Security Overview of AWS Lambda March 22, 2019, 4:15 p.m.

This whitepaper presents a deep dive of the AWS Lambda service through a security lens. It provides a well-rounded picture of the service, which can be useful for new adopters, as well as deepening understanding of AWS Lambda for current users.

security aws lambda

The Night Watch March 8, 2019, 8:27 a.m.

Pointers are real. Theyā€™re what the hardware understands. Somebody has to deal with them. You canā€™t just place a LISP book on top of an x86 chip and hope that the hardware learns about lambda calculus by osmosis. Denying the existence of pointers is like living in ancient Greece and denying the existence of Krackens and then being confused about why none of your ships ever make it to Morocco

funny programming pdf

Cynefin Framework March 6, 2019, 11:11 a.m.

Cynefin offers four decision-making contexts or "domains": simple, complicated, complex, chaotic, and a centre of disorder. The domains offer a "sense of place" from which to analyse behaviour and make decisions. The domains on the right, simple/obvious and complicated, are "ordered": cause and effect are known or can be discovered. The domains on the left, complex and chaotic, are "unordered": cause and effect can be deduced only with hindsight or not at all.

reading interesting

So what exactly is the CLIUSR account? Nov. 14, 2018, 12:03 p.m.

This local ā€œuserā€ account is not an administrative account or domain account. This account is automatically created for you on each of the nodes when you create a cluster or on a new node being added to the existing Cluster. This account is completely self-managed by the Cluster Service and handles automatically rotating the password for the account and synchronising all the nodes for you. The CLIUSR password is rotated at the same frequency as the CNO, as defined by your domain policy.

windows sql server

The AD Recycle Bin: Understanding, Implementing, Best Practices, and Troubleshooting Nov. 12, 2018, 11:06 a.m.

Starting in Windows Server 2008 R2, Active Directory now implements a true recycle bin. No longer will you need an authoritative restore to recover deleted users, groups, OUā€™s, or other objects. Instead, it is now possible to use PowerShell commands to bring back objects with all their attributes, backlinks, group memberships, and metadata.

active directory sysadmin

Cluster and Stale Computer Accounts Nov. 12, 2018, 8:38 a.m.

A Failover Cluster does not update the lastLogonTimeStamp the same way as a real computer. A cluster updates the lastLogonTimeStamp when it brings a clustered network name resource online. Once online, it caches the authentication token. Therefore, a clustered network named resource working in production for months will never update the lastLogonTimeStamp. This appears as a stale computer account to the AD administrator.

active directory sysadmin sql server

Global Object Access Auditing is Magic Nov. 1, 2018, 3:55 p.m.

Global auditing lets you create System Access Control Lists (SACL) for the entire computer, based on file and registry. This means that instead of manually altering and maintaining SACLs on 10TB of shared files, you can instead define them implicitly and not actually modify the files at all. You can then troubleshoot an unexplained file deletion, see who keeps changing permissions on a folder, or satisfy an auditor.

active directory security windows group policy

Getting the Effective Audit Policy in Windows Nov. 1, 2018, 3:50 p.m.

You should not trust any of the Group Policy reporting tools when it comes to audit settings. Thereā€™s only one safe bet and itā€™s this command: auditpol.exe /get /category:*

active directory security windows group policy

Relation of InheritanceFlags and PropagationFlags to the ApplyTo values in the PermissionEntry Oct. 26, 2018, 3:17 p.m.

Permissions can be applied to the current folder, sub folders or files within folders and sub folder, or any combination of these. For every access rule there are two flags (InheritanceFlags and PropagationFlags) which together supports all possibilities.

security windows

How to perform a packet capture in Windows using netsh Oct. 25, 2018, 3:53 p.m.

Start the capture with netsh trace start capture=yes tracefile=foo.etl Stop the capture with netsh trace stop. Two files are created: foo.cab and foo.etl. These files can be opened with Microsoft Message Analyzer. Once the file has been loaded into Message Analyzer you can export it to pcap to view in Wireshark.

tutorial windows networking

Microsoft Message Analyzer Oct. 25, 2018, 3:49 p.m.

Message Analyzer enables you to capture, display, and analyze protocol messaging traffic; and to trace and assess system events and other messages from Windows components.

windows tools

Working with upcoming posts in Jekyll Oct. 14, 2018, 7:54 p.m.

With published settings (published: false), with future dated posts (jekyll serve --future), with drafts folder (jekyll serve --drafts).

jekyll blog

Ansible Debug Print All Variables Oct. 5, 2018, 10:31 a.m.

Display all variables/facts known for a host

- name: Display all variables/facts known for a host
  debug:
    var: hostvars[inventory_hostname]
ansible debugging

Troubleshooting Group Policy Using Event Logs Sept. 28, 2018, 8:53 a.m.

Most of the events in the Group Policy operational log appear in pairs. For each start event, there is an end event. End events can be successful, warning, or error events. Usually these events share the last two digits in their event ids. For example, a 4017 event appears in the event log, which represents a Group Policy component beginning a specific action. If the action completes successfully, then the Group Policy service records a 5017 event. If the action completes with errors or fails then the Group Policy service records a 6017 or 7017 event, respectively. Policy processing events use the same numbering scheme for warning and error events messages in the 8000ā€“8007 range for Group Policy success events. You can use these numbering patterns to quickly identify warning and failure events in the Group Policy operational log.

active directory windows group policy

CRUD: When to use Create, Replace, Update or Delete in Group Policy Preferences? Sept. 17, 2018, 5:12 p.m.

Here is a quick run-down of how Create, Replace, Update andĀ Delete behave in Group Policy Preferences.

active directory windows group policy

List Group Policy Client Side Extensions Sept. 4, 2018, 3:50 p.m.

The order of Client Side Extensions are the order you see in the registry, and that is the order you see in my list as well. But, yes normally there is a but as well Smile the first CSE to be applied is {35378EAC-683F-11D2-A89A-00C04FBBCFA2}, this is the one for Registry/Administrative Templates this also includes if you write an ADMX template on your own, this will be applied first.

function Get-GPClientSideExtensions {
    Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions" | foreach {
        $guid = ($_.Name).Split("\") | Select -Last 1
        $props = Get-ItemProperty $_.PSPath

        # Guessing CSE name in order (default), ProcessGroupPolicy, ProcessGroupPolicyEx
        if ($props.'(default)') {
            $description = $props.'(default)'
        } elseif ($props.ProcessGroupPolicy) {
            $description = $props.ProcessGroupPolicy
        } elseif ($props.ProcessGroupPolicyEx) {
            $description = $props.ProcessGroupPolicyEx
        } elseif ($gpeGuid = "{35378EAC-683F-11D2-A89A-00C04FBBCFA2}") {
            $description = "Administrative Templates"
        } else {
            $description = "Error guessing CSE name"
        }

        [PSCustomObject] @{
            GUID = $guid
            Description = $description
        }
    }
}
active directory powershell group policy

Borg, Omega, and Kubernetes July 31, 2018, 8:53 a.m.

Though widespread interest in software containers is a relatively recent phenomenon, at Google we have been managing Linux containers at scale for more than ten years and built three different containermanagement systems in that time. Each system was heavily influenced by its predecessors, even though they were developed for different reasons. This article describes the lessons weā€™ve learned from developing and operating them.

reading kubernetes containers google pdf

Connect to SQL Server When System Administrators Are Locked Out July 19, 2018, 2:15 p.m.

Start the instance of SQL Server in single-user mode by using either the -m or -f options. Any member of the computer's local Administrators group can then connect to the instance of SQL Server as a member of the sysadmin fixed server role.

security sysadmin sql server

A Tutorial Introduction to Kubernetes July 6, 2018, 8:57 a.m.

Kubernetes is the hottest kid on the block among container orchestration tools right now. In this tutorial, I want to document my journey of learning Kubernetes, clear up some points that tripped me as a beginner, and try to explain the most important concepts behind how it works.

tutorial devops reading sysadmin kubernetes