* Posts by Trevor_Pott

6991 publicly visible posts • joined 31 May 2010

Confessions of a sysadmin

Trevor_Pott Gold badge
Unhappy

@AC

Agreed. For everything there must be a business case, and it must be presented properly. The issue that blue collar types in general, and Systems Administrators in particular have is that even with the most rational presentation using all the right buzz words and a solid business case...

...the brass reserve the right to be batshit crazy. At some point you just have to walk away from the situation and understand that there are some battle you flat out can't win. No matter how rational the argument or how strong the evidence, when you run up against the preconceptions of some people, it's like bouncing off a force field.

Go here: http://arstechnica.com/science/news/2010/05/when-science-clashes-with-belief-make-science-impotent.ars

Read that. Then apply the principles and ideas therein to working with management, and you see the difficulties. Dealing with the brass is a large part of my job. Both at my day job, and the various additional networks I administer on the side.

Blue collar folks, (which includes most Systems Administrators) are generally task or problem oriented: they look at the issue in front of them, and deal with that. The better ones are task oriented, but can visiualise how their particular task affects the larger picture. That comes with experience, and it’s how you tell a good worker from a great one.

Management on the other hand plays politics. Feelings and egos come into play; presentation and perception, “buy in,” how any given project, admission of guilt, mismangment or requirement for change will reflect on them, their bosses, customers, the company and a host of other factors.

To an unfortunate amount of upper management, solving a problem is never about the problem itself, but rather about who gets the benefit from solving a particular problem, and who might in some way be offended.

A Sysadmin will want to solve a problem because a problem exists to be solved. An upper manager might order you to leave the problem in place because it does more harm to their rivals than it does to them. I have fortunately been largely spared during my career, but I have many friends and colleagues who have not been so lucky...

Trevor_Pott Gold badge

@AJ Stiles

"Providing Source Code would help by forcing the people who wrote it to write it properly in the first place, lest other people point and laugh."

Have you ever used any open source anything? Better yet, have you ever actually looked at the source of open source anything?

The /vast/ majority of it is as badly coded as anything proprietary, and a truly unfortunate amount of it is utter crap. It is largely coded to solve a specific problem, stupendously inefficient and with zero consideration for extensibility, dealing with errors or unexpected input.

So essentially identical quality to proprietary code then.

The only difference is other coders can tear it up /if they choose/.

They very rarely choose to do so, because frankly it would be less bother to code it from scratch anyways. I think you have some overly idealistic views of open source, sir…

Trevor_Pott Gold badge

@AC

Systems Administration is a blue collar gig. The brass never listen to blue collar folks, they just tell 'em to "get it fixed." They don't care about the details of how it gets fixed, or why it happened in the first place; that's why they are hiring you. When was the last time anyone actually paid any attention to what the plumber or the electrician or Janitor said? Only if something bites them in the ass multiple (expensive) times do they begin to ask “why did this happen” as opposed to just barking out the orders “make it better.”

Sysadmins are digital janitors, and if they agitate too much about things like crappily designed software they risk being replaced; after all, thanks to things like outsourced, offshoring and cloud computing…there’s a massive oversupply of them.

So every sysadmin has to walk to terrifying line between making enough noise to cover their ass when things go boom, and not speaking out so loudly that when cutbacks roll around theirs is the first face on people’s minds to get rid of.

Trevor_Pott Gold badge

@Stephen Roberts 2

Check my replies later in this thread...I do explain it all more in detail...

Trevor_Pott Gold badge

@Chris in NZ

Actually, Vista/7 have mostly done away with DLL hell. I abhor the solution, but their "WinSXS folder" does seem to solve that particular issue.

Windows 7 can take many more kinds of patches in stride without reboots than XP, but it admittedly falls *far* behind it’s competition in this regard; this is largely due to the outdated fundamental security model of the OS…something that Windows 8 is supposed to address.

Windows 7's approach to UAC and privilege separation is as good IMHO as anything Linux or Mac have to offer, and if you wonder when Windows will catch up with Linux and Mac on the rest of the security model, please go read everything Mary Jo Foely has to say on the topic of Midori. If the rumours are right, and they are using Midori as the basis for Windows 8, then things are going to get VERY interesting in a couple of years.

Midori is considered to be Microsoft’s first “post-Windows” operating system, and will likely form the basis of the next generation of the Windows brand. The model for the operating system is so radically different from what exists now that I frankly haven’t found myself this excited for a new OS since OSX was about to be launched.

In any case, I can’t do this topic justice, get the hence to Mary Jo Foely’s blog, and read what she has to say.

http://www.zdnet.com/blog/microsoft/on-the-road-to-midori-redhawk-minsafe-and-sapphire/1477 is a good place to start, but there is plenty more…

Trevor_Pott Gold badge

@gerdesj

I never once claimed that "because my router does NAT my LAN is secure."

I point out that it is common practice, ESPESSIALLY inside a home or very small business. For these people it may not be "secure" in the truest sense of the word, but it is GOOD ENOUGH. Aunt Tilly the Home User or Ma & Pa's 2 PC Bakery don't have the resources, training or time to deal with the kind of network security and management that IPV6 is going to bring to their doors.

They don’t care about SIP, or any of the crap that the end-to-end model makes easier. They want to get to a couple of web pages, get their e-mail, and upload their taxes once a year.

IPV6 in its current format will be a nightmare for these folks, and the entire internet establishment doesn’t seem to care. All you get is “well, the way they are doing it is just plain WRONG, so they should learn better.”

The way they are doing it has worked for FIFTEEN YEARS; these people are going to get their hackles up when told to change, and for no good reason they can understand.

I am sorry, but it drips of arrogance and lack of end-user usage scenarios to me.

Trevor_Pott Gold badge

@M Gale

Not a vinyl router...but close. Different kind of media production, same basic idea.

Trevor_Pott Gold badge

@Jay Daley

Read it. Still don't agree with their approach. IMHO it’s not even close to enough. I want address space that simply isn’t routable on the public internet, space that I can assign either manually or DHCP so I control rigidly what lives on my network, and I want these systems to be able to get at Internet resources without those resources seeing anything about my network. What I want is NAT. Not some touchy feely “if people code their routers and applications to respect the rules, then you will have your privacy and security,” but actual “the only information you are getting about my packets is that they come from my edge device.”

I don’t happen to *like* the end-to-end model, and see no value in preserving it. There is simply a fundamental philosophical difference at work here. I don’t want the internet ever able to address anything behind my edge systems, I don’t want the internet to be able to uniquely identify systems behind my edge, and I want to be able to run around behind my firewall with as few shields as possible. Unless my understanding of IPV6

ULAs aren’t a help at all because ULAs are still supposed to be globally unique. I don’t want globally unique addresses. I want a block of private addresses that *everyone* uses and that for all intents and purposes can’t be routed across the internet. Even if you put your own router into place that would disobey the rules, other routers along the way would simply refuse to forward those packets because they are private address space.

“Untraceable IPV6 Addresses” is smoke and mirrors. There’s no actual anonymity. There’s simply “well, there are just SO MANY addresses that you can randomly assign them!” I don’t want to randomly assign them. I want them assigned sequentially in a way that makes sense TO ME, THE HUMAN WHO HAS TO RUN THE DAMNED NETWORK. But I don’t in any way want you seeing the structure of my network, or the local addresses of my systems. You should see *nothing* except the address of my edge system.

For that matter, stateless auto-config can die in a fire too. I don’t want devices on my network auto-configuring. If you aren’t handed an address, then you languish in .169 and don’t get to communicate with anyone. Network control is eleventeen squillion times more important than being friendly or neighbourly. My network; noone else’s.

I learn to work with IPV6 as it is because I am forced to; I have no vote or say in how it is deployed. Is wrong, absolutely nothing prevents someone from coding a router or network stack that takes what should be “private” or “privacy assured” IPV6 addresses and harvesting the unique information out of them. I don’t trust my ISP, do you? Why should I trust any router past the one on the edge of my network?

But the complete disregard for the concerns of folks like me makes me a Sad Panda. I have nothing but disdain and zero respect for the attitude of the folks who oversee IPV6 I never thought I’d say this, but I really hope Cisco wins. The internet establishment needs to be taken down a peg on this. Have you READ these documents? “The perceived benefits of NAT.” Who the heck are these folks to determine if someone else finds benefit in a technology or not? They can run their networks their way, let us run our networks our way. With any luck, NATPT6 will be widely available regardless of the desires of the IPV6 committees.

AND I WILL CACKLE WITH GLEE.

Until then, I will shield everything system I have, and direct as much negative mental energy as I can in the direction of the Ivory Tower folks who decided they knew better than the rest of us.

If that sounds bitter and angry, then so be it.

Trevor_Pott Gold badge

@Terry Walker

SCCM = $. :(

Trevor_Pott Gold badge

@Robin 1

I don't care if NAT breaks things. I want them broken. I don't care about IPTel or other people's applications. Broken by default is good. I don't care about anyone's network but my own. If the lives of other people trying to peer into my network or run applications that affect systems beyond my edge are made miserable...I'm strangely okay with that.

My network doesn’t belong to the internet. It belongs to me.

Trevor_Pott Gold badge

@garetht t

At the time, both NOD32 and Microsoft Security Essentials

Trevor_Pott Gold badge
Thumb Up

@AC

I never said NAT was a firewall. Not once. I commented on the common current practice of people only running firewalls on their edge systems. Why? Because only their edge systems have externally addressable interfaces. The rest live in a non externally routable private address space, and a good number of sysadmins leave internal-only-facing systems running with no firewalls. (They trust systems on their local network, whereas they wouldn't trust systems on the internet.)

IPV6 on the other hand promises to bring us the wonderful life of every system on our entire network being externally addressable! Thus the only sane network management approach will be a big stonking firewall on the edge as well as firewalls on each and ever system behind that edge, because they too are now externally addressable as well.

IPV6 means your entire network has become "the edge," but you can sort of deal with this in that it will all eventually pass through a router, on which you can have a ridiculous set of intrusion detection systems and a far more badass firewall than you are now required to have on all your other systems.

IPV6: where your ma & pa shop can have network design and security requirements that are the equal of present-day large multinational corporations.

Thumbs up because that's just awesome.

Trevor_Pott Gold badge

@Ben Jackson

Worth looking at. Thanks!

Trevor_Pott Gold badge
Pint

@The Original Steve

Well, you asked for details, and here they are.

The e-mail is protected by a forcefield consisting entirely of a CentOS VM. This VM runs ClamAV, spamassassin, Pyzor what-have-you. It filters and scans all inbound mail, and then passes it along to the exchange server. It drops any mail it finds contains a virus, and marks spam with [SPAM ASSASSIN DETECTED SPAM] in the subject. The exchange server (through some powershell jiggery-pokery) dumps every e-mail it sees with that tag in the subject into the user’s Junk E-mail folder. The Junk e-mail folder cleans itself every night, deleting anything older than some preset age whose number I cannot remember off the top of my head.

When it is working, this works like a HOT DAMN, letmetellyou. It’s free, stupendously simple to set up, and catches bloody-near everything. So how in the nether fnord did this little gem squeak by?

Well that would be the fact that CentOS is complete and utter PANTS at keeping a halfway up-to-date install of clamAV in it’s repositories. Of course my system is set to auto-yum-update certain packages every night, and run freshclam twice a day…but eventually the good folks who run ClamAV decide your version is too old, and they stop supplying new defs. Since CentOS updates ClamAV with a frequency similar to that of planetary glaciation events, this means that eventually the time will come when my ClamAV is too old, and it Just Doesn’t Work Anymore. This spamserver has since been replaced.

To cope with this, my latest spam server is based not on CentOS but on the latest Fedora, (at the time of last build, 12,) with the addition of the RPMforge repository. (http://dag.wieers.com/rpm/FAQ.php#B). This is because RPMForge do me the favour of almost keeping up with ClamAVs spectacular update pace. We will see if this new one is any better than the old one.

What was running on that user’s desktop that allowed the little zipped ball of yuck to walk right into his system and pwn the living crap out of it? Both NOD32 and Microsoft Security Essentials. Don’t get your hopes up that any other scanner is any better; I have similar horror stories for AVG, Trend Micro, McAfee F-Secure, ClamWin, Kaspersky BitDefender, Avira, G-Data and of course Symantec. Useless, the lot of them. You have to keep them around in the vain hope theywill at least let you know that you’ve been pwned, but frankly it’s safe to just rebuild every six months on general principal.

As to migrating to Windows 7; that project is currently underway.

Now, understand that these are all preventable issues. I should have been all over that spam server the instant the clamav defs refused to update. (Naughty me for not configuring the cron job to e-mail me the results. I get a slap on the wrist for that.) I also should have run around with a cluebat telling people DO NOT OPEN E-MAILS WITH ZIPPED ATTACHMENTS CLAIMING TO BE FROM COURIER COMPANIES. (Okay, actually I did that several times, but really you have to do it on a regular basis or they forget.)

There are other things I should have done; regular threat sweeps, actually checking my damned IDS software…you know the drill.

The truth is…we missed it. There are three of us, (myself, a senior sysadmin and a junior sysadmin.) We’re looking after a network with 130+ server VMs, 60+ Desktop VMs, 60+ physical (non thin-client) desktops and 45ish physical servers. We deal in data volumes measured in Terabytes of network traffic a day across the internal network. Peak external traffic input to the network topped 100GB a day in 2009. There are scads and scads of industry-specific software (and even hardware) to deal with, as well as some pretty demanding functionality requirements handed down from They Who Sign The Cheques.

I am the head of IT, but the company has a CTO and a CEO who both have some reasonable say in IT policy. I have to design the network, make sure it’s implemented, maintained, secured and all the other things. The other sysadmin I work with is fantastic, and our bench tech knows his stuff. (He’s learning the trade, and even taking on junior sysadmin tasks.)

You get one project “working,” but not “fully complete and polished,” and you toss it on the line because it needs to be in service *EFFING NOW* and then move on to the next pile of combusting feces on your desk. By the time you even think about the first project thrown into service at 80% completion, it’s been MONTHS, and there are not only configuration changes that need to be made, but it’s now a critical service item, and you have to schedule your downtime as well. (That gets interesting when you have 5 networks in 4 cities stretched across 3 provinces covering 1900km. Oh, and there are roaming users based in cities all over Canada.

Somewhere in there I also have to deal with vendors, prototype new systems, vet patches and system updates, design and maintain websites and intranet services, keep the printers and the phones and the blackberries and the gods-only-know what else running…

So the really short answer is; In all the cloud of things to do, I simply missed the warning signs, and neglected parts of my network. I could sit here and list for you eleventeen squillion things wrong with my network. They are like an infinite number of needles in my eye; I know my network very well, and that includes knowing what’s wrong with it as well. I could spend three months just locking down the desktops, or cleaning out the AD. I could spend a year cleaning up the Linux estate, and doing All The Things That Should Be Done.

Truth is though, I’d never ever in a million years get caught up. SO at the end of the last year, I decided enough was enough, I’m burning the entire network down and replacing it. Every server, every desktop. The research I have put into this, the testing, the vetting, the experiences of it all are beg documented, so that I can share my experiences with those who might benefit from what I have learned. Some of it I have (and will be) documenting on my personal Blog, (http://www.trevorpott.com) but the majority of it ends up here. Somehow someone decided that they had had enough of me running around the comments section of this website shooting my mouth off at everyone and everything, and I should instead be putting my experiences to use for the benefit of Vulture Central.

And that’s how you get El Reg’s desktop management blog.

Trevor_Pott Gold badge
Flame

@M Gale

IPV4 grew beyond it's original Spec. There were standards agreed upon for NAT, NATPT, NAT traversal, uPNP etc.

It Has Been Decided By Those That Know Better That Know Better Than Anyone Else that IPV6 shall not NAT. This means that the open source community won't design an IPV6 NAT, (largely because they all agree that stuffing their idea of how the internet should work down everyone else's throat is a Grand Idea.) Most commercial organisations won't touch the idea of IPV6 NAT until there is a standard to code around. Interoperability on something as fundamental as internet protocol is something (most) companies don't **** with.

I say most because it should be noted that Cisco told Those That Know Better That Know Better Than Anyone Else to stuff it and made a NAT for IPv6 anyways. We will see if this ever becomes any form of standard, or if They Who Sit In Ivory Towers win the battle and it becomes an evolutionary dead end.

For now, there are no “private subnets” in IPV6…no equivalent to 10.X.X.X or 192.168.X.X. (there used to be, but it was removed from the spec because “private addressing, NATs etc. “break the internet” and are bad.) Similarly there is no NAT you can hunker down behind; the idea behind IPV6 is that all your kit is online all the time. The argument by Those That Know Better That Know Better Than Anyone Else is that well /everyone/ should have a hideously complex firewall sitting on the edge of their network that you configure, change and tweak on a regular basis to protect yourself from the internet. Anyone who doesn’t know how to use one shouldn’t be allowed on the internet! Simples!

In essence, the folks behind IPV6, those who currently control the spec, believe that “the internet belongs to everyone.” The idea of anything that breaks their precious “end to end” model makes them apopleptic. Disregard the part where the few ISPs that do native IPV6 are handing out only 2-5 IPs and charging for more, or the fact that significant chunks of the corporate world don’t WANT their devices addressable from the outside.

The answer from Those That Know Better That Know Better Than Anyone Else is, and always will be stubbornly insisting that The Proper Way is a big stonking firewall on your edge device that controls access to your systems and this will be The Only Way.

SO for all intents and purposes, unless Cisco can defeat the entire internet establishment, the days of hiding your systems in a private address space are over. No longer will only your edge devices be addressable from the outside, but so will your desktop, your cell phone and that internet connected toaster you need so very badly.

But your firewall (that will never ever be misconfiguration, ever,) will save you.

Yep.

It will.

And I in no way disagree with this approach. Not at all.

Flames, because I will soon be covered in them after this post.

Trevor_Pott Gold badge

@Mike Bird 1

The author likes to get paid. Jumping up and down on the egos of those who sign the cheques is not an efficient way to do so. You can get away with it once and a while...

...but you pick those battles carefully.

Trevor_Pott Gold badge

@Nick Ryan

Thanks! WIll look into it...

Trevor_Pott Gold badge

@Robert Carnagie

No desktops. VDI. That measn you can just disconnect from your session. THAT MAKES IT FUNNER.

*sob*

Trevor_Pott Gold badge

@FIllipo

The e-mail checking did not occur on the brittle Win2K box. It occurred on the user's virtual machine. (The one he is assigned to use.) That VM happens to be on a subnet capable of reaching the brittle equipment, and then all things went *poof*.

The real hell of it is that I can’t take “Local admin” away from the guy because he’s a manger. So if you have local admin on your VM, decide to open an attachment that you shouldn’t….there’s really **** all I can do about it. That system will get pwned in about 0.2 seconds flat. And it ain’t just windows this happens on. (Seriously, I am getting SO BLOODY SICK of cleaning up after Macs that keep getting pwned by these damned “download this file and execute it” Safari exploits.

So yeah, PHB opens mail, pwns his local system…that reaches out to our network and pwns anything not fully patched. As my article points out: “mea culpa.” That box should have been on it’s own subnet, one that regular desktops or personal VMs can’t route to.

Trevor_Pott Gold badge

@AJ Stiles

Your solution, while very passionate and open-sourceily noble would leave us without any of the equipment that actually makes our company money. When there isn't an open source version available, you buy what you can.

IT exists to server the business, the business does not exist to server IT's ideology. This equipment is what it is, and it is what pays for the wages of everyone I work with. It is my job to make sure it runs, regardless of ideology.

I am pretty certain this is true everywhere else in the entire world, with the possible exception of certain areas of California.

Trevor_Pott Gold badge

@jlocke

I couldn't agree more! In larger enterprises this is an honestly top-notch approach. Sadly, in smaller companies every staff member is "an exception." Everyone is wearing two or three hats. Just setting up the windows security permissions is a nightmare; it's probably as complex (or more) for an SME of 150 people than it is for a corporation of 1000.

When your staff wear so many hats that most of them can't even be reasonably given an actual job title...network security via compartmentalisation becomes a pipe dream.

I can isolate some of the back-end equipment, but isolating desktops, file servers and similar equipment just ain't gonna happen.

Still, wherever you can compartmentalise...do so!

Trevor_Pott Gold badge

@AC

Wait for the next article on the IDS stuff...

As to "bridge mode firewall between the office LAN and the equipment," I would like to be enlightened as to why you feel this will provide more security than a separate subnet + VLAN on the switch. (Especially if the equipment will be getting its own firewall.)

What real protection does your approach provide that mine doesn’t?

Trevor_Pott Gold badge

@AC 12:52

Yar. In this case something on the order of 15-20 years...

Trevor_Pott Gold badge

@Obvious to me...

Never heard of it, but based on your recommendation I will take the time to check it out. :D

Honest and true; when you filter the noise out of the signal, the real value of El Reg is in it's readers. <3 commenttards.

Trevor_Pott Gold badge

@AC

Nope; they never turn thier machines off. We live in a VDI environment, and they *all* have external RDP access. Look for my upcoming articles on VDI; one of the major pains in the neck is that your users can simply "disconnect" instead of rebooting. (Though this can be solved with GPOs...)

Anyways, I don't want to give too much away, because then I'll be out of material for the VDI article set!

Trevor_Pott Gold badge

@AC 11:22

"You can do quite a lot to isolate things beyond subnetting. Modern switch hardware has all sorts of separation and even packet blocking features."

Yes it does. In fact, even my old-ass semi-managed switches offer VLANing. There are many features that high-end switches (such as Cisco or Procurve) offer that could solve this problem. It's just COMPLETE OVERKILL for this situation.

Subnetting will put my system “out of reach” for any system under my control, because the OS will honour the subnet and refuse to allow randoms to connect. It will also prevent anyone plugging into my network from simply getting a DHCP address and finding the system. Virus and attackers can configure the network card to NOT respect subnets, and so the subnet really should be combined with a VLAN.

Being sensible, I will subnet the system *and* VLAN it. Anything beyond that is both totally unnecessary...and not possible with my current switching gear. While I could easily toss together a bit-flinging box to be a router and do more than vlans, I just don’t see what it gets me that simple subnetting and a VLAN don’t.

My switching gear is okay for an SME; but cisco it is not. Replacing my network infrastructure with Cisco would eat my IT budget for the next two solid years, and I frankly fail to see any benefit. Cisco, (or their trained minions) have yet to show me a single thing that would actually care about doing on my network that their gear can do better than a well configured Linux or BSD box. And for the cost of one of their routers, I could build a multi-system RAIS* 5 (with hot spare) Linux or BSD routing cluster. Since I only have to route gigabit, a bloody Atom can fling all the bits I need.

*RAIS: Redundant array of inexpensive systems. Fancy clusters on steroids.

Trevor_Pott Gold badge

@yehasher

This system exists to receive files from a master command and control system. It then takes those files and Does Stuff (tm). Without the ability to use the files it is getting over the network it is a quarter million dollar paperweight.

Steve Jobs talks Flash, 'lying S.O.B' devs, sex, and Gizmodocrime

Trevor_Pott Gold badge

@SuperTim

"Now be a good lad and get back to your "freelance journalism" or whatever being unemployed is called these days."

Wait...what? You are making freelance contribution to a journalistic entity sound like a bad thing.

Q_Q

Software SNAFU took out 10,000 military geo locators

Trevor_Pott Gold badge

@DIsco-Legend Zeke

Google isn't evil?

Since when?

Patching is a pain...

Trevor_Pott Gold badge

@Ben Tasker

Mac OSX has an OS-level updater...but it doesn't have much in the way of third-part application support. Compared to yum or apt, it's still pretty primitive.

The ultimate solution to these problems are for Microsoft and Apple to allow other applications o register with their patching solutions so all applications have a single patch management solution.

The only reason these companies don’t is some vague fears about liability, which says a lot about culture that we let crap like that stand in the way something as critical as system security. It’s a sad state of affairs…

Trevor_Pott Gold badge

@AC 12:14

That's certainly a new approach. The only thing I can say about that is...

...neat!

Trevor_Pott Gold badge

@cornz 1

Yes, it is one of a number of excellent tools that can help mitigate these sorts of problems. Like all such tools, it isn't comprehensive enough to solve the problem entirely, but it does most certainly do nothing but good.

There are several similar applications offered by various vendors; some I have had opportunity to use, others I haven’t. I would love the opportunity to test all the big ones side by side, but sadly, this isn’t on my project list for at least the next six months.

I personally think these programs have come a long way since the last time I really looked at them in depth, (2007.) Not getting the chance to dive back into things like this more than once every five years makes me a sad panda.

Trevor_Pott Gold badge

@AC

Did I say I had autorun enabled on my network? There is a difference between articles like the one previous to this; a confession based entirely on my own network config, and trying to pass along some best practice information. It is "obvious" to any practiced systems administrator, but it bears repeating for the newbies. Remember; some of El Reg's readers are a little wet behind the ears, and it is largely them I am trying to target. The more experienced folks read white papers and practice guides and have decades of strong opinions anyways.

As to users "needing" administrative privs...the debate has been had.

http://forums.theregister.co.uk/forum/1/2010/05/28/malware_user_training/

Mac spyware infiltrates popular download sites

Trevor_Pott Gold badge

@Barry Lane 1

I know Mac users who actually run anti-malware apps on their Macs...strangely these are also the kind of people who never get any malware. They are too alert to do things like download some trojan and execute it.

Most people whom I see with Macs use them because they don't have the first clue about computers, but someone told them, (with chest thumping confidence) that Macs simply can't get viruses, so they would /never/ have to worry.

This translates into smugness and then incredulity when faced with the actual evidence of it.

Personally, I'd prefer to never have to deal with the things at all, but...friends and family, eh? Not seen that many infected copies of Windows 7 lately though. The excptiong being some nasty strain of fake AV software that i think is related to the crud I've been seeing pop up on these Macs recently. It looks like the same crap, and seems to defy virtually every defence you can toss at it.

Also; Macs don’t get “riddled with Malware.” Windows systems get “riddled with Malware.” When a Windows system get a virus there is a flashpoint about 0.3 seconds later as it downloads a bunch of friends, and your system suddenly has somewhere ein the neighbourhood of a thousand infected files and at least 15 variants of different terrible viruses.

When a Mac gets a virus it’s a VERY different story. Current Trojans present themselves as something delicious to their users. They then execute this for whatever reason, and it barks at them for privilege elevation. Wanting to execute whatever it is that is in the package, the user agrees…and seconds later this doohicky has functionally rooted the Mac. It then goes on to download something very singular; a fake antivirus or an IRCbot.

I find more Macs infected with IRC command and control nodes than anything else. Yes; Mac infections tend to require user interaction. Drive by downloads do happen on Macs, but they are ****ing RARE.

Macs are *NOT* immune to malware; and they are gaining market share at a fast enough rate that they are starting to become huge targets for the kind of Malware Trojan scams that Windows users are inured against. Mac users tend to think it can’t happen to them and most of them simply can’t conceive of it…until it hits them.

Ask me this time last year how many infected Macs I had seen, and I would have said one, maybe two in my entire career. Now I am seeing one every other week. There was a ceremony held a month back when I added, for the first time, a suite of Mac anti-malware tools and install CDs to my CD binder for the first time.

This is moving out of the shadows and into the mainstream now.

I hope you guys are ready for it.

Trevor_Pott Gold badge
Unhappy

Anti-malware for OSX

It exists. For the love of $deity, USE IT. (I am getting so sick of cleaning Macs...)

Welcome to the big time boys; after years of slogging in obscurity, Microsoft ****ed the pooch and gave Mac an opening. Because Jobs is no one's fool he took advantage of this and the end result is that as a platform, Mac is finally relevant. Relevancy bears a cost; and that cost is being a valid target.

For systems administrators, it is now that the really hard work begins; convincing all those Mac users that their nice period of obscurity is over, and it’s time to start learning some basic desktop security principals just like all the Windows users have to.

If I get one more worm-ridden Mac in from some user who smugly states “that’s impossible; Macs don’t get viruses” I think I might just compress into a microsingularity and evaporate.

Steve Jobs beheads iPad apps for acting like desktops

Trevor_Pott Gold badge

Poor devil.

It acutally looks like a cool App. Wouldn't mind it for my Crackberry.

SanDisk soups up SSD storage to 256GB

Trevor_Pott Gold badge

160TB write endurance

Hmm. 10 years my ***. Run any of (off the top of my head) the Battlefield series of games, and the bloody caches it writes, re-writes, and then has to do all over again every patch alone should top 160TB in three years.

Might make a good kiosk system drive, but this isn't going to support my gaming habit...

Malware scanners fail

Trevor_Pott Gold badge
Happy

@Mike 137

Actually, you are technically correct. Though this doesn't work nearly as well in XP as it does in Windows 7. Under XP, if that application calls sub-apps to do something, then for some reason about half the time the sub apps get called in the restricted user context. It causes all sorts of bizarre behaviour that I just don’t see under 7.

I also find it eternally odd that with some applications I just don’t *get* the option to “run as” in XP. (I notice it more on XP64, but it still does occur on XP32.) I can for example run my games as whomever I choose, even some JAVA apps or Google earth. Evolution on the other hand stubbornly refuses to give such an option, no matter how many ways I try to make the shortcut. (I have more examples on either side, but you get the idea.)

Even if you are lucky enough that your applications will behave in the FrankenAdmin mode under XP, the bigger issue is that as far as I know this can't be built into the "shortcut" or in some other way setup such that Windows remembers this setting. If you think that you are going to get folks to use something as clunky as that, well...I really do wish you luck.

So for all intents and purposes, though can “technically” use “run as” in Windows XP, in practice I have found it to be so buggy and clumsy as to be utterly worthless. Thus you in essence are forced to run your applications under the context of the running user.

Your milage may vary, and I hope you never run into apps that require you to experiment with this on a practical level. :D

Acer revs up Ferrari smartphone

Trevor_Pott Gold badge
Megaphone

@Acer

You're doing it wrong!

Intel puts x64 in a parallel universe

Trevor_Pott Gold badge

@AC

I demand a shrubbery

User Data: Here, there, everywhere

Trevor_Pott Gold badge

@Jonas Nagel

That would be a) because VDI is a whole set of articles that will occur at some point in the future, and b) because even if you are using VDI, you still have the issue of managing profiles. (Those VHDs can only be so big.)

I should point out that I do indeed use VDI for my company. In fact there are now 43 Wyse thin clients sitting on the table in my office. (Down from 45, we're deploying them slowly.) The issue becomes roaming users. You just don’t have internet access /everywhere/. Because of this, they need access to information while offline. That is where things like folder redirection and roaming profiles are /still/ the only option.

I encourage you to read the whole set of user data articles in full. While I can’t, (and won’t) claim VDI to be the be-all and end-all solution to this mess, it is indeed touched on.