Sometimes, PowerShell modules ship as MSI packages. When they do, you never know what the installation logic does to your system. Unfortunately,...
database-tools
PSGet is Evil!
If you have played with the early releases of PowerShellGet and the PowerShell Gallery (www.powershellgallery.com), you may still have a module...
Converting 8.3 File Names
If you want to convert a short 8.3 filename to its long file name, try something like this: PS> (Get-Item...
Use PowerShell 5.0 Code Generation API
In PowerShell 5.0, a new .NET type was introduced that can help you escape text information so it can be displayed correctly: PS>...
Cleaning Week: Removing Traces (Recents)
Cleaning week comes to an end. As a last part, you may want to check the list of files you recently opened. This list is full of privacy sensitive...
Cleaning Week: Getting Rid of Downloads
Do you really need all the files you downloaded in Windows? It may pay off to look at the downloads, and delete downloaded files you no longer need....
Cleaning Week: Deleting CBS Log File
Windows maintains a log file named cbs.log in $env:windir\logs\cbs. It logs various pieces of information related to the Windows trusted installer,...
Cleaning Week: Deleting Log File Backups
In a previous tip you learned that there may be gigabytes worth of log file CAB files. Today, let’s try and have PowerShell do the cleanup....
Cleaning Week: Finding Fat Log File Backups
When you run a Windows box for a couple of months or even years, a lot of disk space can be wasted by backed up log files that are not needed. So if...
Cleaning Week: Deleting TEMP Files
In a previous tip you learned how to check for left-over files in both your own temp folder and the one maintained by Windows. Today, let’s...
Cleaning Week: Find Data Garbage
This week is cleaning week, and we’ll show you tactics how you can potentially retrieve gigabytes of disk space, especially with machines that...
Finding Paths to Special Locations
If you’d like to access any of the following special locations, then we have good news for you: PS C:\>...
ER/Studio Business Architect – Conceptual and BPMN made Easy!
Howdy! As some of you are aware with the Enterprise Team Edition, comes bundled, Business Architect and Software Architect. Business Architect is...
Why use a Date Dimension Table in a Data Warehouse
In the Data Mart, or the Data Warehouse world, there is a date dimension table in all schemas if you are using the Kimball Dimensional Modeling...
Copy Over PowerShell Remoting Sessions
You can use PowerShell remoting to transfer files across a network – this is new in PowerShell 5.0. This can be useful in closed environments...
One-Liner Random Password Generator
Check out this simple way of creating temporary passwords: -join...
Harvesting Reboot Time from EventLog
In the previous tip we illustrated how you can ask WMI for the last reboot time of a machine. A more robust way is to query the Windows event logs....
Last Bootup Time with Get-CimInstance
These days, computers hibernate or go into standby but do not really reboot that often anymore. To find out when your computer rebooted the last...
Get Started with Execution Plans in our June #SQLChat!
Our next #SQLChat will be held Wednesday, June 8 at 12 PM Noon CT with IDERA ACE, Thomas LeBlanc (@TheSmilingDBA). We will be discussing how to get...
Extracting Text Information
Tracert.exe tells you the hops your data packages need to take to get to a given host. Here is an example: PS C:\> tracert www.microsoft.com...
Bulk-Convert to String
Sometimes, commands and methods do not return exactly what you are after. If you, for example, wanted to get the assigned IP addresses for a...
Create Local Admin Accounts
There is no module available for all PowerShell versions that allows to administer local user accounts. Here is a chunk of sample code that...
Loops and Arrays (and some surprises)
Frequently, loops are used to retrieve (or generate) data, then save it to a variable. There can be tremendous performance differences though. To...
Finding Top 3 (of anything)
Ever wanted to know who are the three worst sources for errors in your System event log? Here is a simple approach that yields the source names with...