RECOMMENDED: OpenDNS

Saturday, June 12, 2010

http://www.opendns.com/

Rock-Solid Security

   * Web Content Filtering

   Cloud-based, award-winning Web content filtering from OpenDNS with more than 50 categories of content. No appliance necessary. Effective against proxies, P2P, Web 2.0, adult and more.

   * PhishTank Anti-Phishing

   Industry-leading anti-phishing powered by PhishTank, the most authoritative source of phishing data on the Internet. Protects your network, organization and its employees from fraudulent phishing scams.

   * Malware Site Protection / Botnet Protection

   DNS layer security protects the most vulnerable level of your network against the latest threats, including viruses, worms and zero-day vulnerabilities.

   * Whitelist / Blacklist

   Lets you decide where your users can navigate on your customized Internet. Whitelist-only functionality available.

# # # # #


TECHNOLOGY: Printers with e-mail addresses

Wednesday, June 9, 2010

http://arstechnica.com/hardware/news/2010/06/hp-introduces-printers-with-e-mail-addresses-cloud-access.ars

HP introduces printers with e-mail addresses, cloud access
By Casey Johnston

*** begin quote ***

Hewlett-Packard has announced a new line of printers designed to work directly with smartphones and cloud services without the need for a computer intermediary. The printers are designed to take print jobs that are e-mailed to them or uploaded to a cloud service they can access. HP hopes the increased accessibility will encourage the use of printouts, as files can increasingly be carried on a single pocket device.

The new range of printers have Web access, either wired or wireless, removing the need for a print server or connection to a computer. They have touchscreens and e-mail addresses, and can print documents that are e-mailed to them from any source, as well as items from Web services like Google Docs. Users can schedule print jobs on the printers and set up regular print runs of their documents, like weekly menus or itineraries.

*** end quote ***

(1) SPAM! Can you think of junk mail faxes? How long do you think it will take for “Dr (Mrs.) Faith Zenwakolo, a dying woman who has decided to donate what I have to charity through any thoughtful and selfless someone” to guess what the email address is? Or whatever the complicated “security structure” that’s put in place to “protect” it. Wanna bet you’ll get HP advertisements?

(2) I want to print a sensitive document to my HP printer. Email? Unless it’s encrypted — in transit and at each place of residence — and the User controls the keys, and there’s no backdoors.

(3) And is there storage on the printer? How does it get erased?

Seems like a lot of questions!

# # # # #


RANTING: Opened sold as new

Wednesday, June 9, 2010

Went to WalMart to get a smaller table and cheap printer.

Had some “excitement” with the old lady, but that’s another story.

Got the printer home! It was only 40$. (Yeah, I know they screw you on the ink.)

And, the printer doesn’t work.

It’s been used and repackaged.

I knew it when I opened the box. The plastic around it was not like a factory seal.

The contents aren’t right. Stuff is missing. And the cartridges are either gone or in the machine.

I’m pissed that this is another example of a return sold as new. I didn’t think WalMart did that. I know Officemax, Staples, and Office Depot do.

And it had a very complicated anti-theft device around it. So that means the Store has to have done it!

Back it goes today.

Very disappointing WalMart. I thought you were above that. At least Best Buy has an open box sale area and you know it’s not brand spanking new.

Argh!

# # # # #


SOFTWARE: Trying Safari5 (It’s free!)

Tuesday, June 8, 2010

*** begin quote ***

Apple today released Safari 5, the latest version of the world’s fastest and most innovative web browser. This release features the new Safari Reader for reading articles on the web without distraction, a 30-percent performance increase over Safari 4, and the ability to choose Google, Yahoo!, or Bing as the search service powering Safari’s search field. Available for both Mac and Windows, Safari 5 includes improved developer tools and supports more than a dozen new HTML5 technologies that allow web developers to create rich, dynamic websites.

*** end quote ***

Downloaded and am trying it now. No science; just feel. Seems snappy. Have the Fox and Chrome. Who needs three browsers?

# # # # #


SERVICE: Surprise GMAIL CONTACTS has quotas? Who knew!

Monday, June 7, 2010

*** begin quote ***

Over contacts quota

Because problems can occur when you have an extremely large number of contacts in your Google Account (note that this number includes the people you’re following on Google Buzz), we’ve implemented some quota restrictions. If you take an action that would put you beyond this limit, we’ll show you an error message.

One common reason for having a large number of contacts is having many duplicate entries. We recommend using the merge tools in your Contact Manager to consolidate your duplicates and make room for new additions.

You can also back up your existing contacts by exporting to a CSV file.

*** end quote ***

Argh!

Another reason “cloud computing” won’t work. Surprises!

# # # # #


TECHNOLOGY: Forgery or just a riddle?

Sunday, June 6, 2010

http://www.ynetnews.com/articles/0,7340,L-3892674,00.html

Israeli art detectives crack forgery riddle
Sotheby’s discovers Israel Museum owns exact same painting about to go on auction in Amsterdam
Associated Press
Published: 05.26.10, 14:26 / Israel Culture

*** begin quote ***

Then Elon checked the fabric. The recently discovered painting was painted on cotton. The museum’s was done on linen, a more expensive material far more likely to have been used by a wealthy painter in Europe than by someone working in a poor city like Jerusalem.

The museum’s painting was the real thing, Elon concluded. The new arrival was the fake.

*** end quote ***

Hot stuff! Literally.

You have to admire “technology’s” ability to gather “evidence”.

# # # # #


HARDWARE: APPLE TIME CAPSULE died. Some backup!

Thursday, June 3, 2010

APPLE TIME CAPSULE died. Some backup!

According to the Apple website, it’s out of warranty.

I’ll take it into the Apple store and see what they say.

Argh!

I’d have expected it to outlive the MacBookAir that I bought at the same time.

Did I say “Argh!”?

I see a “NOTRECOMMENDED” coming up.

# # # # #


TECHNOLOGY: When IT systems fail silently?

Friday, May 28, 2010

201005281516.jpg

Rofl?

Maybe they need an IT consultant?

May 28th, 2010 @ 1515 EDST

Argh!

# # # # #


TECHNOLOGY: Diskless Booting; why not cdrom booting?

Monday, May 24, 2010

http://it.slashdot.org/story/10/05/08/0455244/Diskless-Booting-For-the-Modern-Age

Diskless Booting For the Modern Age on Saturday May 08, @05:08AM
Posted by timothy on Saturday May 08, @05:08AM
from the who-needs-moving-parts dept.

*** begin quote ***

An anonymous reader writes “Ever wonder what happened to PXE? Intel’s popular standard for diskless booting hasn’t been updated since 1999, and has missed out on such revolutions as wireless Ethernet, cloud computing, and iSCSI. An open source project called Etherboot has been trying to drag PXE into the 21st century. One of their programmers explains how to set up diskless booting for your cloud, using copy-on-write to save space.”

*** end quote ***

Having had to “clean” more than one machine — freinds, family, workmates, fellow alums, complete strangers (I love helping) — I have really never ever understood why we don’t boot from a CDROM.

Persistent virus infections, hiding in boot records, would be impossible.

Given that a reboot for desktops are relatively rare and for notebooks are infrequent, we could have true “change control”.

Never understood that?

Can you help me out and explain it?

# # # # #


SERVICE: Why don’t ISPs validate all return addresses?

Thursday, May 20, 2010

Don’t the ISPs have the capability to do a domain look up?

We need to revise the email handling protocols. (imho)

ISPs should insist that peers do some validation.

For example, if say COMCAST and YAHOO are peers, then, at the very least, COMCAST should not accept any email with a Yahoo return address that doesn’t originate from Yahoo. Yahoo should validate every email it peers to COMCAST has having originated from a valid email address. If COMCAST Users mark it as spam, then that fact should be fed back to Yahoo for appropriate action.

And, visa versa.

(I laugh sarcastically when I get spam with a Yahoo bogus return address.)

ISPs like Comcast and EMail providers like Yahoo could “cut off” offenders.

It would seem to be in everyone’s best interest to truncate the flow of bogus email.

Seems easy to me?

# # # # #


LINKEDIN: Another reason NOT to use your employer’s email adress on LinkedIn

Monday, May 17, 2010

http://www.portfolio.com/companies-executives/2010/03/31/non-solicit-suit-alleges-violations-on-linkedin#ixzz0nDJODrSE  

LinkedIn to a Lawsuit
by Jim Hammerand Mar 31 2010

*** begin quote ***

As case law develops, courts could decide whether the online connections employees make at work belong to the employee or employer. Courts, Cotter said, have “a lot of discretion” in deciding whether comparable customer lists and contacts are trade secrets and whether social-networking activity can be covered by competitive agreements.

*** end quote ***

Clearly, if you have a non-compete, then you’ve got a problem.

But, it can’t hurt to make sure that your LinkedIn account looks “personal”.

I’d go so far as to say you should NEVER use social networking from the company’s hardware, software, or network.

With 3G, 4G, and public wifis for networking. With iphone, ipad, netbooks, and cheap notebooks. With Open Source Software, as opposed to the corporate Microsoft suite. All demonstrate the difference.

imho.

Remember the sources of my education: I’m just a fat old white guy injineer with Law from watching Judge Judy, Medical from Doctor Phil, Building from Holmes on Homes, and Investing from Bernie Made-off.

# # # # #


SERVICE: 750 WORDS site; make everyone a writer.

Saturday, May 15, 2010

http://emilychang.com/ehub/app/750-words

Blog | eHub | Stream | Tags | Photos Projects | About | News | Contact

750 Words
By Kim Lau
— May 12, 2010 at 10:02 am

*** begin quote ***

Motivate your writing by committing to 750 words a day. Log in with Facebook Connect, Google or Yahoo, and earn points and badges the more you write.

*** end quote ***

We’ll see if it helps.

RECOMMENDED!

# # # # #


TECHNOLOGY: Taming the email monster

Saturday, May 15, 2010

http://www.happiness-project.com/happiness_project/2010/05/five-realistic-tips-for-using-email-more-efficiently.html

MY COMMENT:

*** begin quote ***

May I suggest that more email accounts, with a proper strategy, mail actually be more “efficient”?

All too often, I see folks with a single email account with everything jumbled together. No ability to segregate personal from business, financial from non, family from weirdo, (Oh wait some of my family are pretty weird!), … any way, you get the idea.

I personally use lots of different accounts for different purposes. Reading down my inboxes in my mail client: Urgent Matters, Brokerage Account, Bank Account, Paytrust, Family, Friends, Work, Job Search Networking, College Alumni, My High School Class Specifically, High School Alumni, Networking, Technology Playing, Catch All, and Routine Subscriptions. And, few other oddballs ones.

May sound like a mess, but:

(1) Email time is IMMEDIATELY presented in priority order. (Most people just reply to email, so they get to know me by the address. I have my own domain so I am in complete control of the names, the archiving interval, and automatic handling.)

(2) Messages purporting to be from my bank sent by a spammer stand out like a sore thumb when they come it on the “wrong” email account.

(3) Message originating from me are distinctive in the account name so the recipient can quickly place my association with them. (e.g., HighSchoolNickname @ mydomainname dot com) Saves angst on all ends.

(4) “Lost messages”, remembered or needed later, can be found by looking in the “dedicated email” box which is just a fraction of the overall mail volume.

So in this case, more is actually less. More mailboxes; less wasted time.

# # # # #


SERVICE: Back up your FACEBOOK data (FREE)

Sunday, May 9, 2010

http://givememydata.com/

Give Me My Data helps you reclaim and reuse your Facebook data.

*** begin quote ***

Give Me My Data is a Facebook application designed to give users the ability to export their data out of Facebook for any purpose they see fit. This could include making artwork, archiving and deleting your account, or circumventing the interface Facebook provides. Data can be exported in CSV, XML, and other common formats. Give Me My Data is currently in public-beta.

*** end quote ***

RECOMMENDED!

# # # # #


SERVICE: Using the user to … …

Saturday, May 8, 2010

*** begin quote ***

Dear Blue Cross Blue Shield of Georgia Member

   This weekend there was a patch implemented that corrected the Portal Error members have been receiving. Please go to the Blue Cross Blue Shield of Georgia website and try to access your account. If you continue to get the Portal Error, please give Web Support a call at (866) 292-6253 Monday-Friday 8 a.m. – 6 p.m. excluding Holidays. Please reference this email when speaking to a Technician.

*** end quote ***

I’d call this “using the user as unpaid debugging help”!

Argh!

# # # # #


SERVICE: TABZON — not recommended

Thursday, May 6, 2010

http://www.tabzon.com

*** begin quote ***

The best little in-out board for your office.

Tabzon is a free online in-out board designed to help you keep track of your co-workers’ whereabouts.

   * Centralised Team

   * One-Click Updates

   * Quick Contact Lookup

   * No Software

   * Safe, Private, & Secure

   * Completely Free!

*** end quote ***

I tried it to solve a person problem. I learned about it on blog. (Unfortunately, I forgot which one.)

I thought it would be like a public bulletin board that who show anybody status. It only shows if you have defined users. So it’s a closed community that you have to “invite”. Argh! I didn’t get that from the description. It doesn’t have the granularity of control.

I gave them other feedback as I worked with it.

“You need to declare what it costs on first screen. Always will be free? Freemium? Something else?” (Addressed!)

“Email address restrictions should be up front. Not after you wipe out all the input I did. Argh!” (Don’t know.)

“Your activation email goes directly into spam folders. Unlike what others do. Something needs fixing.”  (Don’t know.)

I was trying to use it as a bulletin board for family to know when to call my wife.

Yes, realized. And, yes. It appears to “reset” to unavailable for no apparent reason.

On May 5, 2010, at 12:07 AM

>Hi again,

>Nice to see your finding the idea useful in a way we handn’t intended.

>This behaviour is odd indeed. Just a couple of things to confirm :

It’s always showing “unavailable”. I’ll try and find another solution. Argh! Sorry. It looked good.

# # # # #


TECHNOLOGY: Interesting panel

Wednesday, May 5, 2010

201005052108.jpg

# # # # #


TECHNOLOGY: MEGAMILLIONS site is overwhelmed

Tuesday, May 4, 2010

Winning Numbers – Mega Millions Official Home

Winning Numbers: 4/30/2010. Mega Millions drawings are held Tuesday and Friday at 11:00 p.m. Five balls are drawn from a set of balls numbered 1 through 56; …

# – # – #

The page cannot be displayed

The request cannot be processed at this time. The amount of traffic exceeds the Web site’s configured capacity.

Please try the following:

   * Click the Refresh button, or try again later.

   * If this error persists, contact the Web site administrator to inform them that this error continues to occur for this URL address.

HTTP Error 500.13 – Server error: Web server is too busy.

Internet Information Services (IIS)

Technical Information (for support personnel)

   * Go to Microsoft Product Support Services and perform a title search for the words HTTP and 500.

   * Open IIS Help, which is accessible in IIS Manager (inetmgr), and search for topics titled Monitoring and Tuning Web Application Performance, Performance Monitoring and Scalability Tools, and About Custom Error Messages.

# # # # #


TECHNOLOGY: “Drive by” messages!

Saturday, May 1, 2010

Ever notice how many more what I call “drive by messages” are being sent?

That is a message that includes a disclaimer saying that it won’t be read.

I imagine them saying: “If you ask for clarification, we’re going to ignore you”!

Arghhhh!

Wasn’t “marketing” supposed to be a “conversation with customers”?

Well, that’s like “Customer Service” being expected to “service” “customers”?

I know I feel like I’ve been “serviced”! In the sense of bulls and cows.

Argh!

*** begin quote ***

This is an automated email, and replies will not be delivered. If you need to contact us, please log on to your account and click the “Contact Us” link to send an email.

*** end quote ***

*** begin quote ***

Please do not reply to this message. This is a service email related to your use of XXXXXXX. To learn more about XXXXXXXX’s use of personal information, including the use of web beacons in HTML-based email, please read our Privacy Policy.

*** end quote ***

# # # # #


TECHNOLOGY: Security has to be a core value; not an after thought

Wednesday, April 28, 2010

http://www.forbes.com/2010/04/20/security-policy-privacy-technology-cio-network-data.html

Commentary
Keeping Data Safe From IT Snoops
Mike Schaffner, 04.21.10, 06:00 AM EDT
How to improve data security and privacy.

*** begin quote ***

If possible, add a formal security role. This job isn’t just about limiting access and changing passwords. It involves looking at all of the processes from the user side as well as within IT. It is important that this role audit compliance and educate users and IT alike about security issues.

*** end quote ***

With all due respect to Forbes and the author, this is indicative of reactive and “after the fact” thinking.

“If possible”?

(Argh!)

Either Information Security, and it’s natural sidekick Business Recovery, are core functions of your infrastructure or they aren’t. If they are, then they are essential components of your Strategic Requirements with resources to accomplish their mission. If not, then this is lipstick on the proverbial pig.

You don’t say: “If possible, we should have a CFO.”!

Customers, Employees, Suppliers, and everyone are quick to pick up the implications of your deeds. Words don’t matter; actions do! Spot one of these “bolt on” “paper over” tactical cover overs and you should be looking for your replacement. Get away before they take you down with them.

What are your requirements? Else your next credit card statement may be delivered to Lagos Nigeria. There’s no substitute for “doing it right”. After the fact can never be right.

# # # # #


SERVICE: UofP blows it by not offering alumni email

Friday, April 23, 2010

*** begin quote ***

A message that you sent could not be delivered to one or more of
its recipients. The following addresses failed:
<xxxxxxxxx@email.uophx.edu>
SMTP error from remote server in greeting:
host email.uophx.edu[204.17.28.37]:
550 Requested action not taken: mailbox unavailable.

*** end quote ***

Interesting! University of Phoenix takes down email when it’s student’s graduate. How short sighted is that?

Obvious, even if I had to cut a deal with Google for Gmail to offer to all my alumni that’s a great marketing ploy.

Future sales. Referrals. References. Social networking. Free advertisign when folks use it. Alumni networking.

Boy, did they blow it.

They may have the next generation in the “education” model, but they still have old thinking at the top.

Traditional schools most flub it as well, but they’re dinosaurs so what would you expect!

# # # # #


TECHNOLOGY: MacBookAir decided it needed a power off

Thursday, April 22, 2010

No apparent reason other than it detected an unspecified “problem”.

Upon restarting, it dutifully sent a report off to the Apple Corps Headquarters.

So here we start the MTTR, MTBF, and ELAPSED clocks again.

This is unusual behavior that one would expect of WIndoze, or Microstuff’s Autoupdate?

Perhaps Apple has “clay feet” as well.

# # # # #


TECHNOLOGY: The value of strange email addresses

Thursday, April 22, 2010

It’s no secret that I have lots of email addresses.

Some are pretty standard that I use for catch alls. Some are hung off the domains that I own. Some are secret for dedicated purposes. Some for family, friends, social networking, fellow alums, and past coworkers.

I’m always amused when some spammer or ne’er-do-well guesses the address and the bank I use.

Obviously, a bank message on the “wrong” id (e.g., First Superior Bank’s message comes in to me@jumpingkangaroos.com) sticks out like a sore thumb. Just as obvious, an email account dedicated to my bank (e.g., MY BANK @ SUPER secret address dot com) suddenly has weight loss ads. Like a sef-proving affidavit, the message and the account must “align”.

I’m less amused when spam looks like a real message and comes in on an account where it might be valid. Then I have to waste time to recognize the “barbara streisand”.

Argh!

When will we get fully authenticated email?

I find it funny when spam comes to my Yahoo account purporting to be from Yahoo. Is anyone awake at Yahoo? NO ONE, nobody, should be allowed to queue a message that purports to from the provider. Wake up guys. IT isn’t supposed to be short for IDIOT!

Why can’t we have a PKI infrastructure at least with an ISP for starters that would ensure that intra Verizon, Comcast, or other large ISP is authentic?

Argh!

For this IT Architecture weenie doesn’t think this is rocket science!

Fix it guys!

# # # # #


SERVICE: 2 Google Voice invites

Wednesday, April 21, 2010

*** begin quote ***

You have 2 Google Voice invites left.

*** end quote ***

Anyone want them?

# # # # #


SERVICE: Use a Google Voice number for reminders

Friday, April 16, 2010

http://www.macworld.com/article/147288/2010/04/googlevoice.html

*** begin quote ***

Send Yourself Voicemails After Calls to Remember Important Info

I have created a Gmail account and gotten signed up for Google Voice on that account (btw, don’t set it to your cell phone number for this setup.)

Once that GV account is in place, I enable the Do Not Disturb feature which sends incoming calls straight into voicemail.

I also have the settings such that it sends a Speech-to-Text translation to an email address on my Blackberry. Further, I set up my phone to speed dial “Q” (Quick Msg) so, as soon as I get done with the call, I dial Q and go straight into VM. I leave an articulate VM of the details I just committed to and almost instantly, upon completion, it feeds back to my Blackberry signaling that I have a new msg.

I DON’T look at the msg so that when I get back online, I can pull up the Unread msg (or listen to the voicemail attachment) and update the appropriate calendar entry or whatever is necessary to follow-up on the commitment.

Even if the translation isn’t verbatim, that’s fine because it’s usually pretty close and that should be PLENTY to serve as a reminder that I can act on. It’s really a great system, very simple and free. Not too shabby.

*** end quote ***

I have it setup, but I have to play with it a little.

?

# # # # #


HARDWARE: Apple’s WiFI is suspect; to me at least!

Friday, April 9, 2010

http://blog.connectedplanetonline.com/unfiltered/2010/04/06/what-do-ipads-wi-fi-problems-mean-for-att

What do iPad’s Wi-Fi problems mean for AT&T?
by Kevin FitchardApril 6th, 2010

*** begin quote ***

When AT&T said it believed the iPad would be mostly a Wi-Fi (rather than a 3G) device, that would have figured to make any of the network concerns that have plagued the iPhone a moot point. Think again. The biggest problem with the newly launched iPad would seem to be with Wi-Fi connectivity, with reports of no connection or weak signals among some early iPad users. The problems would clearly seem to be with the device itself, with some iPads having problems connecting to any Wi-Fi signal, not just AT&T’s Wi-Fi service.

*** end quote ***

The WiFI problems on the iPad make me suspect that my gut feeling about the MacBookAir could be correct.

I’ve always thought I noticed that the MacBookAir was always scanning for a WiFi signal. Periodically, the computer would (as I described in my blog) go on “a mental vacation”. When I’d look at the “airport”, it would be scanning for networks. Could it be dropping the signal? I’m located less than 25 feet from the WiFi base. I have other Windoze computers using the WiFi without any problems at all.

(Sometimes, windoze needs a reboot to clear up its “thinking”. Weekly? But, never drops the WiFi connection. The ISP’s network sometimes seems to go on a “mental vacation” and everything Router, Windoze, and MacBookAir all need a reboot to pass traffic. But that’s not a MacBookAir problem.)

So maybe there is BOTH a hardware and software problem with ALL Apple products that use WiFi. I don’t have a College’s EE lab and a group of hungry CompSci PhD candidates who will work for free to study the problem. BUT, [and there is ALWAYS a big butt), I’m convinced there’s a serious problem with Apple’s wifi. And, I’d steer clear of it until it’s solved.

Consumers Reports, Underwriters Laboratory, or any school’s CompSci dean listening?

# # # # #