Actually, having read your post (should’ve done that first, but I was, err gardening 🤣) - have you tried using GitHub Copilot to clean up code like this? It’s surprisingly good at this sort of thing
Posts by Greg Nottage
His was by far the best session - the highlight of the week for me
Was at an internal learning session recently where Scott Hansleman used GitHub Copilot CLI to do exactly that in realtime with Claude facing off against Codex - both checking each other’s homework - amaze-balls! 🤯
+1 - keep ‘em coming Dave, you rock dude!
It’s been flawless ever since 😎
Yeah I uncovered an awesome meta prompt with GHCP in VSCode recently after it barfed telling me my prompt was too complex. I asked it how to fix and it said tell me to: always use a sub-agent approach to avoid context overload
Aah the meta prompt FTW 🙌
Everybody needs to watch this! Excellent job Ru. I was talking with a customer just this week who picked Crowdstrike over Defender, because in their words it detected more. That’s because they weren’t comparing apples/apples - because Defender wasn’t configured correctly - Ru explains exactly how.
Azure Trusted Signing is great! Highly secure, code signing as a service! And I think it’s very reasonably priced too.
youtu.be/VORqw80amIM?...
Hey Rudy - is there a link to your Patch & Rant Fiddler setup? Thanks.
I’ll love it more when I can point it at SharePoint, get it to reason over the content and automatically recommend/create SITs.
It knows you 😀
I had the same - a ctrl+alt+del let me get to task manager. Restarted explorer process and all good after that.
Nice one, thanks!
Yeah, hope they manage to get it working right for you 👍
Right, probs need to raise a support case with Citrix then.
Ok, and I assume when you tested the registry fix on that page (and rebooted the device), it made no difference to your issue then?
How do I delete a Windows Hello for Business container on a device?
You can delete the Windows Hello for Business container by executing the command certutil.exe -deleteHelloContainer
Or edit the MSI and re-sign it using your own trusted code cert from Azure Trusted Signing - but Jason’s way is better 😄
I see your PSResourceGet and raise you one better (thanks @psfred.bsky.social): github.com/PowershellFr...
Ping @jdhitsolutions.com - think he has a PowerShell module that might help you 👍
Is that c:\test\intune.cer the exported MDM one? Why is it a different path than the one I mentioned before?
Running it from defaultuser0 and exported the MDM cert to the documents\fiddler2\ClientCertificate.cer path. Have tried various combinations of rules but nothing seems to work? But not sure what I’m meant to put for the rules really?
Sorted now, thanks 👍
When you say reconnect, where/what did you reconnect? My verification is not showing I don’t think even though I also registered early on Merill’s list.