{"height":"190","width":"100%","provider_name":"Hatena Blog","categories":["PowerShell"],"blog_title":"\u3060\u3081\u3067\u3082\u3044\u3044\u304b\u3089\u3084\u3063\u3066\u307f\u308b","image_url":null,"published":"2014-02-18 22:55:36","provider_url":"https://hatena.blog","type":"rich","title":"Windows+PowerShell\u3067\u30ea\u30e2\u30fc\u30c8PC\u4e0a\u3067\u3001\u4efb\u610f\u306e\u30b3\u30de\u30f3\u30c9\u3092\u5b9f\u884c\u3059\u308b\u3002","version":"1.0","description":"RemotePC\u4e0a\u3067\u4efb\u610f\u306e\u30b3\u30de\u30f3\u30c9\u3092\u5b9f\u884c\u3059\u308b \u4ee5\u4e0b\u306ePowerShell\u30b9\u30af\u30ea\u30d7\u30c8\u3092\u30d5\u30a1\u30a4\u30eb\u3068\u3057\u3066\u4fdd\u5b58\u3059\u308b\u3002 \u3053\u3053\u3067\u306f\u300cRemoteCommand.ps1\u300d\u3068\u3059\u308b\u3002 Param( $computer, $username, $passwd, $command ) $password = ConvertTo-SecureString $passwd -asplaintext -force $cred = New-Object System.Management.Automation.PsCredential $username,$password invoke-command -Computer\u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fmataro777.hateblo.jp%2Fentry%2F2014%2F02%2F18%2F225536\" title=\"Windows+PowerShell\u3067\u30ea\u30e2\u30fc\u30c8PC\u4e0a\u3067\u3001\u4efb\u610f\u306e\u30b3\u30de\u30f3\u30c9\u3092\u5b9f\u884c\u3059\u308b\u3002 - \u3060\u3081\u3067\u3082\u3044\u3044\u304b\u3089\u3084\u3063\u3066\u307f\u308b\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"mataro777","blog_url":"https://mataro777.hateblo.jp/","url":"https://mataro777.hateblo.jp/entry/2014/02/18/225536","author_url":"https://blog.hatena.ne.jp/mataro777/"}