Run Forest Run

I have to admit I have historically not used the run command within Windows.  Well as I get older Im starting to look for shortcuts in the way I work. Im not lazy I am just learning to work smarter..not harder.

That said, here are a few uses for the rum command. Enjoy…

Before I give you the commands here is how to bring up the run dialog bow.

Click Win + R keyboard shortcuts to bring up Run dialog. (In Windows 10, you also can press Win + X and then select Run.) Then type one command and click OK or press Enter key so that you can quickly open the app. A Run Command is not simply the name of an app/program, Windows designs a great many specialized Run commands. Here are just a few:

1. control

This is a Run Command to quickly access Windows 10 Control Panel. However, some users are used to open the Control Panel by Start menu or Windows 10 Power user menu.

2. taskmgr

This is a Run Command to open Task Manager as quickly as by right-clicking on the blank area of Windows 10 taskbar.

3. cmd

There are more options to open Command Prompt in Windows 10, this command is just one of shortcuts.

4. netplwiz

The common User Account is in Windows Control Panel, while this command opens the advanced User Accounts window.

5. regedit

A power user may need to open Registry Editor to make changes to Windows registry. With this command, you can quickly access Registry Editor.

6. lusrmgr.msc

Running this command, you can open Local Users and Groups manager where you can edit properties of all your users and groups.

7. appwiz.cpl

This Run Command quickly opens the Programs and Features window where you can uninstall programs and apps in Windows 10.

8. desk.cpl

It’s a shortcut allowing you to change your Windows screen resolution.

9. powercfg.cpl

Running this command will directly open the Power Options window which is buried in Control Panel.

10. main.cpl

This command can help you access Mouse Properties dialog where you can change settings of the mouse connected to your computer.

11. snippingtool

If you are wondering How to Take Screenshots on Microsoft Surface Tablet, this Run Command is just the shortcut to open Windows built-in Snipping Tool, with which you can not only take a screenshot but also edit the screenshot.

12. logoff

This Run Command is a less known quick way to sign out of Windows 10.

13. msconfig

This command opens System Configuration dialog where you can change some of the system settings in Windows.

14. diskmgmt.msc

This Run Command helps you open Windows 10 Disk Management where you can manage the hard disk partition on your computer.

15. chrome/firefox/iexplore

Running chrome or firefox command can launch Chrome or Firefox browser if it’s installed on your Windows 10, and the iexplore command can open Internet Explorer.

16. calc: Open Windows built-in calculator app for you.

17. compmgmt.msc: Open Computer Management window.

18. gpedit.msc: Open Local Group Policy Editor.

19. cleanmgr: Open Disk Cleanup utility.

20. sysdm.cpl: Opens System Properties window.

The Magic of Subnetting!

OK so I want to preface this post with …I HATE MATH. That’s said lets dive into a little subnetting. I recently learned a pretty easy way to do subnetting in 3 steps. In our example we will be breaking to at least 60 subnets. I’ll add my chicken scratch in at some point but here are the highlights:

Hope this helps. Please comment or email me at if you have questions.

1: Convert the number of networks (needed) to binary: 

In order to accomplish this we need to be able to convert numbers to binary. In order to get to 60, we need 6 bits.

128 | 64 | 32| 16 | 8| 4 | 2 | 1 = 63

2: Reserve bits in the mask and find your subnet increment: = 11111111.11111111.00000000.00000000

If you add the 6 bits, you get: = 11111111.11111111.11111100.00000000 = 22 bits = /22

Now, find your increment, whats the value of the last network bit?

128 | 64 | 32| 16 | 8| 4 | 2 | 1

If you look from right to left the value of number 6 is 4 so 4 is our increment.

3: Use increment to generate network ranges: /22subnets /22 /22 /22 /22 /22










Putty Logging

I’m using Putty (MTPutty) for all my SSH connectivity needs. I found MTPutty on a video from Keith Barker. MTPutty is a tabbed version of Putty.

Putty has the option to log session output to disk. Its definitely a good idea to have a history of changes you made to any device. By default Putty creates a log named putty.log. That’s not very informative and you actually have to open the log to see what was done. I found a neat way of changing the name so you can easily reference the hostname and time of change. You can use the following variables when naming the log file. Check it out…

  • &H = hostname for the session
  • &Y = year
  • &M = month
  • &D = day
  • &T = time

It would look something like this:

putty log

Be sure to save your new settings:

putty save

The next time you connect to the device, you will have a log file similar to this:


All Roads Lead to CCIE

I recently listened to a podcast talking about the best way to learn.  Chuck was saying that the best way to learn was to teach the material that you learn.  As you may or may not know I am pushing towards my CCIE and Im going to make an attempt at applying teaching to my learning process.

For fear of breaking a camera I am not going to do a vlog but I am going to post here about the things I learn. Given that we just survived Certpocalypse I plan to go through the new CCNA content before starting CCNP and ultimately landing in the CCIE lab. My intent is to use the new CCNA content as a review and I’m sure I will learn new things along the way.

On a side note I plan to learn a few things alongside Cisco. Python, Linux, and Microsoft Teams being a few and I will post about those as well.

I may not get to post every day but I will post as my schedule allows. I just noticed the last time I posted and it will certainly be more often then a few years. I hope you will take this journey with me and we can learn together. I hope you enjoy…

Its Not My House…

Those who know me, know I am in the never ending process of restoring my squarebody. The folks that are doing most of the work for me are top notch. I tell them that the truck is as much theirs as mine because they see it so much. They treat my truck like it is their own and what work is done is done perfectly.

I have done work for several people throughout the years. I have tried my best to treat their networks as if they are my own. If I see something that needs to be fixed, I fix it, even if its cosmetic.

As an engineer (or any job role for that matter), the network, truck, or toilet you work on is effectively yours. Show enough respect and have enough pride in your work to do it correctly.

Do you recycle?

I just read a statistic that says 69% of consumers reuse their passwords on multiple sites. Something to keep in mind is this: If you use the same password for your Bank of America recycle-symbolaccount that you use for Facebook, and I gain access to your Facebook account, how hard do you think it would be for me to log into your Bank account and spend your money to buy parts for my truck?

Stupid is as Stupid does

I recently listened to a podcast where the listeners were told if they didn’t know something, they were stupid. Let me give you a little context. He was saying that if a person didn’t know about a subject that they were “stupid in that subject”. Now, I will give him a little credit..he was padownloadrtially correct in what he was saying but the way he said it was horrible. For those of you that know me, sometimes I have a little trouble getting my point across but I am certainly not going to call someone stupid. I would like to think that uneducated is a better word. 

I for one am not going to listen to someone calling me stupid even if it is true. If you ask me, he is the one that’s stupid…

Attack Map

Ever wanted to see a map of attacks throughout the internet? IPViking by Norse provides a realimages time threat intelligence cyber attack board. It shows a graphical representation of live attacks. If nothing else…its just cool!

Norse Attack Map


Tony Stark asked the question, is it better to be feared or respected? I once worked with a persdownloadon that was respected as an engineer but no one liked him at all. You can know all there is to know and be able to fix any problem but if you are not a likable person, clients will not want to work with you.

I am no longer in a consultant role but I most recently had the chance to work with engineers that are both respected and loved by both their clients and myself.

Identity Crisis

I once had a client that disabled the Administrator account in Active Directory and create an account with the name Elmer Fudd. Some people will argue that renaming privileged accounts to something other than “administrator” is a wasteful tumblr_mtqiit0xBz1qar86bo1_500 (1)“security by obscurity” defense. However, this simple security strategy works. If the attacker hasn’t already made it inside your network, there’s little reason to believe they’ll be able to readily discern the new names for your privileged accounts. If they don’t know the names, they can’t mount a successful password-guessing campaign against them.