When you download or copy a file from the internet or any other untrusted source, Windows will set an extended attribute to mark the file as “blocked”. This is an important mechanism that stops the execution of potentially malicious code.…
Read More
Malware, ransomware, and hackers from around the globe are all over the news lately. PowerShell has long been a known vector for installing malware of various types. However, singling out PowerShell is not quite fair. If you do not remember…
Read More
In April 2020, we released a new tool, the SAPIEN Script Explorer. You can find the details here: https://www.sapien.com/blog/2020/04/06/introducing-the-sapien-script-explorer/.
The basic premise was to prevent users from having to associate script extensions (.ps1, .vbs, .js, etc.) with the ‘open’ verb…
Read More
Every now and then we get a forum post or an email from a customer bemoaning that PowerShell Studio associates the ‘open’ verb for Windows PowerShell script (.ps1) with itself.
Since the “open” verb is by default not associated with…
Read More