rsync
rsync **source/** **destination
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env bash | |
## | |
## scale the last screenshot on the desktop with ImageMagick | |
## | |
## Author: Kevin Ernst (ernstki -at- mail.uc.edu) | |
## Date: 25 October 2020 | |
## Source: https://gist.github.com/ernstki/8776b3325f0a7abcc0d6080b2160a15c | |
## License: MIT (https://choosealicense.com/licenses/mit) | |
## | |
## Installation: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@ECHO OFF | |
:: A simple batch script wrapper around PuTTY's PLINK.EXE | |
:: to integrate with Eclipse's EGit plugin. Update your | |
:: remote [username] below and save this script as | |
:: 'plink.cmd' alongside wherever PLINK.EXE is installed | |
:: on your system. | |
:: | |
:: The SO article referenced below will show you how to | |
:: use this script with EGit (hint: set the GIT_SSH | |
:: environment variable to the full pathname to this |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#Security log | |
#============ | |
#### | |
#4624 - Logon & Logoff events successful | |
#4625 - Logon unsucceful | |
#### | |
# Get usernames | |
Get-WinEvent -path .\Security.evtx | Where {$_.id -eq "4624"} | Foreach {([xml]$_.ToXml()).GetElementsByTagName("Data").ItemOf(5)}| Select -ExpandProperty "#text" -Unique | |
# Get domains |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cmdkey /list | ForEach-Object{if($_ -like "*target=TERMSRV/*"){cmdkey /del:($_ -replace " ","" -replace "Target:","")}} | |
echo "Connecting to 192.168.1.100" | |
$Server="192.168.1.100" | |
$User="Administrator" | |
$Password="AdminPassword" | |
cmdkey /generic:TERMSRV/$Server /user:$User /pass:$Password | |
mstsc /v:$Server |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# Report.pl | |
# This script scans for backups in the specified directories (@DIRINDEX) | |
# and generates log files for each cobian backup set detected in each | |
# of these directories. These log files are generated by the list command | |
# in 7z. Optionally password protected archives can be opened by | |
# specifying the password after the option -p (e.g. ./report.pl -p password). | |
#USER CONFIGURBLE PARAMETERS |
We can make this file beautiful and searchable if this error is corrected: No commas found in this CSV file in line 0.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
000stthk.exe|Toshiba Hotkey Configuration|NONE | |
007ssinstall.exe|007 Spy Software|NONE | |
00thotkey.exe|Toshiba Keyboard Helper|NONE | |
123downloadsuk[1].exe|123Mania Hijacker|NONE | |
12popup.exe|12Ghosts Popup-Killer|NONE | |
153.exe|??? Dialer.W32.153 ???|MALICIOUS_SOFTWARE | |
180sainstalleradperform.exe|180Solutions Zango|NONE | |
180sainstallernusac.exe|180SearchAssistant|NONE | |
1xconfig.exe|SCM MicroSystems Helper|NONE | |
2portalmon.exe|2wSysTray|NONE |
NewerOlder