
There is more than enough monitoring software around. Most of them are really helpful and superbly done. For those who don’t have such software at hand, there are only 2 options: to do […]
There is more than enough monitoring software around. Most of them are really helpful and superbly done. For those who don’t have such software at hand, there are only 2 options: to do […]
Long time ago I’ve created a small function that acts like a port scanner. It’s not a replacement for enterprise scanners such as nmap, but it’s quite useful for quick tests when […]
To download files from the Internet you can use the graphical interface or a command from the PowerShell module BitsTransfer. In this blog post, I show how to download files with Windows […]
Easy as can be. It’s not a rocket science to create your first PowerShell command in and save it as a module. Maybe your colleagues will get big eyes when you present […]
In one of my previous posts “PowerShell: Documenting your work with Start-Transcript” I’ve described how to manually configure PowerShell Transcripting by using the command Start-Transcript. In this article I show how to […]
There are many encryption and decryption tools around. PowerShell is a Windows built-in tool and you can use it for cryptography as well. In this blog post I am going to play […]
In this article, a certificate for a digital signature is created to digitally sign files with Windows PowerShell. A digital certificate is usually issued by a Certification Authority (CA). But in this […]
For some reason, I don’t like netstat. Never did. Fortunately PowerShell provides a similar command to netstat: Get-NetTCPConnection. Let’s discover the options of this command in form of this blog post.
While reading great news and improvements about the Windows 10 Fall Creators Update (1709), it might be useful to find out if the update is already installed or not.
There are two ways for creating Inbox Rules: The user itsself in Outlook or the Exchange Administrator can establish Rules based on specific conditions. In this article I describe the establishing of […]
Active Directory Domain Services uses pull replication to replicate Active Directory Partitions. This means that the Domain Controller on which replication is started receives the data from the source Domain Controller. It’s like a […]
For managing Active Directory Domain Services, still most of the administrators use Active Directory Users and Computers (dsa.msc). They are used to it. But it´s worth taking a look at the Active […]
Do you remember the net send command? And do you remember the security concerns? Last week I played with msg.exe. Msg is the “new” net send. I tried to send a message […]
One of the first things you learn in cisco lessons is how to create login banners. A banner is a message shown to a user who is using the device. In this article I […]
When it comes to importing huge numbers of users, csv is No. 1. But what about text files? Sure, you can export content of text files to csv. But in this article, […]