Hackers can use tools like BloodHound to visualize the shortest path to owning your domain. But that doesn't mean you can't use it to find and protect your organization's weak spots. Here's how.
APIs seem to be everywhere these days. Every popular online service has one. APIs allow developers to interact with online services without actually having to point and click their way through a UI.
Windows environment variables give system administrators access to a plethora of information about the Windows operating system. Separated into system and user-level scopes, default environment ...
Using built-in cmdlets that come with PowerShell, we can easily read and replace any kind of content inside of a text file. Whether the string to find inside of the text file is just a single word or ...
Native support for Secure Copy Protocol (SCP) isn't in PowerShell, but that doesn't mean it's not capable. By using a free community module called Posh-SSH, we can transfer files via SCP just as ...
If you want to group parts of your code for debugging purposes or simple readability, the PowerShell ISE has the answer. Keeping your code organized is sometimes just as important as the code actually ...
Using Windows Management Instrumentation makes it easy to pull information about the drives on your system or remote systems. Here's how. Managing drives is a very common thing that a system ...
Ever wonder how long a piece of PowerShell code takes to execute? Maybe you've got a script that occasionally gets hung up on some process, and you'd like a way to terminate the script if it takes too ...
Creating arrays in PowerShell is a common occurrence for any scripter. Arrays are an important data structure in any language and PowerShell is no different. However, not all arrays are the same. In ...
There are a few ways that PowerShell can provide some sort of notification method to alert you when something happens such as a script completing or an issue is detected during a query. The most ...
There's two ways to accomplish this task: the wrong way and the right way. Here's how to do both. If there is one thing an administrator finds themselves doing, it is probably determining what ...
Unfortunately, IT professionals have to deal with sensitive information all the time. That information could be in the form of passwords, proprietary company information or anything that you'd rather ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results