Protocol Analysis, Data Recorder, CALEA, Lawful Intercept, Application Performance, User Experience, Industrial Ethernet, Data Loss Prevention, Deep Packet Inspection, NetFlow, SOX, HIPAA and PCI Compliance, Switching and Routing, Forensics, VoIP, IPTV ... etc.
In the wake of current security issues, I thought it would be a good exercise to review my social media security and application settings.
To be honest, I have only heard of such an exercise but never actually done it.
I started with Yahoo since it was in the recent news. I was surprised how simple it was. I simply clicked on my account avatar and selected the only option, “Account Info”.
Once there, I clicked on “Recent activity” and reviewed what devices accessed my account and from where. A quick glance at the recent activity revealed nothing suspicious confirming that all is well.
I moved on to review the various apps or sites that I have used my yahoo login to access. I honestly don’t remember authorizing Google and can’t figure out why I authorized it back in 2012, so I removed it.
I give Yahoo credit for their reports that report ‘last used’ and location which I used to validate the application or site in question. Since I travel quite a bit, that little tidbit was extremely helpful.
Be careful with what you play with. A good example was when I disabled the “Allow apps that use less secure sign in” option and my Outlook suddenly failed when trying to retrieve emails from my Yahoo email. Oops..
If you’ve ever owned a pair of Adadas shoes or worn a Rollex watch, you probably grasp the appeal of fake stuff. The Chinese are well-known for their addiction to fake stuff, although no one is really sure why. It might be simple economics (fake stuff is cheaper), or it could be the lack of effective laws to combat faking. Whether to impress or save money - or both - fake stuff is big in China as well as the rest of the world.
The people who make fake stuff also grasp this, and they have parlayed that understanding into a $461 billion industry. When it comes to shoes or handbags, it is a substantial economic threat that erodes innovation and dilutes brands. When extended to pharmaceuticals or children’s toys, it can be dangerous.
The Internet hasn’t made this any simpler. Start searching for a new camera online, and you will quickly find a wide range of prices for what seems to be the same model. Closer inspection might show that some of the good deals are actually grey market items, which can have more shades than Christian’s ties but are typically legal (though unauthorized by the original manufacturer.) Most serious photographers are smart enough to avoid the remarkably good deal on a Nikkon.
There are certain philosophical questions that may never be answered, at least not to the satisfaction of a pragmatic engineer like me. If a tree falls in the forest and no one is there to hear it, does it make a sound? Why is there something rather than nothing? What is the sound of one hand clapping? And of course, the ever popular – What is the meaning of life?
Although any one of these could keep a person’s brain tied up in knots for a very long time, I’d like to add one more to the list - Is a placebo still a placebo when you know it’s a placebo and it still works?
When the word placebo enters the conversation, most of us think of a drug trial. Some of the folks in the trial will get the actual drug being tested, and others will receive the placebo - a presumably worthless decoy. If an inactive, nondescript pill can’t outperform a soon-to-be outrageously expensive miracle drug, there’s a problem in Big Pharma Land.
A different way to look at the value of technology – The Human Value!
I look at technology in many ways and one of those ways is how technology is improving our lives. Way beyond cell phones and car computers – a real human effect by technology. I have help design many network tools but being an amputee, this new use of technology is especially important to me and helps so many like me!
Today amputees have a variety of new capabilities that are added to traditionally stagnant or useless limbs. Today artificial hands can shake your hand, can hold an egg, cook a meal, hold a baby or sooth a person in strife or pain. Today soldiers that lost legs can walk again, those that lost arms and hands can hold again! This new part of technology is rapidly growing and the next generation of Bionic and Robotic limbs will add prosthetics into the realm of science fiction by adding neurological control and even feeling!
This picture is of 100 years of treating leg amputations at the veterans Caulfield Hospital. These prosthetics are from 1915 to 2015 and really look like torture devices but they allowed for some mobility and life value recovery for limb loss individuals!
Atomic bombs are in the news of late. Last year we marked the 70th anniversary of the first use of the A-Bomb on Hiroshima. A treaty intended to keep Iran from getting one is still being argued on Capitol Hill. All eyes are on North Korea, where Supreme Dictator Kim Jong-un grows ever closer to having a viable nuclear weapon of his own (10 kilotons as of a September 2016 test). In a perfect world, we would be the only country with an A-bomb arsenal, and we would trust ourselves to stay away from the button.
In the summer of 1939, Albert Einstein wrote a letter to President Franklin D. Roosevelt to let him know that the Nazis were working to extract and purify uranium-235. Although this was quite difficult to do at the time, it was known to be a key ingredient for an atomic bomb. Nazi success in this endeavor would not end well for the rest of the free world. FDR’s immediate reaction was to kick off the Manhattan Project, with the goal of beating the Germans. And so began the atomic race.
The project was managed from start to finish by Robert Oppenheimer, who orchestrated processes of gaseous diffusion, magnetic isotope separation, and mechanical centrifuging to get “The Gadget” ready for testing in the summer of 1945. Since this had never been done before, no one was totally certain whether the test, code-named “Trinity”, would be a colossal dud or a civilization-changing event. The flash, reportedly seen by a blind girl 120 miles away, affirmed the latter and set off some profound and diverse responses.
These bloodcurdling tales of IT terror will give you chills and send you scrambling for your monitoring tools.
The Case of the Disappearing Network
Let’s face it, nothing’s worse than logging on to find that your entire network has made like Houdini and disappeared from the face of the earth. But that’s exactly what happened to Peter Lee at Northern Devon Healthcare in the UK when a legacy switch went bump in the night.
“One day, we came in and lost the whole network. It was completely gone.”
“About 6 years ago, there were a number of legacy Cisco 3500XL series switches in existence on the campus,” says Lee, Network Technology Specialist at Northern Devon Healthcare. “I suspected as soon as I started working here that they could be a potential source of problems. One day, we came in and lost the whole network. It was completely gone.”
Artificial people are not a new thing. To be clear, I am not talking about non-human legal entities, nor do I mean the sort of folk you meet at cocktail parties who can talk for hours without saying anything. Here I refer only to people whose creators are other technically skilled people.
This notion of artificial people goes back as far as recorded history, with mythical “beings” dating to circa 400 BC. The famous notebooks of Leonardo da Vinci contained sketches of humanoid mechanisms dated 1495. It’s unclear if he ever tried to build any of them, but in his day when scientists often ran afoul of the Church, doing so openly would not have been wise.
More recently, Disney has dabbled in this stuff as well. I remember as a teenager on one of my first visits to Disneyland, there was much buildup and excitement leading to “Great Moments with Mr. Lincoln”. After all the fanfare, a somewhat stilted life-sized likeness of Honest Abe spoke briefly in a small, dimly lit theatre. Another early Disney entry into artificial creatures was the Enchanted Tiki Room, where to this day the artificial birds continue to annoy unwitting crowds.
If you’re somewhat new to server monitoring or just want to continue to learn what its best methods, tips and practices are, we’ve made this guide for you. These usually begin before the moment at which we decide on a specific tool, but this makes it something that is not on rails or according to specific guidelines, so the big decisions are still up to you.
These guidelines are generic and can apply to most monitoring tools whether you’re using Tivoli, OpenView, Spectrum, Zabbix, Nagios , Pandora FMS or ZenOSS.
Note - click on graphic to expand view
We’ll divide this into two phases and work different steps for each one:
Phase 1: Recognize your problems as soon as they appear.
Bag and tag your assets (Identification is key)
This means identifying everything you need to monitor and establishing a hierarchy based on those ítems and how they interrelate. You need to be wary of the fact that a failure in a single piece of the system (i.e. a database) can affect everything else related to it.
In regards to how you identify what needs to or doesn’t need to be monitored, you should assign priorities to all the parts of your general infrastructure, and assign priorities, then include the highest priority ítems into your monitoring scheme. In spite of this, some frequent high priority items that usually need to be monitored are databases, file backups and vital infrastructure devices.
Once this list is complete and items have their priority levels assigned, focus—as mentioned—on the items that have the most relevance, and consider the items related to them as higher priority monitoring targets as well. Creating a hierarchy is of vital importance. Apart from this, deeply related vital assets should be grouped into single items so that the information on them can be obtained and viewed with ease. On Pandora FMS, for example, this can be done using services, groups or tags.
In 1858 when the first transatlantic telegraph cable went online between Newfoundland and New York. The first official telegram to pass between two continents was a letter of congratulation from Queen Victoria of the United Kingdom to the President James Buchanan of the United States.
It only worked for 3 weeks. Retransmissions and slow response time that took so long causing it to become inoperable.The solution was found several years later, 1866 by converting to alternating current (AC) correcting the problem by overcoming distance latency.
Today we’re faced with the same issues. Solving network problems, some application related, others latency. Distance delays (RTT), delays caused by queuing limits or router hops. Other solutions that can yield huge results like transport protocol tuning, MTU size, TCP receive buffer, packet loss and reordering. And just as important application tuning, http, Oracle, SAP/Sybase, MySQL, Postgre SQL, SQLite, MS Access with PHP-PDO, Perl DBI, Python DB, Ruby DBI, ODBC or JDBC.