Stay on the lookout for your own Snowden nemesis

Whether you think of Edward Snowden as a hero or a traitor, one thing’s clear: It’s critical to protect your own organization’s data, so you may want to learn what the NSA did wrong that allowed Snowden to gather and disseminate top secret information. According to various reports (e.g., www.nytimes.com/2014/02/09/us/snowden-used-low-cost-tool-to-best-nsa.html?_r=0), Snowden used web crawler software…

Details

To hire the right candidate, use your own interview questions

When you’re trying to build a top-class IT team, it’s tempting to ask candidates some of the standard problem-solving questions used by big players in the industry, such as Google, Apple, Amazon, and Microsoft. Lots of websites list commonly used questions, and you’re sure to find super-clever brain teasers and computer science problems from these…

Details

Don’t allow conflicts with gLTDs to compromise internal server security

Many organizations rely on internal server names or local IP addresses for hosting intranet applications as well as mail servers such as Microsoft Exchange. However, with the expansion of global top-level domains (gLTDs) that started in 2013, it has become possible for internal server names to conflict with actual worldwide web addresses. For this reason,…

Details

How to access a linked server’s linked server in SQL Server

In Microsoft SQL Server, you can define remote data sources as “linked servers” and access them in a query using syntax that qualifies the object (e.g., table) name according to where it resides … e.g., server.database.schema.object. However, sometimes, you may need to access a linked server’s linked server. Unfortunately, SQL Server’s query syntax doesn’t give…

Details

Why put the “N” before strings in SQL Server

When working with queries and commands Microsoft SQL Server or looking at documentation for arguments in core functions, often you’ll see an “N” before a quotes string, like this: N’string content’ As you may know, the N encodes the string as Unicode (specifically, UTF-16 in SQL Server’s case). The “N” stands for “national,” since using…

Details

Simplify large-scale deployments with integrated stacks

Buying equipment for a data center and configuring it all to work together can be time-consuming and costly. One way to streamline and smoothen the process is to purchase an integrated IT stack consisting of a predefined, pre-tested configuration of servers, networking equipment, hypervisors, and storage units all bundled together. This concept is often referred…

Details

Protect your network from rogue DHCP Servers

Weird network problems, such as inability to access resources or having the wrong IPs assigned, can result from a rogue DHCP server. This isn’t necessarily the result of a hacking attempt (although it could be). For example, an employee may plug in a home router at the office without being aware of the consequences. Whatever…

Details

Beneath the mystery of unused routes marked with “r>”

In BGP routing, some routes aren’t used in the routing table, but they’re still shown when you execute the “show ip bgp” command. These routes are marked with “r>”; this allows you to know that although they’re valid routes, they’re not used. That can give you a better understanding of what’s happening than if these…

Details

A key to configuring Cisco RADIUS with Windows Server

When configuring Cisco RADIUS to authenticate via Active Directory on Windows Server, it’s important to know what to add as a “condition” vs. a “constraint.” For example, generally when setting the NAS Port Type to VPN, this should be set up as a condition. Windows Server has network policy constraints and network policy conditions. The…

Details

Why won’t my WordPress style update?

Unlike some other CMSs or similar programs, WordPress doesn’t automatically cache your styles, so you may wonder why style changes you make don’t show up on your web page. Two obvious possible reasons could be that the browser is caching your styles (press ctrl-F5 to force the browser to refresh), or you’re using a plugin…

Details

Get going with Grails: Java-friendly rapid web development

Grails, formerly called Groovy on Grails, is a Java-based web framework, using a syntax a bit different from Java (e.g., strong typing and semicolons are optional), but compiling to Java bytecode. Its appeal is that it contains various time-saving features supporting rapid development for web applications, and it can also work together with Java components.…

Details

How to sort HTML content with JavaScript without losing attributes

If you’re using JavaScript to put HTML content into sorted order, you might think of extracting the content only (e.g., innerHTML from elements), and then sort by that. After all, you can’t sort on the objects themselves; you need some kind of scalar value (e.g., text) to sort. However, sorting content and then changing elements’…

Details