Join Red Hat and Veeam experts to explore how Red Hat OpenShift Service on AWS (ROSA) streamlines Kubernetes operations in the cloud, and how Veeam Kasten delivers deeply integrated data protection, ...
Secure your organization for the AI era. Join our expert-led virtual event to learn how Zero Trust must evolve to protect both human and AI identities at scale. Register now to discover practical ...
Join Stuart Hudson, Global IT Infrastructure Senior Manager at Sun Chemical, and Edwin Weijdema, EMEA Field CTO from Veeam as they walk through Sun Chemical’s journey from relying on the Microsoft 365 ...
Using Windows Management Instrumentation makes it easy to pull information about the drives on your system or remote systems. Here's how. Managing drives is a very common thing that a system ...
Native support for Secure Copy Protocol (SCP) isn't in PowerShell, but that doesn't mean it's not capable. By using a free community module called Posh-SSH, we can transfer files via SCP just as ...
Hackers can use tools like BloodHound to visualize the shortest path to owning your domain. But that doesn't mean you can't use it to find and protect your organization's weak spots. Here's how.
Unfortunately, IT professionals have to deal with sensitive information all the time. That information could be in the form of passwords, proprietary company information or anything that you'd rather ...
PowerShell 3 deploys a new type adapter that will have you seeing hash table output in the order you want them to appear. In PowerShell 2, a common technique for creating a custom object is to create ...
There's two ways to accomplish this task: the wrong way and the right way. Here's how to do both. If there is one thing an administrator finds themselves doing, it is probably determining what ...
I'm sure we have all been there before in our career as a Windows administrator: One day your Web site is handling requests through https and the next day no one can access the site. What could have ...
One of the things that PowerShell doesn't have is a way to view local accounts on local and remote systems. Fortunately for us, we have a couple of options at our disposal that can get around this to ...
If you have been using PowerShell for a while, or even just picked it up yesterday, you have no doubt used Where-Object and ForEach-Object at some point in your scripting experience. The beauty of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results