Feeds:
Posts
Comments

Posts Tagged ‘sysadmin’

After a long negotiation process between my DNS provider and the registrar of the domain thieves, virtual.net is back where it has belonged since early 1993: with me.  Huzzah!

My advice, in retrospect, is that if your domain is hijacked, immediately file with ICANN, over the protests of your registrar if necessary.  Fortunately I got my domain back, but if the remote registrar had not finally given it back (after making my registrar send some kind of “we won’t sue you” papers), I’d have been SOL, as the ICANN waiting period for opening a case had already expired.

How did I eventually lose the domain?  My provider offers both secure and non-secure login pages, and I believe that I accidentally logged into a non-secure page while at a public wireless location.  At first we thought my email provider had been compromised, but we found nothing but my home network access in the logs, and no suspicious activity.  The fact that the thieves had to change the contact email to “inbox@greatdomains.com” to get the transfer key is further proof that they had no access to my email.

If your provider offers non-secure login pages, make a bookmark to their secure page and only use that bookmark for login, never surf there directly or use a sidebar login on a provider’s main page– unless it says “secure login”.  There’s really no excuse for offering non-secure logins in this age of ubiquitous wireless– I’ve mentioned to my provider that they’re a bad idea, we’ll see if they go away.  I was on my laptop, with a new hard drive, and I hadn’t pulled over my bookmarks yet, so I think that’s how I screwed up.

Advertisement

Read Full Post »

Over the past 6 years I’ve taught literally hundreds of sysadmins, network admins, and other IT professionals the fundamentals of a streamlined project management process that I call “Practical Project Management”. For the past 3 years, I’ve also taught “Project Troubleshooting”. All this time, the folks in the classes have said, “This is really great. You should put all this into a book!”

I’m very pleased to announce that, in partnership with the excellent folks at NoStarch Press, that’s exactly what is happening. We’ll be substantially expanding the material I’ve been teaching, as well as adding material on enhancements such as web-based PM tools and so-called “agile” and “lean” methodologies– which, oddly enough, bear a strong resemblance to what we already do! We’ll also be incorporating some of the great feedback I’ve gotten from my tutorial students over the years.

I’ll be putting out a call to senior colleagues early in the coming year for peer review of some of the chapters and topics. If you’re interested, please drop me a note. [Please include a brief CV or resume, if we’re not already well-acquainted.]

In the meantime, you can pick up a copy of TPOSANA for light reading over the holiday break!


The Practice of System and Network Administration, 2nd Edition (Limoncelli, Hogan, Chalup)

Read Full Post »

So here I am in Dallas TX, at the annual LISA conference for systems administrators. It’s been a great conference so far, even though I haven’t gotten out of the hotel since I arrived on Sunday evening. Heck, I haven’t gotten off the lobby/2nd/3rd floor zone!

I love it when I can do all my teaching early in a conference and then just relax and enjoy myself. I did two half-day sessions on Monday, and both went really well– interested and involved participants, and compliments afterwards. I started off with my tried and true favorite Practical Project Management, that I ‘ve been teaching and refining for several years now. I estimate that I’ve trained over 200 IS professionals in project management at this point, with typical class sizes of 45 – 50, and in one case, 89 or 90 attendees. This year we didn’t do the advanced class, Project Troubleshooting, although we had a great session of that in June at the Usenix Annual Technical Conference.

The afternoon tutorial was a fairly new class that I developed in 2005, Problem-Solving for IT Professionals. We had a really spirited class discussion, and I was pointed to a great resource after class, a book (and Wikipedia entry about the book) called How to Solve It: A New Aspect of Mathematical Method, by Gregor Polya. It has a set of rules for generalizing problems, and looks useful in building more problem-solving processes. In the class I teach generalized processes, which I hesitate to call “patterns” as they’re not sufficiently rigorously expressed yet, such as server-client interactions, and introduce modified process taskflow diagrams that aid in debugging. It’s possible to debug applications that you have never seen before if you have a strong understanding of fundamental patterns of design and interaction in computer applications and systems.

Right now I’m liveblogging from the Advanced Topics Workshop. I’d been a regular at this workshop since 1996, but had missed the last couple of years due to scheduling conflicts (read: being scheduled to teach!). We’ve had an exhilarating day of sharing experiences, technology to watch out for, and learning what we’ve all been up to for the past year or so. Tomorrow are the keynote speeches, a quick tour of the vendor exhibits, and a book signing session from 12:30pm – 2pm at the conference bookstore. Then it’s back on a plane, back home to Sunnyvale!

Read Full Post »

I’d been completely stumped earlier this year while attempting to try Second Life– the Mac client just “no va”, wouldn’t go, for me. I got an error suggesting that my DNS was busted and that I should try connecting to http://www.secondlife.com, and open a ticket if that didn’t work. How I was supposed to open said ticket if I had no IntarWebZ is left as a thought exercise, I suppose.

At any rate, after leaving it alone for the longest time, I was re-inspired to investigate this evening and found the problem. If I’d been a bit more Mac-savvy, I’d have found it long since– a good reminder that Mac OS is Not Unix, but something that Strongly Resembles Unix But With Quirks. Here is what I sent to the nice support folks at Second Life (who were quite helpful, but equally stumped along with me) this evening when I reopened the ticket:

I am reopening this so I can share the solution that I discovered with you. It turns out to be a very simple, yet very profound issue, and is easily diagnosed and corrected, so I want to be sure you add it to your solution base. It’s something to watch out for on folks running the Mac OS X client specifically.

Under Mac OS X, system applications, like Firefox, Safari, etc, use the built in resolver libraries. The Second Life client, like the nslookup utility, apparently is using classical DNS rather than the system libraries and using only /etc/resolv.conf to get information. The problem was that my /etc/resolv.conf file was no longer a link to /var/run/resolv.conf, and thsu was not supplying the correct information. This can happen for various reasons, including system updates, or booting without a network cable.

The symptom to identify this is if the person CAN get to http://www.secondlife.com from a browser, do ssh from a terminal/shell window, etc, but the Second Life client claims that there is a DNS error. This shows that the operating system is correctly doing name lookups via the built-in libraries, but that DNS is not correctly configured.

Diagnosis: Have the customer open up a terminal window and do “ls -l /etc/resolv.conf” and see if it is a symbolic link or a plain file. It should be a link to /var/run/resolv.conf.

Correction: If not, they should fix it: “sudo rm /etc/resolv.conf; sudo ln -s /var/run/resolv.conf /etc/resolv.conf”

If this does not resolve the problem, inspect the contents of /var/run/resolv.conf. If there is a problem with the network DHCP, there will not be any correct nameserver lines in the resolv.conf, and then that’s a client network problem not subject to quick fixes. 🙂

best regards,
Strata aka Maybear

See you online!

Read Full Post »


The Practice of System and Network Administration, 2nd Edition (Limoncelli, Hogan, Chalup)


Handbook of Network and System Administration

Read Full Post »

I’ve been on a grand unification quest to find all the duplicates and old versions and generally clean the heck up on my desktop Mac, in preparation for a clean full “reference” backup and then a Leopard upgrade. I’m hearing enough security kerfuffle about the new (dis)improved firewall on Leopard; that I’m feeling glad that I didn’t buy a copy yet. Some of the issues are less relevant to me than to some, as I have a gateway firewall on our local net.

I’m disappointed to hear that Apple may be taking some of the Unix magic out of the hands of us old fogies in the course of prettying up subsystems like the firewall manager. I wouldn’t want to see quite the level of bells, whistles, and occasional frag-grenades of, say, some of the Linux GUI sysadmin tools. The princple behind those tools, however, is one that Apple would do well to emulate: provide a graphical user interface to the actual scripts and command-line / config-file changes needed to accomplish a task. Rewriting the UI as a program of its own, intertwingled with the functionality, is bad compartmentalization and should be avoided.

Speaking of firewalls, they do only protect you from stuff that is coming IN to get you, not stuff that you helpfully download and that opens up connections OUT to wreak havoc or spew spam. The emergence of Mac-targeted web trojans; is something that neither Tiger nor Leopard will prevent. It’s another class of security problem entirely, the kind that comes in via the keyboard or the mouse– what ham radio old-timers used to call “a short between the headphones”.

What I do find helpful for dodging some bullets is a the NoScript plugin for Firefox, which lets you selectively approve or deny scripts running on web pages that you are browsing. There is even some ongoing work on preventing cross-site scripting via NoScript. I find it very handy. Still, caveat clickor and all that.

Read Full Post »

Doing some remedial reading on this summer’s Great Twitter
Scaling
Kerfuffle, found a great quote from Phil at Progressive Data Solutions, in his writeup on Railsconf:

“To me, this question is a “shark-attack” question. Sure, you could get attacked by a shark if you go swimming in the ocean, but you should probably worry about other things first, like rip-tides, water temperature, etc. If you ask me this question, I will usually respond with numbers. It’s hard to argue with concrete numbers, and that’s what the Joyent presentation did a good job with. If Twitter is getting 11,000 requests per second at peak, they need roughly 32 cores to handle the traffic. Is your app going to be getting 11,000 requests per second? How about 1000?”

Nice!

Read Full Post »

Here is a brief introduction to Patterns, and thoughts on IT pattern creation (PDF) presented at BayLISA in December of 1998, and, if memory serves, as a Works-in-Progress at LISA that year.

Read Full Post »

…though not for a number of friends. Still, I’m easily amused.

I HAS A AMAZON LISTING.

w00t!

Read Full Post »

Mac drop problem was thermal shock. Desk is no longer in kitchen/DR area, under cold HVAC, so basically can’t run iMac G5 when house ambient temp is 75-plus. #$%@!!

Cracking it open and blowing the dust bunnies out, of which there were very few, just cooled it enough so that it takes longer to fail.

Now it’s cooler. The mac is up, and staying up. So I’m trying to read my mail, and somebody sent me a video.

Somewhere along the way, I lost audio from browsers, eg, playing vids. Attempting to fix it via http://www.macfixitforums.com/showflat.php?Board=tiger&Number=772938 caused me to lose SYSTEM audio. Though GarageBand still can play audio.

I’ve been watching too much InuYasha. Have fierce and savage urge to attack, via keyboard, with battle-cry of “BLUUUUUETOOTH KEYCLICKS OF *CLRI ROOT NODE*!!!” If only the damn thing would just blow up. It would be SO worth it.

Read Full Post »

Older Posts »