Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

1/4/2011

Change Your Passwords!

Filed under: Advice from your Uncle Jim,Geek Work,News and Current Events,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:35 pm for you boring, normal people.
The moon is Waning Gibbous

Yeah, yeah, happy New Year to you you, too, now, go change your passwords.

No, seriously, change your passwords.  Think about how long it’s been since  you either setup that account or changed the password on it.  Now, consider that there have been some significant security breaches in the past year, including the issues at Gawker and their family of popular websites, and think about how many places you’ve used that same password.  It’s your favorite one, right?  The one you use for all your accounts, because it’s so, so easy to remember?  Guess what, it’s also probably easy to crack and is probably in a database on some hacker/cracker website right now matched up with the e-mail address you used, too.  How long will it be, do you suppose, before someone gets into all your accounts?

Right.
So, go change your passwords.
Not sure how to pick a good one?  Well, if you trust the U.S. Government for security, you can go to their Computer Emergency Readiness Team (aka US-CERT) for advice on choosing a secure password.  If you’re like me, though, you categorically do NOT trust a government agency for your personal security, in which case I recommend that you check out premier security expert Bruce Schneier’s advice for picking a secure password.

I’ll offer two bits of advice on the topic.
First, if any system lets you, choose a password that includes numbers and special characters, not just letters.  The example I always use is “@2brutus”  And, yes, that means I will NEVER again use that as a password. *sigh*  I like to substitute numbers for letters which resemble them, like the number one instead of the letter L or the letter I.  In the example, I’ve taken a  whole word out “et” and substituted the “at” symbol, or “@”.
Secondly, try to use something that is not a single word, but a phrase.  Again, in the example, I took my bastardization of “et tu brute”, which I remembered as “et tu brutus” and mashed it up a bit.  I have known people who use short sentences, however.  One guy I worked with occasionally used lines from Lewis Carroll’s [amazon_link id=”0810911507″ target=”_blank” ]Jaberwocky[/amazon_link], which adds the extra security of words that will most likely never be found in any standard dictionary of any language.

So, trust me on this, if you haven’t done it, start the new year right and change your passwords.


Advice from your Uncle Jim:
"Being right means never having to say you're sorry."
   --Vernor Vinge

12/15/2010

Free Computer Security Tools

Filed under: Advice from your Uncle Jim,Geek Work,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:25 am for you boring, normal people.
The moon is Waning Gibbous

It’s a dangerous digital world out there!

As I’m sure you’ve seen this year, there have been lots of warnings about increased malicious activity.  Everything from phishing to new malware, the cyber-criminals are really working overtime to make your life a living hell.  There’s plenty you can do to stay safe, like only going to sites that you know and not opening attachments from strangers, or even from friends that don’t normally send you attachments.  But, let’s face it, sometimes, things slip by you.  So, what else can you do, especially when you don’t have money to spend on high-end security tools?

Well, check out eWeek’s list of 9 Free Security Tools to be Thankful for and start using them.  At least make sure you have some kind of anti-virus installed.  There are several suggestions on that list.
And, be careful out there!


Advice from your Uncle Jim:
"To keep your marriage brimming,
With love in the loving cup,
Whenever you're wrong, admit it;
Whenever you're right, shut up."
   --Ogden Nash

12/8/2010

Backup Plan Review

Filed under: Advice from your Uncle Jim,Geek Work,MicroSoft — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:43 am for you boring, normal people.
The moon is Waning Gibbous

It’s almost the end of the year and most people are wrapping up projects and thinking about how they’re going to squeeze in their last vacation days.

But, not if you’re in IT.
No, if you’re one of the over-worked, under-paid technology “elite” in the corporate world, you’re working harder than ever right now.  While everyone else is taking time off, you, like me, are trying to get all the system maintenance done that requires everyone else to be off your systems.   Well, while you’re waiting for them to get out of the office so you can start your work, here are some things to think about.

When was the last time you had to restore a backup?  Have you ever even tried to restore any files from those backups that you worked so hard to get running right when you setup your servers?  Well, now is the time to try it.  Trust me on this, but you don’t know how good your backup is until you try to restore.  Now, you may not be able to do a full server restore on fresh hardware, but, if you can, do it.  That’s the only true test of your disaster recovery plan.  Barring that, though, at least try to restore some files from random places on the server, just as a check to make sure it works.

And, while we’re talking about backups, how is your off-site rotation working?  If you’re in a large company, you probably have a long-standing system for rotating backups off-site in case of a massive disaster, but many smaller companies don’t.  Generally, what I suggest to people is that there should be one full backup off-site, one coming back or leaving, and one on-site.  The most current, usually, should rotate off-site just after completion and be off-site for two weeks, or, really, off-site for one week and coming back on the second.  There are plenty of  services to do this, but even just taking them to the network manager’s house is better than nothing.  Just somewhere relatively secure that’s not the same as the site you’re backing up, just in case the entire building catches fire or is demolished in a hurricane.  You get the idea.

Now, something else to consider, if you run Windows Server is Active Directory.
Mostly, your backup program should be taking care of this, but sometimes funky change creeps in when you don’t expect it.  Back in the days when I was more than an IT department of one, I was a big believer in getting baselines.  Every once in a while, it’s nice to take a snapshot of what’s working so that when it inevitably breaks, you can see what might have changed to break it.  This is especially true of things like Active Directory.  Every year, AD gets more and more complicated and, as your network grows, your individual AD tree will get more complicated, too.  Now, assuming that things are running well, is a great time to take a snapshot of your AD tree for a baseline to use in the coming year.
Tech Republic has a good article on how to use a free tool from Sysinternals to do just that.  Check it out.

And, for those of you who don’t have an IT department, or are a sole-proprietor, don’t think you can just slide, either.
Chances are your clients are taking more time off and you’ll have some down-time, too, so now is the perfect time to review your backup plans.  Many of you may not have much of a plan, or much of a budget to get something working for you.  Well, don’t worry, Tech Republic has some creative suggestions for backups to fit most situations. Do yourself a favor and go check them out now.  Then actually implement one before the start of the new year.  Do it now, before you need to restore data from a crash.

Trust me.  Make sure your backups are running before you need them.  You’ll thank me later.


Advice from your Uncle Jim:
"The only difference between saints and sinners is that every saint has a past and every sinner has a future."
   --Oscar Wilde

12/3/2010

Hacker Game

Filed under: Fun,Fun Work,Geek Work,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:29 am for you boring, normal people.
The moon is Waning Gibbous

No, not the old “Net Hack” game you remember.

No, this game is from Hack-A-Day’s site and a very custom job.  Seems like this hardware hacker guy got an old, toy electronic combination vault and made it a little more interesting.  He added a USB interface to it and a multi-level security “game”.  You have to attach a terminal to the USB interface and get root access to each level of the simulated computer environment to unlock the vault and get the goods.  Pretty cool, if you ask me!  Hollywood should go get this guy to make their interfaces more realistic!

Seriously, go check out “Playing hacker with a toy vault” on Hack-A-Day.  You’ll like it!

11/22/2010

Some Collected Advice for Network Admins

Filed under: Advice from your Uncle Jim,Geek Work,Linux,MicroSoft — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:33 am for you boring, normal people.
The moon is Waning Gibbous

So, I promised you more technical stuff here, right?

Well, stop yer grinin’ and grab yer linen, ’cause here come a fist full of links with some great advice for network administrators, all from TechRepublic:
First, if you’re a real network admin, you’ve dealt with traffic issues on file servers.  Issues that have hidden sources.  Unknown processes that jam up your network connections until your users scream for your head.  So, how do you deal with that when you’re on a budget and don’t have a lot of tools?  Well, one way is to use “netstat” to look at what process is running on what port and sending what volume of data.  If you’re on Unix, you probably already know about this tool, but if you’re on Windows, check out “Netstat tips and tricks for Windows admins“.  It may save your bacon one day.

Second, you probably have wireless in your network now, too, right?  But, it may not always work quite the way you want.  Once again, users will scream bloody murder if they can’t read their blogs on their iPhone, so, how do you find out what’s jamming up your WIFI network so that no one can connect?  Read through “Troubleshooting for wireless connectivity issues” to get you started on running down the problem.

Thirdly, if you’re a REAL network administrator, you probably have at least one Linux box in your network.  Something that runs an open source network inventory or monitoring tool or, maybe even, an actual Linux file server.  In any case, sooner or later, even that sad, little, neglected Linux box will have disk space issues, so here are “10 things you can do when the drive on your Linux box is full“.

And, finally, my personal favorite.  You hear a lot of buzzwords floating around these days in IT shops, but “the cloud” is the most common magic cure for all ills.  Personally, I’m not so sure.  I worry about things like, oh, you know, security and auditing and connectivity issues and little details like that which seem like they might be an issue for the magic cloud computing panacea.  Turns out, I’m not the only one.  So, go see why Patrick Gray says “The cloud doesn’t matter“.


Advice from your Uncle Jim:
"You can't go back and have a brand new start, but anybody can start now and have a brand new end."

11/12/2010

IKEA Cad

Filed under: Art,Fun,Fun Work,GUI Center,The Network Geek at Home — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:30 am for you boring, normal people.
The moon is Waning Gibbous

No, not a cad program by the flat-pack king.

Rather cad files of 21 of IKEA’s designs.  Yep, now you can suck those ubiquitous IKEA designs right into your high-end architect’s cad program and use them to design your house.  ‘Cause, you know, after paying for an architect in this economy, how much money are you going to have left over for fancy furniture?

No, seriously, I just thought it was fun that someone had made cad drawings of IKEA stuff in 3D so you can use it to lay out your house or apartment.  The files are actually in Google Sketchup format, for guys like me who are always trying to do more with less, especially less expensive software!

11/9/2010

OpenOffice Replacement

Filed under: Geek Work,GUI Center,MicroSoft,News and Current Events,The Network Geek at Home — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:38 am for you boring, normal people.
The moon is Waning Gibbous

Speaking of free software…

Many of you know that I’ve long been a proponent of the spectacular free office suite, Open Office.  Well, there’ve been some shake-ups in the free software world and Oracle and the developers of Open Office have had a bit of a falling-out.  Nothing too serious, really, but enough of a difference of opinion about the future of Open Office that they forked the project.  Now, what that means to you and me is that they’ve taken the open source code to date and started their open development of it under a new name.  The new project is called “LibreOffice” and is being supported by the Document Foundation, who’s sole purpose seems to be continuing development of this fantastic office suite.
Follow that link and you can download the latest version to try for yourself.  I suggest you do because you may never buy another revision of Microsoft Office again.
Seriously.

10/20/2010

Spike it, with MS Office

Filed under: Geek Work,GUI Center,MicroSoft — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:05 pm for you boring, normal people.
The moon is Waning Gibbous

Yeah, I know, I’m not really a huge fan of Micro$oft Office either, but, what can you do when it’s become the defacto standard?

Make the most of it!
So, back in the day, the reason I originally got into computers at all was due to writing.  I know, crazy, right?  Well, I discovered how much easier it was to edit documents without having to retype the whole thing and I was hooked.  Then, as I wrote more, I got really into moving whole sentences and paragraphs and, yes, even entire, multi-page sections of text from one part of my work to another.  It was pretty fantastic, really.  In any case, copying and moving text is one of the things that Word is really good for and there’s even a secret feature to make your editing job easier; The Spike.
With the Spike, you can copy or cut multiple sections of text and then paste them all into the same section all at once!  You can even take text from multiple documents and copy it to the Clipboard and then paste it into a new document with the Spike!  How fantastic is that?

So, go check out the link and see how to leverage all that power for yourself.
Enjoy!

10/8/2010

Microsoft Security Book…

Filed under: Art,Fun,MicroSoft,The Dark Side,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:32 am for you boring, normal people.
The moon is Waning Gibbous

…for teens?

Okay, so according to LifeHacker, Microsoft has released an on-line book about internet safety and security aimed at kids and teens.  It’s called “Own Your Space – Keep Yourself and Your Stuff Safe Online“.  No, seriously.  They describe it as a way to “…[h]elp teens ‘own their space’ online.”  Apparently, also meant for adults to help their “tweens” and teens “… keep up with the latest computer and online safety issues and help kids learn to avoid them.”  The book was written in “partnership” with security expert and author Linda McCarthy, who I honestly have never heard of before.

So, it’s hard to argue with the alleged intent behind this free, downloadable book, but I’m wary of anything from Microsoft that claims to be related to “security”.  On the other hand, what little I actually saw of the book was okay and had fun illustrations, so it may not be all bad.  I mean, at least it’s a starting point for parents to talk to their kids about on-line safety and security.  But, Microsoft has a long way to go to make up for Internet Explorer and holes it created in so many systems over the years.

In any case, it’s a fun looking book and you’re obviously not doing anything important or you wouldn’t be here reading my blog this Friday, so why not check it out for yourself?

10/6/2010

Computer Crime is “Organized”

Filed under: Geek Work,News and Current Events,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:30 am for you boring, normal people.
The moon is Waning Gibbous

Wow, even computer crime is a “family” business these days!

Hey, look, I’m from Chicago, where you can’t hardly swing a dead cat and not hit a mobster, but this surprised even me!  Apparently, according to an article that ran on CNet, 85% of all stolen data last year was linked to some kind of organized crime.  And, 38% of data breaches used stolen credentials.

But, also, people are getting rich protecting us from the threats they create!  Seriously!  According to this article at eWeek, that’s just what some of the botnet crooks are doing.  And, remember, this is BIG business.  We’re not talking about a couple hundred infected PCs, we’re talking about tens of thousands.  There are websites dedicated to the buying and selling of the data these things collect and renting out the zombie PCs to do your dirty work, like send spam.  It’s big business and where there is big money to be made doing illegal things, there’s always been organized crime.

More and more, life is becoming like a William Gibson novel…

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.