How to Decorate Shoelaces

How to Decorate Shoelaces


How to Decorate Shoelaces

Posted:

There are a number of really great ways in which you can decorate your shoelaces depending on your preferences. Find out how to decorate shoelaces with help from a crafts expert with over fifteen years of experience in this free video clip.

How to Transfer Songs From a Flash Drive to iTunes

Posted:

Transferring songs from a flash drive to iTunes is something you can do in literally just a couple of seconds. Transfer songs from a flash drive to iTunes with help from an audio engineer with a degree in Audio Recording from California State Univers...

Equation for Measuring Sound

Posted:

So long as you know which equation you should be using, you can measure sound in a couple of moments. Find out about the equation for measuring sound with help from an experienced research scientist in this free video clip.

How to Present Headshots

Posted:

There are a few different ways in which you can present headshots depending on the situation and your preferences. Find out how to best present headshots with help from an experienced photographer in this free video clip.

How to Get Rid of Saltiness in Food

Posted:

There are a number of different ways in which you can get rid of the saltiness in food depending on your preferences. Get rid of saltiness in food with help from an experienced private chef in this free video clip.

How to Replace Door Sensors on Security Systems

How to Replace Door Sensors on Security Systems


How to Replace Door Sensors on Security Systems

Posted:

If a door sensor on your security system breaks down, it needs to be replaced as quickly as possible. Replace the door sensors on security systems with help from a co-founder and senior adviser at FrontPoint Security in this free video clip.

On Student Projects, Phoenix, and Improving Your IT Operations

On Student Projects, Phoenix, and Improving Your IT Operations


On Student Projects, Phoenix, and Improving Your IT Operations

Posted: 10 Jan 2013 06:55 PM PST

Back in about 1990 at Purdue University, I was approached by an eager undergrad who had recently come to Purdue. A mutual acquaintance (hi, Rob!) had recommended that the student connect with me for a project. We chatted for a bit and it wasn't clear exactly what he might be able to do. He had some experience coding, and was working in the campus computing center, but had no background in the more advanced topics in computing. Well, it just so happened that a few months earlier, my honeypot Sun workstation had recorded a very sophisticated (for the time) attack, which resulted in an altered shared library with a back door in place. The attack was stealthy, and the new library had the same dates, size and simple hash value as the original. (The attack was part of a larger series of attacks, and eventually documented in "At Large: The Strange Case of the World's Biggest Internet Invasion" (David H. Freedman, Charles C. Mann.) I had recently been studying message digest functions and had a hunch that they might provide better protection for systems than a simple ls -1 | diff comparison. However, I wanted to get some real sense about the lack of collision in the digests. So, I tasked the student with devising some tests to run many files through a version of the digest to see if there were any collisions. He wrote a program to generate some random files, and all seemed okay with them. I suggested he look for a different collection -- something larger. He took my advice a little too much to heart. It seems he had a part time job running backup jobs on the main shared instructional computers at the campus computing center. He decided to run the program over the entire file system to look for duplicates. Which he did one night after backups were complete. The next day (as I recall) he reported to me that there were no unexpected collisions over many hundreds of thousands of files. That was a good result! The bad result was that running his program over the file system had resulted in a change of the access time of every file on the system, so the backups the next evening vastly exceeded the existing tape archive and all the spares. This led directly to the student having a conversation with the director of the center, and thereafter, unemployment. I couldn't leave him in that position mid-semester so I found a little money and hired him as an assistant. I them put him to work coding up my idea, about how to use the message digests to detect changes and intrusions into a computing system. Over the next year, he would code up my design, and we would do repeated, modified "cleanroom" tests of his software. Only when they all passed, did we release the first version of Tripwire. That is how I met Gene Kim. Gene went on to grad school elsewhere, then a start-up, and finally got the idea to start the commercial version of Tripwire with Wyatt Starnes; Gene served as CTO, Wyatt as CEO. Their hard work, and that of hundreds others who have worked at the company over the years, has resulted in great success: the software has become one of the most widely used change detection/IDS systems in history, as well as inspiring many other products. Gene became more active in the security scene, and was especially intrigued with issues of configuration management, compliance, and overall system visibility and their connection to security and correctness. Over the years he spoke with thousands of customers and others in the industry, and heard both best-practice and horror stories involving integrity management, version control, and security. This led to projects, workshops, panel sessions, and eventually to his coauthorship of "Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps" (Gene Kim, Paul Love, George Spafford), and some other, related works. His passion for the topic only grew. He was involved in standards organizations, won several awards for his work, and even helped get the Bsides conferences. into a going concern. A few years ago, he left his position at Tripwire, to begin work on a book to better convey the principles he knew could make a huge difference in how IT is managed in organizations big and small. I read a rough draft of the book a little over a year ago (late 2011), It was a bit rough -- Gene is bright and enthusiastic, but was not quite to the level of J.K. Rowling or Stephen King. Still, it was clear that he had the framework of a reasonable narrative to present major points about good, bad, and excellent ways to manage IT operations, and how to transform them for the better. He then obtained input from a number of people (I think he ignored mine), added some co-authors, and performed a major rewrite of the book. The result is a much more readable and enjoyable story -- a cross between a case study and a detective novel, with a dash of H. P. Lovecraft and DevOps thrown in. The official launch date of the book, "The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win" (Gene Kim, Kevin Behr, George Spafford). is Tuesday, January 15, but you can preorder it before then on Amazon. The book is worth reading if you have a stake in operations at a business using IT. If you are a C-level executive, you should most definitely take time to read the book. Consultants, auditors, designers, educators...there are some concepts in there for everyone. But you don't have to take only my word for it -- see the effusive praise of tech luminaries who have read the book. So, Spaf sez, get a copy and see how you can transform your enterprise for the better. (Oh, and I have never met the George Spafford who is a coauthor of the book. We are undoubtedly distant cousins, especially given how uncommon the name is. That Gene would work with two different Spaffords over the years is one of those cosmic quirks Vonnegut might write about. But Gene isn't Vonnegut, either. So, as a semi postscript.... I've obviously known Gene for over 20 years, and am very fond of him, as well as happy for his continuing success. However, I have had a long history of kidding him, which he has taken with incredibly good nature. I am sure he's saving it all up to get me some day.... When Gene and his publicist asked if I could provide some quotes to use for his book, I wrote the first of the following. For some reason, this never made it onto the WWW site. So, they asked me again, and I wrote the second of the following -- which they also did not use. So, not to let a good review (or two) go to waste, I have included them here for you. But, despite the snark (who, me?) of these gag reviews, I definitely suggest you get a copy of the book and think about the ideas expressed therein. Gene and his coauthors have really produced a valuable, readable work that will inform -- and maybe scare -- anyone involved with organizational IT. Take 1: Based on my long experience in academia, I can say with conviction that this is truly a book, composed of an impressive collection of words, some of which exist in human languages. Although arranged in a largely random order, there are a few sentences that appear to have both verbs and nouns. I advise that you immediately buy several copies and send them to people -- especially people you don't like -- and know that your purchase is helping keep some out of the hands of the unwary and potentially innocent. Under no circumstances, however, should you read the book before driving or operating heavy machinery. This work should convince you that Gene Kim is a visionary (assuming that your definition of "vision" includes "drug-induced hallucination"). And if nothing else, it should convince others not to ask me for a book review. Take 2: I picked up this new book -- The Phoenix Project, by Gene Kim, et al. -- and could not put it down. You probably hear people say that about books in which they are engrossed. But I mean this literally: I happened to be reading it on my Kindle while repairing some holiday ornaments with superglue. You might say that the book stuck with me for a while. There are people who will tell you that Gene Kim is a great author and raconteur. Those people, of course, are either trapped in Mr. Kim's employ or they drink heavily. Actually, one of those conditions invariably leads to the other, along with uncontrollable weeping, and the anguished rending of garments. Notwithstanding that, Mr. Kim's latest assault on les belles-lettres does indeed prompt this reviewer to some praise: I have not had to charge my health spending account for a zolpidem refill since I received the advance copy of the book! (Although it may be why I now need risperidone.) I must warn you, gentle reader, that despite my steadfast sufferance in reading, I never encountered any mention of an actual Phoenix. I skipped ahead to the end, and there was no mention there, either. Neither did I notice any discussion of a massive conflagration nor of Arizona, either of which might have supported the reference to Phoenix. This is perhaps not so puzzling when one recollects that Mr. Kim's train of thought often careens off the rails with any random, transient manifestation corresponding to the meme "Ooh, a squirrel!" Rather, this work is more emblematic of a bus of thought, although it is the short bus, at that. Despite my personal trauma, I must declare the book as a fine yarn: not because it is unduly tangled (it is), but because my kitten batted it about for hours with evident joy usually limited to a skein of fine yarn. I have found over time it is wise not to argue with cats or women. Therefore, appease your inner cat and purchase a copy of the book. Gene Kim's court-appointed guardians will thank you. Probably. (Congratulations Gene, Kevin and George!)

How to Roll Up My Sleeve Like a Greaser

How to Roll Up My Sleeve Like a Greaser


How to Roll Up My Sleeve Like a Greaser

Posted:

Greasers are known for many things, including the really specific way in which they roll up their shirt sleeves. Roll up your sleeve like a greaser with help from a fashion professional in this free video clip.

How to Make Cantaloupe Ripen Faster

Posted:

Making cantaloupe ripen faster is something you can do by giving your fruit just a little bit of a boost. Make cantaloupe ripen faster with help from a farm to table chef in this free video clip.

Starting Up Apache & MySQL

Posted:

Staring up Apache and MySQL shouldn't take more than a few quick moments of your time. Learn about starting up Apache and MySQL with help from a graphic designer and Web developer in this free video clip.

How to Get Rid of the Sour Taste in My Stew

Posted:

You can get rid of the sour taste in your stew by making a few key adjustments to your recipe. Get rid of the sour taste in your stew with help from a chef instructor and executive pastry chef in this free video clip.

How to Print on Glossy Paper

Posted:

Printing on glossy paper always requires you to follow a few basic, easy to manage steps. Print on glossy paper with help from a photography professional in this free video clip.

How Do I Run Two Apps at Once in Windows 8?

Posted:

Running two apps at once in Windows 8 is very easy and can really help increase your productivity. Run two apps at once in Windows 8 with help from your friends at eHow Tech in this free video clip.

How Do I Get to the Control Panel in Windows 8?

Posted:

The Control Panel is a folder containing various applications that lets you adjust the way your computer operates. Get to the Control Panel in Windows 8 with help from your friends at eHow Tech in this free video clip.

How Do I Get to the Start Screen in Windows 8?

Posted:

You can get to the "Start" screen in Windows 8 with just a few key clicks of your mouse. Get to the "Start" screen in Windows 8 with help from your friends at eHow Tech in this free video clip.

How Do I Log In to Windows 8 Using a Picture Password?

Posted:

Logging in to Windows 8 using a picture password is a great way to bring a whole new level of security to your computer. Log in to Windows 8 using a picture password with help from your friends at eHow Tech in this free video clip.

How Do I Shut Down Windows 8?

Posted:

Shutting down your computer in Windows 8 is something you can do in just a couple of seconds. Find out how to shut down Windows 8 with help from your friends at eHow Tech in this free video clip.