Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

8/19/2011

Alexandria

Filed under: Art,Fun,Linux,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:01 am for you boring, normal people.
The moon is Waning Gibbous

No, not some new chick I’m dating.

Sadly, it’s Linux software.   Okay, well, not so sad, because it’s Linux-based software to help you track your personal library.
Yeah, yeah, I know, what kind of geek has a personal library that’s worth cataloging, right?  Yeah, well, as it turns out, me.  I probably have a couple thousand books of one kind or another spread all over my house.  I’m pretty sure virtually every room in my house has a stack of books in it, if not a full bookshelf.  And, yes, I do lend quite a few books and they sometimes go missing.  And, yes, I have so many books, I have, on very rare occasions, bought the same book twice.  And, finally, yes, I’ve been talking about doing this for years, but this software actually looks like something I might use.  Besides, it’s free.

Among the features are the ability to search by ISBN, author, title or keyword so you can find just the book you’re thinking of in your collection; the ability to retrieve information from on-line bookstores and other sources; and the ability to use several different scanners, including the CueCat, for data input.  (You can read more about the features here at the Alexandria FAQ.)  There is more information, including a manual and screen shots at the Alexandria homepage.

So, yeah, a little geekier than my usual Friday Fun post, but it’ll probably excite the librarians among my readers.
(And, I really hope there are some sexy librarians who still read this blog!)
Enjoy your weekend!

8/12/2011

Extend your Kindle

Filed under: Fun,Red Herrings,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:27 am for you boring, normal people.
The moon is Waning Gibbous

But, sadly, not for the software Kindle apps.

Okay so these two tools I’m going to share only work for the Kindle, and mostly rely on the ability to e-mail documents to your Kindle, but SendtoReader works with a Manual Delivery option, too.  SendtoReader is a web app that lets you send any webpage to your Kindle for later perusal.  Though, as I mentioned, you need to have an actual Kindle if you want to update it without synching via a PC first.
I have to admit, I was all excited about this web app, until I went to sign up for it and discovered that the Android app on my ColorNook wasn’t able to get e-mail directly from Amazon’s on-line document delivery service.  Still, if you’re using an actual Kindle, this would be a killer app.

And, ToDo list for Kindle is, well, a to do list that you can send to, and update, on your Kindle.  So, you know, pretty much what it seems like it would be from the title.

So, there you go.  Two free web apps to get more out of your Kindle, just in time for the weekend!
Enjoy!

8/9/2011

Cyber Pearl Harbor?

Filed under: Geek Work,News and Current Events,The Dark Side,Things to Read — Posted by the Network Geek during the Hour of the Pig which is in the late evening or 10:41 pm for you boring, normal people.
The moon is Waning Gibbous

Really?  Are they bringing this one out again?

I’ve heard about the dangers of “cyber war” almost since I got started in this business twenty years ago.  Essentially, since the internet existed, people have been claiming that dangerous hackers are going to take over our infrastructure from within.  Sound familiar?  Like, oh, say, the Red Threat of the Cold War?
It’s pretty easy to get IT guys like me whipped into a frenzy about this.  Back in the day, Winn Schwartau wrote THE go-to book on the subject, [amazon_link id=”B00127UJMO” target=”_blank” container=”” container_class=”” ]Information Warfare[/amazon_link], and in that book he talked about a so-called “Cyber Pearl Harbor” that ushered in a new era of digital warfare.  Well, now, it seems, ZDNet is reporting that we may have already had our so-called Cyber Pearl Harbor.  According to security researchers at McAfee, and elsewhere, several targets, including the United States, have been under a five year sustained cyber attack and they went on to speculate that a “state actor” was likely behind the attacks.  A security consultant at Sophos pointed out that fingers are usually pointed in China’s direction when government-funded and supported cyber attacks are discussed.  And, I have to admit, based on the other forms of espionage, especially industrial espionage, that we’ve seen from them over the years, it wouldn’t surprise me if they were using the Internet to attack various sites remotely in an attempt to get restricted information of various kinds.

But, is this a “Pearl Harbor”-like event?  I mean, really?
Do you see people rallying around this issue?  Are hackers joining the U.S. Military to defend our cyber borders?  If they are, it’s one of the best kept secrets in the world right now.  Seriously.
Pearl Harbor was a galvanizing event in our history.  That one event is what got us off the fence and into World War II, as a nation.  Honestly, I don’t see that happening here, or anywhere that high-level computer tech is the focal point of the debate.  We may rely on that tech to get our jobs done or to entertain us, but, really, most people don’t have any idea of the security work that goes on behind the scenes.  This is an invisible war, if it even can be called that.
Again, I think it’s a new form of Cold War.  It’s a battle waged in the shadows against an all but invisible enemy.  It won’t be fought like a conventional war of any kind, much less like World War II.  And, if the cyber war is an apt metaphor at all, then it’s a war we’re already fighting.

Oh, and as for the Chinese, well, they’ve already used their influence as a global market to get a partial retraction from those fine folks at McAfee, who are now claiming that there is no definitive link to any “state actor” of any kind, much less China.  Of course, I’ve only seen the back-peddling on a single, English-language, but Chinese supported, news site.  Still, that, my friends, is the view of the new global economy and the real war.  Big governments will start to throw their weight around and corporations will “adjust” their position on the truth to tap the market and access their bottom line.  Of course, that’s nothing new, either.  China’s been doing that for years.  Only now, they may be the biggest market still available in the entire world.
Looks like we all better start learning Mandarin!

7/22/2011

The History of Digital Photography

Filed under: Art,Fun,Red Herrings,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:07 am for you boring, normal people.
The moon is Waning Gibbous

You may have seen this already…

If you travel in the same tech circles on-line that I do, you probably have seen a lot of the same things I link to here on Fridays.  So, why do I still do it?  Well, for a couple reasons.
First, because maybe you missed it.  Or it didn’t seem like it was what it is so you didn’t actually look at it.
Secondly, because, well, I liked it, so I want to link to it so I don’t lose the link, even if you don’t like it.
And, thirdly, of course, because it adds search engine optimization “juice” to my tiny, little marketing tool, er, I mean, blog.

So, anyway, now that the business is out of the way, here’s the real stuff.
You all should know by now that I’m a little bit into photography.  (Yeah, yeah, I know, that’s like saying Shakespeare wrote a couple plays, but, still, you get what I’m saying here, right?)  And, of course, digital photography is “where it’s at”, as the hep cats say.  Well, as ubiquitous as it may seem today, it wasn’t always so.  Don’t believe me?  Okay, then hop over to ExtremeTech and check out their History of Digital Photography and see if that doesn’t change your mind.
Also?  It’s Friday and you’re obviously slacking if you’re reading this blog anyway, so you might as well go see something fun.

6/3/2011

James Joyce Condensed for Twitter?

Filed under: Art,Fiction,Fun,Red Herrings,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:57 am for you boring, normal people.
The moon is Waning Gibbous

Can someone “reimagine” Ulysses in 140 character bursts?

You James Joyce fans know that June 16th is “Bloomsday“.  The day that Joyce famously detailed in his epic novel [amazon_link id=”1617203475″ target=”_blank” container=”” container_class=”” ]Ulysses[/amazon_link].  Well, one fan is planning to reformat and reinterpret that famous novel via Twitter this coming Bloomsday.  She’s looking for volunteers to help with the effort, so if you’re interested, hit the article and follow the link there to her project site.  Or, if you just want to follow the action yourself, follow the @11ysses Twitter account before 8:00am (Dublin time) June 16th and see how well they make this happen.  It could be an interesting effort, or a total train wreck.  There’s no telling really.

But, I have to admit, I wonder about this.
The novel is, as you may be aware, a long, challenging literary experiment, of sorts.  And, it’s as famously challenging to read as it must have been to write.  So, I wonder, is dumbing down a classic like that to 140 character intervals really so fantastic?  I should mention that I’ve never actually read the book, though I occasionally feel the urge to attempt it, like some kind of pseudo-intellectual daredevil, attempting to jump a cultural canyon.  So, I wonder, will this project make it more accessible to the unwashed masses, like me?  Or, will it marginalize the work more than modern society already has?
Or will any significant portion of the modern world even notice?
(And, should any of that matter at all?)

2/4/2011

Arab/Muslim Science-Fiction

Filed under: Art,Fun,Life, the Universe, and Everything,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:40 am for you boring, normal people.
The moon is Waning Gibbous

This may cost me readers.

But, honestly, I think that’s okay.
I’ve never been shy about criticizing aspects of internationalism that I don’t like, like off-shoring call-center jobs.  But, on the other hand, I’m also not shy about reminding people that extremists give us a skewed view of a larger population.  I know there are people in the United States right now that think every Arab or Muslim is bad.  I disagree.  I think those people who claim to believe that they are all evil are simply ignorant of the rich and diverse culture that exists outside of their own small neighborhood.  I hope before those of my readers that may think that there is no such thing as a good Arab, or Muslim, follows the link I’m about to share and reads a little of what they find there before writing me off.

Some time ago, through various other blogs, I came across a link to Apex magazine’s 18th on-line issue.  The Arab/Muslim Issue.
I have to admit, I was intrigued.  For one thing, I don’t think I’ve read any recent fiction by anyone from that culture.  For another, Apex specializes in fantasy and science-fiction.
This is some brilliant work.
Go read “The Green Book” by Amal El-Mohtar, a story about a book possessed of a spirit that corrupts her reader.
Or, try “50 Fatwas for the Virtuous Vampire” by Pamela K. Taylor about a Muslim vampire trying to follow the Law of the Koran and stay pure.
Or, my favorite, “The Faithful Soldier, Prompted” by Saladin Ahmed about a soldier who’s combat implants talk to him with the voice of God Himself, perhaps.
There are more, but these three stories were masterful looks at a culture most of us don’t see.  They see myths reinterpreted in ways we may not have considered, or a future which may be all too possible.

Really, I joke around a lot on wasting time on a Friday, but these stories aren’t a waste of your time, I promise.
Go and read them.  Then think.
Thanks.

1/14/2011

Free Fiction from Ted Chiang

Filed under: Art,Fun,Life, the Universe, and Everything,Red Herrings,Review,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:16 am for you boring, normal people.
The moon is Waning Gibbous

What are you doing today?

If you’re at work, you probably aren’t getting anything done because it’s Friday and, frankly, if you’re reading this blog, you probably aren’t going to get much done no matter where you are, so you might as well check out some of the best damn science-fiction I’ve ever read. And, no, I don’t think that’s exaggerating. At all.
So, go read Ted Chiang’s The Life Cycle of Software Objects at Subterranean Press.
Seriously. Go read it while it’s still up and free!

1/12/2011

Name Security

Filed under: Advice from your Uncle Jim,Geek Work,Rotten Apples,The Dark Side,Things to Read — Posted by the Network Geek during the Hour of the Rooster which is in the early evening or 6:21 pm for you boring, normal people.
The moon is Waning Gibbous

No, not your personal name, network names!

Yeah, since I’ve been thinking about computer security a little in this new year and new decade, I’ve noticed a slightly disturbing trend.  Spammers have been working at redirecting you to compromised domains.  One way they do it is something called DNS cache poisoning.  Another is straight-up DNS hijacking.

Okay, let me back up a second.  For my slightly less-technical readers, DNS stands for Domain Name System.  That’s the system of servers that translates website names, like “www.google.com”, into addresses that your computer understands and can connect you to via a browser.  It’s how you found my blog, though you may not have even realized it.
DNS Hijacking is usually accomplished via a “rouge” server, which is a server setup by spammers to publish bad information.  The more usual method, I think, and more insidious, is DNS cache poisoning.  With that method, spammers trick good, valid DNS servers into updating their records with bad information.  Giving them poisonous information, if you will.

So, now, back to the hard-core server admins.  Last week I was reminding everyone that the start of a new year is a great time to change passwords, but it’s also a great time to check on other security issues, like your DNS.  Luckily, Michael Kassner over at TechRepublic has written a blog post titled Test your DNS servers for spoofability.  It’s worth a read and worth running through.  Maybe even making it a regular practice, to see if your DNS has been compromised.

Oh, and if you all want to read more about DNS, and how to implement it, there’s a great book from O’Reilly titled [amazon_link id=”0596100574″ target=”_blank” ]DNS and BIND[/amazon_link] that’s well worth owning.  Trust me.


Advice from your Uncle Jim:
"The ultimate measure of a man is not where he stands in moments of comfort and convenience, but where he stands at times of challenge and controversy."
   --Martin Luther King

10/8/2010

Microsoft Security Book…

Filed under: Art,Fun,MicroSoft,The Dark Side,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:32 am for you boring, normal people.
The moon is Waning Gibbous

…for teens?

Okay, so according to LifeHacker, Microsoft has released an on-line book about internet safety and security aimed at kids and teens.  It’s called “Own Your Space – Keep Yourself and Your Stuff Safe Online“.  No, seriously.  They describe it as a way to “…[h]elp teens ‘own their space’ online.”  Apparently, also meant for adults to help their “tweens” and teens “… keep up with the latest computer and online safety issues and help kids learn to avoid them.”  The book was written in “partnership” with security expert and author Linda McCarthy, who I honestly have never heard of before.

So, it’s hard to argue with the alleged intent behind this free, downloadable book, but I’m wary of anything from Microsoft that claims to be related to “security”.  On the other hand, what little I actually saw of the book was okay and had fun illustrations, so it may not be all bad.  I mean, at least it’s a starting point for parents to talk to their kids about on-line safety and security.  But, Microsoft has a long way to go to make up for Internet Explorer and holes it created in so many systems over the years.

In any case, it’s a fun looking book and you’re obviously not doing anything important or you wouldn’t be here reading my blog this Friday, so why not check it out for yourself?

10/1/2010

William S. Burroughs Graphic Novel

Filed under: Art,Fun,Things to Read — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:44 am for you boring, normal people.
The moon is Waning Gibbous

No, this is not a surreal, drug-induced alternate reality.

No, seriously, back in the late 60’s, before the term “graphic novel” had even been coined, William S. Burroughs worked with artist Malcolm McNeill to make the experimental Ah, Pook Is Here.  It was a multi-year collaboration that flashed briefly on the literary scene of the time, then disappeared.  However, Fantagraphics has plans to resurrect this lost treasure as a two volume set.

I’m not familiar with the artist, though there are some samples at that link above, and the book itself seems to be yet another of Burroughs’ experiments.  In fact, the article describes it as an extension of the “cut-up method” that Burroughs is famous for and liked so well.  Personally, I think it’s just interesting as a piece of history.  Alan Moore may have all the pretensions he cares to about his graphic novel work, but he can’t possibly hold a candle to this genius.

Anyway, it’s Friday, so take a mental health break and go read about this crazy experiment that was well before its time.

« Previous PageNext Page »

Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.