Sometimes it could happen that your computer lost connection to other hosts or the internet. What is the first you should do? For example, you could try to reach other hosts or […]
Last week I had the task to backup Hyper-V VMs. No Replica, no Clustering, a simple backup with Windows Server Backup. The problem was that a repeating backup job had already been set […]
In this article I’ll show you how to use a very simple command that works for the local computer and remote computers and lets your computers speak.
In this blog post I show how to find out the Version of PowerShell on the localhost and on remote computers.
It can happen that files have to be deleted regularly or copied somewhere else. This is no problem in itself, as long as you know a little about scripting. But many people […]
In articles, blogs and forums I often read that Windows forms the IPv6 address from the MAC address. This process is called EUI-64, and the assumption that Windows (Vista and above) use […]
Enivornment Variables make life easier. In this article I describe how to use environment variables in daily work. And I am going to show some useful examples.
As the headline says, I am going to show you which tools are no longer needed when you are familiar with PowerShell. No long speeches today, just examples. I’m pretty sure some of […]
IPv6 enabled devices generate Link-Local addresses automatically. Not just Link-Local Addresses, but also a Solicited Node Multicast Address. Solicited Node Multicast Addresses are used by the Neighbor Discovery Protocol (NDP) to discover […]
This week I had the task to delete print jobs from the queue. However, some of them could not be removed. So I decided to write an article about it and also […]
Last week I got my new Surface Pro. At the same time I decided to give up my iPad Air. My plan is to do everything quick on my new iPhone X […]
In one of my previous blog posts PowerShell: Documenting your environment by running systeminfo on all Domain-Computers I have described how to list important system information of all Domain Computers by running systeminfo. […]
Firewalls control traffic. They use technology such as Stateful Inspection to establish a connection to other networks. In this article I describe how to configure the host-based Windows Firewall by using Windows […]