Columns


SQL Server's Data Profiling Task Gets the Right Data the First Time

Get some real useful information from SQL Server Integration Services' Data Profiling Task feature.

Are We Stepping Closer to an Internet Kill Switch?

Unrest in Libya reminds us once again about the Internet Kill Switch. Plus: Microsoft outlines plan to apply public health policies to IT security.

Fixing SQL Server 2008 Database Orphans

A common problem when restoring databases is making orphans of users. Here's a quick solution.

Run, Virus, Run

Autorun disabled on USB and connected devices via update. Plus: IE9 keeps eyes on strangers; Symantec looks at security in Q4.

Hackers Know It's All In the Timing

Patch Tuesday reminds us once again that hackers will always be a step ahead. Plus: Outlook issue to be fixed out of band; Intel's intentions with McAfee buy seem questionable.

Aren't You Special!

When two worlds collide -- that is, the VBscript and PowerShell worlds -- it can be a beautiful thing. Here's what I mean.

Check Out the -View!

The Get-Member cmdlet's -View parameter gives you -- you guessed it -- a wider perspective of the cmdlet's members.

Messing With Web Components

Hackers go after your browsing sessions. Plus: Conficker worm is gone, but not forgotten; unrest in Egypt worries Microsoft, Cisco.

Browsers, Browsers, Browsers!

IE still vulnerable, but hackers are heat-seeking on other browser targets. Plus: Browser makers making "no tracking" a feature priority; Wordpress plug-in threatened by SQL injection attack.

Microsoft Security Goes on Offensive

Company adds new tools to SDL for developers. Plus: Windows Live Messenger update is mandatory; researchers says third-party vulnerabilities, attacks to outpace Windows attacks.

Where Shell We Begin?

Customize graphical elements of the user's desktop via the Shell.Application COM object. Yes, it can be done through PowerShell.

Be Selective with Select-Object Cmdlet

The Select-Object cmdlet lets you get what you always want, at least as parameters are concerned.

A 'Hurry Up and Wait' Security Strategy

Security experts have yet to get the edge on hackers. Plus: Unpatched IE bugs likely to be fixed post-Patch Tuesday; smartphones all the rage -- with hackers.

Security Flaws: Old News in a New Year

It's like 2010 all over again with security. Plus: Microsoft admonishes Google for its security policies; fake updates in your inbox.

Cool ISE

At the heart of this awesome no-frills editor is the $psise object, handy for configuring the ISE how you want it.

Microsoft's Holiday Present Includes 17 Patches

Plus: Hackers compromise Gawker media sites; Google and Redmond ad malware investigated; Symantec takes a look at the problems you'll be facing in 2011.

How Do You Measure Up?

Measure-Object cmdlet has some interesting properties, but it's up to us to figure out how to use them creatively.

  • Code Download

    File Type: .x-zip-compressed File Size: 920 Bytes

Failure is Not an Option with JobStateInfo Property

The JobStateInfo property can expose the failure of background processes.

  • Code Download

    File Type: .x-zip-compressed File Size: 920 Bytes

Still No Fix from Microsoft for Growing Number of IE Exploits

Plus: An eighth of malware attacks come from USB devices, scareware instances are growing.

Invoke-Sesame

Use the Invoke-Item cmdlet to open files and their application types -- much like Windows does when double-clicking a file.

  • Code Download

    File Type: .x-zip-compressed File Size: 920 Bytes

Most   Popular

Upcoming Training Events