tag:blogger.com,1999:blog-62516501799632027822024-02-20T19:59:33.616-08:00Naked PowerShell#PowerShell scripting, #PSDSC, and #Azure tips that a scripter might find useful. Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.comBlogger201125tag:blogger.com,1999:blog-6251650179963202782.post-19261869245789685802019-06-16T20:47:00.000-07:002019-06-19T14:38:41.097-07:00dbatools 1.0 and how to make yourself a SuperHero<h3>
dbatools 1.0</h3>
<a href="https://dbatools.io/" target="_blank">https://dbatools.io/</a><br />
<br />
Have you ever needed to migrate a SQL Server database from one version to another and dreaded all the T-SQL you will have to write and debug?<br />
<br />
What about migrating 30 SQL Server machines with 100's of database on each machine?<br />
<br />
<b>I feel your pain.</b><br />
<br />
How about using <b>Log Shipping</b> to migrate the data over time, then cut over with little downtime.<br />
<br />
<blockquote class="tr_bq">
# Also supports multiple destinations!<br />
# Oh, and has a ton of params, so use a PowerShell splat<br />
$params = @{<br />
Source = 'sql2008'<br />
Destination = 'sql2016', 'sql2017'<br />
Database = 'shipped'<br />
BackupNetworkPath= '\\backups\sql'<br />
PrimaryMonitorServer = 'sql2012'<br />
SecondaryMonitorServer = 'sql2012'<br />
BackupScheduleFrequencyType = 'Daily'<br />
BackupScheduleFrequencyInterval = 1<br />
CompressBackup = $true<br />
CopyScheduleFrequencyType = 'Daily'<br />
CopyScheduleFrequencyInterval = 1<br />
GenerateFullBackup = $true<br />
Force = $true<br />
}<br />
<br />
# pass the splat<br />
Invoke-DbaLogShipping @params<br />
<br />
# And now, failover to secondary<br />
Invoke-DbaLogShippingRecovery -SqlInstance localhost\sql2017 -Database shipped</blockquote>
<br />
<br />
dbatools is an <b>expansive </b>and extremely flexible <b>PowerShell </b>toolkit that leverages the scripting abilities within PowerShell to manipulate SQL Server objects.<br />
<br />
<b>Do NOT let the 1.0 fool you</b>. This code base has been building incrementally over the past few years, with many contributors writing code and creating Pester tests.<br />
<br />
There are modules for every <b>common operation that a SQL Server DBA</b> will have to perform.<br />
<br />
This toolkit contains over <b>500 modules</b> to help you get your work automated and projects completed.<br />
<br />
My favorite modules are the <b>discovery </b>modules, to help you find details about your SQL Server instance.<br />
<br />
<a href="https://docs.dbatools.io/" target="_blank">https://docs.dbatools.io/</a><br />
<br />
Get-dba* in the Search box will show you all the cool discovery modules. The naming convention of the module will give you a hint of what it will do.<br />
<br />
There is good documentation in the code and on the dbatools blog.<br />
<br />
<a href="https://dbatools.io/blog/" target="_blank">https://dbatools.io/blog/</a><br />
<br />
Support is the <b>backbone </b>of this tool, where you can chat or email directly to the developers, contributors, and power users that will give you tips, code samples, and help you debug any roadblock you may encounter.<br />
<br />
To get started, try this <b>Getting Started</b> web page.<br />
<br />
<a href="https://dbatools.io/getting-started/" target="_blank">https://dbatools.io/getting-started/</a><br />
<br />
On <b>Slack </b>you can connect with the <b>dbatools family</b> and just soak in all the great chats and posting that relate to the tool, PowerShell, and SQL Server. The Slack channel is <b>#dbatools</b> and it is a great place to hang out and meet really awesome DBA's and developers from <b>around the world</b>.<br />
<br />
<a href="https://dbatools.io/slack" target="_blank">https://dbatools.io/slack</a><br />
<br />
The code is <b>community driven</b>, open source, and free.<br />
<br />
What environments does dbatools support?<br />
<br />
SQL Server <b>2000 – 2017</b><br />
Express – Datacenter Edition<br />
Clustered and stand-alone instances<br />
Windows and SQL authentication<br />
Default and <b>named instances</b><br />
<b>Multiple </b>instances on one server<br />
<br />
We love new <b>contributions</b> of code, so please join up!<br />
<br />
If you want to file an issue with the code or have a suggestion, go to http://dbatools.io/issues<br />
<br />
Chrissy LeMaire (<a href="https://twitter.com/cl" target="_blank">t</a>) @cl is the ring leader of this awesome group, and she can always point you in the right direction for help, support or <b>encouragement</b>.<br />
<br />
<br />Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-16954617887570682592018-07-12T23:49:00.001-07:002018-07-12T23:49:14.198-07:00Script to generate all the exploration I normally do when I want to install a new PowerShell module<br />
<h2>
<span style="font-family: Calibri; font-size: 14.6667px;">Script to generate all the exploration I normally do when I want to install a new PowerShell module</span></h2>
<br />
<br />
<div style="font-family: Calibri; font-size: 11.0pt; margin: 0in;">
#PowerShell Script
to generate all the exploration I normally do when I want to install a new
PowerShell module, generates code in a new .PS1 for exploring each function in
the module including a formatted splat</div>
<div style="font-family: Calibri; font-size: 11.0pt; margin: 0in;">
I find this a
time saver for </div>
<div style="font-family: Calibri; font-size: 11.0pt; margin: 0in;">
<span style="font-size: 11pt;">me. </span></div>
<div style="font-family: Calibri; font-size: 11.0pt; margin: 0in;">
<br /></div>
<div style="font-family: Calibri; font-size: 11.0pt; margin: 0in;">
<a href="https://gist.github.com/NakedPowerShell/9711e57e18fa4c4cd0fed148497f900e" style="font-size: 11pt;">https://gist.github.com/NakedPowerShell/9711e57e18fa4c4cd0fed148497f900e</a><span style="font-size: 11pt;">></span></div>
<br /><br />
<br />Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-3904571930739184992018-07-05T04:36:00.001-07:002018-07-05T04:36:15.265-07:00New PowerShell Module: Get-SQLSatDL<div style="background-color: #1e1e1e; color: #d4d4d4; font-family: Consolas, "Courier New", monospace; font-size: 14px; line-height: 19px; white-space: pre;">
<div>
<span style="color: #569cd6; font-weight: bold;"># Blog Post for Get-SQLSatDL</span></div>
<br /><div>
Blog: Get-SQLSat</div>
<br /><div>
Get-SQLSatDL : Release Date - 07/05/2018 Version 1.0</div>
<br /><div>
In February 2018 I went to my third SQL Saturday in Redmond WA, held on the campus of Microsoft.</div>
<br /><div>
I had an awesome time and got to reconnect with many SQL friends and met plenty of new ones.</div>
<br /><div>
I always learn so much from the session speakers and I look forward to seeing what kind of content they post on the SQL Saturday website a few days later.</div>
<div>
A few days after the event, I went to the schedule web page:</div>
<br /><div>
<<span style="text-decoration-line: underline;">http://www.sqlsaturday.com/696/Sessions/Schedule.aspx</span>></div>
<br /><div>
And then proceeded to click on each download icon under the sessions that did have content.</div>
<br /><div>
I had to click the download button 27 times.</div>
<br /><div>
I could hear Jeffery Snover’s (Microsoft Fellow and Inventor of PowerShell) voice in my head, “don’t be a click next person, automate”.</div>
<br /><div>
I was also looking at a few other past events from around the country that I was interested in downloading.</div>
<br /><div>
That would be a lot of clicking download.</div>
<br /><div>
I created a PowerShell function to automate the downloading of all the content posted to the schedule page of the SQL Saturday event.</div>
<br /><div>
I call it Get-SQLSatDL that has only 3 parameters, the first is the local drive and path where you want the downloads to be stored, second is the SQL Saturday event # and then lastly if you want any zip files to be automatically expanded.</div>
<br /><div>
For example:</div>
<br /><div>
Get-SQLSatDL "K:\SQLSat_DL" 696 -Uz $true</div>
<br /><div>
<span style="color: #ce9178;">`Get-SQLSatDL [-Tpath] <String> [-Evt] <Int32> [-Uz] <bool> [<CommonParameters>]`</span></div>
<br /><div>
First parameter [TPath]: Local target path string where to download content to</div>
<div>
Second parameter[Evt]: SQL Saturday event # (an integer between 500-1000)</div>
<div>
Third parameter [Uz]: $true/$false to unzip zip files</div>
<br /><div>
You can find my code on GitHub:</div>
<br /><div>
<<span style="text-decoration-line: underline;">https://github.com/NakedPowerShell/SQLSatDL</span>></div>
<br /><div>
<span style="color: #569cd6; font-weight: bold;">## Installing SQLSatDL</span></div>
<br /><div>
Download the code from <<span style="text-decoration-line: underline;">https://github.com/NakedPowerShell/SQLSatDL</span>></div>
<div>
and put it in a local folder like C:\SQLSatDL</div>
<br /><div>
<span style="color: #569cd6; font-weight: bold;">## Run PowerShell command line or PowerShell ISE</span></div>
<br /><div>
From within PowerShell type this:</div>
<br /><div>
Import-Module C:\SQLSatDL\SQLSatDL.psm1</div>
<br /><div>
<span style="color: #ce9178;">`# To see a few examples for this module run this`</span></div>
<br /><div>
Get-Help Get-SQLSatDL -Examples</div>
<br /><div>
<span style="color: #569cd6; font-weight: bold;">## To download SQL Saturday Event #696 content Redmond WA</span></div>
<br /><div>
<span style="color: #ce9178;">`# Decide where you want to store the content downloaded like K:\SQLSat_DL`</span></div>
<br /><div>
Get-SQLSatDL "K:\SQLSat_DL" 696 -Uz $true</div>
<br /><div>
<span style="color: #569cd6; font-weight: bold;">## To download SQL Saturday Event #696 Redmond WA content with Verbose</span></div>
<br /><div>
Get-SQLSatDL "K:\SQLSat_DL" 696 -Uz $true -verbose</div>
<br /><div>
<span style="color: #ce9178;">`# To see all the comment based help`</span></div>
<br /><div>
Get-Help Get-SQLSatDL -All</div>
<br /><div>
If you have any questions, you can find me on Twitter @NakedPowerShell</div>
<div>
or send me an email at <span style="color: #ce9178;">`NakedPowerShell at gmail.com`</span></div>
<br /><div>
<span style="color: #569cd6; font-weight: bold;">## Future Ideas</span></div>
<br /><div>
Ideas for extending the output of this function:</div>
<br /><div>
- Merge all the CSV log_SQLSAT.txt files in each sub-folder into a SQL table for searching and sorting</div>
<div>
- Use a search tool to scan all the Schedule_[Event#].html files in each sub-folder for keywords / authors</div>
<br /><div>
07/05/2018 <<span style="text-decoration-line: underline;">https://nakedpowershell.blogspot.com/</span>></div>
</div>
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-16209382796746888162018-05-30T07:17:00.003-07:002018-05-30T07:17:57.829-07:00Robert Herjavec's Dos and Don'ts: From Cryptocurrency to #Cyber Hygiene<b>Robert Herjavec's Dos and Don'ts: From Cryptocurrency to #Cyber Hygiene</b> #SharkTank https://www.entrepreneur.com/article/310606
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-64118765528229544932018-05-30T06:32:00.002-07:002018-05-30T06:32:41.156-07:00Announcing the May 2018 Git Security Vulnerability<b>Announcing the May 2018 #Git #Security Vulnerability</b>
https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-20792384892546644322018-05-30T06:01:00.003-07:002018-05-30T06:01:38.253-07:00ICYMI - dbachecks – Dark Mode Historical Validation #PowerBi
<b>ICYMI - dbachecks – Dark Mode Historical Validation #PowerBi</b>
RT @sqldbawithbeard "ICYMI - dbachecks – Dark Mode Historical Validation #PowerBi - " http://ht.ly/Gbsr30kfAHL
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-64704375140570763892018-05-30T05:24:00.001-07:002018-05-30T05:24:16.079-07:00Create Function from Variable Value I<b>Create Function from Variable Value I #PowerShell</b>
http://tommymaynard.com/create-function-from-variable-value-i-2018/
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-52097981267750881082018-05-30T04:53:00.000-07:002018-05-30T04:53:08.108-07:00YouTube content to Twitter posts with PowerShell & Time Triggered Azure Function<b>YouTube content to Twitter posts with PowerShell & Time Triggered Azure Function</b>
https://ridicurious.com/2018/05/29/youtube-to-twitter-posts-using-azure-functions/
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-24211130389637464952018-05-30T04:46:00.002-07:002018-05-30T04:46:43.430-07:00Batch file to create backups of files to remote network paths using date and time stamps<b>Robocopy example</b>
rem batch file to create backups of files to remote network paths using date and time stamps
FOR /f "tokens=1-5 delims=/- " %%a in ('date /t') DO SET XDate=%%d%%b%%c
FOR /f "tokens=1-5 delims=/- " %%a in ('date /t') DO SET XSDate=%%d%%b
FOR /f "tokens=1-2 delims=: " %%a in ('time /t') DO SET XTime=%%a%%b
Echo "%XSDate%\%XDate%\%XDate%_%XTime%"
set PW=Somepass1@@
set USR=Install
rem set SOUPATH=Internal
set SOUPATH=Dev_Local
rem set LAB=DSCLIVE
set LAB=DSCLAB
set ROLE=DC1
net use M: \\%Lab%%Role%\c$\%SOUPATH% %PW% /user:%usr%
Robocopy C:\Dev_Local M:\Backup\Code_Backup\%Lab%_%XDate%_%XTime%\%Lab%%Role% *.* /S /Z /XF *.EXE *.MSI *.ISO
net use m: /delete
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-26835392320831716572018-05-30T04:32:00.000-07:002018-05-30T04:32:30.255-07:00How to Create Encrypted Zip or 7z Archives on Any Operating System
<b>How to Create Encrypted Zip or 7z Archives on Any Operating System</b>
https://www.howtogeek.com/203590/how-to-create-secure-encrypted-zip-or-7z-archives-on-any-operating-system/
Dustyhttp://www.blogger.com/profile/10995042217737035310noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-52295001469348884972016-10-31T01:08:00.000-07:002016-10-31T01:08:08.934-07:00Tweaks to Write-LogEntry<div class="tr_bq">
Tweaks to Write-LogEntry that was posted to Twitter by <b>Trevor Sullivan @pcgeek86</b></div>
<b><br /></b>
<b>His original PowerShell code:</b><br />
<blockquote class="tr_bq">
function Write-LogEntry {<br /> [CmdletBinding()]<br /> param (<br /> [string] $Message,<br /> [string] $Severity<br />)<br />$CallStack = Get-PSCallStack<br />$LogMessage = '{0} {1}: {2}: {3}' -f (Get-Date -Format u), $CallStack[1].FunctionName, $Severity, $Message<br />Add-Content -Path c:\temp\logfile.log -Value $LogMessage<br />}<br />function LogTester {<br /> [CmdletBinding()]<br /> param (<br /> )<br /> Write-LogEntry -Message Testing1 -Severity Information<br /> Write-LogEntry -Message Testing2 -Severity Warning<br /> Write-LogEntry -Message Testing3 -Severity Error<br />}<br />LogTester</blockquote>
<b>My tweaks to the original PowerShell code</b>:<br />
<blockquote>
Function Write-LogEntry {<br /> [CmdletBinding()]<br /> param (<br /> [string] $Message,<br /> [string] $Severity,<br /> [string] $Step<br />)<br />$CallStack = Get-PSCallStack<br />$LogMessage = '{0},{1},{2},{3},{4},{5}' -f $env:computername,((get-date).ToUniversalTime()), $CallStack[1].FunctionName, $Severity, $Message, $Step<br />Add-Content -Path c:\temp\logfile.csv -Value $LogMessage<br />}<br />function LogTester {<br /> [CmdletBinding()]<br /> param (<br /> )<br /> Write-LogEntry -Message Testing1 -Severity Information -Step 10<br /> Write-LogEntry -Message Testing2 -Severity Warning -Step 20<br /> Write-LogEntry -Message Testing3 -Severity Error -Step 55<br />}<br />LogTester</blockquote>
I did the following:<br />
<br />
Changed the format of the date to UTC that was readable by Excel<br />
Changed the output to a .CSV format and adding commas to the -f<br />
Added the computername as the first entry in the text log<br />
Added a parameter Step to the log<br />
<br />
When I am consuming logs, lots of logs, I like tools like Excel to slice, dice, sort, and filter the data for me in a visual way.<br />
<br />
When I write logging functions, I like to know what step tripped the log entry. So in my applications I set $Step to a number that is incremental from the last step I used this variable.<br />
<br />
For example I set my step to 10 for the variable initially at the beginning of the application. Then at the start of each major piece of logic where I could trip the logging I increment the step by 10.<br />
<br />
The steps then help me narrow down where in code the logging got tripped.<br />
<br />
A future version of this could be to load the log into a SQL Table and also account for multiple applications writing to the same log.<br />
<br />
Thank Trevor !!<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-19278412511167667532016-04-01T03:12:00.001-07:002016-04-01T03:18:13.661-07:00Scaling DSC - Desired State Configuration in PowerShell<br />
<h2>
How to Scale DSC - Desired State Configuration in PowerShell</h2>
<h3>
</h3>
<h3>
This series of posts will cover my ideas of how to scale DSC beyond just a few servers or VM's.</h3>
<div>
<br /></div>
DSC is a fantastic tool for deploying consistent servers / VM's<br />
<br />
Make the servers cattle, not pets.<br />
<br />
But when you have to scale this DevOps process to 10's, 100's, or 1000's of servers, writing code for each server and configuration does not scale.<br />
<br />
<b>Data Driven</b><br />
<br />
PowerShell can help generate the DSC code necessary to scale and <i>make DSC data driven</i>.<br />
<br />
<b>Why Data Driven?</b><br />
<b><br /></b>
A common deployment scenario is you want to create a small scale SharePoint farm of one SQL Server, one front end web server, and one App server.<br />
<br />
The server for SQL has to be created and configured first, then web and App.<br />
<br />
Each server type has different requirement for creation and configuration.<br />
<br />
Using DSC manually, you have to remember the order of deployment and many attributes for each server type.<br />
<br />
DSCDB can treat this farm as a collection (example Collection_SPsmall). Multiple collections can be created or cloned into a collection library.<br />
<br />
It can know in what order the servers have to be deployed, and almost all the attributes that need to be passed to DSC to create MOFs including credentials.<br />
<br />
In order to deploy using DSCDB, you only need the name of the server set (example SPsmall_1) and optionally a few additional parameters. The server set uses the collection (Collection_SPsmall) to know the farm configuration.<br />
<br />
The deployment can then run either sequentially or in parallel.<br />
<br />
<h4>
The Scaling DSC Series</h4>
<div>
<br /></div>
<b>#1 Creating a DSCDB</b><br />
<b><br /></b>
<br />
A DSCDB is a simple set of tables in a database that is used to capture attributes about each server that is needed for deployment.<br />
<br />
<b>#2 Populating a DSCDB</b><br />
<br />
There are four ways to populate the database:<br />
<br />
<ul>
<li>Importing an Excel file of server names and attributes</li>
<li>Importing a text file of server names</li>
<li>Importing server names from AD - Active Directory</li>
<li>Manually update the SQL tables</li>
</ul>
<br />
<b>#3 Deploying using DSCDB</b><br />
<br />
This post will talk about how to deploy servers in a automated fashion using the DSCDB.<br />
<br />
<b>#4 Future Features for DSCDB</b><br />
<br />
This post will discuss potential features for future releases.<br />
<br />
<b>Conclusion</b><br />
<br />
This database is not a CMDB but a database specifically designed for deployment using DSC.<br />
<br />
All the source code and documentation for this series will be in Github.<br />
<br />
<br />Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-70565154972887517402015-08-19T18:16:00.001-07:002015-08-19T18:16:42.814-07:00Windows Server 2016 Technical Preview 3 released with Windows Container support http://t.co/Pl15JJRtbd #container #winserv<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en">Windows Server 2016 Technical Preview 3 released with Windows Container support <a href="http://t.co/Pl15JJRtbd">http://t.co/Pl15JJRtbd</a> <a href="https://twitter.com/hashtag/container?src=hash">#container</a> <a href="https://twitter.com/hashtag/winserv?src=hash">#winserv</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/634166730122731520">August 20, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-24596745693469220052015-08-17T08:54:00.001-07:002015-08-17T08:54:50.671-07:00How BitTorrent could let lone DDoS attackers bring down big sites http://t.co/yCMMDIDWJB #infosec #security<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en">How BitTorrent could let lone DDoS attackers bring down big sites <a href="http://t.co/yCMMDIDWJB">http://t.co/yCMMDIDWJB</a> <a href="https://twitter.com/hashtag/infosec?src=hash">#infosec</a> <a href="https://twitter.com/hashtag/security?src=hash">#security</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/633303685389492229">August 17, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-57584868300908800872015-08-07T18:36:00.001-07:002015-08-07T18:36:09.776-07:00TFS Upgrade - Short Lead Checklist http://t.co/7E2UGeptfE #TFS #TFS2015<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en">TFS Upgrade - Short Lead Checklist <a href="http://t.co/7E2UGeptfE">http://t.co/7E2UGeptfE</a> <a href="https://twitter.com/hashtag/TFS?src=hash">#TFS</a> <a href="https://twitter.com/hashtag/TFS2015?src=hash">#TFS2015</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/629827011008139264">August 8, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-56473561449841831452015-07-31T12:17:00.001-07:002015-07-31T12:17:03.037-07:00#PowerShell #SQL Determine who deleted SQL Server database records by querying the transaction log with PowerShell http://t.co/8XwA9G5PBD<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/PowerShell?src=hash">#PowerShell</a> <a href="https://twitter.com/hashtag/SQL?src=hash">#SQL</a> Determine who deleted SQL Server database records by querying the transaction log with PowerShell <a href="http://t.co/8XwA9G5PBD">http://t.co/8XwA9G5PBD</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/627189553896550400">July 31, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-54662615783951652562015-07-31T09:16:00.001-07:002015-07-31T09:16:37.356-07:00ARM template for VM on #Azure that installs #VSO agent #PowerShell #Json nzthiago/azure-quickstart-templates http://t.co/10uw8W6XOS<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en">ARM template for VM on <a href="https://twitter.com/hashtag/Azure?src=hash">#Azure</a> that installs <a href="https://twitter.com/hashtag/VSO?src=hash">#VSO</a> agent <a href="https://twitter.com/hashtag/PowerShell?src=hash">#PowerShell</a> <a href="https://twitter.com/hashtag/Json?src=hash">#Json</a> nzthiago/azure-quickstart-templates <a href="http://t.co/10uw8W6XOS">http://t.co/10uw8W6XOS</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/627149313467150337">July 31, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-84963706144440336822015-07-29T08:20:00.001-07:002015-07-29T08:20:04.591-07:00#Hack #flaw #infosec Federal Reserve Bank of St. Louis Confirms a Hacker Attack http://t.co/jwcCBJkam2<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/Hack?src=hash">#Hack</a> <a href="https://twitter.com/hashtag/flaw?src=hash">#flaw</a> <a href="https://twitter.com/hashtag/infosec?src=hash">#infosec</a> Federal Reserve Bank of St. Louis Confirms a Hacker Attack <a href="http://t.co/jwcCBJkam2">http://t.co/jwcCBJkam2</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/626409515043434496">July 29, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-28027434017946665632015-07-28T14:55:00.001-07:002015-07-28T14:55:02.795-07:00#OpenSSH #flaw #infosec #SSH OpenSSH Vulnerability Exposes Servers to Brute Force Attacks | http://t.co/YsxpNinz78 http://t.co/ViiSjs6jly<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/OpenSSH?src=hash">#OpenSSH</a> <a href="https://twitter.com/hashtag/flaw?src=hash">#flaw</a> <a href="https://twitter.com/hashtag/infosec?src=hash">#infosec</a> <a href="https://twitter.com/hashtag/SSH?src=hash">#SSH</a> OpenSSH Vulnerability Exposes Servers to Brute Force Attacks | <a href="http://t.co/YsxpNinz78">http://t.co/YsxpNinz78</a> <a href="http://t.co/ViiSjs6jly">http://t.co/ViiSjs6jly</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/626147694571077632">July 28, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-31905819795562272002015-07-28T13:54:00.001-07:002015-07-28T13:54:42.187-07:00#TFBuild #TFS #ALM Enabling Verbose Output in Team Foundation Build Logs | Team Build | Software Development, 42,... http://t.co/yuYmjkHwbD<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/TFBuild?src=hash">#TFBuild</a> <a href="https://twitter.com/hashtag/TFS?src=hash">#TFS</a> <a href="https://twitter.com/hashtag/ALM?src=hash">#ALM</a> Enabling Verbose Output in Team Foundation Build Logs | Team Build | Software Development, 42,... <a href="http://t.co/yuYmjkHwbD">http://t.co/yuYmjkHwbD</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/626132547991392256">July 28, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-43156724334734931872015-07-28T12:09:00.001-07:002015-07-28T12:09:05.505-07:00#PHP #flaw #security Many High-Profile Firms Using Vulnerable PHP File Manager: Researcher | http://t.co/YsxpNinz78 http://t.co/0Q0XxKlbVg<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/PHP?src=hash">#PHP</a> <a href="https://twitter.com/hashtag/flaw?src=hash">#flaw</a> <a href="https://twitter.com/hashtag/security?src=hash">#security</a> Many High-Profile Firms Using Vulnerable PHP File Manager: Researcher | <a href="http://t.co/YsxpNinz78">http://t.co/YsxpNinz78</a> <a href="http://t.co/0Q0XxKlbVg">http://t.co/0Q0XxKlbVg</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/626106160949673984">July 28, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-31129425944331521172015-07-28T08:21:00.001-07:002015-07-28T08:21:06.727-07:00#infosec #flaw #MongoDB Configuration Issue Exposes 30,000 MongoDB Instances: Researcher | http://t.co/YsxpNinz78 http://t.co/bDwveTTuuq<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/infosec?src=hash">#infosec</a> <a href="https://twitter.com/hashtag/flaw?src=hash">#flaw</a> <a href="https://twitter.com/hashtag/MongoDB?src=hash">#MongoDB</a> Configuration Issue Exposes 30,000 MongoDB Instances: Researcher | <a href="http://t.co/YsxpNinz78">http://t.co/YsxpNinz78</a> <a href="http://t.co/bDwveTTuuq">http://t.co/bDwveTTuuq</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/626047158802845696">July 28, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-18726587164539668622015-07-27T09:19:00.001-07:002015-07-27T09:19:11.579-07:00#PowerBI #BI Accelerating Power BI Desktop - PowerBI - Site Home - MSDN Blogs http://t.co/v1lAw9NzHT<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/PowerBI?src=hash">#PowerBI</a> <a href="https://twitter.com/hashtag/BI?src=hash">#BI</a> Accelerating Power BI Desktop - PowerBI - Site Home - MSDN Blogs <a href="http://t.co/v1lAw9NzHT">http://t.co/v1lAw9NzHT</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/625698488253304833">July 27, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-65543119758192938602015-07-24T17:52:00.001-07:002015-07-24T17:52:58.334-07:00#VS2015 Code Metrics PowerTool for Visual Studio 2015 Available on Microsoft Download Center - Microsoft... http://t.co/uzMsj0oRFs<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/VS2015?src=hash">#VS2015</a> Code Metrics PowerTool for Visual Studio 2015 Available on Microsoft Download Center - Microsoft... <a href="http://t.co/uzMsj0oRFs">http://t.co/uzMsj0oRFs</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/624742165038649344">July 25, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0tag:blogger.com,1999:blog-6251650179963202782.post-75840378816755594102015-07-24T15:23:00.001-07:002015-07-24T15:23:31.270-07:00#PowerBI #TFS Reporting on Work Items with Power BI - Microsoft Application Lifecycle Management - Site Home -... http://t.co/v8Rp35e2Uv<blockquote class="twitter-tweet">
<p lang="en" dir="ltr" xml:lang="en"><a href="https://twitter.com/hashtag/PowerBI?src=hash">#PowerBI</a> <a href="https://twitter.com/hashtag/TFS?src=hash">#TFS</a> Reporting on Work Items with Power BI - Microsoft Application Lifecycle Management - Site Home -... <a href="http://t.co/v8Rp35e2Uv">http://t.co/v8Rp35e2Uv</a></p>
— Dusty R (@nakedpowershell) <a href="https://twitter.com/nakedpowershell/status/624703251183718400">July 24, 2015</a></blockquote>
<script async="" src="//platform.twitter.com/widgets.js" charset="utf-8" type="text/javascript">
</script><br />
from Twitter https://twitter.com/nakedpowershell<br />
Anonymoushttp://www.blogger.com/profile/06143809841412463912noreply@blogger.com0