00:20:31 Chris Taylor: Podcast Addict https://play.google.com/store/apps/details?id=com.bambuna.podcastaddict 00:20:31 Tristan: Here is the Windows script for compressing PDFs, for any that wish to try. https://github.com/TrisBits/Compress-PDF 00:21:12 Natalie: I use Podcast Addict a lot. It's really user-friendly! 00:21:30 micheline: I got a BSoD on my Win 10 laptop 30 minutes ago. The Error code was: MEMORY MANAGEMENT. It is OK now. 00:24:26 Chris Taylor: Cloud Library https://play.google.com/store/apps/details?id=com.txtr.android.mmm 00:25:26 Natalie: You don't have to use all of the features. You can use it up front, but can delve into the details if wanted. 00:28:08 Chris Taylor: TV Kill https://play.google.com/store/apps/details?id=com.redirectapps.tvkill 00:29:54 Timothy: Might be dangerous to use in certain places. 00:31:21 Chris Taylor: @Timothy - I agree. I would urge caution and think twice, or three times, or more, to anyone considering using TV Kill 00:32:59 Timothy: Not to be used at airports. There is enough stress there. Best not in the US. Like the fight in Miami airport over a luggage cart. 00:33:05 Tom Trottier: MS Maps free on windows https://www.microsoft.com/en-ca/p/windows-maps/9wzdncrdtbvb 00:33:32 Chris Taylor: OSM Map on Garmin https://wiki.openstreetmap.org/wiki/OSM_Map_On_Garmin/Download 00:34:37 Tom Trottier: does mapsource have bike routes? 00:38:59 Tom Trottier: Have you thot of putting the date/time in the backuo name? 00:43:05 Tom Trottier: >net session System error 5 has occurred. Access is denied. 00:43:30 Tom Trottier: std user 00:54:23 Tom Trottier: & ctrl-C will exit batch files/commands 00:57:41 Tom Trottier: Is there a reason you did not use a powershell script? 00:59:04 Tristan: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/robocopy 00:59:17 Tom Trottier: Instead of 2 Echos, have you thought of using TEE in powershell? 01:01:17 Tom Trottier: (TEE copies to 2 outputs 01:01:36 Tom Trottier: Can we have a copy of the BAT file? 01:01:58 Tom Trottier: :D 01:02:32 Chris Taylor: Key'n'Strokes download https://github.com/Phaiax/Key-n-Stroke/tree/master/Releases Key'n'Strokes documentation https://github.com/Phaiax/Key-n-Stroke/blob/master/README.md 01:05:14 Tristan: It takes a little to get used to, but PowerShell is actually easier to code in than batch. Also is far more versatile. I'm also happy to help out. https://docs.microsoft.com/en-us/learn/modules/introduction-to-powershell/ https://www.guru99.com/powershell-tutorial.html 01:08:57 Tom Trottier: Useful while computing, or just presenting? 01:09:41 Tom Trottier: you can ENLARGE cursor in settings 01:09:49 Serge-ร‰rik: Trying to install Key-n-Stroke, but get MS Defender SmartScreen message : Windows protected your PC Microsoft Defender SmartScreen prevented an unrecognized app from starting. Running this app might put your PC at risk. More info 01:10:53 Chris Taylor: @Serge-Eric - yes, and the author mentions this. It is just an unknown program downloaded from the Interent, which SmartScreen flags. It is safe. 01:11:42 Tristan: That installer message, is a warning given for any application that is not code signed with a certificate. Which is not unusual for a small scale open source project. Clicking yes or no, depends on how much you are willing to trust the project. 01:12:57 Serge-ร‰rik: OK. Thanks, Chris & Tristan. I will happily proceed with the installation. 01:13:30 Tom Trottier: Split tunneling should improve bandwidth 01:14:21 Tom Trottier: ALAS, NSA, others, often monitor TOR exit nodes ๐Ÿ˜ž 01:15:59 Tom Trottier: VPN only protects privacy on HTTP (vs HTTPS) connections. your DNS can be protected by DNS over HTTPS or DNS with TLS. 01:16:40 Bob Herres: TOR The Onion Router... Wow I didn't know that, and many other things too 01:17:08 Chris Taylor: @Tom - in fact, I think they estimate about 1/3 of exit nodes on TOR are actually owned and run by orgs like the NSA, Russian intelligence, etc 01:17:42 Tom Trottier: I would not be surprised... 01:18:15 Tom Trottier: Make privacy spotty vs state actors 01:20:14 Tom Trottier: VPNs best use is travelling. You can also set up a VPN server on home computer/router for your use away 01:21:51 Tristan: VPNs provide security if you or your company control both ends. The pay service VPNs where you don't have full control are more about getting a little privacy and/or getting around geo-blocking. I would not consider them secure. 01:22:31 Chris Taylor: @Tom - re enlarging the pointer in Settings - yes, but this is not carried across a Zoom video-conference. The viewers will see the default tiny mouse pointer 01:23:03 Tom Trottier: You usually get a new IP address if you turn off router each nite 01:25:06 Tom Trottier: TY Bob! 01:25:46 E O'Driscoll: Great presentation. 01:25:55 E O'Driscoll: What is fingerprinting again?\ 01:26:11 Bill: Great presentation Bob! 01:27:09 Tom Trottier: Fingerprinting is gathering info about u, your computer, apps, screen, etc to uniquely identify you when accessed by diff websites 01:31:28 Bill: Another great night! Super presentations! Merry Christmas everyone. Happy New Year and get your booster if you haven't already.๐Ÿ™‚๐Ÿ™‚๐Ÿ™‚ 01:31:55 John Fleming: Thanks! 01:31:56 Timothy: Thanks to presenters. 01:31:57 Serge-ร‰rik: Merry Christmas to all of you! 01:31:59 widya: Merry Christmas everyone.. stay safe 01:32:05 E O'Driscoll: Thanks...merry xmas