Just don't break the core security tenets ...
Harness the power of the command line on Windows.