Post #200! a.k.a A Brave New Blog

  200! It only seems like yesterday that I was celebrating 100 posts. Fugit inreparabile tempus! When I started blogging as PoSh Chap, I set myself the goal of producing a blog post each week. At times, it has been a tough target: there is such a thing as writer’s block and also such things…

0

One-Liner: Get Signing Algorithm for Personal Store Certificates

A digital signature is created when a file is run through a hashing algorithm and the resultant hash (digest / fingerprint) is then signed by a private key. If an application wants to check the integrity of a file, it can perform the following steps: Decrypt the signed hash with the corresponding public key Put…

0

AD Groups with Low Member Count

When I was a Systems Administrator, it was often tough to find time to be proactive and housekeep. However, this is a key part of the role. What I used to do is dedicate time each week to expanding my arsenal of scripts. These little beauties performed the many mundane, but necessary, Active Directory housekeeping…

0

More on Get-Acl with Active Directory

In June I posted about searching Active Directory for principals that have the “Write Members” permission on a Distribution List. I had a follow-up question, from an internal source, about deciphering each Access Control Entry (ACE) returned by Get-Acl against the Active Directory PS drive. I thought I’d convey the same information to the outside…

1