Friday, October 18, 2013

Life View

This may have to do with the view of security, but see what you get out of this.

Life Lesson

  1. The royal rule. Treat your neighbor as you wanted to be treated. James 2:8
  2. Understand the true meaning of truth. Admit your mistakes. Matthew 5:25
  3. Find meaning in what you do. Ecclesiastes 5:18
  4. Be happy that your still here.  Matthew 6:25
  5. Evening the score because of meaningless matter? Romans 7:21
So think about it.


Applications to security has the same concept and morality that follows. First morality, Just think if a system administrator was upset about something personal in their life. Gets in a bad mood, then after festering about it for awhile. Ring help help help my computer is broke. Well from my point of view life lesson #1. Does this make sense to treat someone badly because of something else happening to make you upset. 

Next security, your put in charge of a situation where there are a million client records. You have to put this system online where clients access crucial information. You know its not ready, but the deadline was yesterday. What do you do? Life lesson #2. Inform a superior that it hasn't been tested and its not ready to go. If the fact is the system is not stable and clients are getting other clients information. Well there is a problem that will lead to other problems. This wont go further into detail.

Third, I personally know that everyone on this earth has a purpose. In a competitive world there may be a few that over extending themselves. That says yes to everything? Life lesson #3. It all comes down to what you are good/great at. There could be times you think you can do it, but that was not your purpose. The plan is already set. Doing something right the first time is the best time. Do not get this confused with mistakes happen. In certain times this may be true, but verify Life lesson #2 first. Take a responsibility then be accountable for your own accounts.

Forth, Worrying others for own personal gain can never be confused with spidey sense. Funny remark? In this world it is true. Worrying about everything only confuses the mind and clouds the judgement of actions that we do. Life lesson #4. Panic will only cause confusion. Dealing with security trade secrets can compromise the biggest flaw in a system. Personally I have a secrets. Hard for myself to explain and show you. Either way you know it or not. 

Fifth, Eye for eye. Man, brothers, and sisters. You've got a problem with this one. Life lesson #5. A point I will make with you once. Those thoughts that go through your mind thinking this and that. After it is over what did it accomplish. Nothing... As much time everyone will have on this earth. Each one of us will understand this. One way or another, so let me go into detail. Actions you have done to one another doesn't end when you think it does. At the time it happened. Later on its still there you might not notice. Its called a timeline of your life. Its difficult to remember every single detail in your life. Don't worry its wasn't forgotten. I abide by such laws preventing myself to be wrathful. Guess what! We have been accustom to a society well in general terms called "perpetual motion". Meaning it wont stop there. Next time think about the other person in a positive manner. Let that be a saving grace.


All the points I have made. Are means to me being me. Anything said to offend; well. Can i say don't be offended? Just understand a basic guideline into how security works.



Monday, September 10, 2012

I thought this was good what do you think?

Working in the network field is a fast paced and a ever changing environment. This is a story on how analog electrical impulses digitize themselves from electrical pulses to binary code. I understand how the basis of networking works. Going through many challenges from learning networking basics in college to the real world experiences of dealing with customers facing issues. My knowledge is considered the “Jack of all Trades”. Working with Cisco 1811 for remote offices to connect to a main centralized hub, using either slip/plip protocols to MPLS. Understanding the flow control and setting correct speeds on both ends. There are other instances when a company does not have a big IT budget, so VPN technologies using pix 501 or ASA 5505 are a good choice. Implantation that would work, would be to use the 6500 chassis for the ever expanding modules that is provided.

In a data centre this requires some forethought. One, how much space and two, the bandwidth required. Understanding how to implement both infrastructures makes me a great asset to your company.

Next, here is my understanding about Networking. Working with both open source technologies and Network vendors like Cisco are a good mix together. For instance with a massive network structure it requires a great organizational skill to understand what goes where. Rancid is a great tool to keep network and router configs organized. If there was ever an issue, that tool makes a nightmare into a simple click of a mouse or a console command. There are other tools to monitor a network like Cacti, nagios, or hp openview. These tools can give a visual and statistical management of a network and there are other functions they can perform to inform you in multiple ways that a device has failed.

A single point of failure can be disastrous and detrimental to the flow of business. To know that the extra equipment cost and implementation is in place is necessary to make sure you have a 99.9 % SLA.

Dealing with the trial and tribulations of customers must be an empathetic experience. It is very important to have a clear mind and a calm attitude, especially when the network has failed and their flow of business has stopped. Losing money due to your network being down makes anyone upset. Sometimes there are situations that are out of your control and having dealt with those experiences is important. It is hard to explain that a next business day warranty can disrupt the flow of business, but if money is not an issue then it can be up within two to four hours. This is the cost of business especially in dealing with hardware.

Understanding the proficiency of security is a complicated issue. In today’s world it is required. Most people are unable to grasp how important security truly is. Since nothing is totally secure there are ways to slow an attack. Being in this business and understanding a moral stance on safeguarding customers information is one of my qualities. Having the ability to trust but verify are steps that must be taken to succeed in this business.

Tuesday, June 26, 2012

org.eclipse.equinox.p2.director

This if they ever wanted to create they're own install with PHP managment. If you have a better way of creating this configuration. There is a gist available for the some build scripts that might give you some ideas.

Code Spec:

eclipsec.exe \ -application org.eclipse.equinox.p2.director \ -noSplash -consolelog \ -data ~/workspace \ -repository http://download.eclipse.org/releases/indigo \ -installIUs org.eclipse.egit.feature.group,\ org.eclipse.jgit.feature.group,\ org.eclipse.emf.sdk.feature.group,\ org.eclipse.mylyn_feature.feature.group \ -tag InitialState \ -destination ~/Eclipse/eclipse-NEWZ \ -profile php.profile \ -p2.os win32 -p2.ws win32 -p2.arch x86_64 \ -profileProperties org.eclipse.update.install.features=true \ -bundlepool ~/Eclipse/eclipse-NEWZ/dropins/php \ -purgeHistory -roaming


PUBLIC GIST

git://gist.github.com/2996942.git

Saturday, June 16, 2012

RFC please advice...



Start this off for what it is.


It should be discovered on how the design is effect by either a proven model. For instance like OSPF best path routing. Then the security of the latest exploit that was discovered not too long ago. Then ipv6 is not being adopting to its full model like he.net pointed out.

I recommend there be a census on which protocol this should seamlessly rely on. I mean either adopt cloud computing from the intel's idea of keeping the new systems awake;

Using the COU power. This then might solve a cost analyse of keeping the current technologies in place. It is important to point out the idea must make the outside public feel that this is ok to do this. A Lot of advocacy buffs might pick apart this idea. Consider this a rough default.

Creative Opportunities Unlimited, Inc

Oh yea the book of the AMA of business writing was a good reference for the article.

Friday, June 15, 2012

When you think your secure your not...

The issues with physical security are involved with have a couple of things to know and follow. One you can have your Bluetooth on all the time because a electrical device connected to your phone. The next step is to turn it off period. Especially when your not using the device. This is one way for you to have your information stolen. Don't fool your self since you think it is secure unfortunate it is not. If you prefer to have a it automated you can use this program for the android phone. Tasker is a great tool to automate the mundane tasks for your phone. More to follow.

Saturday, June 9, 2012

Whats new.

Read on grammar may be a little negative...

Its late and i have got to thinking while you were all asleep. I have noticed that a threshold of lacking and i do mean lacking is cause to what society is today. All the rants and raves just shows that we are un-happy as a society. Not much will come in to play until you meet the common hacker, cracker, bull-shiter i think you get it. They are so pissed off, since; they have a better understanding on how the security works.

From this statement what does that mean. I guess you have to say that the word does not revolve around the entrepreneur while color and blue color people of today. It just means that know how to make your life a living hell if you would let them. Not saying this would ever happen to you but security is scrutiny the term definitely means a lot and sticks. Speaking of an example while speaking to one of my clients. They brutally with all honesty don't give a shit about it. They don't care if there passwords are 8 characters minimum. They would never think about SSL encryption when doing a transaction. Etc. etc. Get the point..

I am starting this blog for one reason only, I feel the need for who ever reads this educates them selves into better understanding on how to protect yourself in security. Remember folk most of you don't/shouldn't leave the doors unlocked to your house or car. Right? Later i will go into a couple of situation maybe rants on what is necessary without pain to protect your self in the digital age.