Friday, November 7, 2008
A medley
Firstly: Licensing
Getting a straight and definitive answer from anyone about how to license MS products is well-nigh impossible. According to Microsoft, if you use their product you have to have a license to do so. Some of these licenses can be purchased on a per processor basis while others are client access dependent. For example, if you have a SQL server serving a million hit per day website, it's certainly better to license the processor and not per client access which may work out rather expensive. Additionally, transferring installs between servers renders your OEM license invalid which means you've to purchase another license? The mind boggles :-) for current MS license considerations for virtualisation please see : http://www.vmware.com/solutions/whitepapers/new_msoft_policies.html
Security Auditing
This is an interesting one. MS Server 2003 logs all logon attmpts and failures as well as recording changes made to Active Directory. Additionally, using persistent session data in database access applications facilitates selective recording of who accesses data in sensitive tables. Restricting such access by means of group membership also reduces log writing, thereby reducing size and ultimately facilitating log analsyis. My difficulty comes with the PCI requirement to be able to recreate a hackers journey through the network. If someone gains access, data forensic analysts should be able to recreate their journey through our systems showing what they accessed with timestamps at every point. A great idea but hugely expensive in terms of tools available - consideration given here to Tripwire and LT Auditor.
Rationalisation of backups with a view to Disaster Recovery
We have backups, we take them off site and we're very pleased with ourselves. When we have to recover files it's usually not too tedious a proces and we've managed to recreate those systems that have failed when such has (and ineveitably does) come to pass. Synchronisation of important data between primary site and colocation has also been a good move. Recreating a fully working system in another location should our building go up in flames is a bit more difficult. Managing the replication of data between primary site and colocation can be managed without too much problem. Additionally, manual remapping of drives and applciation settings can easily be done for users should the comms room in the primary site fallover. The difficulty we face is that it won't be fully up to date and if the primary site goes down (where remote user VPN access is based), enabling user access to the colocation site and introducing additional backup scenarios, redundancy and chronological backups for this location become, once again, a matter of lots of money. Fortunately, this company has offices in 3 locations meaning staff can't easily be relocated and roaming profiles will continue to be operational once a few logon scripts have been edited a little.
Intrusion Detection Systems
Apparently this is more than someone looking through the log files of firewall servers from time to time; tedious at the best of times. Intrusion detection and alert systems are great and I've grown to like the VMware appliance NST (Network Security Tracker) which features Snort, Nessus, Base etc.
I suppose the moral of my story is that you can work in IT with the systems and have a bit of fun from time to time or you can become an architect and Director and ensure the work gets done but as a project manager for certain aspects of compliance, there are new lessons to learn. You may be a jack of all trades but these times require the management of many masters.
Thursday, November 6, 2008
Cheap Document Versioning
All documentation should employ versioning methodologies and template mechanisms. This refers to the use of timestamps and comments whereby editors declare what changes they have made to documents and peers or senior management sign off on each alteration. Document preparation can be an iterative process from draft form to the final published document yet, at each level, similar methodologies should be employed and discipline should be maintained in any organisation to ensure the final product truly reflects business requirements.
All documents should be formatted using a common typeface. that employed by Company X is as follows:
Headers
- Style: Arial
- Size: 14
Normal paragraph
- Style: Arial
- Size: 12
Headers should display document name (bit not path)
Footers should contain page numbers at the bottom centre
While a document is in draft mode, editors should employ the use of Track Changes in MS Word. A reference guide is available at http://office.microsoft.com/en-us/word/HA012186901033.aspx
The first page of a draft document should display :
- Document name
- Document description/ summary
- A chronology of editor names and brief description of changes made on given dates
The above facilitates increased process transparency and accountability.
Once a document has been completed, a signed off copy of the final draft should be stored as well as the published copy.
Tuesday, October 28, 2008
PCI Compliance
Friday, October 24, 2008
Working in IT in DRC
Since I was a young lad watching Live Aid and the famine in
I was originally tasked with managing, supporting and upgrading ICT infrastructure in 3 locations around the country, training staff in each location and identifying individuals in each location who could support the systems during my absence. Later this grew to 12 locations as ICT officer and my final year was spent as an Information Management Officer tracing information flows and business processes and designing systems correspondingly such as a website, an intranet and a document management system with appropriate metadata and taxonomies. I also consulted with UNDP on the communications strategy for elections this year.
In 2003 I left my offices in
The first task I undertook was to upgrade the communications systems in two remote locations – Goma and Kasongo. The Kasongo office was the more challenging of the two. Kasongo is in the centre of DRC. The population is about 800,000 and there are 6 cars. The only way to travel around DRC is by plane as the infrastructure has been destroyed by war. Staff used laptops as power was only provided for a couple of hours a day. We used UPS (uninterrupted power supplies) until the batteries were depleted and surge protection for unexpected power spikes which could fry equipment in seconds. Instead of using satellite phones which cost £2 per minute to download emails in field offices with no internet access I wanted to install VSATs (satellite dishes) to provide always-on internet connections. Use of satellite phones for 10-15 minutes per day worked out at almost £1000 per month. Bandwidth rental on a dish would cost £200 with all the benefits internet access would bring thereby saving almost £10,000 per year. It was strange going from a phone line connection to the internet at home in Ireland to setting up a broadband connection with a wireless local area network in a remote village with no power in the middle of DRC but it was the best and most inexpensive solution. And all this in a place where there is not even running water. It felt great to connect this village (or at least this office) to the world, to search for ‘Kasongo’ on the web and show the staff their village and images of their administrators. Sometimes I think I was the more excited by it as I didn’t feel so remote and removed from the rest of the world anymore.
The systems put in place must be sustainable. A VSAT’s reliability and uptime is 99.5%. This meant I could do my work, leave and not have to do constant checkups. If there were problems in the future a technician would have to be flown in. This is a costly exercise. On another occasion while building a website using PHP with a mySQL backend database I scaled back my plans, deleted the database and used flat text files for backend data. This sacrificed the flexibility within the project but had I not done this, there was no one to change the database or rewrite the code. Ease of use and maintenance always won out in the end but I also always tried to keep scalability in mind.
Offices in DRC need the same systems as anywhere else. Staff Word and Excel, desktops or laptops(I preferred laptops for mobility, the built in battery, the weight for international delivery and the fact that, in my experience, desktops seem to crash more), offices need networks, people need email and file storage space. This is managed the same way as anywhere else. The digital divide is not about different systems as these are the same anywhere. The digital divide is another example of the vast differences between the developed world and the developing world, the rich and the poor. Such divides exist in so many levels of our own societies but the way in which digital technology has become a mainstay in our everyday lives in the past decade makes us increasingly aware of other divides, much greater divides. The prosperity that came with the dotcom bubble was a phenomenon of the West and, in general, the profits of so much more have been ours alone.
I could talk ad nausea about networks, VPNs, different operating systems, licensing issues, standardisation and attempts to coordinate strategies between
Overall I spent almost 3 years in DRC. It was difficult to travel everywhere in vehicles, more often than not with a driver, travelling from one guarded compound to another looking out the windows at life going by in the city, a life that was not mine but that I looked upon as a voyeur. I lived within this as an expat, within a different community, a community and society most of these people would never know yet I have to believe that my contribution to communications made a difference to the organisations I worked for and improved their ability to coordinate and respond to humanitarian needs. Now I live in
Saturday, October 18, 2008
ESXi, VMware, winscp for backup
- Alt-F1 and then type in ‘unsupported’
- edit /etc/inetd.conf (using vi)
- remove the # (remark) sign in front of the SSH line
- kill and restart the inetd process (or just reboot your server) - if you already have VMs on there you don't want to stop running so can't reboot your server do the following (unfortunately restarting services doesn't restart inet so you need to find and restart the specific process.
- At command prompt enter to get process id: ps -a |grep inetd
- Once you've the pid enter: kill -HUP
Thursday, September 4, 2008
python-soappy, fpconst, and a new package
I'm in site-packages in django. fpconst is a child folder of site-packages. I moved fpconst.py into site-packages folder and ran
d:\python25\lib\site-packages>d:\python25\python.exe fpconst-0.7.3/setup.py install
This finally worked for me!!!
Good luck
Friday, August 29, 2008
Backup Exec 12 on Debian
/etc/rc2.d/S99VRTSralus start
This is based on the HowTo guide I read at http://www.apodis.net/kb/index.php?view=ViewArticle&id=80&set=all so thanks to Jelle for that.
The service kept failing at start up so I added the following package
apt-get install libstdc++5
and the service started successfully.
My Linux server showed up in my Unix/Linux servers in Backup Exec 12 on Windows and I was off!