* Posts by Lee D

4251 publicly visible posts • joined 14 Feb 2013

Sysadmin denies boss's request to whitelist smut talk site of which he was a very happy member

Lee D Silver badge

I work in schools.

I once had a teacher who came to me with their personal laptop. "It's been hacked", she told me.

After a lot of gentle interrogation, I managed to get to the bottom of why she was so sheepish and reluctant to reveal the source of the hacking or, indeed, how she knew it had been hacked. (In the past, I've had people tell me they were being hacked because they had Christmas decorations on their Smartboard which made the mouse jump all over the screen whenever they used the PC....)

Turns out that she was a fan of certain Russian dating sites, and one of the fellows on there had been more than normally convincing. After a few back and forth conversations, he somehow managed to get her to click something, which then whipped all the OTHER personal photos she had that she hadn't already sent him... and then he sent a nasty little email threatening to reveal them all.

It then turned into a much more open conversation involving phrases like "That's the folder but please don't go in there!", and so on, Eventually we cleaned what we had to and made sure there wasn't anything on the laptop that shouldn't be there but there would be nothing I could do about clawing back anything he did manage to access.

Of course, it would be the ageing, near-pension, teacher for whom you REALLY don't want the associated mental image, too.

Jingle bells, RM tells, some staff to go away... via Skype

Lee D Silver badge

Hear that? It's the sound of the world's tiniest violin.

SQL Server on Linux: Runs well in spite of internal quirks. Why?

Lee D Silver badge

Re: Interesting

I think it's more likely that they are reducing virtualisation costs.

Nobody can afford Datacentre, so you're paying for every VM, in effect, which means that converting your stuff to cloudy virtualised things means yet-more-Windows-licences.

Given that they want you to pay for Server, Server CAL's, SQL, SQL CAL's, this is a way to make the obvious "virtualise everything" progress cheaper for businesses. Just SQL and SQL CAL's to buy, in effect.

Windows is basically being given away.

Office isn't far behind (£5.99 a month for personal users, far from the £200-300 each year that it used to cost)

But they can do that because everything's ending up on the cloud for most users, and IT departments are doing that by virtualising what they already have, or buying in SaaS. Both of which benefit from not having to pay for a Windows licences for a virtual machine for every database server you want to run. And, let's face it, if the choice is more Server licenses and SQL on top, you're more likely to swallow the one-off transition costs for something major like a cloud-move and go elsewhere.

Offering SQL on Linux takes the sting out of that while still netting annual renewals.

(P.S. Running five instances of Datacenter in a school - we pay a pittance in comparison to full retail prices for the same. And on each of those we can run the entire school, in a pinch, by moving the VM's around. But we only have a single SQL server VM because of the extra cost).

How to confuse a Euro-cop: Survey reveals the crypto they love to hate

Lee D Silver badge

So, surely it IS working exactly as described.

One of the roles of encrypted streams is to be indistinguishable from random noise. As more people use encryption - as they should - the more those using encryption slip into unrecognisable random noise.

P.S. likely for the last ten years, your email, banking, shopping, logins, software updates, and just about everything else have been encrypted. Quite how much do you think one encrypted stream is going to stand out.

And what you're suggesting is that encryption itself is not breakable, hence not useful to try to break, and so they rely on other metadata. The encryption did its job. You still don't know what was said. If you posted the encrypted message on a forum, you still don't know how the intended recipient was and only the recipient can understand the message. The encryption is doing everything it's designed to do.

The NSA are also presumably doing everything they were designed to do. But that should mean a lot more than "let's try to break encryption".

Encryption works exactly as intended as it's NOT designed to stop people knowing some data travelled from A to B. It's designed to make sure that data can never be accessed by unauthorised people and that the encryption data itself (not the format, carrier, connection, etc.) is indistinguishable from random noise. Job done.

That they did the equivalent of sending an encrypted message to "terrorist_cell_B@hotmail.com" is their own stupidity. The encryption still did its job, exactly as designed.

"We know this terrorist sent a message to this other terrorist at 9:26am".

"Okay. What was in the message?"

"No idea".

"So, absent any other significant correlation, it could have been a recipe for cookies?"

"Er..."

"And how 'rare' are encrypted messages nowadays, Mr Spy?"

"Well, we've been arguing for years that we can't crack people's Tesco's shopping..."

"Oh. Interesting. I move to dismiss, your honour."

Lee D Silver badge

Purpose of encryption: To stop people - other than those intended - being able to see, or infer, the contents of a message.

Sorry, but it's working exactly as designed.

"Weakening" it or "backdooring" it makes it stop being encryption.

And unless you can stop everyone, everywhere, across the planet having access to ... gosh... mathematics... you're not going to stop it.

Sure, you can ask Skype for a backdoor but you could do that legally anyway without any need to break encryption whatsoever as Skype are part of the "intended recipients" for most things. But if people are using an OTR plugin or similar to communicate USING Skype, there's nothing you can do.

And guess what the terrorists are doing, as compared to Granny who just wants to talk to Fred in Australia?

It's like saying "Oh, yes, we'd really like a way that no bullets in the world would ever fire in any gun, anywhere, except our own". Although "true", it makes you sound just as stupid.

You had your chance when PKE was declared a weapon and that all got invalidated, and only ever really took effect in one country. You can't hide "maths" any more than you can uninvent "chemistry" to get rid of bombs.

Rather than chase encrypted messages, put a few more people on the ground, in airports, and do a few more checks on people at the borders.

P.S. Though I would never suggest anyone - even a mathematician - does so, it's possible to encrypt using nothing more than pen and paper, and it's possible to extend existing source code to use unbelievable complex keys that take 20+ minutes to sign a single message. Even when "weakened" by using all the known flaws in the algorithm, that means it's still not going to be cracked this side of armageddon.

Rather than chase the dream of an encryption scheme you can crack every time, acknowledge that you are no more likely to crack the encryption than infiltrate the groups in question, or get a bug onto their PC directly, or work it out by other means. Just like foreign militaries.

Sorry, iPhone fans – only Fandroids get Barclays' tap-to-withdraw

Lee D Silver badge

Re: How is this progress?

FINGERPRINT SCANNERS ARE NOT FOR AUTHENTICATION.

How many times do you have to tell people this? You're leaving your fingerprint "password" ALL OVER your phone every time you use it.

Lee D Silver badge

Because Apple refuse to let anyone else touch the parts that can do wireless payments.

Game over.

Comcast is the honey badger of ISPs – injects pop-ups into browsers, doesn't give a fsck

Lee D Silver badge

PlusNet used to block all your web access if it noticed port 139 unsecured.

That's much more reasonable and much more an impetus to action.

However, with SSL etc. all that happens is sites like Google (many people's home page) will just fail to load with a security error if tampered with in that way.

How about ringing your damn customers or sending them an email?

Stay out of my server room!

Lee D Silver badge

And now you know that they've entered the space they weren't allowed to, and you invalidate all the passwords in that room...

Physical access is compromise.

Lee D Silver badge

IT are generally in charge of the access control, too.

A 500kg holding force maglock with battery backup costs a pittance and can be fitted by anyone.

If you can't have people in your room, don't let them.

Working in a school, the IT Office is access controlled (only IT can open the door, otherwise we have to buzz them in), and the server rooms are inside that room and access-controlled again (physical key).

Best bit - not only can you decide who gets access, you can monitor who tries too, and whether that site-manager who absolute must have access to every cupboard that he never goes in is sneaking in at night to have a gander round.

At that point, you fit a PoE CCTV camera tied to your smartphone in that cupboard too.

"But what if they won't install it?" Buy it, put it in. It's access controlled, right, so nobody should be able to get in there to see you even have it...

Microsoft still working to fix Outlook sync issues

Lee D Silver badge

I paid for Hotmail.

I paid for Opera (back in the day).

I paid for WinZIP.

I pay for any service I deem good.

When Hotmail went to Outlook, I stopped paying and threw it away. GMail was the answer, combined with my own server to manage email. Email actually comes to my GMail and my personal account at the same time. Downtime in the last 10 years? Zero, except scheduled reboots for kernel upgrades.

Yet, my workplaces (one of which was entirely Google Apps, another on-site Exchange AND Google) get downtime all the time. Literally, today, Google Drive threw a wobbly for a long time.

Cloud providers are third-parties. There's nothing wrong with remote servers. There's nothing wrong with hosting multiple servers in disparate geographic locations. There's nothing wrong with having virtualised servers or containers running on other's hardware.

But RELYING on them to always be up - as in this instance - is a nonsense. Deploy Outlook in-house AND in the cloud. And then at very least you can send / receive internal email and use your backup mail servers to send/receive email if you need to.

But putting your eggs into the hands of Microsoft, Google, Amazon or any other single entity to which you represent 0.00000000001% of their annual income is a stupid idea.

Oh, and for four years you couldn't log into Hotmail with a standards-compliant browser (Opera) when it was in its prime of development and had full support for all relevant standards. And the downtime on Hotmail once hit 20 days in one year. And I've seen Google downtimes in the days-per-year category too.

With those kinds of numbers, you're an idiot to rely on cloud alone without your backup MX / database replica being held in-house too. Because, you know what, my last workplace got 99.99% uptime. And we weren't even trying.

Lee D Silver badge

Cool.

So all those IT issues that are common to random sysadmins hit cloud services just as much, but with impacts for millions of customers rather than just a few dozen.

Glad to see that the change management at Microsoft is just as effective...

Lee D Silver badge

Cloud service provider.

Say no more.

Allow us to sum this up: UK ISP Plusnet minus net for nine-plus hours

Lee D Silver badge

Re: Meanwhile, on BT Infinitesimal

+1 for Draytek. My three-year-old 2860VN+ is still getting firmware updates with major feature upgrades (they just added DNSSEC checking for the ISP DNS servers, for instance).

And if you buy the Vigor AP900 range of wireless points, it can be centrally managed from the Draytek router.

Never had a problem, upgrade it regularly with new stuff, handles all kind of stuff and has features that I've never seen on other routers in its price-class.

Lee D Silver badge

Re: Working fine for me

My ex-wife (who kept my PlusNet account from the days when it wasn't owned by BT and was actually one of the best) in Cornwall had no end of problems.

She's considering cancelling the contract, it's been that bad for her.

And she lives right in the middle of one of the largest towns, so it's hardly out in the sticks.

It's time: Patch Network Time Protocol before it loses track of time

Lee D Silver badge

Only affects Windows, and looks like you have to have yet another of those "if you opened up your NTPd to allow remote people to do things they shouldn't be doing" options - mrulist.

At this point, if you haven't bothered to "restrict" and "noquery" the options on ntpd as suggested in all the documentation, you probably shouldn't be operating servers in the first place.

Donald Trump confirms TPP to be dumped, visa program probed

Lee D Silver badge

Have you ever tried to apply for a visa?

Last time I tried (for Australia, not the US), I had to be accredited, skills-tested (yes, Australia operate IT skills test in foreign territories), prove that my job involved the kinds of things they were looking for, and I had to be working in a profession which fitted their definition of an acceptable job for visa approval - which were all high-skill or high-level-of-management jobs.

In the end I applied for a Working Holiday visa instead, which was much less strict but only lasted a year and the idea was you could use that to later form the basis for a real visa.

I can't imagine that Australia has more tech people in the US such that their criteria have to be so much stricter. I imagine, in comparison, they are crying out for skilled people. But the fact is that the application process itself involves things akin to a CCNA / A+ (but industry certs don't directly qualify you for their test) as a base level of acceptable skill tells you just who they are interested in having and who they are not.

Lee D Silver badge

I think you'll find that almost all countries have such visa programs precisely because local talent is hard to find or overly expensive.

Open your borders, people come, do the job you need, and then move on to other things.

Close your borders, nobody comes, the local talent aren't skilled how you need, or they charge twice as much because they are now a much rarer beast.

To be honest, as soon as visa things mention "graduates" you're really stupid to play with them... it's brain drain.

The UK is finding this out with Brexit and the only panic you see from the government is assuring foreign students and foreign-educated graduates that their situation will remain unchanged. They can't afford to lose those people.

UK.gov flings £400m at gold standard, ‘full-fibre' b*&%*%£$%. Yep. Broadband

Lee D Silver badge

Re: Shonky speed illustrations

Gigabit network here - I could shift 7Gb in under a minute.

Admittedly, it's an internal network with well-specified hardware, but that's do-able.

Also, patch download times and Google load times? I question your network setup. INSTALLATION time is an entirely different matter and nothing to do with the Internet line, but download should be at line-speed from any Microsoft update server. And Google used to tell you the page generation times, but if it's not an instant-return, you need to fix your connection.

Although I agree in principle, a Gigabit line is enough to run a HUGE workplace from quite happily, and everyone to get something they consider blazing fast in terms of Internet. I'm in a school with a 100Mbps leased line (symmetric, but I'm automatically removing symmetric scenarios like uploading), and with proper management it's instant and fast and the only delay is actually our web filter (which downloads, interrogates, then relays, so it adds latency - but speed tests still return near-line-speed once the connection is downloading).

And although it's different on the ISP line, we've been handling Gigabit connections connected to a central location with hundreds of such connections for years. Admittedly it's Ethernet-backend but those kinds of connections are far from unusual and Gigabit-to-the-desktop has been my minimum spec for nearly a decade now. If a £20 switch from Amazon can handle it, I'm sure the expensive telco equipment can do too.

Now they have to push it through to a series of peering points, sure, and those are large, sure, but that's always been the case and it's basically the POINT of an ISP or telco to have that expensive gear and push it down to us. We've gone from 56K to 10Mbps being standard in a matter of two decades, and that's a 182-fold increase. In that time, the ISP backend must have increased at least 182-fold as well, and that's not something that's ever going to stop until we hit technical barriers (given that sub-ocean cables are capable of taking much more with no visible upper limit yet, we shouldn't need to worry about getting from BT headquarters to Telehouse Docklands, for example, for a long time yet).

Cost? Of course it's not going to be cheap. But that's the point - ISPs buy the big expensive pipes, and squeeze all their customers down it, and charge them a percentage. And I guarantee they still have plenty of room for profit, other services, installations, equipment upgrades, etc. by doing just that.

But Gigabit to the home is a reality in many countries, with comparable distances to cover and comparable peering arrangements, and they can even do it cheaper than BT can.

Past gigabit hasn't really been necessary or properly standardised yet, mostly because even most PC's can't do more than gigabit themselves, let alone home networking gear, but it's nowhere near being unachievable.

That it HASN'T been done in the UK is more a sign of profit-over-investment, and an incumbent telco, rather than physical capability.

Lee D Silver badge

Re: What are people doing that needs fibre?

A family of four will swamp a 40Mbps line just with base level streaming, background browsing software updates, etc.

International Space Station celebrates 18th birthday in true style – by setting trash on fire

Lee D Silver badge

Re: Fibreglass and cotton ...

Just open the doors and vent it into space. Fire out, smoke gone, problem solved... ;-)

I mean... you hope the crew managed to get somewhere else first, but they're expendable compared to a multi-billion dollar space station.

Lee D Silver badge

Anybody else appreciate the irony that it's the 21st century, we've had people living on a space station for nearly two decades, and our greatest fear and unknown is still fire?

Irish eyes are crying: Tens of thousands of broadband modems wide open to hijacking

Lee D Silver badge

Re: Why does an ISP need access to your hardware

They already have access to, and can monitor your data.

All the data that's not encrypted anyway. You're not doing anything sensitive over unencrypted channels, are you? That's just idiotic.

And your ISP doesn't need to be in your router to monitor your data. By definition, they are providing that service to you anyway. They are in your router to monitor their equipment, upgrade it against firmware attacks like this for you, and tweak settings (i.e. upgrade your speed, upgrade the DOCSIS version compatibility, etc. etc.).

If you don't trust them on your network, change your router or put something between your ISP's router and your own. That's what modem mode is for, for instance, and I've been doing that for 20+ years.

But if you don't trust your ISP not to snoop, then you should be encrypting (you should be encrypting anyway, to be honest). And if you're encrypting then you don't need to trust your ISP - they can't snoop anything you're not sending them.

If, however, you've connected their router direct to your home network / wifi with no device of your own in-between, then - yes - they theoretically have access to your wireless clients and your network, same as being plugged into a local network cable. Shocking that. If you use a device given to you, and put a password into it and connect using that password and use it for all your Internet, and plug it into your wired network, that device can access your wireless clients and wired network. I'm SHOCKED at that. Honestly? If that's the kind of attack you're worried about, you deploy a firewall of your own inside your network. A £30 box from PC World, problem solved, and it can follow you to any ISP, any network, any country.

Hell, even in work, our leased lines, VDSL and ADSL come in to ISP-supplied routers, load-balancers switches, fibre converters, and then - guess what? They all go into an isolated, untrusted VLAN which only includes our gateway / firewall / router / IPS / IDS device. Guess how much snooping they can do over and above what we're sending them? Nothing. Guess how much they can get into our network? No more than anyone else with an Internet connection.

Dyn Dyn Dyn – we have a buyer: Oracle gobbles Internet of Things DDoS victim

Lee D Silver badge

Re: So what are Oracle's plans for Dyn?

Same.

It's pay-for for anything interesting but if you had an account from back in the day and paid anything, you get a lot more benefits than you would now.

But, to be honest, I'm now just looking for something else because Oracle will ruin it like everything else they touch.

Worst case, I do some wasted research.

Best case, I've already gone elsewhere by the time it goes downhill.

FYI Apple fans – iCloud slurps your call histories

Lee D Silver badge

Much as I might like to jump on the anti-Apple bandwagon occasionally, this isn't unique to Apple.

Google smartphones often sync your contacts, Chrome bookmarks and all kinds of other things to the cloud.

It can be useful (e.g. when upgrading from one Android handset to another) and I'm sure there are options to control it, but I don't remember seeing a massive YOU CAN OPT OUT kind of dialog for that. At best it was a "what would you like to sync?" and a list of things that halfway down might have included Contacts.

So long as people are voluntarily enabling it, it's tough. And I know the iPads and iPhones I've seen (never owned one in my life) have a similar slider for syncing contacts, calendars etc.

IT outsourcing is soooo passé, says outsourcing giant Fujitsu

Lee D Silver badge

Re: Outsourcing is meant to undermine, jobs, ideas, labour laws, something.

Absolutely.

My job is often no more than to get people running, get them stable, get it all documented, and then hand off to someone who - invariably - has less knowledge and just wants to run a working network that will tick along with minimal management from then on.

Until the next disaster.

And there's the problem - if you can do this kind of work, your unique skills are actually in demand once in a blue moon, and the rest is just day-to-day dross. If you're happy - or even struggling - with the day-to-day dross, you're unlikely to be able to go in and do the fix... especially with any kind of authority.

So the skilled(*) keep on moving around and the day-to-dayers are the normal hires who are out of their depth when things go wrong or actually need proper planning.

I also hold the thought that "Your boss should be able to do your job". Temporarily. To a certain extent but maybe not a complete replacement. But in your absence, there's no point having NOBODY around able to do things, make a decision or even hire the right person to replace you. I hold myself to the same (i.e. I need to be able to do the job of the guys underneath me at a moment's notice) and I can't see why it shouldn't propagate upwards. The people who hire me have to be able to know a) I'm not lying to them or making stuff up, b) I'm not wasting money on toys, c) I'm not doing things that are unnecessary, d) that they can ask for X to be done and the considerations they would make are automatically taken by those they've asked, too and - most importantly - e) how to know how to hire the correct person who can do all this and take it off them.

Unfortunately the Peter principle applies to IT too, but at least IT is so fast-moving and requires constant learning that such unsuitable people quickly falter or play little role in the overall system.

(*) I do not consider myself vastly skilled, by any means. I'm a programmer, a nerd, a tinkerer, a geek, but I manage networks for a living. I have no industry qualifications or training, my degree is technically in mathematics before it is computer science. I'm self-taught for the most part. I'm just good at certain things and know how things SHOULD be in order to work properly, whether that's jumping on the new technology or staying off it.

But I go to places and I am so disappointed at the quality of IT staff that it's shocking. Even in the biggest, most prestigious private schools, I've looked in disgust at how they operate day-to-day on the backend. It's nothing to do with snobbery, one-up-man-ship, or being a Linux geek (I am one, but Windows rules the commercial world, sorry). I've worked on zero budget as just me (literally "We paid you, you do what you can but we can't spend a penny more") to large budgets for departments. But I have stood in numerous IT departments and just thought - or actually said - "You honestly think this is good enough? That this is doing your job as [tech / manager / director / whatever]?". I've worked with "strategic IT consultants" who didn't know what a virtual machine is... but was selling their services on how to tell IT departments what they should be doing - including server deployment - at vastly inflated rates.

Though I don't consider myself anything particularly special, it appears that I'm a rarer beast than I give credit to myself for, which probably explains why people always said I was undercharging.

Lee D Silver badge

Outsourcing is stupid.

"We can't afford to run IT, so we'll pay a company to run our IT just the same and make a profit too".

If companies don't see the idiocy in that, I don't know how they stay in business when things get more complicated at all.

By outsourcing, you are paying people to do the job that your guys were doing, with less comeback, less personal responsibility, less care, and less knowledge and then paying either a) the same as you were, in which case that minus profit gets spend on the service, or b) more than you were, in which case the same gets spent on the service as you were spending and you're giving a percentage to the company for doing nothing.

Sure, if you move it offshore and to cheap labour and everything else but still the overheads hit. You could have just set up a foreign branch, hired the same cheap labour, had them under your employ and your control, and paid just the same and kept the profit that an outsourcing company would have demanded to do EXACTLY that.

There are economies of scale but people quickly realise that they are minimal, and that compared to losing control over your systems they aren't worth it.

I get a phone call about once a month from one outsourcer or another trying to put me (and my department) out of a job. They always get stroppy when I won't put them through to my boss. Unlike most places, though, there's a better reason I don't than just "they might sign up with you". These people actually recognise that outsourcing is a waste of time, money and effort to do the same thing that you need to do anyway. And often that's because of experience of having done so before.

I actually specialise in recovering school IT systems after disasters. I can confidently state that over my 17-year-career almost all my introductions to new schools have started with a phrase like "Well, we outsourced the IT, and then..."

(P.S. If you phone up, ask for the boss and are refused or redirected to the IT Manager, and your sales pitch is basically "We can get rid of your IT team and you can just pay us instead" *to* the IT team, guess why I'm not particularly friendly to you...)

Antivirus tools are a useless box-ticking exercise says Google security chap

Lee D Silver badge

We're still just designing systems wrong.

Programs running against your consent:

Whitelisting (available on Windows, by the way, if you run domains... it's called Software Restrictions Policy). Task managers that cannot be overrode, and which INSTANTLY KILL PROCESSES WITHOUT GIVING THEM A CHANCE TO RESPOND. A single, solitary lists of programs that run at startup / specified times, that is definitive and none of this "Is it in all users? Is it a scheduled task? Does it run from the registry entries? Is it a service?" nonsense. You want a program to run other than when a user executes it? You need to be in the list, saying when - startup, every hour, all the time in the background, etc. - and then we ask the user about that, And, no, programs do NOT get to modify the list. And users can just delete your entry from that list at any time. P.S. One entry per executable.

Programs encrypting all your files:

Containerisation, overlay filesystems and copy-on-write to files they use (and why is your game trying to open your work email folder?) rather than just blanket filesystem access for everything. Permissioning stops this but nobody uses it properly. And why are programs given access to everything that isn't permissioned off by default? Literally, every program running as it's own user (application_program_name) who has ZERO ACCESS until it's granted. And No To All, or "Uninstall this application" on all related permission request dialogs.

Programs deleting data:

Shadow copies / snapshots. Why are they not enabled by default on all computers, and why are they deletable? Literally just set every machine to fill up its disk with "backups" and only remove them when there's no space left (and count them as "free space" in all statistics so users don't panic). The average user would be able to have months of automatic backups, literally every time the PC was turned on or logged into, rather than the occasional System Restore from when they last installed updates.

Programs running without your consent:

Stop the ability to replace task managers, etc. One-click kill of program (Task manager is inherently inferior to, say, Comodo KillSwitch or SysInternals Process Explorer in this regard, too.). A "kill and don't allow children to spawn" option, too. No hiding of program names. No running as "system". A safe mode that damn well works and isn't just a cut-down version of the exact same OS with the same system paths, programs isntalled, etc. Hell, what's wrong with a "System Maintenance Mode" in which you can install programs but not run them, and a "System Operation Mode" in which you can run installed programs but not install them?

Programs being difficult to remove:

One-click removal of entire container for each program. Every file, every setting, every hidden DLL, gone. Literally, nothing gets installed as a "program", they are all just containers that fake access via overlays and layers to make each program think it's installed in C:\OldProgram, accessing the main registry or whatever and actually it's just a mini-copy that gets overlaid. Windows registry pretty much already has this functionality. When you delete the container, all its effects - including startup entries and registry entries and filesystem modifications are gone.

We just don't know how to make an OS for the modern world where things aren't trusted. Even Linux makes you set up the above manually for the most part.

Rather than design a system that lets users run riot but makes administration almost impossible, and tells the users to never set a foot wrong, lets jump to the assumption that the user is an idiot and will do dangerous things all the time, and give them - and admins - a way to undo their actions and contain them. And give admins an easy way to stop anything they like. Literally "That's it, that's the list of programs I will allow. Nothing else can ever run.". Yes, we have bits and bobs of that functionality but it's NOWHERE NEAR the default.

Post-outage King's College London orders staff to never make their own backups

Lee D Silver badge

Agreed - you can go too far. But no restorable backup or independent architecture causing weeks of outage for a major university? You've not gone far enough, or you've gone too far in the wrong direction.

You "shaved probably a quarter of a million off their backup costs." by reducing the number of backups, ultimately. So long as the number of backups is still sufficient to withstand any reasonably-expected disaster, that's fine, and sensible, and practical.

But at the end of the day, backups and redundant servers, and redundant disks, and redundant storage, and redundant datacentres mean exactly what you would expect - paying for something that's probably never going to be called upon, to sit there and do nothing for most of its life, just in case you need it. And if the skill and time and effort and money invested in doing that is good, you'll quite possible literally NEVER need it.

However, that's not a reason to cull backups, or skimp on backup infrastructure, or get sloppy, or do things stupidly. Because that's the circumstance that logically leads to PRECISELY needing such things, and then they won't be in place.

It's like savings. The guy who carefully puts away a little here, a little there, constantly and doesn't touch it, probably doesn't need to worry even if he never gets to touch that money in his lifetime. But the guy who never puts away anything is only benefiting from his extra spending money until the first unexpected problem.

Lee D Silver badge

I specialise in working in schools that have experienced IT disasters, cleaning them up, restoring confidence in the system, proving it can run for a while (so I'm not just a fly-by-night merchant) and then moving to the next.

I've done it for about 17 years, just not on the scale of KCL.

There's good points all round here. Sure, you shouldn't be saving data which may come under the Data Protection Act on personal drives. That's a given.

But you've destroyed user confidence here. That counts for an awful lot. What you SHOULD be doing its running around with a bulk purchase of, say, small NAS devices (which will be perpetually useful to you when you recall them) if that's what people are doing. You desperately need storage? Here, have a 12Tb array - that we can secure, encrypt, restrict, recall, replicate and then copy off when we're sure the problem has gone away.

You've destroyed user confidence, and with it their obedience. Those are normally the points where someone like myself enters, as an unknown, and tries to enforce good policy while fixing the problem.

My mantra is "I don't lose data". I will happily demonstrate the number of levels, checks, replicas, backups, etc. that I take to prove that to people. I don't lose data. You deleted stuff from last week? Here it is. Last month? Here it is. Last year? Here it is. You might not be able to see it instantly, but we don't lose data. You need to drum that home.

But you HAVE lost data. And with the same IT people and the same equipment and the same suppliers you're trying to convince users that something has changed and will never happen again. That's an impossible task. Throw them a bone. You need to get back in their good books. I've already predicted that there should be a few pink slips up winging their way around the KCL internal mail, because this is just that serious. But you also need to throw them a bone, technically, to get them - and their confidence in your system - back.

Literally, say, "We will provide you with multiple independent places to store your data while we make sure everything is back - they are under our control, we can still control the data on them for legal purposes, but here you go. There's a working area. You can safely put your years of research and teachings on there because you yourself can see that it's several different places, each independent and under our (yours and ours) control."

It's expensive. It's huge. It's a big job. But if you want to restore confidence, it's a necessary step. Even "This network share is in The Strand, this one is in our other data center, they are independent, please feel free to copy to both". It's showing them that you care about their data (which is worth more than your job, I assure you), that you are letting them keep control of their data, but at the same time not encouraging hundreds of devices tucked under desks out of IT's - and therefore the Data Controllers - sight.

I've been at my current place 2.5 years. Not a bit of data lost. Despite lightning strikes (literally blowing up a network switch), server failures, power tripping even UPS (crossed-phases), etc. Their data is still there. All the data that existed when I started, plus everything they've made since.

My previous place, 5 years. Same. Took over a network that wasn't a network and then never lost a single byte of data. Was even asked to prove it at one point when a teacher claimed they'd "definitely" saved their old lesson plans - shadow copies twice-a-day going back months, backups going back years, replicas of those backups, and backup logs listing every file present.

It's a core, basic, principle of IT. You are the curators of the data. It's up to you to preserve it, because nobody else will, it's up to you to prove that, and to ensure it applies to everything, and to survive a disaster - flood, fire, lightning-strike, even (for KCL) a potential bombing -.and to not lose things.

But you lost it on a "routine" upgrade because you did not have backups in place sufficient to restore working order in good time. Literally a USB stick would have been better for most people. That's NOT running the IT properly, and hence why heads should roll.

But to then expect users to throw all their research into ONLY your same systems again straight after that - after a huge, catastrophic failure of that self same system that wiped them out for weeks without any hope of restoration or working replicas- is dumb.

Technically, ethically, personally, it's a dumb suggestion.

Provide them with some confidence and make them trust you again.

"Oh, you remember when we just accidentally lost all your children and couldn't find them for weeks? Well, we've changed nothing but you HAVE to give us your children again."

We do NOT lose data. If you lost data - or sufficiently timely access to data that it makes no difference that it wasn't a total loss - you are not part of us. Not part of IT.

IT do NOT lose data.

Virgin Media users report ongoing problems delivering legit emails. Again

Lee D Silver badge

I've just moved my workplace to their own email server. Bear in mind that we send no spam whatsoever, nothing that can even be construed as spam - it's a school.

We have previously exhausted:

1&1 Internet - We host our domains with them, but they are terrible for email, always in the blacklists, they never do anything to resolve it, not enough backup servers or whatever, so your mail ends up being refused by the other end half the time. They operate a "smarthost" that's just useless half the time.

Virgin Media - Despite having a leased line, the number of emails you can send is limited and setting up things like reverse IP so you can run a mailserver is just unnecessary manual and complicated. I gave up. We tried to go out from our Exchange server via this direct and it's no good as most stuff just gets refused or limited.

Our VDSL ISP (unnamed because they are helpful) - no good because that's only a backup line for us and shouldn't be our primary outgoing. Also their SMTP smarthost occasionally ends up on a blocklist. and is only contactable over their connection (not our leased line).

In the end, I purchased a dedicated server with a datacentre host and we just relay all our email through it - incoming and outgoing. It lets me greylist, filter, anti-spam before it ends up on our local network, but then just passes email through to our Exchange server. Outgoing server is "always up", we control our own reverse DNS, SPF, DKIM, etc., it's only our own fault if it's ever blacklisted (hint: It's not), can store-and-forward on our policy rather than some random host's, and keeps the performance hit of the hundreds of thousands of spam, etc. connections off the local network. We're also pretty sure that we're talking to the endpoint mail server direct and have TLS where it's possible, rather than relying on some third-party to deliver our mail.

And the backup if that goes wrong is to fall back to some of the above.

But sending email reliably is unnecessarily complicated and in desperate need of a redesign. I still see people's mailservers who don't understand simple things like "try-again-later" responses and drop email.

Firewalls snuffed by 'BlackNurse' Ping of Death attack

Lee D Silver badge

I had an external penetration test done on the school network that I manage.

One of the items (apart from "DON'T OFFER WEBMAIL!!!!!!", which was a little stupid) was that pings were enabled.

Okay, it was marked as "low risk" but I couldn't see what kind of risk results from having ping enabled. They gave me the "Oh, it lets you see if a system is online" junk - well... my port 25 is going to be open, as well as 80, 443, and a bunch of others for necessary services. Are you telling me that hackers run nmap without the -P0 option?

But the rest of the report was similarly junk as well (apparently, webmail could open me up to brute-force attacks - which I'd accept if they hadn't also said I wasn't vulnerable to such password-guessing attacks as I had an account lockout policy and suitable limiting - they still rated that as HIGH though), so I've basically ignored it. I read through it. I commented each line. I told my boss what junk it was. They agree. Game over.

But I'm not surprised that more esoteric ICMP packets are a problem if you program abysmally. At worst, though, it's a DoS. And that's not really in our scope to defend against. If we were to defend against all kinds of DoS, we'd spent millions and achieve very little.

The question is really why nobody has noticed sooner, and why an ICMP packet for "unreachable" sucks up so much resources. You don't want to block those ICMP packets, really, though. That's just papering over the cracks. You need a firmware that doesn't jam up on such simple things because unreachable packets are otherwise saving you from a lot of genuine clients retrying over and over with much bigger packets to try to make a connection that isn't being explicitly refused.

The Reg seeks online community manager

Lee D Silver badge

How about somebody to IPv6 your site and SSL at least your login?

Seems to me they'd be more use on a tech site than some guy posting the articles to Facebook and then posting Facebook comments to articles.

Mac administrators brace for big changes to Apple-powered fleets

Lee D Silver badge

As someone who manages Macs and hundreds of iPads and has Mac servers...

Any kind of useful administration tool is welcome.

MDM is a start, but it's bog-useless for anything compared to its rivals (Chromebook management is a breeze, iPad management is a pain in the arse and some things you JUST CANNOT MANAGE).

But Macs have next to nothing. Hodge-podge, this-and-that, scripted-together junk if you want to do anything vaguely interesting and authenticating against LDAP properly has only been available for a few years. Before that, it needed all kinds of Mac servers playing go-between.

I'd quite like Macs to just log you in (from any authenticated source), create a default profile, give the user mapped drives and printers, and configure settings to turn stuff on and off without having to jump through ENORMOUS hoops and then again for each time you deploy it. To do so takes approximately 10 times as long to set up from scratch as a Windows server to do the same for Windows clients.

What do you give a bear that wants to fork SSL? Whatever it wants!

Lee D Silver badge

Re: 20K+ 25K

Sure.

If you feel like waiting an hour for the first connection to a secure webpage (even if you could network the ZX Spectrum somehow to Ethernet - they only ever had the ZX Net thing that was rare and used only in schools).

Lee D Silver badge

Re: 25KB or RAM

Most of that 200Mb will be a setup program, .NET frameworks, taskbar utilities, multiple copies of the driver, etc. rather than an actual wifi driver though.

Same with print drivers. The actual printer driver is only 50Kb or less, which isn't bad when it's doing things like connecting to network printers, interpreting Postscript, offering booklet and folding, etc.

Bundle it via the HP utils, though, and you're installing 400Mb of junk to get it.

That said, when I program I'm always shocked by HOW LITTLE my programs take. On disk. In RAM. Even the processor usage. When I read the articles about how GTA V renders, I'm astounded - things like hundreds or thousands of buffers rendering simultaneously at 120fps to show the final image, it's amazing.

But when I program, I get tiny little compact things which barely approach a couple of meg even if I statically include all the libraries. And then I look in my ProgramFiles folder or my Steam folders and nearly have a heart attack at the sizes in there.

I get data sizes - they can be huge for things like 3D games. But code sizes? What the hell are we doing to make things this big? And the bigger they are, they more to go wrong and the slower they operate (or are you saying that that code is just never actually executed? Then it's data, get it out of the program).

IPv4 is OVER. Really. So quit relying on it in new protocols, sheesh

Lee D Silver badge

Good luck standardising exclusively on something that almost every home ISP on the planet cannot yet support.

Sure, that's not an excuse. But there's no point making a standard that - as a percentage of Internet users - most people cannot use, wouldn't buy, or couldn't care about.

I blame the rubbish about "IPv6 must use an address per device on your network", when you really DON'T care about internal networks of people past the single address they use to the connect via their NAT router. IPv6 and NAT co-operate 100%, but some idiots pulled that out of the bag, scared people, and now nobody will touch it without thinking they have to renumber every device on their network, that they all have to support IPv6 (which isn't going to happen for everything for a long time yet), and that everything you do must be rejigged for IPv6.

Rather than just getting an IPv6 address, slapping that into your gateway device, and done.

IPv6 is in DOCSIS, it's in the 4G standards, it works for DNS, email, all sorts. Datacentre and server hosts all support it. It's in every major OS since XP. But it's rarely used because - well, I can name precisely on ISP, who are very expensive and technical, who actually support and advertise IPv6.

BT don't on their network.

Virgin Media don't on their network.

Bye-bye 99% of users who would use those services, whether they know it or not.

So you have to put IPv4 compatibility in anyway, which just pushes adoption dates even further back.

P.S. The Reg - remember our rule? You can do an IPv6 story when you publish an AAAA record, even on a test website. If I've got them on my website, you should have them on yours if you're going to mock people for not using it.

McDonald's sues Italian city for $20m after being burger-blocked

Lee D Silver badge

Re: The real reason

Best sign I ever saw was in the Canary Islands:

We only serve English food!

- Pizza

- Burgers

- Curry

I couldn't tell if they were being deliberately obtuse or not, but they were certainly busy.

Lee D Silver badge

What makes you think its the abroad-tourists rather than the locals themselves and Italian "tourists" who just like McDonald's.

It's like you going to Big Ben and then being able to get a MacD's afterwards. It has little to do with outside tourists.

That said, unofficially, my numbers suggest taht Italy has less McDonald's per head than any other European country I've been to. My girlfriend's town in Italy, you have to drive for about 20 minutes to find one. But then, you have to drive for 30 minutes to find quite a lot of things there too.

And if people want to come to Italy and eat US food, how different is that to people who go to America and then order an Indian or pizza with their US friends? Mix and match. If it wasn't popular, people wouldn't buy it, and it would soon go broke. If it is popular, distasteful as you might find it, that's what people WANT to buy there.

Open-source Sesame! Alibaba promises super-size magic for Java

Lee D Silver badge

Re: I'd recommend...

No need.

Almost anything can be compiled to target the JavaVM, even C code.

Simon Tatham's Portable Puzzle Collection uses, for example, NestedVM to run under Java, even though it's written in pure C.

Tesla to charge for road trip 'leccy, promises it will cost less than petrol

Lee D Silver badge

Re: hint to Tesla owners

It does get me, the fuss had over electric cars as if they're something new, when I grew up in the 80's being woken by the sound of jingling bottles and an electric whine. And they were far from new even then.

Hint: If you have to subsidise free electricity for your users, and set up hundreds of roadside charging systems, and get them to install charging systems at home, and sell them replacement batteries, etc. maybe this tech isn't as profitable or renewable as anything since the 1960's milk floats first woke up spotty teenagers...

Apple drops dongle prices to make USB-C upgrade affordable

Lee D Silver badge

Question: Why is USB-C not backward compatible, or trivially backward-compatible (i.e. pins 1-4 correspond to USB-3, so you can buy the cheapest of cheap adaptors)?

Microsoft puts Windows Updates on a diet with 'differential downloads'

Lee D Silver badge

Final-bloody-ly.

The number of Windows and related updates that just pull, say, the WHOLE of the .NET Framework again, for a few small changes is ridiculous.

This is the kind of problem we should have solved back in the dial-up days, not just now.

Grab your code ASAP: Nitrous cloud IDE evaporates in two weeks

Lee D Silver badge

How hard is this?

Web-based, distributed, accessible-anywhere, software - good idea.

Third party in control of it - Atrocious, terrible, appalling idea for just this reason.

Do "cloud" in-house and on your own cloud-based servers or not at all. Don't sign up to third-party cloud services that you are then forever reliant on them operating in the same manner.

Capita STILL hasn't delivered usable Army recruitment IT system

Lee D Silver badge

Government - IT. Say no more.

Just look for the money sink, watch as nothing changes, and more money is thrown at it whereas if it were us mere peons organising something on that scale, we'd be in court on embezzlement charges and mismanagement of funds before it got close to these kinds of figures.

Honestly, why would it even cost one million, let alone these ridiculous figures? There isn't a piece of software on the planet that can justify costing more than one million (Oracle users excepted) without being one of those life-critical systems that's keeping people alive.

And then question why it's more than a bit of software installed on the usual machines they're already using, even if that's via a web-based interface.

Windows 10 market share stalls after free upgrade offer ends

Lee D Silver badge

Re: Genuine curiosity...

For NCSI? Same way as on any previous version of Windows. Registry or group policy (local included).

Devices and printer images? Same.

CEIP? Same.

Windows Update? Same, or at the firewall as always.

Just because there's not a nice GUI interface doesn't mean you can't disable it. And it doesn't mean it's alone in that among the THOUSANDS of hidden Windows settings for everything else. If you've ever deployed GPO, you'll be amazed how much stuff there is you can turn off that you can't do other ways, and how much even GPO doesn't cover so you have to make your own Administrative Template to do it.

How do you disable the accessibility button on the login screen, which can be used to make the login screen almost unreadable and most people won't be able to put it back? Like everything Windows, the "official" way isn't a one-click setting in control panel, just like all the things you mentioned.

But they're all still there in the Registry, in the same places, available on freeware tweak utilities, etc.

Did you know that you can't add a keyboard language if you disable Windows Search service? Try it.

It doesn't mean 10 is any worse in this regard than ANY OTHER VERSION. Windows 7/8 does not have a settings box anywhere but the registry for NCSI, for instance. And if you want to enforce that settings, you're not going to rely on remembering to click a box, you'll enforce settings via GPO, a tweaker utility, or a bunch of Regedit scripts.

Just because it's not one-click doesn't mean you can't do it if you want to.

Lee D Silver badge

Re: Genuine curiosity...

Windows 10 spying was proven to be nothing more than an overblown Reddit post about THE SAME DATA COLLECTION as every other version of Windows performs anyway.

Seriously, it collects nothing more than anything else ever did. If you're paranoid about 10 and not Vista, 7, or 8, then you're an idiot.

And if you're worried about data collection, that's why you use an external firewall rather than a piece of junky software running on the same machine that it's trying to protect.

If you genuinely don't want data getting out, don't let Windows talk out.

That means, if you haven't heard of ncsi.txt, then you have no idea what you're supposedly blocking or allowing out.

Hint: I use ncsi.txt as a primitive theft-talk-home method for machines under my control as you can configure where it talks home to.

Lee D Silver badge

"When we stop forcibly installing it on machines, sometimes against your will, we don't get as many installs of it!"?

Really?

I'm shocked.

There's a reason that a batch of WSUS updates on my server are blocked because I *have* seen it install, even in domain environments, necessitating a re-image to get rid of it properly. Despite all the claims, it does what it damn well likes, especially if there's a user around who might click on a button or two without watching (or even, working in schools, "just to see what would happen, Sir").

Stop foisting stuff on me, and make stuff that I choose to foist upon myself.

Especially as my Server licensing is now per-core for reasons I cannot fathom.

Apple fans using Chrome on alert for Mac malware

Lee D Silver badge

Glad it's not just me that picked up on that "astute" line.

From my experience, Mac users think they are invincible and don't even understand that opening unwarranted attachments is a dangerous thing on any OS.

I still hear the "don't get viruses on Mac / Linux" lines and I cannot resist correcting them. I'm a MASSIVE Linux fan. I hate Mac. But they are both general purpose operating systems that, along with Windows, have all kinds of vulnerabilities that can be exploited if any user is lax in how they manage incoming data.

It doesn't matter the patch-level, the OS revision or the OS type itself, they are all vulnerable. Thinking otherwise is like trying to convince yourself that just because you live in a nice area, or have a lock on your door, that you won't get burgled.

KCL out(r)age continues: Two weeks TITSUP, two weeks to go

Lee D Silver badge

Overthinking

Meanwhile, the problem could have been solved with a single off-site backup that wasn't reliant on fanciful de-dupe or whatever technology.

You know, like a copy of the VHDs of the virtual machines. Flung onto a cheap NAS, or - god forbid - a tape.

Even if it was just once-a-week, and not "The" backup method, you could have been up and running for most VMs in a matter of hours in such a circumstance.

But by being overly-complex, your recovery process is now an absolute nightmare involving stitching arrays back together and hoping your backups weren't corrupted and so on.

Two weeks is head-roll time, as far as I'm concerned. Sure, let them fix it. But be planning their replacement staff and prepping the pink slips.