• Oct 11
    2016
    Two years ago this month, I increased the frequency with which I write in this space about cyber security. October is National Cyber Security Awareness Month, and Logical Operations is a dedicated supporter of cyber security awareness, so the subject seemed a good fit for this blog. It still is. Since then, I’ve written about cyber security at least a dozen times. But the security landscape has changed dramatically in ...
  • Oct 06
    2016
    Last year in Quora (a question-and-answer site where questions are asked, answered, edited, and organized by its community of users), a member asked the question “How do hackers hack your passwords?” There was considerable overlap among the answers offered, but I counted ten distinct methods: keyloggers, RAT, malware, social engineering, SQL injection, HTML hack, dictionary attack, brute force, Java exploits, and shoulder surfing. I am not even sure what all ...
  • Sep 30
    2016
    In 2011, Wired ran an article titled “5 Reasons Why e-Books Aren’t There Yet.” It was a good article and fairly amusing: one of the reasons was that you can’t use eBooks to decorate your home(!). The article was good in 2011, but it was written from the perspective we all had when we were arguing over whether eBooks would replace regular books. That perspective has since turned out to ...
  • Sep 26
    2016
    Today’s PC server hardware was designed to run a single operating system, and it doesn’t matter how many processors or cores you have. This means most machines have a great deal of capacity going unused, and businesses hate waste. This is one of the reasons virtualization is so widespread in corporate IT. If you can run more than one operating system simultaneously in the same computer, you save on hardware ...
  • Sep 13
    2016
    According to a report published this summer by Kaspersky Labs, the use of ransomware cryptors is enjoying explosive growth. A ransomware cryptor is a piece of malware that infects your computer and encrypts your data. You have to pay the ransom to obtain the decryption key. Kaspersky Labs says the number of users attacked by cryptors increased by a factor of 5.5 over the last year, from just over 130,000 ...
  • Sep 06
    2016
    Instinct is the propensity of a creature to engage in a defined behavior when presented with a certain stimulus. Sea turtles, for example, are born on the beach, but once hatched, they make their way immediately to the ocean. They are newborns, so it’s not something they have learned; it’s just something they do. It is a procedure, engineered by nature over countless generations of turtles, that results in the ...
  • Aug 31
    2016
    Conventional wisdom suggests that cloud computing offers several technical advantages over traditional IT systems: scalability simplified management reduced maintenance increased reliability But let’s face it. The most powerful advantage isn’t on that list. What advantage is that? The bandwagon. As a trend, cloud computing is at a dangerous point for many businesses — the point that the non-adopters realize they are being left behind. This is when a kind of ...
  • Aug 23
    2016
    The message that IT pros need to understand cloud computing as a discipline rather than as a proprietary platform seems to be catching on. A recent article in InformationWeek titled “9 Cloud Skills IT Pros Need Now” suggests there are tools and technologies that transcend vendor-specific platforms. The article says IT departments need to master these tools and technologies even if they do no cloud development at all but are ...