A friend of mine pointed me to an interesting article on SOA called Service Oriented Architecture is your Ticket to Hell.
Its on a blog called "The War on Bullshit" It's a short, but good read on a few of the flaws of SOA
Bookmark this post:
|
>
A friend of mine pointed me to an interesting article on SOA called Service Oriented Architecture is your Ticket to Hell.
Its on a blog called "The War on Bullshit" It's a short, but good read on a few of the flaws of SOA
Bookmark this post:
|
Posted by Jordan Silva at 4:28 PM Blognetwork
Labels: Product Review
I've been using Windows Vista off and on since the first release years ago and have watched it grow and turn into a pretty good OS. (yes some of you hate it, I know, I know...but I don't care) Durring this time I have found that there are things I love about Vista, things I like about Vista, and things that just irritate me about Vista. So instead of just dealing with the problems, I decided to fix them.
Bookmark this post:
|
Posted by Jordan Silva at 12:28 PM Blognetwork
Labels: Product Review, ThinkSmarter, Tips:
Being that I'm on a computer most of the day, I like to make them my own. I like every aspect to be just right, and big part of that is how it looks. Changing color schemes and desktop wallpapers are nice (and I do both) biut one feature that is a bit more difficult for the average user is changing the log in screen. Today I came across a program for Windows Vista that makes it effortless. The product is called LogonStudio Vista by Stardock
LogonStudio Vista by Stardock is a very simple specialized piece of software that allows you to change the log in screen on a Windows Vista computer. You simply install the software, and via a very clean and clear GUI pick the photo you want (either from a few that come with it or from your hard drive) and it will set it as the background for you log in screen. In all it took me about a minute to download, install, and then change my log in screen.
Stardock also offers several other tools for modifying your Windows user interface so go check them out.
Bookmark this post:
|
Posted by Jordan Silva at 4:30 PM Blognetwork
Labels: Product Review
OK, we all know that there is no magic "fix it" button when it comes to computer. (Trust me, I've built tons of them and have fixed even more, if it was there, I'd have found it). So I'm going to try and do the next best thing and offer some advice to help you find out what is causing the problem with your computer.
Restart the computer:
The first thing I always ask my clients/users to do when they are having trouble with their computer is to just restart it. whether it is the computer just acting sluggishly, a program not opening properly, a web page not loading properly, just go ahead and give the computer a restart. Restarting computers fixes so many problems it is ridiculous. It is the closest thing to a magic button there is.
The reason restarting fixes so many problems is because while you are running programs and opening files on a computer, the computer is storing them into temporary memory. If for some reason, one of these files get written incorrectly to that temporary memory or conflicts with a file that is already there, it can cause problems. Restarting the computer clears out that temporary memory.
(tech secret: having a user restart a computer does more than just clear the temporary memory on their computer. It also clears that mental block a user creates that makes them think "this computer is broken!" Once the computer reboots, the computer has done something so it changes the users mind state to again think the computer has the chance of working, and usually it does. This works especially well when users are mis-typing their passwords and refuse to believe that is the problem)
Think Back:
"But it was working earlier!" is one of the worst arguments ever made. Everything was working before it was broken, so your goal is to find out what happened at the point where the computer went from "working" to "not working". So think back. What were you doing the last time the computer was working? Did you install a new piece of software? Did you install a new piece of hardware? Did you attach any new peripheral (printers, scanners, mp3 Players, Digital Camera, etc).
If you did, uninstall them. There is a good chance that whatever you installed is causing the problem. Yes, even plugging in a simple peripheral can cause problems, because when you plug it in, your computer needs to install drivers (basically the set of instructions for your computer to use a device). These drivers sometimes can cause conflicts with other software/hardware on your computer. So the easiest way to test if this is the problem is to remove them (contact the manufacturer of the product for instruction on how to remove hardware drivers from your computer)
Tips to prevent problems:
Bookmark this post:
|
Posted by Jordan Silva at 4:33 PM Blognetwork
Labels: ThinkSmarter, Tips:
Social Engineering: n. the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information
One element of digital security that is typically over looked is the human element. People, for the most part, are trusting and want to help others in need. While this may be good for the human race in general, its not good for security, and thats what we are talking about.
Training staff members to recognize and protect sensitive data is imperative to keeping it a secret. In addition to recognizing what should be considered sensitive, a staff member must also recognize an attempt from a non authorized person to obtain that data.
For instance, most companies post the names of their executives or other prominent members of their organizations on their website. If a person were to call in to one of your smaller offices, or call someone low in the company answers the phone (we'll call her "Jen") and says they are the VP of sales, most employees probably wouldn't challenge that fact unless they happen to know the VP personally or have at least met enough times to recognize the difference in voice etc. Because of this Jen is probably going to be on her best behavior and want to help as much as possible. If the person calling says they are on a business trip and cant seem to find the number for the IT department or Help desk and needs his password reset, I'm sure Jen would happily turn over that information, because what harm could that do? Now the caller can call that inside phone number, but instead of saying they are the VP of some department, they say they are a new employee (with another phone call a person can obtain the name of an employee) and Jen told them to call here to get their password reset. This gives the caller some perceived credibility since they seem to know a person in the company and also because they are new, people want to help them. So the person taking the call, if not properly trained, or if no checks are put in place will reset their password for them and the intruder now has a user name and password to access company info.
This is a really simplified example, but unfortunately its not unrealistic. Without proper training, staff wont challenge someone the perceive to be their superior. So staff need to both know they should do this and also feel comfortable doing it. In the military soldiers are trained to challenge those who approach an area they are guarding, they are taught that they should respectfully demand proof of identification if one claims they are a superior. This is the thought process staff should be trained with. No one wants to inconvenience another person, especially one who is their superior, but for the sake of security and confidentiality, it is sometimes necessary.
So how do we prevent things like this from happening? There are a few things that can be done.
* Teach staff to identify sensitive information. And properly label items as "internal use only" or "confidential" to prevent any confusion.
* Be sure staff know never to share their password, not with anyone, not even the IT staff. Your IT department can reset the password if they need access to your account, its rare they will actually need your password.
* Put policies and procedures into effect that control how user names/passwords are controlled. Who can do password resets? Who can authorize them? and how do you verify the identity of the person who is requesting it?
But primarily what you need to do is educate you staff and have them understand the reason these things are considered sensitive. Saying "this is bad" doesn't mean much to a lot of people, explain why its bad, explain what can happen if that data is released to the wrong people, and be sure they understand it. Have consequences for when data is mistakenly released, but do not rely solely on the fear of consequences to get staff to follow these rules. And of course treat you staff well. People who feel appreciated, who are happy at their jobs, and who feel they are a part of the company will protect it's interests. A guy you yell at, who hates where he works, and doesn't really give a damn will probably give up what ever info is asked for just because it makes no difference to him.
Bookmark this post:
|
Posted by Jordan Silva at 4:34 PM Blognetwork
Many believe that having "false security" or having the perception of a secure environment is more dangerous than having no security at all because at least when you realize you have no security, you are on the look out for strange behavior.
An example of false security that I have seen were the door guards at a retail store I worked at. When employees left for the day, the door guard was instructed to check the employees bag to be sure they haven't taken anything. In addition to that, if the employee owned a product that the store sold (it was an electronics store so it was very common) we had to log them into a book and include make/model/serial number. It sounds like a good idea right? well here are the flaws.
Bookmark this post:
|
Posted by Jordan Silva at 4:30 PM Blognetwork
Labels: Computer Repair, Security, Tips:
Mac Myths Debunked:
* Macs are More Expensive: There are a few reasons Apples are perceived as more expensive than PCs.
o The first is because there are a limited number of models of Macs available at any time. If you actually compare a PC with the identical hardware as that of the Mac you are looking at instead of comparing a Mac Pro with some bottom of the line eMachine you will see the actual price difference isn't nearly as severe as you thought.
o Apples do not come preloaded with trial software from 3rd parties. A PC will come loaded with a trail of some ant-virus a trial of MS Office, a trial of some DVD making software, etc. Each 3rd party who wants their software on the computer pays a little to the maker of it and that helps subsidies the cost of your computer.
o Apple spends a lot more time on the design of their product than a PC so in most cases you will have a much cleaner looking computer.
o Apple includes more full versions of software than the typical PC (iPhoto, iMovie, iTunes, etc.) this is not to say you can't get similar software for free on a PC, but they don't usually come preloaded. (although some do)
* You can't find good business software for a Mac:
o This is outdated. Not only are there great business apps available on the Mac of, but with things like Parallels, Bootcamp, and Virtual PC you can run Windows on your Mac, which means if its on your PC...its on your Mac.
* Macs can't get viruses:
o This is false. Although the Mac OS has no viruses that I'm aware of, the software that is running on your Mac can still be exploited.
o It is true that there are a lot less viruses for the Mac. The most common argument is that the reason for this is because Mac has way less users, now while this is true, it is not the complete reason. Part of the reason is not the number of people who use the product, but the target audience of the product. Microsoft has the business world locked into their products (for now). Many viruses are made to target businesses, so that's the software you want to exploit. Also Microsoft Windows is less secure out of the box than the Apple OS, it can be secured very well, but most people don't know how to do it, and because of that, they are more vulnerable. So yes, there are more viruses.
PC Myths Debunked:
* You can't do audio/video/photo editing on a PC:
o This is not true. There is professional grade software for the PC is ready available.
o No, this software will not run well on that 400 dollar PC you just picked up, but if you buy a good machine, they will run very well.
* PCs are not secure:
o This is false. PCs are only insecure if you do not take the time to patch/update and secure them. A good windows administrator can make his Windows server just as secure as a Good *nix admin and a good Mac admin.
o There are TONS of software available to assist with this if you aren't capable of doing it yourself, and Microsoft includes some of it for free (windows defenders helps with ad ware...although its definitely not the greatest. Windows Firewall does a decent job) and there is a lot of free software that is even better than that. The problem is the average user does not take the time to learn this, so PCs are perceived as more insecure because out of the box they are and its rare that a user will make the appropriate fixes.
So which computer is "better"? The answer is which ever fits your need. Do you feel more comfortable using the windows operating system than you do Mac OS? Do you really need all the power that is included in even the bottom of the line iMac? In reality, if all you are doing and all you are planning on doing is writing word documents and checking your email, than any computer you buy (or have bought in the last 5 years) is powerful enough. But if you want to do photo editing, or movie editing, even if just for fun, then you need to look for something that fits that need.
PCs are great if you are looking for something cheap, if your budget is around 600 dollars then yea, you can definitely find a computer for that much, but it will include a bunch of demo software that you will need to remove. If you want something that takes up a little space, looks good, and runs well and will take little upkeep, buy an iMac. There is a reason stores have these all on display, it's so you can look at and play with the different features of them. Use the tool you are comfortable with, not the one that you read was better for reason xyz..
Me? I use Windows primarily. It fits my needs perfectly, I am very familiar with them and because of that, I can secure and control a network full of them. I also have a desktop running Ubuntu on it so I can get even move familiar with the *nix operating systems, the more I use it the more I love it, its great, but I still haven't been able to say that I am confident in my ability to secure it, and then deploy 100 of them and manage and secure them properly. I have used Macs in the past and they are great. Their interface is clean; they come with great user friendly software. The hardware is good and high quality. But for me, they aren't the right fit. I like to build my own computer; I can't do that with an Apple, not yet anyway. And at the end of the day, I just can't justify spending the money on one since it doesn't fill any specific need for me. Do I recommend Apples to other people? Of course, if they are a good fit for that person. But not because of the Myths mentioned above.
Digg!
Bookmark this post:
|
Posted by Jordan Silva at 4:34 PM Blognetwork
Labels: Product Review, Tips:
Biometrics: n. The measurement of physical characteristics, such as fingerprints, DNA, or retinal patterns, for use in verifying the identity of individuals.
In recent years the use of biometrics as a way to authenticate users has become more and more popular. Fingerprint scanners are now readily available at electronics stores and are becoming standard on laptops. The reason for this is because using fingerprint recognition is an easy and fairly accurate way of identifying a person without the need for them to remember a password. In addition to fingerprint recognition some building have begun using palm scanning and retinal scanner (to a much lesser extent) as a way to identify the person who is trying to get in.
Why Biometrics are gaining popularity:
Bookmark this post:
|
Posted by Jordan Silva at 4:36 PM Blognetwork
This error message has been popping up a lot at work and took me a while to figure out 1. what is causing it and 2. how to fix it.
Here is what I have gathered so far:
Bookmark this post:
|
Posted by Jordan Silva at 4:35 PM Blognetwork
Labels: Computer Repair
For this portion of the Balancing Security and Usability Series we will discuss the following things:
Bookmark this post:
|
Posted by Jordan Silva at 4:37 PM Blognetwork
To work smarter, you really need to keep well organized, and one way to do that is to use folders to keep your email inbox nice and clean.
When you use folders you really want to stick with a standard on how you want to organize your messages. You can organize by recipient, by topic of the email, by project, etc. but when you start to use too many forms of organization you will run in to problems finding the emails again because you won't know how you sorted that particular one.
Personally, I use folders based on Topic. So I have one folder for Current Projects, one for Completed Projects, one for Purchases, etc. Within those folders I use sub-folders to keep even more organized. So for instance; within my "Purchases" folder I will have a folder for each vendor I work with. And within the vendors folder I have a folder for "pending orders" "received orders" and one for "un-purchased quotes" This way I can look up any invoice from any vendor I have dealt with very quickly since I know where they are.
But to use folders effectively you need to actually get the mail from your inbox to its appropriate folders. Now if you only receive a few emails a day, reading them then manually putting them into their designated folders is ok. However if you are like me and receive over a hundred emails a day, this can get tedious. How do we solve this problem? Well, we can set up rules (the process for creating rules for your email varies depending on the software you are using to manage email).
The rules you create will obviously vary depending on how you decide to organize emails. If you are organizing email by sender, it's easy, you just create a rule that says "if sender = X, then move to folder X" It's simple you can also create rules that are based on the subject of emails. For instance it could be "If email subject contains "company party" than move to folder "company part". However this can become tricky since new events occur all the time and you would spend a lot of time just creating new rules, manual entry might be best for this.
In addition to the folders I mention above, I also have a few special folders. I have one that any emails with large (bigger than .5 MB) attachments on them will go to. I do this because my email also goes to my phone, and I don't want my phone to get bogged down with attachments, although I could configure my phone to do this filters, I like to keep all filters in the same place so when I need to change something I know where to look. I also have a folder called "non-urgent - non-problems" this is where I dump emails that people send me that are article they find interesting, or have a question that really is just general and not really urgent or a problem (like they want an opinion on a product). This lets me focus on the emails that need attention now and look at the others when I have some downtime, or just need a break from the problems.
Like everything else, one solution doesn't fit all, so find one that does fit. Folders can be a great help if used properly. They can also mess you up some if you over organize them (i.e. sort by different things)
Bookmark this post:
|
Posted by Jordan Silva at 4:36 PM Blognetwork
Labels: ThinkSmarter, Tips:
Some of the comments from my previous post "10 things your IT guy wish you knew" inspired me to write this post. These are some things that can help us help you. Simple things that allow us to fix the things that are irritating you as fast as possible.
1. When you email/call us please give us as much detail as possible about the problem. We don't expect you to be technical or know what actually caused the problem, but knowing what you were doing when it happened can help us.
2. Let us know as soon as you realize there is a problem. If you mistakenly delete something, stop working and call. Usually deleted files can be recovered, but the sooner you let us know the easier it is to do.
3. Most times we prefer receiving emails if the problem isn't urgent, or if your company has a trouble ticket system in place where you can submit the ticket, please do so. This helps us keep track of the problems and what we have done to resolve them, and it also helps us keep tack of who asked first. But if the issue needs to be addressed or you can't email (which happens if that's the nature of the problem) by all means give us a call.
4. Don't Lie. Just don't. If it was a mistake, I'll fix it and unless someone asks me about it no one else will know it happened. If I do get asked by your supervisor, ill most likely say it was a "glitch in the system" because people deserver a break if they made a mistake. If you make that mistake 10 more time or lie to me about it...I won't be covering for you.
5. If you are having a problem with getting on the internet/getting email/etc. basically anything directly related to your computer, please call when you are at your computer so we can do some quick troubleshooting over the phone with you. Another option is to send us an email explaining the problem and asking if we can call you at a later time when you will be available to do the troubleshooting.
6. If I'm working on something else on site and I'm away from my desk, or you catch me in the hall and ask me for something, I'll probably ask you to email me so I don't forget. If I don't ask, go ahead and email me anyway. Something simple like "per our conversation..." short and sweet. Include your contact info and I'll get back to you for details ASAP.
7. If you want new equipment I'm usually the wrong person to ask. In most cases its up to your department head to get the new stuff, we just install it. If you need some help convincing your boss that a new toy you want will benefit the company and make you more productive, shoot me an email and Ill make some time to help you out, I'm a tech, new toys make me happy, even if I only get to play with them while setting them up for you.
8. If I'm asking you to do some troubleshooting with me, please just do it. I have to check certain things before I come to your location and fix it. The more cooperative you are, the faster I can get those things off my list and the faster we get your problem solved. If you have done some troubleshooting on your own, let me know, it will probably save us time.
9. I don't know everything, as much as I wish I did. So sometimes I need to research a problem, when I get to this point Ill let you know that I just don't know the answer and need to go research it and ill be back. Sorry but those are the breaks.
10. Please don't tell me that you do inappropriate things on your work computer, if you do, I then have to investigate it (or advice my supervisor of the issue just to cover my ass) and then it will be investigated. And don't ask me how to get around the security I put in place. I'm not going to tell you, then I'm going to assume you will try and again, I need to investigate it. Save it for when you are at home.
Bookmark this post:
|
Posted by Jordan Silva at 4:37 PM Blognetwork
Labels: Tips:
Computer security is a balancing act. Too little security and you are at risk of lost or stolen data, data that gets mistakenly altered or just read by people who shouldn't be reading it. Too much security and people who really do need the information can't get to it, or getting to the data is just so hard, it's not worth having. These lines are not drawn clearly, and a good SysAdmin must be able to work with those who use the data and with the management of the company to find where these lines should be.
Over the next few weeks I hope to address some of the challenges new System Administrators face when trying to establish a good security policy for their organization. I also hope to provide a little insight on these challenges for those who are not in the IT profession, or not in that part of the profession. The way I see it, the more me know about each others jobs, the more understanding we can be when their are problems. So I hope you enjoy, and feel free to leave comments with your thoughts or recommendations.
Before we get started, there are a couple things. you need to realize when dealing with security, otherwise you will drive yourself crazy.
Bookmark this post:
|
Posted by Jordan Silva at 4:38 PM Blognetwork
Bookmark this post:
|
Posted by Jordan Silva at 4:38 PM Blognetwork
Labels: Tips: