• 1

    DigestSync (Celebrity Opinion) Why Celebrities So Much Obsessed With DigestSync?

    Suggested by DigestSync Official New  0 Comments

    DigestSync (Celebrity Opinion) Why Celebrities So Much Obsessed With DigestSync?



  • 1

    Protecting Yourself from Info-Stealing Malware in Facebook Ads

    Suggested by Zem Boet New  0 Comments

    Protecting Yourself from Info-Stealing Malware in Facebook Ads


    Introduction:

    In recent news, it has come to light that certain Facebook ads promoting Windows desktop themes have been found to contain info-stealing malware. This malicious software is designed to infiltrate users' computers and steal sensitive information, posing a significant risk to online security. It is crucial for users to be aware of this threat and take necessary precautions to protect their devices and personal data.

    Understanding the Threat:

    The Facebook ads that are being used to distribute this malware appear to be harmless at first glance. They often feature attractive Windows desktop themes that users may find appealing and click on. However, once clicked, the malware is silently downloaded onto the user's computer without their knowledge.

    The malware is specifically designed to steal sensitive information from the infected device. This can include personal information such as usernames, passwords, credit card details, and more. It then sends this stolen information to the hackers, who can use it for various illicit purposes, such as identity theft or financial fraud.

    Protecting Yourself:

    Given the potential risks associated with these malicious Facebook ads, it is essential to take proactive steps to protect yourself and your devices. Here are some measures you can take:

    1. Exercise Caution: Be vigilant when browsing Facebook and other online platforms. Avoid clicking on suspicious ads or links, especially those promoting desktop themes or other software downloads.

    2. Keep Software Updated: Ensure that your operating system, antivirus software, and other applications are regularly updated with the latest security patches. This helps to protect against known vulnerabilities that malware can exploit.

    3. Use Trusted Sources: Only download and install software, including Windows desktop themes, from reputable and trusted sources. Avoid downloading from unfamiliar websites or clicking on ads that seem untrustworthy.

    4. Install a Reliable Antivirus Program: Invest in a reputable antivirus program that offers real-time protection against malware and regularly scan your computer for potential threats. This can help detect and remove any malicious software that may have already infected your device.

    5. Enable Firewall: Activate the firewall on your computer to add an additional layer of security. A firewall helps monitor and control incoming and outgoing network traffic, blocking any suspicious activity.

    6. Educate Yourself: Stay informed about the latest cybersecurity threats and best practices. Regularly educate yourself about common phishing techniques, malware distribution methods, and other online security risks.

    Conclusion:

    The emergence of info-stealing malware distributed through Facebook ads promoting Windows desktop themes is a concerning development in the realm of online security. By staying vigilant, keeping software updated, and using trusted sources, users can significantly reduce their risk of falling victim to such threats. Additionally, investing in reliable antivirus software and enabling firewalls can offer an added layer of protection. By taking these proactive measures, users can enjoy a safer online experience and protect their personal information from falling into the wrong hands.


    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%84%ef%bd%85%ef%bd%81%ef%bd%84%ef%bd%90%ef%bd%8f%ef%bd%8f%ef%bd%8c-%ef%bc%93-%ef%bd%81%ef%bd%8e%ef%bd%84-%ef%bd%97%ef%bd%8f%ef%bd%8c/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%84%ef%bd%85%ef%bd%93%ef%bd%90%ef%bd%89%ef%bd%83%ef%bd%81%ef%bd%82%ef%bd%8c%ef%bd%85-%ef%bd%8d%ef%bd%85-%ef%bc%94-%ef%bc%88%ef%bc%92/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%89%ef%bd%8e%ef%bd%93%ef%bd%89%ef%bd%84%ef%bd%85-%ef%bd%8f%ef%bd%95%ef%bd%94-%ef%bc%92-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94/

    https://bcdemocrat.com/events/%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88%ef%bc%a0-%ef%bd%8c%ef%bd%8f%ef%bd%8e%ef%bd%87%ef%bd%8c%ef%bd%85%ef%bd%87%ef%bd%93-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94%ef%bc%89-%ef%bc%88/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%81-%ef%bd%91%ef%bd%95%ef%bd%89%ef%bd%85%ef%bd%94-%ef%bd%90%ef%bd%8c%ef%bd%81%ef%bd%83%ef%bd%85-%ef%bd%84%ef%bd%81%ef%bd%99-%ef%bd%8f/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%82%ef%bd%81%ef%bd%84-%ef%bd%82%ef%bd%8f%ef%bd%99%ef%bd%93-%ef%bc%94-%ef%bd%92%ef%bd%89%ef%bd%84%ef%bd%85-%ef%bd%8f%ef%bd%92-%ef%bd%84/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%86%ef%bd%8c%ef%bd%99-%ef%bd%8d%ef%bd%85-%ef%bd%94%ef%bd%8f-%ef%bd%94%ef%bd%88%ef%bd%85-%ef%bd%8d%ef%bd%8f%ef%bd%8f%ef%bd%8e-%ef%bc%88/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%8d%ef%bd%81%ef%bd%98%ef%bd%98%ef%bd%98%ef%bd%89%ef%bd%8e%ef%bd%85-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94-%ef%bd%86%ef%bd%95/

    https://bcdemocrat.com/events/%e2%9c%b4%ef%bd%97%ef%bd%81%ef%bd%94%ef%bd%83%ef%bd%88-%ef%bd%94%ef%bd%97%ef%bd%89%ef%bd%93%ef%bd%94%ef%bd%85%ef%bd%92-%ef%bc%88%ef%bc%92%ef%bc%90%ef%bc%92%ef%bc%94-%ef%bd%86%ef%bd%95%ef%bd%8c/

    https://bcdemocrat.com/events/protecting-yourself-from-info-stealing-malware-in-facebook-ads/

    https://cohesiondata.ec.europa.eu/2014-2020-Finances/Verified/ab5u-pkzj/about_data

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/89030c3b-f1d6-4052-b8c4-1463b307bdb4

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/9ec15542-1bc1-400c-993a-ae23e0f889b9

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/31f38c7f-a05a-494d-931a-811d3fa920b8

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/d11659de-7d43-4e59-bea5-97fd79be0017

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/0e0b86d0-e683-44b0-af45-c0f04d78a962

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/faea3c00-2334-4ff8-a578-0ede5131e0fe

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/3643a6ab-fa22-46eb-acf3-064fcbd75f12

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/b7befd44-e098-4686-9bba-a815c4b4e8db

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/c5361138-1f0a-4cd3-904d-11bcf5afe24e

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/5e2e2811-2717-4640-9545-e0dc84ee6be0

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a0f379d0-ce2a-46b4-9566-21b785bfc138

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/4d0aafaa-d2e2-4494-96bf-3598e6a4e101

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/dde57f89-c6e0-479c-b525-eb8666115502

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/ea418983-da1a-4f27-8093-8636b5e81867

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/e82b9eb9-6aad-490d-9b82-1dfae1367722

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a7aaba76-d541-4ff9-abec-5a936c88bd90

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/81401f9b-2132-4d4b-a9b8-21c3f88b48c4

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/9e29b0e8-f2aa-46ca-a447-5617d79dafab

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/8773a520-a5f3-4c04-8a01-938869dcea5a

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/bed1d66d-95ff-435a-9e92-987b81cdaf02

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/cc67bedd-0773-4d78-bde2-efbb2acf7b46

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/6c4dd55a-2337-43da-a11c-6dc64f8ab98c

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a1033014-d6d3-4ff3-891e-e03106d07511

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/d00671a0-7275-4ee5-963a-1af6abcab970

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/f8777204-0ec2-49ce-a8c7-4948fc182c29

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/0ec86b21-1999-4aef-b1f0-6616da9ec7d1

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/567bac6f-032a-4c4d-b4e4-5bc4947a9241

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/0efde01c-60aa-4257-93b6-ab0ddf85bdbc

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/fbf0b7db-58fc-4e6d-9cdb-f8de76966b44

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/a44a0b97-c78f-4bc6-bfb5-beac2496e122

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/36295a56-9680-44d1-a997-8f138f7ae524

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/ca643d96-ba0e-4f5b-bbbc-7d9a5e2ff35e

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/2fcc95a5-7f04-464e-a011-cb9f553b6fc4

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/6bfdcfb7-bfd2-4e8b-803b-05a11aed07c0

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/c496204d-c88f-409c-99fc-ea9a82285eda

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/cb01b032-3fed-4deb-bb8e-32d0263e49b5

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/3f089938-b50b-4feb-a0ce-2a74aa8ae02a

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/371204b4-6913-44ee-aa4a-726a592df164

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/320c3be8-79b6-4cac-87a8-5f2c08d614b7

    https://cohesiondata.ec.europa.eu/api/views/ab5u-pkzj/files/25af7485-f042-45e6-8e86-40b8e6850c1a

    https://www.linkedin.com/pulse/protecting-yourself-from-info-stealing-malware-facebook-asrul-fauzi-8rtmc

    https://ko-fi.com/post/Protecting-Yourself-from-Info-Stealing-Malware-in-P5P410KD1I


  • 1

    Embed a Guide in another Guide to allow the back button

    Suggested by Ahmed Dalhi New  0 Comments

    Let's say we have a workflow and in a given step we allow users to go to another Guide (action link) for more details, well today once the user clicks that link and is forwarded to that new Guide, the previous workflow is cut and not completed, as there is not back button to allow the user to comeback to the original workflow.

    On the other hand, allowing the author to specify if the anchor is the same for the action link Guide would be great, as in most cases it's the same anchor, and it interupts the user's by asking him to scan the achor again.


  • 1

    Activate the download option in sharepoint documents in model driven app

    Suggested by Shweta Sidana New  0 Comments

    Activate the download option for SharePoint documents in the model-driven app. This option used to exist but has been deactivated.



  • 1

    Vendor Bank account setup

    Suggested by Carolyn Ross New  0 Comments

    Hello,


    I want to ensure our vendor banking information is set up properly. Is there a list that is regularly updated by Microsoft of the following:

    • When is routing number needed
    • What Routing Number Type is needed if it is not listed (ex. India)
    • What if a vendor does not have a SWIFT code, the field is mandatory - what to use
    • Is CC Routing Number Type used within Canada for both EFTs (Canadian ACHs) and Wires?
    • When is Correspondent Bank needed and why isn't it mandatory when it is required?

    Thanks,

    Carolyn



  • 1

    Simplified Migration of Guides Material

    Suggested by Edward Davis Jr New  0 Comments

    Can a tool be created that would support the movement of Guides from one Environment/Tenant to another Environment/Tenant. This could allow for the creation of a Guide with one customer and then replicate or migrate the data for another client.


  • 1

    Question Step - increase length of field

    Suggested by Mark Dobson New  0 Comments

    Please improve the user experience:


    Question steps have up to 3 choices.

    The fields for writing in responses should be longer. There is space on the Steps screen for the response to be twice the length it is currently.

    Most responses are short, however in compliance/safety instructions the descriptions sometimes need to be longer than the 20 characters allowed.


    Please consider. It should be a very easy fix?


    Regards - Mark



  • 1

    Feature in Guides for the operators to write notes of what they performed

    Suggested by Shilpa Ramteke New  0 Comments

    Hello,

    We wanted to know if we can have a feature added in Guides Operate mode where the user can write notes on what all they performed during the specific steps so that it can be later reviewed.



  • 1

    How to hide the (default) instance from Guides? I have tried everything it seems.

    Suggested by Raide n New  1 Comments

    When I sign into Guides, I see two instances, example(default) instance, and a Production instance.

    I am trying to hide the example(default) instance of Guides during sign-in. I no longer use the (default) instance.


    I tried going to powerapps.microsoft.com and under "Your Apps" in (default), I have "Turned off" both Remote Assist and Guides apps.

    Interestingly enough,

    This has successfully hidden the (default) instance inside of the Remote Assist during Remote Assist sign-in screen!,

    but it has unsuccessfully hidden the (default) instance inside of Guides during the sign-in screen.


    What to do now?? Where to go from here?

    Unfortunately the "Delete" button is greyed out and I can't delete the app under powerapps.microsoft.com Your Apps.



    How do I go about removing Guides from the (default) instance so that it does not appear during sign-in?


    I am already aware that there is no way I can restrict the default environment visibility using an Azure AD Group (all other environments have this feature, except for default environment)

    I am already using the restrict visibility on non-default environments. I wish I could restrict visibility of (default) too....



    My (default) environment is still prevalent during sign-in and unfortunately still pops up during Guides sign-in, no matter what I try.

    I am only using the production environment and want to get rid of the (default) environment during sign-in. The (default) Guides is "turned off" but it still shows up during sign-in....





    How do I remove (default) environment from Guides sign-in screen?


  • 1

    Software Updates Link within Application

    Suggested by Edward Davis Jr New  0 Comments

    Provide a link within Settings that allows a user to perform updates to the D365 Guides PC application without having to comeback to microsoft store. This could be a URL Link or use the Windows update feature to include Guides updates with Windows patching.