Thursday, October 20, 2011

iPhone 4S upgrade and first impression review

I love stuff that just works and usually the iPhone ticks those boxes for me. So, naturally, I ordered an iPhone 4S 64Gb the same day this was possible. This is to upgrade from my iPhone 4 32Gb. The three things that excited me the most were Siri, having plenty more storage and the improved camera. Faster is nice but I did not find my existing phone to be slow.

Today my phone arrived and I decided to try 100% wireless restore. I.e. not plug in to my computer with iTunes and only restore from the latest iCloud backup. I was amazed at how well it worked. All I had to do was switch my SIM over to the new phone and put in my wifi password and apple account details and in minutes it was ready to start being used.

The first thing I had to do after that was enter a new lock screen PIN, which it prompted me to do. Then it asked for my apple id again (not sure why it did not use what I entered earlier). Then it prompted me for some Google Apps accounts passwords so I had to set up some new application specific passwords. This re-entering of passwords I have seen before when going from a 3GS to 4. It seems the backup keys the passwords against the hardware for security. Makes sense.

To set up the application specific passwords I had to use the Google Authenticator app. Unfortunately at this point it has not finished downloading and installing all the apps. So I clicked on the app and it jumped to the front of the download queue. A moment later I ran it only to find it had not copied over the 2-factor account details, of which I have 5. Mildly annoying. I guess it’s the same reason as the passwords; security. So I had to choose SMS me the number and I was in. I will finish setting up the authentication later.

But that was about the only niggle I had. All the settings for everything has migrated, all apps, all icon positions and folders, all messages, all pictures - even my open safari tabs, my tiny tower, and my cut the rope progress! Very slick.

I tell you this cloud stuff. It’s the future man! LAN is so last millennium.

Next I wanted my music and went to the wireless iTunes sync. It said... To sync music wirelessly... plug in... and choose wifi sync. Oh well. After I had done that it started to copy them over automatically, via wi-fi. This was taking some time so I just plugged it back in again and let it copy over at USB speeds.
I wanted to play with Siri, so I turned it on and had the following conversation:

“What time is it?”

“It’s 8pm”


"Will it rain tomorrow?"

"There is no rain forecast for Southampton tomorrow."


"What time does my last appointment finish tomorrow?"


"Your last appointment tomorrow ends at 5.30pm."


“What should I buy my wife for Christmas?”


“Sorry, I don’t understand “What should I buy my wife for Christmas?”, shall I search the web?"


"Why not?"

"Why not what?"


“**** ***”

“Sorry I don’t understand “4Q””

“**** ***”

“Daniel, I don’t understand “4Q””

“Now you’re getting cheeky!”

“If you insist.”

“You’re funny!”

“Ha! I’m glad you think so.”



I am going to have so much fun with this!

I tried the camera in a fairly low-light situation and it seems still very grainy but not quite as bad as previous phones. I have yet to try it in the daylight.

So, first impressions are good.

Wednesday, September 28, 2011

Are Sys Admins and Network Managers Police Persons?


Having spent the last eighteen months in the IT security business (I'm originally a tech marketer from the imaging industry) I'm constantly surprised at the range and responsibility of the jobs Network Managers and Sys Admins are required to undertake - especially those that work in education with all the attendant responsibilities that looking after other peoples' kids entails.


A recent post caught my attention about qualifications in e-safety for those hard-pressed information system plumbers - I don't mean that in a disparaging way either to plumbers or techs - if the information stops flowing, starts leaking, gets backed up ... do you have the skills, knowledge and stomach to unblock the u-bend? - I certainly don't.


I digress - back to the post from the BCS - their core premise is that e-Safety should be taught as a part of the national curriculum (I agree) but there hasn't been a structured way to teach it (I agree) and that the IT department usually ends up having to carry the can for a myriad e-safety problems and incidents (I agree).


To quote The BCS directly:  "You wouldn’t send someone who came into a school with a knife to the design technology department, but with internet issues, people usually get directed to the IT department - and the issue is bigger than that."


The creation of a structure to teach e-safety to our kids can only be a good thing - especially if it's delivered by properly qualified teachers.  The reclaiming of the teaching environment from the techs by continuous education of all teachers in IT related subjects (not just as 'users' of tech) is an important step in this process.  


This also raises the issue of where responsibility (and accountability) lies in hard-pressed schools and LAs for delivering e-safety (and the attendant tech paraphernalia that it requires).  In the eyes of the law it's pretty clear (teachers, employers and Governors) but in practice it all seems to be all over the place - with the IT function getting dumped on because it's 'computer or internet related'. If you read some of the threads in Dr. Brian Bandey's e-Safety Law in Education LinkedIn group they illustrate the complexity of this evolving problem. 


So - going back to the title of this piece - Are Sys Admins and Network Managers Police Persons?  In my personal opinion they should be exactly that - they should provide a safe infrastructure on which to base education.  They shouldn't be considered as policy makers, judges or arbiters of standards just because a computer is involved in the process.  These functions lay with the educators, policy makers and legally accountable members of the education community - who (again in my personal opinion) should step-up to the challenge and properly understand some of the (seemingly transparent) technology that they currently use and rely on to keep them out of the law courts.













Thursday, September 1, 2011

Smoothwall at TechMesh EXPO

Our friends at TechMesh are putting on a regional showcase of IT & Telecoms talent to showcase the region’s techie assets - and we'll be there!  The all day event, which is being held at the Royal Armouries in Leeds on the 13th October should prove to be a worthwhile day out with some interesting speakers lined up.


To add to the fun we'll be doing our thing demonstrating our latest tech in the Interactive Zone - a sneak preview of our pitch >>>


Social Notworking - Who's coming to work to play?

  • How to see exactly who's doing what and when on your time and network?
  • The Dangers of Web 2.0
Web Filtering - Why Bother?
  • What web filtering really means and how doing it properly benefits your business?
  • How do you filter the web?
  • What are the key technical benefits
  • What are the productivity benefits
Protecting yourself, your business and staff from web borne threats
  • Malware vectors - it's not just email viruses
  • What can happen after an e-safety incident
  • Cost of fixing the damage
  • Legal implications
We think that the expo provides an insight into how the world of technology is changing - and that Yorkshire and Humber have a great deal to offer the world techwise.


In summary - the guys at TechMesh have put together a great programme of over 40+ exhibitors; a techpanel – a seasoned panel of experts; an interactive zone where visitors can watch, listen and play with the very latest in technology and a SME surgery for one to one advice from industry experts. There will also be members from all the local business groups milling around - so the networking opportunities will be fantastic.


Date: Thursday 13th October 2011
Time: 9am – 4.30pm
Venue: Royal Armouries, Armouries Drive, Leeds, LS10 1LT


Cost: FREE please visit http://techmeshexpo2011.eventbrite.com/ to register

Monday, August 15, 2011

iPad 2 vs Chrome Book

I’ve had an iPad 2 for a few weeks now and I love it. I’ve had a Chrome Book for a week now and I like it. There you go, that is the conclusion of the review. But not quite. There is a lot of cross over in functionality between the two devices, such as apps, email, web, Facebook, etc, however they both lend themselves to different scenarios.

The Chrome Book has two key features missing from the iPad;
  1. Multiple user accounts
  2. Chrome web browser
Multiple user accounts is, IMO, vital for a shared device - not just security but also convenience. I love how the log in (almost) seamlessly integrates with Google web applications and things like Google Cloud Printing. I say “almost”, because a couple of times I have had to enter a password when I would have expected it to know I was already logged in with that Google account.

The Chrome web browser is, without doubt, the best web browser by far and allows full access to all the modern web features like Google Docs and Facebook. The Facebook app on IOS is OK but to get full functionality requires the web version. Google Docs is very very cut down on IOS Safari - so as to be too limited for anything other than the most basic note taking, unless you just want to read a document in which case it’s perfectly good. This review is being written using Google Docs on the Chrome Book.

The Chrome Book is missing a major application though; Skype. This will be a show stopper for some people. The iPad does not have a proper app, only an iPhone app but it works well enough. There is always Google Video but it’s just not got the market penetration. Google chat can also now make actual phone calls like Skype.

My father was able to log in and use the Chrome Book fairly easily but then complained when he was unable to write in French in Gmail as there is no way that he or I could see to enter letters such as e-acute. I ended up writing the email in Docs in English then translating to French then correcting the French then copy and pasting in to Gmail. My father reverted to his iPhone for further French emails.

The Chrome Book has a proper keyboard and tracker pad and a reasonable resolution screen. I also have a keyboard stand thing for my iPad. They are similar in use. I find myself wanting to touch the screen on the Chrome Book instead of use the pad as it would be quicker.

The Chome Book boots in about 5 seconds and it almost takes me longer to type my password than it takes to go from login screen to being 100% ready to go. And I don’t mean the Windows-pretend-you-have-the-desktop-but-actually-come-back-later-after-a-coffee. So both iPad and Chrome Book are ready to use instantly without being concerned about booting.

I’ve just been on holiday for a week and mostly used the iPad and Chrome Book rather than a PC, but today I was back at work and within minutes of using my Windows 7 desktop PC I was frustrated with “Window is not responding” and other crap like the AV telling me it needs to update then when I shut down Windows it had 13 updates to install. Bah! I tell you - things like the iPad and Chrome Book are the future. People won’t put up with this for much longer. That said, I won’t be giving up my Windows PCs for a long time until good games like Portal 2 and WoW work on these devices.

The Chrome Book has multiple external storage options and expansions but the iPad has none. I’ve not found I needed this though.

The Chrome Book runs a little warm for my liking. Mine is a Samsung Chromebook Series 5 and according to top has 4 cores. After a few mins a small fan starts up and pumps out hot air on the left. That would be nice in winter but in the summer it made me put it on a table not my lap. The iPad only gets warm from my hot sweaty hands.

In terms of speed, the iPad seems just a little bit faster. Both can play HD youtube no problem or anything I throw at them. But I think the iPad cheats by only doing one thing at a time where as on the Chrome Book, all the tabs are running at the same time.

Both have similar and very long battery life. Hours and hours of usage.

I was able to get the VPN on the iPad to work straight away with my Smoothwall firewall but the Chrome Book is currently missing this functionality although this is due out soon.

IOS does not support much in the way of automatic proxy settings and is quite picky with the proxy.pac URL in that it has to be a fully qualified address. So for visiting iPad users you will need to use transparent web filtering. I’ve not tested the Chrome Book yet.

The Chrome Book has no integration with my Apple TV (as you'd expect) so when I find something interesting or want to view it on the TV, I can't.

My iPad is configured for remote wipe via Google Apps and MobileMe. I've not found a remote wipe option for the Chrome Book yet, but I'm also not storing anything on it.

If I had to keep just one device - it would be the iPad. It does nearly everything and I hope one day it has a better browser. I am keeping both though!

Chrome Book is ideal to give to one’s parents who keep having to reinstall Windows because they get a virus or don’t update. Fully automatic updating in the background. Love it. Chrome Book is more secure and appropriate for a work place. iPad will keep being useful in a car when travelling and where there is no wi-fi.

iPad is for fun and a little work. Chrome Book is for work and a little fun.

Wednesday, July 27, 2011

Reverse Image Search

Google have recently launched a new set of reverse image search functionality for their image search service. For the uninitiated, “reverse” image search allows you to use an image as the jumping off point for your search, instead of boring textual keywords.

And why exactly would we want to do this? I can think of a few reasons:

In the simplest case this can be a more interesting, or intuitive way to image search.
Perhaps you find a 5 year old JPG in your home area and you just can’t remember where it came from. Maybe Google remembers?
You need to find a HD version of your desktop wallpaper for that shiny new monitor. No problem...
Maybe you’re a rights-holder trying to track your own images. You wouldn’t be the first.
Being scammed by online dater fakers? Reverse search that profile picture - oh yes, that *is* Pierce Brosnan.

Now this isn’t an entirely new idea, an early player in the game was TinEye. TinEye are still operating and hopefully they’ll stay around some more, giving us double the image searching fun.

Google’s new functionality comes in two pieces.
At the core is ‘Search by Image’ within Google Images. Using the search query box, you can now choose to search with an image of your choosing. This can be a link to an image available on the web, or you can upload one from your local machine. Browser permitting you can even drag and drop a file, which is cute.




As we can see the result set allows us to discover locations on the web where the desired image can be found. We can also specify a different size for the image and locate those too.
Google’s algorithm will make a best guess at the topic of your search and this “trail” can be followed in the normal way - using the suggestion as a search term.

Further down the page we find the second part of the functionality, ‘Visually similar images’. This is where it gets interesting. We can now search around other images found to be similar to our input image. Effectively we can “bootstrap” the image search process with an image of our choosing. This is a great way to find something very particular, or something hard to spell, or indeed... pornography.



Clearly this can be used to find content without stating your intention in the form of keywords. For Corporate or Education networks this might be an AUP circumvention risk. Hence, filters must move with the times. Here at Smoothwall we’ve added a new category for Reverse Image Search services, as it may not be appropriate for all users. We’ve also worked to ensure Force SafeSearch, Search term filtering and Deep URL Analysis are compatible with Google’s latest developments.
Screenshot 2 was generated behind Smoothwall Guardian, demonstrating those features. Just for fun, here’s a screenshot using A. N. Other web filter...

Note: Censored to be (semi) safe-for-work.

Monday, July 25, 2011

Security? Turns Out It's Not That Difficult!

This afternoon, I was sent a link by a colleague to some useful information. The Australian government - specifically the Department of Defence "Defence Signals Directorate" (cool department name winner, 2010-2011 season) - have tastefully tabulated a bunch of targeted phishing mitigation techniques, along with their effectiveness, and various metrics indicating how hard these techniques are to apply. Check out the table here.

So far, so good - the interesting thing, however, is how some of the simplest advice is the most effective. For example, keeping your regular users from having administrative privs is rated as an "excellent" defence - and these days, is relatively easily done, as most software is well behaved with regard to needing to run as admin. Where desktop software vendors could make our lives easier though is keeping up-to-date on things like Java, Acrobat, Flash and company - Microsoft Update does a decent job... but something integrated and simple for other software might help use institute another "excellent" defence more easily.

I would imagine that this advice applies as well to other kinds of attack - this document being fairly specific to targetted phisning attacks - as they use similar vectors. Probably having up-to-date antivirus would make up a couple of notches and email whitelisting might not get an "excellent" if we were looking at a more general case. Still, it's worth a read, just to get the little grey cells working in a security type way for a few moments!

Sunday, July 3, 2011

Account security when visiting other peoples’ computers and the additional danger of federated authentication - use Incognito!

You know when you need to access your email or a document or look up information on a CRM but you are not on your computer? Perhaps it’s a colleague's or a customer's PC. Have you ever considered that you may be leaving passwords or cookies which would allow them access to your personal or company secrets on that computer? Often closing the web browser’s window or clicking ‘Do not remember password’ is not enough - there could easily be authentication cookies left around. You might, accidentally, allow the browser to remember the password. In addition, federated authentication makes this even easier to leave yourself logged in.

I’d like to make a bold statement;

The level of knowledge a person is required to have, right now, to be secure using modern technology such as web applications, is higher than even normal IT-literate users currently have.

I’ll give you an example. If you use federated authentication, then you may end up logged in to both what you expected to be logged in to and the authentication provider. E.g.. log in to Clarizen.net (just an example) by clicking the G button and put in your Google credentials. Now log out of Clarizen. You would think you were logged out - not so. Now go to mail.google.com. See that you are also logged in to Google. Did you realise that before now? I bet you did not.

The mistake that Clarizen are making is that they failed to realise that users expect single-sign-on and but also single-sign-off. The mistake users are making is not realising that single-sign-on does not mean single-sign-off.

The solution for Clarizen and others is to make their log out link redirect to the Google (or other) log out URL. I have recently used this technique with great success with an integration project. Naturally you will want to warn the user that it will do a full log out.

The solution for users, including me, is to always always always use an Incognito Window. Never log on to another user’s computer without using one. What this does is ensure that nothing gets saved on the computer (except downloads) - even if you accidentally allow it to remember passwords or save authorisation on the computer. Once you close the incognito window, all traces that you were there, cookies, passwords, user names, history, etc, are gone.

Incognito also allows you to browse knowing that there will be no history so that if you are looking for something online that you would not like your partner to see, your secret is safe. (I am thinking presents...).

Incognito is available in:
  • Google Chrome - Tool menu > New incognito window
  • FireFox 4 - Tools > Start Private Browsing (Ctrl+Shift+P)
  • Internet Explorer 9 - Cog menu > Safety > InPrivate Browsing
  • Safari - Edit menu > Private Browsing
  • Opera - Menu > Private Tab / Private Window
Remember though, it is only going to ensure nothing is left on the computer. If the computer is infected with a key logger and you’re not using two factor authentication, then your account is screwed anyway. Also, if the network admin is using a good web filter, such as Smoothwall Network Guardian, then he will know exactly where you’ve been - even if you tried to hide it.

More info can be found on this Wikipedia article.