Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

2/1/2011

LibreOffice Ready For Prime Time

Filed under: Advice from your Uncle Jim,Geek Work,MicroSoft,News and Current Events — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:20 am for you boring, normal people.
The moon is a Third Quarter Moon

Remember how I mentioned the new Microsoft Office replacement last month?
Well, it’s golden, finally.

A number of months ago, my favorite free office suite, Open Office, forked for various reasons relating to the “openness” of the open source of that project.  The forked code, or, for those of you not familiar with the terminology, the new branch of the on-going project, was called LibreOffice and drew most of the heavy-hitters development-wise from the old project.  They’ve been working quite hard and have gotten their new release out; LibreOffice 3.3.
There’s a pretty good review of what’s new and great about this latest release over at eWeek.com.  Check it out and then go download the latest version and install it for yourself.  Trust me on this.  It’s pretty great.


Advice from your Uncle Jim:
"If you want others to be happy, practise compassion.
If you want to be happy, practise compassion."
   --The Dalai Lama

1/20/2011

Helpful Hints for Technology Sales People

Filed under: Advice from your Uncle Jim,Criticism, Marginalia, and Notes,Geek Work — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:15 am for you boring, normal people.
The moon is a Third Quarter Moon

Okay, look, this is getting ridiculous.

I’m a one-man IT shop.  Okay, technically, I do have someone else and some consultants, but they’re all at other locations and, pretty much, everyone still comes to me first anyway.  So, effectively, I’m a one-man IT shop.  That means I’m busy.  No, really, I’m busy pretty much every minute that I’m even close to the office.  And, I’m trying to get out of the office by 5:00PM.  Well, by 5:30PM.  Okay, honestly, I try not to stay past 6:00PM more than twice a week.  Which means my time is a very precious commodity and if you waste it, I will have strong negative feelings toward you.  Strong negative feelings.

This should be pretty apparent to anyone who watches me work, or try to work, and answer phone calls from every cold-calling, knuckle-dragger who’s been tasked with trying to get me to notice their product for which I do not have the time to implement or, most likely, the budget to purchase.  Now, to be fair, the average sales drone who’s tasked with calling me doesn’t know this.  They can’t know it, as they have never met me before or been to the morass of paper and spare parts that I call a server room, er, rather, that I call my office.  But, I’m going to do them a favor and outline some sure-fire ways to lose my sale.

First, like I’ve already mentioned, don’t waste my time.
Don’t show up unannounced at my office pretending that we have a meeting.  I will leave you sitting in the waiting room all day long.  For real.  I’ve done it.  I don’t even feel very guilty about it.  Why?  Well, you were willing to waste my time, so why should I worry about wasting yours?
Don’t call me and tell me that you have a great product or service or idea or whatever to tell me about, but refuse to give me any details about unless we meet in person.  Worse, if I seem interested but want to know about pricing, since I have a very limited budget, don’t be coy about giving me the information.  I know how to read a proposal and a tiered-pricing spreadsheet.  Honest.  I’ve done this for almost 20 years at this point.  I don’t need you to hold my hand.  Really.

Second, be honest.
If I ask you a direct question, give me a direct answer.  Look, I work in IT now, but I have a degree in Marketing.  Sure, it’s a little old and dusty, but, you know what?  Sales techniques haven’t actually changed that much since I did that kind of work.  So, when I ask if you do something or if your product does something, don’t give me some circular answer about interfacing with one of your business partners.  I asked you.  Can your product do what I asked or not?  It’s simple, really.  It’s binary, like computers.  Yes or no.  Often the answer to the direct questions I ask take care of the first problem for both of us.
Also?  If I ask you a deeply technical question about your product and you don’t know? Just admit that you don’t know.  Don’t guess.  Don’t try to play off my question.  And, again, don’t offer to involve another company in “our” solution.  I just want to know what you’re asking me to pay for out of my very limited budget.  It’s okay to get back to me later with an answer and pricing.
Just a word of warning about this, if you promise me that your product will do something it cannot do, I will not pay you.  It’s that simple.

Third, high-pressure techniques do not work with me.
Maybe they work with someone, but the harder you push me, the less inclined I am to give you money.  I honestly don’t care if you have a great deal, because if you try to rush me into something, I suspect that you’re trying to keep me from taking the time to think about what you’re doing.  And, if you are trying to get me to spend money without thinking it all the way through, there’s a reason.  Usually, a reason that is not to my benefit, but yours.
Also?  High-pressure sales went out with loud ties, junk bonds and easy mortgages.  And, I’ll be honest, they didn’t work on me then, either.  Nothing has changed for me since then.  I still tend to respond to high-pressure sales techniques with barely restrained violence.  If you’re still using them, go back to blood-sucking, parasitic, low-life school and learn something new.

Fourth, I do not care that you are a hot chick.
Yeah, this sounds sexist and misanthropic, but I see plenty of beautiful women in tech sales.  I get it.  Really, I do.  I’m a one-hundred-percent, red-blooded, American male and I love to look at beautiful women as much as the next guy, but I don’t care about that when you’re selling me tech gear.  For real.  For one thing, I was married to an absolutely gorgeous woman, so I know just what kind of hell their personal life really is like.  For another, I’m pretty sure that I will never, ever have access to a budget that will entice one of you to sleep with me, so, again, I just don’t care.  It doesn’t matter.  Not even if you flirt with me.  Honest.  So, you know, it’s okay to just stop.  Really.  Because it will not effect my decision to buy, or not buy, your product.
So help me, if another company sends me some Barbie doll who just blinks at me when I ask a marginally technical question about their technology product, someone will be hurt.  Seriously, at least put people in the field who know how to get me a Support Tech faster than just calling the 800-number on the back of the package.
And, yes, I’m sure there are many very attractive sales people in tech companies who do know what they’re doing.  I haven’t met any in the past eight or nine years, but I am sure they’re out there.  Somewhere.

So, really, is that too much to ask?
I just want competent technical sales people who can answer my questions about their product, don’t waste my time and know that, well, “No, means NO”.  Okay?  Everybody on board for that?
Thanks.

(This rant was brought to you by a high-pressure copier toner sales “person” and the most helpless software sales “person” I’ve ever had to circumvent.  All in the same week.)


Advice from your Uncle Jim:
"The Constitution of America only guarantees pursuit of happiness; you have to catch up with it yourself."
   --Gill Robb Wilson

1/12/2011

Name Security

Filed under: Advice from your Uncle Jim,Geek Work,Rotten Apples,The Dark Side,Things to Read — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:21 pm for you boring, normal people.
The moon is a Third Quarter Moon

No, not your personal name, network names!

Yeah, since I’ve been thinking about computer security a little in this new year and new decade, I’ve noticed a slightly disturbing trend.  Spammers have been working at redirecting you to compromised domains.  One way they do it is something called DNS cache poisoning.  Another is straight-up DNS hijacking.

Okay, let me back up a second.  For my slightly less-technical readers, DNS stands for Domain Name System.  That’s the system of servers that translates website names, like “www.google.com”, into addresses that your computer understands and can connect you to via a browser.  It’s how you found my blog, though you may not have even realized it.
DNS Hijacking is usually accomplished via a “rouge” server, which is a server setup by spammers to publish bad information.  The more usual method, I think, and more insidious, is DNS cache poisoning.  With that method, spammers trick good, valid DNS servers into updating their records with bad information.  Giving them poisonous information, if you will.

So, now, back to the hard-core server admins.  Last week I was reminding everyone that the start of a new year is a great time to change passwords, but it’s also a great time to check on other security issues, like your DNS.  Luckily, Michael Kassner over at TechRepublic has written a blog post titled Test your DNS servers for spoofability.  It’s worth a read and worth running through.  Maybe even making it a regular practice, to see if your DNS has been compromised.

Oh, and if you all want to read more about DNS, and how to implement it, there’s a great book from O’Reilly titled [amazon_link id=”0596100574″ target=”_blank” ]DNS and BIND[/amazon_link] that’s well worth owning.  Trust me.


Advice from your Uncle Jim:
"A friend of mine told me once that they don't lock you up for being crazy, only for acting crazy."

1/4/2011

Change Your Passwords!

Filed under: Advice from your Uncle Jim,Geek Work,News and Current Events,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:35 pm for you boring, normal people.
The moon is a Third Quarter Moon

Yeah, yeah, happy New Year to you you, too, now, go change your passwords.

No, seriously, change your passwords.  Think about how long it’s been since  you either setup that account or changed the password on it.  Now, consider that there have been some significant security breaches in the past year, including the issues at Gawker and their family of popular websites, and think about how many places you’ve used that same password.  It’s your favorite one, right?  The one you use for all your accounts, because it’s so, so easy to remember?  Guess what, it’s also probably easy to crack and is probably in a database on some hacker/cracker website right now matched up with the e-mail address you used, too.  How long will it be, do you suppose, before someone gets into all your accounts?

Right.
So, go change your passwords.
Not sure how to pick a good one?  Well, if you trust the U.S. Government for security, you can go to their Computer Emergency Readiness Team (aka US-CERT) for advice on choosing a secure password.  If you’re like me, though, you categorically do NOT trust a government agency for your personal security, in which case I recommend that you check out premier security expert Bruce Schneier’s advice for picking a secure password.

I’ll offer two bits of advice on the topic.
First, if any system lets you, choose a password that includes numbers and special characters, not just letters.  The example I always use is “@2brutus”  And, yes, that means I will NEVER again use that as a password. *sigh*  I like to substitute numbers for letters which resemble them, like the number one instead of the letter L or the letter I.  In the example, I’ve taken a  whole word out “et” and substituted the “at” symbol, or “@”.
Secondly, try to use something that is not a single word, but a phrase.  Again, in the example, I took my bastardization of “et tu brute”, which I remembered as “et tu brutus” and mashed it up a bit.  I have known people who use short sentences, however.  One guy I worked with occasionally used lines from Lewis Carroll’s [amazon_link id=”0810911507″ target=”_blank” ]Jaberwocky[/amazon_link], which adds the extra security of words that will most likely never be found in any standard dictionary of any language.

So, trust me on this, if you haven’t done it, start the new year right and change your passwords.


Advice from your Uncle Jim:
"That old law 'an eye for an eye' leaves everybody blind."
   --Martin Luther King

12/20/2010

A Truly Honest Privacy Statement

Filed under: Criticism, Marginalia, and Notes,Fun,Fun Work,Geek Work,News and Current Events — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:08 am for you boring, normal people.
The moon is a Third Quarter Moon

Websites lie.

There, I said it.
Well, I wrote it.  Anyway, you and I and everyone else with half a brain know that these “free” websites are paid for in some way.  Mostly, that way is advertising.  Sometimes, that advertising involves selling personal data that they’ve collected.  Oh, c’mon, don’t act so shocked.  You know it’s true just like I do.  The big [amazon_link id=”B0001EQIFQ” target=”_blank” ]Internet Bust of 2000[/amazon_link] showed us all that companies without a good revenue model will, ultimately, fail.  And, the best revenue model of all on the Internet is selling your data to advertisers.

The thing is, wouldn’t it be nice if they just admitted that up front?
Well, Dan Tynan over at IT World has a modest proposal; The first truly honest privacy policy.

Watch out, because I may just start using this on my sites!
But, I won’t warn you ahead of time…

12/15/2010

Free Computer Security Tools

Filed under: Advice from your Uncle Jim,Geek Work,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:25 am for you boring, normal people.
The moon is a Third Quarter Moon

It’s a dangerous digital world out there!

As I’m sure you’ve seen this year, there have been lots of warnings about increased malicious activity.  Everything from phishing to new malware, the cyber-criminals are really working overtime to make your life a living hell.  There’s plenty you can do to stay safe, like only going to sites that you know and not opening attachments from strangers, or even from friends that don’t normally send you attachments.  But, let’s face it, sometimes, things slip by you.  So, what else can you do, especially when you don’t have money to spend on high-end security tools?

Well, check out eWeek’s list of 9 Free Security Tools to be Thankful for and start using them.  At least make sure you have some kind of anti-virus installed.  There are several suggestions on that list.
And, be careful out there!


Advice from your Uncle Jim:
"We are what we think. All that arises is with our thoughts. With our thoughts we make our world."
   --Buddha

12/9/2010

42nd Birthday of the Mouse

Filed under: Deep Thoughts,Fun,Fun Work,Geek Work,Life, the Universe, and Everything,News and Current Events,Ooo, shiny... — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:29 am for you boring, normal people.
The moon is a Third Quarter Moon

It’s not quite the “birthday” of the mouse, but…

Today is the 42nd anniversary of the first time a mouse made its commercial debut, though the patent was actually granted just a few weeks earlier on November 17th. That’s right, the mouse, that marvel of modern technology that most of us use daily is just a little older than I am. Invented by Douglas C. Engelbart and the group of 17 researchers working with him in the Augmentation Research Center at Stanford Research Institute in Menlo Park, CA, the original mouse was little more than a square, wooden box, but the little device would change the world. Engelbart showed how the mouse could let a user jump from text on one part of the screen randomly to another section without having to scroll through the text inbetween. Doesn’t sound too revolutionary to us today, does it? But, think about how you navigated to this page to read this little blurb, then try to imagine doing it without a mouse. Or, imagine trying to use Photoshop or any other graphic design program for that matter without the point-click-and-drag of a computer mouse. Yeah, pretty much everything cool you can do on a computer these days involves a mouse or similar pointer. Now, of course, to me, that’s the real genius of an invention like the mouse; it seems so obvious that we wonder why we didn’t think of it sooner!

So, happy demo day, little guy. Thanks for giving me a job and us a way to waste time at work.

12/8/2010

Backup Plan Review

Filed under: Advice from your Uncle Jim,Geek Work,MicroSoft — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:43 am for you boring, normal people.
The moon is a Third Quarter Moon

It’s almost the end of the year and most people are wrapping up projects and thinking about how they’re going to squeeze in their last vacation days.

But, not if you’re in IT.
No, if you’re one of the over-worked, under-paid technology “elite” in the corporate world, you’re working harder than ever right now.  While everyone else is taking time off, you, like me, are trying to get all the system maintenance done that requires everyone else to be off your systems.   Well, while you’re waiting for them to get out of the office so you can start your work, here are some things to think about.

When was the last time you had to restore a backup?  Have you ever even tried to restore any files from those backups that you worked so hard to get running right when you setup your servers?  Well, now is the time to try it.  Trust me on this, but you don’t know how good your backup is until you try to restore.  Now, you may not be able to do a full server restore on fresh hardware, but, if you can, do it.  That’s the only true test of your disaster recovery plan.  Barring that, though, at least try to restore some files from random places on the server, just as a check to make sure it works.

And, while we’re talking about backups, how is your off-site rotation working?  If you’re in a large company, you probably have a long-standing system for rotating backups off-site in case of a massive disaster, but many smaller companies don’t.  Generally, what I suggest to people is that there should be one full backup off-site, one coming back or leaving, and one on-site.  The most current, usually, should rotate off-site just after completion and be off-site for two weeks, or, really, off-site for one week and coming back on the second.  There are plenty of  services to do this, but even just taking them to the network manager’s house is better than nothing.  Just somewhere relatively secure that’s not the same as the site you’re backing up, just in case the entire building catches fire or is demolished in a hurricane.  You get the idea.

Now, something else to consider, if you run Windows Server is Active Directory.
Mostly, your backup program should be taking care of this, but sometimes funky change creeps in when you don’t expect it.  Back in the days when I was more than an IT department of one, I was a big believer in getting baselines.  Every once in a while, it’s nice to take a snapshot of what’s working so that when it inevitably breaks, you can see what might have changed to break it.  This is especially true of things like Active Directory.  Every year, AD gets more and more complicated and, as your network grows, your individual AD tree will get more complicated, too.  Now, assuming that things are running well, is a great time to take a snapshot of your AD tree for a baseline to use in the coming year.
Tech Republic has a good article on how to use a free tool from Sysinternals to do just that.  Check it out.

And, for those of you who don’t have an IT department, or are a sole-proprietor, don’t think you can just slide, either.
Chances are your clients are taking more time off and you’ll have some down-time, too, so now is the perfect time to review your backup plans.  Many of you may not have much of a plan, or much of a budget to get something working for you.  Well, don’t worry, Tech Republic has some creative suggestions for backups to fit most situations. Do yourself a favor and go check them out now.  Then actually implement one before the start of the new year.  Do it now, before you need to restore data from a crash.

Trust me.  Make sure your backups are running before you need them.  You’ll thank me later.


Advice from your Uncle Jim:
"To keep your marriage brimming,
With love in the loving cup,
Whenever you're wrong, admit it;
Whenever you're right, shut up."
   --Ogden Nash

12/3/2010

Hacker Game

Filed under: Fun,Fun Work,Geek Work,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:29 am for you boring, normal people.
The moon is a Third Quarter Moon

No, not the old “Net Hack” game you remember.

No, this game is from Hack-A-Day’s site and a very custom job.  Seems like this hardware hacker guy got an old, toy electronic combination vault and made it a little more interesting.  He added a USB interface to it and a multi-level security “game”.  You have to attach a terminal to the USB interface and get root access to each level of the simulated computer environment to unlock the vault and get the goods.  Pretty cool, if you ask me!  Hollywood should go get this guy to make their interfaces more realistic!

Seriously, go check out “Playing hacker with a toy vault” on Hack-A-Day.  You’ll like it!

11/22/2010

Some Collected Advice for Network Admins

Filed under: Advice from your Uncle Jim,Geek Work,Linux,MicroSoft — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:33 am for you boring, normal people.
The moon is a Third Quarter Moon

So, I promised you more technical stuff here, right?

Well, stop yer grinin’ and grab yer linen, ’cause here come a fist full of links with some great advice for network administrators, all from TechRepublic:
First, if you’re a real network admin, you’ve dealt with traffic issues on file servers.  Issues that have hidden sources.  Unknown processes that jam up your network connections until your users scream for your head.  So, how do you deal with that when you’re on a budget and don’t have a lot of tools?  Well, one way is to use “netstat” to look at what process is running on what port and sending what volume of data.  If you’re on Unix, you probably already know about this tool, but if you’re on Windows, check out “Netstat tips and tricks for Windows admins“.  It may save your bacon one day.

Second, you probably have wireless in your network now, too, right?  But, it may not always work quite the way you want.  Once again, users will scream bloody murder if they can’t read their blogs on their iPhone, so, how do you find out what’s jamming up your WIFI network so that no one can connect?  Read through “Troubleshooting for wireless connectivity issues” to get you started on running down the problem.

Thirdly, if you’re a REAL network administrator, you probably have at least one Linux box in your network.  Something that runs an open source network inventory or monitoring tool or, maybe even, an actual Linux file server.  In any case, sooner or later, even that sad, little, neglected Linux box will have disk space issues, so here are “10 things you can do when the drive on your Linux box is full“.

And, finally, my personal favorite.  You hear a lot of buzzwords floating around these days in IT shops, but “the cloud” is the most common magic cure for all ills.  Personally, I’m not so sure.  I worry about things like, oh, you know, security and auditing and connectivity issues and little details like that which seem like they might be an issue for the magic cloud computing panacea.  Turns out, I’m not the only one.  So, go see why Patrick Gray says “The cloud doesn’t matter“.


Advice from your Uncle Jim:
"To keep your marriage brimming,
With love in the loving cup,
Whenever you're wrong, admit it;
Whenever you're right, shut up."
   --Ogden Nash

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.