clean boot Windows 10 to determine problem cause

How to determine what is causing an issue with Windows 10 after you do a clean boot

When having a system performance or network issue with your Windows 10 PC you can follow these steps to determine the cause. Open these instructions on a mobile device or another computer so they are available while troubleshooting the PC with the problem.

MSCONFIG System Configuration Screenshot Steps

First of all perform a clean boot. After this is done proceed to the following steps.

If the problem does not occur while the computer is in a clean boot environment, then you can determine which startup application or service is causing the problem by systematically turning them on or off and restarting the computer.  While turning on a single service or startup item and rebooting each time will eventually find the problematic service or application, the most efficient way to do this is to test half of them at a time, thus eliminating half of the items as the potential cause with each reboot of the computer.  You can then repeat this process until you’ve isolated the problem.  Here’s how:

  1. Sign in to the computer by using an account that has administrator rights. If you don’t have an administrator account, you can create one. Create a local user or administrator account in Windows 10
  2. For Windows 10, in the search box on the taskbar, type msconfig.  (In Windows 8 or 8.1, swipe in from the right edge of the screen, and then select Search. Or, if you’re using a mouse, point to the lower-right corner of the screen, and then select Search.  In the search box, type msconfig.)
  3. Select msconfig or System Configuration from the search results.
  4. Select Services, and then select Hide all Microsoft services.
  5. Select each of the check boxes in the upper half of the Service list.
  6. Select OK, and then select Restart.
  7. After the computer restarts, determine whether the problem still occurs.
    • If the problem still occurs, one of the checked items is the problematic service.  Repeat steps 1 through 6, but in Step 5, clear the lower half of the boxes in the Service list that you selected in your last test.  
    • If the problem doesn’t occur, the checked items are not the cause of the problem. Repeat steps 1 through 6, but in Step 5, turn on the upper half of the boxes that you cleared in the Service list in the last test. 
    • Repeat these steps until you’ve either isolated the problem to a single service, or until you’ve determined that none of the services are the cause of the problem.  If you experience the problem when only one service is selected in the Service list, go to step 10. If none of the services cause the problem, go to step 8.
  8. Select Startup, and then select the upper half of the check boxes in the Startup Item list.
  9. Select OK, and then select Restart.
    • If the problem still occurs, repeat step 8, but this time clear the lower half of the boxes in the Startup Item list that you selected in your last test.  
    • If the problem does not occur, repeat step 8, and turn on the upper half of the boxes that you cleared in the Startup Item list in the last test. 
    • If you still experience the problem after only one Startup Item is selected in the Startup Item list, this means that the selected Startup Item causes the problem, and you should go to step 10. If no Startup Item causes this problem, there might be a problem with a Microsoft service.  Repair the service, reset, or reinstall Windows
  10. After you determine the startup item or the service that causes the problem, contact the program manufacturer to determine whether the problem can be resolved. Or, run Windows with the problem item disabled.  To do this, run the System Configuration utility and enable your Services and Startup Items, but clear the check box for the problem item.

CIS AWS Benchmark Drawings and Updates

Center for Internet Security Amazon Web Services Cloud Benchmark Drawings and Updates

Here is a copy of the drawing we used for the original AWS CIS Hardening Benchmark in 2016. Many things have changed since then and we are calling on the community to help us with a thorough review and update to this security guide. This was created with an open source SVG tool and will be available to participants of the CIS Community. Please join the effort here:


Data Gravity – in the Clouds

Data Gravity

Data Gravitas

Today announced at Dreamforce.  I realized that many could be wondering why they decided to do this and more so, why now?

The answer is Data Gravity.

Consider Data as if it were a Planet or other object with sufficient mass.  As Data accumulates (builds mass) there is a greater likelihood that additional Services and Applications will be attracted to this data. This is the same effect Gravity has on objects around a planet.  As the mass or density increases, so does the strength of gravitational pull.  As things get closer to the mass, they accelerate toward the mass at an increasingly faster velocity.  Relating this analogy to Data is what is pictured below.

Services and Applications can have their own Gravity, but Data is the most massive and dense, therefore it has the most gravity.  Data if large enough can be virtually impossible to move.

View original post 248 more words

depreciated authentication retirement o365

Microsoft is changing their policies for how authentication takes place between clients and office 365. Are you prepared?

Basic Authentication Retirement for legacy protocols in Exchange Online
Major update: Announcement started
Applied To: All customers

Beginning October 13, 2020, we will retire Basic Authentication for EWS, EAS, IMAP, POP and RPS to access Exchange Online. Note: this change does not impact SMTP AUTH.

There are several actions that you and/or your users can take to avoid service disruptions on client applications, and we describe them below. If no action is taken, client applications using Basic Authentication for EWS will be retired on October 13, 2020

Any application using OAuth 2.0 to connect to these protocols, will continue to work without change or interruption.

[What do I need to do to prepare for this change?]

You have several options on how to prepare for the retirement of Basic Authentication.
– You can start updating the client applications your users are using to versions that support OAuth 2.0 today. For mobile device access, there are several email apps available that support Modern Authentication, but we recommend switching to the Outlook app for iOS and Android as we believe it provides the best overall experience for your M365 connected users. For desktop/laptop access, we encourage the use of the latest versions of Outlook for Windows and Outlook for Mac. All Outlook versions including, or newer than, Outlook 2013 fully support OAuth 2.0.
– If you have written your own code using these protocols, you will need to update your code to use OAuth 2.0 instead of Basic Authentication, you can reach out to us on stack overflow with the tag exchange-basicauth if you need some help.
– If you or your users are using a 3rd party application, which uses these protocols, you will either need to:
— reach out to the 3rd party app developer who supplied this application to update it to support OAuth 2.0 authentication
— assist your users to switch to an application that’s built using OAuth 2.0.

We are in the process of building reports that will help you identify any impacted users and client applications in your organization. We will make these reports available to you in the next few months and communicate their availability via a follow-up Message center post.

World Time for Wall Clocks and MacBook Apple OS X

La Crosse Technology 404-1235UA-SS 14 Inch UltrAtomic Analog Stainless Steel Wall Clock

If you work with people from other parts of the world on a regular basis it’s a good idea to know what time or day it is over there. As such I’ve been trying out wall clocks to make it simple to just look up and see – are they waking up? Sleeping? At lunch or dinner? It’s been super helpful. And when I’m traveling in London the family here in California can look up at the wall and get an idea of what I’m up to as well.

The challenge has been to find a reliable easy to use clock that truly simplifies my life instead of making it more complicated. I hate having to change batteries all the time and try to use rechargeable NiMH if possible. I’ve tried all sorts. Even considered building one from a Raspberry Pi or Arduino with those vacuum tubes. We tried the go to the store and purchase the atomic clock that automatically adjusts via radio signal. These have had two issues: (1) only adjustable for USA time zones and (2) poor battery life.

I took a chance and ordered a few from Amazon that said they overcame these two issues. The one I’m using now has been working great for months and nicely solves the issues I found with other wall clocks. You can see what it looks like in the picture above. It has the option of using either 2 or 4 “c” size batteries so plan ahead and fill it up. There are a few other helpful features I really like…
– Custom Time Zone selection to adjust to ANY World Time zones. This is significant because it will continue to receive and adjust to the radio time synchronization signal.
– Dual Antennas for higher signal reception
– Battery saving feature pauses the Second Hand between the hours of 11:00pm until 5:00am. Hour and Minute hands still move.
La Crosse Technology 404-1235UA-SS 14 Inch UltrAtomic Analog Stainless Steel Wall Clock

Now that I’ve been using the wall clock so much I wanted to have the same functions available on my MacBook laptop I carry everywhere with me. So I started googling and searching on twitter and asking my friends. I tried all sorts of suggestions and nothing really worked well. One worked great for a few weeks then after a system update it started sucking CPU and draining the battery. So I went without for a while and just used my phone whenever I was curious as to the time elsewhere. Today – while disabling siri in the system preferences control panel I searched for “World” and found that Apple has thoughtfully integrated a world time clock into their Operating System and it is available via the Notification Panel that show up on the top right hamburger bullet menu. Here are a few screenshots of how it works…

Docker attack

On Thursday, April 25th, 2019, we discovered unauthorized access to a single Hub database storing a subset of non-financial user data. Upon discovery, we acted quickly to intervene and secure the site.

We want to update you on what we’ve learned from our ongoing investigation, including which Hub accounts are impacted, and what actions users should take.

Here is what we’ve learned:

During a brief period of unauthorized access to a Docker Hub database, sensitive data from approximately 190,000 accounts may have been exposed (less than 5% of Hub users). Data includes usernames and hashed passwords for a small percentage of these users, as well as Github and Bitbucket tokens for Docker autobuilds.

Actions to Take:

◦ We are asking users to change their password on Docker Hub and any other accounts that shared this password.

◦ For users with autobuilds that may have been impacted, we have revoked GitHub tokens and access keys, and ask that you reconnect to your repositories and check security logs to see if any unexpected actions have taken place.

▪ You may view security actions on your GitHub or BitBucket accounts to see if any unexpected access has occurred over the past 24 hours -see and

▪ This may affect your ongoing builds from our Automated build service. You may need to unlink and then relink your Github and Bitbucket source provider as described in

We are enhancing our overall security processes and reviewing our policies. Additional monitoring tools are now in place.

Our investigation is still ongoing, and we will share more information as it becomes available.

Thank you,



Kent Lamb

Director of Docker Support

© 2019 Docker Inc. All rights reserved | Privacy Policy

144 Townsend Street, San Francisco, CA 94107

Microsoft IoT in Action Event #IoTinActionMS vision artificial intelligence kit demo

I was able to spend some time at the Internet of Things Event Microsoft sponsored at the Santa Clara Convention Center. There were a few cool demos on display.

Vision AI dev kit

In the video above you can see a demo of the “Vision AI Developer Kit” available for purchase from Arrow for $249 (with free overnight shipping). This kit is manufactured by eInfochips And designed in partnership with Qualcomm using their Snapdragon Neural Processing Engine. It’s not just the hardware that makes up this dev kit. Using azure cloud services developers can create containers with programming code and push that down to devices at the edge to enable real time vision tasks. For example, detecting vehicle that pass through an intersection and counting cars, trucks, bicycles, etc. The images are processed locally on the edge devices and only the meta data need be sent back. These new devices represent the newer advanced “light weight edge” with devices that use less power and less network bandwidth yet offer enhanced functionality and easier code updates. When updates are desired the code in the container is updated and pushed out through the cloud.

Plant monitoring platform

The Naviz Analytics ThingBlu IoT Platform is being used to help plant growers optimize the yield of their crops. For $65 a month subscription you get a set of sensors with solar power and battery backup that constantly collect data such as temperature, humidity, soil pH, leaf canopy wetness, wind and other factors. All this data is guided by Artificial Intelligence this all back to the cloud for analysis, alerts, and recommendations.

Applications include vineyards and cannabis growers. See more in this video: