shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

266
active users

#powershell

2 posts2 participants0 posts today
Mărcziem ™<p>Seit 25 Jahren arbeite ich mit Linux und ja – Windows ist nicht das OS, das ich freiwillig nutzen möchte. Aber dieses ewige OS-Bashing erinnert eher an einen Streit auf dem Pausenhof als an einen erwachsenen Diskurs. Wer Spaß an seinem System hat, soll es nutzen. Linux ist solide, manchmal sogar elegant – aber kein Heilsversprechen. Und das muss es auch nicht sein. </p><p>Die Welt dreht sich weiter – ob mit <a href="https://mastodon.social/tags/Bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bash</span></a> oder <a href="https://mastodon.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> spielt längst nicht mehr die Hauptrolle.</p><p><a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a></p>
stib<p>Hi <a href="https://aus.social/tags/nerds" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nerds</span></a>, if I run a <a href="https://aus.social/tags/powershell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>powershell</span></a> script that takes a directory or a collection of directories as its arguments, the trailing slash in the directory name turns the following single quote into a double quote using evil Microsoft dark magic somehow.<br>If my script is:<br>```<br>param (<br> [string[]]$inDirs<br>)<br>foreach ($dir in $inDirs){<br> write-host $dir<br>}<br>```<br>and I do<br>```<br>pwsh myscript.ps1 'c:\\some\dir\'<br>```<br>The result is <br>```<br>c:\\some\dir"<br>```<br>How do I get it to unescape (or whatever it's doing) the last slash?<br><a href="https://aus.social/tags/AskFedi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AskFedi</span></a> <a href="https://aus.social/tags/CodingHelp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodingHelp</span></a> <a href="https://aus.social/tags/pwsh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pwsh</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>I haven't had an opportunity to present at the <a href="https://techhub.social/tags/PSHSummit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PSHSummit</span></a> in several years. Here's my session from this year's event on The Human Side of <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> scripting <a href="https://www.youtube.com/watch?v=4xVDorpEhm8&amp;list=PLfeA8kIs7CoftB7JKZTiUKnVUHIMtwYF5&amp;index=24" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=4xVDorpEhm</span><span class="invisible">8&amp;list=PLfeA8kIs7CoftB7JKZTiUKnVUHIMtwYF5&amp;index=24</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>I published an update of the PSTypeExtensionTools module to the <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> Gallery. Now with better preview options. Take a look at the project's README to get started. This is how you get PowerShell to do more for you. <a href="https://github.com/jdhitsolutions/PSTypeExtensionTools" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/PSTy</span><span class="invisible">peExtensionTools</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>Added a new command to the DiskReportingTools module. Install from the <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> Gallery after checking out the project's README <a href="https://github.com/jdhitsolutions/DiskReportingTools" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/Disk</span><span class="invisible">ReportingTools</span></a></p>
No Starch Press<p>Learn how Windows manages authentication, access control, and resource permissions with clarity and precision. </p><p>This book offers hands-on PowerShell examples that guide you through key internals like the Security Reference Monitor, SAM, and Kerberos—ideal for researchers, defenders, and developers.</p><p><a href="https://nostarch.com/windows-security-internals" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nostarch.com/windows-security-</span><span class="invisible">internals</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://mastodon.social/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>The best way to improve your <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> skills is to DO. That's why I wrote The PowerShell Practice Primer. No lab setup needed. 100+ exercises, including PowerShell 7 content. <a href="https://leanpub.com/psprimer" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">leanpub.com/psprimer</span><span class="invisible"></span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>Have you seen what's new in the <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> Gallery? Use the PSGallery reports. <a href="https://github.com/jdhitsolutions/PSGalleryReport" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/PSGa</span><span class="invisible">lleryReport</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>Here's an idea I had on comparing text files with <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://gist.github.com/jdhitsolutions/71efaf9df48cbfc0429ed6c1713e9cec" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/jdhitsolutions</span><span class="invisible">/71efaf9df48cbfc0429ed6c1713e9cec</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>Encrypting secrets locally with <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a></p><p><a href="https://devblogs.microsoft.com/powershell-community/encrypting-secrets-locally/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">devblogs.microsoft.com/powersh</span><span class="invisible">ell-community/encrypting-secrets-locally/</span></a></p>
CybersecKyle<p>What am I doing today? Funny you should ask…</p><p>I’m creating a PowerShell script that checks an endpoints Windows 11 eligibility and then writes it to an excel spreadsheet on the computer for me to check. </p><p>This will eventually be a Kaseya VSAX workflow to use on our clients machines in preparation for the Windows 10 sunset. </p><p><a href="https://infosec.exchange/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://infosec.exchange/tags/MSP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSP</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>I've published an update to the new DiskReportingTools <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> module. New command to display folder usage by extension. I also updated commands to output raw data so you can create your own visualizations. <a href="https://github.com/jdhitsolutions/DiskReportingTools" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/Disk</span><span class="invisible">ReportingTools</span></a></p>
heise Security<p>Microsoft: Abhilfe für Sicherheitslücke durch gelöschte "inetpub"-Ordner</p><p>Windows-Update hat einen "inetpub"-Ordner angelegt. Wird er gelöscht, blockiert das womöglich weitere Updates. Ein Script hilft. </p><p><a href="https://www.heise.de/news/Microsoft-Abhilfe-fuer-Sicherheitsluecke-durch-geloeschte-inetpub-Ordner-10437103.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Abhilf</span><span class="invisible">e-fuer-Sicherheitsluecke-durch-geloeschte-inetpub-Ordner-10437103.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>This is the module I use when I travel. I can run commands on my home machine while traveling. No VPNs, port forwarding, or PowerShell Remoting required. <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://github.com/jdhitsolutions/PSRemoteOperations" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/PSRe</span><span class="invisible">moteOperations</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>If you have written traditional <a href="https://techhub.social/tags/DSC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DSC</span></a> resources and want an easy way to migrate them to class-based resources, take a look at <a href="https://github.com/jdhitsolutions/DSCResourceMigration" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/DSCR</span><span class="invisible">esourceMigration</span></a> <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>Keep up to date with the latest updates in the <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> Gallery with these reports. <a href="https://github.com/jdhitsolutions/PSGalleryReport" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/PSGa</span><span class="invisible">lleryReport</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>I finally published a long-overdue update to the MySqlite module to the <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> Gallery. Numerous bug fixes and improvements. The big change is that the module now supports ARM64 on Windows. <a href="https://github.com/jdhitsolutions/MySQLite" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jdhitsolutions/MySQ</span><span class="invisible">Lite</span></a></p>
PSConfEU<p>Discover how <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23PowerShell" target="_blank">#PowerShell</a> notebooks can solve dependency issues across different machines and cloud pipelines! Learn about seamless documentation, collaboration, and execution of scripts in this insightful session with David Sass. <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23PSConfEU" target="_blank">#PSConfEU</a><br><br><a href="https://youtu.be/RNQto14mH9s?si=rn27hqyeOWdg6kYA" rel="nofollow noopener" target="_blank">Execute Notebooks everywhere -...</a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@mrgrumpymonkey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mrgrumpymonkey</span></a></span> depends...</p><ul><li>We've already seen shit that cracked <a href="https://infosec.space/tags/Windowy8Bing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windowy8Bing</span></a>, <a href="https://infosec.space/tags/Windows10S" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10S</span></a> and <a href="https://infosec.space/tags/Windows11Home" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11Home</span></a> wide open with <a href="https://infosec.space/tags/Adware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Adware</span></a> that also disables <a href="https://infosec.space/tags/WindowsDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsDefender</span></a>.</li></ul><p>Next logical step is some <a href="https://infosec.space/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> script that downloads a <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> distro image, repartition the system drive, add some unallocated space at the end, put a <a href="https://infosec.space/tags/CloudInit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudInit</span></a> config in it and then do an <a href="https://infosec.space/tags/UnattendedInstall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnattendedInstall</span></a> of said system with <code>bcd</code> by calling up <a href="https://infosec.space/tags/bcdedit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bcdedit</span></a> to <a href="https://infosec.space/tags/chainload" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chainload</span></a> said partition.</p><ul><li>I jist have neither the time nor spoons to do that shit myself, but in theory a <a href="https://infosec.space/tags/NetInstaller" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetInstaller</span></a> image of ~ 100MB should suffice...</li></ul>
Daniel Schroeder aka deadlydog<p>This is very cool and I see it as a nice alternative to writing <a href="https://hachyderm.io/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> / <a href="https://hachyderm.io/tags/Bash" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bash</span></a> / <a href="https://hachyderm.io/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> for simple scripts; write them in <a href="https://hachyderm.io/tags/CSharp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSharp</span></a>, but still have an easy to read and modify text file, instead of a compiled exe. Coming in <a href="https://hachyderm.io/tags/dotnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dotnet</span></a> 10.</p><p><a href="https://www.youtube.com/watch?v=98MizuB7i-w" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=98MizuB7i-</span><span class="invisible">w</span></a></p>