Geeks With Blogs
Robert's Sysadmin Blog Unraveling the datacenter one fibre at a time February 2005 Entries
Scrum... Agile Project Management

You know when you where really turned on by an IT Conversations recording, when you cant wait to get home to look it up:



Posted On Friday, February 18, 2005 8:24 PM

Piss-poor programming by Adobe
Bought an e-book from, Of Blood and Honor, by Chris Metzen (Fantastic Blizzard conceptual artist)Ebooks from Amazon come packaged as Adobe DRM protected files. Well remember how I run my laptop in non-admin mode?At least they use .net passport for the registration service… that at least cut down on my registration time ......

Posted On Wednesday, February 16, 2005 1:47 AM

SecurityFocus: Penetration Testing IPsec VPNs

SecurityFocus HOME Infocus: Penetration Testing IPsec VPNs

Interesting read

The only thing that was not really covered was what the options are of hackers when they run into ipsec based crypto that doesnt use Pre Shared Keys…

Lots of links to neato tools in this article aswell.

Posted On Thursday, February 10, 2005 8:09 PM

Domain name Homograph attack
Came across this via Security.nlhttp://www.cs.te... page presents an example of The Homograph Attack described by Evgeniy Gabrilovich and Alex Gontmakher. (See "The Homograph Attack", Communications of the ACM, 45(2):128, February 2002. Click here for the full-length paper in PDF, or here for the HTML archive of the CACM Inside Risks column at SRI). To prove the feasibility of this kind of attack, we legally registered (at a homographic ......

Posted On Thursday, February 10, 2005 6:23 PM

Google Pagerank and Geekswithblogs
Yesterday my blog recieved 500+ hits… this turned out to be people looking for information on why msn is down. blog page from yesterday appears as the second or thind link.Same happes if you search for “ "rpc server is unavailable" firewall “ : never really realised this, but the reason my insignificant blog ......

Posted On Thursday, February 10, 2005 1:19 AM

Oh yes.. that IT thing... I have heard of it, its central to our policy actually.
Two articles got my attention tonight, and both related to a similair theme.First off is this from the Register, on Tony Blair’s apparent lack of IT skills.http://www.theregist... personally, who cares if the man uses his mouse as a remote control or something, but its this following article from Working Smarter (or is it Thinking Faster??) that actually underpins the danger of managers, or in this above case a politician, not knowthing the first ......

Posted On Wednesday, February 9, 2005 8:11 PM

ยป Super Bowl advertisers use Net for end run around NFL, Fox | Between the Lines |
» Super Bowl advertisers use Net for end run around NFL, Fox | Between the Lines |“I think the NFL's censors have their priorities screwed up. Why? As my family -- including my three-year old who just started the nightmare phase that many three year olds do -- sat down to watch the Super Bowl, I found myself covering my toddler's eyes through commercials for War of the Worlds (which showed a little girl who was scared out of her daylights), XXX 2 (almost nothing but guns, fire, ......

Posted On Monday, February 7, 2005 9:33 PM

In the Trenches - Tech Chat - Corperate Collaboration Technologies » In the Trenches - Tech Chat - 02-04-2005At 4am on Saterday morning I participated in a tech chat.. this time we had Jeremy Wright from on board, as well as Kregge Steppe and Gerard Hickey. I especially wanted Jeremy on board, cause of his experience with corperate blogging, and his blogging experience in general. Jeremy as of course also set up a consulting company to facilitate companies in blogging and other colaborative technologies.We discusses all manner of ......

Posted On Sunday, February 6, 2005 9:21 PM

HNS - A Simple Guide to Securing USB Memory Sticks - Cryptainer LE
HNS - A Simple Guide to Securing USB Memory SticksHow Cryptainer LE WorksCryptainer LE functions as a driver for Win32 systems that allows the operating system to view a single encrypted file as a virtual disk. Essentially, once the virtual disk is mounted it is available to Windows just as if it were any other type of disk. A small program is required to mount the encrypted disk and that program can be included on the USB memory stick as well. The portable version does not require installation and ......

Posted On Thursday, February 3, 2005 1:35 PM

Digital Identity integration gone completely haywire
AdCritic InteractiveA halarious.. and slightly frightening flash movie about when systems get over-integrated.Unfortunatly, the integration of our identities across systems, and the continuing threat against our privacy, probably makes this scenario more likely than you think.Hey Jon, here is another hit for your meme-graph! ......

Posted On Tuesday, February 1, 2005 9:12 PM

Dont steal my Focus!

Just chiming in with my own support of Nicole’s callout to Microsoft and developers in general, to not create appllications that generate popup windows that steal your focus

My work here is done.

Posted On Tuesday, February 1, 2005 8:39 AM

Copyright © Robert Kloosterhuis | Powered by: