Showing posts with label Computers. Show all posts
Showing posts with label Computers. Show all posts

Monday, July 11, 2016

Video editing using Linux

Video editing using Linux

When you have to edit video, Linux is not the first choice on many people's minds. Most of you will think Apple or Windows. And I don't hold that against you. My viewpoint is that I want to keep everything I do in the 'open source' world.

Many of you will immediately think of the Adobe suite of products or Finalcut. Adobe is expensive and I prefer not to encourage the use of a pirated version. Apple is also an expensive eco system.

I have been in computing since 1985. You tend to learn a few things over time. How many people do you know with a pirated copy of Photoshop or Windows?

To avoid all that I moved to Linux.

What I use:
  • Linux Ubuntu 14.04LTS (Trusty Tahr)
  • Gimp - Ver 2.8.10
  • Inkscape - Ver 0.48
  • Blender - Ver 2.69
  • Kdenlive - Ver 0.9.6
Gimp to edit pictures/graphics, Inkscape to edit vector graphics, Blender to edit 3D objects/animations for video and Kdenlive to edit and render the final result. Total cost of the above - $0.00




Open Source software has been given a bad rap over the years by some small minded people. The features in all the above software has grown over the years. Now they may not match the current versions of commercial software feature for feature. But I'll lay odds most of you don't use all the features either.  All the important features are there.

Here's a place to start if you too want all the tools to be able to create professional video:

http://www.ubuntu.com/desktop

Start from the ground up... install a new operating system. It's really easy. Just follow the instructions. All the software I mentioned is available from the Software Centre within the operating system and will only take minutes to install.

There is also a thriving community that will help you at no cost whatsoever.

http://community.ubuntu.com/

I do suggest you dual boot your computer so you keep all your Windows stuff intact. Check that your computer is built using compatible hardware to Linux. The older the machine is, the better. There may be a piece of hardware that Linux may not handle (like Bluetooth) but be patient as Linux gets updated far more regularly as Windows. And one day your Bluetooth will work.

Samples of my work:

http://www.americanthunder.com.au/
http://www.americanthunder.com.au/photo-shoot-lexie/
http://www.americanthunder.com.au/photo-shoot-with-ashleigh/

Advantages I see in using Linux:
  • No more viruses
  • Better security
  • Computer speed
  • Open Source - Free Software
  • Excellent community help
  • Huge YouTube tutorial support for everything
Leave a comment...






Editing 4K Video with Kdenlive on Linux

Editing 4K Video with Kdenlive on Linux

When asked to compose and edit a video in 4K, my immediate response was fear. Would Kdenlive do it?

Well, the short answer is YES. You need to create a new project profile and that is basically it. A render profile is not really necessary as you can render with H.264, MP4 or WEBM if you intend the video for YouTube.

To create the "new project Profile". Look under Settings and "Manage Project Profiles". Be careful not to overwrite your favorite profile. Use the settings below:


I selected 30 frames per second for mine. Remember you can always alter the project to suit the footage that you are given.

You can also open the 4K footage using a 1080p profile if you intend to scale down the video for the internet. The clarity of the rendered video is still awesome.

Things to note: 


  • I use Ubuntu 14.04 Trusty Tahr on a Lenovo G560 laptop. It has only 4gb of RAM.
  • Simply playing 4K video on my Lenovo is a feat on it's own due to the lack of RAM.
  • VLC manages with 4K quite well but playback can 'step' or skip frames at times.
  • I have a two monitor setup but the large monitor is only 1920x1080.
  • I figure the PC has to rescale the 4K back down to the monitors resolution during playback.

File sizes:

  • The rendered 4K video is going to be large.
  • 1.5 mins of 4K video will be around 220mb.
  • The same video in 1080p is 85mb.
  • Rendering 4K also takes longer (duh).

Also I use Kdenlive version 0.9.6, but from what I gather you can use up to version 15 to also do 4K.



Useful links:
http://askubuntu.com/questions/398613/how-to-export-4k-video-with-kdenlive
https://forum.kde.org/viewtopic.php?f=272&t=119006


Thursday, June 11, 2015

Identity Theft Scam

I recently received a phone message on my home phone claiming to be from the Taxation Department and talking about some error in my taxation records. There is also a threat about legal action against me.

I knew that there is no way the Tax Office would be contacting me by phone and smelled a rat. I checked the Australian Government's Scam Watch page and there it was in their ScamWatch Radar link. The phone number is different but the methodology is the same.

Please also notice that the Australian Government sites all end in ".gov.au".


Play the above video to hear the phone message in it's entirety.

A word on Identity Theft: You will be surprised how little information is needed from you to steal your identity. Your tax file number and bank account number and address or date of birth may be all that's necessary to reset your banking passwords and allow thieves to take out loans in your name or access your bank accounts.

Also if you are an avid Facebook fan please limit the amount of personal information you list in your profile. Someone will be looking for it.

Be careful and check with ScamWatch if you suspect a scam.

Tuesday, March 10, 2015

Windows Support Scam

I have been called on several occasions by overseas call centres claiming to be from 'Windows Support', telling me that my PC has been sending out error messages or 'bad traffic' on the internet.

They seem to target people that use their PC's infrequently to perhaps browse the internet and clear email. A seasoned PC user will start to smell a rat immediately.

THIS IS A SCAM.

All they want is your money and perhaps leave you with a web-bot or bot-net installed on your PC.

Their tactics are as follows:


  • Instruct you to open task manager, msconfig or your eventvwr to view your log files.
  • They will convince you that you are looking at the bad traffic or stopped services.
  • They will ask you to browse to a 'desktop sharing' software site (these change over time).
  • They will instruct you to download and install it.
  • They will then ask you to run the software and you will be asked for passwords.
  • At this point they are into your system and can do what they want.
  • You may also be asked to pay a fee of around US$80.00 for a year's worth of maintenance.
  • They will direct you to a site to pay the $80 via a credit card.
  • Congrats they now have your name, credit card number and the 3 digit code.

So not only have you been scammed, you have paid them for the privilege.

Have a listen to a recording of a typical call.
https://soundcloud.com/csoonline/microsoft-support-scam

So what is a bot-net?

A bot-net is a piece of insidious software that turns your PC into a 'robot' that takes orders from a central 'command & control' server hidden somewhere on the internet. It receives instructions to send out spam, phishing emails, or denial of service attacks aimed at targets as per instructed from the command & control server. In most cases these web-bots are not detected by industry standard virus scanners. They go undetected for years. All you may notice is a slight slow down of your PC at times.

Once your PC has a web-bot installed, and there are millions of them out there. Your PC becomes a commodity that's bought, sold or rented out to criminals for lots of purposes. Some may want to send millions of spam emails quickly. Some may want to build email lists (from our inboxes). Some want to hit Government servers with denial-of-service attacks. The list goes on.

How do you get rid of a bot-net?

If you're lucky you can use a tool that identifies and removes them. If you're not, you need to format and re-install Windows. Be warned, some of the tools to remove them also contain newer ones. That's the catch 22. Who can you trust? I suggest the re-install. It's the only safe method. You can save all your data, pictures and video's before hand. You will need to re-install ALL of your added software from the original cd's. NEVER restore software from a backup as the web-bot may be in your backups.

Why are the call centres making the calls?

They are paid to do it. Many bot-net operators actually pay call centres to make the calls and train them specifically in the task. The call centres may not actually know what they are really doing. I have heard of some of them transferring your call to a 'level 1 technician' who will do the repair. By this they wash their hands of 'blame'. These calls usually take your $80 first, before transferring you.

"Oh what a tangled web we weave when first we practice to deceive."

Now that you know this, tell your friends that are perhaps less computer literate.

Saturday, November 15, 2014

Trying out Linux on an old PC or Laptop

Many of my friends are always complaining about how slow their PC has become. Or ever since browsing a site they can't get rid of a toolbar. Or my computer is doing some strange things and I can't get it to go back to the way it was.

Many of those friends just went out and bought a new computer that is faster and came with a new version of Windows (which they thought would be better). However they never took into consideration that with every version of Windows comes a whole new learning curve... How to use it? Plus the newer versions used more of the computers resources so the speed it operates is not really that much faster than the old one.

Windows operating systems, like versions of Office, are completely different in how they work, or more precisely, where are the resources hidden that I used to use? In essence Windows versions are like Linux Distributions. When you find the 'distro' you like you stick with it. There are hundreds of Linux 'distros' out there to choose from. The below video will show you a couple that are the main or recommended ones to try.

So if you just bought a new PC with Windows 7 or 8 and you are left with an old computer that you are just going to throw in the bin... WAIT! Try Linux first on that old PC. You don't need to worry about loosing your files as we aren't going to be using the hard drive on the old PC. The PC does not even need a hard drive installed at all.

Now watch how much faster your computing experience has become. Browse the net faster, use your internet banking more securely. Edit video or photo's so much faster. The whole computing experience is just what you thought you would get with a new computer. Only thing is... it's on your old one.

Watch the video and see for yourself.


Now compare the speed of your new PC with Linux installed on your old one. Was it worth the money? Not convinced? Wait 6 months and compare speeds again.

Thursday, February 27, 2014

Why cloud data isn't as safe as you think


There's a great article from ZD-Net written by Robin Harris outlining the disadvantages of the use of Cloud Storage for corporate data. 

Here's a snippet of that article:
Serious cloud users know the vendor story: multiple datacenters, geograpically distributed; advanced erasure coding that is better than RAID 6 (which I've discussed); multiple version retention; checksums to ensure data integrity; and synchronization across devices. What could possibly go wrong?

Plenty
As has been documented, client-side corruption is all too common, so the cloud will carefully preserve and spread corrupted data. If you crash during an upload the data may be inconsistent - but the cloud doesn't know that - or the cloud may fail to sync changed files.

Worse, clients cannot typically preserve dependencies between files since uploads are not point-in-time snapshots, creating unexpected and unwanted application (mis)behavior. A group of linked databases - say, between CRM, ERP and distribution systems - could end up inconsistent due to piecemeal uploads of changes at different times.

The basic issue is that the loose coupling between the local and cloud file systems leaves data less protected than users - or cloud vendors - like to admit. Like most problems it is fixable, once we admit we have a problem.

I draw your attention to the comments placed below the article:

Good work
'The Cloud' has got to be the biggest rip off ever. I can't wait to shout out 'told you so'. The sheep that can't think for themselves, the weak IT managers that should be standing up and fighting for security over keeping the ants happy, the moron media that write about Tech to look cool but actually know very little and have virtually no hands on experience. If you are a muppet, then get into 'The Cloud'. If you have no family and kids and are a Financial Controller or IT Manager then join the war on putting things right. I say no family or kids because you will be fired as soon as you stand up for all the things that are good and great about IT and humans. BYOD and 'The Cloud' is not one of them. Get your own datacentres, your own servers, 2 firewalls with DMZ and honeypots, forcefully educate your staff and your kids about security and being proud to protect data and systems. Hire security guards to pat down and forcefully remove all Tech from visitors to stop espionage and photography. Back up to tapes drives not someones server who you dont know and have no clue where the data is. Are you thinking this is over-the-top? Oh no, this is the minimum you should be doing. But of course many of you will do nothing. Not until all your data is deleted or changed or corrupted or ransomed. Educate, educate, educate (and start with yourself).

User: philswift

My two cents worth:
Corporate organisations are inherently unsecure. Bad passwords, unrestricted use of portable storage (usb) devices, smart phone use as storage media, unpatched operating systems, out-dated anti-virus software, phishing emails, web-bots, trojans, and the list goes on. The common factor in all of this is humans. Your staff, to be precise, are usually there to do a job. Do they spare a thought about your data security? Some of them can barely speak english let alone type in a complicated password. But management insist they need to function using a computer in order to maintain the companies 'automation' goals.

So your board of directors say let's shift that to 'the cloud'. That way we can sleep peacefully at night and our data security becomes someone else's problem. If anything happens we can sue them. You may or not be aware that the Target data breach happened because they out-sourced their Cooling and Lighting control of stores to a vendor that promised a saving in the electricity bill. The security breach came through that 3rd party vendor. The vendor had VPN access to the electrical control servers on the Target network. It is not clear how the vendor was hacked but someone got his VPN credentials.

Cloud vendors all promise that they all adhere to strict security protocols. How many of them use 3rd party vendors for their cooling and electricity supplies? How many of them outsource their security camera monitoring and alarm systems? Their door locks and swipe card systems? Their fire control and gas/sprinklers?

I once had contact with a company that used swipe cards on all their doors. I looks really impressive when their guests are shown around their operations. The whole system was run from an old Windows XP machine sitting in the server room. Access to that room needed a swipe. The XP machine didn't have a UPS. In the event of a power failure. The servers still ran for as short time. But not the XP machine. Everyone was locked out and the IT manager would not have had access to the server room to gracefully shut down the servers. What this illustrates is the need for management to show off their prowess of all things technical. It looks great from the outside, but it is a trembling house of cards waiting for a stiff breeze on the inside.

Now what guarantees do you have that your cloud provider is not the same? How many so-called cloud providers do actually have a data-centre? Most use 3rd party data-centres. And the list goes on. It's all smoke and mirrors.

So what's the solution? It's not easy but you need to divide your networks. Use tcp/ip the way it was intended. Educate your staff properly. Make use of the skills of penetration testers. Don't jump at all high tech solutions that may not be all that necessary to your business. Make use of a 'competitive advantage' strategy in IT. In other words don't do what your competition is doing. Do it differently. Use operating systems other than the industry standard Windows. Don't pay buckets of cash for off-the-shelf solutions when you can employ someone to write one specific to your organisation. All of these steps make it hard for a hacker to get to your data. 

Unfortunately it may be all too late for IT that has become entrenched in large corporations. It's possible that only the small startups will have their feet firmly planted on the ground after all the lessons learnt from 'big business' with their head in the clouds. The future is not that certain. The only certainty is change will take place.

Monday, February 3, 2014

Website Buys Customers New Computers To Avoid Dealing With IE7

[Source: Gizmodo]

At last somebody see's some logic in the IT world... at around $399 it is worth giving them a new machine rather that spending hours or home visits getting the old buggy Windows machine running properly...

Gizmodo reports:

Have you been mocking Grandma for holding fast to a clunky, barely functional copy of Internet Explorer 7? Get ready to eat your words. A nurse and patient-pairing website has decided that, rather than put up with customers trying to run IE 7, it's just going to buy them a whole new computer, goddammit—fancy new browser included.

The site, NursingJobs, connects nurses to the people who need them, many of whom are older and thus pretty deeply engrained in their often outdated habits, be it casual racism or a legacy browser of yore. And after crunching the numbers, NursingJobs realized that it didn't even make financial sense to keep trying to support its users still stuck in 2006. The cheaper alternative? A brand new computer for Grandpa:

IE7 users make up 1.22% of our traffic right now, and this will decline as more computers are upgraded and can use modern browsers. However, we know that some of our clients are still stuck with IE7 so we decided to make a bold offer, one that initially seemed crazy to us but now makes a lot of sense.

We are offering to buy a new computer with a modern browser for any of our customers who are stuck with IE7. We determined that it would cost us more to support a browser from 2006 in 2014 and beyond than it would to help our clients upgrade their legacy hardware.

How could this possibly be lucrative? Well, dedicating the manpower and time it takes to keep IE 7 users running is only going to get more expense. So even if NursingJobs is just passing out Chromebooks, customers are almost undoubtedly still getting a better machine than whatever crap they were using before, and NursingJobs presumably doesn't have to pony up too much cash. Plus, at 1.22% of its userbase, it's a small sacrifice to make for assuaging a major potential headache.

There is one potential downside, though. If NursingJobs gets rid of the additional anxiety that is IE 7, its customers may stop even needing a nurse in the first place. [NursingJobs via Uproxx]

Image: Shutterstock/Andresr

Thursday, January 30, 2014

The Oculus Rift Put Me In Game of Thrones and It Made My Stomach Drop


Gizmodo just posted an article on Oculus Rift. This is the future of home entertainment. You no longer need your 3D TV. This puts you directly in the picture. Read more about the author's experience being placed into Game of Thrones. Imagine you're in the squeaky elevator on the Wall of Ice ascending to the top of the fortification.

Read On:
The Oculus Rift Put Me In Game of Thronesand It Made My Stomach Drop

Oculus Rift is available here.

Thursday, January 23, 2014

Run Windows XP or Windows 7 and never need Anti-Virus Software

As many of you know Windows XP is reaching it's 'retirement' on April 8th 2014. After this time there will be no more software or security updates released by Microsoft. They have however stretched out the support of Microsoft Anti-Malware support for 15 months after that date. This is to aid companies migrate to either Windows 7 or Windows 8.

Many of you have 3rd party software that may not run on Windows 8 or even Windows 7 and it is essential that you remain on Windows XP. So how do you keep running XP safely?

Here's a solution: Why not try RoboLinux or similar and run your favourite Windows as a virtual machine. You can create a 'VM Image' of your existing Windows installation using one of the many tools out there like 'Disk2vhd'. Then run your Windows inside Linux. No Virus-Scanners or spyware, malware issues to worry about. IF you break your Windows installation just run a fresh copy. Problem solved.

Watch this video (by RoboLinux) and if you want, fast-forward to the 'meat' in the sandwich at 8:30 to see how fast Windows loads under Linux. You will be impressed. But not only that. You can run multiple desktops so you can do more at the same time.


-or-
Install VirtualBox in Ubuntu 12.04 and install Windows XP from your CD.


Stop Press: If you are already using Ubuntu you can install Oracle's VirtualBox from the Ubuntu Software Centre. 'Disk2vhd' will create a snapshot of your existing Windows installation and VirtualBox will run it. That way you do not need the original Windows CD and reinstall everything. However if you have problems you can convert the VHD file to VDI (which VirtualBox prefers). The CloneVDI utility is available here and will do the conversion.

Note: Disk2vhd will image everything, your setup, drivers etc. If you run that image on a different PC you may need to install new drivers because all the hardware has changed. The other option is to install a new copy using the original Windows CD. The second video shows this operation.

Wednesday, January 22, 2014

Exporting from Outlook Express to Outlook 2013

Okay so you just bought shiny a new PC. The old one has all your email and contacts stored in Outlook Express 4, 5 or 6. And you want to move all that mail to your new machine which uses Outlook 2010-13?
You copy the '.dbx' files onto a flash drive and try to import them... no luck. Outlook 2013 will not read '.dbx' files. 

A quick search shows up this: http://support.microsoft.com/kb/2796528
And this is why I hate Microsoft... they no longer support their old software. Not even an import tool.

So what do you do?
There's an easy choice and a complicated one. 

The easy choice is to install Mozilla Thunderbird on the old machine and import all your Outlook Express mail and contacts. Then install Thunderbird on the new machine and copy the '.mbx' files over.

If you insist on using Outlook on the new machine then there's the complicated way.
(The below instructions are from another trusted source... but they will work...sorta.)


Stop press: I just discovered Windows Mail on Windows 8 machines will make you want to take your computer back to the store for a refund (or worse)... you may elect to use the Thunderbird option.


(Apologies to the 'IT Crowd')

Thursday, January 16, 2014

Why buy a new PC or laptop when the old one seems too slow and troublesome?

Some of you may have an old PC running Windows XP or 7 and you have had it a few years. It seems slow and glitchy. You may have had some malware/spyware issues that you paid someone good money to fix and it has never been the same? Also, Windows XP will reach the end of it's support by Microsoft in April 2014. That means you will no longer get automatic security updates. You may use the PC for banking or on-line purchases... Will that still be secure? Nope!

What do you do:

  1. Rush out and pay good money for a new PC with the latest and greatest from Microsoft?
  2. Rush out and buy the latest and greatest from Microsoft?
  3. Something else that you may not have thought of?


A new PC or Laptop could cost you around AU$900.00 bundled with Windows 8. Just buying Windows 8.1 is AU$149.00 or if you would prefer the Pro version Au$399.00
You may also think that the new PC's they are selling are much faster, more powerful and have better spec's than your old one.

Here's the something you may not have thought of:

Tuesday, December 24, 2013

German coalition favors German-owned or open source software, aims to lock NSA out

Original article from PC World:

Germany’s new coalition government listed open source software among its IT policy priorities, and said it will take steps to protect its citizens against espionage threats from the NSA and other foreign intelligence agencies.

Coalition parties CDU, CSU and SPD signed up to the plans Monday in Berlin.

The new government’s goal is to keep core technologies, including IT security, process and enterprise software, cryptography and machine-to-machine communication on proprietary technology platforms and production lines in Germany or in Europe, according to the coalition agreement.

But the government will also promote the use and development of open platforms and open source software as an alternative to closed proprietary systems, and will support the use of those in Europe, the parties said in the agreement. The public sector will need to consider open source solutions as a possibility when purchasing new IT, they said.

They also want to compete on a global level with “software made in Germany” and strengthen the quality of security, data protection, design and usability by doing so.

The government also plans to start operating in a more transparent way, for example by making parliamentary documents and transcripts of debates available in open data formats that can be used under free licenses, they said.

This is much better than the last coalition agreement, said Matthias Kirschner vice president of the Free Software Foundation Europe (FSFE).

However, while there are good intentions, there are also missed opportunities, he said. For instance, It would have been better if the new government had prioritized the use of open source software for public institutions instead of simply making them consider it, he said, adding that the agreement’s formulation is often cautious.

He said the FSFE regretted that references in earlier drafts to open standards had disappeared from the final agreement, and had been replaced with weaker terms such as interoperability.

Kirschner called on the coalition to move from words to concrete action. “The question is: how hard will they try?” he said.

The Business Software Alliance welcomed the new government’s focus on nurturing technology innovation in Germany.

”However, if this is extended to technology mandates or procurement preferences, whether based on development model or country of origin, it will significantly impede innovation and create unnecessary barriers to trade, investment, and economic growth,” said Thomas Boué, director of government relations, EMEA of the BSA software alliance in an email. A level playing field for all competitors will ensure that customers have access to the best products and services the world has to offer, he said.

”Governments should lead by example, making procurement decisions that are based on merit for the needs at hand and best value for money—rather than according to national origin,” he added.

The agreement also dealt with security under a heading “Consequences of the NSA affair.”

The coalition parties plan to keep pushing for more explanations about who spied on German citizens to what extent, and to negotiate a legally binding agreement with the U.S. to protect Germans against espionage.

Communications infrastructure also needs to be made safer, they said. They will push European telecommunications providers to encrypt communication links within the E.U. They also plan to make sure that European telecommunication providers are not allowed to forward data to foreign intelligence agencies.

The coalition will advocate for the Europe-wide introduction of a requirement for companies to report to the E.U. when they transmit the data of their customers without their consent to authorities in third countries. Besides that, it will press for the renegotiation of the E.U.-U.S. Terrorist Finance Tracking Program (TFTP) Agreement and the Safe Harbor agreement on the protection of personal data.

Under the TFTP Agreement, some data from the SWIFT international bank messaging system is transmitted to U.S. authorities. More recently, it was alleged that the NSA spied on the data.

Following revelations about the NSA’s spying on Internet data, the European Parliament had called for the suspension of the Safe Harbor agreement. The European Commission decided not to suspend the agreement, but instead put forward a range of proposals to strengthen it.

On Tuesday, the German Bundestag re-elected Angela Merkel as German chancellor for the third time. The inaugural meeting of the cabinet was scheduled to take place at 5 p.m. local time.

Saturday, December 21, 2013

Moving a city to Linux needs political backing, says Munich project leader


The original PC World article is available here.

This year saw the completion of the city of Munich’s switch to Linux, a move that began about ten years ago. “One of the biggest lessons learned was that you can’t do such a project without continued political backing,” said Peter Hofmann, the leader of the LiMux project, summing up the experience.

The Munich city authority migrated around 14,800 of the 15,000 or so PCs on its network to LiMux, its own Linux distribution based on Ubuntu, exceeding its initial goal of migrating 12,000 desktops.

Munich decided to migrate its IT systems when Microsoft said it planned to discontinue support for the operating system the city then relied on, Windows NT 4.0. The city was forced to choose between moving to a newer version of Windows, or finding an alternative platform, as new software and new versions of existing software would not be available on Windows NT. The city council decided to go with Linux to become more independent from software vendors.

Continued political backing was key to the success of the migration, said Hofmann.

”We had it from the start and it never failed. We had to treat our politicians as stakeholders and keep them informed,” he said.

By doing this, the politicians never lost interest and always knew what the people involved in the project were doing, he said. “I saw a lot of other open source projects going down the sink,” because they didn’t have that backing, or lost it, he said.

It took the city about 10 years from the first decision to switch through to completion of the LiMux project, which was originally scheduled for completion in 2009. However, there were several delays along the way.

First, the migration started a year later than originally planned, said Hofmann. The second delay was caused in 2007 when the city council decided that Munich’s IT department should also be responsible for the standardization of the infrastructure that is necessary for Linux clients, he said. Munich however didn’t have the right processes nor the right organization for that kind of standardization, he said.

The project was delayed for a third time in 2010, when the city council decided to enlarge the project, said Hofmann. Goals were added to develop three additional processes within the project: risk management, test management and requirement engineering.

Despite the difficulties, Hofmann said he would do it again tomorrow.

The heterogenous infrastructure of Munich’s IT organization was one of the projects biggest problems, Hofmann said. When the project started there were 22 organizations that each had their own individual configuration, software, hardware, processes and knowledge for their Windows clients and the accompanying infrastructure they were using, he said. “We wanted to have a standardized, centrally delivered and developed Linux client,” he said.

While Hofmann expected the splintered infrastructure to cause problems, standardizing the clients proved harder than he expected, for both technical and organizational reasons.

Luckily, he had the freedom to rebuild the whole of the city’s IT infrastructure.

”Anyone planning to switch needs to be prepared to rethink their entire IT organization. Switching to Linux is more than saving costs and using free software,” he added.

Munich’s switch did save money though. In November 2012, responding to a question from a council member, the city calculated that migrating to LiMux instead of modernizing its existing Microsoft software would save it over €11 million.

That calculation compared the LiMux option with a switch to either Windows 7 and Microsoft Office or Windows 7 and OpenOffice, the productivity suite Munich chose for LiMux. It included necessary hardware upgrades, training, external migration support and optimization processes, among other things. Both Windows options were significantly more expensive than LiMux, mainly due to Microsoft’s software licensing fees.

One expense Hofmann said he doesn’t have with LiMux is support contracts. “What do you need a support contract for? You really get no support, you get new versions. The only reason you need it is because your lawyers tell you so they can have someone to blame if it is failing. We no longer blame anyone, we try to fix it,” he said.

If Munich’s IT staff can’t fix a bug themselves, they will find a specialist to solve the specific bug, Hofmann said. “You no longer rely on some vendor or some service that you buy. You rely on yourself and what you know,” he said.

There are still complaints though. Word and Excel documents received from external organizations sometimes have to be modified and sent back, which can lead to difficulties with interoperability, he said. The city is trying to convince its correspondents to use ODF, the file format of OpenOffice, or PDF for documents that don’t need to be changed, Hofmann said, adding that the city has helped finance development of interoperability tools.

As part of its switch to OpenOffice, however, the city implemented WollMux, an office extension for templates and forms, that was published as free software 2008 and is now used by a handful of other organizations, he said.

There were other obstacles to the elimination of Microsoft Office—including the city’s reliance on over a thousand Microsoft Office and Visual Basic macros in its in-house applications, Hofmann said.

Now there are around 100 such macros still in use on the few remaining Windows PCs.

”It never was our goal to eliminate Windows as a whole,” he said, although the city has gone well beyond its initial target of migrating 80 percent of its PCs.

The financial department, for instance, still has three Windows PCs running special banking software. To switch that department to LiMux the city would have had to pay the software vendor to develop a Linux version of its application for the three PCs, Hofmann said.

The city faced a similar problem in its dealings with the Bundesdruckerei, the German authority that prints passports. It mandates the use of a Windows application to transmit the data required to personalize the passports, he said.

While Hofmann can look confidently to the city’s future, he recognizes that switching to Linux is not for everyone. Yet even those who don’t want to switch can still profit from the city’s experience: “Some guy once told me, ‘Since you started your project I can negotiate with Microsoft.’”

Saturday, December 14, 2013

Sunday, December 8, 2013

Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet

BGP hijacking is an “exceedingly blunt instrument” to capture traffic, and is “about as subtle as a firecracker in a funeral home,”


The full Original Wired article is available here.

This is just a summary of that article:

In 2008, two security researchers at the DefCon hacker conference demonstrated a massive security vulnerability in the worldwide internet traffic-routing system — a vulnerability so severe that it could allow intelligence agencies, corporate spies or criminals to intercept massive amounts of data, or even tamper with it on the fly.

The traffic hijack, they showed, could be done in such a way that no one would notice because the attackers could simply re-route the traffic to a router they controlled, then forward it to its intended destination once they were done with it, leaving no one the wiser about what had occurred.

Now, five years later, this is exactly what has happened. Earlier this year, researchers say, someone mysteriously hijacked internet traffic headed to government agencies, corporate offices and other recipients in the U.S. and elsewhere and redirected it to Belarus and Iceland, before sending it on its way to its legitimate destinations. They did so repeatedly over several months. But luckily someone did notice.

And this may not be the first time it has occurred — just the first time it got caught.

BGP hijacking happens in some form or fashion every day, but it’s usually unintentional — the result of a typo in a routing announcement or some other mistake. And when it does occur, it generally results in an outage, as the traffic being routed never reaches its destination. This was the case in 2008 when Pakistan Telecom inadvertently hijacked all of the world’s YouTube traffic when it attempted to prevent just Pakistan citizens from reaching video content the government deemed objectionable. The telecom and its upstream provider mistakenly advertised to routers around the world that it was the best route through which to send all YouTube traffic, and for nearly two hours browsers attempting to reach YouTube fell into a black hole in Pakistan until the problem was corrected.

In April 2010, another outage occurred when China Telecom distributed an erroneous announcement for more than 50,000 blocks of IP addresses, and within minutes some of the traffic destined for these domains got sucked into China Telecom’s network for 20 minutes. After analyzing the details, Renesys concluded that this incident, too, was likely a mistake.

But the incidents this year have all the characteristics of an intentional intercept, Renesys says.

BGP hijacking is an “exceedingly blunt instrument” to capture traffic, and is “about as subtle as a firecracker in a funeral home,” Renesys has noted in the past.

In all the years Renesys has been monitoring internet traffic, analysts had never seen anything that looked intentional before. Generally, Madory says, mistakes look clumsy and show obvious signs of being mistakes. They also generally last minutes, not days as these did, and they also generally do not result in traffic being re-routed to its legitimate destination, as occurred in these cases.

“To achieve this thing where you can get [hijacked] traffic back to its destination, . . . you have to craft your [BGP] messages in a way that you control how far it propagates or where it propagates,” he says. “And we can see these guys experiment over time, modifying different attributes to change the propagation until they’ve achieved the one that they want. We’ve never seen anything like that, that looks very deliberate where someone is tweaking the approach.”

As Renesys warned on its blog: “We believe that people are still attempting this because they believe (correctly, in most cases) that nobody is looking.”

Sunday, July 14, 2013

Microsoft: The monohedral and the bizarre

Summary: It's obvious to all observers that Microsoft is in a state of transition and transformation. Ballmer has declared that now that there is 'One Microsoft.' E Pluribus Unum, dude. What's the next move?

This is a brilliant article by Ken Hess of ZDNet... I tip my hat to you. Read on...

Ken's full article is here.

In case you haven't noticed, Microsoft has been in a state of transition for a few years now. Their foray into open source software, their giving away of software, their new stance on competition and cooperatition; it's a whole new company. Microsoft is entering middle age. And with middle age comes the regular prostate exam and colonoscopy. Both of which involve discovery from the bottom up. Welcome to the new age of reason, Microsoft, we've been waiting for you. Grab your ankles and think pleasant thoughts.
The discovery that you're doing things wrong is painful. Microsoft has historically been just a bit behind the game in three key areas: virtualization, consumerization, and cloud computing. Now that they've caught up and surpassed other companies in technical features, it's time for the company to re-evaluate itself. Take a close look at where it is today and where it's going tomorrow.
It's kind of ironic that the catch phrase for Windows 95 was, "Where do you want to go today?", when it should have been, "Where do you want to be tomorrow?"
The realization that the world has passed you by isn't a good one. It requires restructuring, refocusing, and making some tough decisions in order to remain relevant and profitable. Some of those tough decisions always begin at the bottom and work their way skyward. This typically means layoffs for technical staff, salary adjustments, deleting bonus programs, removing redundant positions, and shifting of personnel from silos and towers to unified global strata.
I feel bad for the average Microsoft worker. I really do. Every large company experiences growing pains. But Microsoft has been experiencing more than its share for the past decade or so. I think though, that its pain is almost over. Middle age doesn't have to be full of aches, pains, and complaints. It can be a time of great and positive discovery. It can be a time of enlightenment. It can be the transitional and transformative time that Microsoft is now experiencing. 
 I think it's good that Microsoft is refocusing and reasserting itself as "One Microsoft". Microsoft was once the most powerful company on the planet led by the richest man on the planet. But that was a different time. Things have changed. Now there's cloud and big data and XaaS and consumerization. Yes, the dirtiest of all IT slanguage, consumerization. Since this blog is consumerization focused, I get the best opportunity to focus on that part of this transition. 
Why does consumerization come into play, you ask? It's very simple, you as a consumer, now have more power than ever before. Consumers can now shift a company from Fortune 500 to yesterday's news. You have to make people happy or they'll switch. Today, we have the power.
Microsoft now realizes that its power is gone, or at best is on the wane. No longer can it churn out products that we must love or lump. We can now choose. Sure we've always had a choice but never such good choices that we enjoy today.
Microsoft knew that.
And why not tighten the vise when you have one's victim's delicate parts in it? Anyone would. Although Microsoft took a good beating over doing what anyone would do. It took advantage of its top seed position, just as others have done in the past. But somehow Microsoft was a criminal for doing it too.
Now the tide has turned.
The old saying goes, "The customer is always right." And it's true. The customer is always right.
Apple has proved this. Microsoft had to learn it the hard way.
Unfortunately, the price of this lesson, and all lessons, is very high.
The consumer now drives the market, not the vendor. You probably think that the market has always been consumer-driven. You'd be wrong.
It's the same lesson that Russia learned. One choice is not enough and quality does matter. You can't give people what you want to give them and expect loyalty or happiness. You have to give people what they want.
And the all-powerful consumer is a fickle beast.
This is where it gets "weird".
Do you remember when Blackberry was the "must have" mobile phone? I do. I had one and thought it was the greatest mobile device the world had ever seen. It was ahead of its time. Then the service took a couple of big hits and the fickle consumer jumped to other technologies almost over night. Now the company struggles in the single digit market share range. FYI, Blackberry, in my opinion has addressed its issues and is well worth another look, but that's another story.
Now Microsoft has to compete with Apple, a host of mobile device vendors, and itself.
Yes, itself.
It sounds crazy but Microsoft has committed the ultimate crime: competing with itself.
Windows XP was too good and Microsoft decided to support it for too long. Vista didn't have the uptake expected because of its too soon release and a myriad of problems. Windows 7 was the savior that rescued us from Vista but still XP hung on. A lot of people still use it, while others have only begun to convert to Windows 7.
And now there's Windows 8. Corporate uptake of Windows 8 might never happen. Once the Windows 7 conversions are fully realized, businesses might wait until Windows 10 to consider another major cutover. So, in the meantime, what does Microsoft do with Windows 8 or Windows 9?
One answer is to change support policy. Provide full support for an operating system for five years and extended support for two more. Seven years is long enough with one operating system. No company should be held over the fire for a decade or more for a product that should have been replaced years ago.
The alternative is for Microsoft to only create a new operating system every seven years, charge more for it, charge more for support or change its model completely to one of support tiers.
It might work something like this:
  • Microsoft builds new operating systems every seven years and offers ten years of support, which gives companies that three year transition period they often need.
  • Microsoft gives away its operating system software or charge a subscription for use. Crazy I know but wait, there's more.
  • Setup tiered support for individuals, SMBs, and Enterprises that allows companies to pay for support on an annual or on a per incident basis.
  • Only provide updates and patches for those who subscribe. Of course, certain critical patches would have to be made public to address major security issues with applications but not the operating system itself.
  • Provide its own Microsoft-branded virtual desktops and servers to companies and individuals via subscription. All patching and updates would be handled from the data center and not left to the individual user or company.
I rather like the idea of subscribing to a desktop that I can use from anywhere and at anytime I choose. And the idea of a virtual infrastructure that's owned and supported by Microsoft appeals to me as well.
Microsoft must change its business model to meet the new consumer paradigm. Allow me to use a Microsoft desktop and servers from any device. Microsoft owns their own cloud that I subscribe to. I like it. Bizarre, yes. One Microsoft, definitely.
What do you think about Microsoft' restructuring? Do you think that they're playing catchup or is there something bigger brewing? Talk back and let me know.
MS Cloud background image used with permission from Meghan D. Cox. I placed the MS logo on top of the original image.


Wednesday, June 19, 2013

It’s Beyond Ridiculous That Email (But Not Mail) Has Been Left Out of Privacy Laws


  • BY KEVIN YODER, TOM GRAVES, AND JARED POLIS
As with so many significant privacy violations of late by government agencies — from the NSA to the IRS — it’s become clear that technology has far outpaced law. Federal laws meant to protect our Fourth Amendment right “to be secure in [our] persons, houses, papers and effects, against unreasonable search and seizure” do not adequately cover Americans’ property online.
Especially email. Under current statute, government agencies such as the IRS, DHS, SEC and many others are allowed to access emails and other private communications older than 180 days without obtaining a search warrant or demonstrating probable cause that a crime has been committed.
How is it possible that government can claim this authority, accessing our most intimate “soft” communications — but not, say, a “hard” letter lying around our houses?
The reason is the Electronic Communications Privacy Act (ECPA). Originally intended to protect — not violate — the privacy of our digital communications, this act set standards for government access to private information (such as emails, private photos, documents) transmitted and stored on the internet with an online service provider.
But ECPA was passed in 1986. Twenty-seven years ago, most Americans did not have a home computer or an email account. They did not all carry cell phones. “Facebook” described only the hardbound photo books of university freshmen and “Twitter” was an adjective used to describe the chattering of birds — such social networking sites did not even exist.
Whether they occur online or offline, our private communications should be protected. And that’s why we, a bipartisan group of representatives — Kevin Yoder (R-Kansas), Tom Graves (R-Georgia), and Jared Polis (D-Colorado) — have come together to introduce the Email Privacy Act. We’ve already gained a bipartisan group of 94 co-sponsors, and are pleased to join with our colleagues in the Senate, Senators Patrick Leahy and Mike Lee, who are pushing companion legislation that would modernize the ECPA.
Simply put, this bipartisan legislation would affirm what most Americans already assume — and have every constitutional right to believe — that their privacy is protected from unwarranted government intrusion.
The Email Privacy Act updates legislation written in a time when server storage was limited. Back then, an email user was expected to permanently download his or her email locally from a server for reading, response, and long-term storage. So the 180 day rule made sense, because email left on a server for that long could be reasonably viewed as abandoned. But that’s not the case today with people accessing and storing years and years worth of email through third-party servers.
Fundamentally, the Email Privacy Act would ensure that the Fourth Amendment protections Americans already have for mail, phone calls, and other paper/ hard documents are extended to their soft communications too. Specifically, our legislation updates ECPA by strengthening privacy protections for electronic communications stored by third party service providers such as Amazon, Dropbox, Facebook, Google, Yahoo, and countless other cloud services. If government agencies want to obtain any of these communications, they would first need to obtain a warrant from a judge — not their self-anointed authority.
The constitution prohibits the government from accessing personal files stored in a cabinet or letters sent through the mail without a warrant. When the telephone was introduced into mainstream culture, our laws changed to protect the privacy of calls using such technology. But even though email is ubiquitous today, such electronic communications don’t have the same privacy protections as the — arguably far less used! — mail and landline phones do.
This is a real issue and must be addressed; Congress needs to act now to update our laws through the Email Privacy Act and reign in any overreaching by government agencies. It’s ironic that we have benefitted tremendously from technological innovations and advancements such as smartphones and always-connected networks but that our laws have not kept pace with the privacy realities of the 21st century.
Still, Americans deserve to have a reasonable expectation of privacy … despite what the NSA, IRS, or other government agencies believe.

Sunday, May 26, 2013

The ISS Has Ditched Windows Entirely--For Linux

International Space Station switches from Windows to Linux, for improved reliability...

Original article available here.

The United Space Alliance, which manages the computers aboard the International Space Station in association with NASA, has announced that the Windows XP computers aboard the ISS have been switched to Linux. “We migrated key functions from Windows to Linux because we needed an operating system that was stable and reliable.”


In specific, the “dozens of laptops” will make the change to Debian 6. These laptops will join many other systems aboard the ISS that already run various flavors of Linux, such as RedHat and Scientific Linux. As far as we know, after this transition, there won’t be a single computer aboard the ISS that runs Windows. Beyond stability and reliability, Keith Chuvala of the United Space Alliance says they wanted an operating system that “would give us in-house control. So if we needed to patch, adjust or adapt, we could.” It’s worth noting that the ISS laptops used to run Windows XP, and we know they’ve been infected by at least one virus in their lifetime: in 2008, a Russian cosmonaut brought a laptop aboard with the W32.Gammima.AG worm, which quickly spread to the other laptops on board. Switching to Linux will essentially immunize the ISS against future infections.

The laptops that were upgraded belong to the station’s OpsLAN. The crew use the OpsLAN to perform day-to-day activities, such as viewing stock inventory, controlling scientific experiments, or checking their current location. Presumably the laptops used to run bespoke Win32 apps on Windows XP, and now those apps have been re-written to work on Linux — hopefully they’re not being emulated in WINE. To get the astronauts and cosmonauts up to speed, they will be trained by the Linux Foundation.

To be honest, we shouldn’t be too surprised at the ditching of Windows. Linux is the scientific community’s operating system of choice. CERN’s Large Hadron Collider is controlled by Linux. NASA and SpaceX ground stations use Linux. DNA-sequencing lab technicians use Linux. Really, for applications that require absolute stability, which most scientific experiments are, Linux is the obvious choice. The fact that the entire OS is open source and can be easily customized for each experiment is obviously a very big draw, too.


In other news, the first humanoid robot in space, Robonaut 2, which also runs Linux, is due for an upgrade soon. Robonaut 2 (pictured above) was delivered on Space Shuttle Discovery’s final mission in 2011, and at the moment it’s just a torso with two arms — but later in 2013, some climbing legs and a battery pack should be delivered. The ultimate goal is to see whether humans and robots can operate peacefully in zero gravity, with Robonaut eventually performing menial tasks (vacuuming, changing filters), and possibly dangerous tasks during space walks, too.

Now read: Windows 8 may drive me to Linux

Saturday, May 25, 2013

Thursday, May 23, 2013

Malware fight goes public on the wed

The original article by Ben Grubb (SMH) goes on to outline the numbers of Australian computer IP numbers that were found to be infected by Bot's and Trojan malware. For the lay-people... you are assigned an IP address when you access the internet via your ISP. Malware signatures can be detected by the 'packets' of information your computer sends and receives.

Please don't be fooled by tele-marketers telling you you are infected, you may be, but they only want remote access to your PC in order to plant malware of their choice, and to get you to pay them for it.



The Government would like the ISP to contact their users and offer assistance to remove the infection from the end users PC. This however is a BIG ask and can be quite difficult.

The ACMA (Australian Communication and Media Authority) have published a page that outlines the statistics daily - click here for that page. The page details the total numbers and type of infection that it has detected.

I have listed the malware variants (outlined by ACMA) below:

1. Zeus targets Microsoft Windows machines. It does not work on Mac OS X, or Linux.
2. Conficker Exploits the Windows Server Services.
3. IRCBot affects Microsoft Windows XP Professional SP2.
4. Ramnit only infects Windows. Mainly known for spreading via USB devices.
5. Mebroot infects all Windows O/S'.
6. Virut infects all Windows O/S'.
7. Rootkit TDSS infects all Windows O/S'.
8. Flashback is a virus that infects Apple's OSX.
9. Sality infects all Windows O/S' and spreads through Windows networks.
10. Slenfbot infects all Windows O/S'.
11. Festi infects all Windows O/S'.
12. Cutwail infects Windows XP, Vista and 7.
13. Kelihos infects all Windows O/S'.
14. Waledac infects all Windows O/S'.
15. Nitol Botnet, interestingly, came installed in Windows PC's manufactured in China. Meaning it was installed at the factory.
16. Spyeye infects all Windows O/S'.
17. Lethic infects all Windows O/S'.
18. Darkmailer infects all Windows O/S'.
19. Trojan Pony - Found inside Pirated Apple & Windows versions of Adobe Illustrator CS4.
20. Dorkbot infects all Windows O/S'.
21. Pushdo infects all Windows O/S'.

Only two are capable of infecting Apple Mac computers the rest will infect all Windows operating systems. None quoted affect Linux.

Particularly interesting is 'Nitol' came pre-installed on some PC's manufactured in China. Clearly this is a real worry. The other worry is that pirated versions of software from Adobe (Illustrator CS4) came with the trojan Pony. The CS series of Adobe products are so expensive ($1800 approx) that people without the ability to buy them were forced to install pirated versions. I prefer to encourage people to use 'Open Source' instead. A good example is Gimp. Possibly not as comprehensive as Illustrator but how much do you need... really.

Flashback uses a well known exploit. It tricks the user into thinking that it is a real Adobe Flash player and asks the user to authorise it's installation. Seems Steve Jobs had good reason to disallow iPads from using flash. Unfortunately Flashback will infect Apple Macs.

So what do you do?

From my experience (if you are a Windows fan) you need to start from a clean operating system. Installed from an 'original Microsoft' disc. Even if your PC is pre-installed... format it and install from the original disc. You will not have the 'Bloat-ware' installed by your PC manufacturer. You should also be able to install the appropriate drivers from the manufacturer's disc's. If the manufacturer does not supply the disc's choose a different manufacturer's PC. Many of the cheaper Chinese PC's don't come with original disc's. Stay away from those. Once you have a clean PC, install a good virus scanner. My choice would be Avast, available here for free.

If you already have a PC (or more), and want to use a cheap PC but also want to be safe... format them and install Linux instead. Linux Ubuntu is my choice but Linux Mint is also a favourite as it is the most similar to Windows XP in it's interface. You will not require a drivers disc as they will sense your hardware and install the drivers automatically during the installation process. Both have support for all your Windows document/image/music/video formats and are the easiest to use for beginners. Both are also perfect of corporate desktop applications as they support Windows RDP sessions and VPN connections to Windows Servers.

Drop me a message on Google+ if you need help/advice.