by wwarren | Jul 29, 2010 | Microsoft, Server 2008, Windows
I had my server setup as best as i could. I had a RAID 1 mirror on both of my drives. Not only that I had shadow copies being made on the array. Finally I had everything being backed up to an external hard drive. Last night my server started acting funny. Putting...
by wwarren | Jul 29, 2010 | Cloud Computing, Open Source
After some internal testing and research i can honestly say that virtualization may not be the best solution except for larger deployments. For the same money(or less) than either upgrading one server to be able to host multiple vm’s or the purchase of a new...
by wwarren | Jul 28, 2010 | Linux, Microsoft, Windows
This is the primary reason Unix folks remove the computer, make an image for forensics, and then rebuild from a known good source. Windows folks have yet to figure this one out. I take the same philosophy towards malware that Unix admins do..nuke the...
by wwarren | Jul 22, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
Steve Gibson talks about this issue in a very understandable manner. Look at my previous post at the bottom..aka update 3.
by wwarren | Jul 22, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
Well the vulnerabilities threat profile has expanded: http://www.f-secure.com/weblog/?p=00001994.html If the .lnk is inside a document windows will execute the code. Again..i hope this fizzles..if it doesn’t I want folks to be aware. Well the vulnerabilities...
by wwarren | Jul 21, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
New Zero Day problem with all versions of windows(High Potential for Mass Infections..Stay Alert)*UPDATED* The podcast software crashed so I was able to make a written update to the post with the help of Arstechnica.com. Go checkout the updated...
by wwarren | Jul 20, 2010 | Microsoft, SBS 2008, Security, Security Alerts, Server 2008, Vista, Windows, Windows 7
I am going to provide you with the summary from Ars Technica as it’s the clearest explanation of the problem I have seen: The attack uses specially crafted shortcut (.lnk) files, which trick Windows into running code of an attacker’s choosing. Any Windows...
by wwarren | Jul 17, 2010 | Cloud Computing, Open Source, Security, Vendors
This is very good reading. IF you decide to go with a cloud solution the big question is..are you in control of your data or are you at the total mercy of the cloud vendor? This has significant ramifications for your business if the cloud vendor either fails to...
by wwarren | Jul 16, 2010 | AMD, Hardware, Intel
5-10 years ago the answer was…yes to the first question as the second one didn’t apply. As I have been watching the evolution of hardware over the years things of course are more complex. In a nutshell going with a low power server(or maybe a desktop CPU...
by wwarren | Jul 16, 2010 | Apple
Of course it does. As long as folks accept lame excuses for their constant failings and don’t walk away from Apple with their wallets Apple has no reason to care. DailyTech – Apple to Customers: Here’s a Free Case, Live With iPhone 4 or Get...