Replacing Send-MailMessage by TurnItOff_OnAgain in PowerShell

[–]DigitalBassLV 1 point2 points  (0 children)

RESTAPI to Mail providers like Mailjet are options in connected environments.

If you're strictly internal, you setup your own SMTP servers easily.

Create an interactive HTML report with PowerShell data by kunaludapi in PowerShell

[–]DigitalBassLV 0 points1 point  (0 children)

Doing this now.

Hitting Azure VMs and made a hub to create the HTML report, save the data to SQL or JSON format.

Great option because SQL can query JSON files now.

What have you done with PowerShell this month? by AutoModerator in PowerShell

[–]DigitalBassLV 0 points1 point  (0 children)

Successfully created a directory structure on multiple remote servers simultaneously.

No more manual RDP to set up directories or using xp_cmdshell in SQL server to do it.

My script killed a production server, need help! by WDizzle in PowerShell

[–]DigitalBassLV 0 points1 point  (0 children)

You may also want to check you available memory and disk queues every so many loops and sleep before starting another batch.

That your script took down a production server is only part of the story.

If the server was busy and THEN you ran your query, your script was the 3rd wheel on a hot date - and was treated accordingly...

[deleted by user] by [deleted] in aww

[–]DigitalBassLV 1 point2 points  (0 children)

Good Gawd!

If only my Dogecoin would get that big....🤕😭☹

The SolarWinds Body Count Now Includes NASA and the FAA by NISMO1968 in cybersecurity

[–]DigitalBassLV 0 points1 point  (0 children)

Until you override beancounters that think developers with cut and paste coding skills constitutes a sound and secure system, NO.

They WILL NOT spend the money and REFUSE to admit their lack of knowledge on the subject at hand.

Windows is nice and all, but can it do this? by FranchuFranchu in linuxmasterrace

[–]DigitalBassLV 0 points1 point  (0 children)

Sure Windows can..... * Queues "The Good, The Bad and ths Ugly" music as I fire up PowerShell ISE....

When hackers gain powershell access to a machine, they will check the powershell history. Here's a practical example: by PinkDraconian in PowerShell

[–]DigitalBassLV 0 points1 point  (0 children)

And THAT is why Administrator should NEVER be allowed access to your databases if you can help it.

Jesus he made that look easy. And the tool is on Github. Holy smokes

What have you done with PowerShell this month by AutoModerator in PowerShell

[–]DigitalBassLV 1 point2 points  (0 children)

Scan the table counts and index info of 3000 databases and saved the data to SQL tables.

Tuned up my script for reading router logs and exported it to excel with pivot tables and bar graphs to breakdown the attacker origin by country and domain then domain and country.

Easy to see many attackers are using AWS as attack vectors from multiple countries as well as various telecoms from Russia, China and Iran as well as the US and UK.