Securing AWStats

Good security strategy utilizes layers of protection.  The more tactics you employ to secure an asset, the more difficult it becomes for someone to crack your safeguards.  AWStats provides a wealth of data about the traffic to your site, but this is not the kind of stuff you just want “laying around” on your website.  Here are some suggestions for keeping that data private:

Continue reading

From Mainframe to Virtual Desktop – Good to Better

As with most technology advances, the newest, hottest “thing” grew out of an earlier model.  The latest buzcept, Cloud Computing, leverages the incredible advances in computer processor, disk storage, and Ethernet networks to extend a model that has existed nearly from the dawn of the computer age.  So as IT leaders present ROI and justifications for moving to the latest technology, Continue reading

The Root of All Evil

Certain management principles cycle in and out of popularity over time.  Take the acronym K.I.S.S. – Keep it Simple, Stupid.  In some very real sense, the reminder that we tend to out-think ourselves when faced with everyday problems comes from a fourteenth century philosopher, William of Occam.  Whether we prefer a loose translation of Occam’s Razor (The simplest explanation is invariably the best), or our modern day acronym, we do well to review the basics when complex systems break down. Continue reading

My favorite iPhone and iPad apps

In keeping with the tradition of ranking the past year’s developments, I made a list of my ten favorite iApps.  There are many more on my devices, but these are the ones I enjoy the most.

  1. River Guide for Kayakers.  I own a canoe instead of a kayak, so that I have enough room for camping gear on our overnight canoe trips.  This little app pulls water level and flow data from the USGS gauges across the country.  Having a tough day at work?  Check the water levels on the closest river and start Continue reading

3D TV for IPTV – conclusion

In the previous post, I gave a quick summary of some of the technical pieces required to make 3D TV work.  As it looks now, IPTV providers will have to wait just a bit longer for software updates to some existing equipment.  Once some key pieces are upgraded, systems will be capable of sending 3D signals to customers.  But will customers want to purchase a 3D tier of channels?

Continue reading

Secure your digital possessions (part 5)

Now that you have started to practice good password security, and upgraded your computer defenses, you have greatly improved your odds of keeping your digital valuables out of prying hands.  The last step in this five part strategy involves the most unsecure aspect of the security equation: you.  That’s right, you are the biggest threat to your own security. Continue reading

Secure your digital possessions (part 4)

For the past couple of weeks, I wrote about some of the very basic things you need to do to protect yourself while using a computer.  Most of these things have analogies in the physical world:  Passwords are like key fobs that control a car alarm, firewalls and wireless encryption are like guards and doors to your house or place of business.  This week I will take a look at some insurance policies you ought to own:  Anti-malware programs and automatic updates.

Continue reading

Secure your digital possessions (part 3)

Now that you have established a good password policy, and put a firewall appliance in your home network, you are sorely tempted to “untether” your computer.  Almost every home router sold today has built in wireless (Wi-Fi).  If you have a smart phone or laptop manufactured in the last five years, these devices also have built in Wi-Fi.  Even if you never utilize the built in wireless features of your home networking equipment, these radio devices ship from the factory with all the security of a 30 year old screen door.

Continue reading