* Posts by VeryOldFart

8 posts • joined 6 Feb 2015

Oh, sugar! Sysadmin accidently deletes production database while fixing a fault


In a similar vein.

from personal experience:

p(fu) ∝1/n^2

where p(fu) = probability of losing the live data

n=number of backups

therefor, no backups = data already gone

one backup = it's certain to go

two backups = still a 25% chance of losing it


Reminder: How to get a grip on your files, data that Windows 10 phones home to Microsoft


Re: under remote control

I'm not sure what they mean by 'remote control' but in principle there will already be a TCP connection from your PC to them so they can potentially do what they want with it. Your setup stops external TCP sessions being initiated but can't protect you from sessions initiated from your machine. You would need to block all of the outgoing 'telemetry' traffic at your router to stop internally initiated sessions.

What they can actually do depends on the 'telemetry' system that is installed, which can in turn be updated at will.

What could possibly go wrong with that?

Your taxes at work: Three hours driving to turn on politician's PC


Re: Really - there wasn't a cleaner or anyone else in the building...

I spent 45 minutes trying to get one of these 'second socket' machines working - monitor on desktop, tower under desk. Ended up calling supplier asking where the 'jumper' was in the tower because the screen worked but the tower wouldn't power up. "What on earth are you talking about" was the reply.

Very red-faced, I realized that, in the mess of cables under the desk, I had plugged the power cord for the tower back into the second socket in the tower and the power cord from the wall directly into the monitor.

Weirdly, a month later, a colleague had a similar problem with two Ethernet cables and two computers. Computer plugged into computer with one cable and wall socket to wall socket with the other. He was amazed how quickly I worked this out, until I told him about my previous experience.

I wasn't offered any gifts for solving that one.

TalkTalk downplays extent of breach damage, gives extra details


Re: Lock your credit records

Good advice - these details will be out there forever - I did the same thing after the Anthem hack. - please don't retroactively sue me ;)

Whoops, there goes my cloud: What to do when AWS foresakes you


in some circumstances, yes, but in others, no. We use Workday, multi-tenant, SaaS. Because they have have a single line of code, they been able to deliver new features regularly, several times a year. The fact that they have a single code-base must make it significantly easier to develop, test and deploy than either single tenant SaaS or in-house systems. Their security is good and regularly audited by third parties.

I agree, cloudy stuff can be done badly, thereby introducing extra vulnerabilities, however, if done well ( http://diginomica.com/2013/09/06/workday-cloud/#.Vgl_JflVhBc ) the benefits, to both vendor and customer are significant.

We had an outage a couple of years ago. Failover to the backup site took four hours and we didn't lose any data - I thought that was impressive as we run HR, Benefits, Payroll, and all financials for multiple companies. Been using it for 4+ years now and consider it to have been a very positive experience.

UK.gov finally unveils new parly spook-watching panel


Targeted because they were Brits

I am troubled because it appears that they were targeted specifically because they were Brits. If they happened to be killed as part of a wider operation, then yes, the 'being in a war zone' argument holds up but I suspect that killing them because they were Brits may have been done to make an example as much as it may have been to stop a future operation in the UK.

My strongly held belief about this is that anyone who has strongly held views that this was either absolutely right or absolutely wrong ... is absolutely wrong.

A server apocalypse can come in different shapes and sizes. Be prepared


Re: Business continuity isn't just tech orientated

I agree completely. Our approach uses a slightly different definition of Business Continuity to the one in the article. For us BC is the starting point and is done by the business. They determine how they will survive in the absence of the IT systems and what they will need to do merge the results of this back into the IT systems when they have been recovered. This focuses the business on how they will continue to operate while the tech is unavailable and consequently helps them identify the maximum acceptable RTO and RPO and balance this with how much they are willing to invest to meet them. I have led several desk-top exercises taking people through this process.

Anthem, America's second biggest health insurer, HACKED: Millions hit by breach


I am one of the lucky ones who was a client of theirs for years. My concern is that in 2, 3, 5 years from now someone will use my details for to get credit and screw up my credit rating. I will be at a different address by then so I won't see the bills coming in for my 'new' credit cards. I probably won't know anything about it until I get a credit application rejected. I am not a happy bunny.

Biting the hand that feeds IT © 1998–2019