Save
Saving
  • A
    Adam Gordon

    Waqkas,

    I hope all is well. The first issue you have to address here is that the status check and potential updates tot he registry are going to be occurring against remote machines. Using PowerShell to edit the remote registry of a machine is a bit more complicated than using it against a local machine.

    A good place to begin will be with the following article that walks you through the basics of remote connection and editing

    https://blogs.technet.microsoft.com/heyscriptingguy/2012/03/16/use-powershell-to-edit-the-registry-on-remote-computers/

    From there, the set-itemproperty cmdlet will be of use to you as noted in the example below:

    Example of a PowerShell registry change

    $RegKey ="HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"
    Set-ItemProperty -Path $RegKey -Name CachedLogonsCount -Value 45
    Get-ItemProperty -Path. -Name CachedLogonsCount

    The guidance that Mike and I have given you on PowerShell across many of your other posts will help you to figure out the rest from here, but remember that you want to evaluate IF something is a certain way or exists, THEN you want to do something depending on the outcome of that evaluation.... :)

    Good Luck,

    Cheers !!

    Adam

    posted in Microsoft read more
  • A
    Adam Gordon

    Shifty,

    Great !! If you need anything else, or have any other questions, just let us know.

    Cheers,

    Adam

    posted in Microsoft read more
  • A
    Adam Gordon

    Razmik,

    I hope all is well. Let's see what we can do for you:

    Cryptographic hash functions are implemented in information security to evaluate the integrity of data, authentication control and other security mechanisms. Cryptographic hash functions work by generating the checksum value of a data object. If the data is intentionally or unintentionally modified, the checksum value is changed. Thus, a data object’s integrity may be evaluated by comparing and verifying previous and current checksums.

    A cryptographic module is a hardware or software device or component that performs cryptographic operations securely within a physical or logical boundary, using a hardware, software or hybrid cryptographic engine contained within the boundary, and cryptographic keys that do not leave the boundary.

    Hope that helps to clarify... :)

    Cheers.

    Adam

    posted in Security read more
  • A
    Adam Gordon

    Razmik,

    I hope all is well. These terms are often used interchangeably by many people and vendors, which leads to confusion. In addition, many vendors describe/define these terms in specific ways based on functionality of the specific application function they are describing.

    As a result, it hard to be definitive, BUT, having said that, generally, both these terms usually refer to the same set of activities and same desired outcome, which is to take a system back to a prior moment in time, or state of existence. In the process, typically changes implemented since that known "good" point in time are removed as part of the process.

    The most common way to accomplish this when using a Windows O/S is to use the System Restore functionality. You can read up on it here:

    https://www.wondershare.com/recover-data/system-restore-delete-files.html

    System Restore can be used to recover Windows system files, programs, and registry settings installed on your system. It also make changes to batch files, scripts and all the other types of executable files created on your system. It do not affect your personal files and they remain the same. But system restore cannot help you to restore your personal files like e-mail, documents, or photos if they are lost.

    Now, if you choose to go a different route, and use the "Rollback" feature to remove a specific driver version that may have been corrupted, restoring back to a default or prior version, you are limiting the effect of the process to ONLY that driver, and it does not extend to any other files.

    If you want to remove a user, all data associated with them, as well as all software and changes installed, you would want to perform a factory reset of the O/S.

    I hope that helps.

    Cheers,

    Adam

    posted in Security read more
  • A
    Adam Gordon

    Ben,

    We seem to have a bit of a silly issue associated with this show. As we have done maintenance on our back end systems over time since the show was shot, the show notes have been moved between different systems. Somewhere during that process, we seem to have "lost" some of the show notes for certain episodes in this show.

    As a result, we do not actually have a way of reproducing them for this episode in the correct form that would match what was displayed on the screen during the episode.

    HOWEVER.... I have come up with a short term fix for you in the meantime. I need you to e-mail me directly so that I can send you the notes ( I have screenshotted the notes for you in a series of .png files that include all of the material).

    My direct e-mail is; adam@itpro.tv

    We will be shooting an updated version of this show towards the middle of 2019, but these notes will hold you over and be usable until then.

    Cheers,

    Adam

    posted in Security read more
  • A
    Adam Gordon

    Adam,

    Client reservations. :)

    Cheers,

    Adam

    posted in Microsoft read more
  • A
    Adam Gordon

    Adam,

    Just jumping in here quickly, you are correct on both. :)

    Cheers,

    Aadam

    posted in Microsoft read more
  • A
    Adam Gordon

    Adam,

    Nano has been removed from the exams across the board in favor a focus on containers. :)

    Good Luck !!!

    Cheers,

    Adam

    posted in Microsoft read more
  • A
    Adam Gordon

    Waqkas,

    I hope all is well. There are many, many ways to do this, but the simplest approach would be to use the copy-item powershell cmdlet.

    A simple script would look something like this, but to Mike's point/question, as we are not sure what you are copying, from where, and to what, you would need to modify as the situation requires:

    Copy-Item -Path <put path here> -Filter <*.jpg> -Destination <put path here> –Recurse

    You could use the Windows Task schedule to run as often as necessary.

    Check out the following for ideas and documentation on how to use copy-item:

    https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/copy-item?view=powershell-6

    Good Luck!!

    Cheers,

    Adam

    posted in Microsoft read more
  • A
    Adam Gordon

    Adam,

    Just a quick thought to add on to the great advice that Cherokee already gave you. Microsoft is notorious for asking about versioning items as part of their exam questions. As a result, in scenarios such as this, and many others, they are often asking to see if you have kept up with the changes or the version specific functionality/support.

    Tricky indeed. :)

    Cheers,

    Adam

    posted in Microsoft read more