PowerShell 7 comes with a built-in parameter to run different tasks in parallel. Here is a simple example: 1..100 | ForEach-Object -ThrottleLimit 20...
Powershell
Categories
- Free tools
- SQL Admin Toolset
- SQL Compliance Manager
- SQL Defrag Manager
- SQL Diagnostic Manager for MySQL
- SQL Diagnostic Manager for SQL Server
- SQL Diagnostic Manager Pro
- SQL Doctor
- SQL Enterprise Job Manager
- SQL Inventory Manager
- SQL Query Tuner for SQL Server
- SQL Safe Backup
- SQL Secure
- SQL Workload Analysis for SQL Server
- Uptime Infrastructure Monitor Formerly Uptime
-RepeatHeader Parameter
Here is a somewhat unknown parameter: -RepeatHeader! What does it do? Let’s assume you want to see results page by page (which only works in a...
PowerShell 7 Ternary Operator
With PowerShell 7, the language gets a new operator that created a lot of debate. Basically, you don’t have to use it, but users with a developer...
Get-ComputerInfo vs. systeminfo.exe (Part 2)
In PowerShell 5, a new cmdlet called Get-ComputerInfo was introduced which does what systeminfo.exe did in the past, yet Get-ComputerInfo is...
How to plan capacity, monitor Always On availability groups, report, and integrate with PowerShell with SQL Diagnostic Manager for SQL Server
SQL Diagnostic Manager for SQL Server SQL Diagnostic Manager for SQL Server helps database administrators to find and fix SQL Server performance...
Get-ComputerInfo vs. systeminfo.exe (Part 1)
For a long time, the command-line utility systeminfo.exe provides a wealth of information about a computer and can return object-oriented results...
Safely Using WMI in PowerShell (Part 4)
In this mini-series, we are looking at the differences between Get-WmiObject and Get-CimInstance. Future PowerShell versions no longer support...
Safely Using WMI in PowerShell (Part 3)
In this mini-series, we are looking at the differences between Get-WmiObject and Get-CimInstance. Future PowerShell versions no longer support...
Safely Using WMI in PowerShell (Part 2)
In this mini-series, we are looking at the differences between Get-WmiObject and Get-CimInstance. Future PowerShell versions no longer support...
Safely Using WMI in PowerShell (Part 1)
WMI (Windows Management Instrumentation) is part of any Windows operating system and a common and widely used way of getting information about a...
Converting Word Documents from .doc to .docx (Part 2)
Converting old Word documents to the new .docx format can be a lot of work, and in part 1 you learned the basic steps to automate conversion....
Converting Word Documents from .doc to .docx (Part 1)
Converting old Word documents to the new .docx format can be a lot of work. Thanks to PowerShell, you can automate the conversion: function...
Exploring PowerShell Modules
Most PowerShell commands live in modules, and by adding new modules, you can add new commands to your PowerShell environment. To find out whether a...
WMI Explorer
WMI (Windows Management Instrumentation) is a great information source: you can find almost any information about your computer somewhere. The hard...
Turning Objects into Hash Tables
Often, a single object needs to be examined, i.e. a process or an Active Directory user. When you display an object in a grid view window such as...
Object Magic (Part 4)
How about turning a single object into a hash table? This way, you can display one object property per line when you output the object in a grid...
Object Magic (Part 3)
Let’s assume you want to hide all object properties that have no value (are empty). Here is a simple approach: # get any object $object =...
Object Magic (Part 2)
Via the secret “PSObject” property, you can get detailed information about object members. For example, if you’d like to know...
Object Magic (Part 1)
In PowerShell, most data are represented as PSObjects, a specific object “wrapper” added by PowerShell. To get to this specific wrapper,...
Encrypting Text (Part 2)
This is the second part of our text encryption/decryption series. In the first part you learned how you can safely encrypt text on a machine. Now...
Encrypting Text (Part 1)
Let’s take a look at a safe way of encrypting text on a computer. The below Protect-Text function takes any text and encrypts it...
Creating NT4 Password Hashes
Internally, Active Directory stores all passwords as so-called NTLM Hashes. There are a number of security-analysis tools that can read and dump...
Simple PowerShell Chat
Here’s a fun PowerShell script that you can use to create a simple multi-channel chat room. All you need is a network share where everyone has...
Testing Password Strength
In previous tips, we already talked about services such as haveIbeenpwned.com. They harvest leaked passwords from previous hacker attacks so you can...
Converting SecureString to Text
It can be very useful to be able to convert an encrypted SecureString back to a plain text. This way, for example, you can use PowerShell’s...
Embedding Binaries (Pictures, DLLs) in PowerShell Scripts
If your script requires external binary resources such as picture files or DLLs, you can of course ship them together with your script. You could,...
Built-In SSH support in Windows 10
In October 2018, a Windows 10 update added built-in SSH support to Windows 10. From now on, Windows 10 ships with a command-line tool called “ssh”....
Playing with Latest PowerShell Core Version
In the previous tip we illustrated how you can download a PowerShell script which automatically downloads the latest version of PowerShell Core....
Installing PowerShell Core
As you probably know, Windows PowerShell (the one shipping in Windows) is done, and all efforts go into development of the new cross-platform...
Finding Public IP Address
Here is a one-liner that retrieves your current public IP address: PS> Invoke-RestMethod -Uri http://ipinfo.io ip : 87.153.224.209 hostname :...