Jump to content

Rhett

Administrator
  • Posts

    1,399
  • Joined

  • Last visited

  • Days Won

    33

Everything posted by Rhett

  1. I think he might like Motorcycles
  2. Julie made some bedding for Jacob's room in a motorcycle theme, it turned out very well for her first time doing anything like this.
  3. There was a few minutes of outage today caused by a switch failure at the data center, this switch has been replaced and all is well. Sorry for the trouble. Based on our record it should be about another 8-15 months before anything else happens.... :blush
  4. Ya I'm going to start posting them... they might not all be funny to others but at least I will have them recorded in some way.
  5. Hailey is laying in bed, I walked in to kiss her good night and she was still awake. Hailey: Daddy I'm scaredDaddy: What are you scared of?Hailey: Lot's of things, can you sleep with me?Daddy: OkHailey: Can you do a couple of things first?Daddy: Ok, what?Hailey: Brush your teeth and shave your head! She is still 2 years old btw.
  6. Here's a time-saver for IT executives swamped by last-minute budget cuts and end-of-the-year performance reviews: We've written your 2009 goals for you, with our list of nine Web sites you need to study during the next 12 months. This list is not for geeks. It’s for IT professionals of a certain age, who don’t spend every waking hour online but need to keep up with the latest innovations on the Internet. Best Practices for Next-Generation IP Address Management: Download now Master these Web sites, and you’ll prove you can innovate during the most trying economic times. And you’ll do it more efficiently than your 20-something employees, who waste too much time chasing the new, new thing on the Internet that may not survive the downturn. 1. Linked InForget Facebook. In the last six months, LinkedIn has become the de rigueur Web 2.0 site for IT professionals. LinkedIn has 30 million members, almost double what it had a year ago. And it raised more than $75 million in venture capital during 2008, so it has staying power. It has a host of new features that make it the most productive networking site on the Web. Spend some time updating your LinkedIn profile and reaching out to current and former colleagues. You can show your boss that you’re well connected, and you’ll be ready in case you’re on the next layoff list. In 2008, LinkedIn made our list of the 20 most useful social networking sites on the Web. 2. Google Apps for Business Call it what you like - software-as-a-service or cloud computing - but it’s the future of enterprise IT departments, and you need to get on board with it. You’ll be under more pressure than ever in 2009 to find cheaper ways to deliver IT services. One way to do that is to pilot a Google Apps project, such as document sharing via GoogleDocs or video sharing via Google Video. Your staff can build one of these collaboration projects in a jiffy, and the information will be available to employees from any location on any computer. Among Google Apps proponents: The District of Columbia government. 3. VMware Communities Chances are you’ve already embarked on a server virtualization project, and continued consolidation of your servers is a key money-saving goal for 2009. Most of you are using VMware for your server virtualization projects, and our product reviewers recommend you stick with VMware over Microsoft’s Hyper-V for the foreseeable future. To get the best real-world feedback on how best to deploy VMware, keep your eyes on the VMware Communities Web site. It’s got user groups in your community and lots of tips from other VMware developers that can help you solve problems faster.4. Secunia Security will continue to be a top priority for 2009, but you’ll need to figure out how to do it on the cheap. That’s where Secunia.com comes in. This site aggregates security vulnerability information from leading vendors, providing you with one-stop shopping for the latest news about security bugs and the software patches available to fix them. The site has an active community of IT security folks who can help you fix operating systems and applications before you get attacked. Secunia made our list of 20 useful IT security Web sites in 2008. 5. Green Grid With the economy in shambles and energy prices plummeting, you’re likely to hear a lot less about global climate change and carbon neutral business operations than you did six months ago. Nonetheless, green IT can still be a huge advantage for IT departments because it will save you money. Plain and simple: green IT saves greenbacks. So get to know the Green Grid’s Web site and make sure that whatever you buy in 2009 for your data centers is in line with their advice and metrics. Here’s more information about the Green Grid along with three other organizations that offer advice about lowering data center power consumption. 6. Twitter At first glance, Twitter seems like a colossal waste of time. But the fact is this real-time messaging service is taking off in IT circles. And if you don’t jump on the bandwagon soon, you might be too late. Twitter provides an easy way to keep your staff and co-workers informed about where you are and what you’re doing. You can also sign up for the latest technology headlines from Wired, Slashdot and others. It doesn’t take long to sign up for Twitter, so give it a whirl so you’ll know what your Generation Y employees are talking about. See 20 must-follow Twitter feeds here. 7. Yammer If Twitter seems too frivolous to you, try Yammer. It’s essentially Twitter for the office. The benefit of Yammer is that it’s a private communications channel for coworkers to share quick messages about what they’re working on, get questions answered or blast out news. Xerox and Cisco are among the 200-plus companies enjoying improved collaboration thanks to Yammer. One benefit of Yammer over Twitter: it seems to have a sustainable business model. 8. Ruby on Rails Ruby on Rails is one of the best open source tools to appear in recent years. This Web development framework lets you create working applications in a matter of hours. Advocates of this development platform include the New York Times, Yellowpages.com, Twitter and Hulu. See 15 amazing Web applications built with Ruby on Rails here. Version 2.2 of Ruby on Rails came out in November, so you don’t have to worry about being on the bleeding edge. 9. Enterprise Mobility Matters Like it or not, the latest smartphones – the BlackBerry Storms and Apple 3G iPhones (Slideshow: Smartphone showdown: iPhone vs. BlackBerry Storm) – are headed toward your corporate network. So you better get ready to protect sensitive corporate information from the risks that these consumer devices open up. If you don’t want to encrypt them, make sure you have centralized control over them so you can wipe data from lost or stolen cell phones. We like the Enterprise Mobility Matters Web site from market research firm Strategy Analytics because it offers a comprehensive look at enterprise mobility issues. LINK
  7. While Windows Vista may be Microsoft's most secure operating system ever, it's far from completely secure. In its fresh-from-the-box configuration, Vista still leaves a chance for your personal data to leak out to the Web through Windows Firewall, or for some nefarious bot to tweak your browser settings without your knowing. But by making a few judicious changes using the security tools within Windows Vista--and in some cases by adding a few pieces of free software--you can lock down your operating system like a pro. Use Windows Security Center as a Starting Point For a quick overview of your security settings, the Windows Security Center is where you'll find the status of your system firewall, auto update, malware protection, and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected. For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out-of-date, the Malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you'll want to install your own. For free antivirus, I recommend AVG Anti-Virus 8. Use Windows Defender as a Diagnostic Tool The Malware section also covers antispyware protection, and for that Windows Vista includes Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and what is not spyware, so redundant protection can actually offer some benefit. Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs, and Winsock Service Providers, but Startup Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable, or enable any of the programs listed. Disable the Start Up menuWindows Vista keeps track of all the documents and programs you launch in the Start Up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps: Right click on the taskbar and select Properties.Click on the Start Menu tab.Uncheck Store and display a list of recently opened files.Uncheck Store and display a list of recently opened programs.Click OK. Get Two-Way Firewall Protection No desktop should be without a personal firewall, but even if the Security Center says you're protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious--and that's good. But outbound protection is not enabled by default. That's a dangerous situation if some new malicious software finds its way onto your PC. Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don't go looking the Windows Firewall settings dialog box.) To get two-way protection in Windows Vista, click on the Start button; in the search space, type wf.msc and press Enter. Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules. Click on Windows Firewalls Properties. You should now see a dialog box with several tabs. For each profile--Domain, Private, and Public--change the setting to Block, and then click OK. Even if you do this tweak, I recommend adding a more robust third-party firewall. I suggest either Comodo Firewall Pro or ZoneAlarm, both of which are free and fare very well in independent firewall testing. Lock Out Unwanted Guests If you share your computer with others (and even if you don't), Windows Vista includes a neat way to keep unwanted guests from guessing your system administrator password. When you set up users and declare one user as administrator (with full privileges), Windows Vista allows outsiders unlimited guesses at the password you chose. Here's how to limit the guesses. Click Start, type Local Security Policy.Click Account Lockout Policy.Choose Account Lockout Threshold.At the prompt, enter the number of invalid log-ins you'll accept (say, 3).Click OK and close. Now Audit Your Attackers With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following: Click the Start button, type secpol.msc, and click the secpol icon.Click on Local Policies and then Audit Policy.Right-click on Audit account logon events policy and select Properties.Check the Failure box and click OK.Right-click on Audit logon events policy and select Properties.Check the Failure box and click OK. Close the Local Security Policy window. You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security. Related Content Secure Your Internet Explorer Settings The Windows Security Center will also report whether your Internet Explorer 7 (or IE 8) security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself. Within Internet Explorer, click Tools in the menu bar.From the drop-down menu, click Internet Options.Choose the Security tab.Within the Security tab, click Custom Level. Here you'll see a window with all the security options for the browser. If any are below the recommended level (if, say, some kind of malware reconfigured your browser settings), these options will be highlighted in red. To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close. Use OpenDNS Domain Name System (DNS) servers act as a phone book. When you type "pcworld.com" in the address bar, for instance, Internet Explorer sends that common-name request to your Internet service provider's DNS servers to be converted into a series of numbers, or an IP address. Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that their interests control. One way to stop such abuse is to use OpenDNS. Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following. Right-click on the icon representing your network card.Click Properties.Click Internet Protocol Version 4.Click the Properties button.Select the Use the following DNS server addresses radio button.Type in a primary address of 208.67.222.222.Type in a secondary address of 208.67.220.220.Click OK. Live With User Account Control One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages. In Windows 7 you'll be able to set UAC to the level you want. Until then, you do have some options. One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger. Instead, install TweakUAC, a free utility that offers the ability to turn UAC on or off as well as an intermediate "quiet" mode that keeps UAC on but suppresses administration elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted. Check Your Work Now that you've tweaked Windows Vista, you can keep tabs on your system's security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems. Open Control Panel.Click System.In the Tasks list, click Performance (near the bottom).In the resulting Tasks list, click Advanced tools (near the top).Click the last item on the resulting list: Generate a system health report. The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed, and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything's still good. LINK
  8. Rhett

    No caption

    From the album: Hailey Jul 06

  9. Rhett

    No caption

    From the album: Hailey Jul 06

  10. Rhett

    No caption

    From the album: Hailey Jul 06

  11. Rhett

    No caption

    From the album: Hailey Jul 06

  12. Rhett

    No caption

    From the album: Hailey Jul 06

  13. Rhett

    No caption

    From the album: Hailey Jul 06

  14. Rhett

    No caption

    From the album: Hailey Jul 06

  15. Rhett

    No caption

    From the album: Hailey Jul 06

  16. Rhett

    No caption

    From the album: Hailey Jul 06

  17. Rhett

    No caption

    From the album: Hailey Jul 06

  18. Rhett

    No caption

    From the album: Hailey Jun 06

  19. Rhett

    No caption

    From the album: Hailey Jun 06

  20. Rhett

    No caption

    From the album: Hailey Jun 06

×
×
  • Create New...