Tips & Traps


Recently one of the companies I work with, and another I have done work with in the past were hacked. A few years ago my father's computer was hacked in the same way. Each of these attacks involved "ransomware."

What is ransomware and how does it work?
Ransomware is exactly as it sounds, your computer system gets hijacked, the data gets encrypted and your system is not usable until you pay the ransom to get it un-encrypted. Usually the ransom is paid in a digital currency, usually BitCoin.
Here's how it usually works:

PAE Architectures

This is more of miscellaneous information rather then a tip or a trap.
I had a conversation with a colleague about 32-bit architecture v. 64-bit and the performance hit. His position was that 32/64-bit really didn't matter, that Microsoft Enterprise 32-bit architecture allowed "lots of RAM." My position was one of,there is still a hit that the OS takes when memory is above 4GB.

2008 R2 Clustering with Storage Foundation for Windows.

I was recently tasked by an architect to build out several SQL clusters, the first of many with the following configuration:

  • Microsoft SQL Clusters
  • VMware RDMs and
  • Veritas (Symantec) Storage Foundation Windows (SFW).
  • Windows 2008 R2

The goal was to create HA clusters for virtualized SQL, and to allow us to dynamically allocate additional RDMs to the cluster as storage needs grew.

Your Email has been Hacked!

When I first wrote this it was to help inform a couple of people about email getting hacked. This is happening more and more. My recommendation is the same, but now I have to add the caveat that you need to know where your browser is taking you. I've had "IT" people get their email passwords captured by a number of different methods. (The methods could be whole articles themselves.) Use a program like keepass to keep track of your passwords on sites. Keep them different, and change them every couple of months.

Subscribe to RSS - Tips & Traps