Pacific Computer Wizards - Repository ....

An information repository of … thoughts, data, sharing, and ideas, posted.
    – Use the information in these posts at your own risk.      
                                The ideas, thoughts, and expressions posted here are for my own use.                 
  -President & Chief Wizard                                                        

Sign up your non-Gmail email address to access Google Shared Resources

posted Jan 24, 2019, 1:49 PM by Andrew Chadick

This step-by-step walkthrough will show you exactly how to use your company email address (the email we recommended you set up before or another domain of your choosing) to create a Google Account.

1. Open and click the blue Sign in button at top right of your screen. If you are already signed in, log out first and then click the Sign inbutton.

sign into google

2. Next click the Create account link below the sign in box for a new Google Account sign up form.

create google account

3. Fill in your First and Last Name in the appropriate fields.

4. Under the “Choose your username” box is a link that says “I prefer to use my current email address” which, when clicked, will allow you to use your alternate email address. Click that link.

use current email address

5. Then you can enter your current (non-Gmail) email address in the box.

input email address

6. You can then continue filling out the rest of the form, which is pretty standard and doesn’t require any special steps:

  • Create and confirm a password
  • Enter your birthdate
  • Select your gender
  • Add your mobile phone number (for security)
  • Choose your geographic locations

Once you’ve filled out all the fields you can click the Next step button. You’ll then be asked to confirm that you agree with Google’s Privacy and Terms. Once you’ve done that you’ll just need to confirm your account by following the instructions sent to your email address that you gave.

And that’s it! You’ve officially set up a company Google account with your own domain name.


Fonts adding users for Active Directory

posted Jan 18, 2019, 12:49 PM by Andrew Chadick   [ updated Jan 22, 2019, 6:57 AM ]

CMD as administrator

attrib -r -s %systemroot%\fonts

takeown /f "%systemroot%\fonts" /r /d n

After taking ownership, you can go into Explorer and add those that need to have access.

SSL Tests - Checking for Vulnerabilities on your domain

posted Jan 10, 2019, 9:13 AM by Andrew Chadick   [ updated Jan 10, 2019, 10:03 AM ]

Testing for online vulnerabilities for your website is part of both PCI compliance, but is now the best practice for systems admins around the world. Making sure your web-server is secure, and your systems are reasonably safe is a priority.  Use these tools to help develop a testing regimen to treat your systems and make sure that they are healthy.  

Do this one first:

Others to use:

Other build your own option:

SSL Cipher Suite:

SSL/TLS Protocols
TLSv1.3 TLSv1.2


posted Nov 26, 2018, 6:16 AM by Andrew Chadick

Compatibility Layer


VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux. Brought to you by IDRIX ( and based on TrueCrypt 7.1a.

VeraCrypt main features:

Enable sandboxing for Windows Defender

posted Oct 30, 2018, 7:30 AM by Andrew Chadick   [ updated Oct 30, 2018, 7:58 AM ]

Setx Command Reference.

Running Windows Defender in a sandbox is supported on Windows 10, v1703 or later. 
You enable the sandbox by setting up a machine-wide environment variable: 
(setx /M MP_FORCE_USE_SANDBOX 1) and restarting the computer.

Run CMD as Administrator:

How it all works - and When to use it

posted Oct 12, 2018, 8:24 AM by Andrew Chadick   [ updated Oct 30, 2018, 7:37 AM ]

Microsoft Office 365 - Teams, Yammer, Outlook and SharePoint.  How all the tools work together on the one Windows 10 Interface.

GSuite to Other (as Back up)

posted Oct 8, 2018, 10:15 AM by Andrew Chadick   [ updated Oct 8, 2018, 10:19 AM ]

Suite -> Gmail -> Adv Settings -> General Settings -> Recipient Address Map -> Edit
All Incoming Messages
Also Route to Original (True)
Add X-Gm-Original-To Header (Yes)

Note:  Name@Domain.x, Name@Domain.y   Then Click Add.

Let's Encrypt

posted Sep 28, 2018, 9:13 AM by Andrew Chadick   [ updated Oct 4, 2018, 12:16 PM ]

Configuration.xml - Office 2019 Standard - Office Deployment Tool

posted Sep 26, 2018, 2:48 PM by Andrew Chadick   [ updated Jan 22, 2019, 6:55 AM ]

<Add OfficeClientEdition="64">
<Product ID="Standard2019Volume"  PIDKEY="AAAAA-BBBBB-CCCCC-DDDDD-EEEEE">
           <Language ID="en-us"/>
            <ExcludeApp ID="Access"/>
            <ExcludeApp ID="Groove"/>
            <ExcludeApp ID="Lync"/>
<Display Level="Full" AcceptEULA="TRUE"/>
<Property Name="AUTOACTIVATE" Value="1"/>
<Property Name="FORCEAPPSHUTDOWN" Value="TRUE"/>
<Property Name="SharedComputerLicensing" Value="0"/>
<Property Name="PinIconsToTaskbar" Value="TRUE"/>
<Updates Enabled="TRUE" Channel="Monthly" />

Notes Office Deploy Tool / XML Usage:
Elevated CMD Prompt
setup /download configuration.xml
setup /configure configuration.xml

NOTE: CHANGE*  Now requires full path to be entered for both the setup location and the config file location:
\\ComputerName\c$\InstallSources\OfficeTemp\setup.exe /configure \\ComputerName\c$\InstallSources\OfficeTemp\configuration.xml

For the Retail version, you can use this Product ID: "Standard2019Retail"; 
<Add OfficeClientEdition="64" Channel="Monthly">
<Product ID="Standard2019Retail" PIDKEY="AAAAA-BBBBB-CCCCC-DDDDD-EEEEE">
If you want to enter your MAK key after the fact, under Account, Change Product Key, you can leave off the PIDKEY.

Cyber Safety -

posted Sep 7, 2018, 10:53 AM by Andrew Chadick   [ updated Sep 7, 2018, 10:54 AM ]


Criminals need 2 things to perpetrate cyber crime: Your Personal Identifying Information(PII), and access to a Point of Compromise(PoC). 

Examples of Personal Identifying Information (PII):


Date of Birth

Mother's Maiden Name


Phone Number(s)

Email Account(s)


Social Security Number

Account Number(s)

Examples of Points of Compromise:

   Physical Items -

      Dumpster diving, mail theft, check fraud, burglaries, purse/wallet snatching

   Technology -

      Skimming, Shoulder Surfing, Gas Pumps, Point of Sale (POS) devices, Radio Frequency Identification (RFID)

   Computer and Internet -

      Social Media, Email, Unsecure Websites, Online Shopping, Classifieds, Unsecure Wifi, Filesharing, Bot Nets, Data Breach

   Mobile Devices -

      SMS Phishing, GeoTagging, Spyware, Malware, Bluejacking, Near Field Communication (NFC), Quick Response Codes



Secure Points of Compromise- Balance convenience versus safety/security

   Physical Items

      Use physical locks, purge, shred, secure mail


      Credit versus Debit versus Cash (Pin number versus Zip Code)

   Computer and Internet

      Strong Passwords - A password as a lock (15 digits or more, Caps, lowercase, Number, Symbol!)

      Two Factor - If a dual authentication method is available USE IT

   Mobile devices

      Limit access, use passcodes/finger prints/application locks/pin access to applications


Practice responsible sharing!


      WHY do you need my PII?

      WHAT are you going to do with it?

      HOW will you protect my data?

      HOW can I monitor my data?

      WHAT will you do when you are done with the data?

Plan for Safety -

        It costs more NOT to pay attention 

               Use technology to monitor and protect your data

               Educate yourself on emerging technologies

               Be mindful of safety versus convenience when accessing technology

Resources for Remediation:

Federal Trade Commission:  File a complaint: 1-877-FTC-HELP or  1-877-382-4357

Identity Theft Resource Center: 888-400-5530

Privacy Rights Clearinghouse:

These tips provided by NOVA - National Organization for Victim Assistance 1-800-879-6682.

1-10 of 181