- Well-meaning outsiders cannot be allowed to strip the country of its local capacity or ignore local knowledge.
- Local assets must be preserved, and
- Paternalistic foreign donor attitudes are best left at home.
2.05.2010
Rebuilding Haiti: Lessons from Katrina
Haiti Rewired
How to Connect Port-au-Prince with a Wireless Network
Inveneo has created a methodology for deploying long-distance wireless networks from our many years of work in Africa. So while Port-au-Prince presents it own set of logistical and communication challenges, we were able to install and manage a high-functioning network relatively quickly using these basic steps:
1. WiFi Network Design - make sure your nodes are visible to each other and pointing at the right location
2. Location Capacity Survey - confirming the location can support a network node
3. WiFi Hub Antenna Pointing - aiming the dish for the highest signal strength
4. Installation Trip Preparation - determining what you'll need before your 30ft up a tower
5. Node Antenna Setup - aiming and connecting the antenna
6. Disseminating Internet Access - networking locally for end-user access
7. Network Management - making sure everyone has equal access to bandwidth
If you've read this far, you'll want to read the full How to Deploy Long-Distance WiFi in Haiti primer and how we and our Certified ICT Partners can bring Internet access to rural and underserved communities in the developing world.
2.01.2010
Four predictions for networking in 2010
The IEEE committee has been working on two new standards expected to finalize in 2010 that I predict will force a similar change in our networking environment: IEEE 802.az and IEEE 802.3at. Under IEEE 802.az, an Ethernet link can sit in an idle state and turn itself on only when data needs to be transmitted -- rather than consume power without reason. Research from Berkeley National Laboratory reported using 1 Gb Ethernet cables capable of supporting the new standard would cut US energy bills alone by up to $250 million a year. Also, the IEEE 802.at standard will allow an increase in the amount of power that can be transmitted over Ethernet cables from 15.5 W to 25.5 W! This will allow a whole new class of products to be powered over standard Ethernet cables, for example wireless access points, desktop devices, etc.
Routing and switching
The most important routing and switching trend IT networking pros should ask about in 2010 is "How can I find the ways and means to provide unified physical infrastructure for my enterprise networks?" Routing a unified network infrastructure for your business will require you to provide transport for data, voice, and video over wired and wireless networks. IT professionals should also plan to have enough space for newer applications like RFID, physical security and intelligent building management systems. Another question that will pose a challenge to network designers and architects will be "How will I green networks and datacenters while keeping service levels the same?"
Cisco certification
"What is going on with Cisco's Security and Voice tracks?" is a question I predict IT networking pros will ask in 2010. They made some interesting changes to Cisco certifications in 2009, like their new Cisco Certified Architect program, and CCNA Voice and CCIE certifications. I hear Cisco is going to make some more radical changes again this year.
As another 2010 prediction, I suspect IT networking pros will ask about Cisco's new policy with Pearson VUE that requires Cisco certification candidates to take a picture when doing the exam. It might not be widely known yet, but I sure had my questions when I heard that!
Network project management
The most important question to ask in 2010 concerning network project management is "What will this do to other budgets or IT teams in the network?" Too often companies have made poor decisions based around a single product because it is the new "cool toy" on the block. Often these decisions have a very negative impact on other specialties that may or may not be involved in a particular project. It is really time for companies to stop letting the tail wag the dog when it comes to networking decisions.
A second 2010 prediction is that network project managers will ask "How much power am I using and how much do I really need?"
1.27.2010
iPad Hands On
The Wait is Over
9.7 inch iPad was released today at a 500 invite art studio full of techs, bloggers and the media. iPad uses same apps and iPhone, has 3G connectivity and it won't be on T-mobile.
Ubuntu One Installation Instructions- Cloud Computing
1.24.2010
San Francisco Airport Plans Free Wi-Fi
This is yet another surprise to this veteran watcher of airport Wi-Fi. The San Mateo County Times appears to have broken the news that the SFO airport authority wants to switch off the money flow when the current T-Mobile contract ends in February. The authority would try to keep T-Mobile as a managed services vendor for up to two years, but would tender a new request for bids for the airport's long-term wireless provider.
SFO would join Boston, which is finalizing its free decision; Seattle-Tacoma, which switched over this month; and potentially, Atlanta. Denver started offering free Internet access at the end of 2007.
SFO has competition in its area with two smaller airports: Oakland in the east bay and San Jose in the south bay; both of those airports switched to free Internet service in 2008.
Don't cry for the service providers who operate networks in these airports; that's primarily Boingo Wireless, which under the Concourse brand has the lion's share of airport operations; AT&T and T-Mobile operate most of the rest. Airports aren't inclined to run their own Wi-Fi networks, and thus providers may shift from the hassle and cost of collecting fees and splitting revenue to providing a fee for service, which is much more reliable income over the long haul.
1.21.2010
High-tech Product Releases
MOTOROI smartphone (also called the XT720) will introduce Korean users to a new set of Android
LG's first endeavor into the Android-powered mobile world is a touchscreen, social networking smartphone called the LG InTouch Max GW620. The phone boasts both QWERTY and touchscreen keyboards, a Social Networking Manager (called Linkbook), auto face-tagging photo features (that let you call, message or text your friends by touching their face in a photo), 5-megapixel camera for photos and videos, and a 3" touchscreen. The phone is available for free in the UK on a £20 (€23) per month two-year contract.
Powerful, high performance mobile notebook computers
Sony has launched a new series of VAIO Z notebook computers that are designed to be tough, ultra-light and portable. The high-performance laptops are crafted from carbon fiber and aluminium, weigh less than 1.45kg and have a full 13.1" (33.3cm) HD (1920 x1080) display. The VAIO Z series will be released at the end of March. No prices were given.
Eco-friendly designer External Hard Drives
Samsung has introduced a line of stylish "green" hard drives for the tech-savvy generation who want their gadgets to look good. The G Series includes 250GB, 320GB, 500GB, and 640GM versions in their G2 portable line and 1, 1.5 and 2 Terabyte models in their G3 Station range. The Hard Drives are designed to reduce energy consumption by more than 95 percent and go to sleep automatically after five minutes of inactivity. The hard drives will be available in mid-January. The 2TB 3G Station will cost $199.
1.20.2010
Cisco 5500 Series Wireless Controllers Optimizing Enterprise Video Over Wireless LAN
Can video delivered over a wireless networking connection be as good as video coming from a wired network? That's the challenge that networking giant Cisco (NASDAQ:CSCO) now is trying solve with new technology called VideoStream.
With VideoStream Cisco is aiming to enable enterprises to deliver HD quality video to multiple wireless end points. VideoStream is part of Cisco's overall Medianet strategy for delivering an architectural approach for networks that can handle all types of media and includes both wired and wireless connection points.
With the ratification of 802.11n, users have the bandwidth to do high speed data over wireless. The challenge that remains is that wireless is still a shared media, with one access point and multiple clients all contending for the same data and spectrum.
Functionally VideoStream includes a number of key components, among them is the ability to do reliable multicasting(define) which enables live broadcasting over an IP network. What Cisco has done is figure out a way to have video sent and error corrected from the wireless access point to the client endpoints at the highest wireless data rate available.
With stream prioritization technology, VideoStream provides users with another layer of wireless video quality control.
In one case there might be a special CEO video stream and on the other hand there could be a sporting event stream. With stream prioritization the network administrator can prioritize which stream should get more bandwidth for wireless delivery. Protecting video quality
Another element in VideoStream is something called – Resource Reservation Control.
As one of the main drivers behind the Cisco's video strategy, medianet builds upon the strengths of a pervasively deployed Cisco Unified Wireless Network solution with VideoStream technology. VideoStream technology leverages benefits delivered by a medianet and carries forward the rich service capabilities required for video like: traffic prioritization, protection, monitoring, and adaptability to deliver a scalable, high-performance, high-quality enterprise video experience over Wi-Fi.
The solution is that VideoStream understands how much total wireless bandwidth is available. If a request comes in from an endpoint and there isn't enough available bandwidth, the new request will get a video not available message, which will protect the quality for the users that are already receiving the video.
In order to help provide as much wireless bandwidth as possible, Cisco's VideoStream also has a method to improve wireless scalability for video delivery with packet replication.
Packet replication is not the same as how load balancing an application works for wired Web servers.
The VideoStream technology is part of Cisco's unified wireless software for all of their wireless controller products.
Yele Haiti
Founded by Grammy Award winner Haitian-born musician and producer Wyclef Jean, Yéle Haiti addresses problems concerning education, health, environment and community.
Donate $10 to the American Red Cross by using your cell phone to text "HAITI" to "90999"
Your cell phone bill will be charged
@technical I donated $15 to help relief in Haiti to www.yele.org 2:22 PM Jan 13th from web in reply to adriarichards
Please Donate to the relief effort in Haiti. They needs us now more than ever.
1.18.2010
Sing Celebrate - For A King Celebrate Dr. Martin Luther King, Jr.
Rheta Williams my mother and her family owned property in Louisiana, ran stores and were mostly teachers. They lived just on the other side of the Mississippi river where slavery was rampant.
I am grateful for all those who suffered, marched, and sacrificed for my freedom.
Today we honor the warriors who were the catalyst that brought about the dream of Martin Luther King, Jr.
Wireless LAN Accessories
Antenna Dimensions:
0.35 lbs Weight
0.99” Depth
7.875” Length
4.1” Width
FEATURES: • Efficient omni-directional diversity and MIMO performance. Provides excellent performance using 3 total 2.4 & 5Ghz elements in a single, low profile design.• Easy to install and mount to a recessed ceiling tile system.• Plenum rated cable can be installed in many indoor mounting locations, not just plenum areas.• Covers 2.4 to 2.5 GHz for 802.11b/g, and 4.9 to 6 GHz for 802.11a and all US, European, and Japanese WLAN applications• Coaxial cable pigtails with various connector choices
Wireless Broadband
Text "Haiti" to 90999 to donate to the Red Cross for Haiti relief. 100% of your $10 donation passes through.
The last time we looked at how to set up a wireless network, there were several qualifications, problems and caveats. Many new wireless devices simply didn't work properly out of the box - if at all - and Windows XP's wireless configuration boxes had the unfortunate habit of leading you round in circles.
All this is changing, though. And while the nature of radio waves is that you may occasionally suffer connection problems, things have moved apace in the last year. The advent of MIMO devices, which provide greater range and speed by using the radio waves that bounce off obstacles, is a huge step forward for the reliability of connections. And Windows XP Service Pack 2's much-improved wireless network support means there's really very little effort required to get yourself up and running.
There's one thing you should be aware of, though: security. You need to secure your new wireless network as soon as possible. The newest and safest encryption system, WPA, is a doddle to implement and extremely secure if you follow our walkthrough and setup tips. The word 'encryption' puts people off because it sounds complicated, but it's vital to secure your network from people leeching your connection, stealing your bandwidth and potentially gaining access to everything on your PC. An unsecured wireless connection is the equivalent of an open front door - it's a direct route to everything on your hard disk.
THE ESSENTIALS
While networking has become easier since the launch of Windows XP and its more or less self-configuring network connections, it can still be a topic couched in obscure jargon, which it's worth getting a passing knowledge of.
Routers
When people talk about wireless routers these days, they're talking about a wireless access point and router combined. The access point part allows your wireless PCs and devices to connect together; the router part allows those wireless devices to talk to wired devices and, crucially, gain access to your broadband connection. If your broadband is ADSL, you'll need a wireless ADSL router; if you have a Telewest or ntl subscription, which came with a cable modem featuring an Ethernet output, you need a wireless cable/DSL router. You can also get away with a cable/DSL router if your ADSL modem has an Ethernet port. There's some confusing terminology surrounding products too. Wireless routers are sometimes referred to as wireless gateways, switches or hubs - they're the same thing mostly.
Ethernet
Practically every PC motherboard these days has an Ethernet networking port with a maximum speed of 100Mb/sec (Fast Ethernet) or 1,000Mb/sec (Gigabit Ethernet). A wireless router will usually sport five Ethernet ports: one for the WAN (wide area network) connection, which connects to your cable or DSL modem supplied by your broadband ISP, and four for the LAN (local area network) side. You don't need to use these if you're going for a purely wireless setup, but they allow you to connect wired devices for one unified network, and it's useful to be able to connect with a wired connection for initial setup of your wireless security.
Network addresses
All modern networks, from your home LAN up to the Internet, now use the TCP/IP (Transfer Control Protocol/Internet Protocol) system to communicate; it's almost made all other network protocols obsolete. TCP/IP is a packet-switched networking system. This means data is divided up and sent from transmitter to receiver in small chunks. These packets of information can travel via different routes around the network and need to be routed to the correct destination. This is why the single most important concept in a TCP/IP network is the IP address. Every network adaptor - wired or wireless - on a network must be assigned a unique IP address for that network, so that data packets can find their way to the correct destination. Without exception, all wireless routers will by default handle that automatically via DHCP (dynamic host configuration protocol). The DHCP server in the router doles out an IP address to every wireless PC or device that tries to connect to it.
Gateways and DNS servers
As well as giving a wireless device an IP address, it also informs the device of three important bits of information it needs to communicate: the address of a gateway, the address of a DNS server and a subnet mask. The first two allow the device to communicate with the Net. A gateway is simply the IP address of the device that can route data to and from an external network; in the case of a home router, that external network is the Internet. So in the majority of cases, the gateway address is in fact the router's own IP address; it then acts as a broker, forwarding requests for web pages back and forth via a process known as NAT (network address translation).
A DNS (domain name system) server is one that a PC uses to translate 'friendly' web addresses (www.pcpro.co.uk, for example) into numerical IP addresses by which it can request web pages. The subnet mask is often the cause of confusion; it's a way of separating network subsegments. You don't need to worry about it, however - it's only of relevance to corporate-scale networks and doesn't impinge on getting your wireless network up and running.
Incidentally, NAT also acts as a safeguard in conjunction with any hardware firewall the router may have, since it means that external PCs on the Net can't get direct access to any given PC on your internal wireless network. This is in contrast to USB modems commonly supplied by ISPs, which place your PC onto the Internet directly and are an invitation to hackers.
Mac address
A second type of address you'll probably encounter is known as the MAC (media access control) address. Every standard Ethernet network device, including Wi-Fi access points and adaptors, has a unique hardware MAC address assigned to it at manufacture. For the end user, this is useful, because it allows MAC address-based security to restrict access to a wireless network.
NEW TECHNOLOGY
In the beginning - at least as far as consumers and small businesses were concerned - there was 802.11b, the first popularly adopted Wi-Fi standard. It offers a maximum theoretical throughput of 11Mb/sec, but in practice you're highly unlikely to achieve anything exceeding 5Mb/sec. Then came 802.11g to give a maximum theoretical throughput of 54Mb/sec, but again it's near impossible to achieve even a third of that in practice. But that isn't the only problem - variations in positioning and range make an enormous and unpredictable difference in the speed and reliability of both 11b and 11g wireless networks. This is particularly true in Europe as opposed to the US, where houses tend to be made of wood with thinner walls more easily penetrated by radio waves. Put joists, metal-reinforced concrete and so forth in its way and the results are unpredictable.
The standard issue
The solution may well lie in MIMO (multiple input, multiple output) technology. This forms part of the as-yet unratified standard 802.11n, which is set to replace 11b and 11g. MIMO splits one incoming data stream into multiple lower-rate streams, transmitting simultaneously via two or more aerials on the same channel. It improves both range and transmission speed by relying on a phenomenon known as multipath, where signals arrive at different times because of reflections. That's usually considered a problem, but here it effectively creates virtual radio channels along which more than one stream of data can be fed on the same frequency. Receiving the differing signals on multiple aerials, the two data streams can be reconstructed. Current WLAN MIMO technology has a maximum theoretical speed of 108Mb/sec - twice as fast as 802.11g and more than enough to cater for multiple users streaming multi-media files around a large house. MIMO offers higher speeds over longer range than conventional WLAN, so you'll be able to connect from further away without needing to spend extra on wireless bridges or repeaters.
You'll need to spend more on the router itself, though. Not just because a pre-N router such as the Belkin costs around £75 to the £40 of a typical 802.11g router, but because you'll also need to buy matching PC Cards (or USB adaptors) to upgrade the wireless radios in your notebook or PC.
Apart from the inevitably high cost of buying a new technology, the chief drawback of MIMO is that until it's ratified by the IEEE the way in which it's implemented by manufacturers will be proprietary. This means there's no guarantee MIMO products from different manufacturers will work together at 108Mb/sec; it's more likely that everything will slow to standard 802.11g speeds. But having been using MIMO products - in particular, Belkin's Pre-N router and network card - for the last couple of months, we're big fans of the technology. Range and, more importantly, reliability of the connection are hugely improved.
Transfer big files, fast
Four months ago, we tested 15 wireless routers in a group test and saw clearly the benefits of MIMO technology over standard 802.11g. Although the MIMO-based routers were generally faster than 802.11g routers at close range, the real difference came when we moved our test notebook further away from the router: while many routers struggled to make a connection, the MIMO routers kept transferring at 9Mb/sec. At close range, the Belkin hit almost 17Mb/sec, so even a 100MB file transferred in less than a minute. We've included the full group test on the cover disc this month (click on the Editorial tab).
Streaming DVDs
Media streaming is one of the big selling points of home wireless networking; devices such as the Sonos Digital Music System spread audio around the house. The bandwidth demands of streaming MP3 audio are pretty modest; the standard data rate is just 128Kb/sec (or, to put it another way, less than 0.2Mb/sec). But video is a different matter, and high-quality DVD- Video in MPEG2 format is different again.
There are various systems and proprietary setups on the market that claim to transmit video over a standard 802.11g connection, and this they certainly do. What they can't do, however, is transmit DVD- Video in its original form without reducing its quality or its resolution. There are no magic solutions to the problem of bandwidth - a system either has enough for a given application or it must strip out some information in order to transmit a given data stream. The minimum bit rate for DVD-Video is 4Mb/sec and can extend up to almost 10Mb/sec for short, high-quality movies. This is only the bitrate required for the raw data - transmitting it over the network adds the significant data overhead of network communication protocols and error correction.
Despite the claims of many 802.11g products of 'turbo' modes giving more than 100Mb/sec, we've yet to encounter an 11g product fast enough to stream raw DVDs simply by sharing the DVD-ROM drive in Windows over the network. With MIMO, though, it's a different story. We've had a lot of success using Belkin's Pre-N router and accompanying network card to stream DVDs flawlessly from one PC to another - simply by sharing the DVD drive using standard Windows file sharing - at a separation of about 10m, with a partition wall in line of sight. The trouble is, there still isn't enough spare bandwidth available to be able to guarantee this will work for you, so buying a Pre-N setup purely to stream DVDs might result in disappointment.
SECURITY
As we've already pointed out, you must secure your wireless network as soon as possible after getting it up and running. There are three aspects to wireless security. In order of importance, these are encryption, stealth and access restriction.
Encryption
Encryption is the most important simply because if you use encryption properly the other two are unlikely to matter - your network should be safe from abuse.
There are two standards for encryption over Wi-Fi: WEP (wired equivalent protocol) and WPA (Wi-Fi protected access). WEP is the older of the two, and WPA has come about because WEP simply isn't secure enough. A fundamental flaw in its implementation - to do with the way it appends an extra section on the end of your chosen encryption key - means that over a moderately busy network a snooper can break WEP in a matter of hours.
Until recently, using WPA instead of WEP wasn't easy, since many devices didn't support it, plus comprehensive built-in Windows XP support only came with Service Pack 2. But that's changed now, and we'd advise anyone using WEP to change to WPA immediately. It's easier to set up too; whereas WEP needs a specific-length, impossible-to-remember hexadecimal key, WPA generates its keys from a password that can be anything from eight to 64 characters in length, using any normal characters including spaces. You can generate a long but easy-to-remember passphrase, simplifying things if you're setting up several PCs with wireless connections.
Remember that any encryption system is only as good as its passwords, and that applies equally to WPA. Short or easy-to-guess passphrases are a gift to hackers so, unlike a PIN, a four-digit number is basically useless. A hacker has no limit to the number of passphrases he can try, so yours has to be long and obscure enough that an automated passphrase generator won't guess it.
As well as short numbers, certain things you might think are clever should also be avoided. So, for instance, you might think 'darthvader' is a good one, but in fact every hacker has a dictionary list containing millions of well-known passwords like that. So, 'wallaceandgromit' is out, as is 'frodobaggins'.
Instead, you want a couple of random words, some numbers and some odd characters. For instance, 'cheese672 badger123?' is strong and highly unlikely to be broken by a dictionary attack. A unique sentence - not a well-known quote like 'Ross has a boiler in the living room' - is good too.
Stealth
By default, all access points come pre-configured with a standard name known as an SSID (service set identifier), which the access point merrily broadcasts to all and sundry, allowing clients to see that there's an access point to connect to. This is very useful in Starbucks, but the last thing you want in your home setup. So you should do two things: first, change the default SSID; and second, hide it by instructing the router not to broadcast its presence.
This makes it much more difficult for anyone to find and start attacking your setup. It's as easy as pie and simply requires you to think of a name and check the 'hide SSID' option, which your router will invariably have in its web-based configuration.
Access restriction
This is the most tedious aspect of wireless security to set up, but if you're paranoid MAC-address-based access control is one more obstacle in the path of a determined hacker. As we mentioned earlier, every Ethernet device has a unique MAC address which is unique for that device. By setting up a table of the MAC addresses of your wireless devices in the router, you can restrict access to only those devices - any device with an unknown MAC address will be refused a connection. The drawback is that you have to manually enter the MAC address of every device you want to connect, but that's only a problem if you frequently have new hardware or you want guest devices to connect to your network with the minimum of fuss. Some routers also allow you to flip this idea on its head and specifically deny access to MAC addresses you specify and allow all others. This can be useful if you suspect a particular PC on your network has been infected by a virus - by specifically denying it access to the wireless network until you're sure the infection has been cleaned, you reduce the risk of the virus spreading without having to physically remove the wireless adaptor.
Detecting unauthorised access
If you suspect someone's stealing your bandwidth by connecting without your consent, it can be difficult to verify. The best thing to do is go into your router's web-based configuration system and check the client DHCP list. This is the list of network adaptors currently assigned an address on the router. If you're using only one computer (or, more specifically, one network adaptor), there should be only one IP address listed, and it should correspond to the host name and MAC address of your PC. If there's more than one and you haven't forgotten about any other wireless devices you have, such as printers or media-streaming audio gadgets, someone else is probably connected.
Looking at the DHCP list isn't foolproof, though: if the person stealing your bandwidth has had the presence of mind to manually configure an IP address it won't show up in the DHCP list. But many routers also have a log-file feature, some of which show all clients making a connection - this should be foolproof if you can be bothered to wade through it. If it does seem that someone's piggybacking, note the MAC address and block it, then change your SSID and encryption keys, and also change to WPA if you're using only WEP.
Don't get too paranoid, though: if you've followed these instructions and WPA is properly set up, there's little chance of anyone breaking into your system. Enjoy your wireless freedom.
1.15.2010
Ubuntu Security
If you are coming from a Windows background you are used to terms like antivirus, spyware, and firewalls. Linux is different and these are not as important.
Viruses
The fact of the matter is: viruses/worms take advantage of flaws or holes in the code. There are no significant Linux viruses "in the wild". Linux boxes are no less targets than any other OS.
Do not believe the suggestion that the Linux community is complacent or "behind the times" in terms of viruses, or any other security issue. Linux developers have not "ignored" viruses, rather the OS is built to be highly resistant to them and since the code is "Open" there are literally thousands of eyes watching .
For the most part, Linux anti-virus programs scan for Windows viruses which do not run on Linux.
Reasons AGAINST antivirus on Ubuntu:
- They scan primarily for Windows viruses.
- There is a high rate of false positives.
- Isolation/inoculation is poor.
- And currently there are no known active Linux viruses (so there is essentially nothing to detect).
Reasons FOR antivirus on Ubuntu:
- You are running a file or mail server with Windows clients.
- You wish to scan files before transferring them, by email, flash drive, etc., to a Windows machine.
Running antivirus can make some sense if you are intending to "protect" Windows users, however, for a variety of reasons, it is best if Windows users learn to protect themselves.
Note: There have been many documented cases in Windows and Linux that a buffer overflow in an antivirus product has been an attack vector!
If you would like to run an antivirus program on Ubuntu you have several choices :
- Antivirus
- ClamAV
- http://www.avast.com/eng/avast-for-l...rkstation.html
- http://www.pandasoftware.com/download/linux.htm
- http://www.centralcommand.com/linux_server.html
- http://www.f-prot.com/products/home_use/linux/
Comments on wine
Discussions about running Windows viruses on wine crop up from time to time and it is possible to run some Windows viruses on wine.
See these links :
Take the same precautions with wine as you would with Windows. Do not install untrusted applications from untrusted sources.
Windows viruses will be confined to ~/.wine and they do not have permission to change system files. This means to remove them you simply:
rm -rf ~/.wine
You then need to restore your wine directory from a known good backup (you do keep backups ?).
Firewall
GUFW (gui)
UFW - Desktops
UFW - Servers
Ubuntu includes a firewall, iptables, but by default nothing is engaged. This is reasonable as a default Ubuntu install opens zero ports to the outside world, so a firewall is redundant. However, installing "server software" will cause ports to open, so some people like to use a firewall as a catch-all layer to find mistakes in their configuration.
Another use for firewalls is for the administrator to forcibly impose network policies on the user.Also, a periodic audit of the system for open ports is a good practice. Running the "nmap" command from another machine, or using one of many online port scanners:
http://nmap-online.com/
https://www.grc.com/x/ne.dll?bh0bkyd2
Remember, what you care about are open ports. Closed ports and stealth ports are equally secure, in that they are inaccessible to the public.
Iptables references :
The "problem" with iptables is that it is not particularly friendly to new users. Fortunately, there are several more user friendly interfaces available to allow you to manipulate your firewall (UFW, Firestarter, and Guarddog) :
- UFW (Uncomplicated Firewall) is the newest tool. It is a command line tool and is, superior to the gui tools.
- To Configure iptables , UFW uses both configuration files /etc/default/ufw and /etc/ufw/before.rules and the command line. Howto: Use, setup, and Take advantage of the New Ubuntu Uncomplicated Firewall UFW
- If you prefer a GUI tool, gufw is a graphical front end for ufw.
- Firestarter is one of the most popular GUI front ends.
How to Firestarter
- Guard dog uses the KDE libraries.
Guarddog Online Guide
A source of confusion sometimes occurs when users feel the need to be running firestarter/Guarddog for their firewall to be active. This is untrue ! Keep in mind that these applications are not firewalls, but rather configuration tools for ip tables. These applications should be run only to configure your firewall. Once configured, IP tables (the actual firewall) is active (at boot) without having to run firestarter/guarddog. firestarter will monitor traffic, but it runs as root and there are better monitoring programs, so configure you firewall, shut down firestarter/grauddog, and let IP tables do the rest
Browser / Spyware : Java/Flash/Ad-ware/Trackers/Cookies
This is where most users will have the most risk.
We all want Java/Flash, but our Internet browser opens us to attacks.
- Deny all cookies and add trusted sites, allowing only for session.
- Install NoScript. Again block all and add trusted sites to a white list.
- Install Safe History
- Adblocking : I block with a hosts file rather then Adblock Plus or Adblock Filterset.G because a hosts file protects more then just firefox.
- http://www.mvps.org/winhelp2002/hosts.htm
- Linux script : http://hostsfile.mine.nu/downloads/updatehosts.sh.txt
Permissions and Encryption
The first layer of defense is file permissions. Permissions are used to set access and thus protect both system and user files.
Basic permissions
FilePermissions
See also umask at the bottom of that link. The umask value can be set in ~/.bashrc.
To set a "private home", as a user,
chmod 700 $HOME
How to's:
Running Server(s)
Common servers include NFS, Samba, FTP, SSH, VNC, RDP, and HTTP. Desktops become Servers if server software is installed.
Questions to ask yourself include:
- What port(s) or services does this software provide?
- Who will be able to connect to this? (i.e. is it restricted to a range of IP addresses Password protected?)
- What level of access will the visitor have to the system? (i.e. does the server run under a restricted user, or the root account? What can this restricted user do in a worst case scenario?)
- Does this service expose any additional information that's useful to a hacker? (i.e. does it allow users to transmit their passwords in cleartext? Does it have a 'statistics' view that reveals logged-in users, ip addresses, network configuration, or other potentially helpful information?)
- What is the security history of this software? Does it have a history of vulnerability and patch after patch? Or has it had a relatively unmarred history?
Examples :
SSH
VNC
Apache
What to do when you think you have been cracked :
- Power off.
- Disconnect/disable your Internet connectivity.
- Now take a deep breath, re-boot, and read the logs. Ask for help if needed, but you really need to confirm that your system has been compromised.
- If you have been compromised, and have the time and interest, boot a live CD and image your hard drive. This image can then be used for forensic analysis.
- Re-install. Unfortunately, there is no way to trust a compromised system.
- When you install, be sure to install off line, use a stronger password, and research intrusion detection.
Intrusion References
CERT® Coordination Center (CERT/CC)
CERT® Coordination Center ~ Intruder Detection Checklist
My goodness ...
Further Reading:
Ubuntu wiki ~ Security page
Ubuntu wiki ~ Installing Security Tools
UDSF Security Analysis Tools
The Big Ol' Ubuntu Security Resource
Locking Down Ubuntu
Ubuntu geek ~ Security category
Security references Topics include Basics, firewall, Intrusion detection, Chroot, Forensics/Recovery, and Securing networked services.
Changing poison into medicine,
Nam-myoho-renge-kyo

A person with ubuntu is open and available to others, affirming of others, does not feel threatened that others are able and good, for he or she has a proper self-assurance that comes from knowing that he or she belongs in a greater whole and is diminished when others are humiliated or diminished, when others are tortured or oppressed. ~ Archbishop Desmond Tutu, 1999
1.14.2010
1.13.2010
Haiti's Other Earthquake
Haiti holds a romantic and tragic place in the historical imagination -- a nation birthed by a successful slave rebellion, it was the first to abolish slavery in the Western hemisphere and briefly served as a beacon of hope for American abolitionists. However, it never realized its promise, for reasons that scholars and analysts can debate ad infinitum.
Perhaps most egregiously, its grinding poverty is so pervasive that an estimated 300,000 children have been given up by their parents to become restavèks -- a creole term for children sent to become house servants to wealthier Haitians. According to human rights workers and survivors of the child-slavery system, these children are forced to work long hours, are often kept out of school, are barely fed and clothed, and are routinely abused physically, emotionally and sexually.
Now, professional recruiters have made the situation even worse by making a business out of the longstanding informal practice. Last June, a United Nations expert on contemporary forms of slavery, Gulnara Shahinian, visited Haiti at the invitation of the government and issued a report that included the recommendations summarized below:
Since it is still struggling to recover from devastating storms in 2008 and will now be focusing effort on earthquake rescue, relief and repair, it's not likely that Haiti will have the resources to enact the reforms advocated by the UN, so private efforts such as Cadet's take on greater significance. Other high-profile philanthropic efforts include Haitian American musician Wyclef Jean's Yele Foundation. In 2008, Jean spoke to Al Jazeerah about his efforts to combat Haiti's food crisis:
Jean also sprang into action about the earthquake via Twitter,tweeting a way to contribute to the relief effort via text message.
Jean's efforts to combat poverty in Haiti are complemented by the work of other philanthropists, including former Pres. Bill Clinton, who serves as the UN special envoy to Haiti. He toured the island in March, 2009 with UN Secretary Ban Ki-Moon to survey efforts by his foundation and other organizations to expand education and nutrition programs. Clinton has been upbeat about Haiti's future, saying it...
"...offers unique opportunities for public and private investment to improve health and education in ways that will be good for Haitians and all their partners in our interdependent world."
Now that the earthquake has delivered to the country what Mr. Ban has called "catastrophic" and Haitian President Rene Preval has called "unimaginable," considerably more effort will be required to ensure that those investments are made and the benefits trickle down to the poorest Haitians so that they will be able to feed and care for their own children. Ultimately, only economic development and sustained human rights activism will finally allow the island to realize the dream that its founders fought so desperately to achieve more than 200 years ago.
How to help - Haiti- Charitable Organizations
A list of charitable organizations active in the nation
The U.S. State

1.12.2010
Toshiba Satellite E205 with Intel 802.11n Wireless Display Technology
The E205 will be available for $999 on Best Buy’s site on January 12, (TODAY) and will appear in retail stores several days later.
1.11.2010
Wi-Fi Alliance
Wi-Fi Alliance Certification Programs address: Wi-Fi products based on IEEE radio standards 802.11a/b/g/n Wi-Fi Protected Access certification , wireless network security(WPA, WPA2 and WPS for personal and enterprise deployments), authentication mechanisms used to validate the identity of network devices (EAP), and support for multimedia content over Wi-Fi networks (WMM and WMM Power Save. (WPS) Wi-Fi Protected Setup certification.
1.10.2010
802.11n is Ratified - Cisco Celebrates with New Lower Prices
Cisco is leading the market transition toward 802.11n and for a limited time only, we're offering an exclusive deal that removes the barriers to adoption of the industry's most powerful wireless technology.
Take advantage of the 11n Acceleration Kit, which includes:
- The Cisco Aironet 1140 Series Access Point at a significantly reduced price
- Up to 10 percent trade-in credits for your existing wireless gear
- Attractive financing options including no payments or interest for three months*
- Try-before-you buy programs*
- Even greater savings when bundled with Cisco 5500 Series Wireless LAN controller, designed for 802.11n performance**
- Plus, you can get expert help with wireless migration services from Cisco and our partners.
Set your ideas in motion with Cisco 802.11n and start saving today.
https://sales.liveperson.net/hc/74453203/?cmd=file&file=visitorWantsToChat&site=74453203&forceOffline=true&SESSIONVAR!OfflineTrigger=OFFLINEOUTCOME&referrer=%28button%20dynamic-button:chat-wireless-sales-english-wireless_offer1-copy%28802.11n%20Is%20Ratified%20-%20Cisco%20Celebrates%20with%20New%20Lower%20Prices!%29%29%20http://www.cisco.com/web/offers/wireless/80211n/11naccelkit.html
» Learn more about Scalable Wireless Performance
Accelerate your adoption of 802.11n technology by taking advantage of this exclusive deal.
"Celebrate"
11n Acceleration Kit promotion.

1.09.2010
Wireless Networking
Remember back in the day when we had a brick Motorola cellular phone. My mom had one in the car so she could call me to come pick her up from the post office. Anyone over 29 will remember.

army with a green brick phone at my disposal during field exercises.
I also remember thinking this cell phone is eventually going to replace my home phone. In 2001 I reduced my home plan down to (no kidding) $23.00 dollars a month basic service and used my cell phone as my house phone. I should have invested in stocks. Motorola stock went up and like most people I never saw that coming.
Like cell phones just about everything connected to a network will eventually be wireless. It won't be long before network servers and high throughput devices go wireless.
We are seeing devices that transmit Hi-Def TV and DVD signal from AV receiver to a monitor. Wireless networking technology has changed the face of enterprise, small-to-medium, and SOHO Biz and personal networking.
brings to Information Technology careers.
Administrator-CWNA certification is the first step in the Certified Wireless
Network Professional-CWNP line of certifications and is focused on
administering an enterprise 802.11 WLAN. CWNA includes topics such as
802.11 standards, security, management, protocol analysis, QoS, site
surveying, and radio frequency.
- Frequency Range: 9kHz~2.7GHz
- Input Range: -100dBm~+20dBm
- Average Noise Floor: -130dBm/Hz
- Power Measurements: ACPR/OCBW/CH Power
- Split Window: Simultaneous Measurements in Two Separate Frequency Spans
1.03.2010
Nook e-reader gains new appeal as 'rooted' wireless tablet
Nook devotees, including wants the Nook despite negative reviews, mainly because it has many features not always available on competing devices including Wi-Fi, a replaceable battery, the open Android OS, and one that reads the ePub format.