PowerShell Hacker #13

by Doug Finke on September 11, 2010

in Patent,PowerShell,PowerShell Hacker,WinForms,WPF,WPK

It’s nice to know that bollocks are a good thing.


    Bollocks – Wikipedia, the free encyclopedia:
    "Conversely, the word also figures in idiomatic phrases such as "the
    dog’s /bollocks/" and "top /bollock(s)/", which usually refer to
    something which is admired, approved of or well-respected."

  • Ravikanth Chaganti started a series Managing Windows Deployment Services (WDS) using PowerShell – Part 1. He also shows how he found it using PowerShell to search the registry. Plus interacts with a COM object with New-Object –ComObject and does reflection at the command line with Get-Member
  • Pablo Cibraro fires up Tallago Studios SO-Aware PowerShell provider. SO-Aware is a Web Services repository that enables the cataloging, management, monitoring and testing of Web Services. SO-Aware can be completely managed using PowerShell scripting environment.
  • Jeffery Snover, inventor of PowerShell, received Patent # 7,757,282. Congratulations. The title “System And Method For Distinguishing Safe And Potentially Unsafe Data During Runtime Processing”. Here’s the PDF. It’s an interesting read. Here is some of the background:

The Perl language developed a security feature that is directed at minimizing risks associated with input collected from web forms. This security feature is commonly referred to as “taint”. […] A more pervasive and more comprehensive taint mechanism is needed that handles various scripting situations.

{ 1 trackback }

Tweets that mention PowerShell Hacker #13 -- Topsy.com
09.11.10 at 12:21 pm

{ 0 comments… add one now }

Leave a Comment

You can use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Previous post:

Next post:

You are forbidden!