Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

6/8/2012

Get your ass to Mars!

Filed under: Fun,Life, the Universe, and Everything,News and Current Events — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:15 am for you boring, normal people.
The moon is a Full Moon

I love me some science-fiction!

Tonight, Ridley Scott’s return to the [amazon_link id=”B001AQO3QA” target=”_blank” container=”” container_class=”” ]Alien[/amazon_link] universe premiers tonight and I’m quite excited to see it.  In part, I’m excited because it starts on Earth and then follows the first team to the movie’s namesake planet; [amazon_link id=”B005LAIHY0″ target=”_blank” container=”” container_class=”” ]Prometheus[/amazon_link].  I hope it will show more of Ridley Scott’s vision of the future Earth and how we got to be the space-faring race we become in the later movies.  I’m looking forward to that because I think we’ve lost the drive to do that kind of exploration and I hope this movie will spark someone’s imagination and help get us off this sad, busted planet we’ve got now.
But, of course, that’s not quite what this post is about.

The quote which makes the title of this post comes from another science-fiction movie, which is being remade; [amazon_link id=”B000HIVOIM” target=”_blank” container=”” container_class=”” ]Total Recall[/amazon_link].  That movie, of course, has a significant portion of the action on our closer alien cousin; Mars.  And, frankly, I have more hope of us reaching Mars than leaving our solar system in my life time.  Part of that hope is due to projects like Mars One, who hopes to have people on Mars by 2023.
Granted, it is an ambitious project, but one that is possible.  How?  For one thing, they plan on the trip being one-way.  First there will be a series of unmanned missions that will bring habitat modules to the surface of Mars.  Then, again hopefully in 2023, a team of four colonists will travel to Mars and begin to live there.  Then, every two years another group of colonists will head to Mars, all also on a one-way trip.
And, how will they finance all this?  Simple.  With reality television.  Think of it as an interplanetary “Big Brother” or “Real World“.

Will it work?  Who knows?  But the Mars One video at IO9.com is pretty convincing.  And, hey, it’s Friday, so why not check it out?  (And, enjoy the movie tonight, too!)

5/25/2012

Mocktails

Filed under: By Bread Alone,Fun,News and Current Events,Red Herrings — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:06 am for you boring, normal people.
The moon is a Full Moon

Just in time for the holiday!

So, we’re about to start Memorial Day Weekend, which for most of us means picnics and barbeques and parties.  And, at least where I’m from , that means drinks!  But, the thing is, I know a lot of people who don’t drink alcohol any more for any number of reasons.  For one, let’s face it, we’re getting old and fat and all those fine alcoholic beverages are just loaded with calories.  (And, after one too many, we all tend to make asses of our selves in a manner unbecoming our age!)  So, what’s a fun-loving party person to do?  Well, make one of these 15 Delicious Non-Alcoholic Spritzers, Sodas or Mocktails, brought to you via the Kitchn.

Sure, we may not enjoy that obnoxious guest at whatever party we attend, but, if we drink these fine, non-alcoholic drinks, at least we are less likely to BE that obnoxious guest!
Have fun this weekend and be safe!

5/11/2012

How Much Are You Worth?

Filed under: Art,Fun,Life, the Universe, and Everything,News and Current Events,Red Herrings — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:19 am for you boring, normal people.
The moon is a Full Moon

I mean, on a piece by piece basis.

Have you ever wondered just how much you’re worth?  And, I don’t mean that old thing about how much the various chemicals that make up a human body are worth, but how much are we worth, as assembled?  You know, on the basis of our individual parts.  I’ve often joked about paying off debt by selling a kidney, but, sometimes, I honestly wonder just how much I would get if I could actually do that.
Well, now there’s a handy reference chart to tell you just how much your body parts are worth.  No joke.
The chart is priced in UK Pounds Sterling, so you’ll need to convert it, but, still, it’s pretty fascinating.

Incidentally, this is theory only, since you can’t actually, legally,  sell body parts, as far as I know.  And, I would assume there are variations in price based on the quality of the part.  Also, since I’m a cancer survivor, I actually can’t even give away my parts.  No one would want them any more.  How sad for me!  There goes my “get out of debt” plan!

Anyway, it’s a fun, if somewhat ghoulish, way to spend a little slack time on a Friday, so enjoy!

3/9/2012

Social Media Papers

Filed under: Art,Deep Thoughts,Fun,News and Current Events — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:36 am for you boring, normal people.
The moon is a Full Moon

Soon, you’ll need a passport to enter Facebook.

No, not really.  Well, probably not, but I’m sure Zuckerberg wouldn’t mind issuing passports and currency!
Regardless, in this case, I’m talking about an art project with a social consciousness that I read about on Gizmodo; Facebook ID Cards.
Those of you who know me, know how obsessed I can become over realistic, but fake, marginalia, like stamps, currency, government documents, and, of course, identification cards just like these.  Things like passports and driver’s licenses are the ephemera of our lives that we often use to define who we are and identify us to strangers, especially those in authority.  We tend to take them for granted, but someone designed them and they serve some purpose, whether it’s to tell a police officer that we are certified to drive or Facebook’s security goons that we’re allowed to access our friendlist.
So, no, it hasn’t happened, yet, but I suspect it will one day.

And, did you notice that they astutely included a QR Code in their design?  Remember that article I linked to earlier in the week?  Might want to read that again…

2/29/2012

On-Line Dating Security

Filed under: Advice from your Uncle Jim,Bavarian Death Cake of Love,Geek Work,News and Current Events — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 12:39 pm for you boring, normal people.
The moon is a Full Moon

I’m pretty sure I was propositioned by a prostitute on Match.com this morning.

I could be wrong, of course, but when a 27-year-old woman who’s profile says she’s “almost divorced” and looking for people in the age range between 35 and 37 sends an email to a 43-year-old man (ie. me) asking if he’s interested in a “one-nighter”, it seems suspicious to me.  Maybe I’m just cynical.
She started off sending me a short note that was a little vague, but at least sounded like she might have possibly read my profile.  Well, except for the part where I was 43.  But, most people I bump into out in the world aren’t very detail oriented, so I gave her the benefit of the doubt and  suggested that I might be a little old for her.  I went on to explain that I wasn’t comfortable dating someone who hadn’t started school yet when I would have graduated from college.  What I didn’t say was that it would make me feel like a pervert to dating someone potentially young enough to be my daughter, but, that’s what I was trying to get at, in a polite way.  Then I wished her good luck in her search and went on my merry way.
This morning, I got a note back asking if I was interested in a “one-nighter”.  And, then she gave me an e-mail address at Hotmail.com.  That raised two, giant red flags for me.  First of all, while I am a wizard in the sack, there’s nothing about my Match.com profile that would indicate that to the casual observer.  And, frankly, while many women find me absolutely adorable, I think that’s more based on my personality and sense of humor than my rugged good looks.  It’s been years since I was pretty.
So, sure, maybe she’s just a messed up kid trying to work out her “daddy issues” and not a hooker, but I suspect that she’s looking for an entirely different kind of “daddy”.  Either way, I don’t need that particular flavor of drama at this point in my life.  Seriously.

But, oddly enough, earlier in the week, I was reading a security blog at TechRepublic by Michael Kassner.  The entry was titled “Online Dating Services Risking More Than a Broken Heart” and was all about the potential security issues related to on-line dating.  Now, I work in the industry and I maintain pretty decent security, even at home, but I know not everyone is quite as paranoid as I am.  And, that’s just within the IT industry!  I cannot imagine the wild and wooly dangers faced by people foolish enough, or desperate enough, to contact someone who seems to good to be true through their own, personal e-mail address!  Not to mention how much data you put up on a profile that may be active indefinitely on a dating site.
So, go read his article and think about what you put out there, where you put it and who might be reading it.

Oh, and one last bit of dating advice from your Uncle Jim, if she seems too good to be true, she probably is!


Advice from your Uncle Jim:
" Reasonable men adapt themselves to their environment; unreasonable men try to adapt their environment to themselves. Thus all progress is the result of the efforts of unreasonable men."
   --George Berbard Shaw

2/7/2012

DNS Attacks Are On The Rise

Filed under: Geek Work,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Snake which is just before lunchtime or 11:14 am for you boring, normal people.
The moon is a Full Moon

DNS has inherent weakness.

In it’s current form the Domain Name System, by it’s open nature, is pretty primed for exploitation.
Some of these attacks are more obvious than others, but there are two that I find particularly troubling.  More so that I can see them being used together to really mess with a website owner.
The first of these two attacks isn’t new.  But, the fact that it isn’t new and has been dealt with before doesn’t mean that it has suddenly stopped being effective.  The attack is called “DNS poisoning” and it works by corrupting the DNS cache on a server, which then forwards those poisoned DNS records as legitimate to other, unsuspecting servers.  The end result is that the attackers can redirect traffic from a legitimate website to their own site.  It’s hard to flat out stop right now, though, once discovered, it can be fixed with relatively little trouble.  This attack was used recently against several websites who were supporting SOPA and PIPA.  Of course, since these folks were trying to make a statement, it was pretty clear what had happened, so techs were working to fix it pretty quickly.
The second attack, which I would think include the first attack at its initial stages, is sub-domain hijacking.  In this attack, the attackers redirect the sub-domain of an existing site to another location.  This is a little more subtle and hard to detect.  In this case, the attackers are looking to profit from a well-established domain by “piggy-backing” on their reputation.  They poison the DNS records to point something like Viagra.google.com to their actual website, selling Viagra, or a site filled with spammy links that redirect a potential victim to their website selling Viagra, or whatever.   This attack takes a proactive system administrator to catch.  Since it doesn’t redirect any of the main, honest, actual site anywhere, but only uses its reputation to improve their own spammy links, it’s not always obvious that it’s going on.  Regular DNS record audits are about the only way to catch this, barring an angry end-user contacting the main site.

The internet is still a wild and wooly place sometimes, folks.  The reasons the professionals get paid what they do is because, theoretically, they have to deal with all that stuff and keep us safe!  Which reminds me, I have to go check my own company’s websites and DNS records, not to mention my own!
(The title, incidentally, was inspired by the movie that helped get me into this business, Sneakers. “Cattle mutilations are up.“)

11/10/2011

Hard Drive Prices

Filed under: Calamity, Cataclysm, and Catastrophe,Geek Work,Life, the Universe, and Everything,News and Current Events — Posted by the Network Geek during the Hour of the Horse which is around lunchtime or 12:36 pm for you boring, normal people.
The moon is a Full Moon

Looks like they’re about to go up.

And, if what I’m reading in the media is any indication, by quite a lot.
I know I mentioned this a couple weeks ago, but the tech media seems to just be really catching on to this.  The folks over at ExtremeTech, who are really into their hardware, have a great article about what’s going on with drive prices.  And, perhaps more importantly, what they think is going to happen to drive prices.  In short, it’s not good.
Seagate is expecting shortages in their supply chain for “several quarters”, and that, of course, translates to a higher demand.  And, for all of  you who slept through your basic Economics course in school, higher demand on a limited supply results in higher prices.

Of course, this is all due to the terrible flooding in Thailand, where key components are made for a number of electronic systems.  I’d expect that shortly after Christmas, a number of things will go up in price.  Anything that relies on a drive for a key component, like PCs or laptops or network attached storage, will clearly cost more.  But, I expect a lot of different cameras and similar electronics to go up in price, too.
This is the downside of a global economy.  And, it’s also why we should be concerned with the welfare of our fellow humans on the far side of the globe.  We’re all interconnected, now more than ever.  I hate to equate such an enormous disaster with our creature comforts and the price of consumer goods, but, well, it’s the only way some people can get their mind around how important it all is.
The world is so interconnected now, what happens in any one country, no matter how small, has far reaching effects on the entire world.

10/31/2011

The Worst Kind of Cross-Platform Porting

Filed under: Apple,Linux,News and Current Events,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:58 pm for you boring, normal people.
The moon is a Full Moon

Hackers are porting Linux viruses (virii ?) to OS X.

Last week Monday, ZDNet reported that hackers have ported code for a trojan from Linux to Apple’s OS X.  For those of my readers who don’t know what a trojan is I’m referring to a malicious program that opens the door for other, usually even worse, programs to come into the infected operating system, like the Greeks did in the classic stratagem known as the Trojan Horse.  It hasn’t been seen in the wild yet, but apparently the C source code for this has been available for quite some time.

Frankly, I’m surprised that this doesn’t happen more often than it does.  In the old days, virus writers had to really know something because they used assembly to create them.  Now, with Windows and all the other object-oriented programming languages filled with bloated libraries of programming calls, along with the availability of existing code on the internet, they hardly have to know anything to write fairly nasty malware.  And, as I’ve mentioned before, as Apple laptops become more popular, more malware will start to show up there.  I’m sure it’s only a matter of time before they figure out how to infect iPads and iPhones, too, if they haven’t already.

I hate people like this.
I spent most of my day today cleaning a malware infection off a machine.  This little bugger had not only disabled the Windows Task Manager, which is pretty common these days, but it also cleaned out the Start Menu, including all the built-in things like the link to Control Panel and My Documents and all those things on the right side of the Windows XP default Start Menu.  But, it also flagged most of the drive as Hidden and System, making it even more difficult to load the software I used to clean it.  I had to go into Safe Mode just to get the system clean enough to restart into Safe Mode with Networking so I could update Malwarebytes, which is what I eventually used to get rid of the beastie.   (I used Spybot Search and Destroy to keep the malware from loading to make the machine useable with networking support so I could update Malwarebytes, incidentally.)
So, yeah, these slimeballs keep me in a job, but, really, I’d appreciate it if they stopped helping me stay employed.  I promise I can find plenty of other things to do!

So, look lively out there people!  Be suspicious of what you download and click on!

UPDATE:  Apparently, this has been found out in the wild now.  And, according to TechWorld, it has a purpose; to use your system to generate BitCoins for it’s evil masters.  Very clever.  Nasty, but, still, very clever.

10/24/2011

Light Field Camera

Filed under: Art,Fun Work,News and Current Events,Ooo, shiny... — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:31 am for you boring, normal people.
The moon is a Full Moon

Well, this is interesting…

Some time ago, I read about a revolutionary new idea in cameras; focusing after taking the photograph.
Having had autofocus occasionally grab the wrong thing in a photo, this idea intrigued me.  The idea that a camera could simply capture all the available light, store it in a photographic format, and let you choose later where you wanted to focus seemed, frankly, like an impossibility.  It seemed like science-fiction.  Well, apparently, the future is now, because this camera…
Read More

10/17/2011

Your Password Is Too Weak!

Filed under: Advice from your Uncle Jim,Geek Work,News and Current Events,The Dark Side — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:19 am for you boring, normal people.
The moon is a Full Moon

No, seriously, it is.

If it makes you feel any better, most people’s passwords are too weak.
I suppose you think it doesn’t matter how “strong” your Gmail (or Hotmail or whatever free email you use) password is, right?  Well, you’d be wrong.  I recently read an account about how one person’s Gmail account was hacked and used to spam and try to get her friends to send the hacker money, all posed as her.  Of course, that was after deleting more than 4 Gigabytes of stored messages and photos.  You can read that account, as told by her husband, over at the Atlantic, in an article titled “Hacked!”  It’s worth reading, especially if you’re not in the IT business.  And, frankly, even for a fellow professional computer geek, it might be eye-opening to see how hacked email accounts are being used these days.  I have to admit, I was a little surprised that the attacker in question actually used the account personally to try and con money out of the victim’s friends and family.

I was not, however, all that shocked to see how many accounts are compromised on a regular basis.  Think the thousands.  Daily.
Right, so thousands of email accounts on which people depend are hijacked, used and abused on a daily basis.  If it hasn’t happened to you, it’s probably only a matter of time.  So, how do they do it?  Shared, easily guessable passwords.
Yes, it’s that easy.
Stop for a minute and think about how many passwords you use on a regular basis.  How many are the same?  How many accounts do you have for things like bank accounts and credit cards and medical records that use the same password as your email?  And how many of those accounts use that same email address as the username?
Getting the picture?

So, what do you do?
First, stop reusing passwords.
Second, make more secure passwords.  And, don’t think that the old way of replacing “L” with the numeral one or the letter “O” with the numeral zero and that kind of thing will work, either.  The hackers are on to that.  It’s better to use words that are not in the dictionary.  So, yes, made up words.  Or, even better, phrases, which is what I’ve recommended for some time.  Having a hard time coming up with one?  Try using one generated randomly for you at passphra.se, a random passphrase generator which was inspired by an XKCD comic.  The comic explains the reasoning behind the passphrase idea and the generator.  Also, XKCD is pretty funny and if you’re geeky like me at all, it’s well worth checking out.

In today’s world, we’re way too interconnected and digital and reliant on those systems to have relaxed security.  It doesn’t matter if you’re a geek or not.  Please, think about your passwords and how easily they might be compromised.  Then think about what that might mean to your life, digital and otherwise.
Now, if you’ll excuse me, I have to go change some passwords…


Advice from your Uncle Jim:
"When you handle yourself, use your head; when you handle other, use your heart."
   --Donna Reed

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.