Big Foot Hoax

Last week there was a lot of buzz online regarding the discovery of a
dead sasquatch.
I’m sure you probably heard about it.

I watched the news conference led by the two guys in northern Georgia
(the state, not the country) who had allegedly discovered the
body
while out hiking. After the news conference, I had my doubts.
The ‘expert’ that these men had recruited started blinking really fast
when directly questioned about certain topics, and it led me to believe
he was lying. Then he showed some blurry photos and didn’t offer any
real proof that what they claimed happened actually did. If you have a
dead big foot sitting in your garage, even a yokel from Georgia could
take a decent picture with a digital camera.

Apparently the men who discovered the body sold it to some researchers.
This is where the impetus behind the hoax comes in. Once the
researchers decided to unfreeze it, the truth came out. A
doggone monkey suit!

But on the other hand, don’t you love monkey suits? I remember my
grandmother made me one as a halloween costume when I was about 10.
Actually, it was a gorilla suit, but it was still fun. It was the only
gorilla in the neighborhood who wore sneakers.

Resurrection: Geekamongus.com

I decided to resurrect my old Geekamongus.com site. Instead of filling this personal site with loads of technical blog posts no one cares about, I thought I’d dedicate a site to computers, the Internet, security, and anything else geeky. It made sense to use Geekamongus.com to do this.

So, look forward to more posts about personal things and whatever I’m thinking about here, and head to Geekamongus.com for the geeky stuff.

I intend to keep the new site on a ‘lay person’ level, providing articles to help people with computers and the Internet. I figure there are a lot of people who could use free advice, and it makes it fulfilling to think I might be helping someone.

So go tell your friends!

Practical Security: Secure Email on Public Wifi Spots

In my revised capacity at my current job, I’ve been handling a lot of
security issues: hardening of systems, software, and processes. I’ve
also been studying for the Security+ certification, so needless to say,
security has been at the top of my mind the last 5 months, and I wish it
would be at least a little closer to the tops of the general public’s
mind.

I’m going to start a new series of blog posts here called Practical
Security in which I will pass on some of the more relevant best
practices relating to the typical internet user, in hopes of helping to
raise awareness amongst anyone who happens to read this blog. (Yes, all
4 of you).

Using Email on Public Wifi
(and the high level of risks therein)

Question:
How often do you stop at a coffee shop to check your email with your
laptop, or leech that open ‘linksys’ network while sitting at a traffic
light with your PDA to shoot off a quick note to your boss? OK, maybe
I’m the only one who does that at traffic lights, but you get my point.

If you have a portable device that can access the Internet, my guess is
that your answer is “quite often”.

Question:
How many of you have configured your email to use some sort of
encryption? (Cue the crickets chirping).

As this excellent StopDesign article explains:

What you may not realize is how easy these low security settings
allow someone else on the same network to spy on the data passing around
on that network. Just because you’re the only person who can see your
laptop screen, doesn’t necessarily mean you’re the only one who can see
the email message you just got from a friend. Just as easily as someone
could sit near you in a quiet cafe or library and overhear your entire
verbal conversation with another person, so could they “listen in” on
all the usernames, passwords, and messages passing to and from your
computer. (And everyone else’s computer for that matter.)

Kinda scary, huh? If you think about it, once they have your email
account password, it’s not too hard to go to your bank and generate a
“lost password” request, which will get sent to your email address,
which they now have control of. Or they might simply decide to send a
breakup letter to your boyfriend on your behalf if they are not feeling
so malicious. Or maybe they thought it would be funny to email your
boss and tell him how good he looks when he gets out of the shower.

By default, email is not secure!

Yes, this includes you, Mac user. Yes, this includes you, Gmail/Yahoo/Hotmail/AOL user.

Make sure your email is on a secure connection!

The Lowdown
If you use a webmail service such as Hotmail, Yahoo Mail, Gmail, or the
like, make sure your web browser (Internet Explorer, Safari, Firefox,
etc) is in “secure” mode by looking for the lock icon. Alternately (or
additionally), look at the address bar of your web browser to make sure
the address showing starts with https and not just http.

If you use Outlook, Outlook Express, Thunderbird, Mac Mail, or any other
‘program’ on your computer to manage your email, there are ways to set
up these applications to run only on secure connections using SSL, TLS,
SSH, and other methods. You may need to consult your local IT guru or
read the rest of the StopDesign article, or this well-written article entitled “5 Steps to Make Your Email Secure“.

Whatever you do, stop checking your email at Starbucks unless you know
it is secure!

Practical Security : Using Email on Public Wifi

In my revised capacity at my current job, I’ve been handling a lot of
security issues: hardening of systems, software, and processes. I’ve
also been studying for the Security+ certification, so needless to say,
security has been at the top of my mind the last 5 months, and I wish it
would be at least a little closer to the tops of the general public’s
mind.

I’m going to start a new series of blog posts here called Practical
Security in which I will pass on some of the more relevant best
practices relating to the typical internet user, in hopes of helping to
raise awareness amongst anyone who happens to read this blog. (Yes, all
4 of you).

Using Email on Public Wifi (and the high level of risks
therein)

Question:
How often do you stop at a coffee shop to check your email with your
laptop, or leech that open ‘linksys’ network while sitting at a traffic
light with your PDA to shoot off a quick note to your boss? OK, maybe
I’m the only one who does that at traffic lights, but you get my point.

If you have a portable device that can access the Internet, my guess is
that your answer is “quite often”.

Question:
How many of you have configured your email to use some sort of
encryption? (Cue the crickets chirping).

As this excellent StopDesign
article explains:

What you may not realize is how easy these low security settings
allow someone else on the same network to spy on the data passing around
on that network. Just because you’re the only person who can see your
laptop screen, doesn’t necessarily mean you’re the only one who can see
the email message you just got from a friend. Just as easily as someone
could sit near you in a quiet cafe or library and overhear your entire
verbal conversation with another person, so could they “listen in” on
all the usernames, passwords, and messages passing to and from your
computer. (And everyone else’s computer for that matter.)

Kinda scary, huh? If you think about it, once they have your email
account password, it’s not too hard to go to your bank and generate a
“lost password” request, which will get sent to your email address,
which they now have control of. Or they might simply decide to send a
breakup letter to your boyfriend on your behalf if they are not feeling
so malicious. Or maybe they thought it would be funny to email your
boss and tell him how good he looks when he gets out of the shower.

By default, email is not secure!

Yes, this includes you, Mac user. Yes, this includes you,
Gmail/Yahoo/Hotmail/AOL user.

Make sure your email is on a secure connection!

The Lowdown
If you use a webmail service such as Hotmail, Yahoo Mail, Gmail, or the
like, make sure your web browser (Internet Explorer, Safari, Firefox,
etc) is in “secure” mode by looking for the lock icon. Alternately (or
additionally), look at the address bar of your web browser to make sure
the address showing starts with https and not just http.

If you use Outlook, Outlook Express, Thunderbird, Mac Mail, or any other
‘program’ on your computer to manage your email, there are ways to set
up these applications to run only on secure connections using SSL, TLS,
SSH, and other methods. You may need to consult your local IT guru or
read the rest of the StopDesign
article, or this well-written article entitled “5 Steps to Make Your Email Secure“.

Whatever you do, stop checking your email at Starbucks unless you know
it is secure!

Handy Links for Your Pleasure

Dear IE6
In this heartfelt breakup
letter
, author Jin outlines all the reasons that web developers
should drop support of the antiquated browser known as Internet Explorer
6. It is funny. And correct.

DVD Catalyst
As an iPod Touch owner, I found the DVD Catalyst tool to be
invaluable for backing up my DVD’s to watch on my iPod.

The Whappers
I updated The Whappers web
site, and there are some nice pics of us from the recent Grey Eagle show
that someone from the Asheville Citizen Times took.

Linux Geek?
NixCraft is the site for
you, with tons of great tutorials, answers, scripts, admin tips, and
more. Any Unix-based OS is relevant there, from X Server to Ubuntu to
RedHat to Solaris, as well as anything that runs on them. Definitely a
keep for the bookmarks.

Al Gore Did Not Create The Internet

I can’t count how many times I’ve heard people laugh about how Al Gore said he created the Internet.  Not that I’m sticking up for him or anything, but he never really claimed to have invented the Internet, so it irks me when people perpetuate that myth.

As this cool Neatorama article entitled 10 Things You Should Know About the Internet explains, Gore actually had a hand in helping to legislate initiatives that allowed the Internet to proliferate, though he never claimed to have invented it.  The article is well worth the read, as it explains a bunch of neato things that you should know about the “information superhighway” (a term that Gore actually <em>did</em> invent).

Geeking Out

Oh, the things you find stashed away in your friends’ Facebook profiles.  Thanks, Cassie, for reminding everyone of my dorkitude!

It looks like I just threw a big straight razor.

Seeking Linux Admin

The company I work for is seeking a Linux Admin to work with us here in
Asheville, NC. This is a great opportunity to work on some really cool
stuff and gain good experience with the federal government.

Here’s the rundown of skills sought:
Must Haves:
2+ Years Linux Administration Experience (prefer Red Hat Enterprise)
Some experience with compiling code from source.

Must be a US citizen able to obtain a secret security clearance

Installation, configuration and management of the following:
Apache
Tomcat
MySQL

Nice to Have:

VERITAS Netbackup
Qualstar/Quantum Tape backups
EMC SAN / Navisphere
Fiber HBA installation/configuration
Fiber Switching (zoning etc)
Cisco Switches
PIX Firewall

If you are interested, let me know!

OMFG it’s WordPress for iPhone/Touch

Out of all the awesome, free applications (and the crappy ones too) I’ve been trying out in the new Apps Store with my iPod Touch, the best by far is the Worspress app. I’m using it now to write this post.

It supports tags, categories, editing previous posts, post status, images, AND multiple blogs. I was floored when I read all that, and am more floored now that I’m using it.

Wow is all I can say!

clicky