From 17c8449d8928ba9cebb1fd869f6a60bc407d6959 Mon Sep 17 00:00:00 2001 From: minster586 <43217359+minster586@users.noreply.github.com> Date: Tue, 14 Oct 2025 23:36:01 -0400 Subject: [PATCH] fix url --- System Info (ps1)/README.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/System Info (ps1)/README.md b/System Info (ps1)/README.md index d6af1b2..2d22bea 100644 --- a/System Info (ps1)/README.md +++ b/System Info (ps1)/README.md @@ -62,14 +62,13 @@ pwsh.exe -File .\Get-SystemSecurityAndHardwareInfo.ps1 -OutputFile report.txt - Download and run directly from a raw GitHub URL (only if you trust the URL): ```powershell -# Example using the iwr | iex pattern you provided (replace URL with this repo's raw file URL when publishing): -iwr -UseBasicParsing https://raw.githubusercontent.com///main/Get-SystemSecurityAndHardwareInfo.ps1 | iex + iwr -UseBasicParsing "https://git.smartcraft.me/Smartcraft-Media-Tech/System-Info/raw/branch/master/System%20Info%20%28ps1%29/Get-SystemSecurityAndHardwareInfo.ps1" | iex ``` Security note: `iwr | iex` downloads and immediately executes code from the given URL. Only run such commands for sources you fully trust. A safer approach is to download the file, inspect it, then execute it locally: ```powershell -iwr -OutFile .\Get-SystemSecurityAndHardwareInfo.ps1 https://raw.githubusercontent.com///main/Get-SystemSecurityAndHardwareInfo.ps1 + iwr -OutFile .\Get-SystemSecurityAndHardwareInfo.ps1 "https://git.smartcraft.me/Smartcraft-Media-Tech/System-Info/raw/branch/master/System%20Info%20%28ps1%29/Get-SystemSecurityAndHardwareInfo.ps1" # Inspect the file, then run: pwsh.exe -File .\Get-SystemSecurityAndHardwareInfo.ps1 -OutputFile my_report.txt ```