I have another article up on the world webs. This one is on cloud use in small businesses, with IT Business Edge. Check it out at http://www.itbusinessedge.com/slideshows/6-ways-small-businesses-can-master-the-cloud-in-2016-08.html.
krypted January 20th, 2016
I published an article with VMblog.com with my (and Bushel’s) predictions for how small businesses will leverage the cloud in 2016.
In today’s increasingly mobile world, more and more small businesses are taking advantage of the cloud, as 72 percent indicate they use mobile apps in their business, with roughly 38 percent reporting they could not survive – or it would be a major challenge to survive- without mobile apps, says a recent survey report.
Given this trend, here’s a look at what cloud-connected small and medium-sized businesses can expect in the year ahead:
krypted December 17th, 2015
Who still says “like a boss?” I guess I did. Get over it. But don’t get over spam. Especially annoying are the ones we know we accidentally signed up for. Because it’s our own darn fault. But luckily, there’s a lot more tools for dealing with bulk mail (solicited or unsolicited) these days. Most modern email clients have the ability to deal with spam. Exchange/Office 365 has clutter and junk. You can build rules on sites. You can use spam assassin on your servers. But, there’s also a nice little app called unroll.me. Once you sign up you’ll have 3 ways of dealing with each message: request removal from a list, mark as rolled up into a single daily digest, or mark as good email.
Download it here. The app works a lot like something like Tinder. You swipe right to like something, left to not like something. Facebook should implement this into your timeline!
If you decide to mark emails as digests, you’ll get an email once a day that looks like this:
This works great for organizations that actually properly remove you from lists (which is surprisingly most). Using this swiping type of workflow, you can knock through 100 or more emails in 10-15 minutes. For organizations that don’t respect unfollow or stop sending me your crap emails, there’s also always just marking them as spam. The only problem with this is that you likely have a phone, a computer, a home computer, and maybe a tablet. No one wants to mark the same email as spam four times and then potentially have emails disappearing and not being able to figure out which computer they were marked as junk on.
There are lots and lots of options for this type of thing. But given the ease of use an quick evisceration I can do on my mailbox, I rather like unfollow.me. Give it a shot. You might hate it. I don’t.
krypted December 3rd, 2015
I am stoked to have been able to contribute a little to MacPrices.net on the introduction of the new iPad Pro. That article is here.
krypted November 11th, 2015
To properly go under the hood and hack around on a Samsung Chromebook 2, you’ll need to put it into developer mode. Whether using crosh or installing Chromium or other operating systems or just doing some pretty cool stuff, you’ll need to throw the thing into developer mode. Because you have so much control you should leave developer mode off when you’re not hacking around for security purposes.
Note: Before you switch back and forth, know that user accounts will be reset each time you switch.
Now, to enter developer mode, we’ll first go into recovery mode, using the Escape (ESC) and Refresh (F3) buttons on the keyboard when you press the Power button. When the Recovery screen comes up, use Ctrl-D to switch to developer mode and then when prompted, confirm and the device will reboot into developer mode (or dev-mode for the geeky). When you see the boot screen, wait 30 seconds to boot or just hit Control-D.
To switch back to normal mode from developer mode use the crossystem command followed by disable_dev_request and set that to one and then reboot. To make this a shell one-liner:
crossystem disable_dev_request=1; reboot
And that’s it. Happy hackin’!
krypted October 2nd, 2014
Before I post the new stencil, let me just show you how it came to be (I needed to do something, which required me to do something else, which in turn caused me to need to create this):
Anyway, here’s the stencil. It’s version .1 so don’t make fun: AWS.gstencil.
To install the stencil, download, extract from the zip and then open. When prompted, click on Move to move it to the Stencils directory.
Good luck writing/documenting/flowcharting!
krypted June 5th, 2014
Especially in environments with files in Google Docs, Dropbox, Box, Wikis, file servers, portals and any other place that makes it hard to aggregate exactly what you need.
krypted May 30th, 2014
Meraki has a syslog option. To configure a Meraki to push logs to a syslog server, open your Meraki Dashboard and click on a device. From there, click on “Alerts & administration”.
At the “Alerts & administration” page scroll down to the Logging section. Click on the “Add a syslog server” link and type the IP address of your syslog servers name or IP. Put the port number into the Port field. Choose what types of events to export. This could be Event Log, Flows or URLs, where:
Note that you can direct each type of traffic to a different syslog server.
krypted April 16th, 2014
Any time doing a migration of data from one IP to another where that data has a DNS record that points users towards the data, we need to keep the amount of time it takes to repoint the record to a minimum. To see the TTL of a given record, let’s run dig using +trace, +nocmd to turn off showing the version and query options, +noall to turn off display flags, +answer to still show the answer section of my reponse and most importantly for these purposes +ttlid to toggle showing the TTL on. Here, we’ll use these to lookup the TTL for the www.krypted.com A record:
dig +trace +nocmd +noall +answer +ttlid a www.krypted.com
The output follows the CNAME (as many a www record happen to be) to the A record and shows the TTL value (3600) for each:
www.krypted.com. 3600 IN CNAME krypted.com.
krypted.com. 3600 IN A 18.104.22.168
We can also lookup the MX using the same structure, just swapping out the a for an MX and the FQDN with just the domain name itself:
dig +trace +nocmd +noall +answer +ttlid mx krypted.com
The response is a similar output where
krypted.com. 3600 IN MX 0 smtp.secureserver.net.
krypted.com. 3600 IN MX 10 mailstore1.secureserver.net.
krypted January 23rd, 2014