When it comes to monitoring, as much I like scripting languages, it is never my first choice to rely only on a ‘custom’ script. Considering how many variables are involved: requirements, environments, the overall experience of the team that will manage that piece of software, and all efforts to develop, test, and support the solution over time.
I prefer the implementation of any monitoring solution with basic out-of-the-box features and add on top some scripts if required to reduce the overall codebase to read/maintain. It is not only an early optimisation of a cost/benefit analysis, but it is derived from my professional experiences in different companies and a consideration of the balance needed between the business goal/expectation and the technical value offered by the suggested solution.
In this article you will find something totally different, I wanted to take the opportunity of helping somebody to solve a real case of a Virtual Printer that was causing issues to users and the ops team. The printer needed to be monitored with a living-off-the-land approach, so without adding any software solution but just a few scripts.
Continue reading “How to monitor a printer with Powershell”
I wanted to celebrate my 100th article doing something simple and out of the ordinary. Looking back one popular article using PowerShell written 2 years ago was Text-To-Speach in 3 lines of code, so I’ve decided to play with sounds.
In this article, you will use PowerShell to tune your Guitar! Continue reading “How to tune your Guitar with Powershell”
I wrote a Powershell script to check, apply and remove a workaround for the Windows DNS Server (CVE-2020-1350) if you are unable to apply the patch right away. The Vulnerability affects Windows DNS Servers was announced one or two days ago. Continue reading “CVE-2020-1350 – WINDOWS DNS SERVER – Applying a Workaround with Powershell”
This article can be considered a Cyber-Security article more than a Software Development one for the content and part of the vocabulary that will be used but don’t be scared. I wanted to keep it very practical and to give you a simple example of what type of tools everyone can build or use in certain scenarios like in CyberSec and Incident Response. Continue reading “CVE-2019-18935 – Using Powershell to review IIS and Windows Logs (Searching for IoC)”