How to use PowerShell to find the living machines and the listening services, and then document the carnage You run a network. People lie about what is online. Firewalls pretend to be polite. Your job is to stop believing statements and start believing signals. Ping sweeps and port scans do what polite questions will not: they expose truth. Do this
Tag: PowerShell
Packets don’t lie. You just need the right tool to hear what they’re saying. The Eternal Packet Debate Every network engineer has that moment of doubt. You’re staring at your terminal, packets are flying, and you ask yourself the age-old question: Should I fire up Wireshark or stick with tcpdump? Both tools live in the same world of packet capture
CMD survives because it still works. PowerShell dominates because it can do everything CMD never imagined. The Command Line Never Died CMD is not dead. Microsoft did not bury it. It still waits patiently for someone to type ipconfig or dir like it is 2002. For its core tasks, CMD is simple and consistent. It remains the screwdriver every Windows
The best engineers don’t just fix things. They build systems that survive them. Git is where that discipline begins. The Myth That Git Is Only for Developers I used to believe Git was for people who built apps, not networks. The ones who spoke in JavaScript, not BGP. The ones who pushed commits, not packets. Then I realized something. Managing
The Network That Never Sleeps Networks don’t take breaks. They hum through nights, holidays, and your supposed day off. Every ping, packet, and login request demands precision and continuity. For those of us in IT, it’s not glamour, it’s survival. That’s where automation steps in. Not to replace you, but to give you back the hours you’ve been surrendering to
ArcGIS does not just test your certificates. It tests your process. Every PFX is a confession that trust must be built correctly, and every renewal is a reminder that shortcuts will always cost you twice. When our SSL certificate expired this month, I found myself performing the same ritual every administrator (ArcGIS, systems, network, application – yes, that’s me too)
A secure Windows network is not built on trust or technology. It is built on doubt, discipline, and the refusal to believe that anything is ever safe. The Illusion of Safety We like to think a Windows network is safe because it is Windows. Familiar. Polished. Backed by billion-dollar branding. The truth is, Windows is only as secure as the
A network without IPAM is like a city without street names—everyone moves, but nobody knows where they are going. Introduction: The Quiet Hero You Never Thank In every network, there are heroes who never get credit. The routers get their blinking lights. The switches hum like obedient soldiers. The firewall gets blamed for everything. But the one system that silently
There was a time when the hum of server fans defined an IT department. Today, the same architecture that powered those rooms now spans continents. The Windows stack didn’t die. It evolved. There is a quiet elegance in the Windows stack that many overlook. It does not try to impress with flash or hype. It simply works. Dependable, structured, and
Ever dreamed of wielding the awesome power of managing terabytes of data, only to be woken up by a 3 AM alert that says, “Transaction log full”? Welcome to the elite, underappreciated, caffeine-fueled world of the SQL Server DBA (Database Administrator). It’s not always glamorous. You won’t get a standing ovation for restoring the production database in 6 minutes flat.