handle (over 4 GB for SDHC, over 32 GB for SDXC).
  • A newer card may use a file system the host device cannot navigate (FAT32 for SDHC, exFAT for SDXC)
  • Use of an SDIO card requires the host device be designed for the input/output functions the card provides.
  • The hardware interface of the card was changed starting with the version 2.0 (new high-speed bus clocks, redefinition of storage capacity bits) and SDHC family (Ultra-high speed (UHS) bus)
  • UHS-II has physically more pins but is backwards compatible to UHS-I and non-UHS for both slot and card.[27]
  • Some vendors produced SDSC cards above 1GB before the SDA had standardized a method of doing so.
SD compatibility table
SDSC card SDHC card SDHC UHS card SDXC card SDXC UHS card SDIO card
SDSC slot Yes No No No No No
SDHC slot Yes Yes Yes[a] No No No
SDHC UHS slot Yes[a] Yes[a] Yes[b] No No No
SDXC slot Yes Yes Yes[a] Yes Yes[a] No
SDXC UHS slot Yes[a] Yes[a] Yes[b] Yes[a] Yes[b] No
SDIO slot Varies Varies Varies Varies Varies Yes

–jeroen

Posted in Development, Flash-memory, Hardware Interfacing, Power User, SD/miniSD/microSD/MMC, Storage, USB | Leave a Comment »

Windows 7..10: disable shutdown/hibernate/sleep/restart from UI

Posted by jpluimers on 2019/02/18

I needed this for the Windows 10 machine of my mentally retarded brother: WoL (wake-on LAN) for his machine always works when it is in sleep or deep sleep mode, not every now and then fails when fully powered off.

After it is disabled in the UI, you can still perform it with [WayBackshutdown.exe, so I added these shortcuts first:

Disabling the Shutdown related actions in the UI consists of two steps:

  1. Removing it from the logon screen using the registry
  2. Removing it from the user using gpedit.msc (which is wrapped in mmc.exe)

I will try to get the registry changes for the second using [WayBackRegFromApp – Generate RegEdit .reg file from Registry changes made by application (thanks [WayBack] magicandre1981 for suggesting that at [WayBackwindows – How can I use Process Monitor to detect register changes made by GPEdit modifications? – Super User).
The wrapping mmc.exeis easiest to obtain using Process Explorer, and RegFromApp likely needs to run in elevated mode.

If that fails, I can try Process Monitor as suggested by [WayBack] Tom Wijsman in [WayBackcommand line – Change group policy using windows CMD – Super User.

The reason for the above is that I want to avoid UI based modifications that are hard to script.

Remove Shutdown options from the logon screen

This is just the registry setting below.

It also removes the reboot/hibernate/sleep options from the logon screen, so you need shortcuts for that.

Remove Shutdown for the regular users UI

This can be done using either gpedit.msc (Group Policy Editor) drilling down to the local policies or secpol.msc (the Local Policy Editor):

  1. Drill down to
    1. Local Policies
    2. User Rights Management
  2. Double click Shut down the system
  3. Remove the groups you don’t want the system to shutdown
  4. Press OK to confirm

See the video below how.

I’ve removed the group Users and kept the group Administrators to allow ShutDown.

Administrators now do need to execute the above commands (for instance shutdown.exe /h /f) in with an UAC administrative token enabled!

If you do not want that, add the users that can perform Shutdown commands to a new group, then aadd that group to Shutdown the system.

If you want to perform this system wide for all users, then it’s faster to change the [WayBackWindows Explorer NoClose policy (see also [WayBackGroup Policy Registry Reference).

Read the rest of this entry »

Posted in Ethernet, Network-and-equipment, Power User, Wake-on-LAN (WoL), Windows | Leave a Comment »

 
%d bloggers like this: