Home › Category Archives › Uncategorized


There are 3 main ways to conserve power on a computer. You can power off/shut down the computer. You can put the compute into Stand By or Sleep mode. Or you can use hibernate. Hibernate is a like a combination of the 2 other ones. You can pull the power from the computer and move it around, but when you turn it back on it will have all of the running programs that were running before you put it in to hibernate and the computer resumes quicker than a regular reboot.

Unfortunately some computers don’t have this enabled or it is not easily accessible. It may not be on the Start Menu with the regular shut down or sleep mode options. You can create a script that will do it for you. For example, I created a new text document on my desktop call Hibernate.txt. Inside of that text document I have the following line of code:
rundll32.exe PowrProf.dll, SetSuspendState 0,1,0
I then rename the file from Hibernate.txt to Hibernate.bat. When this is file is clicked the computer will go in to hibernation mode.

Another fun thing that you can use the rundll32.exe program for is to lock your workstation. The code for that is:
rundll32.exe user32.dll,LockWorkStation
Just make another text file, put that in, save it and rename the .txt to a .bat and there you have a script that will lock your computer.


The HOSTS file is very similar to DNS. DNS converts hostnames (ex: bradcroft.com) to a numerical number called an IP address. DNS servers are located all throughout the internet including your own ISP. When you attempt to browse to a website your computer contacts the DNS server and the DNS server provides the IP address to the site, allowing your computer the knowledge on how to get to the site. If you modify your computers HOSTS file you can have your computer visit a different site entirely.

This is especially useful for malware prevention. There are several sites out there that have lists of different known malware sites. By modifying your own HOSTS file and putting in different IP addresses for these malicious sites you can help protect your computer.

Ones site that has this list is MVPS.
Another program that modifies the HOSTS file is Spybot Anti-Beacon. You can get the program here.

The HOSTS file can be found on Windows in the C:\Windows\System32\drivers\etc\hosts and on Linux at /etc/hosts. To edit the file on Windows you will need to run the program as an administrator. I recommend using Notepad++ for editing text files.

grep in Windows 10, search the scriptures

When Windows 10 came out, there was functionality built into it to use a Linux command line. One of these commands is grep which stands for global regular expression. Basically, you enter in the phrase you want to search for and file or files you want to search and it will bring up a list of those files.

If you want to perform a search you would use the following syntax:

grep phrase_to_search_for folder/file_name

If you wanted to search for the phrase “one by one” from the Book of Mormon you would need to enter the command as follows:

grep 'one by one' BoM/*.*

You would get the following result:

Welcome to my site

Here you will find things I want to talk about.