mas.to is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hello! mas.to is a fast, up-to-date and fun Mastodon server.

Administered by:

Server stats:

13K
active users

#powershell

50 posts37 participants9 posts today
benzogaga33 :verified:<p>Visual Studio Code : gagnez en productivité avec GitHub Copilot (Free) <a href="https://www.it-connect.fr/visual-studio-code-gagnez-en-productivite-avec-github-copilot-free/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">it-connect.fr/visual-studio-co</span><span class="invisible">de-gagnez-en-productivite-avec-github-copilot-free/</span></a> <a href="https://mamot.fr/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://mamot.fr/tags/Powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Powershell</span></a> <a href="https://mamot.fr/tags/Scripting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scripting</span></a> <a href="https://mamot.fr/tags/IA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IA</span></a></p>
Matthew Dowst<p>The newest PowerShell Weekly for April 4, 2025 is available! Get your hands on the best PowerShell content, from tips to advanced scripts. Perfect for pros and enthusiasts alike.<br><a href="https://mastodon.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://mastodon.social/tags/Automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Automation</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechNews</span></a><br><a href="https://psweekly.dowst.dev/?p=7730" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">psweekly.dowst.dev/?p=7730</span><span class="invisible"></span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>Did you hear my recent chat on RunAs Radio about all things <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> ? <a href="https://runasradio.com/Shows/Show/977" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">runasradio.com/Shows/Show/977</span><span class="invisible"></span></a></p>
PSConfEU<p>Jakub Jares, the maintainer of Profiler, explains how to use the tool for <a class="hashtag" href="https://bsky.app/search?q=%23PowerShell" rel="nofollow noopener noreferrer" target="_blank">#PowerShell</a> performance improvements. Understand key metrics and optimization tips.&nbsp;#PSConfEU<br><br><a href="https://youtu.be/4biWCrEv75Q?si=fm5SZx3ETbN7b0Uy" rel="nofollow noopener noreferrer" target="_blank">10 things you should know abou...</a></p>
PSConfEU<p>💡 Heading to <a class="hashtag" href="https://bsky.app/search?q=%23Sweden" rel="nofollow noopener noreferrer" target="_blank">#Sweden</a> for <a class="hashtag" href="https://bsky.app/search?q=%23PSConfEU" rel="nofollow noopener noreferrer" target="_blank">#PSConfEU</a> 2025? Thanks to Björn Sundling for insights in our latest guide: '11 Things to Know Before Visiting Sweden' 🧳 Get the best travel tips to enjoy your stay! Read more 👉 <a href="https://psconf.eu/11-things-to-know-before-visiting-sweden-your-guide-to-a-smoother-stay/" rel="nofollow noopener noreferrer" target="_blank">psconf.eu/11-things-to-know...</a> <a class="hashtag" href="https://bsky.app/search?q=%23PowerShell" rel="nofollow noopener noreferrer" target="_blank">#PowerShell</a> <a class="hashtag" href="https://bsky.app/search?q=%23Malm%C3%B6" rel="nofollow noopener noreferrer" target="_blank">#Malmö</a> <a class="hashtag" href="https://bsky.app/search?q=%23Svenska" rel="nofollow noopener noreferrer" target="_blank">#Svenska</a> <a class="hashtag" href="https://bsky.app/search?q=%23IT" rel="nofollow noopener noreferrer" target="_blank">#IT</a> <a class="hashtag" href="https://bsky.app/search?q=%23automation" rel="nofollow noopener noreferrer" target="_blank">#automation</a></p>
OTX Bot<p>Gootloader Returns: Malware Hidden in Google Ads for Legal Documents</p><p>The Gootloader malware campaign has evolved its tactics, now using Google Ads to target victims seeking legal templates. The threat actor advertises legal documents, primarily agreements, through compromised ad accounts. Users searching for templates are directed to a malicious website where they are prompted to enter their email address. They then receive an email with a link to download a seemingly legitimate document, which is actually a zipped .JS file containing malware. When executed, the malware creates a scheduled task and uses PowerShell to communicate with compromised WordPress blogs. The campaign demonstrates a shift in Gootloader's strategy, moving from poisoned search results to controlled infrastructure for malware delivery.</p><p>Pulse ID: 67ef0696f2790ccbd23c46a9<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67ef0696f2790ccbd23c46a9" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67ef0</span><span class="invisible">696f2790ccbd23c46a9</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-03 22:07:18</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.raytec.co/tags/GootLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GootLoader</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RDP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RDP</span></a> <a href="https://social.raytec.co/tags/Troll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Troll</span></a> <a href="https://social.raytec.co/tags/Word" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Word</span></a> <a href="https://social.raytec.co/tags/Wordpress" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wordpress</span></a> <a href="https://social.raytec.co/tags/ZIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZIP</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Sascha Stumpler<p>Gerando chaves SSH apenas com o Powershell <a href="http://dlvr.it/TJxphF" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TJxphF</span><span class="invisible"></span></a> via PlanetPowerShell <a href="https://hessen.social/tags/Powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Powershell</span></a> <a href="https://hessen.social/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://hessen.social/tags/CSharp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CSharp</span></a> <a href="https://hessen.social/tags/DotNet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DotNet</span></a></p>
Habr<p>Инновационные технические решения и баги в исходном коде PowerShell</p><p>PowerShell — известный инструмент от Microsoft. Но какие секреты сможет найти статический анализатор в его исходном коде? Посмотрим в этой статье.</p><p><a href="https://habr.com/ru/companies/pvs-studio/articles/897402/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/pvs-stud</span><span class="invisible">io/articles/897402/</span></a></p><p><a href="https://zhub.link/tags/powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>powershell</span></a> <a href="https://zhub.link/tags/%D1%81%D1%82%D0%B0%D1%82%D0%B8%D1%87%D0%B5%D1%81%D0%BA%D0%B8%D0%B9_%D0%B0%D0%BD%D0%B0%D0%BB%D0%B8%D0%B7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>статический_анализ</span></a> <a href="https://zhub.link/tags/sast" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sast</span></a> <a href="https://zhub.link/tags/open_source" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>open_source</span></a> <a href="https://zhub.link/tags/microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microsoft</span></a> <a href="https://zhub.link/tags/pvsstudio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pvsstudio</span></a> <a href="https://zhub.link/tags/%D1%87%D0%B8%D1%81%D1%82%D1%8B%D0%B9_%D0%BA%D0%BE%D0%B4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>чистый_код</span></a> <a href="https://zhub.link/tags/c" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c</span></a># <a href="https://zhub.link/tags/csharp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>csharp</span></a></p>
Sascha Stumpler<p>Customizando o Windows Terminal com Powershell <a href="http://dlvr.it/TJxhSW" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TJxhSW</span><span class="invisible"></span></a> via PlanetPowerShell <a href="https://hessen.social/tags/WindowsTerminal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsTerminal</span></a> <a href="https://hessen.social/tags/Powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Powershell</span></a> <a href="https://hessen.social/tags/Customiza%C3%A7%C3%A3o" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Customização</span></a> <a href="https://hessen.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a></p>
Habr<p>Как бывшая сотрудница передавала данные конкурентам</p><p>В небольшой компании "ТехноСофт", занимавшейся разработкой ПО для автоматизации бизнеса, пятничный вечер казался обычным. Менеджер по продажам — молодая симпатичная девушка с яркими рыжими волосами и в стильных очках — объявила об уходе. Она была звездой отдела: обаятельная улыбка и умение закрывать сделки делали её незаменимой. Конкуренты переманили её, предложив лучшие условия. В тот вечер она угостила коллег пиццей, попрощалась и ушла, унося в рюкзаке ноутбук и пачку визиток. Команда пожелала ей удачи, а утром её учётную запись в Active Directory (AD) заблокировали. Но никто не проверил доступы к серверу через Remote Desktop Protocol (RDP) — ошибку, за которую "ТехноСофт" скоро поплатился.</p><p><a href="https://habr.com/ru/articles/897314/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/897314/</span><span class="invisible"></span></a></p><p><a href="https://zhub.link/tags/powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>powershell</span></a> <a href="https://zhub.link/tags/%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>информационная_безопасность</span></a> <a href="https://zhub.link/tags/%D0%BA%D0%B5%D0%B9%D1%81" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>кейс</span></a></p>
OTX Bot<p>Thunderstruck! Malicious ads for RVTools lead to ThunderShell payload</p><p>A security incident involving malicious sponsored ads distributing backdoored administrative tools was detected. Users searching for RVTools were served a tampered version containing ThunderShell, a PowerShell-based remote access tool. The malicious ads, appearing in Google search results, led to a site mimicking the legitimate RVTools download page. The trojanized file, when executed, installs RVTools but also deploys ThunderShell, allowing attackers to execute commands on compromised machines. Multiple ads from different verified advertisers were used to evade security controls. The campaign highlights the persistent threat of malvertising and the need for stronger ad screening processes and user awareness.</p><p>Pulse ID: 67eec2ff4d0da82ea2ee1e26<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67eec2ff4d0da82ea2ee1e26" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67eec</span><span class="invisible">2ff4d0da82ea2ee1e26</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-03 17:18:55</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/BackDoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BackDoor</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mac</span></a> <a href="https://social.raytec.co/tags/MaliciousAds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MaliciousAds</span></a> <a href="https://social.raytec.co/tags/Malvertising" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malvertising</span></a> <a href="https://social.raytec.co/tags/Mimic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mimic</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/Trojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojan</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Cyber Espionage using PowerShell stealer WRECKSTEEL</p><p>Ukrainian government's CERT-UA has identified a series of cyberattacks against government agencies and critical infrastructure facilities in Ukraine during March 2025. The attacks, aimed at information theft, utilize compromised accounts to distribute emails with links to public file services. These links download a VBScript loader, which then launches a PowerShell script to search and upload specific file types using cURL. The malicious activity, tracked as UAC-0219, has been ongoing since fall 2024. The primary tool, classified as WRECKSTEEL, exists in both VBScript and PowerShell versions. Earlier attacks in 2024 used EXE files created with NSIS installers, containing decoy documents and the IrfanView program for screenshots. CERT-UA urges immediate reporting of any detected cyberattack signs.</p><p>Pulse ID: 67eed31e2e5388397fc6bf7e<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/67eed31e2e5388397fc6bf7e" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/67eed</span><span class="invisible">31e2e5388397fc6bf7e</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-04-03 18:27:42</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CERTUA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CERTUA</span></a> <a href="https://social.raytec.co/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.raytec.co/tags/CyberAttacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttacks</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/Espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Espionage</span></a> <a href="https://social.raytec.co/tags/Government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Government</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/InformationTheft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InformationTheft</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/UK" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UK</span></a> <a href="https://social.raytec.co/tags/Ukr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukr</span></a> <a href="https://social.raytec.co/tags/Ukraine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukraine</span></a> <a href="https://social.raytec.co/tags/Ukrainian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ukrainian</span></a> <a href="https://social.raytec.co/tags/VBS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VBS</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AlienVault</span></a></p>
Pyrzout :vm:<p>UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers <a href="https://gbhackers.com/uac-0219-hackers-leverage-wrecksteel-powershell-stealer/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/uac-0219-hackers</span><span class="invisible">-leverage-wrecksteel-powershell-stealer/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a></p>
Jeff Hicks 🐶🎼🍷🖥️<p>If you are attending the <a href="https://techhub.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> Summit next week, this will be great opportunity for book signings from your favorite authors. This may be the last even where Don Jones and I will both be present.</p>
Sascha Stumpler<p>Using Get-IISAppPool PowerShell Cmdlet <a href="http://dlvr.it/TJxBwv" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">dlvr.it/TJxBwv</span><span class="invisible"></span></a> via PlanetPowerShell <a href="https://hessen.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a> <a href="https://hessen.social/tags/IIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IIS</span></a> <a href="https://hessen.social/tags/AppPool" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppPool</span></a> <a href="https://hessen.social/tags/WebAdministration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebAdministration</span></a></p>
PSConfEU<p>🌟 Experience the camaraderie at our exclusive <a class="hashtag" href="https://bsky.app/search?q=%23PowerShell" rel="nofollow noopener noreferrer" target="_blank">#PowerShell</a> Community Dinner! 🍽️🥂 📅 Set for 24th June 2025 📍 Södra Hallen, Slagthuset, Malmö 🎟️ Open only to <a class="hashtag" href="https://bsky.app/search?q=%23PSConfEU" rel="nofollow noopener noreferrer" target="_blank">#PSConfEU</a> 2025 ticket holders! ▶️ <a href="https://psconf.eu" rel="nofollow noopener noreferrer" target="_blank">psconf.eu</a> A night of networking and fun—reserve your spot!</p>
furicle<p>Little <a href="https://mastodon.social/tags/powershell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>powershell</span></a> thing I did this morning, was helpful...</p><p>``` <br> Get-Clipboard | sort | Set-Clipboard<br>```</p><p>In case somebody else hadn't considered</p>
洪 民憙 (Hong Minhee)<p><strong>셸 언어는 때로 추하길 요구 받는다</strong></p> <p><a href="https://hackers.pub/@hongminhee/2025/shell-languages-embrace-ugliness" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackers.pub/@hongminhee/2025/s</span><span class="invisible">hell-languages-embrace-ugliness</span></a></p>
PSConfEU<p>Sunny days beckon, <a class="hashtag" href="https://bsky.app/search?q=%23PSConfEU" rel="nofollow noopener noreferrer" target="_blank">#PSConfEU</a>'s the season! 🌞🎉 Lace up your shoes and join us in Malmö Tickets still available: <a href="https://psconf.eu" rel="nofollow noopener noreferrer" target="_blank">psconf.eu</a> <a class="hashtag" href="https://bsky.app/search?q=%23PowerShell" rel="nofollow noopener noreferrer" target="_blank">#PowerShell</a> <a class="hashtag" href="https://bsky.app/search?q=%23Svenska" rel="nofollow noopener noreferrer" target="_blank">#Svenska</a> <a class="hashtag" href="https://bsky.app/search?q=%23Sweden" rel="nofollow noopener noreferrer" target="_blank">#Sweden</a> # Malmö <a class="hashtag" href="https://bsky.app/search?q=%23automation" rel="nofollow noopener noreferrer" target="_blank">#automation</a> <a class="hashtag" href="https://bsky.app/search?q=%23IT" rel="nofollow noopener noreferrer" target="_blank">#IT</a> <a class="hashtag" href="https://bsky.app/search?q=%23Tech" rel="nofollow noopener noreferrer" target="_blank">#Tech</a> <a class="hashtag" href="https://bsky.app/search?q=%23Conference" rel="nofollow noopener noreferrer" target="_blank">#Conference</a> </p>
Leanpub<p>Behind the PowerShell Pipeline by Jeff Hicks is on sale on Leanpub! Its suggested price is $49.98; get it for $31.49 with this coupon: <a href="https://leanpub.com/sh/OJB5DX6R" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">leanpub.com/sh/OJB5DX6R</span><span class="invisible"></span></a> JeffHicks@techhub.social <a href="https://mastodon.social/tags/PowerShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PowerShell</span></a></p>