Of the many ways that a network can be infiltrated, one of the most difficult to detect and manage is ARP spoofing. This is due to the fact that ARP does not take security into account in its design. Fortunately, there are tools available to assist in monitoring for and detecting ARP spoofing attempts. Obviously, the first steps in addressing a security incident is knowing that there IS an incident, so let’s look at how we can proactively watch for these incidents on our network. Continue reading “Monitoring for ARP Spoofing”
System logs are a critical part of system and network maintenance. They are, in fact, one of the key components for managing just about ANY system related incident. Unfortunately these logs are completely inaccessible or untrustable if a system reaches an unbootable state, suffers a catastrophic disk failure, or is compromised by an attacker. For these scenarios, and for general ease of maintenance, one of the best moves that you can make toward converting a group of machines into a manageable network is to set up remote Syslog services. Continue reading “Centralize Your System Logging Using Syslog”
Questions you should ask before considering “Cloud Computing” applications.
More and more, it seems, business and IT managers are being told that “Cloud Computing” is the wave of the future. We are being bombarded with salesman who want to explain this “new technology” to us, and show us why putting our applications in the cloud is a great way to improve services and cut cost. There are many critical considerations which are often not being discussed. It often boils down to asking the right questions. Do you know what to ask?
We’ll take a relatively non-technical look at some questions that should help you make a better decision. Continue reading “Should You Take Your Eyes Off the Cloud?”
VIM is one of the kings of the editing world. Built for speed and for flexibility, it is a critical tool for *nix admins. the one thing it lacks for many people, though, is context sensitivity. This is easy enough to fix. Simply create a new document in your home directory named .vimrc (please note the leading period, denoting “hidden”), and add the line “syntax on” to set sensitivity. the first few lines of my .vimrc file are listed below for reference. If you are looking for more info on using, or customizing, VIM you should start at the VIM tips Wiki. Continue reading “Setting Context Sensitivity in VIM”
My shack is currently only doing packet radio. I power the shack with a Kenwood PS-6 5-Amp power supply. I float the power to the radios over a 650-CCA Automotive battery at 13.25V. This appears to be the sweet spot for my setup. The power float gives me the ability to use the PS-6 to power the radios in receive, which has almost no draw. When transmitting, or during a power emergency, the battery can take the load, with all cabling (connected with Anderson Power-pole Connectors) designed to handle up to 45-Amps. All-in-all, I am quite happy with the setup. Continue reading “The Shack”
Many times in our lives we will cross paths with someone who will have a lasting impact on us. These people may be relatives, friends, or just someone we meet once in passing. The memories of these people, and what we learn from them, are what we come to define as ourselves; as what we pattern ourselves to be. These people are the fabric of our being. This is our basis of self, and our understanding of worth. Continue reading “In Memorium”