Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

9/13/2005

Work vs. Personal

Filed under: Apple,Criticism, Marginalia, and Notes,Geek Work,Life, the Universe, and Everything,Linux,MicroSoft,Novell,Personal,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Pig which is in the late evening or 10:06 pm for you boring, normal people.
The moon is a Third Quarter Moon

They’ve been waiting for me.
I can tell that the folks at my company have been waiting for a guy like me to show up. Today, I had three different persona PCs from three different employees in my cube. Mind, I mean three machines that they brought from home to have me look at for them, not machines from the office. Mostly, they just needed to be defragged and have their anti-virus files updated, but, c’mon, three? Obviously, these people have just been waiting for a “real” computer person to show up so that they can get me to do basic maintenance for them. Actually, come to think of it, I need to update my anti-virus signatures myself!
But, that doesn’t mean I have any less work that’s work related, either. Just this morning I was setting up a PC for yet another person from New Orleans. Which is a good thing, I guess, when you consider some of the alternatives. Of course, it would have been nice if they hadn’t promised that same cube to two different people without telling anyone. I was about to try and move his e-mail from the Windows 2000 machine he had in the office to his G4 Powerbook, but then we decided to take a “wait-and-see” stance instead. With all the miscommunication flying back and forth, we thought that was better. The chaos from Katrina has everyone sort of “runnin’ and gunnin'”, if you take my meaning, and that makes things extra challenging sometimes.
So, with all this craziness going on at the office, I find myself asking, “Should I be doing all this for people?” I mean, it’s not really my job, but the folks asking me to do this for them are the top-level managers. Should I be telling them “no”? I’d really rather not do that, since everyone seems to like me and the work I do for them. Granted, I’m not sure that most of them have any idea what I actually do on a day-to-day basis, but still, they seem pleased, so I’d rather not rock the boat.
Oh, and in recent updates, I did finally manage to get the satellite phone working, but now, since it took so long, we’re trying to return one. Not sure if we can do that at this point, but we’re trying. And, I’ve been messing around with all kinds of Windows 2000, NT and XP issues on the network. Getting all the folks from both offices working has been a bit of a challenge. In fact, if not for the DMZ port on my firewall, I’m not sure I could have had the two domains working together, since they’re named the same. I’m sure that would have caused problems if they’d seen each other on the network.
And, I really should be looking more closely at the version of Linux I want to run on that mythical server that I should be getting spec on. I’m leaning toward either Red Hat or SuSE, possibly even SuSE with all the Novell Open Enterprise Server stuff on it. I have to admit, if I were to get good install media, that could be really cool. All the stability and flexibility of Linux with the way cool administration tools from Novell. Those tools are, after all, what they’re known for developing. It’s the best “value added” product for Linux that I’ve seen so far.
Well, I guess I have some time before we’re really ready to do all that, so, while I wait, I’ll probably just read Sams Teach Yourself UNIX System Administration in 24 Hours, so that my skills are sharp when the time comes. But, now, I’m tired, so I think I’ll just go to bed.

3/1/2004

Review: Essential System Administration Pocket Reference

Filed under: Geek Work,Linux,Review — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:25 am for you boring, normal people.
The moon is a Third Quarter Moon

This book ROCKS!

Ahem. I know this is only the “pocket” version of this book, but Essential System Administration Pocket Reference is the best system admin book I’ve seen in a long time. Now, I’m relatively new to Unix system admin, but I’ve knocked around the industry for over ten years now, so I know a thing or two about sysadmin work. Usually, what I look for in a reference guide is either something quick and simple or with miles and miles of depth. If I’m new to a system, or I only administer it as a backup or “once in a blue moon”, the quick guides suit me well. In this case, that was precisely what I was looking for in a Unix system administration guide. Essential System Administration Pocket Reference provides this to a “T”.
Without getting bogged down in lengthy descriptions or philosphical discussions of which tool to use when, this pocket reference lists the basic administration commands, beyond GREP (though it lists that, too!), with a short description of what it does. It’s easier to read than the MAN file, usually gives me few examples, and I don’t have to open a second terminal window to use it! Seriously, I really reccomend this guide to anyone new to Unix, including Linux, system administration. Or, like me, is getting back into it for the first time since, well, since the Dark Ages. It’s a great guide or refresher and it literally does fit in your pocket!

5/19/2003

Computer Security in the Matrix?

Filed under: Fun,Geek Work,News and Current Events — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:20 am for you boring, normal people.
The moon is a Third Quarter Moon

Finally, a little truth in fiction!

Okay, so this article ran in Slashdot first, but still, it’s pretty cool. After all the wildly inaccurate views of computer security that Hollywood has shown us, from the 3D graphics in “Hackers” to the 3D interface for the UNIX system in “Jurassic Park”, it’s nice to see someone using an actual security tool for a change. Fellow security “entusiasts” will recognize a tool called NMap. Apparently, there’s a scene in “The Matrix Reloaded” where Trinity uses NMap to penetrate an SSH server for something. And, they used actual screen shots of NMap!
(And, they’ve got some advertising set up to take advantage of it.)
Man, I have got to get out to see this movie!


Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.