mastodon.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
The original server operated by the Mastodon gGmbH non-profit

Administered by:

Server stats:

343K
active users

#vbscript

0 posts0 participants0 posts today
:rss: Qiita - 人気の記事<p>バッチ実行中にメッセージボックスを表示<br><a href="https://qiita.com/yaju/items/3ae0a299439560f60c96?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">qiita.com/yaju/items/3ae0a2994</span><span class="invisible">39560f60c96?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items</span></a></p><p><a href="https://rss-mstdn.studiofreesia.com/tags/qiita" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>qiita</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/bat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bat</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/%E3%83%90%E3%83%83%E3%83%81%E3%83%95%E3%82%A1%E3%82%A4%E3%83%AB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>バッチファイル</span></a></p>
Habr<p>Как отправлять критические уведомления из промышленных SCADA-систем по SMS API</p><p>SCADA-системы — это программно-аппаратные комплексы для мониторинга и управления промышленными процессами. При сбоях и авариях они формируют критические уведомления о перегревах, утечках, отказах оборудования и других опасных ситуациях. Отправлять такие оповещения в Telegram значит их гарантированно потерять. Поэтому мы решили сделать интеграцию с</p><p><a href="https://habr.com/ru/companies/exolve/articles/892032/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/exolve/a</span><span class="invisible">rticles/892032/</span></a></p><p><a href="https://zhub.link/tags/scada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scada</span></a> <a href="https://zhub.link/tags/%D1%83%D0%B2%D0%B5%D0%B4%D0%BE%D0%BC%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>уведомления</span></a> <a href="https://zhub.link/tags/sms_api" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sms_api</span></a> <a href="https://zhub.link/tags/%D0%B0%D0%B2%D0%B0%D1%80%D0%B8%D0%B9%D0%BD%D1%8B%D0%B5_%D1%81%D0%B8%D1%82%D1%83%D0%B0%D1%86%D0%B8%D0%B8" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>аварийные_ситуации</span></a> <a href="https://zhub.link/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://zhub.link/tags/vbscript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vbscript</span></a> <a href="https://zhub.link/tags/wincc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wincc</span></a> <a href="https://zhub.link/tags/%D0%BC%D0%BE%D0%BD%D0%B8%D1%82%D0%BE%D1%80%D0%B8%D0%BD%D0%B3_%D0%B4%D0%B0%D1%82%D1%87%D0%B8%D0%BA%D0%BE%D0%B2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>мониторинг_датчиков</span></a></p>
:rss: Qiita - 人気の記事<p>【VBA】vba-regexを使用した正規表現(VBScript廃止の代替)<br><a href="https://qiita.com/yaju/items/23f659b9e108cda5e172?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">qiita.com/yaju/items/23f659b9e</span><span class="invisible">108cda5e172?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items</span></a></p><p><a href="https://rss-mstdn.studiofreesia.com/tags/qiita" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>qiita</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Excel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Excel</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/VBA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBA</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/VisualBasic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VisualBasic</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/access" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>access</span></a></p>
ANY.RUN<p>🚨 <a href="https://infosec.exchange/tags/XWorm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XWorm</span></a> leverages LOLBAS techniques to abuse <a href="https://infosec.exchange/tags/CMSTPLUA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CMSTPLUA</span></a></p><p>CMSTPLUA is a legitimate Windows tool that can be exploited for system binary proxy execution using <a href="https://infosec.exchange/tags/LOLBAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LOLBAS</span></a> techniques, bypassing security controls like <a href="https://infosec.exchange/tags/UAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UAC</span></a>, and executing <a href="https://infosec.exchange/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> code, putting organizations at risk. </p><p>⚙️ With Script Tracer in <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a> Sandbox, a SOC team can analyze scripts more efficiently. It simplifies script breakdowns, making it easier to understand their behavior and get key insights. <br>The <a href="https://infosec.exchange/tags/script" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>script</span></a> embedded in the INF file is used to coordinate an execution chain: <br>1️⃣ EXE starts cmstp.exe which is used to launch a <a href="https://infosec.exchange/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> script from an <a href="https://infosec.exchange/tags/INF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>INF</span></a> file. <br> <br>2️⃣ CMSTPLUA ➡️ mshta.exe ➡️ cmd.exe ➡️ EXE ➡️ PowerShell <br>– <a href="https://infosec.exchange/tags/MSHTA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSHTA</span></a> loads a <a href="https://infosec.exchange/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> from memory to run an executable and shuts down the <a href="https://infosec.exchange/tags/CMSTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CMSTP</span></a> process. <br>– EXE launches <a href="https://infosec.exchange/tags/PowerShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PowerShell</span></a> to add itself to <a href="https://infosec.exchange/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftDefender</span></a> exceptions. <br> <br>3️⃣ Finally, it runs the XWorm <a href="https://infosec.exchange/tags/payload" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>payload</span></a> from the <a href="https://infosec.exchange/tags/System32" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>System32</span></a> directory and adds itself to the Scheduled Task for persistence. <br> <br>👨‍💻 Check out the analysis and see Script Tracer in action: <br><a href="https://app.any.run/tasks/9352d612-8eaa-4fac-8980-9bee27b96bce/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=cmstplua&amp;utm_term=130225&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/9352d612-8ea</span><span class="invisible">a-4fac-8980-9bee27b96bce/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=cmstplua&amp;utm_term=130225&amp;utm_content=linktoservice</span></a> </p><p>Living-off-the-Land techniques have been leveraged for years to execute malicious operations using legitimate system utilities. <br>Use these TI Lookup search queries to find similar samples and improve the efficiency of your organization's security response:<br>🔍 <a href="https://intelligence.any.run/analysis/lookup?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=cmstplua&amp;utm_content=linktoti&amp;utm_term=130225#%7B%2522query%2522:%2522commandLine:%255C%2522%255C%255C.inf%255C%2522%2520AND%2520imagePath:%255C%2522cmstp%255C%255C.exe$%255C%2522%2522,%2522dateRange%2522:180%7D" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">intelligence.any.run/analysis/</span><span class="invisible">lookup?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=cmstplua&amp;utm_content=linktoti&amp;utm_term=130225#%7B%2522query%2522:%2522commandLine:%255C%2522%255C%255C.inf%255C%2522%2520AND%2520imagePath:%255C%2522cmstp%255C%255C.exe$%255C%2522%2522,%2522dateRange%2522:180%7D</span></a><br>🔍 <a href="https://intelligence.any.run/analysis/lookup?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=cmstplua&amp;utm_content=linktoti&amp;utm_term=130225#%7B%2522query%2522:%2522commandLine:%255C%2522mshta%2520vbscript:%255C%2522%2522,%2522dateRange%2522:180%7D" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">intelligence.any.run/analysis/</span><span class="invisible">lookup?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=cmstplua&amp;utm_content=linktoti&amp;utm_term=130225#%7B%2522query%2522:%2522commandLine:%255C%2522mshta%2520vbscript:%255C%2522%2522,%2522dateRange%2522:180%7D</span></a></p><p>Analyze latest <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> and <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> threats with <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a> 🚀</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Habr<p>Хакерские утилиты Дидье Стивенса</p><p>Дидье Стивенс — бельгийский разработчик и авторитетный специалист по информационной безопасности. Наиболее известен своими инструментами по взлому паролей Windows , анализу документов PDF и внедрению туда вредоносных файлов , в также как автор опенсорсных утилит Didier Stevens Suite : это 140 программ для системных операций с файлами, процессами, реестром и прочими штуками. Например, диспетчер задач Windows, реализованный в Excel/VBA (на КДПВ).</p><p><a href="https://habr.com/ru/companies/ruvds/articles/869680/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">habr.com/ru/companies/ruvds/ar</span><span class="invisible">ticles/869680/</span></a></p><p><a href="https://zhub.link/tags/Didier_Stevens" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Didier_Stevens</span></a> <a href="https://zhub.link/tags/%D0%94%D0%B8%D0%B4%D1%8C%D0%B5_%D0%A1%D1%82%D0%B8%D0%B2%D0%B5%D0%BD%D1%81" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Дидье_Стивенс</span></a> <a href="https://zhub.link/tags/Didier_Stevens_Labs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Didier_Stevens_Labs</span></a> <a href="https://zhub.link/tags/Didier_Stevens_Suite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Didier_Stevens_Suite</span></a> <a href="https://zhub.link/tags/PDF_Tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PDF_Tools</span></a> <a href="https://zhub.link/tags/%D1%81%D1%82%D0%B5%D0%B3%D0%B0%D0%BD%D0%BE%D0%B3%D1%80%D0%B0%D1%84%D0%B8%D1%8F" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>стеганография</span></a> <a href="https://zhub.link/tags/%D1%80%D0%B0%D0%B4%D1%83%D0%B6%D0%BD%D1%8B%D0%B5_%D1%82%D0%B0%D0%B1%D0%BB%D0%B8%D1%86%D1%8B" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>радужные_таблицы</span></a> <a href="https://zhub.link/tags/VBA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBA</span></a> <a href="https://zhub.link/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> <a href="https://zhub.link/tags/Excel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Excel</span></a> <a href="https://zhub.link/tags/Windows_Task_Manager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows_Task_Manager</span></a> <a href="https://zhub.link/tags/%D0%B4%D0%B8%D1%81%D0%BF%D0%B5%D1%82%D1%87%D0%B5%D1%80_%D0%B7%D0%B0%D0%B4%D0%B0%D1%87_Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>диспетчер_задач_Windows</span></a> <a href="https://zhub.link/tags/UltraEdit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UltraEdit</span></a> <a href="https://zhub.link/tags/Safeboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Safeboot</span></a> <a href="https://zhub.link/tags/%D0%B7%D0%B0%D1%89%D0%B8%D1%89%D0%B5%D0%BD%D0%BD%D1%8B%D0%B9_%D1%80%D0%B5%D0%B6%D0%B8%D0%BC_%D0%B7%D0%B0%D0%B3%D1%80%D1%83%D0%B7%D0%BA%D0%B8" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>защищенный_режим_загрузки</span></a> <a href="https://zhub.link/tags/%D0%B7%D0%B0%D0%B2%D0%B5%D1%89%D0%B0%D0%BD%D0%B8%D0%B5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>завещание</span></a> <a href="https://zhub.link/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> <a href="https://zhub.link/tags/WiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFi</span></a> <a href="https://zhub.link/tags/WiSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiSpy</span></a> <a href="https://zhub.link/tags/Chanalyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chanalyzer</span></a> <a href="https://zhub.link/tags/%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B0%D0%BD%D0%B0%D0%BB%D0%B8%D0%B7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>криптоанализ</span></a> <a href="https://zhub.link/tags/%D1%87%D0%B8%D1%82%D0%B5%D1%80%D1%81%D1%82%D0%B2%D0%BE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>читерство</span></a> <a href="https://zhub.link/tags/APDFPR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APDFPR</span></a> <a href="https://zhub.link/tags/ElcomSoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ElcomSoft</span></a> <a href="https://zhub.link/tags/ruvds_%D1%81%D1%82%D0%B0%D1%82%D1%8C%D0%B8" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ruvds_статьи</span></a></p>
Gioxx<p>VBScript: simulare la combinazione ALT-TAB da tastiera <a href="https://gioxx.org/2024/12/06/vbscript-simulare-la-combinazione-alt-tab-da-tastiera" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gioxx.org/2024/12/06/vbscript-</span><span class="invisible">simulare-la-combinazione-alt-tab-da-tastiera</span></a><br><a href="https://mastodon.uno/tags/microsoftwindows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftwindows</span></a> <a href="https://mastodon.uno/tags/pillole" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pillole</span></a> <a href="https://mastodon.uno/tags/ricercaesviluppo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ricercaesviluppo</span></a> <a href="https://mastodon.uno/tags/script" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>script</span></a> <a href="https://mastodon.uno/tags/tastiera" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tastiera</span></a> <a href="https://mastodon.uno/tags/vbscript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vbscript</span></a></p>
Ramon van BelzenHow to uninstall VBScript on Windows 11 version 24H2 <a href="https://www.windowscentral.com/software-apps/windows-11/how-to-uninstall-vbscript-and-why-you-should-on-windows-11-version-24h2-2024-update" rel="nofollow noopener" target="_blank">windowscentral.com/software-ap…</a> <a href="https://friendica.ramoonus.nl/search?tag=VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> <a href="https://friendica.ramoonus.nl/search?tag=InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a>
餓鬼<p><span class="h-card"><a href="https://mstdn.jp/@zetamatta" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>zetamatta</span></a></span> <a href="https://mstdn.nere9.help/tags/JUSTSYSTEM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JUSTSYSTEM</span></a> <a href="https://mstdn.nere9.help/tags/%E4%B8%80%E5%A4%AA%E9%83%8E" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>一太郎</span></a> は、2006からOpen Document形式の読み書きに対応し、 <a href="https://mstdn.nere9.help/tags/OLE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OLE</span></a> での操作に対応しているようです</p><p>一太郎2020をVBScriptから動かしたメモ <a href="https://mstdn.nere9.help/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> - Qiita <a href="https://qiita.com/qsuke92/items/89b32c7d5b927c0b2930" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">qiita.com/qsuke92/items/89b32c</span><span class="invisible">7d5b927c0b2930</span></a></p><p>一太郎2006 オンラインカタログ:一太郎2006がOpenDocument形式に対応! <a href="https://www.ichitaro.com/2006/opendoc/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="">ichitaro.com/2006/opendoc/</span><span class="invisible"></span></a></p>
Odot<p>Began working on some vbscript. Easy syntax to learn for sure. Will began working more with constants for sure. This is incredible.</p><p><a href="https://mastodon.social/tags/vbscript" class="mention hashtag" rel="tag">#<span>vbscript</span></a> <a href="https://mastodon.social/tags/developer" class="mention hashtag" rel="tag">#<span>developer</span></a></p>
ひだお@.dev<p><code>CreateObject("InternetExplorer.Application").Visible=true</code><span><br>と書いたテキストファイルを拡張子</span><code>.vbs</code>で保存して、ダブルクリックするとクリーンインストールした Win11 でもきれいに ie11が起動しますね。ここの受け売りですが。<a href="https://misskey.dev/tags/ie11RTA" rel="nofollow noopener" target="_blank">#ie11RTA</a><span> <br><br>Windows11でInternet Explorer11を起動する方法 </span><a href="https://misskey.dev/tags/VBScript" rel="nofollow noopener" target="_blank">#VBScript</a><span> - Qiita<br></span><a href="https://qiita.com/lumin/items/bd2a8e90efb4010e2804" rel="nofollow noopener" target="_blank">https://qiita.com/lumin/items/bd2a8e90efb4010e2804</a></p>
MrCopilot<p>2024 out here answering IT &amp; Security worker's 35 year old daily prayers:</p><p>" <a href="https://mstdn.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> is also removing the scripting language <a href="https://mstdn.social/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> ."</p><p>In the upcoming now optional <a href="https://mstdn.social/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> 24H2 update.</p>
餓鬼<p><a href="https://mstdn.nere9.help/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> でファイルダイアログ型のフォルダ指定ダイアログを開きたくなったが、COMの深淵に潜らなければならなさそうなので逃げだした</p>
餓鬼<p><a href="https://mstdn.nere9.help/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> でInternet Explorerを召喚するような技ですこ <a href="https://mstdn.nere9.help/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mstdn.nere9.help/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> <a href="https://mstdn.nere9.help/tags/InternetExplorer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetExplorer</span></a></p><p>古い「エクスプローラー」をWindows 11でお手軽召喚! ツールもレジストリ編集も不要 - やじうまの杜 - 窓の杜 <a href="https://forest.watch.impress.co.jp/docs/serial/yajiuma/1598032.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forest.watch.impress.co.jp/doc</span><span class="invisible">s/serial/yajiuma/1598032.html</span></a></p>
Zeroday Podcast (stefan)<p>Hat jemand eine Idee, wie ich async eine Datei (1200MB) in den Arbeitspeicher einlesen kann, wenn ich nur VBS und VBA zur Verfügung habe? Aktuell dauert mir das einlesen in ein Array viel zu lange. </p><p>Fopen bietet leider keine Möglichkeit den handle über Prozesse zu teilen. <br>Die Reihenfolge der Daten im Array ist egal, da die Zeilen nummeriert sind(ID in Feld 0).</p><p><a href="https://podcasts.social/tags/vba" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vba</span></a> <a href="https://podcasts.social/tags/vbs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vbs</span></a> <a href="https://podcasts.social/tags/vbscript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vbscript</span></a> <a href="https://podcasts.social/tags/kraftakt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kraftakt</span></a> <a href="https://podcasts.social/tags/aufreger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aufreger</span></a> </p><p>Ich Frage für einen Freund ;) 😜</p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a>: Fahrplan für das <a href="https://social.tchncs.de/tags/VBS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBS</span></a>-Ende steht | heise online <a href="https://www.heise.de/news/Microsoft-legt-Fahrplan-fuer-VBS-Ende-vor-9729749.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-legt-F</span><span class="invisible">ahrplan-fuer-VBS-Ende-vor-9729749.html</span></a> <a href="https://social.tchncs.de/tags/VisualBasicScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VisualBasicScript</span></a> <a href="https://social.tchncs.de/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a></p>
RF Wave<p>Microsoft to deprecate VBScript.</p><p>VBScript is a very old scripting language built into Windows. VBScript will become an on-demand feature in the second half of 2024, and it will eventually be removed. PowerShell will be the modern successor.</p><p>Administrators are advised to plan to transition any old VBScripts to PowerShell scripts.</p><p><a href="https://mstdn.ca/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mstdn.ca/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mstdn.ca/tags/deprecation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>deprecation</span></a> <a href="https://mstdn.ca/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a></p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-start-killing-off-vbscript-in-second-half-of-2024/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-to-start-killing-off-vbscript-in-second-half-of-2024/</span></a></p>
Scripter :verified_flashing:<p>Microsoft: Fahrplan für das VBS-Ende steht | heise online<br><a href="https://heise.de/-9729749" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">heise.de/-9729749</span><span class="invisible"></span></a> <a href="https://social.tchncs.de/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> <a href="https://social.tchncs.de/tags/VBS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBS</span></a></p>
Vladimir Savić<p>Good riddance?!</p><p><a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="tag">#<span>Microsoft</span></a> to start killing off <a href="https://mastodon.social/tags/VBScript" class="mention hashtag" rel="tag">#<span>VBScript</span></a> in second half of 2024 <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-start-killing-off-vbscript-in-second-half-of-2024/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-to-start-killing-off-vbscript-in-second-half-of-2024/</span></a></p>
WinFuture.de<p>Das Ende von <a href="https://mastodon.social/tags/VBScript" class="mention hashtag" rel="tag">#<span>VBScript</span></a> hat jetzt endlich auch einen Zeitplan. Schon mit Windows 11 24H2 greift die erste Stufe. <a href="https://winfuture.de/news,142996.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,142996.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Josh Lemon<p>If you got all excited about <a href="https://infosec.exchange/tags/VBScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VBScript</span></a> being removed from Windows..... remember that's not happening until somewhere "around 2027" 😂</p><p>Threat Actos are still happy hiding it in malicious lnk files today.</p><p><a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/vbscript-deprecation-timelines-and-next-steps/ba-p/4148301" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcommunity.microsoft.com/t5</span><span class="invisible">/windows-it-pro-blog/vbscript-deprecation-timelines-and-next-steps/ba-p/4148301</span></a></p>