[新手上路]批处理新手入门导读[视频教程]批处理基础视频教程[视频教程]VBS基础视频教程[批处理精品]批处理版照片整理器
[批处理精品]纯批处理备份&还原驱动[批处理精品]CMD命令50条不能说的秘密[在线下载]第三方命令行工具[在线帮助]VBScript / JScript 在线参考
返回列表 发帖

[转载代码] [PowerShell每日技巧]保存敏感数据(20140404)

If you wanted to store sensitive data in a way that only you could retrieve it, you can use a funny approach: convert some plain text into a secure string, then convert the secure string back, and save it to disk:
  1. $storage = "$env:temp\secretdata.txt"
  2. $mysecret = 'Hello, I am safe.'
  3. $mysecret |
  4.   ConvertTo-SecureString -AsPlainText -Force |
  5.   ConvertFrom-SecureString |
  6.   Out-File -FilePath $storage
复制代码
Your secret was automatically encrypted by the built-in Windows data protection API (DPAPI), using your identity and your machine as encryption key. So only you (or any process that runs on your behalf) can decipher the secret again, and only on the machine where it was encrypted.

To get back the secret, try this:
  1. $storage = "$env:temp\secretdata.txt"
  2. $secureString = Get-Content -Path $storage |
  3.   ConvertTo-SecureString
  4. $ptr = [System.Runtime.InteropServices.Marshal]::SecureStringToGlobalAllocUnicode($secureString)
  5. $mysecret = [System.Runtime.InteropServices.Marshal]::PtrToStringUni($ptr)
  6. $mysecret
复制代码
It works--you get back the exact same text that you encrypted before.

Now, try the same as someone else. You will see that any other user cannot decrypt the secret file. And you won't be able to, either, when you try it from a different machine.

http://powershell.com/cs/blogs/tips/archive/2014/04/04/storing-secret-data.aspx

返回列表