Академический Документы
Профессиональный Документы
Культура Документы
April 2009
Issue 109
Upgrade, sit
back and relax,
All of a Twitter,
Fickle Trojans,
IT trends for
2009, Microsoft
RoundTable
coopsys.net
Overview of
InfoBulletin
CONTENTS Viewing IB
(online
versions only)
*** NewsBytes *** View IB Digital
Book editions
Subscriptions
1. Upgrade, sit back and relax Implementation
2. All of a Twitter Privacy policy
Contact
3. Fickle Trojans Details
4. IT trends for 2009 Archives &
index of issues
5. Microsoft RoundTable
6. Q&A: How do I destroy old data tapes? coopsys.net
Services
Clicks of the Trade - save PC power with Approach
single key InfoBulletin
About us
Contact Us
Popular editions
May 2008 Outlook Time Recording: Journal, Video to ruin your ISP? Zoho: software at your service, OCR tips, BGInfo,
How to audit my PC?
August 2008 Risky business, Salesforce review, SteadyState manages multi-user PCs, Do you really need a web site?
June 2008 Time Recording: Outlook Times plug-in, Windows Server 2008 storage, data protection, Convert PDF
documents into Word format
^ Back to contents ^
Interim Finance Director, Michael Tucker describes how they gradually outgrew their existing IT
support. "The use of IT has increased dramatically in the past three years at the Geffrye, along
with many specialist IT applications, such as an on-line picture catalogue, including a
comprehensive collection and image database, interactive web-site, bookings database, mailing
database, building maintenance systems and security and alarm systems."
Engaging their existing supplier in a strategic and advisory capacity, they went through a
comprehensive review and consultation process. Tucker continues, "We wanted to identify IT
support suppliers who not only had the technical staff and capacity to maintain and improve our
systems, but who empathized with the aims and culture of the staff within the Museum. We felt
we knew what needed to be done."
The comprehensive IT management package was to encompass more comprehensive desktop and
facilities management support, an infrastructure review, a support service via email and
telephone, regular on-site visits, additional security measures, and upgrades to email software.
Positive feedback from users attests to the success of the assignment so far and the absence of
spam is freeing up time for users to deal with incoming email productively. "We have regular
facilities management visits to check things like the backups are working and to resolve small user
issues", says Tucker. "The staff are now familiar with the IT engineers and have developed a good
relationship with them."
The IT upgrade is thus a mix of the old and the new, an appropriate reflection of the institution in
which it resides, where period rooms adjoin the contemporary wing and the latter is surrounded
by an award-winning walled herb garden, sitting alongside a series of period gardens.
-IB-
^ Back to contents ^
2. All of a Twitter
Raise money by chatting? It's every campaigner's dream and the current frenzy is
happening on Twitter.
Twitter ye not?
e-traders pushing magazines and online products - InfoBulletin is no different and jumped
unceremoniously on the bandwagon this year with its own IB trail at
twitter.com/InfoBulletin
journalists and media brokers flagging up hot news or fanning their egos "finishing a big
piece on digital media", "just about to do interview on Today"
URL shorteners
http://thelongestlistofthelongeststuffatthelongestdomainnameatlonglast.com/
wearejustdoingthistobestupidnowsincethiscangoonforeverandeverandeverbutitstill
lookskindaneatinthebrowsereventhoughitsabigwasteoftimeandenergyandhasnorealpoint
butwehadtodoitanyways.html
Stunningly there are now over 90 over these URL snipping services to choose from; mashable.com
makes an admirable fist of trying to list them all: http://sn.im/do9zk.
Of course it's the journalists in the crowd to whom headlines matter and whose experience with
succinct sentences is a good match for Twitter.
Identity can be a problem on Twitter; how do you know who is who? For
instance:
However there doesn't seem to be much doubt about who is doing the talking
at Number 10, with over a quarter of million hanging on its every word.
A while back, journos postulated that One's Blog might one day appear on the
web. In the meantime twitter.com/one has been taken (and it doesn't look like
the musings of HM's private secretary) so it must be twitter.com/thequeen, if
you can believe it. No tweets here at the time of writing, despite 300 watchful
subjects. One's lips are clearly sealed.
Tweeting resources
The nfptweetup wiki lists good bullet points and links about Twitter aimed at not-for-profits,
and appropriate uses such as fundraising.
Useful post and slide presentation by Ed Walker, "How not for profits can use twitter"
Let someone else do it. twitterfeed.com scoops up your blog posts as often as you wish and
Twitters them for you
More twits than you can handle - update 30+ other social networks on http://ping.fm/
-IB-
^ Back to contents ^
3. Fickle Trojans
A virus that removes other viruses? Nobody knows how it gets there, but friendly it
ain’t.
What you have built already exists and such a threat is the Trojan labelled Tigger.A.
It can escalate its privileges on a Windows PC and also installs a rootkit on the infected system,
thus activating itself even when the system is started up in Windows Safe Mode. Worse, nobody
knows how it gets there.
Tigger employs a battery of techniques including taking screen shots, spying on your browser
transactions, exporting passwords from your protected storage, monitoring a dozen popular chat,
email, and remote access applications, stealing web cookies, certificates and FTP and POP3
passwords. In terms of snooping, there's almost nothing it doesn't poke its nose into. With its
habit of delving into financial information, Tigger.A has been dubbed the 'Stockbroker Trojan'.
Conficker - no joke
Meanwhile another pernicious worm threat called Conficker (aka Downup, Downadup and Kido) is
due to hit again on 1-April. Exploiting a known vulnerability in Windows Server services
(Windows 2000, XP, Vista, Server 2003 and 2008, Windows 7 Beta). Conficker will launch a brute
force dictionary attack against administrator passwords to help it spread through ADMIN$ shares.
Once again further instructions are fetched by connecting to a remote server, which may include
gathering or propagating personal information or installing further malware. This is also another
piece of self-defending malware that can disable some of the tools used to detect and eradicate it.
With 30% of Windows PCs not having been fixed with a Microsoft-released patch from back in
October 2008, Conficker is reported to be one of the largest botnets around, infecting over 15
million PCs by the end of January 2009.
Conficker symptoms can include account security policies being reset, disabling a series of
services such as Windows Updates (thus preventing further security patching), Windows Defender
and Error Reporting Services, slow domain controllers and unusual network congestion.
Protection mechanisms are beginning to struggle with some anti-virus products failing to banish
threats like Tigger and Conficker at all, and the corollary to that is a complete (and expensive)
system rebuild.
Create and keep Ghost/snapshot images of PC setups, cutting down restore times from days
to minutes
Examine router logs and network traffic to seek out abnormal spikes
Contacts
Conficker Removal with MSRT (Microsoft Windows Malicious Software Removal Tool)
McAfee Avert Stinger removal tool, a stand-alone utility used to detect and remove specific
viruses
-IB-
-IB-
^ Back to contents ^
At a recent IT conference, keynote speakers outlined trends in two developing areas for 2009: one
on the forthcoming IT priorities for business and the other on virtualisation.
Euan Davis from Forrester Research kicked off with a clear message: the top
IT priority in 2009 is: "Improve efficiency", at least that's what they are
hearing from Forrester survey respondents.
This means:
Technical trends
In the long term, Forrester have generally seen a 10-year lead time on technologies. For example
the much lauded Application Service Providers circa 1999 are now finally coming of age in the
Help emerging Software-as-a-Service (SaaS) market. SaaS is starting to mature as vendors understand
at how to package it. Among Forrester clients, 68% had deployed one instance of SaaS. The current
hand. question: who is deciding their SaaS strategy?
Back
issues The Data Centre remains one of those elephant-in-the-room topics. Data centres in London are
just a struggling to find sufficient processing capacity as well as energy and power. As a result some
click hosting costs have actually gone up to limit demand.
away
Cloud computing will depend on
economies of scale and
economies of skill. Ensure your
skills match the trending areas.
The top three trends of maximising IT value, communicating IT's contribution and gaining
business value through process improvement are supported by the following assumptions:
2009 will see leaner businesses with some implementing significant IT budget reductions
Connecting cost to value will be a major theme
IT satisfaction in 2009 will decline for a while, perhaps inevitably, as bosses scrutinise the
business case more closely
Technology is still the foundation of the business, so CIOs and stakeholders will look for
value and less fire fighting
Virtualisation
John Charterhouse from virtualisation leader VMware reckoned in 20 years he had never seen an
economic case for environmental savings as compelling as consolidation. "The green stuff comes
for free".
One of the driving forces will be the killer disaster: Of those businesses that experience a disaster
and have no emergency plan, 43% never reopen; of those that do reopen, only 29% are still
operating two years later. (Impact on U.S. Small Business of Natural & Man-Made Disasters.
Presented by HP and SCORE).
Among its many advantages, virtualisation can provide a temporary test environment for new
applications, for example trying out a new CRM database, or remotely accessible document
library. Creating a virtual server instance on existing hardware saves down time or buying another
server.
Because a virtual machine (VM) is just a file (or bunch of files), it/they can be moved between
storage media by various replication methods, so disaster recovery (DR) becomes much easier.
For the first time it is possible to test a demonstrable DR plan inexpensively to managers; a big
plus when no extra hardware has to be purchased!
Virtualisation allows us to assign new priorities to applications, perhaps on the basis of CPU
performance or memory availability, rather than installing on hardware with relatively static
performance limits.
It is also easy for IT departments to deploy desktop images quickly, examples being library kiosk
terminals, a power user setup, the basic office user's desktop. The abstraction layer takes away
the uncertainty of drivers and hardware in such deployments.
Mirrored fault-tolerant VMs with low performance overhead are coming too, behaving like RAID
does for disc storage, only for a whole server running live. As one server fails, it automatically
creates a new mirror on next available hardware.
Data centres are no longer vast warehouses. You may not think you own a data centre, but with
many organisations now maintaining a typical trio of servers for mail, documents a database, or
even a blade server you're already in the DC league.
www.vmware.com
^ Back to contents ^
5. Microsoft RoundTable
Absence makes the heart grow fonder, but now you can all be together - without actually being
together. Microsoft presents video-conferencing made easy.
Help
at
hand.
Back
issues
just a
click
away
RoundTable is designed to work with Microsoft Office Communications Server 2007 or Microsoft Office Live
Meeting. It presents remote meeting participants with panoramic video of everyone sitting around the conference
table, fairly comparable to being in the room itself. The 'super widescreen' camera resolution of 3700 x 600
pixels gives away its panoramic credentials (1056 x 144 pixels for video).
A green cost-saver
Contacts
-IB-
Email* Org
^ Back to contents ^
Hi Mark,
Question
We have a number of data tapes from
our older tape drives. I would like
Mark
them destroyed and to get certification
to say they have been destroyed. Do
you know of any companies that can
do this for data tapes?
A few companies that destroy tapes (and other data media such as hard drives or CDs) safely
and securely came across our horizon recently.
Help
at London-Recycling.co.uk employs
hand. industrial fix-cut shredders to
Back destroy confidential waste such as
issues documents, printouts, microfiche,
just a tapes, diskettes, CDs and videos,
click and supplies an audited and
away detailed Certificate of Destruction.
-IB-
^ Back to contents ^
A really quick way of saving energy and electricity costs just by pressing a
single key!
However, just by
holding the Shift key
the Stand By option
changes to Hibernate.
Now when you click
Hibernate, the work
space is saved on to
disc and the whole machine is shut down, saving even more energy. When
you return, pressing the
power button, means the start up is quicker than switching the PC on from
cold.
You can read more about power settings and how to make the Hibernate
action into a desktop shortcut in this Q&A about Sleep mode.
Related keys
Don't forget the Windows key+L key combination will effect an instant
logout for desktop security in a hurry, assuming you've set a Windows
password!
** try it now **
-IB-
Printing IB
If you prefer to read IB on paper (hopefully recycled!), think Privacy
about pulling down the File | Print Preview menu in your Under no circumstances does Co-Operative Systems supply lists
browser and just printing the sheets you want. of customers to other organisations. Read our Privacy Policy in
full.
Implementation
InfoBulletin topics can be implemented by Co-Operative Systems
on a chargeable basis or via Facilities Management (FM) for those
with rolling work programmes.
Read recent and past issues of InfoBulletins on the Web at www.coopsys.net/ibindex.htm or search our
archives and subject index.
We hope you found InfoBulletin useful! If you would like to comment on any of the articles or request
particular subjects to be covered, mail us here.
CO-OPERATIVE SYSTEMS