Update README.md

This commit is contained in:
minster586
2025-10-15 02:15:44 -04:00
parent a0616024ea
commit c25ccc054e

View File

@@ -62,12 +62,12 @@ pwsh.exe -File .\Get-SystemSecurityAndHardwareInfo.ps1 -OutputFile report.txt
- Download and run directly from a raw GitHub URL (only if you trust the URL): - Download and run directly from a raw GitHub URL (only if you trust the URL):
- Execute directly (preferred when you trust the source): - Execute directly (preferred when you trust the source):
```powershell powershell
# Option A (safest single-line): fetch only the script text and pipe into pwsh for execution. # Option A (safest single-line): fetch only the script text and pipe into pwsh for execution.
(iwr -UseBasicParsing "https://git.smartcraft.me/Smartcraft-Media-Tech/System-Info/raw/branch/master/System%20Info%20%28ps1%29/Get-SystemSecurityAndHardwareInfo.ps1").Content | & pwsh -Command - ```(iwr -UseBasicParsing "https://git.smartcraft.me/Smartcraft-Media-Tech/System-Info/raw/branch/master/System%20Info%20%28ps1%29/Get-SystemSecurityAndHardwareInfo.ps1").Content | & pwsh -Command -
```
# Option B (forces pwsh, similar to above but uses the response pipeline): # Option B (forces pwsh, similar to above but uses the response pipeline):
iwr -UseBasicParsing "https://git.smartcraft.me/Smartcraft-Media-Tech/System-Info/raw/branch/master/System%20Info%20%28ps1%29/Get-SystemSecurityAndHardwareInfo.ps1" | & pwsh -Command - ```iwr -UseBasicParsing "https://git.smartcraft.me/Smartcraft-Media-Tech/System-Info/raw/branch/master/System%20Info%20%28ps1%29/Get-SystemSecurityAndHardwareInfo.ps1" | & pwsh -Command -
``` ```
Security note: `iwr | iex` downloads and immediately executes code from the given URL. Only run such commands for sources you fully trust. A safer approach is to download the file, inspect it, then execute it locally: Security note: `iwr | iex` downloads and immediately executes code from the given URL. Only run such commands for sources you fully trust. A safer approach is to download the file, inspect it, then execute it locally: