(0 comments, 4 posts)
Active as an System Engineer @ AMIS Services for nearly 5 years. Responsible for the IT automation, and designer of the network AMIS Services is operating from. Supporting the Developers @ AMIS with network, security and opperating system know-how. Usually found maintaining the OTAP systems and loves playing Network-Janitor...
Home page: http://www.amis.nl
Posts by Chris Gralike
Nope, it’s not your browser, HTML debugging proxy or broken CSS style sheet. You are still visiting the AMIS technology weblog. Donâ€™t be afraid: AMIS has just updated it with some new features and a new theme. And well, there are some differences for you to marvel at.
You might wonder, What’s new?
Well, first off we implemented the Mystique theme into our weblog. It implements a lot of the features we wanted in the first place without too much of a hassle. Do check the the nice AJAX driven components. Also check the developer’s website of this beauty using the URL in the footer.
Next to that we implemented an AMIS Tweet: a nice way for you guys to follow our developers in their day-to-day business. Itâ€™s a custom-styled Tweet-Tracker plugin for WordPress that allows us to use a Twitter search string over multiple accounts instead of only one.
One of the most important changes is the one where we allow you guys to register on our blog and interact with us through that account. Naturally your comments donâ€™t need to be reviewed and will be displayed immediately, which should reduce the interaction time drastically. You are also allowed to upload your own avatar and More >
Oracle heeft zijn nieuwe database release – 11g Release 2 – begin deze maand vrijgegeven. AMIS heeft als deelnemer aan het beta-traject al geruime tijd met deze release kennis kunnen maken. We organiseren op dinsdag 29 september een AMIS Query sessie waarin we van deze eerste ervaringen verslag doen. Niet zozeer in marketing-kreten maar vooral in echte praktijk-voordelen.
When confronted with microsoft security there are still some things you just cant do even if your administrator. There obviously is a very good reason for it (usually these things break your system), But there are ways to get passed it. Obviously this is also a nice way to explain a nice feature in windows wich allows you to create your own services, so lets get on with it.
First the basics,
A windows service is actually an entry in the windows registry that is being used by the so called "NT Service Controller and services" to identify the binairies to run and the manner in wich to run them. To manipulate the NT Service controller and services a tool is introduced in windows by default that allows the user (or an application) to install new services, manipulate existing ones, query services and service states, or delete them.
As one might now one can controll allot of these features in the windows GUI also called the MMC "Microsoft Management Console" Services plugin. One of the features one can controll is the user under wich the service is started. Also the way the service should start, like on-demand, or boot, or simply disabled. All these features can also be changed altered More >
I have written this article over and over again, looking for a way to keep the depth of technical information leveled for the intended audience. I found it almost impossible to write this article in such a fashion, that It would be interesting for more then network administrators and system engineers. Another consideration is the damage that could be done with this knowledge if it is being published publicly for untrained persons. Taking this in consideration I tried to describe the baseline leaving links and handouts for those that want to know more on the subject. And some general warnings on the tools I share in this article. But before I kick off, I might be nice to know why this article is written in the first placeâ€¦
A few months back I was asked to have a look at possible studies to follow and to find out if it would benefit our company and customers. One of these studies was introduced as CEH, Certified Ethical Hacker. We almost thought it to be a joke, this because these things just donâ€™t seem to go together. Ethical and Hacker, Breaking security and acquiring information based on ethical motivations. To convince us that this study might offer new insights and views on More >