How to create a user or admin user in OSX Apple Mac via terminal commands in 9 simple steps

Adding a user to your system is quite simple via the GUI, however there may be times you wish to mass deploy or run via a script. Below shows the commands on how to do this. Adding a new user to a Mac computer from a Terminal window requires you to define the user’s name, set a password, create the user’s home directory and configure her system permissions.

Continue reading “How to create a user or admin user in OSX Apple Mac via terminal commands in 9 simple steps”

How to fix Yamaha AMP no power and not powering on RX-V3800 RX-V1900 RX-2700 RX-V1700 and many other models – no need for a service centre

If you want an answer, then come here first. Don’t bother getting shafted by a service center.

Continue reading “How to fix Yamaha AMP no power and not powering on RX-V3800 RX-V1900 RX-2700 RX-V1700 and many other models – no need for a service centre”

How to create large or multiple SPF records that exceed length

If it is a case you need to enter multiple entries for an SPF TXT record, for a domain, it is suggested that you split the record up into multiple smaller records.

Consider the following SPF record for ‘sampledomain.com’ – note that the entries are for example purposes only.

Continue reading “How to create large or multiple SPF records that exceed length”

How to fix a problem or issue in which some attachments to plain text messages are removed when you forward the message. – Outlook Patch – (KB4011123)

Hotfix for problems with outlook email attachments in plain text messages

Continue reading “How to fix a problem or issue in which some attachments to plain text messages are removed when you forward the message. – Outlook Patch – (KB4011123)”

How to disrupt attacks caused by social engineering – by Microsoft

(Copy – This post is authored by Milad Aslaner, Senior Program Manager, Windows & Devices Group. )

A decade ago, most cyber-attacks started with a piece of malware or a complex method to directly attack the infrastructure of a company.

Continue reading “How to disrupt attacks caused by social engineering – by Microsoft”