Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

9/19/2008

Hacking is Sexy

Filed under: Fun,Fun Work,Geek Work,News and Current Events,Red Herrings,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:44 am for you boring, normal people.
The moon is a Full Moon

Stop laughing.

Okay, so this is totally no joke. Marketing people now use sex to sell absolutely everything. Even hacking. Yes, over at SexyHacking.com they have hot chicks dispensing computer security information and techniques. Really. And, apparently, they were supposed to be at Blackhat, one of the big security conferences in Vegas, this year, too.  Not sure if they actually were or not.
Well, thank you, to the Security Monkey for pointing this out to us.

So, sex sells. Go figure.
(Oh, and don’t forget, today is “Talk Like A Pirate Day“.)

8/14/2008

Upgrade Issues

Filed under: Criticism, Marginalia, and Notes,News and Current Events,Personal,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Hare which is in the early morning or 7:27 am for you boring, normal people.
The moon is a Full Moon

So, it seems like I still have some issues.

Someone e-mailed me this morning to see if my site was down because they were getting a blank page. Well, so was I. At least, until I hit refresh. Then, hitting the links on the categories didn’t work at all. So, I checked the WordPress support forum and tweaked a couple of things. Now, the categories give you blank pages, until you hit the refresh button. And, actually, this is all in Firefox. Firefox 2, actually, so I have no idea if any other browsers are having trouble or not. If you are, leave me a comment here so I can keep track, would you?

And, in any case, I’m working on it. Right now, the fix seems to be coming in a minor version update. This is why I usually wait a couple of months before upgrading. It’s just that this version had some things I wanted to use, so… Well, anyway, like I wrote, I’m working on it.

UPDATE:
First, let me thank you all for not taking advantage of that opening line.  It is sort of like putting on a “kick me” sign and sticking one’s rump out.
Secondly, I think I found the problem.  I upgraded WordPress, but not all the plugins I have loaded.  So, I deactivated one until I can get the new version.  Luckily, it’s one that works behind the scenes doing things for me, so your viewing experience shouldn’t be effected.
Thanks for your help and attention!

8/1/2008

DIY Computer Security

Filed under: Advice from your Uncle Jim,Geek Work,Life, the Universe, and Everything,MicroSoft,Review,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:41 am for you boring, normal people.
The moon is a Full Moon

Is it even possible?

Well, frankly, I don’t know that there really is such a thing as computer security at all any more in these days of ubiquitous network access. I mean, it used to be that you could install a simple anti-virus program and sit behind a firewall and be fairly safe, but not any more. Now, with botnets and phishing scams and junk e-mail, well, frankly, you just can’t get away from it any more. In fact, now, the “hackers” are becoming so dumbed down that they’re using Do-It-Yourself “kits” that build some of the attacks for them! Just the other day, I read an article on ZDNet about something floating around the shadowier corners of the Internet that the nasties are calling a “DIY Phishing Kit“. So, now, it’s not bad enough that these scum-sucking bottom-feeders are out there trying to rip me off from the safety of their own home, or country, but now they’re making it even easier for no-talent, mouth-breathing, inbred miscreants to scam people out of their hard-earned cash! (Of course, long-time readers will know that I’ve made things harder for at least one phisher.) Man, that pisses me off!

There are so many people out there both creating these hazards to our digital lives and fighting them, that someone has suggested a uniform naming convention for all the security vendors to use when they refer to this “malware“. That’s all well and good, but all I really care about is keeping my systems secure. And, I’m sure you all worry about that, too. The problem is, in this tight economy, not many of us have much money to fight against these invisible baddies, not even me. Don’t let the advertising fool you, what I take in from the ads on this site aren’t even enough to pay for it, much less anything else. So, what’s a poor computer geek to do? Use free software, naturally.

PC Magazine has an article reviewing their “Top Five” picks for free security software. Personally, I can recommend AVG and Spybot Search and Destroy, even though they say Spybot is out of date. Also, I’ll add in Lavasoft’s AdAware, which is also free and quite good. I generally use both Spybot and AdAware to get rid of spyware. What one misses, the other catches. And, AVG has been around for quite a long time. They’re amazingly good, especially for free software.
Naturally, there are no guaranties when you use free software, but, then again, most of the paid software has outs in their EULA (end user license agreement), too, so why pay all that money? Keep in mind, these are free for personal use only. So, home businesses should technically use the paid software. We’ve all got to do our part to fight against these dirty spammers, scammers and thieves. The best place to start is a clean system. If you don’t have an antivirus program installed, get one. Fast.


Advice from your Uncle Jim:
"Denial is a powerful tool. Never underestimate its ability to cloud your vision."
   --Melody Beattie

7/25/2008

Happy Sysadmin Day!

Filed under: Fun,Fun Work,Geek Work,News and Current Events,Red Herrings,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 12:28 pm for you boring, normal people.
The moon is a Full Moon

Oh, wow, I almost missed it this year!

Today is System Administrator Appreciation Day.
I was reminded by Gizmodo that today is the day to remember the geeks that make your network run.  Sure, you’d mostly rather see us locked into our server rooms and hardware closets, but, admit it, when something goes terribly wrong with your computer or network, you’re actually happy to see us.  So, since you’re able to read this, find your local system administrator and tell them thank you for letting you waste time reading my blog on the Internet instead of working on a Friday afternoon.

7/23/2008

SF Network Admin Holds City Hostage

Filed under: Advice from your Uncle Jim,Geek Work,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:09 pm for you boring, normal people.
The moon is a Full Moon

Okay, not quite the whole city…

Have you been reading about this network administrator in San Francisco who was keeping key passwords secret and holding the city’s fiber network hostage? Yeah, well, he gave them up to the mayor today. And, you know what? I bet there are a lot more companies in this situation than realize it.  Okay, maybe they don’t have to worry about being taken hostage by a disgruntled employee, but they may have someone who holds key information for their network that no one else has.  And, of course, if something happened to them, well, that company would be in a bad spot.

I, for one, always try to plan for being gone. You know, in case I were trapped under a rock, hit by a bus, or, oh, I don’t know, died of cancer.   And, I’m not the only one.  So, if you want to protect your business, plan for your network administrator to fall through a figurative manhole.
Don’t let what happened in San Francisco happen to you and your business!


Advice from your Uncle Jim:
"A bone to the dog is not charity. Charity is bone to the dog, when you are just as hungry as the dog."
   --Jack London

7/22/2008

Recover your MS Office Password

Filed under: Fun Work,Geek Work,MicroSoft,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:58 am for you boring, normal people.
The moon is a Full Moon

No, not the key to install Microsoft Office!

One of the many features of Microsoft Office is the ability to password protect your files. It’s not very strong encryption, but, then again, how many people in your office are programmers who specialize in cryptographic algorithms? Right.
On the other hand, it sure is a pain in the butt when you lose the password for some super important file. Well, the Wired HowTo Wiki has a page titled Recover Your Password-Protected MS Office Docs that can help you out. I especially liked the idea of the e-mail service that let you preview part of the document before paying to have it unlocked. As an IT person, it’s nice to know if I’m paying to unlock the right files for someone at the office before I shell out the cash!

7/8/2008

Lawyers Telling Judges What to Think?!

Filed under: Advice from your Uncle Jim,Certification,Criticism, Marginalia, and Notes,Deep Thoughts,Geek Work,Life, the Universe, and Everything,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Snake which is just before lunchtime or 11:45 am for you boring, normal people.
The moon is a Full Moon

No, not really.

So, there’s obviously been quite a furor about this new law here in Texas that apparently requires anyone doing any kind of computer forensic work to get a Private Investigator’s License. Now, one of my favorite computer security bloggers, Security Monkey (aka The Chief) of A Day in the Life of an Information Security Investigator, has a blog entry about this. His sources in Texas have a different, more relaxed, take on this law. They seem to think that it’s only going to effect professionals doing investigative work for a third party. I think they’re wrong.
As at least one other commenter on A Day in the Life of a Computer Security Investigator pointed out, no matter what the lawyers think and say, only a judge sitting on a case can really interpret the law. And, only after that precedent is set can anyone say what the law covers and doesn’t.
Based on the Slashdot story about someone getting charged with a felony for using a fake name to sign up to MySpace, it seems like this is going to be an important step in the process. I mean, until that all important precedent is set, there’s no telling how people will try to use this new law.

As I wrote here the other day about this far-reaching law, I think it’s just another example of the sad state of our legal system. Laws like this have effects that are much, much further reaching than the bill’s author intended, and it’s ripe for abuse by our overly litigious society.


Advice from your Uncle Jim:
"You may give out, but never give up."
   --Mary Crowley

7/3/2008

More News on the PI License for Texas Techs Law

Filed under: Career Archive,Certification,Criticism, Marginalia, and Notes,Geek Work,Life, the Universe, and Everything,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Snake which is just before lunchtime or 11:52 am for you boring, normal people.
The moon is a Full Moon

The Houston Chronicle has an update on the law I mentioned the on Tuesday.

The Austin office of the Houston Chronicle did some more digging about the new law that would seem to require PC Techs in Texas to also become Private Investigators. According to the bill’s author, state Rep. Joe Driver, R-Garland, we’re all misinterpreting his new law. He claims that the law means “…anyone who retrieves data from a computer, analyzes it and makes a report to a third party must obtain a private investigator’s license.” To me, it’s almost the same thing.

As I read it, the law would require anyone performing computer security duties in *any* setting in Texas to get a PI License. That means that a corporate computer security officer, who’s job may include computer forensics, would be required to also be a PI.
Frankly, I’m torn between thinking that maybe this is a good thing and maybe it’s excessive. On the one hand, for someone who does independent security work, that background check and finger printing might be a good idea! On the other hand, it might make it impossible for someone in a small company to *legally* do their job.

I’ll give an example…
A small company may have a one or two person IT department who cover everything, like, for instance, me. If there’s a break-in to one of their systems, they would then have to be a licensed PI to investigate that, or they’d have to spend a similar amount of money on a consultant who was. In this case, I’d bet the law just would get ignored.

But, for the independent operator, who might not have any other controls or credentials which a consumer or consulting client can use as a measure of relative security, it might actually be a good thing. Again, I doubt that criminal background checks are being done on all independent computer security consultants right now and maybe they should be.

In any case, like many laws of this nature, they seem like a good idea on paper, but often have much further reach than their author intended.

7/1/2008

A PI License to Fix PCS!!?!

Filed under: Career Archive,Certification,Dog and Pony Shows,Geek Work,Life Goals,Life, the Universe, and Everything,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 12:51 pm for you boring, normal people.
The moon is a Full Moon

So, now I need a Private Investigator’s license to work on PCs?

Yeah, according to articles at ExtremeTech and CW33, a recently passed law in Texas requires that ALL shops which include PC repair technicians have a PI license. Just so you know, a PI License isn’t for an individual, but, rather a business and all the employees would work under that umbrella license. Still, it would mean that at least one person go through the process of licensing, which has the following requirements:

  • three years of investigative experience or a bachelors degree in criminal justice for investigations company license
  • two consecutive years of legally acceptable experience in the guard company business
  • successful completion of a two-hundred-question examination testing ability of the manager applicant to operate the guard company under the provisions of the statute regulating them
  • criminal background check
  • submitting fingerprints to have on file with the FBI
  • ~$500 in registration fees, subscription fees, application fees, and fingerprint fees, payable yearly

(All that is from an article at Citronix Computer Techs. )

Now, it’s important to understand, too, that this is a brand new law, sponsored by a Private Investigation professional organization who are afraid of their profession becoming obsolete. Thankfully, there are also techs who have professional organizations, one of which is challenging the law, at least, according to KVUE.com.

Funny, I’ve always thought about getting a PI license and now I may be forced to do so! On the other hand, the $4000+ fines and possible jail-time are a great excuse for why I can’t help people at work with their private PCs!

6/12/2008

It’s all magic to them…

Filed under: Geek Work,GUI Center,MicroSoft,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:35 am for you boring, normal people.
The moon is a Full Moon

My users think I’m a magician or a sorcerer.

Frankly, I’m not sure which is better.
In any case, this week I finally cleaned up the last remnants of some nastiness that one of my users got himself into. He followed a link from Google search results to what seemed like a perfectly legitimate blog. He was looking for some poetry reference in the Sex In The City movie. (Yeah, I know, I know. A big, tough oil industry service guy looking for poetry in a chick flick. Go figure!) Well, when he got to this blog, it had an embedded player with what it claimed was a clip from the movie. But, when he went to play the clip, it told him he needed to update his Flash player and provides a “helpful” link. That’s when all manner of unholiness broke loose on his computer.

Well, he got updated, all right. With spyware and virii. I lost count of how many and what kind there were. One changed his time and date format to include the text “VIRUS ALERT!!”, so that it appeared next to the time on his Taskbar. Another made his main hard drive, his “C” drive, disappear from his My Computer! And, at least one of these was the FakeAVAlert trojan, but I never did figure out which one scrambled his My Computer. The funny thing was, after running every anti-virus and spyware removal tool that I normally use, the drive was still hiding somewhere. But, he was running from that drive just fine! Well, I searched for a day or two, while doing the rest of my normal gig, but never could find why this had happened.
I did, however, find a fix. TweakUI from the Windows XP Power Toys. I loaded that on his computer then went in to it under the My Computer section and, sure enough, the local drive was shown as being hidden. I corrected that and **SHAZAM**!!
UPDATE: It occurred to me this morning, after posting, that I should let you all know how to fix the clock issue in more detail.  The setting is found in the Control Panel, under Regional Options, which is not quite intuitive.  Under Regional Options, choose Custom, then find Time and adjust the format per the screen instructions.  If you’re in Windows 2000, once Regional Options is open, choose the Time tab and adjust accordingly.

Yep, just like magic, I am.

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.