Digging Through Registry Keys Recursively & Remotely with PowerShell

A common scenario that I encounter is needing to dig through registry hives on remote Windows workstations to programmatically collect information – using PowerShell. This poses an interesting challenge because sometimes there are an unknown quantity of elements contained within a registry key: the names & quantities of the values, and the names & quantities[…]

Accelerate Your PowerShell Code with Parallel Processes

Most systems in Windows-based environments can be queried and/or manipulated with PowerShell. It can be used to: report on workstations & servers across an organization; modify user accounts; dig through registry hives; and so much more. The extensive reach & capabilities of PowerShell is the reason why it is so often implemented to interface with[…]

It’s Time to Stop Using Passwords

Like email, passwords present a rare multitude of vulnerabilities and risks. As a means of verifying identity, and protecting resources, passwords are ineffective. They should have been replaced a long time ago, but instead great efforts have been made to keep them alive through a patchwork of defensive, partial solutions, thereby prolonging their role as[…]