• Articles and Books,  Mac Security

    CyberCrime vs. Drug Cartels

    Funny article (not really in a ha-ha way, moe like an ick way) about how online crime is supposedly now a bigger business than an international drug cartel.   http://connections.thepodcastnetwork.com/2008/10/04/connections-041-blocking-the-hacker-attacks/ If you want to fix the credit mess, start taxing hackers at hotel tax rates (15%) and have all that money be used to buy shares of the embattled credit giants.  This would infuse those companies with the cash they claim they don’t have to lend to ma’ and pa’ middle American while at the same time not causing each man, woman and child in this country to borrow $2,500 against our children’s deficit.  Now, I’m not saying that Cyber Crime “families” wouldn’t just steal…

  • Articles and Books,  Mac OS X

    Mac OS X for Unix Geeks

    Today I received a copy of Mac OS X for Unix Geeks from O’Reilly, for which I was the technical editor on.  Great read, especially for the *nix to Mac switcher.  Check it out here: Big pat on the back to Brian Jepson, Ernest Rothman and Rich Rosen for releasing a great new version of their book!

  • Articles and Books

    The Seven Wonders of the Internet World

    The Google Search Engine is probably the top wonder in the Internet world.  Why, because it’s just so friggin’ huge!  But, also because it involves Google Maps, is integrated with gMail and well, is just a better engine than the other’s.   Wikipedia – and don’t forget specialty wiki’s like http://starwars.wikia.com/wiki/Main_Page or even (as depressing as it may be) the wikia 90210 page. Social Networks – Facebook, MySpace, Classmates.com and LinkedIn – oh and digg and delicious too…  Social networks are today’s iteration of what we thought virtual reality would be.  They get better every year, with the exception of New Facebook, which isn’t actually as cool IMO as old Facebook.…

  • Articles and Books

    Steve Jobs Lives

    Since it’s the weekend, let’s leave the tech stuff out and just roll with something kinda’ funny – or not…  How creepy would it be to read your own obituary?!?!? http://gawker.com/5042795/bloomberg-runs-steve-jobss-obituary

  • Articles and Books,  Mac Security

    A Great Article on Sandbox by Beau

    In all versions of OS X previous to Leopard, access control restrictions were limited to a security model referred to as Discretionary Access Controls (DAC). The most visible form of DAC in OS X is in it’s implementation of the POSIX file-system security model, which establishes identity-based restrictions on an object in the form of a subject’s user or group membership. Similarly Access Control Lists are a form of discretionary control, though they are far more extensible and discrete then the POSIX model. In such models,  newly created objects or processes inherit their access rights based upon those of the creating subject, so that any spawned objects are not granted…

  • Articles and Books,  Consulting,  Network Infrastructure

    Network Terminology

    1000Base-LX/FX Gigabit Ethernet over fibre optic cable 1000Base-T 1000Mbps, All four pairs of Cat6 cable utilized at 250Mbps per pair 100Base-FX 100 Mbps Ethernet data transmissions over Fibre optic cable 100Base-LX Long wavelength fibre optic transmissions at 100 Mbps. 100Base-SX Short wavelength fibre optic transmissions at 100 Mbps. 100Base-T2 100 Mbps Ethernet running over two twisted pairs 100Base-T4 Four pairs of Cat3 or better cable. Transmits at 25Mbps on all four pairs. 100Base-TX 100 Mbps Ethernet running over twisted pair copper. Full duplex 10Base-2 Thin Ethernet, called thin net or coax 10Base-5 Thick Ethernet cable capable of data transmissions up to 500 meters. 10BaseT 10 Mbps Ethernet running over twisted…