Book Image

Powershell Core 6.2 Cookbook

By : Jan-Hendrik Peters
Book Image

Powershell Core 6.2 Cookbook

By: Jan-Hendrik Peters

Overview of this book

This book will follow a recipe-based approach and start off with an introduction to the fundamentals of PowerShell, and explaining how to install and run it through simple examples. Next, you will learn how to use PowerShell to access and manipulate data and how to work with different streams as well. You will also explore the object model which will help with regard to PowerShell function deployment. Going forward, you will get familiar with the pipeline in its different use cases. The next set of chapters will deal with the different ways of accessing data in PowerShell. You will also learn to automate various tasks in Windows and Linux using PowerShell Core, as well as explore Windows Server. Later, you will be introduced to Remoting in PowerShell Core and Just Enough Administration concept. The last set of chapters will help you understand the management of a private and public cloud with PowerShell Core. You will also learn how to access web services and explore the high-performance scripting methods. By the end of this book, you will gain the skills to manage complex tasks effectively along with increasing the performance of your environment.
Table of Contents (14 chapters)

Encrypting data

Nothing is worse than finding your credentials or other confidential information in plain text on the network. While PowerShell cannot protect you against insecure web services, it can protect your credentials, connections strings, and so on as long as possible by supporting the Cryptographic Message Syntax (CMS).

Currently only supported on the Windows operating system due to the certificate stores that are being used, the CMS allows you to securely pass information to other users or computers. The security of this is based on mathematical problems such as the prime factorization of large (4096 bit) numbers, or calculating coordinates on an elliptic curve. Or, in friendlier terms, public key cryptography.

Getting ready

...