PowerShell Tutorials

How To Install Google Chrome With PowerShell

Learn how to install Google Chrome effortlessly on your Windows machine using the power of PowerShell. This step-by-step guide will walk you through the process, providing clear instructions and commands to execute. With PowerShell, you can automate the installation procedure, saving you time and effort.

Introduction

Installing Google Chrome with PowerShell is a convenient and efficient method for adding this popular web browser to your Windows system. PowerShell is a powerful command-line tool provided by Microsoft, enabling users to automate various tasks, including software installations. By following the step-by-step instructions outlined below, you’ll be able to install Google Chrome quickly and easily using PowerShell.

$LocalTempDir = $env:TEMP; $ChromeInstaller = "ChromeInstaller.exe";
(new-object    System.Net.WebClient).DownloadFile('http://dl.google.com/chrome/install/latest/chrome_installer.exe', "$LocalTempDir\$ChromeInstaller"); & "$LocalTempDir\$ChromeInstaller" /silent /install;
$Process2Monitor =  "ChromeInstaller"; Do { 
    $ProcessesFound = Get-Process | ?{
        $Process2Monitor -contains $_.Name} | Select-Object -ExpandProperty Name; If ($ProcessesFound)
{ "Still running: $($ProcessesFound -join ', ')" | Write-Host; Start-Sleep -Seconds 2 }
else
Read the rest
PowerShell Tutorials

How to Install 8×8 Work For Desktop With PowerShell

In this tutorial you will learn how to install 8×8 Work For Desktop using PowerShell. By the end of this tutorial, you would have successfully deployed 8×8 Work For Desktop onto a Windows computer. 

Introduction:

Installing 8×8 Work for Desktop using PowerShell allows you to quickly set up the communication software on your Windows computer. With PowerShell, you can automate the installation process and ensure a smooth deployment of 8×8 Work. In this guide, we will walk you through the steps to install 8×8 Work for Desktop using PowerShell. Let’s get started!

$url = "https://vod-updates.8x8.com/ga/work-64-msi-v7.25.2-6.msi"
$dest = "c:\temp\work-64-msi-v7.25.2-6.msi"
Invoke-WebRequest -Uri $url -OutFile $dest
msiexec.exe /i "C:\temp\work-64-msi-v7.25.2-6.msi" /qn

The PowerShell Script will do the following.

  1. Call to URL 8×8 installation package
  2. Download the 8×8 package and place it in C:\temp
  3. Finally, the PowerShell will install the 8×8 work .msi package onto the Windows computer.

If you have any questions, feel free … Read the rest

PowerShell Tutorials

How to Install Keeper Desktop With PowerShell

In this tutorial you will learn how to install Keeper Password Manager using PowerShell. By the end of this tutorial, you would have successfully deployed Keeper Password Manager to a logged in user. 

Introduction: Installing Keeper Desktop with PowerShell

Keeper Desktop is a secure password management application that allows users to store and manage their passwords in an encrypted vault. To install Keeper Desktop using PowerShell, you can follow the steps outlined below. PowerShell is a powerful command-line tool available on Windows operating systems that allows you to automate tasks and execute scripts.

$url = "https://www.keepersecurity.com/desktop_electron/packages/KeeperPasswordManager.msixbundle"
$dest = "c:\temp\KeeperPasswordManager.msixbundle"
Invoke-WebRequest -Uri $url -OutFile $dest
Add-AppxPackage -Path "C:\temp\KeeperPasswordManager.msixbundle"

The PowerShell Script will do the following.

  1. Call to Keeper desktop URL
  2. Download the package and place it in C:\temp
  3. Finally, it will install the Keeper .msixbundle to the user profile.

If you have any questions, feel free to reach out.

Conclusion:

By … Read the rest

Preventing Data Breaches: 10 Tips For Businesses

Introduction

Data breaches are becoming more and more common, with large businesses particularly at risk. The consequences of a data breach can be significant, not just in terms of the financial damage suffered by the business, but also in terms of the reputational damage.

A data breach is when confidential or sensitive information is exposed to unauthorized individuals. This information can include anything from financial data and customer information to trade secrets and employee records.

There are a number of ways in which a data breach can occur, including hacking, social engineering, and insider threats. However, there are also a number of measures that businesses can take to prevent data breaches from occurring in the first place.

In this article, we will take a look at 10 of the most effective tips for preventing data breaches. By following these tips, businesses can minimize the risk of suffering a data breach … Read the rest

Wiper Malware is on the Rise: What You Need to Know

In the past year, the use of disk wipers in cyberattacks has increased significantly. This type of malware is particularly dangerous because it can destroy data and render systems inoperable. The attacks that began with Russia’s invasion of Ukraine early last year have continued unabated, and the malware has transformed into a potent threat for organizations in the region and elsewhere.
 
Wiper malware is typically spread through email attachments or malicious links. Once executed, the malware begins to delete files and folders on the victim’s system. In some cases, the malware also overwrites key system files, making it impossible to boot the system.
 
Organizations can protect themselves from wiper malware attacks by backing up data regularly, keeping systems up to date, and using security solutions that can detect and block malicious emails and links.
 
In the last few years, there has been a worrying trend in the
Read the rest

Vulnerability With Arris Routers

Security researcher Yerodin Richards has found an authenticated remote code execution vulnerability in Arris routers. ISPs typically provide these routers in loan for customers’ telephony and internet access. In a bizarre twist, he used the verification against itself to demonstrate the vulnerability.

Affected devices

The Arris router exploit allows a hacker to remotely access the device, says Richards. The bug is found in older TG2482A, TG2492, and SBG10 models, which can be commonly found in the Caribbean and Latin America. Richards says Arris told him it no longer supports the devices.

The vulnerability

The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. CVE-2022-45701 is a newly discovered issue. When testing for shell script command injection, the researcher found that $ is accepted by the web application. That was promising, but when paired into $( , it was neutralized. This implies that the developer was intentionally … Read the rest

Level-up Cyber Security Awareness

In 2022, four out of five workers did their work remotely or were hybrid. Remote work was embraced by companies, and they were forced to define and adopt remote working policies. However, IT departments were just as crucial in the new remote working era. They had to ensure security for their employees who were now working from home or from coffee shops.

Protecting sensitive information and maintaining regulatory compliance has become more difficult in today’s dynamic business landscape. Companies have to adapt their data access protocols to account for employees accessing data from various locations and devices. Businesses that shift their security posture when migrating from on-premise to hybrid and cloud environments again face a similar challenge, just as they did when they moved to the cloud.

Begin by defining the culture of security and then ensure that all employees are trained to respect the company’s standards. By training your … Read the rest

Windows Tutorials

How To Revert Microsoft Outlook Navigation Bar To The Bottom

With The Microsoft Outlook 2207 update, the navigation bar was moved from bottom to left to increase accessibility and provide more customization which allow you to include apps. If you don’t like the change, there is good news, Microsoft added a temporary option to revert this change. In this tutorial you will learn how to revert Microsoft Outlook navigation bar back to the bottom.

How To Revert Microsoft Outlook Navigation Bar To The Bottom

 

Step 1 : Open Microsoft Outlook

Step 2 : Locate and click on File > Options > Advanced.

Step 3 : Under Outlook panes, locate and uncheck Show Apps in Outlook.

Step 4 : Locate and click the OK button.

Step 5: Restart Microsoft Outlook.

Your Navigation bar should now be reverted to the bottom. Keep in mind that this is only temporary, and Microsoft will remove the option to revert this navigation bar completely.

I hope this article was helpful, if you have any questions,

Read the rest

Is Your Microsoft Exchange Server Vulnerable to ProxyNotShell Flaw?

According to the non-profit Shadowserver Foundation, there are approximately 60,000 IP addresses with internet-facing Microsoft Exchange Server instances still vulnerable to CVE-2022-41082.

This might look like a standard Exchange Server bug, but it’s actually a lot worse. It’s really two flaws in one. The first flaw is a server-side request forgery in the Exchange API. The second is a remote code execution bug. We call this bug ProxyNotShell because it’s reminiscent of the ProxyShell bugs that plagued Microsoft servers earlier this year.

Microsoft did not patch this vulnerability until its November Patch Tuesday release. It was a long wait, but Microsoft said it was necessary to protect customers. You should still take action, though — follow Microsoft’s instructions for the Autodiscover endpoint to mitigate the vulnerability until it can be patched.

However, CrowdStrike published a blog post last month revealing a new exploit chain called “OWASSRF” that can bypass Microsoft’s … Read the rest

Is Your Website ADA Compliant?

Is Your Website ADA Compliant?

The Americans with Disabilities Act (ADA) is a landmark civil rights law that prohibits discrimination against disabled individuals in all areas of public life. It gives millions of people with disabilities equal access to employment, government, telecommunications, and businesses.

Businesses must make reasonable modifications to accommodate customers with disabilities. Title III of the ADA addresses businesses specifically. It prohibits discrimination on the basis of disability in places of public accommodation, which include restaurants, private schools, sports stadiums, office buildings, and more. Businesses are required to make “reasonable modifications” to serve people with disabilities.

 

Who Needs to Be Compliant?

Under Title III, businesses “open to the public” both in the physical world and online are required to provide equal access to people with disabilities.

Examples of businesses open to the public include:Is Your Website ADA Compliant?

  • Restaurants and bars.
  • Retail establishments.
  • Hotels and other places of lodging.
  • Parks, zoos, and other places of recreation.
Read the rest

Stay Informed

Receive instant notifications when new content is released.