I wanted to celebrate my 100th article doing something simple and out of the ordinary. Looking back one popular article using PowerShell written 2 years ago was Text-To-Speach in 3 lines of code, so I’ve decided to play with sounds.
In this article, you will use PowerShell to tune your Guitar! Continue reading “How to tune your Guitar with Powershell”
Recently I’ve encountered a strange issue that affected one Windows workstation with Sophos AV (Endpoint) software installed. Sometimes this software creates some temporary files with ‘$$$’ extension and apparently it never removes them.
I thought that the process of analysis and implementing a solution for this edge case was perfect for an article and it is applicable to many similar situations when scripting is required to collect information or mitigate.
Continue reading “Using PowerShell to Clean Up Sophos Temp Files”
Monitoring is an important activity in IT operations, it’s essential for correlating the state of all the moving parts of our systems and applications and create a big picture of the health of the whole environment. Before going down the rabbit hole of complicated monitoring tools and techniques let’s start with define a that monitoring can be subjective and on a case-by-case can be very basic or detailed and can let you choose a specific tool or strategy. There is no one-size-fits-all. This week I needed to implement a custom check to monitor the network load/usage on any Windows OS and instead of looking for a third-party tool and deploying maybe another agent on servers I wrote a Powershell script to perform this activity.
Continue reading “Monitoring the Network Load with Powershell”
Last December NIST announced this vulnerability CVE-2019-19781 and soon after that Citrix published this page CVE-2019-19781 – Vulnerability in Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance and released a verification tool supporting clients for finding out if they were vulnerable or not: CVE-2019-19781 – Verification Tool
A verification tool is addressed to an IT specialist who works these solutions and needs to quickly assess if the software or appliance is affected by this vulnerability. Continue reading “Comparing Citrix CVE Verification Tool to a one-liner bash script”