
上QQ阅读APP看书,第一时间看更新
Running the script
We have come a long way since our first script, as this version now does the following:
- Provides us with USB device information about the first installation time of a device on Windows 7
- Resolves additional device information using VID and PID data
- Prints output to the console in a format that is legible and informative
The following is an example execution of the script and illustration of the output:

The following screenshot has been included to highlight some of our storage devices further down the output:
