Dargslan

Dargslan

PowerShell Scripts to Monitor Disk Space

Illustration of PowerShell diskspace monitoring: terminal with scripts, server icons, storage bars and pie charts, live usage graphs threshold alerts and automated cleanup actions.

How to Query Event Logs in PowerShell

PowerShell showing Get-EventLog and Get-WinEvent usage: filtering Windows Event Logs by log name, event ID, time range, and severity, then exporting or format results for analysis.

Managing Local Users and Groups via PowerShell

PowerShell managing local users and groups: commands to create, modify, remove accounts, set passwords, add or remove group membership, list users and groups, with sample output...

PowerShell Command to Restart Remote Computers

PowerShell screenshot showing Restart-Computer usage to reboot remote machines: example command with -ComputerName, -Force and -Credential options, handling multiple hosts at once.

Using PowerShell to Manage Windows Updates

PowerShell window managing Windows Updates: blue console with admin prompt, update detection and install commands, progress bar, update history list, restart notice dialog visible.

How to Read and Write Files with PowerShell

Illustration of PowerShell script editing and executing commands to read, write, append and manage plain text and CSV files, showing terminal, code snippets, file icons, data flow.

Checking System Information with PowerShell Commands

Screenshot of PowerShell showing system information: CPU, memory, disk, network adapters, and OS details retrieved using Get-ComputerInfo, Get-WmiObject, Get-NetAdapter commands.v1

How to List All Installed Software Using PowerShell

PowerShell window listing installed applications with Name, Version and Publisher columns, generated by running Get-ItemProperty or Get-WmiObject queries against registry and WMI..

Monitoring Disk I/O Performance with iostat

Terminal screenshot showing iostat output with per-device read/write throughput, IOPS, KB/s, avg wait and service time, device utilization %, and CPU stats for disk I/O monitoring.

Setting Up SSH Key-Based Authentication

Illustration showing generating an SSH key pair, copying the public key to a remote server, enabling key-based authentication, and connecting securely via SSH without a password.!!