Powershell the switch statement pt 2.

The string value specified in the switch statement’s script block has to exactly match a condition for that condition to equal true. Despite it being unnecessary for exact matches, this would be the same as using the -exact option in a switch statement. There are other options available for use such as -wildcard which lets you use wildcards, and -regex which uses regular expressions. lets look at an example;

Continue reading

Windows 7 to kill Linux; Linux to retaliate and firebomb Windows 7

It’s the same old story every year: Linux will finally dominate Windows, Windows will finally kill off that pesky open-source Linux. My dad’s better than your dad; my mashed potatoes can beat-up your mashed potatoes. The truth simply is it’s not going to pan out like that. Linux will still dominate the server world and Windows will still dominate the desktop world (and if you think vista’s failing is a sign of Microsoft’s slipping, I kindly ask you to remember Windows ME followed by the popularity of XP). So what’s new to the battle front? Well, honestly, it’s not really ‘new’ it’s just what people are talking about these days. ‘Netbooks’. And I highly doubt it will be some epic battle of Good Vs. Evil, either. Continue reading

PowerShell Tutorial the switch statement part 1.

PowerShell’s switch statement is similar to an if statement though easier to implement when you want to evaluate numerous conditions. You can use the switch statement to automate tasks such as retrieving System event log entries and performing actions based on the type of entry, and or moving and deleting files based on their file names.

Continue reading

helm 3 fixes

Helm is a powerful control panel for windows hosting – it can also be a total pain in the behind. Recently I tried removing a domain from our helm cluster (which consists of 4 machines) only to receive a generic ‘unable to remove domain please contact support or try again later’. Normally I’d just reboot the cluster and try again with great success; however, this did not work. There’s an almost ‘be all, end all’ fix for helm that I’ve known about for a while now, and I continually refine and add to it. After the jump I’ll share these words of wisdom and hopefully save you a few hair ripping frustrations. So without further delay, let’s lace up our best kicking boots and get ready to stomp out some fixes…

Continue reading

Free CD burner for windows

Maybe I’m wrong, but I don’t think I’m alone in the thinking that the cd burning software included with windows is one of the worst, if not plainly the worst cd composition software available to users today. It is severely lacking in features such as those that would allow you to copy a cd, design an audio cd with any normalization or track control, or even simply create an .iso image file. About the only thing it does do is allow you to burn some piece of data on to the physical media that we call cd’s or dvd’s. That’s why I’m happy to have found CDBurner XP.

Continue reading

Building Web Sites for Profit and Fun – Relying on Research

Researching to the internet savvy is like water to fish: we swim through and live in it. You can’t survive on the internet very long without learning the art of researching. And if you can’t figure that out, no article, course, or lecture will help. My purpose here is not to instruct on HOW to research, we know that well enough, but rather to RELY on the research obtained. In the world of web development, too often, egos become involved and overpower reason and research. A site that the target audience dislikes is worse than no site at all, despite what the designer feels about it. And so we look into the finer points of relying on our sought-out research.
Continue reading

FTC shuts down CyberSpy

We’ll tackle the news first – CyberSpy (don’t worry the link is dead) was ordered by the Federal Trade Commission so cease and desist the selling of its product, RemoteSpy. What’s RemoteSpy? RemoteSpy is a keylogger, which isn’t completely nasty (more on this argument after the jump) in and of itself, however; RemoteSpy could be disguised as something else and installed without the ‘targets’ real consent – thusly allowing someone to remotely monitor everything done on that machine (from credit card transactions, to banking info, to chat logs, to emails, to… well, everything) without you noticing a thing.

Continue reading