- First, you need to open cmd in the admin mode, then run all commands below one by one.
- For x86 and x64
cd /d %ProgramFiles(x86)%\Microsoft Office\Office16
cd /d %ProgramFiles%\Microsoft Office\Office16
cd /d %ProgramFiles(x86)%\Microsoft Office\Office16
cd /d %ProgramFiles%\Microsoft Office\Office16
hdiutil create -o /tmp/Sonoma -size 16384m -volname Sonoma -layout SPUD -fs HFS+J
hdiutil attach /tmp/Sonoma.dmg -noverify -mountpoint /Volumes/Sonoma
sudo /Applications/Install\ macOS\ Sonoma.app/Contents/Resources/createinstallmedia --volume /Volumes/Sonoma --nointeraction
hdiutil eject -force /Volumes/Install\ macOS\ Sonoma
hdiutil convert /tmp/Sonoma.dmg -format UDTO -o ~/Desktop/Sonoma
mv -v ~/Desktop/Sonoma.cdr ~/Desktop/Sonoma.iso
rm -fv /tmp/Sonoma.dmg
Function Remove-PrintersFromComputers { | |
<# | |
Remove-PrintersFromComputers -PrinterToExclude "Printer1, Printer2, *Printer4*" -ComputerName "Computer1" | |
#> | |
[CmdletBinding()] | |
Param( | |
[String]$ComputerName = "localhost", | |
[String]$PrinterToExclude |
# Deploy this via PDQ Deploy or run once as admin | |
# Delete all Network Printers | |
Get-WmiObject -Class Win32_Printer | where{$_.Network -eq 'true'} | ForEach-Object {$_.Delete()} | |
# Add Driver to the Store | |
# ... example for Sharp 1910a - 9.1.18.47 | |
pnputil.exe /a "\\nas01\tools\drivers\_Printers\MX_D54_PCL6_PS_1910a_German_64bit\German\PCL6\64bit\su0emdeu.inf" | |
# Install the Driver |
'------------------------------------------------------------------------------------ | |
' Over Complicated Printer Logon script | |
' By Christopher Goluch aka Rusketh (2019) | |
' | |
' USAGE: | |
' Set this as a user login script by group policy. | |
' Change the settings section to match your sites set up. | |
' For every printer that you have on the print server, create a new security group with the same name as the printer. | |
' Add users & computers to the printer groups on active directory. | |
' After login, network printers will be deleted and all relevant printers will be mapped. |
Secrets such as aws key and secret, google service account json, database id and password etc. can be easily encrypted and decrypted with https://cloud.google.com/kms/. Cloud KMS does not directly store secrets. It can encrypt secrets that you store elsewhere, i.e. the key itself is stored within KMS.
Let's illustrate with a real world example step by step. We can encrypt and decrypt a service account json file for compute instances. These instances are a part of an elasticsearch cluster. The google cloud admin creates the service account. The service account is used by the Terraform to provision the compute instances as shown in https://www.terraform.io/docs/providers/google/r/compute_instance.html. The developers want a copy of the service account 's json file so that they can develop & test with the elasticsearch cluster. The google cloud admin creates the plain text service json file, where and how to store it safely and securely? Storing on admin's laptop is not 100% safe and secur
Office 2016 (32-bit) on a 32-bit version of Windows
cscript "C:\Program Files\Microsoft Office\Office16\OSPP.VBS" /dstatus
Office 2016 (32-bit) on a 64-bit version of Windows
cscript "C:\Program Files (x86)\Microsoft Office\Office16\OSPP.VBS" /dstatus
Office 2016 (64-bit) on a 64-bit version of Windows
#! /usr/bin/env bash | |
if [[ -x /Applications/PaperCut\ MF/server/bin/mac/server-command && | |
-x /Applications/PaperCut\ NG/server/bin/mac/server-command ]] ; then | |
echo copies of both NG and MF installed! | |
exit 1 | |
elif [[ -x /Applications/PaperCut\ MF/server/bin/mac/server-command ]]; then | |
app_root='/Applications/PaperCut MF' | |
elif [[ -x /Applications/PaperCut\ NG/server/bin/mac/server-command ]]; then | |
app_root='/Applications/PaperCut NG' |
#!/bin/bash | |
## from http://groups.google.com/group/macenterprise/browse_thread/thread/25647cbd9e346d16 | |
# remove exiting printers | |
curPrinterList=`lpstat -p | grep printer | awk '{ print $2 }'` | |
for p in $curPrinterList; do | |
echo "Removing $p..." | |
if lpadmin -x $p; then | |
echo "Done" | |
else | |
echo "\n*******Error removing $p********\n$result\n\n" |