Alan's Blog

"Yeah. I wrote a script that will do that."

Menu
  • About My Blog
Menu

Author: Alan

See https://www.akaplan.com/about/

Fixing SCCM 1603 Errors

Posted on September 3, 2010May 15, 2022 by Alan

I was recently forwarded a link from Richard Balsley’s blog about 1603 Errors in SCCM, see http://richardbalsley.com/sccm-software-distribution-fails-with-error-code-1603-in-execmgr-log.  He characterizes the problem like this: “When a local administrator was logged on during runtime, the application would install fine. It would also install fine if no one was logged on. However if a user was logged on…

Read more

Not encrypted? If I can touch it, I own it

Posted on August 29, 2010August 29, 2010 by Alan

I spent part of the morning gaining access to a Windows 2008 server where the system owner did not have the passwords for the local administrator or a domain admin account.  It is a little more complicated than before, but is still not difficult to change first the local administrator password, then the password of…

Read more

Sharpie Liquid Pencil – not as Permanent as you may think

Posted on August 19, 2010August 19, 2010 by Alan

[W]e are being told that while the Sharpie Liquid Pencil meets the international standard for “permanency,” it may still [be] almost completely erased…. Sharpie Liquid Pencil, the aftermath: it’s ‘permanent,’ not permanent — Engadget.

Read more

The Bible as Science?

Posted on August 18, 2010August 18, 2010 by Alan

I am listening to book on tape about how Galileo Galilei (1564-1642) was persecuted by the Catholic church for defending Copernicus and the idea that the earth revolves around the sun (heliocentrism).  The church relied on Biblical references to Psalm 93:1, Psalm 96:10, and 1 Chronicles 16:30, which include text stating that “the world is…

Read more

Fighting today’s malware – Computerworld

Posted on August 6, 2010March 9, 2015 by Alan

If malware were biological, the world would be in the grip of the worst pandemic in history. In 2009, more than 25 million different unique malware programs were identified, more than all the malware programs ever created in all previous years …  Fighting today’s malware – Computerworld.

Read more

Google has two times more malware than Bing, Yahoo! and Twitter combined

Posted on July 29, 2010July 2, 2011 by Alan

Google has two times more malware than Bing, Yahoo! and Twitter combined. So why am I so reluctant to switch?

Read more

Sophos Windows Shortcut Exploit Protection Tool

Posted on July 29, 2010March 15, 2020 by Alan

Until Microsoft patches the problem (http://www.microsoft.com/technet/security/advisory/2286198.mspx), your current anti-virus should protect you from malicious shortcuts.  If you want to have additional protection, try the Sophos Windows Shortcut Exploit Protection Tool.

Read more

Rob van der Woude’s WMI Code Generator, Version 5.00

Posted on July 28, 2010July 28, 2010 by Alan

Cool tool! Rob van der Woude’s WMI Code Generator, Version 5.00.

Read more

JSI Tip 9942. How can I remove unknown users or groups from NTFS permission?

Posted on July 27, 2010June 16, 2019 by Alan

JSI Tip 9942. How can I remove unknown users or groups from NTFS permission? has a nice batch file to remove broken SIDS from a server using Subinacl.  Tags: SUBINACL, SIDS

Read more

“Millions” Of Home Routers Vulnerable To Web Hack

Posted on July 16, 2010March 9, 2015 by Alan

The Firewall Blog on Forbes has an interview with Craig Heffner about DNS rebinding and home internet routers. My recommendations:  keep your firmware current.  Disable web administration of your internet router.  And, most importantly, have a complex password for your internet router.

Read more
  • Previous
  • 1
  • …
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • …
  • 42
  • Next

Search

Please Note

All the scripts are saved as .txt files. Newer files have a “View Script” button which will let you save or open a script in notepad. For earlier posts, the easiest way to download with IE is to right click on the link and use “Save Target As”. Rename file from Name_ext.txt to Name.ext.

To see a full post after searching, please click on the title.

PowerShell Scripts were written with version 3 or later.

https connections are supported.

All new users accounts must be approved, as are comments. Please be patient.  If you find a post error or a script which doesn’t work as expected, I appreciate being notified.  My email is my first name at the domain name, and you are welcome to contact me that way.

Tags

1E ACLS Active Directory ActiveDirectory ADSI Advanced Functions Audit Change Administrator Password COMObject Computer Groups DateTime Desktop DNS Excel FileScriptingObject Forms General GPO GPS Group Policy Hacks ISE Lockout logons NAV740 Nessus OU OU permissions Outlook Pick Folder Power PowerShell Powershell Scriptlets RDP SCCM schedule reboot Scripting Security Shell.Application user information VBA Windows Update WMI WordPress WPF

Categories

akaplan.com

  • Back to Home Page

Archives

Scripting Sites

  • A Big Pile of Small Things
  • Adam, the Automator
  • Art of the DBA
  • Ashley McGlone
  • Boe Prox
  • Carlo Mancini
  • DexterPOSH
  • Doug Finke
  • Jaap Brasser's Blog
  • JeffOps The Scripting Dutchman
  • Jonathan Medd's Blog
  • Keith Hill's Blog
  • LazyWinAdmin
  • Nana Lakshmanan
  • PowerShell Magazine
  • PowerShell Team Blog
  • PowerShell.org
  • PwrShell.net
  • Richard Siddaway's Blog
  • Ryan Yates' Blog
  • Skatterbrainz
  • The Lonely Administrator

SQL Site

  • Art of the DBA

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
©2025 Alan's Blog | Theme by SuperbThemes

Terms and Conditions - Privacy Policy