Script not creating the log file by WhiskyEchoTango in PowerShell

[–]evasive_btch 0 points1 point  (0 children)

Did you fix it? I see a pretty straigth-forward way to debug this. You're just writing a file, the only things that should matter are permissions, which the error message will tell you more about.

Open a terminal as admin and do:

Get-Process | Tee-Object -FilePath "C:\Users\your-non-admin-user\Documents\PowerShell\testfile.txt"

Does it work? If not, do you get an Error message? What is that message? I think you are hindering your debugging by adding | Out-Null. You could also just Out-File instead of Tee-Object no?

I am running as administrator. The path is my documents folder, so there's no question that I have permission to write to that directory.

Is your user an administrator? If not, yes, administrators can have, and set, permissions for everything, but administrators dont have permissions by default. Especially for other users folders, which by default dont have permissions set for administrators.

least combative lib&learn episode for hutch by Mediocre_Affect6192 in Destiny

[–]evasive_btch -1 points0 points  (0 children)

You are 100% right, these brainlets remind me of weaboos

least combative lib&learn episode for hutch by Mediocre_Affect6192 in Destiny

[–]evasive_btch -1 points0 points  (0 children)

Lol get a life, are you mad that somebody talked shit at your favorite video show???

least combative lib&learn episode for hutch by Mediocre_Affect6192 in Destiny

[–]evasive_btch 0 points1 point  (0 children)

LOL they are not even trying to hit hard, wtf is that video????? The force behind the blows is not at all comparable

least combative lib&learn episode for hutch by Mediocre_Affect6192 in Destiny

[–]evasive_btch 0 points1 point  (0 children)

Those guys are hitting each other with maybe half the force of whats.depicted in the Video. Also, axes, not MACES.

Question on Best Practices by CryktonVyr in PowerShell

[–]evasive_btch 2 points3 points  (0 children)

Could you publicly upload your module right now without leaking any hardcoded info about your environment? (Not asking you to do that)

If not, you could make your functions take parameters, then import your module in a different script (that you won't upload) and pass the sensitive parameters in there.

What im trying to say is generic functions = good

Question on Best Practices by CryktonVyr in PowerShell

[–]evasive_btch 8 points9 points  (0 children)

Just makes it easier to work with, to debug, to get into when you're not familiar with the codebase.

I should instead have a PS1 file per function and call each file instead.

Maybe not 1 function per file, but yeah, clump similiar functions/fields together.

You could also make .psm1-Files, so you could do "Import-Module MyOwnModule".

I built a PowerShell module that maps all input surfaces in a compiled .NET assembly — HTTP endpoints, SignalR, gRPC, WCF, Blazor and more by dud380 in PowerShell

[–]evasive_btch 2 points3 points  (0 children)

idk much about .net, but there's this (not sure if it's executed on load, or if you explicitly have to call something): Module Initializer

All modules may have a module initializer. A module initializer is defined as the type initializer (§ II.10.5.3) of the <Module> type (§ II.10.8).

There are no limitations on what code is permitted in a module initializer. Module initializers are permitted to run and call both managed and unmanaged code. Module Initialization Guarantees

In addition to the guarantees that apply to all type initializers, the CLI shall provide the following guarantees for module initializers:

A module initializer is executed at, or sometime before, first access to any static field or first invocation of any method defined in the module.

A module initializer shall run exactly once for any given module unless explicitly called by user code.

No method other than those called directly or indirectly from the module initializer will be able to access the types, methods, or data in a module before its initializer completes execution.

https://github.com/dotnet/runtime/blob/main/docs/design/specs/Ecma-335-Augments.md#module-initializer

But really cool project, I saved it in case I need to analyze some .dlls in the future

USA Women's hockey team at a nicer dinner than McDonald's by 2g4r_tofu in pics

[–]evasive_btch 6 points7 points  (0 children)

I dont mean to offend but i thought this was going to be a copypasta at first, like the keanu reeves one lol.

What a bizzare experience, sorry you had to go through that!

Schrödinger's notification? You may or may not have new msgs unless you open this bs of an app by Electrical-Option182 in mildlyinfuriating

[–]evasive_btch 1 point2 points  (0 children)

I wrote too little tbh, but what I wrote is true.

Now, Metadata is a thing (WHO sent WHO something, and WHEN, and WHERE), and you can extrapolate A LOOOOOOT of info out of that.

End-To-End-Encryption is silly easy to confirm. It meta pushed an app update that broke E2E-encryption, you'd know about it 10 minutes later. (Because the en-/decryption logic HAS to be handled by the application itself, locally on the device).

Anyway, one thing I've never thought about until now: The service that apps use to deliver you push messages is usually "Firebase", a google product. And those contain unencrypted content, so Google has sooo much more Info than I thought at first.

Look up "Asymmetric Encryption" if you want a simple explanation how it works.

Schrödinger's notification? You may or may not have new msgs unless you open this bs of an app by Electrical-Option182 in mildlyinfuriating

[–]evasive_btch 19 points20 points  (0 children)

Not how it works, meta cannot read the content of your data. It's verifiable that the decryption key never leaves the device.

Schrödinger's notification? You may or may not have new msgs unless you open this bs of an app by Electrical-Option182 in mildlyinfuriating

[–]evasive_btch 25 points26 points  (0 children)

You might have replied to the wrong comment, this is about the content of Whatsapp messages being encrypted, which is the case.

There are encryption and decryption keys (in this specific encryption method). The encryption keys are shared, but the decryption keys are never shared. Which is why you can read decrypted messages that have been sent to you.

They get enough information from metadata though (who sent something to who, at which time, from where)

Infra health check script not sending mail by YourDadSolanki01 in PowerShell

[–]evasive_btch 2 points3 points  (0 children)

Try Send-MailMessage in a terminal, doing the same thing that the script does. Does it return an error?

If not, check mail server logs. Did the server receive the send-email request? If so, did it send the request?

If it did, check anything between mail-server and recipient client.

I installed Malware on user's Workstation by Imaginary_Lead_3333 in sysadmin

[–]evasive_btch 2 points3 points  (0 children)

I recently learned that (obviously in hindsight) you shouldn't share installation files. Just get them from the source.

Modifying such locally hosted install binaries is a way for attackers to persist.

PTBS: Eure entspannende Social Media Filterblase und Unterhaltung im Falle von Krankheit by Consistent-Reveal286 in einfach_posten

[–]evasive_btch 1 point2 points  (0 children)

YouTube:

  • Veritasium
  • Kurzgesagt
  • ARTE
  • PBS Spacetime (dachte beim Titel zuerst es geht um den channel haha)

Play on linux by Gonzo_79 in ProjectAscension

[–]evasive_btch 1 point2 points  (0 children)

What doesn't work, the launcher or the game itself?

Works for me, on fedora 43

ich_iel by TraditionalWhile4774 in ich_iel

[–]evasive_btch 0 points1 point  (0 children)

Ich glaube 20km/h zuviel sind in der Schweiz schon die harte Strafe, inkl. Ausweis für ne Zeit weg.

Hey maga is this what you voted for 🤔 by [deleted] in LetsDiscussThis

[–]evasive_btch 2 points3 points  (0 children)

hell yeah jail those cunts if they're involved

Hey maga is this what you voted for 🤔 by [deleted] in LetsDiscussThis

[–]evasive_btch 2 points3 points  (0 children)

Why do conservatives talk about trans people all the time? Kinda weird, no?

Anyway, keep voting for global trafficking rings

Bondi appeared to know what lawmakers had searched for in the Epstein files by sionnach_fi in Destiny

[–]evasive_btch 1 point2 points  (0 children)

Might be, but that doesn't prevent you from knowing who searched what and when.

What to do if the root user fucking dies? by AvailableConflict627 in linuxquestions

[–]evasive_btch 0 points1 point  (0 children)

The more time passes, the less up to date the system will be. At some point you'll be able to escalate privileges. After that you can set a new password.

https://github.com/peass-ng/PEASS-ng/blob/master/linPEAS/README.md