Month: July 2024
Using Export API with Defender Vulnerability Management
Microsoft Defender Vulnerability Management helps organizations identify and remediate security vulnerabilities in their environment.
It provides a centralized view of vulnerabilities across all device types in an organization and prioritizes them based on severity and exploitability.
Defender Vulnerability Management provides an export API that allows programmatic access to vulnerability data. The API can be used to automate vulnerability management tasks, integrate vulnerability data with other security tools, and generate custom reports and dashboards.
In this blog, we will share guidance and best practices for using Defender Vulnerability Management Export API including:
Overview of the Export API
Available API methods using Export API
Using API Explorer
Managing large data sets and ensuring exports are up to date
Use Export API to build custom dashboards/reports
Defender Vulnerability Management data integrated in other tools
Overview of the Export API data types
Export API is used for publishing raw data of all known software vulnerabilities and their details for devices in the organization.
There are two export API methods: JSON response and files.
Method
Explanation
JSON response
Can be used to get Defender Vulnerability Management snapshot of all data in the organization or can be used to query delta changes in the last X days (where X is up to 15 days)
Delta export indicates per CVE record the CVE status (New, Updated or Resolved)
Can be saved as excel file, opened in Notepad or VScode, and can be extracted using different scripts
Files
Can be used to get Defender Vulnerability Management snapshot of all data in the organization
Recommended for large organizations with more than 100K devices
Each file contains 100K records
To get the next results batch, use skip token (@odata.nextLink field)
Result in files format is valid for 3 hours to download (sass URL)
The files also contain information about devices that are not yet onboarded to Defender
Export software vulnerabilities assessment f, $skiptoken, $top, pageSize
Delta export software vulnerabilities assessment filter options: RbacName , $skiptoken, $top, pageSize, sinceTime
More details can be seen here: Export software vulnerabilities assessment per device | Microsoft Learn
Available API methods using Export API
via files:
API Method
Details
SoftwareVulnerabilitiesExport
Software vulnerabilities data by machine
Export software vulnerabilities assessment per device | Microsoft Learn
SoftwareInventoryExport
software data by machine
Export software inventory assessment per device | Microsoft Learn
InfoGatheringExport
Export information gathering assessment | Microsoft Learn
SoftwareInventoryNonCpeExport
non cpe products by machine
Export non product code software inventory assessment per device | Microsoft Learn
SecureConfigurationsAssessmentExport
SCA data by machine(configurations)
Export secure configuration assessment per device | Microsoft Learn
HardwareFirmwareInventoryExport
firmware data by machine
Hardware and firmware assessment methods and properties per device | Microsoft Learn
BrowserExtensionsInventoryExport
browser extensions by machine
Export browser extensions assessment | Microsoft Learn
BaselineComplianceAssessmentExport
Baseline data by machine
Security baseline assessment methods and properties per device | Microsoft Learn
CertificateAssessmentExport
certificates data by machine
Certificate assessment methods and properties per device | Microsoft Learn
JSON response:
SoftwareVulnerabilitiesByMachine
vulnerabilities data by machine
Export software vulnerabilities assessment per device | Microsoft Learn
SecureConfigurationsAssessmentByMachine
SCA data by machine(configurations)
Export secure configuration assessment per device | Microsoft Learn
SoftwareVulnerabilityChangesByMachine
delta
Export software vulnerabilities assessment per device | Microsoft Learn
SoftwareInventoryByMachine
software data by machine
Export software inventory assessment per device | Microsoft Learn
SoftwareInventoryNoProductCodeByMachine
non cpe products by machine
Export non product code software inventory assessment per device | Microsoft Learn
BrowserExtensionsInventoryByMachine
browser extensions by machine
Export browser extensions assessment | Microsoft Learn
HardwareFirmwareInventoryByMachine
firmware data by machine
Hardware and firmware assessment methods and properties per device | Microsoft Learn
BaselineComplianceAssessmentByMachine
baseline data by machine
Security baseline assessment methods and properties per device | Microsoft Learn
CertificateAssessmentByMachine
certificates data by machine
Certificate assessment methods and properties per device | Microsoft Learn
Using API Explorer from security portal
With the API Explorer, you can:
Run requests for any method and see responses in real-time
Quickly browse through the API samples and learn what parameters they support
Make API calls with ease
To start, Open Defender portal and navigate to ‘Endpoints-Partners and API-API Explorer ‘
Based on the required data to explore, add the suffix to the API call.
In the example, we will use software vulnerabilities:
https://api.security.microsoft.com/api/machines/SoftwareVulnerabilitiesExport
Run the query
To check its working and export to excel:
Copy one of the files URL from the results:
Open it in website and save the JSON file
Extract the JSON file
Open excel , click on ‘Data’ tab->get data->from file->from JSON and choose the file you saved above
Managing large data sets and ensuring exports are up to date
In case of large amounts of data, Organizations can use the below steps to avoid pulling all defender vulnerability management data every day and still ensure data in export is up to date:
1.Pull ‘Export software vulnerabilities assessment’ once a week
2.Pull ‘Delta export software vulnerabilities assessment’ once a day
3.Join the full snapshot with the delta file based on Device ID, Software name and version and CVE ID
4.Latest ‘Event time stamp’ indicate on the latest status of a specific CVE
Use Export API to build custom dashboards/reports
Using Defender Vulnerability Management Export API customers can build custom reports and dashboards per the organization needs. We have seen organizations build anything executive or management reports to detailed vulnerability management dashboards.
There are variety of methods to use the API such as Power-Automate, Power BI, , Advanced hunting using Python, Advanced hunting using PowerShell, Using OData queries.
One example to get started is to use Defender Vulnerability Management Power BI templates which enable out of the box reports such as Organization existing vulnerabilities, Software inventory, Missing Windows security updates and more.
You can download the templates here.
Defender Vulnerability Management data integrated in other tools
Defender Vulnerability Management data can be integrated in other security tools. Below examples of both Microsoft and non-Microsoft tools:
Microsoft Intune
Integration with Microsoft Intune allows customers to ‘Request Remediation’ to vulnerability security recommendations. This will create an Intune package deployment request and remediation activity item within the security portal, which can be used for monitoring the remediation progress for this recommendation.
ServiceNow Vulnerability Response
Microsoft Sentinel
Use Sentinel to store Defender Vulnerability Management history data. This can be used to integrate vulnerability data with other XDR workflows data, build a custom dashboard and as part of it reflect vulnerability management trends and more. To store Defender Vulnerability Management data, please follow the below:
Please make sure any analytic rules/hunting queries/workbooks or any content that is related to Defender Vulnerability Management data is directed to the tables you have created.
Microsoft Security Exposure Management
Exposure Management integrates with Defender Vulnerability Management helping security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization’s digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track and delegate vulnerabilities within the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement.
To learn more about, see documentation about security initiatives or blog series introducing Exposure Management.
for additional Defender Vulnerability Management, please visit Documentation page and Ninja page
Microsoft Tech Community – Latest Blogs –Read More
Learn Cloud: Simplifying Cloud Deployments for Students and Educators on VS Code
Have you ever wanted to deploy your code to the cloud, but felt overwhelmed by the complexity and options? As a student or educator, the learning curve and multitude of choices can make cloud computing seem daunting. Do you wish there was an easy way to grasp the basics of cloud computing while working on your own projects or teaching your students? You’re not alone. Many learners and teachers face these challenges.
That’s why we created Learn Cloud. Learn Cloud guides you through the process of deploying your code to the cloud with easy-to-follow steps, interactive explanations, and customized recommendations. Whether you’re working with an existing codebase or starting from a beginner-friendly starter project, Learn Cloud will help you and your students get apps up and running in the cloud in minutes.
With Learn Cloud, you can:
Use a ready-made template to create a simple web app or use your own code.
Choose the best cloud service for your app.
Follow a step-by-step tutorial that walks you through the deployment process, based on your operating system and language stack.
Learn the key concepts and terms of cloud computing.
Access your app from any browser or use vscode.dev and github.dev to edit your code online.
Key Benefits for Students and Educators:
Simplified Learning: Breaks down the cloud deployment process into manageable steps, making it easy to understand.
Customized Recommendations: Suggests the best cloud services and configurations based on your project’s needs.
Beginner-Friendly Projects: Offers starter projects designed to introduce cloud concepts in an accessible way.
Learn Cloud is more than just a tool. It’s a learning experience that will help you master the fundamentals of cloud computing and make your first deployment a breeze. Ready to get started? Read on to find out how to install and use Learn Cloud and see some examples of what you can build with it.
Pre-requisites
Visual Code 1.83.0 or above. Install Visual Studio Code for FREE
To get started, you need to install the Learn Cloud extension on Visual Studio Code. On your VS Code side bar, click the extensions icon and type ‘Learn Cloud’ in the search bar.
Select the extension from the search results and click install.
Once the extension is successfully installed, an extra icon will appear on your side bar as shown in the image below. Click it to open Learn Cloud, and this will open 2 sections
Roadmap – Contains a general content outline.
Instructions – Contains the step-by-step guided learning materials, with resources for each milestone in the roadmap.
Learn Cloud walks you through 5 key milestones, and we’ll briefly look at each:
[0] Introduction
Cloud computing is a powerful and flexible way to access computing resources over the internet. It allows you to scale up or down your applications, store and process large amounts of data, and use various services and tools without having to manage the infrastructure yourself. In this part of the roadmap, you will learn the basics of cloud computing and how it can benefit you as a developer or a learner. This is a short and easy introduction that will prepare you for the next steps.
[1] Setup Azure Account
Now that you know what cloud computing is and why it matters, you are ready to take the next step: creating your own Azure account. This will give you access to a world of cloud services and resources that you can use to build, deploy, and manage your applications. You can create a free Azure account and you will get $ 200 Azure credits to explore and experiment with Azure for 30 days, at no cost to you.
Note: If you are a student, you can get even more benefits from Azure. You can sign up for a free Azure for Students subscription, which gives you $100 Azure credits every year while you are a student, as well as access to over 25 free Azure services.
After you create your Azure account, you will learn some key cloud concepts that will help you understand how Azure works and what it can do for you.
[2] What is Azure PaaS
In this section, you will learn how to deploy your web app, explore the different Platform as a Service (PaaS) options that Azure offers and learn how to choose the best one for your app. You will also discover the difference between static and dynamic web apps and how they affect your deployment strategy.
But that’s not all. You will also see how you can enhance your web app with other Azure resources that add more functionality and features to your app. By the end of this milestone, you will have a clear understanding of the deployment services and resources that Azure provides and how to use them effectively.
[3] Deploy to Azure
Get ready to launch your first web app to Azure in Milestone 3! Whether you are a beginner or an expert, this roadmap will guide you through the steps and choices you need to make to deploy your app successfully.
This step gives you 2 deployment options:-
Deploy from a starter sample, by selecting your programming language of choice
If you don’t have your own code yet, no problem! Learn Cloud gives you access to a variety of sample projects created by Microsoft and the community. You can choose a project based on your favorite programming language, framework, tools, and more.
After you pick a project, the extension will show you how to set up azd on your local machine and deploy the project to your Azure account with one click. You can also explore the code and the Azure resources to learn how the project works and what you can do with it.
2. The other option is to deploy from your own code on GitHub.
Imagine deploying your code to Azure with just a few clicks. That’s what you can do with App Spaces, a powerful Azure service that scans your GitHub repository and automatically picks the best Azure service for your web application. Based on your code structure, App spaces will deploy your web application to either a Static Web App or Azure Container App handling the deployment for you and letting you focus on your code.
[4] Azure Tools
Are you ready for more? The final module of this course will blow your mind with the amazing tools that Azure offers to take your code to cloud journey to the next level. You’ll learn how to use other relevant services on Azure that can supercharge your web application’s performance, security, scalability, and functionality.
But don’t stop there! You can share your ideas, feature requests and report bugs by contributing to the project on GitHub.
You have seen how easy it is to create, deploy, and manage web applications on Azure using various tools and frameworks. You have also gained hands-on experience with the code to cloud workflow and best practices shared on Learn Cloud. Now you have the skills and knowledge to build your own web applications on the cloud and take advantage of the benefits that Azure offers. Whether you want to develop a personal project, a professional portfolio, or a business solution, Azure has the right tools and services for you.
With Learn Cloud, you’ll gain practical experience in cloud computing, empowering you to confidently deploy your projects and enhance your learning or teaching journey. Get started with Learn Cloud today and bring the power of the cloud to your educational experience!
Don’t miss this opportunity to explore the endless possibilities that cloud computing can offer you. You’ll be amazed by how much you can achieve with Azure.
Resources
Install the Learn Cloud VS Code extension – https://marketplace.visualstudio.com/items?itemName=azurepaas-tools.vscode-learncloud
Learn Cloud on GitHub – https://github.com/microsoft/vscode-learncloud
Learn cloud, share cloud, and build cloud.
Microsoft Tech Community – Latest Blogs –Read More
How to delete a line from UIAxes using plotedit in the menu bar with app designer.
Hi,
I want to edit a line from UIAxes using plotedit in the menu bar with app designer. I used callback "Plot_editMenuSelected" But it is not working.
function Plot_editMenuSelected(app, event)
plotedit(app.UIAxes,’on’)
end
Can someone please tell me solution?
ThanksHi,
I want to edit a line from UIAxes using plotedit in the menu bar with app designer. I used callback "Plot_editMenuSelected" But it is not working.
function Plot_editMenuSelected(app, event)
plotedit(app.UIAxes,’on’)
end
Can someone please tell me solution?
Thanks Hi,
I want to edit a line from UIAxes using plotedit in the menu bar with app designer. I used callback "Plot_editMenuSelected" But it is not working.
function Plot_editMenuSelected(app, event)
plotedit(app.UIAxes,’on’)
end
Can someone please tell me solution?
Thanks app designer, plotedit, uiaxes, menu MATLAB Answers — New Questions
Export Simscape to FMU
Hi,
I am currently trying to export a Simscape Model to FMU.
If this Model as schown in the picture without Connection Port can als FMU export.
Could the Connection port be used as a second output? I also can’t find any paper about this. Thanks a lot.
Best regards
SophiaHi,
I am currently trying to export a Simscape Model to FMU.
If this Model as schown in the picture without Connection Port can als FMU export.
Could the Connection port be used as a second output? I also can’t find any paper about this. Thanks a lot.
Best regards
Sophia Hi,
I am currently trying to export a Simscape Model to FMU.
If this Model as schown in the picture without Connection Port can als FMU export.
Could the Connection port be used as a second output? I also can’t find any paper about this. Thanks a lot.
Best regards
Sophia simscape, fmu MATLAB Answers — New Questions
Error installing Communication Toolbox Support Package for USRP Radio on offline Linux machine
I am trying to connect an N210 SDR to a computer running RHEL 8.2 and Matlab R2021b offline. This computer already has UHD installed. My online computer is running Windows and R2024a. I downloaded Support Software Downloader for win64 and downloaded the Communication Toolbox Support Package for USRP Radio for R2021b and moved the folder to the offline machine. I followed the intructions on the readme.txt and tried the interactive installation but I encountered an error that it failed to install the UHD Precompiled Library. Afterwards, the communications toolbox suppport package shows in the add-on manager but I am not able to configure the USRP and if I try to define a comm.SDRuReceiver I get an error that Matlab is unable to resolve the name. I tried removing the toolbox and reinstalling with the Silent Installation and don’t receive any errors, but the outcome is the same (can’t configure USRP and can’t resolve the name).
How can I fix this error? Is there a specific location that Matlab is looking for UHD to be installed at?I am trying to connect an N210 SDR to a computer running RHEL 8.2 and Matlab R2021b offline. This computer already has UHD installed. My online computer is running Windows and R2024a. I downloaded Support Software Downloader for win64 and downloaded the Communication Toolbox Support Package for USRP Radio for R2021b and moved the folder to the offline machine. I followed the intructions on the readme.txt and tried the interactive installation but I encountered an error that it failed to install the UHD Precompiled Library. Afterwards, the communications toolbox suppport package shows in the add-on manager but I am not able to configure the USRP and if I try to define a comm.SDRuReceiver I get an error that Matlab is unable to resolve the name. I tried removing the toolbox and reinstalling with the Silent Installation and don’t receive any errors, but the outcome is the same (can’t configure USRP and can’t resolve the name).
How can I fix this error? Is there a specific location that Matlab is looking for UHD to be installed at? I am trying to connect an N210 SDR to a computer running RHEL 8.2 and Matlab R2021b offline. This computer already has UHD installed. My online computer is running Windows and R2024a. I downloaded Support Software Downloader for win64 and downloaded the Communication Toolbox Support Package for USRP Radio for R2021b and moved the folder to the offline machine. I followed the intructions on the readme.txt and tried the interactive installation but I encountered an error that it failed to install the UHD Precompiled Library. Afterwards, the communications toolbox suppport package shows in the add-on manager but I am not able to configure the USRP and if I try to define a comm.SDRuReceiver I get an error that Matlab is unable to resolve the name. I tried removing the toolbox and reinstalling with the Silent Installation and don’t receive any errors, but the outcome is the same (can’t configure USRP and can’t resolve the name).
How can I fix this error? Is there a specific location that Matlab is looking for UHD to be installed at? usrp, uhd, offline, matlab, linux MATLAB Answers — New Questions
Create A FIPS-140 Compliant Secure Offline Password Management System for Windows / WSA / WSL2
Keepass Portable version (KeePass-2.xx.zip file) | KeePassDX (Android – Latest – Build Free)
Guidelines for Creating Passwords:
1.) *MOST* newer and legacy systems do not support passwords longer than 64 characters as a rule of thumb (or the full range of printable ASCII Characters)
2.) They MUST also Utilize a Cryptographically Secure Pseudorandom Number Generation Scheme (NIST Random Bit Generation Overview -> https://csrc.nist.gov/Projects/Random-Bit-Generation)
3.) Password Generators Should AVOID Introducing Bias Towards one Range of Characters or an Individual Character at ALL COSTS
4.) No whitespaces, and no Control Characters are allowed -> https://www.unicode.org/charts/PDF/U0000.pdf
5.) The maximum range for all printable characters within the Latin ASCII Character set (Unicode,) is 1-94 Characters in BASE10 / Decimal (0-93 in BASE64 / HEX) -> 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz!”#$%&'()*+,-./:;<=>?@[]^_`{|}~
NOTE: KeePass Seed for Keyfile: 32767 HEX chars (32KB + HASH CRC / Checksum value)
NOTE: VeraCrypt Keyfile: 2^20 (2097152 HEX chars) output directly in raw form to hex editor then save for 1MB file size
NOTE: When using Veracrypt: If a GPT partition on a non-system volume, is created using “Convert GPT” in the Diskpart utility, or with a Diskpart script, delete any reserved partitions on that drive FIRST, and then create a primary partition. This works much better in cross-platform settings, especially with removable drives / mass storage devices, and it also wastes less space.
Useful Links for Password Management on Older Versions of Windows, MS-DOS, PC-DOS, FreeDOS, CP/M, OS/2, some Unix / Linux variants:
Windows Wordpad/Microsoft Word/Office Standards -> https://docs.microsoft.com/en-us/openspecs/standards_support
Windows Code Page 1252 / IBM 437 (Informal standard found in most early x86 PCs and IBM AT/XT clones)
ISO 8859-1 (Standardized version of IBM437) -> https://docs.microsoft.com/en-us/windows/win32/intl/code-pages
Code Page Identifiers -> https://docs.microsoft.com/en-us/windows/win32/intl/code-page-identifiers
ISO/IEC 8859-1:1998 -> https://webstore.iec.ch/publication/11730
Unicode Character Code Charts -> https://www.unicode.org/charts/
Guidelines for Creating a Manual Password List Printout / Sheet / Card:
1.) Always use a monospaced font with a slashed zero
2.) Choose Size 9-10 in Regular or Bold
3.) Examples: Consolas, Cascadia Code, Monaco, Menlo, Roboto Mono, PT Mono, etc -> https://en.wikipedia.org/wiki/List_of_monospaced_typefaces
START:
___PW:
——-0123456789———-0123456789–
+++++++———-++++++++++———-++
CONSOLAS BOLD 12PT < DELETE THIS LINE AFTER
START:
___PW:
——-0123456789———-0123456789–0123456789———-0123456789–
+++++++———-++++++++++———-++———-++++++++++———-++
CONSOLAS BOLD 12PT < DELETE THIS LINE AFTER
Post-Installation Guide for KeePass / KeePassDX ->
Enable FIPS 140 Mode: KeePass.chm -> Technical FAQ – PG# 37/40 -> If all your PCs have the .NET Framework 4.8 or higher installed, you can enable the usage of FIPS-validated algorithm implementations by opening the ‘KeePass.exe.config’ file using a text editor and deleting the line ‘<enforceFIPSPolicy enabled=”false” />’.
Options -> Security -> Clipboard auto-clear time (seconds; main entry list): 5
Options -> Security -> General -> Lock workspace when locking the computer or switching the user
Options -> Security -> General -> Lock workspace when the computer is about to be suspended
Options -> Security -> General -> Lock workspace when the remote control mode changes
Options -> Security -> Clipboard (Main Entry List) -> Clear clipboard when closing KeePass
Options -> Security -> Clipboard (Main Entry List) -> Do not store data in the Windows clipboard history and the cloud clipboard
Options -> Security -> Clipboard (Main Entry List) -> use ‘Clipboard Viewer Ignore’ clipboard format
Options -> Security -> Advanced -> Use native library for faster key transformations
Options -> Security -> Advanced -> Enter master key on secure desktop
Options -> Security -> Advanced -> Clear master key command line parameters after using them once
Options -> Security -> Advanced -> Remember master password (in encrypted form) of a database while it is open
Options -> Policy -> Plugins
Options -> Policy -> Auto-Type
Options -> Policy -> Auto-Type – Without Context
Options -> Interface -> Main Window -> Minimize to tray instead of taskbar
Options -> Interface -> Main Window -> Minimize main window after performing auto-type
Options -> Interface -> Main Window -> Minimize main window after locking the workspace
Options -> Interface -> Main Window -> Hide ‘Close Database’ toolbar button when at most one database is open
Options -> Interface -> Entry List -> Use alternating item background colors
Options -> Interface -> Entry List -> When selecting an entry, automatically select its parent group, too
Options -> Interface -> Entry List -> When showing dereferenced data, additionally show references
Options -> Interface -> Dialogs -> Show confirmation dialog when moving entries/groups to the recycle bin
Options -> Interface -> Dialogs -> Show results of database maintenance in a dialog
Options -> Interface -> Dialogs -> Show confirmation dialog when opening a database file whose minor format version is unknown
Options -> Interface -> Advanced -> Require password repetition only when hiding using asterisks is enabled
Options -> Interface -> Remember recently used files: 1
Options -> Integration -> System-wide hot keys -> Global auto-type: None
Options -> Integration -> System-wide hot keys -> Global auto-type – password only: None
Options -> Integration -> System-wide hot keys -> Auto-type selected entry: Ctrl+Alt+Shift+A
Options -> Integration -> System-wide hot keys -> Show KeePass window: None
Options -> Advanced -> Start and Exit -> Remember and automatically open last used database on startup
Options -> Advanced -> Start and Exit -> Limit to single instance
Options -> Advanced -> Start and Exit -> Start minimized and locked
Options -> Advanced -> Auto-Type -> Always show global auto-type entry selection dialog
Options -> Advanced -> Auto-Type – Sending -> Prepend special initialization sequence for Internet Explorer windows
Options -> Advanced -> Auto-Type – Sending -> Send Alt keypress when only the Alt modifier is active
Options -> Advanced -> Auto-Type – Sending -> Ensure same keyboard layouts during auto-type
Options -> Advanced -> Auto-Type – Sending -> Allow interleaved sending of keys
Options -> Advanced -> Auto-Type – Sending -> Cancel auto-type when the target window changes
Options -> Advanced -> Auto-Type – Sending -> Cancel auto-type when the target window title changes
Options -> Advanced -> File Input/Output Connections -> Verify written file after saving a database
Options -> Advanced -> File Input/Output Connections -> Use file transactions for writing databases
Options -> Advanced -> File Input/Output Connections -> Use file transactions for writing configuration settings
Options -> Advanced -> File Input/Output Connections -> Extra-safe file transactions (slow)
Options -> Advanced -> Automatically search key files
Options -> Advanced -> Remember key sources (key file paths, provider names, …)
Options -> Advanced -> Remember working directories
Options -> Advanced -> Remember password hiding setting in the main window
Options -> Advanced -> Remember password hiding setting in the entry editing dialog
Options -> Advanced -> Mark TAN entries as expired when using them
Misc: Enable Rearranging Entries: View -> Sort By -> No Sort
NOTE: The following 4 settings must be Enabled to modify or create a new Database, though after any changes are saved, they must be disabled before exiting the program
NOTE: New changes require you to selectively enable these settings, without entering in the master key, and then restart the program
1.) Options -> Policy -> New Database
2.) Options -> Policy -> Save Database
3.) Options -> Policy -> Change Master Key
4.) Options -> Policy -> Change Master Key – No Key Repeat
File -> New…
Database Settings -> General -> Database name
Database Settings -> Security -> Database file encryption algorithm: AES/Rijndael (256-bit key, FIPS 197)
Database Settings -> Security -> Key derivation function: AES-KDF
Database Settings -> Security -> Iterations:
Example Iterations:
Start Menu -> Run -> Calc
Calc -> Menu -> Scientific
Calc -> 2 -> xY (exponent) -> 20 -> = -> 1048576 -> M+ (Memory add)
1.) Calc -> MR (Memory recall) -> x or * (multiply) -> 64 -> = -> 67108864 ( Average Delay Time -> Multicore PC: 1-2 Seconds )
1A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
2.) Calc -> MR (Memory recall) -> x or * (multiply) -> 128 -> = -> 134217728 ( Average Delay Time -> Multicore PC: 2-2.5 Seconds )
2A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
3.) Calc -> MR (Memory recall) -> x or * (multiply) -> 256 -> = -> 268435456 ( Average Delay Time -> Multicore PC: 4-4.5 Seconds )
3A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
4.) Calc -> MR (Memory recall) -> x or * (multiply) -> 384 -> = -> 402653184 ( Average Delay Time -> Multicore PC: 7-7.5 Seconds )
4A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
5.) Calc -> MR (Memory recall) -> x or * (multiply) -> 512 -> = -> 536870912 ( Average Delay Time -> Multicore PC: 9-9.5 Seconds )
5A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
6.) Calc -> MR (Memory recall) -> x or * (multiply) -> 768 -> = -> 805306368 ( Average Delay Time -> Multicore PC: 14-14.5 Seconds )
6A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
7.) Calc -> MR (Memory recall) -> x or * (multiply) -> 1024 -> = -> 1073741824 ( Average Delay Time -> Multicore PC: 18-19.5 Seconds )
7A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
8.) Calc -> MR (Memory recall) -> x or * (multiply) -> 1536 -> = -> 1610612736 ( Average Delay Time -> Multicore PC: 28-28.5 Seconds )
8A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
9.) Calc -> MR (Memory recall) -> x or * (multiply) -> 2048 -> = -> 2147483648 ( Average Delay Time -> Multicore PC: 37-38.5 Seconds )
9A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
10.) Calc -> MR (Memory recall) -> x or * (multiply) -> 4096 -> = -> 4294967296 ( Average Delay Time -> Multicore PC: 75-76 Seconds )
10A.) Calc -> MC (Memory Clear)
10B.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
11.) Calc -> Edit -> History -> Clear
11A.) Alternate: Calc -> Right Panel (History Tab) -> Trash Can icon in the bottom right corner (Clear)
NOTE: On most mid-range smartphones, ranges 3-7 can often take anywhere between 2-10 minutes to decrypt
Database Settings -> Compression: Gzip
Database Settings -> Advanced -> Limit number of history items per entry: 0
Database Settings -> Advanced -> Limit history size per entry (MB): 0
Database -> Right Click -> Add Group…
NOTE: More sensitive passwords typically only work with Option #2, and require Two-channel auto-type obfuscation to be disabled
NOTE: Most things work with Option #2 and Two-channel auto-type obfuscation enabled in a browser
NOTE: Option #1 works with the majority of logins for game launchers and other similar software
NOTE: In most situations, Option #2 with Two-channel auto-type obfuscation enabled will be the default choice
Option #1 -> Add Group -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
Option #2 -> Add Group -> Auto-Type -> Override default sequence -> {PASSWORD}
Database -> <Entry Name> -> Edit Entry…
Edit Entry -> Username
Edit Entry -> Password
Edit Entry -> Repeat
NOTE: The easiest way to set it up is assign groups with a special ruleset so post-setup configuration is easier later on
Edit Entry -> Auto-Type -> Enable auto-type for this entry
Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
NOTE: In some cases you might have to bypass the rules for individual entries to maintain a cohesive layout within the group
NOTE: This is if the software does not allow you to tab between fields, or copy paste (security software is like this.)
Option #1 -> Edit Entry -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
Option #2 -> Auto-Type -> Override default sequence -> {PASSWORD}
NOTE: You have to manually enable or disable this for each entry within each group:
Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
Practical Considerations / Choices for the Most Frequently Used KeePass Group Settings Templates / Layouts:
1.) Most common for computer software on a desktop / laptop (2.) Common for browser logins, and some computer software, which is easier to use in conjunction with the “Auto-Type Selected entry” hotkey combination
3.) Most common for security software / programs / poorly-designed web page logins (4.) The least common type of group layout
NOTE: If you are using KeePass to create a database to export to KeePassDX, layout #2 or #3 save the most time when manually editing entries.
1A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
1B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
1C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
1D.) ENABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
2A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {PASSWORD}
2B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
2C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
2D.) ENABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
3A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {PASSWORD}
3B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
3C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
3D.) DISABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
4A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
4B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
4C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
4D.) DISABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
File -> Save
Disable: Options -> Policy -> New Database
Disable: Options -> Policy -> Save Database
Disable: Options -> Policy -> Change Master Key
Disable: Options -> Policy -> Change Master Key – No Key Repeat
Right-Click System Tray Icon -> Lock Workspace
File -> Exit
KeePassDX -> Gear Icon (Top Right Corner) -> App settings
Enable: Delete password
Disable: Write-protected
Enable: Keep screen on
Enable: Show lock button
Generated Password size: 64
Enable: Hide passwords
Enable: Remember databases locations
Enable: Remember keyfile locations
Enable: Show recent files
Enable: Hide broken database links
KeePassDX -> Gear Icon (Top Right Corner) -> Form filling
Device keyboard settings -> Manage Keyboards -> ENABLE: Magikeyboard (KeePassDX)
Enable: Magikeyboard settings -> Entry: Entry selection
Enable: Magikeyboard settings -> Keys: Auto key action
Optional: Enable: Magikeyboard settings -> Switch Keyboard: Auto key action
Enable: Autofill settings -> Manual selection
KeePassDX -> Gear Icon (Top Right Corner) -> Advanced unlocking
Enable: Device credential unlocking
Enable: Auto-open prompt
Delete encryption keys (useful only if you have to generate / import a new database layout)
NOTE: After you reboot the device / smartphone, you have to log into the database, making sure to tap the orange circle emblazoned with a lightning bolt afterwards
NOTE: Save your database ( 3 vertical dots in the top-right corner -> Save data )
KeePassDX -> Gear Icon (Top Right Corner) -> App settings
Enable: Write-protected (Only Enable after saving a working configuration)
NOTE: The Following List Describes a Process for Inputting Database Entries into the Password Field on a Login Screen / Prompt / Form:
1.) Enter in the username for the login credentials if necessary / based on entry / group layout
3.) Enable the keyboard using the following line below
3A.) Settings (Android UI) -> Language & input -> Current keyboard -> Switch from Gboard to Magikeyboard (KeePassDX)
2.) Switch to KeePassDX and select the entry from the database
4.) Switch back to the login screen on the app and click the button with 3 stars / asterisks on it ( *** )
Keepass Portable version (KeePass-2.xx.zip file) | KeePassDX (Android – Latest – Build Free)Guidelines for Creating Passwords:
1.) *MOST* newer and legacy systems do not support passwords longer than 64 characters as a rule of thumb (or the full range of printable ASCII Characters)
2.) They MUST also Utilize a Cryptographically Secure Pseudorandom Number Generation Scheme (NIST Random Bit Generation Overview -> https://csrc.nist.gov/Projects/Random-Bit-Generation)
3.) Password Generators Should AVOID Introducing Bias Towards one Range of Characters or an Individual Character at ALL COSTS
4.) No whitespaces, and no Control Characters are allowed -> https://www.unicode.org/charts/PDF/U0000.pdf
5.) The maximum range for all printable characters within the Latin ASCII Character set (Unicode,) is 1-94 Characters in BASE10 / Decimal (0-93 in BASE64 / HEX) -> 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz!”#$%&'()*+,-./:;<=>?@[]^_`{|}~
NOTE: KeePass Seed for Keyfile: 32767 HEX chars (32KB + HASH CRC / Checksum value)
NOTE: VeraCrypt Keyfile: 2^20 (2097152 HEX chars) output directly in raw form to hex editor then save for 1MB file size
NOTE: When using Veracrypt: If a GPT partition on a non-system volume, is created using “Convert GPT” in the Diskpart utility, or with a Diskpart script, delete any reserved partitions on that drive FIRST, and then create a primary partition. This works much better in cross-platform settings, especially with removable drives / mass storage devices, and it also wastes less space.
Useful Links for Password Management on Older Versions of Windows, MS-DOS, PC-DOS, FreeDOS, CP/M, OS/2, some Unix / Linux variants:
Windows Wordpad/Microsoft Word/Office Standards -> https://docs.microsoft.com/en-us/openspecs/standards_support
Windows Code Page 1252 / IBM 437 (Informal standard found in most early x86 PCs and IBM AT/XT clones)
ISO 8859-1 (Standardized version of IBM437) -> https://docs.microsoft.com/en-us/windows/win32/intl/code-pages
Code Page Identifiers -> https://docs.microsoft.com/en-us/windows/win32/intl/code-page-identifiers
ISO/IEC 8859-1:1998 -> https://webstore.iec.ch/publication/11730
Unicode Character Code Charts -> https://www.unicode.org/charts/
Guidelines for Creating a Manual Password List Printout / Sheet / Card:
1.) Always use a monospaced font with a slashed zero
2.) Choose Size 9-10 in Regular or Bold
3.) Examples: Consolas, Cascadia Code, Monaco, Menlo, Roboto Mono, PT Mono, etc -> https://en.wikipedia.org/wiki/List_of_monospaced_typefaces
START:
___PW:
——-0123456789———-0123456789–
+++++++———-++++++++++———-++
CONSOLAS BOLD 12PT < DELETE THIS LINE AFTER
START:
___PW:
——-0123456789———-0123456789–0123456789———-0123456789–
+++++++———-++++++++++———-++———-++++++++++———-++
CONSOLAS BOLD 12PT < DELETE THIS LINE AFTER
Post-Installation Guide for KeePass / KeePassDX ->
Enable FIPS 140 Mode: KeePass.chm -> Technical FAQ – PG# 37/40 -> If all your PCs have the .NET Framework 4.8 or higher installed, you can enable the usage of FIPS-validated algorithm implementations by opening the ‘KeePass.exe.config’ file using a text editor and deleting the line ‘<enforceFIPSPolicy enabled=”false” />’.
Options -> Security -> Clipboard auto-clear time (seconds; main entry list): 5
Options -> Security -> General -> Lock workspace when locking the computer or switching the user
Options -> Security -> General -> Lock workspace when the computer is about to be suspended
Options -> Security -> General -> Lock workspace when the remote control mode changes
Options -> Security -> Clipboard (Main Entry List) -> Clear clipboard when closing KeePass
Options -> Security -> Clipboard (Main Entry List) -> Do not store data in the Windows clipboard history and the cloud clipboard
Options -> Security -> Clipboard (Main Entry List) -> use ‘Clipboard Viewer Ignore’ clipboard format
Options -> Security -> Advanced -> Use native library for faster key transformations
Options -> Security -> Advanced -> Enter master key on secure desktop
Options -> Security -> Advanced -> Clear master key command line parameters after using them once
Options -> Security -> Advanced -> Remember master password (in encrypted form) of a database while it is open
Options -> Policy -> Plugins
Options -> Policy -> Auto-Type
Options -> Policy -> Auto-Type – Without Context
Options -> Interface -> Main Window -> Minimize to tray instead of taskbar
Options -> Interface -> Main Window -> Minimize main window after performing auto-type
Options -> Interface -> Main Window -> Minimize main window after locking the workspace
Options -> Interface -> Main Window -> Hide ‘Close Database’ toolbar button when at most one database is open
Options -> Interface -> Entry List -> Use alternating item background colors
Options -> Interface -> Entry List -> When selecting an entry, automatically select its parent group, too
Options -> Interface -> Entry List -> When showing dereferenced data, additionally show references
Options -> Interface -> Dialogs -> Show confirmation dialog when moving entries/groups to the recycle bin
Options -> Interface -> Dialogs -> Show results of database maintenance in a dialog
Options -> Interface -> Dialogs -> Show confirmation dialog when opening a database file whose minor format version is unknown
Options -> Interface -> Advanced -> Require password repetition only when hiding using asterisks is enabled
Options -> Interface -> Remember recently used files: 1
Options -> Integration -> System-wide hot keys -> Global auto-type: None
Options -> Integration -> System-wide hot keys -> Global auto-type – password only: None
Options -> Integration -> System-wide hot keys -> Auto-type selected entry: Ctrl+Alt+Shift+A
Options -> Integration -> System-wide hot keys -> Show KeePass window: None
Options -> Advanced -> Start and Exit -> Remember and automatically open last used database on startup
Options -> Advanced -> Start and Exit -> Limit to single instance
Options -> Advanced -> Start and Exit -> Start minimized and locked
Options -> Advanced -> Auto-Type -> Always show global auto-type entry selection dialog
Options -> Advanced -> Auto-Type – Sending -> Prepend special initialization sequence for Internet Explorer windows
Options -> Advanced -> Auto-Type – Sending -> Send Alt keypress when only the Alt modifier is active
Options -> Advanced -> Auto-Type – Sending -> Ensure same keyboard layouts during auto-type
Options -> Advanced -> Auto-Type – Sending -> Allow interleaved sending of keys
Options -> Advanced -> Auto-Type – Sending -> Cancel auto-type when the target window changes
Options -> Advanced -> Auto-Type – Sending -> Cancel auto-type when the target window title changes
Options -> Advanced -> File Input/Output Connections -> Verify written file after saving a database
Options -> Advanced -> File Input/Output Connections -> Use file transactions for writing databases
Options -> Advanced -> File Input/Output Connections -> Use file transactions for writing configuration settings
Options -> Advanced -> File Input/Output Connections -> Extra-safe file transactions (slow)
Options -> Advanced -> Automatically search key files
Options -> Advanced -> Remember key sources (key file paths, provider names, …)
Options -> Advanced -> Remember working directories
Options -> Advanced -> Remember password hiding setting in the main window
Options -> Advanced -> Remember password hiding setting in the entry editing dialog
Options -> Advanced -> Mark TAN entries as expired when using them
Misc: Enable Rearranging Entries: View -> Sort By -> No Sort
NOTE: The following 4 settings must be Enabled to modify or create a new Database, though after any changes are saved, they must be disabled before exiting the program
NOTE: New changes require you to selectively enable these settings, without entering in the master key, and then restart the program
1.) Options -> Policy -> New Database
2.) Options -> Policy -> Save Database
3.) Options -> Policy -> Change Master Key
4.) Options -> Policy -> Change Master Key – No Key Repeat
File -> New…
Database Settings -> General -> Database name
Database Settings -> Security -> Database file encryption algorithm: AES/Rijndael (256-bit key, FIPS 197)
Database Settings -> Security -> Key derivation function: AES-KDF
Database Settings -> Security -> Iterations:
Example Iterations:
Start Menu -> Run -> Calc
Calc -> Menu -> Scientific
Calc -> 2 -> xY (exponent) -> 20 -> = -> 1048576 -> M+ (Memory add)
1.) Calc -> MR (Memory recall) -> x or * (multiply) -> 64 -> = -> 67108864 ( Average Delay Time -> Multicore PC: 1-2 Seconds )
1A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
2.) Calc -> MR (Memory recall) -> x or * (multiply) -> 128 -> = -> 134217728 ( Average Delay Time -> Multicore PC: 2-2.5 Seconds )
2A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
3.) Calc -> MR (Memory recall) -> x or * (multiply) -> 256 -> = -> 268435456 ( Average Delay Time -> Multicore PC: 4-4.5 Seconds )
3A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
4.) Calc -> MR (Memory recall) -> x or * (multiply) -> 384 -> = -> 402653184 ( Average Delay Time -> Multicore PC: 7-7.5 Seconds )
4A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
5.) Calc -> MR (Memory recall) -> x or * (multiply) -> 512 -> = -> 536870912 ( Average Delay Time -> Multicore PC: 9-9.5 Seconds )
5A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
6.) Calc -> MR (Memory recall) -> x or * (multiply) -> 768 -> = -> 805306368 ( Average Delay Time -> Multicore PC: 14-14.5 Seconds )
6A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
7.) Calc -> MR (Memory recall) -> x or * (multiply) -> 1024 -> = -> 1073741824 ( Average Delay Time -> Multicore PC: 18-19.5 Seconds )
7A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
8.) Calc -> MR (Memory recall) -> x or * (multiply) -> 1536 -> = -> 1610612736 ( Average Delay Time -> Multicore PC: 28-28.5 Seconds )
8A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
9.) Calc -> MR (Memory recall) -> x or * (multiply) -> 2048 -> = -> 2147483648 ( Average Delay Time -> Multicore PC: 37-38.5 Seconds )
9A.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
10.) Calc -> MR (Memory recall) -> x or * (multiply) -> 4096 -> = -> 4294967296 ( Average Delay Time -> Multicore PC: 75-76 Seconds )
10A.) Calc -> MC (Memory Clear)
10B.) Calc -> C (Clear) or CE (Clear Entry) then C (Clear)
11.) Calc -> Edit -> History -> Clear
11A.) Alternate: Calc -> Right Panel (History Tab) -> Trash Can icon in the bottom right corner (Clear)
NOTE: On most mid-range smartphones, ranges 3-7 can often take anywhere between 2-10 minutes to decrypt
Database Settings -> Compression: Gzip
Database Settings -> Advanced -> Limit number of history items per entry: 0
Database Settings -> Advanced -> Limit history size per entry (MB): 0
Database -> Right Click -> Add Group…
NOTE: More sensitive passwords typically only work with Option #2, and require Two-channel auto-type obfuscation to be disabled
NOTE: Most things work with Option #2 and Two-channel auto-type obfuscation enabled in a browser
NOTE: Option #1 works with the majority of logins for game launchers and other similar software
NOTE: In most situations, Option #2 with Two-channel auto-type obfuscation enabled will be the default choice
Option #1 -> Add Group -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
Option #2 -> Add Group -> Auto-Type -> Override default sequence -> {PASSWORD}
Database -> <Entry Name> -> Edit Entry…
Edit Entry -> Username
Edit Entry -> Password
Edit Entry -> Repeat
NOTE: The easiest way to set it up is assign groups with a special ruleset so post-setup configuration is easier later on
Edit Entry -> Auto-Type -> Enable auto-type for this entry
Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
NOTE: In some cases you might have to bypass the rules for individual entries to maintain a cohesive layout within the group
NOTE: This is if the software does not allow you to tab between fields, or copy paste (security software is like this.)
Option #1 -> Edit Entry -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
Option #2 -> Auto-Type -> Override default sequence -> {PASSWORD}
NOTE: You have to manually enable or disable this for each entry within each group:
Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
Practical Considerations / Choices for the Most Frequently Used KeePass Group Settings Templates / Layouts:
1.) Most common for computer software on a desktop / laptop (2.) Common for browser logins, and some computer software, which is easier to use in conjunction with the “Auto-Type Selected entry” hotkey combination
3.) Most common for security software / programs / poorly-designed web page logins (4.) The least common type of group layout
NOTE: If you are using KeePass to create a database to export to KeePassDX, layout #2 or #3 save the most time when manually editing entries.
1A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
1B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
1C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
1D.) ENABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
2A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {PASSWORD}
2B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
2C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
2D.) ENABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
3A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {PASSWORD}
3B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
3C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
3D.) DISABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
4A.) ENABLE: Add Group -> Auto-Type -> Override default sequence -> {USERNAME}{TAB}{PASSWORD}{ENTER}
4B.) ENABLE: Edit Entry -> Auto-Type -> Enable auto-type for this entry
4C.) ENABLE: Edit Entry -> Auto-Type -> Inherit default auto-type sequence from group
4D.) DISABLE: Edit Entry -> Auto-Type -> Two-channel auto-type obfuscation
File -> Save
Disable: Options -> Policy -> New Database
Disable: Options -> Policy -> Save Database
Disable: Options -> Policy -> Change Master Key
Disable: Options -> Policy -> Change Master Key – No Key Repeat
Right-Click System Tray Icon -> Lock Workspace
File -> Exit
KeePassDX -> Gear Icon (Top Right Corner) -> App settings
Enable: Delete password
Disable: Write-protected
Enable: Keep screen on
Enable: Show lock button
Generated Password size: 64
Enable: Hide passwords
Enable: Remember databases locations
Enable: Remember keyfile locations
Enable: Show recent files
Enable: Hide broken database links
KeePassDX -> Gear Icon (Top Right Corner) -> Form filling
Device keyboard settings -> Manage Keyboards -> ENABLE: Magikeyboard (KeePassDX)
Enable: Magikeyboard settings -> Entry: Entry selection
Enable: Magikeyboard settings -> Keys: Auto key action
Optional: Enable: Magikeyboard settings -> Switch Keyboard: Auto key action
Enable: Autofill settings -> Manual selection
KeePassDX -> Gear Icon (Top Right Corner) -> Advanced unlocking
Enable: Device credential unlocking
Enable: Auto-open prompt
Delete encryption keys (useful only if you have to generate / import a new database layout)
NOTE: After you reboot the device / smartphone, you have to log into the database, making sure to tap the orange circle emblazoned with a lightning bolt afterwards
NOTE: Save your database ( 3 vertical dots in the top-right corner -> Save data )
KeePassDX -> Gear Icon (Top Right Corner) -> App settings
Enable: Write-protected (Only Enable after saving a working configuration)
NOTE: The Following List Describes a Process for Inputting Database Entries into the Password Field on a Login Screen / Prompt / Form:
1.) Enter in the username for the login credentials if necessary / based on entry / group layout
3.) Enable the keyboard using the following line below
3A.) Settings (Android UI) -> Language & input -> Current keyboard -> Switch from Gboard to Magikeyboard (KeePassDX)
2.) Switch to KeePassDX and select the entry from the database
4.) Switch back to the login screen on the app and click the button with 3 stars / asterisks on it ( *** ) Read More
How to calculate all used OneDrive space consumed by individual users?
Hi,
when using “Get-SPOGeoStorageQuota -AllLocations” it is lacking the usage of OneDrive Space consumed by individual users.
How do I get these used space accumulated from allusers?
Hi, when using “Get-SPOGeoStorageQuota -AllLocations” it is lacking the usage of OneDrive Space consumed by individual users. How do I get these used space accumulated from allusers? Read More
Nesting tiledlayouts within another tiledlayout
I would like to created a tiledlayout and, within each of the tiles, start another tiledlayout. I assume this kind of nesting is possible since, in the documentation for TiledChartLayout objects, it says that the parent of a TiledChartLayout can be another TiledChartLayout. However, the following example fails to produce the desired nesting. Instead of nesting the second sub-layout in the second tile, it tries to put it in the first tile. Is it possible to do what I am trying to do? If not, under what circumstances does it make sense to parent a TiledChartLayout to another TiledChartLayout.
m1=[5,6];
m2=[1,1,1,2];
T=tiledlayout(3,1); %Outer layout
nexttile(T,[1,1]); axis off %Next outer tile
t=tiledlayout(T,1,2); %first inner layout
for i=1:2
nexttile(t);
plot(rand(5,m1(i)));
legend(‘Location’,’southoutside’)
end
nexttile(T,[2,1]); axis off %Next outer tile
t=tiledlayout(T,2,2); %second inner layout
for i=1:4
nexttile(t);
plot(rand(5,m2(i)));
legend(‘Location’,’southoutside’)
endI would like to created a tiledlayout and, within each of the tiles, start another tiledlayout. I assume this kind of nesting is possible since, in the documentation for TiledChartLayout objects, it says that the parent of a TiledChartLayout can be another TiledChartLayout. However, the following example fails to produce the desired nesting. Instead of nesting the second sub-layout in the second tile, it tries to put it in the first tile. Is it possible to do what I am trying to do? If not, under what circumstances does it make sense to parent a TiledChartLayout to another TiledChartLayout.
m1=[5,6];
m2=[1,1,1,2];
T=tiledlayout(3,1); %Outer layout
nexttile(T,[1,1]); axis off %Next outer tile
t=tiledlayout(T,1,2); %first inner layout
for i=1:2
nexttile(t);
plot(rand(5,m1(i)));
legend(‘Location’,’southoutside’)
end
nexttile(T,[2,1]); axis off %Next outer tile
t=tiledlayout(T,2,2); %second inner layout
for i=1:4
nexttile(t);
plot(rand(5,m2(i)));
legend(‘Location’,’southoutside’)
end I would like to created a tiledlayout and, within each of the tiles, start another tiledlayout. I assume this kind of nesting is possible since, in the documentation for TiledChartLayout objects, it says that the parent of a TiledChartLayout can be another TiledChartLayout. However, the following example fails to produce the desired nesting. Instead of nesting the second sub-layout in the second tile, it tries to put it in the first tile. Is it possible to do what I am trying to do? If not, under what circumstances does it make sense to parent a TiledChartLayout to another TiledChartLayout.
m1=[5,6];
m2=[1,1,1,2];
T=tiledlayout(3,1); %Outer layout
nexttile(T,[1,1]); axis off %Next outer tile
t=tiledlayout(T,1,2); %first inner layout
for i=1:2
nexttile(t);
plot(rand(5,m1(i)));
legend(‘Location’,’southoutside’)
end
nexttile(T,[2,1]); axis off %Next outer tile
t=tiledlayout(T,2,2); %second inner layout
for i=1:4
nexttile(t);
plot(rand(5,m2(i)));
legend(‘Location’,’southoutside’)
end tiledchartlayout, nesting, tiledlayout, nexttile MATLAB Answers — New Questions
training network plot accuracy intead of rmse
hello everyone
I am using LSTM for data prediction and I use trainNetwork for it but When I run my cde the training plot only plots rmse and I want to plot accuracy ?
Here is my layers and Option what sholud I do
numResponses = 1 ;
featureDimension =1;
numHiddenUnits =200;
layers = [ …
sequenceInputLayer(featureDimension)
lstmLayer(numHiddenUnits)
fullyConnectedLayer(numResponses)
regressionLayer
];
maxepochs = 500;
miniBatchSize = 45 ;
options = trainingOptions(‘adam’, … %%adam
‘MaxEpochs’,maxepochs, …
‘GradientThreshold’,1, …
‘Shuffle’,’every-epoch’, …
‘ValidationData’,{XVal_ZaMir,YVal_ZaMir}, …
‘ValidationFrequency’,25,…
‘InitialLearnRate’,0.005, …
‘MiniBatchSize’,miniBatchSize, …
‘LearnRateSchedule’,’piecewise’, …
‘LearnRateDropPeriod’,50, …
‘LearnRateDropFactor’,0.1, …
‘Verbose’,1, …
‘Plots’,’training-progress’);hello everyone
I am using LSTM for data prediction and I use trainNetwork for it but When I run my cde the training plot only plots rmse and I want to plot accuracy ?
Here is my layers and Option what sholud I do
numResponses = 1 ;
featureDimension =1;
numHiddenUnits =200;
layers = [ …
sequenceInputLayer(featureDimension)
lstmLayer(numHiddenUnits)
fullyConnectedLayer(numResponses)
regressionLayer
];
maxepochs = 500;
miniBatchSize = 45 ;
options = trainingOptions(‘adam’, … %%adam
‘MaxEpochs’,maxepochs, …
‘GradientThreshold’,1, …
‘Shuffle’,’every-epoch’, …
‘ValidationData’,{XVal_ZaMir,YVal_ZaMir}, …
‘ValidationFrequency’,25,…
‘InitialLearnRate’,0.005, …
‘MiniBatchSize’,miniBatchSize, …
‘LearnRateSchedule’,’piecewise’, …
‘LearnRateDropPeriod’,50, …
‘LearnRateDropFactor’,0.1, …
‘Verbose’,1, …
‘Plots’,’training-progress’); hello everyone
I am using LSTM for data prediction and I use trainNetwork for it but When I run my cde the training plot only plots rmse and I want to plot accuracy ?
Here is my layers and Option what sholud I do
numResponses = 1 ;
featureDimension =1;
numHiddenUnits =200;
layers = [ …
sequenceInputLayer(featureDimension)
lstmLayer(numHiddenUnits)
fullyConnectedLayer(numResponses)
regressionLayer
];
maxepochs = 500;
miniBatchSize = 45 ;
options = trainingOptions(‘adam’, … %%adam
‘MaxEpochs’,maxepochs, …
‘GradientThreshold’,1, …
‘Shuffle’,’every-epoch’, …
‘ValidationData’,{XVal_ZaMir,YVal_ZaMir}, …
‘ValidationFrequency’,25,…
‘InitialLearnRate’,0.005, …
‘MiniBatchSize’,miniBatchSize, …
‘LearnRateSchedule’,’piecewise’, …
‘LearnRateDropPeriod’,50, …
‘LearnRateDropFactor’,0.1, …
‘Verbose’,1, …
‘Plots’,’training-progress’); lstm, trainnetwork MATLAB Answers — New Questions
using element in a vector imported from workspace in simulink
###### —————– EDIT: I ADDED THE SIMULINK MODEL AND THE MATLAB FILE WHERE i SYNTHESIZED THE DATA
###### —————– EDIT2-OBJECTIVE: I’m trying to recreate the model presented in the following paper: here. I’m looking at equation (13) with k=2, and the expressions (D1) and (D2) above it. I’m also using the definition of c'(x) from equation (9) and the definition of below equation (3).
Hi,
I don’t have much experience with simulink, and I couldn’t find exactly what I was looking for online, I hope someone might help:
I have a vector x which I pass to simulink from the workspace. Now, I’m trying to implement a used defined function block:
function y = fcn(lambda, x, e1, e2)
if x < sqrt(e1*lambda)
y = sqrt(e1*lambda) – x;
elseif x > sqrt((1/e2)*lambda)
y = sqrt((1/e2)*lambda) – x;
else
y = 0;
end
where lambda is calculated in the simulation in previous block (the computation is correct) and e1, e2 are scalar values of type double. I pass the parameters from the workspace as follows:
x_data.time=t’;
x_data.signals.values = x’;
e1_data.time=t’;
e1vec = repelem(e1, length(x));
e1_data.signals.values = e1vec’;
e2_data.time=t’;
e2vec = repelem(eta_dis, length(x));
e2_data.signals.values = e2vec’;
I get the following error:
Index exceeds array dimensions. Index value 0 exceeds valid range [1-1] for array ‘x’.
Error in ‘pmp_sim/MATLAB Function’ (line 3)
x = x(t);
I thought the a problem is that simulink treats these vectors as one block or something, as I read online, when I try to treat these elements in the function as vectors, meaning:
function y = fcn(lambda, x, e1, e2)
x = x(t);
e1 = e1(t);
e2 = e2(t);
if x < sqrt(e1*lambda)
y = sqrt(e1*lambda) – x;
elseif x > sqrt((1/e2)*lambda)
y = sqrt((1/e2)*lambda) – x;
else
y = 0;
end
where t is the simulation clock, I get the following error:
Domain error. To compute complex results from real x, use ‘sqrt(complex(x))’.
Error in sqrt.m (line 13)
coder.internal.error(‘Coder:toolbox:ElFunDomainError’,mfilename);
Error in ‘pmp_sim/MATLAB Function’ (line 8)
can someone please explain to me how should I treat these vectors that I import to simulink model from workspace?
Thank you for you time and attention.###### —————– EDIT: I ADDED THE SIMULINK MODEL AND THE MATLAB FILE WHERE i SYNTHESIZED THE DATA
###### —————– EDIT2-OBJECTIVE: I’m trying to recreate the model presented in the following paper: here. I’m looking at equation (13) with k=2, and the expressions (D1) and (D2) above it. I’m also using the definition of c'(x) from equation (9) and the definition of below equation (3).
Hi,
I don’t have much experience with simulink, and I couldn’t find exactly what I was looking for online, I hope someone might help:
I have a vector x which I pass to simulink from the workspace. Now, I’m trying to implement a used defined function block:
function y = fcn(lambda, x, e1, e2)
if x < sqrt(e1*lambda)
y = sqrt(e1*lambda) – x;
elseif x > sqrt((1/e2)*lambda)
y = sqrt((1/e2)*lambda) – x;
else
y = 0;
end
where lambda is calculated in the simulation in previous block (the computation is correct) and e1, e2 are scalar values of type double. I pass the parameters from the workspace as follows:
x_data.time=t’;
x_data.signals.values = x’;
e1_data.time=t’;
e1vec = repelem(e1, length(x));
e1_data.signals.values = e1vec’;
e2_data.time=t’;
e2vec = repelem(eta_dis, length(x));
e2_data.signals.values = e2vec’;
I get the following error:
Index exceeds array dimensions. Index value 0 exceeds valid range [1-1] for array ‘x’.
Error in ‘pmp_sim/MATLAB Function’ (line 3)
x = x(t);
I thought the a problem is that simulink treats these vectors as one block or something, as I read online, when I try to treat these elements in the function as vectors, meaning:
function y = fcn(lambda, x, e1, e2)
x = x(t);
e1 = e1(t);
e2 = e2(t);
if x < sqrt(e1*lambda)
y = sqrt(e1*lambda) – x;
elseif x > sqrt((1/e2)*lambda)
y = sqrt((1/e2)*lambda) – x;
else
y = 0;
end
where t is the simulation clock, I get the following error:
Domain error. To compute complex results from real x, use ‘sqrt(complex(x))’.
Error in sqrt.m (line 13)
coder.internal.error(‘Coder:toolbox:ElFunDomainError’,mfilename);
Error in ‘pmp_sim/MATLAB Function’ (line 8)
can someone please explain to me how should I treat these vectors that I import to simulink model from workspace?
Thank you for you time and attention. ###### —————– EDIT: I ADDED THE SIMULINK MODEL AND THE MATLAB FILE WHERE i SYNTHESIZED THE DATA
###### —————– EDIT2-OBJECTIVE: I’m trying to recreate the model presented in the following paper: here. I’m looking at equation (13) with k=2, and the expressions (D1) and (D2) above it. I’m also using the definition of c'(x) from equation (9) and the definition of below equation (3).
Hi,
I don’t have much experience with simulink, and I couldn’t find exactly what I was looking for online, I hope someone might help:
I have a vector x which I pass to simulink from the workspace. Now, I’m trying to implement a used defined function block:
function y = fcn(lambda, x, e1, e2)
if x < sqrt(e1*lambda)
y = sqrt(e1*lambda) – x;
elseif x > sqrt((1/e2)*lambda)
y = sqrt((1/e2)*lambda) – x;
else
y = 0;
end
where lambda is calculated in the simulation in previous block (the computation is correct) and e1, e2 are scalar values of type double. I pass the parameters from the workspace as follows:
x_data.time=t’;
x_data.signals.values = x’;
e1_data.time=t’;
e1vec = repelem(e1, length(x));
e1_data.signals.values = e1vec’;
e2_data.time=t’;
e2vec = repelem(eta_dis, length(x));
e2_data.signals.values = e2vec’;
I get the following error:
Index exceeds array dimensions. Index value 0 exceeds valid range [1-1] for array ‘x’.
Error in ‘pmp_sim/MATLAB Function’ (line 3)
x = x(t);
I thought the a problem is that simulink treats these vectors as one block or something, as I read online, when I try to treat these elements in the function as vectors, meaning:
function y = fcn(lambda, x, e1, e2)
x = x(t);
e1 = e1(t);
e2 = e2(t);
if x < sqrt(e1*lambda)
y = sqrt(e1*lambda) – x;
elseif x > sqrt((1/e2)*lambda)
y = sqrt((1/e2)*lambda) – x;
else
y = 0;
end
where t is the simulation clock, I get the following error:
Domain error. To compute complex results from real x, use ‘sqrt(complex(x))’.
Error in sqrt.m (line 13)
coder.internal.error(‘Coder:toolbox:ElFunDomainError’,mfilename);
Error in ‘pmp_sim/MATLAB Function’ (line 8)
can someone please explain to me how should I treat these vectors that I import to simulink model from workspace?
Thank you for you time and attention. matlab, simulink, vector MATLAB Answers — New Questions
Error: In an assignment A(:) = B, the number of elements in A and B must be the same. while simulating circuit in MATLAB simullink
Every time getting error In an assignment A(:) = B, the number of elements in A and B must be the same. while simulating circuit in MATLAB simullink while simulating circuit in MATLAB simulink
Kindly reslove the issue as early as possibleEvery time getting error In an assignment A(:) = B, the number of elements in A and B must be the same. while simulating circuit in MATLAB simullink while simulating circuit in MATLAB simulink
Kindly reslove the issue as early as possible Every time getting error In an assignment A(:) = B, the number of elements in A and B must be the same. while simulating circuit in MATLAB simullink while simulating circuit in MATLAB simulink
Kindly reslove the issue as early as possible simulink MATLAB Answers — New Questions
Cross referencing if the cell is blank.
Hello All, this is my first post here. I hope to explain my question properly.
I need to run a Macro on a column.
The cell should display a name. This name is linked to an order number.
When I pull the report, sometimes the name is missing but I have another sheet matching all names with order numbers.
So my idea is the following, If the cell is blank, I want to get the name from another sheet using the order number as a reference.
IF the cell is not blank, then nothing is required as the name is already there.
The name should be displayed in column B, and the order number is in column C.
any help is much appreciated.
Thanks in advance.
Hello All, this is my first post here. I hope to explain my question properly. I need to run a Macro on a column. The cell should display a name. This name is linked to an order number. When I pull the report, sometimes the name is missing but I have another sheet matching all names with order numbers. So my idea is the following, If the cell is blank, I want to get the name from another sheet using the order number as a reference. IF the cell is not blank, then nothing is required as the name is already there. The name should be displayed in column B, and the order number is in column C. any help is much appreciated. Thanks in advance. Read More
Problem with time loop- variables are not updating and being used in the next loop
Hi all, I hope you doing well!
i am trying to simulate the motion of ionic species under electric field. I am using a set of equations such as Poisson equation, drift, and difussion equation (where the coefficient of difussion is related to the electrical mobility through the Eistein relationship), and mass balance equation for continuity. My code seems fine and it give me a reasonble results for the first time step. However, nothing change after that and i get the same results for each time step. The ionic species are supposed to move with the electric field and the concentration profile will change. That new concentration profile will be used to calculate the new potential, new electric field, and new charge density. But, anything i do seems to work to be able to see those changes.Hi all, I hope you doing well!
i am trying to simulate the motion of ionic species under electric field. I am using a set of equations such as Poisson equation, drift, and difussion equation (where the coefficient of difussion is related to the electrical mobility through the Eistein relationship), and mass balance equation for continuity. My code seems fine and it give me a reasonble results for the first time step. However, nothing change after that and i get the same results for each time step. The ionic species are supposed to move with the electric field and the concentration profile will change. That new concentration profile will be used to calculate the new potential, new electric field, and new charge density. But, anything i do seems to work to be able to see those changes. Hi all, I hope you doing well!
i am trying to simulate the motion of ionic species under electric field. I am using a set of equations such as Poisson equation, drift, and difussion equation (where the coefficient of difussion is related to the electrical mobility through the Eistein relationship), and mass balance equation for continuity. My code seems fine and it give me a reasonble results for the first time step. However, nothing change after that and i get the same results for each time step. The ionic species are supposed to move with the electric field and the concentration profile will change. That new concentration profile will be used to calculate the new potential, new electric field, and new charge density. But, anything i do seems to work to be able to see those changes. ion migration, electric field MATLAB Answers — New Questions
Using the mouse to select drag scope measurement cursors
Using 2016b, I need to measure pulse timings from a standard Simulink scope. It does not seem to be possible to select and drag them using the mouse.
The keyboard commands don’t seem to work either.Using 2016b, I need to measure pulse timings from a standard Simulink scope. It does not seem to be possible to select and drag them using the mouse.
The keyboard commands don’t seem to work either. Using 2016b, I need to measure pulse timings from a standard Simulink scope. It does not seem to be possible to select and drag them using the mouse.
The keyboard commands don’t seem to work either. scope, cursor MATLAB Answers — New Questions
Retaining Downloaded Application source folder in IME Cache
Hi All,
We are deploying applications via Intune, and we have few apps in which the shortcut self-heals during first launch. But due to source file missing in IME cache it failing to launch. Is it possible to retain or avoid the removal of application source folder from cache similar to SCCM in Intune.
Thanks,
Nathan.
Hi All, We are deploying applications via Intune, and we have few apps in which the shortcut self-heals during first launch. But due to source file missing in IME cache it failing to launch. Is it possible to retain or avoid the removal of application source folder from cache similar to SCCM in Intune. Thanks,Nathan. Read More
Windows Server 2022 Hyper-V Cluster: S2D Disk Add question
Hello,
We have a Healthy three node Windows server 2022 HCI build using a Three-way S2D Mirror using SSDs.
We initially built the server with only SSDs (4x 2GiB SSDs) per node. We would like to add SAS HDD to the disk pool so we can get a bigger bang for the buck for space (a lot of our VMs are calling for 1TB partitions)
My question is that if we add HDDs (equal number, type, and capacity on each node) to the already built SSD only pool, will S2D automatically reconfigure the pool across all nodes to allow the HDDs in the pool to so can expand our Volumes.
Hello, We have a Healthy three node Windows server 2022 HCI build using a Three-way S2D Mirror using SSDs. We initially built the server with only SSDs (4x 2GiB SSDs) per node. We would like to add SAS HDD to the disk pool so we can get a bigger bang for the buck for space (a lot of our VMs are calling for 1TB partitions) My question is that if we add HDDs (equal number, type, and capacity on each node) to the already built SSD only pool, will S2D automatically reconfigure the pool across all nodes to allow the HDDs in the pool to so can expand our Volumes. Read More
ASUS Update Check Removal Tool
NOTE: Right-click on the following batch files after saving them, and click “Run as administrator”.
Use Notepad to create this file on your desktop or another folder: ASUS_Update_Check_Remove.bat
@ECHO OFF
SETLOCAL
REM WHEN THE NETWORK STACK IS DISABLED IN UEFI / BIOS, AND ARMORY CRATE IS ENABLED, THE UEFI WILL LEAVE BEHIND AN UPDATE SERVICE, WHICH CANNOT BE REMOVED WITH THE ARMORY CRATE UNINSTALL TOOL, AND HAS TO BE REMOVED MANUALLY, WITH THE ASUS ARMORY CRATE BEING DISABLED IN UEFI / BIOS BEFOREHAND
CD /D “%~dp0”
SET ASUS_UPDTCHK_RMV_RSTRT_VAL=0
IF [%1]==[] GOTO ASUS_UPDTCHK_RMV_RSTRT_LBL_
IF %1==ASUS_UPDTCHK_RMV_RESTART (SET ASUS_UPDTCHK_RMV_RSTRT_VAL=1)
:ASUS_UPDTCHK_RMV_RSTRT_LBL_
IF %ASUS_UPDTCHK_RMV_RSTRT_VAL% EQU 0 GOTO ASUS_UPDTCHK_RMV_END_LBL_
IF %Processor_Architecture%==ARM64 SET SDEL_EXT_=SDELETE64A
IF %Processor_Architecture%==AMD64 SET SDEL_EXT_=SDELETE64
IF %Processor_Architecture%==x86 SET SDEL_EXT_=SDELETE
NET STOP AsusUpdateCheck
TASKKILL /IM AsusUpdateCheck.exe /T /F
SC DELETE AsusUpdateCheck
PowerShell -NoProfile -ExecutionPolicy Bypass -Command “& {Remove-Item -Path ‘HKLM:SYSTEMControlSet001ServicesAsusUpdateCheck’ -Recurse -Force}”
IF EXIST “%SystemRoot%System32%SDEL_EXT_%.EXE” %SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER “%SystemRoot%System32AsusDownLoadLicense.exe” “%SystemRoot%System32AsusUpdateCheck.exe”
IF NOT EXIST “%SystemRoot%System32%SDEL_EXT_%.EXE” DEL /Q “%SystemRoot%System32AsusDownLoadLicense.exe” “%SystemRoot%System32AsusUpdateCheck.exe”
:ASUS_UPDTCHK_RMV_END_LBL_
IF %ASUS_UPDTCHK_RMV_RSTRT_VAL% EQU 0 (CALL ASUS_Update_Check_Remove.bat ASUS_UPDTCHK_RMV_RESTART >nul 2>&1)
ENDLOCAL
MOVE NUL 2>&0
NOTE: Right-click on the following batch files after saving them, and click “Run as administrator”. Use Notepad to create this file on your desktop or another folder: ASUS_Update_Check_Remove.bat@ECHO OFF
SETLOCAL
REM WHEN THE NETWORK STACK IS DISABLED IN UEFI / BIOS, AND ARMORY CRATE IS ENABLED, THE UEFI WILL LEAVE BEHIND AN UPDATE SERVICE, WHICH CANNOT BE REMOVED WITH THE ARMORY CRATE UNINSTALL TOOL, AND HAS TO BE REMOVED MANUALLY, WITH THE ASUS ARMORY CRATE BEING DISABLED IN UEFI / BIOS BEFOREHAND
CD /D “%~dp0”
SET ASUS_UPDTCHK_RMV_RSTRT_VAL=0
IF [%1]==[] GOTO ASUS_UPDTCHK_RMV_RSTRT_LBL_
IF %1==ASUS_UPDTCHK_RMV_RESTART (SET ASUS_UPDTCHK_RMV_RSTRT_VAL=1)
:ASUS_UPDTCHK_RMV_RSTRT_LBL_
IF %ASUS_UPDTCHK_RMV_RSTRT_VAL% EQU 0 GOTO ASUS_UPDTCHK_RMV_END_LBL_
IF %Processor_Architecture%==ARM64 SET SDEL_EXT_=SDELETE64A
IF %Processor_Architecture%==AMD64 SET SDEL_EXT_=SDELETE64
IF %Processor_Architecture%==x86 SET SDEL_EXT_=SDELETE
NET STOP AsusUpdateCheck
TASKKILL /IM AsusUpdateCheck.exe /T /F
SC DELETE AsusUpdateCheck
PowerShell -NoProfile -ExecutionPolicy Bypass -Command “& {Remove-Item -Path ‘HKLM:SYSTEMControlSet001ServicesAsusUpdateCheck’ -Recurse -Force}”
IF EXIST “%SystemRoot%System32%SDEL_EXT_%.EXE” %SDEL_EXT_% -ACCEPTEULA -Q -R -NOBANNER “%SystemRoot%System32AsusDownLoadLicense.exe” “%SystemRoot%System32AsusUpdateCheck.exe”
IF NOT EXIST “%SystemRoot%System32%SDEL_EXT_%.EXE” DEL /Q “%SystemRoot%System32AsusDownLoadLicense.exe” “%SystemRoot%System32AsusUpdateCheck.exe”
:ASUS_UPDTCHK_RMV_END_LBL_
IF %ASUS_UPDTCHK_RMV_RSTRT_VAL% EQU 0 (CALL ASUS_Update_Check_Remove.bat ASUS_UPDTCHK_RMV_RESTART >nul 2>&1)
ENDLOCAL
MOVE NUL 2>&0 Read More
Inserting Row results in misaligned formulas
Recently I’ve experienced the following:
– When a row is inserted (using keyboard shortcut Alt-I-R), some existing formulas on the sheet would not shift down accordingly, resulting in misaligned formulas.
– I’m using Office 365, and this has happened across multiple spreadsheets.
Has anyone else also run into this issue?
Edit: might have something to do with frozen panes.
Recently I’ve experienced the following:- When a row is inserted (using keyboard shortcut Alt-I-R), some existing formulas on the sheet would not shift down accordingly, resulting in misaligned formulas. – I’m using Office 365, and this has happened across multiple spreadsheets. Has anyone else also run into this issue? Edit: might have something to do with frozen panes. Read More
how to correctly use the function “subs”
Hi there,
I am using subs to replace some symbols in a symbolic expression Jacobian_mtx_1. The symbols that I want to be replaced are A, B and C, which are a 6*1 symbolic vector, a symbolic scalar, and a 2*1 symbolic vector, respectively. I write the code:
Jacobian_mtx_1 = subs( Jacobian_mtx_1 , { A , B , C } , { A_val ,B_val , C_val } ) ;
where A_val is a 6*1 vector containing 6 function calls, B_val is a numeric scalar, and C_val is a 2*1 numeric vector.
However, the software reminds me that
Errors using sym/subs
Entries in second argument must be scalar.
Could anyone tell me how to resolve this issue?
Many thanks!Hi there,
I am using subs to replace some symbols in a symbolic expression Jacobian_mtx_1. The symbols that I want to be replaced are A, B and C, which are a 6*1 symbolic vector, a symbolic scalar, and a 2*1 symbolic vector, respectively. I write the code:
Jacobian_mtx_1 = subs( Jacobian_mtx_1 , { A , B , C } , { A_val ,B_val , C_val } ) ;
where A_val is a 6*1 vector containing 6 function calls, B_val is a numeric scalar, and C_val is a 2*1 numeric vector.
However, the software reminds me that
Errors using sym/subs
Entries in second argument must be scalar.
Could anyone tell me how to resolve this issue?
Many thanks! Hi there,
I am using subs to replace some symbols in a symbolic expression Jacobian_mtx_1. The symbols that I want to be replaced are A, B and C, which are a 6*1 symbolic vector, a symbolic scalar, and a 2*1 symbolic vector, respectively. I write the code:
Jacobian_mtx_1 = subs( Jacobian_mtx_1 , { A , B , C } , { A_val ,B_val , C_val } ) ;
where A_val is a 6*1 vector containing 6 function calls, B_val is a numeric scalar, and C_val is a 2*1 numeric vector.
However, the software reminds me that
Errors using sym/subs
Entries in second argument must be scalar.
Could anyone tell me how to resolve this issue?
Many thanks! subs MATLAB Answers — New Questions
How to add cumulative values of a set of unique combinations within a Table?
Greetings,
I’d like to know if it is possible to add up the cumulative sum from the values in a particular column that comply with the rule of being part of unique combinations of two ore more columns.
Please find below a simple sample code that could serve as illustration.
T = table({‘John’;’Mary’;’John’;’Mary’;’John’;’John’;’Mary’;’John’},…
{‘Lot A’;’Lot A’;’Lot A’;’Lot Z’;’Lot Z’;’Lot A’;’Lot Z’; ‘Lot Z’},…
datetime({’01/07/2015′;’03/08/2015′;’05/25/2014′;’03/26/2016′;’07/08/2009′;…
’03/01/2020′;’08/23/2010′;’06/15/2008′}),[12; 25; 36; 89; 11; 56; 87; 93],…
‘VariableNames’, {‘Salesperson’,’Lot’,’Date’,’Quantity’});
I’d like to know if I can produce a table that would return the cumulative sum of four possible unique combinations that are derived from the "Salesperson" and the "Lot" columns:
John – Lot A, John – Lot Z, Mary – Lot A, Mary – Lot Z
I’d like a table that would merge and add the cumulative sum of what John sold from Lot A, what John sold from Lot Z, what Mary sold from Lot A and what Mary sold from lot Z, which are the only four possible unique combinations derived from Columns 1 & 2 ("Salesperson & Lot").
As for the date, I’d like this solution to be able to include the date column. I know that the date is not part of the inputs required to derive this cumulative sum, but I’d like each unique combinations to include either the earliest or latest date.
Thank you in advance for your help.Greetings,
I’d like to know if it is possible to add up the cumulative sum from the values in a particular column that comply with the rule of being part of unique combinations of two ore more columns.
Please find below a simple sample code that could serve as illustration.
T = table({‘John’;’Mary’;’John’;’Mary’;’John’;’John’;’Mary’;’John’},…
{‘Lot A’;’Lot A’;’Lot A’;’Lot Z’;’Lot Z’;’Lot A’;’Lot Z’; ‘Lot Z’},…
datetime({’01/07/2015′;’03/08/2015′;’05/25/2014′;’03/26/2016′;’07/08/2009′;…
’03/01/2020′;’08/23/2010′;’06/15/2008′}),[12; 25; 36; 89; 11; 56; 87; 93],…
‘VariableNames’, {‘Salesperson’,’Lot’,’Date’,’Quantity’});
I’d like to know if I can produce a table that would return the cumulative sum of four possible unique combinations that are derived from the "Salesperson" and the "Lot" columns:
John – Lot A, John – Lot Z, Mary – Lot A, Mary – Lot Z
I’d like a table that would merge and add the cumulative sum of what John sold from Lot A, what John sold from Lot Z, what Mary sold from Lot A and what Mary sold from lot Z, which are the only four possible unique combinations derived from Columns 1 & 2 ("Salesperson & Lot").
As for the date, I’d like this solution to be able to include the date column. I know that the date is not part of the inputs required to derive this cumulative sum, but I’d like each unique combinations to include either the earliest or latest date.
Thank you in advance for your help. Greetings,
I’d like to know if it is possible to add up the cumulative sum from the values in a particular column that comply with the rule of being part of unique combinations of two ore more columns.
Please find below a simple sample code that could serve as illustration.
T = table({‘John’;’Mary’;’John’;’Mary’;’John’;’John’;’Mary’;’John’},…
{‘Lot A’;’Lot A’;’Lot A’;’Lot Z’;’Lot Z’;’Lot A’;’Lot Z’; ‘Lot Z’},…
datetime({’01/07/2015′;’03/08/2015′;’05/25/2014′;’03/26/2016′;’07/08/2009′;…
’03/01/2020′;’08/23/2010′;’06/15/2008′}),[12; 25; 36; 89; 11; 56; 87; 93],…
‘VariableNames’, {‘Salesperson’,’Lot’,’Date’,’Quantity’});
I’d like to know if I can produce a table that would return the cumulative sum of four possible unique combinations that are derived from the "Salesperson" and the "Lot" columns:
John – Lot A, John – Lot Z, Mary – Lot A, Mary – Lot Z
I’d like a table that would merge and add the cumulative sum of what John sold from Lot A, what John sold from Lot Z, what Mary sold from Lot A and what Mary sold from lot Z, which are the only four possible unique combinations derived from Columns 1 & 2 ("Salesperson & Lot").
As for the date, I’d like this solution to be able to include the date column. I know that the date is not part of the inputs required to derive this cumulative sum, but I’d like each unique combinations to include either the earliest or latest date.
Thank you in advance for your help. unique, accumarray, table MATLAB Answers — New Questions