Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

2/18/2014

PogoPlug Multimedia Sharing Device

Filed under: Apple,Fun Work,Geek Work,Linux,Never trust a Network Admin with a screwdriver — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:56 am for you boring, normal people.
The moon is a Third Quarter Moon

I love this device!

Almost a year ago, I took a photography class from Syl Arena and he mentioned, in an off-hand comment, that he used a PogoPlug to access his files from home while on the road.  Now, I’d heard a little about the PogoPlug before that, but not much and with all the cloud storage services, like Dropbox, around, I didn’t really pay too much attention to it.  After hearing Syl go on at length about how easy it was to use, I read a little bit more about it.  I was suitably impressed, but just didn’t have the time or cash to really go ahead and follow through on a purchase.  Then, thanks to Gizmodo, I saw that Adorama had the entry-level PogoPlug on sale for $17.99, including free shipping.  The price has since gone up a dollar or two, but it’s still cheaper than full price and, let me tell you, completely worth it!

In brief, the PogoPlug is a network device that allows you to hook up USB-based drives to share on a network and the internet.  The device has six connections; one for power, one for the network cable, and four USB connections for storage.  I got mine hooked up in about five minutes.  Really, all you need to do is connect it to your network, attach storage to it and sign into your free my.pogoplug.com account to configure the device.  There’s an option once you sign in to check for new PogoPlug devices and, once yours is found, to configure the sharing services, if you want, or to upload files.  And, that’s pretty much all there is to the setup.  It really took me all of five minutes, and that was because I had forgotten to turn on the external USB hard drive enclosure I had attached to the PogoPlug.  Then, I just started uploading files.  And, the next day, to verify that I had done everything correctly, I signed in to the iPhone app while I was at the office and checked to make sure I could see my data remotely.  And, I could!  It really was just that easy!

I was even more excited when I discovered the slightly hidden ability to upload files directly to the PogoPlug without having to go through their webpage!  All I had to do was download and install the companion software which they offer for free.  They have both Android and iPhone clients as well as clients for Windows, Mac and Linux.  That downloadable software also let’s you do regular backups from any device you load it on to your PogoPlug, even over the internet!  Once installed, it makes your entire PogoPlug available to you as if it were a mapped drive with a drive letter and everything, just like any other network attached storage, except, of course, it will let you attach to that PogoPlug over the internet.  I’ve tried other things that claim they’ll let you have your own “personal cloud”, but they’ve all had problems when they bump up against the security I run on my network at home.  The PogoPlug, however, was even easier than advertised.  It was amazing!

There’s only one, small problem I’ve encountered with the PogoPlug and, really, it was only with the Android app.  I run a rooted Nook which I often use to read PDF files.  When I open PDF files through the Dropbox Android app, they launch right into Adobe’s PDF Reader without any issue.  But, when I try to do the same from the PogoPlug app on that rooted Nook, it gives me a message about downloading the file, but it never opens.  I hope that bug will be corrected in future versions of the app, but it’s a relatively minor issue, all things considered.

I really cannot say enough about how fantastic this device really is.  I haven’t tried just plugging in a regular USB thumb drive yet, or the outer limits on size, though I do have another USB drive enclosure and a 2 Terabyte drive that I’m itching to get hooked up.  Not to mention how deeply I want to dig into the software capabilities.  Also, I’m hoping I can get another cheap 2 Terabyte drive and figure out how to clone from one to the other to create a backup.
But, again, even if I can’t and I’ve seen all the possibilities of this device, it’s still awesome!
(And, yes, that link to Adorama which has sales information about the PogoPlug is an affiliate link, so I’ll make a little money of it if you buy it that way.)

10/17/2013

Photography 101 by Canon

Filed under: Art,Fun,Personal,Pressgram — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:05 am for you boring, normal people.
The moon is a Third Quarter Moon

Well, I’m back.

Blogging, and writing in general, is like having a case of scabies; it’s a persistent itch that just will not go away!
In any case, I’m safely married and my blushing bride is hard at work on her business, so I’m back at the blog and other writing projects.  Right now, I’m working on some personal documentation off-line, in the privacy of my own directory structure, but that may eventually get shared with the larger world.  Until then, though,…
Read More

9/10/2013

Against Digital Sharecropping

Filed under: Criticism, Marginalia, and Notes,Fun,Ooo, shiny...,Pressgram,Rotten Apples — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:16 pm for you boring, normal people.
The moon is a Third Quarter Moon

I like being free and independent.

I like the idea behind Instagram, but not the proprietary nature of it.
I don’t like giving up my rights to work I create.   Even when it’s just a little photo of a little moment captured with my iPhone.  I dislike, as Nicholas Carr called it on his blog, “digital sharecropping”. And, of course, now the ads have finally started on Instagram, solidifying my discomfort with it.  Why should I let them profit from even the smallest amount of my work without compensation?

Well, now, there’s a new program called Pressgram, that’s a free iPhone app, which allows an Instagram-like experience, but uploads the photos to my WordPress blog. You can upload them to your WordPress.com blog, or, as I do, to my self-hosted WordPress blog.  Word has it that there is an Android version in the works, too.  It’s a new app, so there are some on-going refinements, but it really is a great start, I think.

Obviously, I’ve been using it here and at my other site, JKHoffman.com, so I believe in it.  Yes, it took me a little fiddling to get the setting just the way I want and to sort out a couple other things, but, now that I have, I think this is going to work just fine.  I can already see the difference in my site stats!
Anyway, worth checking out if you’re leary of another ad-supported system that lets you share, but not much else.

9/6/2013

External USB Drive Array

Filed under: Geek Work,Pressgram — Posted by the Network Geek during the Hour of the Monkey which is mid-afternoon or 4:48 pm for you boring, normal people.
The moon is a Third Quarter Moon

My favorite new tech toy!
Recently, I cleaned up my office (by hiring my fiancé), and found a lot of older hard drives that needed to be wiped before I could dispose of them. [amazon_link id=”B003WV5DLA” target=”_blank” container=”” container_class=”” ]This little guy from Startech.com[/amazon_link] has really done the trick! I just pop a drive in, hit the power button for that slot, and I have a fresh, new drive available on my machine to format clean! Just that easy!

(You can find my fiancé’s business at The Organizing Decorator, by the way!)

Published via Pressgram

10/26/2012

Last Minute Costume

Filed under: Art,Fun,Red Herrings — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:22 am for you boring, normal people.
The moon is a Third Quarter Moon

So, here it is, almost time for Halloween Party weekend and you don’t have a costume?

What to do, what to do, eh?  Well, if  you have a t-shirt that you’re willing to sacrifice and a modicum of creative ability, and an iPhone or iPad or Android device, then you may be in luck.  Gizmodo covered a buy last year who used a pair of iPads to make a costume which seemed like he had a hole in his chest.  That was pretty awesome.  Well, after spending some time working on some Mars Rover project you may have heard about, that guy, Mark Rober, is back with a slightly less expensive alternative.  Rober and his team at DigitalDudz have come up with a pretty amazing app that lets you make a creative costume pretty cheap.  In fact, the app itself is free and, basically, consists of some pretty cool and creepy animations that you can combine with an old t-shirt, or one of the custom ones that they sell relatively cheap, to make a pretty cool costume.
The basic app is pretty amazing, but it does have “upgrades” which will cost a couple bucks more and, I have to admit, the t-shirts that they sell at DigitalDudz are better than anything I can whip up, even if I wasn’t in a hurry, but, hey, beggars can’t be choosers at this late date.

Anyway, it is a cool app and a cool idea.  Maybe for next year for me, though.
But, hey, it’s Friday, so why not check it out!  (And, no, I don’t get any money for those links.  I just liked it, so I linked it.)

10/12/2012

Book, with occasional music

Filed under: Art,Fun,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:55 am for you boring, normal people.
The moon is a Third Quarter Moon

Do you hear music when you read?

No, I don’t mean, “Do play music while you read?”, but, rather, do you hear music, like a movie soundtrack while you read a book?  I know for awhile, I was so immersed in movies and the movie experience that I couldn’t help hearing certain kinds of background noise and sound effects when I read certain kinds of books.  But, what if that happened on purpose?  What if you had a way to synchronize an actual soundtrack, complete with mood music and sound effects, with the book you were reading?

Well, if you read books on your Mac, PC, iPad, iPhone or Android-based e-reader, you actually can, thanks to Booktrack.  They’ve developed an app that will run on all those platforms which will adapt a soundtrack for your book, complete with sound effects, to how fast you read.  The download is free and I’m not sure if there’s a “training period” where the app learns your regular reading speed, but I sure do like the idea!  I’m sure the selection of books is a little limited right now, but, with any luck, more people will show interest and more books will get added to their list.

So, what the heck, it’s Friday!  Turn your volume down and go check it out!

8/17/2012

6 Personal Finance Apps

Filed under: Advice from your Uncle Jim,Fun,Fun Work,Life Goals,Never trust a Network Admin with a screwdriver — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:54 am for you boring, normal people.
The moon is a Third Quarter Moon

Can we ever have enough money?

Or be too thin or too good looking?  Well, I don’t know, but I do know that I’ve struggled at times with money.  It seems to slip through my fingers like water.  The harder I squeeze to hold on to it, the faster it seems to slip away.  But, I know that about myself, so I do what I can to stop the bleeding, so to speak.  For me, the first step is tracking where it all goes.  And, I mean, tracking every last dime.  Nothing is too small or too big to count.  Back in the day, I used to record every 50¢ can of soda I had at lunch and could tell you, to the penny, how much money I had in my pocket at any given moment.
Sadly, that was some time ago and I’ve slipped back into some of my old ways.  But, now, at least, I know how to tackle the problem.  In my case, the tool I use to capture my financial info has been Quicken, though I need the newest version still.  What’s changed since I had this problem last, though, is the miracle of smart phones.  So, I was quite thrilled to see PC Magazine review 6 personal finance apps.  I use an iPhone, so I tend to focus on iPhone apps, like those reviewed in the article, though I’m sure there are plenty of Android apps, too.

I’m not sure I’m ready to trust an app that synchronizes with a website, like Mint.com, for my personal finance needs, but some of the other ones reviewed looked interesting to me.
So, how about you all?  What do you use to keep track of your finances?

(Yeah, I know, not quite as “fun” as my regular Friday links, but I’ve been thinking about a more serious Tuesday post that just features tools of various kinds that I’ve used.  Thoughts on that would be welcome in the comments, too!)

 


Advice from your Uncle Jim:
"Unhappiness is in not knowing what we want and killing ourselves to get it."
   --Don Herold

10/7/2011

QR Codes For The Road

Filed under: Art,Fun,Life, the Universe, and Everything,On The Road — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:59 am for you boring, normal people.
The moon is a Third Quarter Moon

I guess QR codes aren’t quite dead yet!

Back in the day, hobos, or “gentlemen of the rails”, used to use a kind of code that let other hobos know important information.  For instance, if they marked a cat-like symbol on a fence, it meant that a kind-hearted woman lived at that house and might give a hungry drifter food.  Or, three diagonal lines means that the place is unsafe and a hobo should get out of there as quickly as they can.  (You can see more codes on Wikipedia.)
Well, someone has updated that for the modern world and smart phones.  That’s right, someone has made QR Code Hobo Codes.  Now, you can just print up templates and spray them with paint out there in the world and people can shoot them with their iPhone, or Droid, or whatever, and see the information.  And the codes have been updated for modern life, too!  Now, they’ve added things like “bad coffee”, “dangerous homophobes”, “camera perverts”, “no outlets”, and “insecure wifi”, among others.

So, who knew?!
Now, while you’re out adventuring this weekend, keep an eye out for QR codes to scan!  You may find some interesting things along your way!
Have a great Friday and enjoy your weekend!

5/29/2011

DNS Redirect Attack

Filed under: Geek Work,News and Current Events,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 12:34 pm for you boring, normal people.
The moon is a Third Quarter Moon

I’m seeing traffic about this, so I thought I’d write up what I found.

I tweeted about a strange DNS-based network/malware attack that I saw on Friday, but, at the time, I didn’t see any interest, so I didn’t go into any real details.  Besides, I may be a hardcore geek, but I do have a life and was going out.  But, now, I’m seeing search engine traffic hitting my blog apparently looking for details, so I thought I’d describe the attack, as I saw it.

First of all, let me mention that I’ve seen a higher-than-usual occurrence of malware infections the past couple of weeks.  I mean, it’s a hazard of my business that, sooner or later, people are going to get infected, either through bad behavior or by accident, but the past three weeks or so I’ve seen way more problems like that than is even remotely normal.  So, bearing that in mind, I’ve been on a kind of high-alert status looking for any malware problems, but this was something new.

It started with someone from another location, who’s on a totally, physically separate network which uses a different internet service provider to connect to the Internet, calling me with a problem.  It was, apparently, a recurrence of a virus he had previously that we cleaned.  He described being taken to a webpage that featured a maroon graphic background with a white icon of a policeman holding up his hand to indicate “stop”.  The text on the page gave a message that said the user’s browser was not the correct version to access the page and that an upgrade was required.  Helpfully, it provided a button to press to receive the “upgrade”.  Obviously, the “upgrade” was an infection.  (You can see an example of the graphic here.)  Thankfully, I trained my users well enough to be suspicious of these kinds of things and no one who reported this actually clicked on it.

About the same time this happened, I noticed that my iPhone wasn’t connecting to the wifi hotspot I have setup in my office.  I checked the configuration and noticed that the DNS servers listed were wrong.  In fact, they’d all been replaced with a single DNS server; 188.229.88.7  Obviously, that seemed suspicious to me, so I opened a command prompt on my PC and did a tracert to see if I could figure out where this server was and, from that, why it had become the default DNS server on part of my network, despite my having very carefully configured totally different DNS servers that I knew were safe.  It looked like the tracert results showed me a network path that led out of the country somewhere, which was, to me, very suspicious.

Before I could really pursue that, though, I got another call from a user at my location reporting the exact same error message and graphic, but going to a totally different website! I went to his computer and checked the IP configuration and found that his DNS servers had been replaced by the rogue server as well.  I refreshed his network config, several times actually, and the DNS servers reset, but, when I thought to check some other people in the same area of the building, his configuration set itself back to the rogue DNS server!  So, I reset the local network equipment to clear the DNS cache, and whatever other caches may have gotten poisoned by this attack, and the problem seemed to go away.  Unfortunately, whatever had caused the compromise was still active and seemed to poison the DNS cache and the DNS configuration again.  It did seem sporadic, though, as if the ISP was trying to correct the issue at their end.

As far as I can tell, the attack actually seemed to be network-based in some way.
At least, I couldn’t find any computer on my network that was infected with anything that AVG, Norton Anti-virus, or Malware Bytes could find.  It is, I suppose, possible, that this attack was so new that no of those programs had an updated detection pattern for it, but, based on the lack of detection, and the fact that it happened on two physically separate networks almost simultaneously, leads me to believe that this was a network-based attack.  I suspect that an ARP cache or DNS cache or something similar was attacked and compromised on a major network router somewhere.  Possibly one of the edge routers at a trans-continental connection somewhere.  From the tracert results I had, it looked like it was the East Coast somewhere, leading to Europe via London to France, though I could be wrong.  It’s possible that was a blind alley meant to throw researchers off the trail in some way.
Also, as of this writing the rogue DNS server seems to be out of commission, though that might change, too.

The Internet is a wild and wooly place, ladies and gents, and you can’t always count on your friendly, neighborhood Network Geek to watch over you and keep you safe!  So, be careful out there!
(And, if you’re a fellow professional who’s seen this, too, leave me comments and tell me what you found!)
UPDATE: Looks like the server is still active, but my ISP has blocked DNS traffic to it, to fix the problem.
Also?  I hate the bastards that do these things.  I hate every last one of the little rat bastards!

UPDATE/FOLLOW-UP: So, it seems like a lot of people have been effected by this problem!
Check the comments for what other folks did and tools they might suggest to help with the problem.  Frankly, I wish I’d had known about those tools when I started my day!  Yes, I was *totally* wrong when I said it looked like it was coming in from outside the routers.  It was, in fact, *several* PCs that were infected with whatever it was.  I found it, much like at least one commenter, by checking the results of “ipconfig /all” in a command prompt.  I noticed that the DHCP server listed in the config was NOT my actual DHCP server!  So, as I went from machine to machine, I saw several PCs that kept coming up as DHCP servers.  I used Malware Bytes to scan the infected PCs and it seemed to clean them off.  At least, for now.  I’m not sure what I’ll find in the morning.
Apparently, Friday, when it looked like the problem was getting cleaned up, it was really just people shutting their workstations down early for the long weekend.
In any case, as at least one commenter has mentioned, it looks like updates for the various scanners should be coming out this week, so keep updating your antivirus and antispyware programs and scan your networks!  Well, scan them more completely and carefully than you already have.
And, as always, if you have any new information or suggestions for tools to clear up the issue, please, leave them in the comments!

5/19/2011

Mac Malware

Filed under: Apple,Geek Work,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 7:03 pm for you boring, normal people.
The moon is a Third Quarter Moon

I told you Macs weren’t safe!

Does anyone listen to me?  No.  Well, hardly ever.
I’m sure you’ve seen the news by now that there are growing numbers of Mac malware attacks.  In fact, Apple Care, the official Apple customer service division, has reported a staggering jump in the number of malware related calls they received in just the past several weeks.  Apparently, according to the interview, it’s gotten to be quite a large problem in just that short amount of time.  They estimate that, now, up to 50% of all calls they get are related in some way to a malware attack on an Apple product.  The indication from the article is that everything is focused on Mac OS X machines, but, with larger market share comes a bigger prize for hackers, so don’t be surprised if iPhones and iPads and even iPods are attacked next!
Of course, what makes matters worse is that, allegedly, Apple Care representatives are being told not to help with malware attacks!  So, all that safety you thought you were buying with Mac?  Apparently, not the best investment.  Of course, security through obscurity never is.

So far, the threat seems to be confined to a single, aggressive bit of malware called MacDefender.  Go to the link and you’ll see a screenshot of what it looks like when it tries to install.  It looks just like a standard Mac program, right from Apple.  This is the same tactic that Windows users have been facing for years.  There’s nothing new here, outside of a new installed base of users who have never had to deal with malware before.  Mac users must look like sheep ready for fleecing to these crooks.  So, if you know Mac users, warn them and spread the word.

For those of you lucky enough to have escaped harm so far, buy and install an antivirus product and keep it up to date.
For those of you who haven’t been lucky, here’s a link to a MacDefender Malware Removal Guide. (Thanks, @joefarace!)

Incidentally, I’ve been talking about this for years.  I knew it would happen eventually, but, hey, who am I?  I mean, besides a front-line grunt that cleans up everyone’s machine when they get infected with digital herpes.  Not being a “pundit” or “respected industry figure” just means that no one takes you seriously, not that we don’t know what we’re talking about.  Because, believe me, I’m not the only network geek in the trenches who saw this coming.  We ALL did, but no one listens.

Like I wrote earlier, get the word out and show Mac users what they might expect before they get hit.
The day you save may be your own!

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.