tag:blogger.com,1999:blog-86281588495276745132013-10-03T21:16:49.660-07:00Innate IdeasWell, here goes nothing...Innate.ideasnoreply@blogger.comBlogger8125tag:blogger.com,1999:blog-8628158849527674513.post-86758096009589120072011-04-27T22:08:00.000-07:002011-04-27T22:08:00.334-07:00Simple online security for non-techies - If your PC can't find the bad guy site, it can't download bad guy softwareOn the internet the Domain Name System (DNS) translates web site names like www.facebook.com to a string of numbers that is the website's location on the Internet. For example, without DNS translating computer names to IP addresses you would have to type in your web browser to get to Facebook instead of www.facebook.com. Normally you get DNS name translation from your <img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/gjor4GS_2jg" height="1" width="1"/>Innate.ideasnoreply@blogger.com0http://www.innate-ideas.net/2011/04/simple-online-security-for-non-techies_27.htmltag:blogger.com,1999:blog-8628158849527674513.post-7053374894338932472011-04-26T09:46:00.000-07:002011-04-26T09:46:00.249-07:00Simple online security for non-techies - know the threatWindows PC Security isn't simple, but here is a simple explanation of the threat. The bad buys have changed their tactics in the arena of viruses/malware/spyware over the years. No longer is it something that you notice right away as they delete your files and mess with your PC. Today when the bad guys get control of your PC they try hard not to be noticed. Because control of your computer is <img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/9G3SMvZS2lg" height="1" width="1"/>Innate.ideasnoreply@blogger.com0http://www.innate-ideas.net/2011/04/simple-online-security-for-non-techies_26.htmltag:blogger.com,1999:blog-8628158849527674513.post-1633068529331988102011-04-25T14:06:00.000-07:002011-04-25T14:06:32.357-07:00Simple online security for non-techies - three simple steps to better online security; for Windows PC users1. Think before you click on email links or attachments. Don't click on links in emails from people you don't know, and Don't click on links from people you do know that you aren't expecting or have an odd sounding text in the message. Read that again, it's very important to follow. Why? Because this is the #1 way for bad guys to own your computer. 2. Keep Adobe PDF reader up to date. If it's <img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/6MK1WZ02Vdo" height="1" width="1"/>Innate.ideasnoreply@blogger.com0http://www.innate-ideas.net/2011/04/simple-online-security-for-non-techies.htmltag:blogger.com,1999:blog-8628158849527674513.post-784708363598884182010-10-20T10:21:00.000-07:002010-10-22T10:29:35.768-07:00Watching Netflix Movies in VLC on LinuxI wanted to watch Netflix streaming movies on my Ubuntu 10.04 desktop in VLC Media Player. This is generally prevented by Microsoft's "PlayReady" digital restrictions and Microsoft Silverlight. At this point in time you are required to have a Microsoft OS in order to watch streaming Netflix movies, hopefully that will change in the future. A number of people solved this problem by running <img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/G2dW9QfgxHc" height="1" width="1"/>Innate.ideasnoreply@blogger.com0http://www.innate-ideas.net/2010/10/watching-netflix-movies-in-vlc-on-linux.htmltag:blogger.com,1999:blog-8628158849527674513.post-81680896884784174112010-05-15T19:12:00.000-07:002010-05-15T19:12:30.106-07:00Out of memory killerI ran into an interesting issue the other day. Something I had not seen before and I thought I'd mention it here. One of the servers I manage was having occasional issues with processes being killed. Syslog entries indicated processes were being killed because the system was out of memory. This on a system that has 32GB of RAM and monitoring shows has several gigs of RAM free which had me a <img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/HLuiDm64Zjw" height="1" width="1"/>Innate.ideasnoreply@blogger.com2http://www.innate-ideas.net/2010/05/out-of-memory-killer.htmltag:blogger.com,1999:blog-8628158849527674513.post-36195313534154042112010-02-22T23:23:00.000-08:002010-05-29T12:03:48.598-07:00System Entropy in LinuxEntropy is needed by many applications, SSL and Java in particular can be heavy consumers of entropy. Linux makes the devices /dev/random and /dev/urandom available to applications to pull entropy from. These two devices contain entropy collected from several system sources. Wikipedia has a good page onĀ  /dev/random and /dev/urandom. Kernel.org has some good information here. You can check the <img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/78A33ebRrkw" height="1" width="1"/>Innate.ideasnoreply@blogger.com0http://www.innate-ideas.net/2010/02/system-entropy-in-linux.htmltag:blogger.com,1999:blog-8628158849527674513.post-29045942560764593822009-12-31T00:03:00.000-08:002010-03-08T21:42:52.733-08:00You can't manage what you can't measure.Server health can flucuate as it goes through the process of receiving, consuming, and sending data. But you won't know unless you monitor system health. Without collecting system health information over a period of time one cannot know what is a normal state of the system and what is an emerging problem. One of my favorite tools for system monitoring is Collectd (www.collectd.org). Simple and <img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/TJd3E4sx1v4" height="1" width="1"/>Innate.ideasnoreply@blogger.com0http://www.innate-ideas.net/2009/12/you-cant-manage-what-you-cant-measure.htmltag:blogger.com,1999:blog-8628158849527674513.post-25050076891754917492009-08-19T23:09:00.000-07:002009-08-19T23:52:53.233-07:00First postThe proverb says that Providence protects children and idiots. This is really true. I know because I have tested it. ~~Mark Twain<img src="http://feeds.feedburner.com/~r/InnateIdeas/~4/MXmB4kzVp-s" height="1" width="1"/>Innate.ideasnoreply@blogger.com0http://www.innate-ideas.net/2009/08/first-post.html